0000005", 0x7, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000003980)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d0f465001000005fd0f4655f00000000000001", 0x1b, 0x11100}], 0x0, &(0x7f00000000c0)) [ 304.126579][T18284] SELinux: duplicate or incompatible mount options [ 304.140370][T18276] EXT4-fs (loop3): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 304.150193][T18276] EXT4-fs (loop3): group descriptors corrupted! 17:03:04 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc01000a, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {0x0, 0x0, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000003980)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d0f465001000005fd0f4655f00000000000001000c00000010000800000000000af3010004", 0x2d, 0x11100}], 0x0, &(0x7f00000000c0)) [ 304.174147][T18287] loop5: detected capacity change from 0 to 264192 [ 304.194578][T18287] EXT4-fs warning (device loop5): read_mmp_block:107: Error -117 while reading MMP block 0 [ 304.195655][T18270] EXT4-fs (loop0): 1 orphan inode deleted [ 304.210634][T18270] EXT4-fs (loop0): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: writeback. 17:03:08 executing program 0: perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000004d100)={0x0, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}], 0x8, "3c1d4c65c79995"}) r1 = syz_open_dev$usbfs(&(0x7f0000000180), 0x77, 0x1) ioctl$USBDEVFS_IOCTL(0xffffffffffffffff, 0xc0105512, 0x0) ioctl$USBDEVFS_IOCTL(0xffffffffffffffff, 0x8108551b, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000004d100)={0xfffffffffffffff9, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r0}], 0x0, "3c1d4c65c79995"}) ioctl$BTRFS_IOC_TREE_SEARCH(0xffffffffffffffff, 0xd0009411, 0x0) r2 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000340)={0x1, 0x80, 0x1, 0x7, 0x4, 0x6, 0x0, 0x5138, 0x0, 0xd, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x3, 0x1, @perf_bp={&(0x7f0000000040), 0xc}, 0x5c42, 0x4, 0x1c1, 0x8, 0x9c84, 0xde09, 0x81, 0x0, 0x3f, 0x0, 0x3f}, 0x0, 0x9, r2, 0x1) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000440)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r1, 0x81f8943c, &(0x7f0000000640)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc01000a, 0xb, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000011", 0x9, 0x4e0}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000003980)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x6800}, {&(0x7f00000001c0)="ffff01", 0x3, 0x9000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d0f465001000005fd0f4655f00000000000001000c00000010000800000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}, {&(0x7f0000013200)="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", 0x282, 0x11580}], 0x0, &(0x7f00000000c0)) 17:03:08 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc01000a, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000011", 0x9, 0x4e0}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400), 0x0, 0x800}, {&(0x7f0000003980)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d0f465001000005fd0f4655f00000000000001000c000000100008", 0x23, 0x11100}], 0x0, &(0x7f00000000c0)) [ 304.221937][T18270] ext4 filesystem being mounted at /root/syzkaller-testdir027935016/syzkaller.r6BuIt/784/file0 supports timestamps until 2038 (0x7fffffff) [ 304.245671][T18290] loop4: detected capacity change from 0 to 264192 [ 304.247311][T18294] loop1: detected capacity change from 0 to 264192 [ 304.264392][T18290] EXT4-fs warning (device loop4): read_mmp_block:107: Error -117 while reading MMP block 0 17:03:08 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc01000a, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {0x0, 0x0, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000003980)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="80", 0x1, 0x11100}], 0x0, &(0x7f00000000c0)) 17:03:08 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc01000a, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200), 0x0, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000003980)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d0f465001000005fd0f4655f00000000000001000c00000010000800000000000af3010004", 0x2d, 0x11100}], 0x0, &(0x7f00000000c0)) 17:03:08 executing program 2: clock_adjtime(0x7, &(0x7f0000000000)={0x8000, 0x62, 0xff, 0x1, 0x3, 0x1ff, 0x3ff, 0x4, 0xff, 0x20, 0x6, 0x401, 0x20, 0x0, 0x1ff, 0x8000, 0xfffffffffffffffd, 0x400, 0x8, 0x100000000, 0x2, 0x8, 0xf32, 0x4, 0x6, 0x80}) clock_adjtime(0x2, &(0x7f0000000100)={0xd9, 0x9, 0x1, 0x2, 0x1f, 0x78, 0x4b1, 0x0, 0x401, 0x5, 0x8, 0x1, 0x101, 0x100000001, 0x7, 0x1fc, 0x9, 0x9, 0x0, 0x9, 0x8, 0x3, 0xff, 0x7, 0x73, 0x946c}) clock_adjtime(0x6, &(0x7f0000000200)={0x4, 0x1, 0x100, 0x6, 0x2, 0x6, 0x1, 0x1dd, 0x9, 0x1000000000000000, 0x0, 0x6, 0x1, 0x1, 0x9, 0x5, 0x3023, 0x2, 0x4, 0xfffffffffffffff9, 0x429, 0x3, 0x0, 0x9, 0xffffffffffffff05, 0x1000}) clock_adjtime(0x3, &(0x7f0000000300)={0x0, 0x8, 0x9, 0x9, 0x9, 0x9, 0x6, 0x9, 0x8, 0x1, 0xd0fc, 0x55, 0x2, 0x0, 0x1, 0x1f, 0x100000001, 0x8f44, 0x53, 0x0, 0x3, 0x140000000000, 0x9, 0x8000, 0x0, 0x10001}) r0 = syz_mount_image$iso9660(&(0x7f0000000400), &(0x7f0000000440)='./file0\x00', 0x4, 0x1, &(0x7f0000000480)=[{0xfffffffffffffffe, 0x0, 0x3}], 0x2014400, &(0x7f00000004c0)={[{@check_relaxed}, {@dmode}, {@check_relaxed}], [{@euid_lt={'euid<', 0xee01}}, {@euid_eq}, {@rootcontext={'rootcontext', 0x3d, 'staff_u'}}, {@obj_user={'obj_user', 0x3d, '#-_'}}, {@rootcontext={'rootcontext', 0x3d, 'staff_u'}}]}) faccessat(r0, &(0x7f0000000580)='./file0\x00', 0x88) clock_adjtime(0x4, &(0x7f00000005c0)={0x80000000, 0x100000000, 0xba, 0x80000000, 0x4, 0x20d4e190, 0x7, 0x400, 0x33, 0x7a, 0x1, 0x465d, 0x7f, 0x5, 0x3, 0x1, 0x0, 0x8, 0x7, 0x7ff, 0x1, 0x4, 0x3f, 0x7fff, 0x700b, 0x96}) r1 = accept$unix(0xffffffffffffffff, 0x0, &(0x7f00000006c0)) getsockname$unix(r1, &(0x7f0000000700), &(0x7f0000000780)=0x6e) clock_adjtime(0x3, &(0x7f00000007c0)={0x6, 0x6, 0x7, 0x8000, 0x7ff, 0x5c, 0x401, 0x2, 0x9, 0x4, 0x0, 0x61, 0x2, 0x9b71, 0x100000000, 0x7fffffff, 0x322, 0xc70d, 0x9, 0xd, 0x9, 0x0, 0x9, 0x1a1f00000000, 0xffffffffffffffff, 0x9}) clock_adjtime(0x6, &(0x7f00000008c0)={0x4, 0x9, 0x3, 0xfffffffffffffff7, 0xb31, 0x1, 0x1, 0x2, 0x538, 0x0, 0x401, 0x1, 0xdd, 0xfffffffffffffff7, 0xec54, 0x4, 0x100000001, 0x0, 0xa, 0x1, 0x7ff, 0xcd, 0xf2, 0x80, 0x7, 0x8000}) clock_adjtime(0x0, &(0x7f00000009c0)={0x8, 0xff, 0x81, 0x2, 0x100000001, 0x11, 0x5, 0x1, 0x1, 0x9, 0x1000, 0x8, 0xdf6c, 0x9, 0x8, 0x1004000000000000, 0x1ff, 0x3, 0x6, 0xf5, 0x80000, 0x1, 0xfffffffffffffd6d, 0x2, 0x6, 0xfa}) r2 = socket$unix(0x1, 0x5, 0x0) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f0000000ac0)={'wlan0\x00'}) mq_timedreceive(0xffffffffffffffff, &(0x7f0000000b00)=""/4096, 0x1000, 0x80, &(0x7f0000001b00)={0x0, 0x989680}) r3 = creat(&(0x7f0000001b40)='./file0\x00', 0x1) mknodat(r3, &(0x7f0000001b80)='./file1\x00', 0x4, 0x0) clock_adjtime(0x0, &(0x7f0000001bc0)={0xfff, 0x7fff, 0x0, 0x2, 0xfdc, 0x54, 0x8fa, 0x3f41, 0x0, 0x4, 0x4, 0x5, 0x101, 0x5, 0x4, 0x9, 0x9, 0x30e, 0x3f, 0x2, 0x7f, 0x7, 0x6, 0x4, 0x3ff, 0x100000000}) clock_adjtime(0x2, &(0x7f0000001cc0)={0x0, 0x6, 0x7, 0xe5, 0x5, 0x6, 0x10, 0x7, 0x281, 0x40, 0x0, 0x5, 0x1, 0x10001, 0x5, 0x100, 0x0, 0x4, 0xffffffffffffe001, 0xdf, 0x7f, 0x8000, 0x9, 0x400, 0xfffffffffffffe00, 0x3f}) 17:03:08 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc01000a, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="0100000000000500", 0x8, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000003980)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d0f465001000005fd0f4655f00000000000001", 0x1b, 0x11100}], 0x0, &(0x7f00000000c0)) [ 304.305623][T18294] EXT4-fs warning (device loop1): read_mmp_block:107: Error -117 while reading MMP block 0 [ 304.359274][T18299] loop3: detected capacity change from 0 to 264192 [ 304.363925][T18298] loop5: detected capacity change from 0 to 264192 [ 304.372272][T18301] SELinux: duplicate or incompatible mount options [ 304.381794][T18298] EXT4-fs warning (device loop5): read_mmp_block:107: Error -117 while reading MMP block 0 [ 304.394895][T18306] loop4: detected capacity change from 0 to 264192 17:03:08 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc01000a, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {0x0, 0x0, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000003980)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="80", 0x1, 0x11100}], 0x0, &(0x7f00000000c0)) [ 304.405695][T18307] loop1: detected capacity change from 0 to 264192 [ 304.410121][T18299] EXT4-fs (loop3): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 304.422130][T18299] EXT4-fs (loop3): group descriptors corrupted! [ 304.423153][T18307] EXT4-fs warning (device loop1): read_mmp_block:107: Error -117 while reading MMP block 0 [ 304.443290][T18306] EXT4-fs warning (device loop4): read_mmp_block:107: Error -117 while reading MMP block 0 17:03:08 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc01000a, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000011", 0x9, 0x4e0}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="0200000012", 0x5, 0x800}, {&(0x7f0000003980)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d0f465001000005fd0f4655f00000000000001000c000000100008", 0x23, 0x11100}], 0x0, &(0x7f00000000c0)) 17:03:08 executing program 0: perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000004d100)={0x0, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}], 0x8, "3c1d4c65c79995"}) r1 = syz_open_dev$usbfs(&(0x7f0000000180), 0x77, 0x1) ioctl$USBDEVFS_IOCTL(0xffffffffffffffff, 0xc0105512, 0x0) ioctl$USBDEVFS_IOCTL(0xffffffffffffffff, 0x8108551b, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000004d100)={0xfffffffffffffff9, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r0}], 0x0, "3c1d4c65c79995"}) ioctl$BTRFS_IOC_TREE_SEARCH(0xffffffffffffffff, 0xd0009411, 0x0) r2 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000340)={0x1, 0x80, 0x1, 0x7, 0x4, 0x6, 0x0, 0x5138, 0x0, 0xd, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x3, 0x1, @perf_bp={&(0x7f0000000040), 0xc}, 0x5c42, 0x4, 0x1c1, 0x8, 0x9c84, 0xde09, 0x81, 0x0, 0x3f, 0x0, 0x3f}, 0x0, 0x9, r2, 0x1) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000440)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r1, 0x81f8943c, &(0x7f0000000640)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc01000a, 0xb, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000011", 0x9, 0x4e0}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000003980)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x6800}, {&(0x7f00000001c0)="ffff01", 0x3, 0x9000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d0f465001000005fd0f4655f00000000000001000c00000010000800000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}, {&(0x7f0000013200)="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", 0x282, 0x11580}], 0x0, &(0x7f00000000c0)) [ 304.455643][T18309] loop5: detected capacity change from 0 to 264192 [ 304.469702][T18309] EXT4-fs warning (device loop5): read_mmp_block:107: Error -117 while reading MMP block 0 17:03:12 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc01000a, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200), 0x0, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000003980)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d0f465001000005fd0f4655f00000000000001000c00000010000800000000000af3010004", 0x2d, 0x11100}], 0x0, &(0x7f00000000c0)) 17:03:12 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc01000a, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="0100000000000500", 0x8, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000003980)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d0f465001000005fd0f4655f00000000000001", 0x1b, 0x11100}], 0x0, &(0x7f00000000c0)) 17:03:12 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc01000a, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200), 0x0, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000003980)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="80", 0x1, 0x11100}], 0x0, &(0x7f00000000c0)) [ 304.517462][T18314] loop3: detected capacity change from 0 to 264192 [ 304.555343][T18319] loop1: detected capacity change from 0 to 264192 17:03:12 executing program 2: clock_adjtime(0x7, &(0x7f0000000000)={0x8000, 0x62, 0xff, 0x1, 0x3, 0x1ff, 0x3ff, 0x4, 0xff, 0x20, 0x6, 0x401, 0x20, 0x0, 0x1ff, 0x8000, 0xfffffffffffffffd, 0x400, 0x8, 0x100000000, 0x2, 0x8, 0xf32, 0x4, 0x6, 0x80}) clock_adjtime(0x2, &(0x7f0000000100)={0xd9, 0x9, 0x1, 0x2, 0x1f, 0x78, 0x4b1, 0x0, 0x401, 0x5, 0x8, 0x1, 0x101, 0x100000001, 0x7, 0x1fc, 0x9, 0x9, 0x0, 0x9, 0x8, 0x3, 0xff, 0x7, 0x73, 0x946c}) clock_adjtime(0x6, &(0x7f0000000200)={0x4, 0x1, 0x100, 0x6, 0x2, 0x6, 0x1, 0x1dd, 0x9, 0x1000000000000000, 0x0, 0x6, 0x1, 0x1, 0x9, 0x5, 0x3023, 0x2, 0x4, 0xfffffffffffffff9, 0x429, 0x3, 0x0, 0x9, 0xffffffffffffff05, 0x1000}) clock_adjtime(0x3, &(0x7f0000000300)={0x0, 0x8, 0x9, 0x9, 0x9, 0x9, 0x6, 0x9, 0x8, 0x1, 0xd0fc, 0x55, 0x2, 0x0, 0x1, 0x1f, 0x100000001, 0x8f44, 0x53, 0x0, 0x3, 0x140000000000, 0x9, 0x8000, 0x0, 0x10001}) r0 = syz_mount_image$iso9660(&(0x7f0000000400), &(0x7f0000000440)='./file0\x00', 0x4, 0x1, &(0x7f0000000480)=[{0xfffffffffffffffe, 0x0, 0x3}], 0x2014400, &(0x7f00000004c0)={[{@check_relaxed}, {@dmode}, {@check_relaxed}], [{@euid_lt={'euid<', 0xee01}}, {@euid_eq}, {@rootcontext={'rootcontext', 0x3d, 'staff_u'}}, {@obj_user={'obj_user', 0x3d, '#-_'}}, {@rootcontext={'rootcontext', 0x3d, 'staff_u'}}]}) faccessat(r0, &(0x7f0000000580)='./file0\x00', 0x88) clock_adjtime(0x4, &(0x7f00000005c0)={0x80000000, 0x100000000, 0xba, 0x80000000, 0x4, 0x20d4e190, 0x7, 0x400, 0x33, 0x7a, 0x1, 0x465d, 0x7f, 0x5, 0x3, 0x1, 0x0, 0x8, 0x7, 0x7ff, 0x1, 0x4, 0x3f, 0x7fff, 0x700b, 0x96}) r1 = accept$unix(0xffffffffffffffff, 0x0, &(0x7f00000006c0)) getsockname$unix(r1, &(0x7f0000000700), &(0x7f0000000780)=0x6e) clock_adjtime(0x3, &(0x7f00000007c0)={0x6, 0x6, 0x7, 0x8000, 0x7ff, 0x5c, 0x401, 0x2, 0x9, 0x4, 0x0, 0x61, 0x2, 0x9b71, 0x100000000, 0x7fffffff, 0x322, 0xc70d, 0x9, 0xd, 0x9, 0x0, 0x9, 0x1a1f00000000, 0xffffffffffffffff, 0x9}) clock_adjtime(0x6, &(0x7f00000008c0)={0x4, 0x9, 0x3, 0xfffffffffffffff7, 0xb31, 0x1, 0x1, 0x2, 0x538, 0x0, 0x401, 0x1, 0xdd, 0xfffffffffffffff7, 0xec54, 0x4, 0x100000001, 0x0, 0xa, 0x1, 0x7ff, 0xcd, 0xf2, 0x80, 0x7, 0x8000}) clock_adjtime(0x0, &(0x7f00000009c0)={0x8, 0xff, 0x81, 0x2, 0x100000001, 0x11, 0x5, 0x1, 0x1, 0x9, 0x1000, 0x8, 0xdf6c, 0x9, 0x8, 0x1004000000000000, 0x1ff, 0x3, 0x6, 0xf5, 0x80000, 0x1, 0xfffffffffffffd6d, 0x2, 0x6, 0xfa}) r2 = socket$unix(0x1, 0x5, 0x0) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f0000000ac0)={'wlan0\x00'}) mq_timedreceive(0xffffffffffffffff, &(0x7f0000000b00)=""/4096, 0x1000, 0x80, &(0x7f0000001b00)={0x0, 0x989680}) r3 = creat(&(0x7f0000001b40)='./file0\x00', 0x1) mknodat(r3, &(0x7f0000001b80)='./file1\x00', 0x4, 0x0) clock_adjtime(0x0, &(0x7f0000001bc0)={0xfff, 0x7fff, 0x0, 0x2, 0xfdc, 0x54, 0x8fa, 0x3f41, 0x0, 0x4, 0x4, 0x5, 0x101, 0x5, 0x4, 0x9, 0x9, 0x30e, 0x3f, 0x2, 0x7f, 0x7, 0x6, 0x4, 0x3ff, 0x100000000}) clock_adjtime(0x2, &(0x7f0000001cc0)={0x0, 0x6, 0x7, 0xe5, 0x5, 0x6, 0x10, 0x7, 0x281, 0x40, 0x0, 0x5, 0x1, 0x10001, 0x5, 0x100, 0x0, 0x4, 0xffffffffffffe001, 0xdf, 0x7f, 0x8000, 0x9, 0x400, 0xfffffffffffffe00, 0x3f}) [ 304.563354][T18316] loop0: detected capacity change from 0 to 264192 [ 304.570584][T18321] loop4: detected capacity change from 0 to 264192 [ 304.577608][T18322] loop5: detected capacity change from 0 to 264192 [ 304.597029][T18324] SELinux: duplicate or incompatible mount options [ 304.608250][T18319] EXT4-fs warning (device loop1): read_mmp_block:107: Error -117 while reading MMP block 0 [ 304.620130][T18322] EXT4-fs warning (device loop5): read_mmp_block:107: Error -117 while reading MMP block 0 [ 304.630605][T18321] EXT4-fs warning (device loop4): read_mmp_block:107: Error -117 while reading MMP block 0 17:03:12 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc01000a, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200), 0x0, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000003980)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d0f465001000005fd0f4655f00000000000001000c00000010000800000000000af3010004", 0x2d, 0x11100}], 0x0, &(0x7f00000000c0)) 17:03:12 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc01000a, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200), 0x0, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000003980)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="80", 0x1, 0x11100}], 0x0, &(0x7f00000000c0)) 17:03:12 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc01000a, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="0100000000000500", 0x8, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000003980)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d0f465001000005fd0f4655f00000000000001", 0x1b, 0x11100}], 0x0, &(0x7f00000000c0)) 17:03:12 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc01000a, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="0100000000", 0x5, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000003980)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d0f465001000005fd0f4655f00000000000001000c00000010000800000000000af3010004", 0x2d, 0x11100}], 0x0, &(0x7f00000000c0)) 17:03:13 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc01000a, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000011", 0x9, 0x4e0}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="0200000012", 0x5, 0x800}, {&(0x7f0000003980)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d0f465001000005fd0f4655f00000000000001000c000000100008", 0x23, 0x11100}], 0x0, &(0x7f00000000c0)) [ 304.666646][T18314] EXT4-fs (loop3): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 304.676538][T18314] EXT4-fs (loop3): group descriptors corrupted! 17:03:17 executing program 2: clock_adjtime(0x7, &(0x7f0000000000)={0x8000, 0x62, 0xff, 0x1, 0x3, 0x1ff, 0x3ff, 0x4, 0xff, 0x20, 0x6, 0x401, 0x20, 0x0, 0x1ff, 0x8000, 0xfffffffffffffffd, 0x400, 0x8, 0x100000000, 0x2, 0x8, 0xf32, 0x4, 0x6, 0x80}) clock_adjtime(0x2, &(0x7f0000000100)={0xd9, 0x9, 0x1, 0x2, 0x1f, 0x78, 0x4b1, 0x0, 0x401, 0x5, 0x8, 0x1, 0x101, 0x100000001, 0x7, 0x1fc, 0x9, 0x9, 0x0, 0x9, 0x8, 0x3, 0xff, 0x7, 0x73, 0x946c}) clock_adjtime(0x6, &(0x7f0000000200)={0x4, 0x1, 0x100, 0x6, 0x2, 0x6, 0x1, 0x1dd, 0x9, 0x1000000000000000, 0x0, 0x6, 0x1, 0x1, 0x9, 0x5, 0x3023, 0x2, 0x4, 0xfffffffffffffff9, 0x429, 0x3, 0x0, 0x9, 0xffffffffffffff05, 0x1000}) clock_adjtime(0x3, &(0x7f0000000300)={0x0, 0x8, 0x9, 0x9, 0x9, 0x9, 0x6, 0x9, 0x8, 0x1, 0xd0fc, 0x55, 0x2, 0x0, 0x1, 0x1f, 0x100000001, 0x8f44, 0x53, 0x0, 0x3, 0x140000000000, 0x9, 0x8000, 0x0, 0x10001}) r0 = syz_mount_image$iso9660(&(0x7f0000000400), &(0x7f0000000440)='./file0\x00', 0x4, 0x1, &(0x7f0000000480)=[{0xfffffffffffffffe, 0x0, 0x3}], 0x2014400, &(0x7f00000004c0)={[{@check_relaxed}, {@dmode}, {@check_relaxed}], [{@euid_lt={'euid<', 0xee01}}, {@euid_eq}, {@rootcontext={'rootcontext', 0x3d, 'staff_u'}}, {@obj_user={'obj_user', 0x3d, '#-_'}}, {@rootcontext={'rootcontext', 0x3d, 'staff_u'}}]}) faccessat(r0, &(0x7f0000000580)='./file0\x00', 0x88) clock_adjtime(0x4, &(0x7f00000005c0)={0x80000000, 0x100000000, 0xba, 0x80000000, 0x4, 0x20d4e190, 0x7, 0x400, 0x33, 0x7a, 0x1, 0x465d, 0x7f, 0x5, 0x3, 0x1, 0x0, 0x8, 0x7, 0x7ff, 0x1, 0x4, 0x3f, 0x7fff, 0x700b, 0x96}) r1 = accept$unix(0xffffffffffffffff, 0x0, &(0x7f00000006c0)) getsockname$unix(r1, &(0x7f0000000700), &(0x7f0000000780)=0x6e) clock_adjtime(0x3, &(0x7f00000007c0)={0x6, 0x6, 0x7, 0x8000, 0x7ff, 0x5c, 0x401, 0x2, 0x9, 0x4, 0x0, 0x61, 0x2, 0x9b71, 0x100000000, 0x7fffffff, 0x322, 0xc70d, 0x9, 0xd, 0x9, 0x0, 0x9, 0x1a1f00000000, 0xffffffffffffffff, 0x9}) clock_adjtime(0x6, &(0x7f00000008c0)={0x4, 0x9, 0x3, 0xfffffffffffffff7, 0xb31, 0x1, 0x1, 0x2, 0x538, 0x0, 0x401, 0x1, 0xdd, 0xfffffffffffffff7, 0xec54, 0x4, 0x100000001, 0x0, 0xa, 0x1, 0x7ff, 0xcd, 0xf2, 0x80, 0x7, 0x8000}) clock_adjtime(0x0, &(0x7f00000009c0)={0x8, 0xff, 0x81, 0x2, 0x100000001, 0x11, 0x5, 0x1, 0x1, 0x9, 0x1000, 0x8, 0xdf6c, 0x9, 0x8, 0x1004000000000000, 0x1ff, 0x3, 0x6, 0xf5, 0x80000, 0x1, 0xfffffffffffffd6d, 0x2, 0x6, 0xfa}) r2 = socket$unix(0x1, 0x5, 0x0) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f0000000ac0)={'wlan0\x00'}) mq_timedreceive(0xffffffffffffffff, &(0x7f0000000b00)=""/4096, 0x1000, 0x80, &(0x7f0000001b00)={0x0, 0x989680}) r3 = creat(&(0x7f0000001b40)='./file0\x00', 0x1) mknodat(r3, &(0x7f0000001b80)='./file1\x00', 0x4, 0x0) clock_adjtime(0x0, &(0x7f0000001bc0)={0xfff, 0x7fff, 0x0, 0x2, 0xfdc, 0x54, 0x8fa, 0x3f41, 0x0, 0x4, 0x4, 0x5, 0x101, 0x5, 0x4, 0x9, 0x9, 0x30e, 0x3f, 0x2, 0x7f, 0x7, 0x6, 0x4, 0x3ff, 0x100000000}) clock_adjtime(0x2, &(0x7f0000001cc0)={0x0, 0x6, 0x7, 0xe5, 0x5, 0x6, 0x10, 0x7, 0x281, 0x40, 0x0, 0x5, 0x1, 0x10001, 0x5, 0x100, 0x0, 0x4, 0xffffffffffffe001, 0xdf, 0x7f, 0x8000, 0x9, 0x400, 0xfffffffffffffe00, 0x3f}) [ 304.737630][T18336] loop4: detected capacity change from 0 to 264192 [ 304.748474][T18316] EXT4-fs (loop0): 1 orphan inode deleted [ 304.750404][T18334] loop3: detected capacity change from 0 to 264192 [ 304.754595][T18316] EXT4-fs (loop0): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: writeback. [ 304.774401][T18336] EXT4-fs warning (device loop4): read_mmp_block:107: Error -117 while reading MMP block 0 17:03:17 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc01000a, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000011", 0x9, 0x4e0}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="0200000012", 0x5, 0x800}, {&(0x7f0000003980)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d0f465001000005fd0f4655f00000000000001000c000000100008", 0x23, 0x11100}], 0x0, &(0x7f00000000c0)) [ 304.791819][T18334] EXT4-fs (loop3): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 304.796025][T18338] loop5: detected capacity change from 0 to 264192 [ 304.801600][T18334] EXT4-fs (loop3): group descriptors corrupted! [ 304.810943][T18316] ext4 filesystem being mounted at /root/syzkaller-testdir027935016/syzkaller.r6BuIt/786/file0 supports timestamps until 2038 (0x7fffffff) [ 304.821967][T18340] loop1: detected capacity change from 0 to 264192 17:03:17 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc01000a, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="0100000000", 0x5, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000003980)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d0f465001000005fd0f4655f00000000000001000c00000010000800000000000af3010004", 0x2d, 0x11100}], 0x0, &(0x7f00000000c0)) 17:03:17 executing program 0: r0 = perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000004d100)={0x0, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}], 0x8, "3c1d4c65c79995"}) r3 = syz_open_dev$usbfs(&(0x7f0000000180), 0x77, 0x1) ioctl$USBDEVFS_IOCTL(0xffffffffffffffff, 0xc0105512, 0x0) ioctl$USBDEVFS_IOCTL(0xffffffffffffffff, 0x8108551b, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000004d100)={0xfffffffffffffff9, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r1}], 0x0, "3c1d4c65c79995"}) ioctl$BTRFS_IOC_TREE_SEARCH(0xffffffffffffffff, 0xd0009411, 0x0) r6 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000340)={0x1, 0x80, 0x1, 0x7, 0x4, 0x6, 0x0, 0x5138, 0x0, 0xd, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x3, 0x1, @perf_bp={&(0x7f0000000040), 0xc}, 0x5c42, 0x4, 0x1c1, 0x8, 0x9c84, 0xde09, 0x81, 0x0, 0x3f, 0x0, 0x3f}, 0x0, 0x9, r6, 0x1) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000440)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r3, 0x81f8943c, &(0x7f0000000640)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_INO_LOOKUP_USER(r0, 0xd000943e, &(0x7f0000000840)={r5, r2, "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", "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"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r6, 0xd000943d, &(0x7f0000058c40)={0x1, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r7, r10}, {}, {}, {}, {r8}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r9}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r9}, {}, {r8}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r11}, {}, {}, {}, {}, {}, {r7}, {}, {}, {}, {r8}, {}, {0x0, r9}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r4}], 0x1, "2156816c73038c"}) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc01000a, 0xb, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000011", 0x9, 0x4e0}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000003980)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x6800}, {&(0x7f00000001c0)="ffff01", 0x3, 0x9000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d0f465001000005fd0f4655f00000000000001000c00000010000800000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}, {&(0x7f0000013200)="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", 0x282, 0x11580}], 0x0, &(0x7f00000000c0)) 17:03:17 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc01000a, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000011", 0x9, 0x4e0}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000120000", 0x7, 0x800}, {&(0x7f0000003980)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d0f465001000005fd0f4655f00000000000001000c000000100008", 0x23, 0x11100}], 0x0, &(0x7f00000000c0)) [ 304.863605][T18340] EXT4-fs warning (device loop1): read_mmp_block:107: Error -117 while reading MMP block 0 [ 304.875511][T18342] SELinux: duplicate or incompatible mount options 17:03:17 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc01000a, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000003980)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d0f465001000005fd0f4655f00000000000001", 0x1b, 0x11100}], 0x0, &(0x7f00000000c0)) [ 304.916503][T18338] EXT4-fs warning (device loop5): read_mmp_block:107: Error -117 while reading MMP block 0 [ 304.928045][T18347] loop4: detected capacity change from 0 to 264192 [ 304.949010][T18346] loop3: detected capacity change from 0 to 264192 17:03:21 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc01000a, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200), 0x0, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000003980)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="80", 0x1, 0x11100}], 0x0, &(0x7f00000000c0)) 17:03:21 executing program 2: clock_adjtime(0x7, &(0x7f0000000000)={0x8000, 0x62, 0xff, 0x1, 0x3, 0x1ff, 0x3ff, 0x4, 0xff, 0x20, 0x6, 0x401, 0x20, 0x0, 0x1ff, 0x8000, 0xfffffffffffffffd, 0x400, 0x8, 0x100000000, 0x2, 0x8, 0xf32, 0x4, 0x6, 0x80}) clock_adjtime(0x2, &(0x7f0000000100)={0xd9, 0x9, 0x1, 0x2, 0x1f, 0x78, 0x4b1, 0x0, 0x401, 0x5, 0x8, 0x1, 0x101, 0x100000001, 0x7, 0x1fc, 0x9, 0x9, 0x0, 0x9, 0x8, 0x3, 0xff, 0x7, 0x73, 0x946c}) clock_adjtime(0x6, &(0x7f0000000200)={0x4, 0x1, 0x100, 0x6, 0x2, 0x6, 0x1, 0x1dd, 0x9, 0x1000000000000000, 0x0, 0x6, 0x1, 0x1, 0x9, 0x5, 0x3023, 0x2, 0x4, 0xfffffffffffffff9, 0x429, 0x3, 0x0, 0x9, 0xffffffffffffff05, 0x1000}) clock_adjtime(0x3, &(0x7f0000000300)={0x0, 0x8, 0x9, 0x9, 0x9, 0x9, 0x6, 0x9, 0x8, 0x1, 0xd0fc, 0x55, 0x2, 0x0, 0x1, 0x1f, 0x100000001, 0x8f44, 0x53, 0x0, 0x3, 0x140000000000, 0x9, 0x8000, 0x0, 0x10001}) r0 = syz_mount_image$iso9660(&(0x7f0000000400), &(0x7f0000000440)='./file0\x00', 0x4, 0x1, &(0x7f0000000480)=[{0xfffffffffffffffe, 0x0, 0x3}], 0x2014400, &(0x7f00000004c0)={[{@check_relaxed}, {@dmode}, {@check_relaxed}], [{@euid_lt={'euid<', 0xee01}}, {@euid_eq}, {@rootcontext={'rootcontext', 0x3d, 'staff_u'}}, {@obj_user={'obj_user', 0x3d, '#-_'}}, {@rootcontext={'rootcontext', 0x3d, 'staff_u'}}]}) faccessat(r0, &(0x7f0000000580)='./file0\x00', 0x88) clock_adjtime(0x4, &(0x7f00000005c0)={0x80000000, 0x100000000, 0xba, 0x80000000, 0x4, 0x20d4e190, 0x7, 0x400, 0x33, 0x7a, 0x1, 0x465d, 0x7f, 0x5, 0x3, 0x1, 0x0, 0x8, 0x7, 0x7ff, 0x1, 0x4, 0x3f, 0x7fff, 0x700b, 0x96}) r1 = accept$unix(0xffffffffffffffff, 0x0, &(0x7f00000006c0)) getsockname$unix(r1, &(0x7f0000000700), &(0x7f0000000780)=0x6e) clock_adjtime(0x3, &(0x7f00000007c0)={0x6, 0x6, 0x7, 0x8000, 0x7ff, 0x5c, 0x401, 0x2, 0x9, 0x4, 0x0, 0x61, 0x2, 0x9b71, 0x100000000, 0x7fffffff, 0x322, 0xc70d, 0x9, 0xd, 0x9, 0x0, 0x9, 0x1a1f00000000, 0xffffffffffffffff, 0x9}) clock_adjtime(0x6, &(0x7f00000008c0)={0x4, 0x9, 0x3, 0xfffffffffffffff7, 0xb31, 0x1, 0x1, 0x2, 0x538, 0x0, 0x401, 0x1, 0xdd, 0xfffffffffffffff7, 0xec54, 0x4, 0x100000001, 0x0, 0xa, 0x1, 0x7ff, 0xcd, 0xf2, 0x80, 0x7, 0x8000}) clock_adjtime(0x0, &(0x7f00000009c0)={0x8, 0xff, 0x81, 0x2, 0x100000001, 0x11, 0x5, 0x1, 0x1, 0x9, 0x1000, 0x8, 0xdf6c, 0x9, 0x8, 0x1004000000000000, 0x1ff, 0x3, 0x6, 0xf5, 0x80000, 0x1, 0xfffffffffffffd6d, 0x2, 0x6, 0xfa}) r2 = socket$unix(0x1, 0x5, 0x0) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f0000000ac0)={'wlan0\x00'}) mq_timedreceive(0xffffffffffffffff, &(0x7f0000000b00)=""/4096, 0x1000, 0x80, &(0x7f0000001b00)={0x0, 0x989680}) r3 = creat(&(0x7f0000001b40)='./file0\x00', 0x1) mknodat(r3, &(0x7f0000001b80)='./file1\x00', 0x4, 0x0) clock_adjtime(0x0, &(0x7f0000001bc0)={0xfff, 0x7fff, 0x0, 0x2, 0xfdc, 0x54, 0x8fa, 0x3f41, 0x0, 0x4, 0x4, 0x5, 0x101, 0x5, 0x4, 0x9, 0x9, 0x30e, 0x3f, 0x2, 0x7f, 0x7, 0x6, 0x4, 0x3ff, 0x100000000}) clock_adjtime(0x2, &(0x7f0000001cc0)={0x0, 0x6, 0x7, 0xe5, 0x5, 0x6, 0x10, 0x7, 0x281, 0x40, 0x1, 0x0, 0x1, 0x10001, 0x5, 0x100, 0x0, 0x4, 0xffffffffffffe001, 0xdf, 0x7f, 0x8000, 0x9, 0x400, 0xfffffffffffffe00, 0x3f}) [ 304.961586][T18352] loop1: detected capacity change from 0 to 264192 [ 304.977415][T18350] loop0: detected capacity change from 0 to 264192 [ 304.987897][T18352] EXT4-fs warning (device loop1): read_mmp_block:107: Error -117 while reading MMP block 0 [ 305.009570][T18346] EXT4-fs (loop3): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 305.019329][T18346] EXT4-fs (loop3): group descriptors corrupted! 17:03:21 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc01000a, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000003980)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d0f465001000005fd0f4655f00000000000001", 0x1b, 0x11100}], 0x0, &(0x7f00000000c0)) 17:03:21 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc01000a, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000011", 0x9, 0x4e0}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000120000", 0x7, 0x800}, {&(0x7f0000003980)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d0f465001000005fd0f4655f00000000000001000c000000100008", 0x23, 0x11100}], 0x0, &(0x7f00000000c0)) [ 305.058574][T18358] loop5: detected capacity change from 0 to 264192 [ 305.068015][T18356] SELinux: duplicate or incompatible mount options [ 305.085418][T18347] EXT4-fs warning (device loop4): read_mmp_block:107: Error -117 while reading MMP block 0 [ 305.097340][T18358] EXT4-fs warning (device loop5): read_mmp_block:107: Error -117 while reading MMP block 0 17:03:21 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc01000a, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="0100000000", 0x5, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000003980)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d0f465001000005fd0f4655f00000000000001000c00000010000800000000000af3010004", 0x2d, 0x11100}], 0x0, &(0x7f00000000c0)) [ 305.134599][T18361] loop1: detected capacity change from 0 to 264192 [ 305.163207][T18363] loop3: detected capacity change from 0 to 264192 17:03:25 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc01000a, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="0100000000", 0x5, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000003980)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="80", 0x1, 0x11100}], 0x0, &(0x7f00000000c0)) [ 305.184142][T18366] loop4: detected capacity change from 0 to 264192 [ 305.193953][T18361] EXT4-fs warning (device loop1): read_mmp_block:107: Error -117 while reading MMP block 0 17:03:25 executing program 2: clock_adjtime(0x7, &(0x7f0000000000)={0x8000, 0x62, 0xff, 0x1, 0x3, 0x1ff, 0x3ff, 0x4, 0xff, 0x20, 0x6, 0x401, 0x20, 0x0, 0x1ff, 0x8000, 0xfffffffffffffffd, 0x400, 0x8, 0x100000000, 0x2, 0x8, 0xf32, 0x4, 0x6, 0x80}) clock_adjtime(0x2, &(0x7f0000000100)={0xd9, 0x9, 0x1, 0x2, 0x1f, 0x78, 0x4b1, 0x0, 0x401, 0x5, 0x8, 0x1, 0x101, 0x100000001, 0x7, 0x1fc, 0x9, 0x9, 0x0, 0x9, 0x8, 0x3, 0xff, 0x7, 0x73, 0x946c}) clock_adjtime(0x6, &(0x7f0000000200)={0x4, 0x1, 0x100, 0x6, 0x2, 0x6, 0x1, 0x1dd, 0x9, 0x1000000000000000, 0x0, 0x6, 0x1, 0x1, 0x9, 0x5, 0x3023, 0x2, 0x4, 0xfffffffffffffff9, 0x429, 0x3, 0x0, 0x9, 0xffffffffffffff05, 0x1000}) clock_adjtime(0x3, &(0x7f0000000300)={0x0, 0x8, 0x9, 0x9, 0x9, 0x9, 0x6, 0x9, 0x8, 0x1, 0xd0fc, 0x55, 0x2, 0x0, 0x1, 0x1f, 0x100000001, 0x8f44, 0x53, 0x0, 0x3, 0x140000000000, 0x9, 0x8000, 0x0, 0x10001}) r0 = syz_mount_image$iso9660(&(0x7f0000000400), &(0x7f0000000440)='./file0\x00', 0x4, 0x1, &(0x7f0000000480)=[{0xfffffffffffffffe, 0x0, 0x3}], 0x2014400, &(0x7f00000004c0)={[{@check_relaxed}, {@dmode}, {@check_relaxed}], [{@euid_lt={'euid<', 0xee01}}, {@euid_eq}, {@rootcontext={'rootcontext', 0x3d, 'staff_u'}}, {@obj_user={'obj_user', 0x3d, '#-_'}}, {@rootcontext={'rootcontext', 0x3d, 'staff_u'}}]}) faccessat(r0, &(0x7f0000000580)='./file0\x00', 0x88) clock_adjtime(0x4, &(0x7f00000005c0)={0x80000000, 0x100000000, 0xba, 0x80000000, 0x4, 0x20d4e190, 0x7, 0x400, 0x33, 0x7a, 0x1, 0x465d, 0x7f, 0x5, 0x3, 0x1, 0x0, 0x8, 0x7, 0x7ff, 0x1, 0x4, 0x3f, 0x7fff, 0x700b, 0x96}) r1 = accept$unix(0xffffffffffffffff, 0x0, &(0x7f00000006c0)) getsockname$unix(r1, &(0x7f0000000700), &(0x7f0000000780)=0x6e) clock_adjtime(0x3, &(0x7f00000007c0)={0x6, 0x6, 0x7, 0x8000, 0x7ff, 0x5c, 0x401, 0x2, 0x9, 0x4, 0x0, 0x61, 0x2, 0x9b71, 0x100000000, 0x7fffffff, 0x322, 0xc70d, 0x9, 0xd, 0x9, 0x0, 0x9, 0x1a1f00000000, 0xffffffffffffffff, 0x9}) clock_adjtime(0x6, &(0x7f00000008c0)={0x4, 0x9, 0x3, 0xfffffffffffffff7, 0xb31, 0x1, 0x1, 0x2, 0x538, 0x0, 0x401, 0x1, 0xdd, 0xfffffffffffffff7, 0xec54, 0x4, 0x100000001, 0x0, 0xa, 0x1, 0x7ff, 0xcd, 0xf2, 0x80, 0x7, 0x8000}) clock_adjtime(0x0, &(0x7f00000009c0)={0x8, 0xff, 0x81, 0x2, 0x100000001, 0x11, 0x5, 0x1, 0x1, 0x9, 0x1000, 0x8, 0xdf6c, 0x9, 0x8, 0x1004000000000000, 0x1ff, 0x3, 0x6, 0xf5, 0x80000, 0x1, 0xfffffffffffffd6d, 0x2, 0x6, 0xfa}) r2 = socket$unix(0x1, 0x5, 0x0) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f0000000ac0)={'wlan0\x00'}) mq_timedreceive(0xffffffffffffffff, &(0x7f0000000b00)=""/4096, 0x1000, 0x80, &(0x7f0000001b00)={0x0, 0x989680}) r3 = creat(&(0x7f0000001b40)='./file0\x00', 0x1) mknodat(r3, &(0x7f0000001b80)='./file1\x00', 0x4, 0x0) clock_adjtime(0x0, &(0x7f0000001bc0)={0xfff, 0x7fff, 0x0, 0x2, 0xfdc, 0x54, 0x8fa, 0x3f41, 0x0, 0x4, 0x4, 0x5, 0x101, 0x5, 0x4, 0x9, 0x9, 0x30e, 0x3f, 0x2, 0x7f, 0x7, 0x6, 0x4, 0x3ff, 0x100000000}) clock_adjtime(0x2, &(0x7f0000001cc0)={0x0, 0x6, 0x7, 0xe5, 0x5, 0x6, 0x10, 0x7, 0x281, 0x40, 0x1, 0x0, 0x1, 0x10001, 0x5, 0x100, 0x0, 0x4, 0xffffffffffffe001, 0xdf, 0x7f, 0x8000, 0x9, 0x400, 0xfffffffffffffe00, 0x3f}) [ 305.226291][T18363] EXT4-fs (loop3): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 305.230465][T18372] loop5: detected capacity change from 0 to 264192 [ 305.236118][T18363] EXT4-fs (loop3): group descriptors corrupted! [ 305.249268][T18366] EXT4-fs warning (device loop4): read_mmp_block:107: Error -117 while reading MMP block 0 [ 305.261158][T18350] EXT4-fs (loop0): 1 orphan inode deleted 17:03:25 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc01000a, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000011", 0x9, 0x4e0}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000120000", 0x7, 0x800}, {&(0x7f0000003980)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d0f465001000005fd0f4655f00000000000001000c000000100008", 0x23, 0x11100}], 0x0, &(0x7f00000000c0)) 17:03:25 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc01000a, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000003980)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d0f465001000005fd0f4655f00000000000001", 0x1b, 0x11100}], 0x0, &(0x7f00000000c0)) [ 305.267138][T18350] EXT4-fs (loop0): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: writeback. [ 305.279294][T18350] ext4 filesystem being mounted at /root/syzkaller-testdir027935016/syzkaller.r6BuIt/787/file0 supports timestamps until 2038 (0x7fffffff) 17:03:25 executing program 0: clock_adjtime(0x7, &(0x7f0000000000)={0x8000, 0x62, 0xff, 0x1, 0x3, 0x1ff, 0x3ff, 0x4, 0xff, 0x20, 0x6, 0x401, 0x20, 0x0, 0x1ff, 0x8000, 0xfffffffffffffffd, 0x400, 0x8, 0x100000000, 0x2, 0x8, 0xf32, 0x4, 0x6, 0x80}) clock_adjtime(0x2, &(0x7f0000000100)={0xd9, 0x9, 0x1, 0x2, 0x1f, 0x78, 0x4b1, 0x0, 0x401, 0x5, 0x8, 0x1, 0x101, 0x100000001, 0x7, 0x1fc, 0x9, 0x9, 0x0, 0x9, 0x8, 0x3, 0xff, 0x7, 0x73, 0x946c}) clock_adjtime(0x6, &(0x7f0000000200)={0x4, 0x1, 0x100, 0x6, 0x2, 0x6, 0x1, 0x1dd, 0x9, 0x1000000000000000, 0x0, 0x6, 0x1, 0x1, 0x9, 0x5, 0x3023, 0x2, 0x4, 0xfffffffffffffff9, 0x429, 0x3, 0x0, 0x9, 0xffffffffffffff05, 0x1000}) clock_adjtime(0x3, &(0x7f0000000300)={0x0, 0x8, 0x9, 0x9, 0x9, 0x9, 0x6, 0x9, 0x8, 0x1, 0xd0fc, 0x55, 0x2, 0x0, 0x1, 0x1f, 0x100000001, 0x8f44, 0x53, 0x0, 0x3, 0x140000000000, 0x9, 0x8000, 0x0, 0x10001}) r0 = syz_mount_image$iso9660(&(0x7f0000000400), &(0x7f0000000440)='./file0\x00', 0x4, 0x1, &(0x7f0000000480)=[{0xfffffffffffffffe, 0x0, 0x3}], 0x2014400, &(0x7f00000004c0)={[{@check_relaxed}, {@dmode}, {@check_relaxed}], [{@euid_lt={'euid<', 0xee01}}, {@euid_eq}, {@rootcontext={'rootcontext', 0x3d, 'staff_u'}}, {@obj_user={'obj_user', 0x3d, '#-_'}}, {@rootcontext={'rootcontext', 0x3d, 'staff_u'}}]}) faccessat(r0, &(0x7f0000000580)='./file0\x00', 0x88) clock_adjtime(0x4, &(0x7f00000005c0)={0x80000000, 0x100000000, 0xba, 0x80000000, 0x4, 0x20d4e190, 0x7, 0x400, 0x33, 0x7a, 0x1, 0x465d, 0x7f, 0x5, 0x3, 0x1, 0x0, 0x8, 0x7, 0x7ff, 0x1, 0x4, 0x3f, 0x7fff, 0x700b, 0x96}) r1 = accept$unix(0xffffffffffffffff, 0x0, &(0x7f00000006c0)) getsockname$unix(r1, &(0x7f0000000700), &(0x7f0000000780)=0x6e) clock_adjtime(0x3, &(0x7f00000007c0)={0x6, 0x6, 0x7, 0x8000, 0x7ff, 0x5c, 0x401, 0x2, 0x9, 0x4, 0x0, 0x61, 0x2, 0x9b71, 0x100000000, 0x7fffffff, 0x322, 0xc70d, 0x9, 0xd, 0x9, 0x0, 0x9, 0x1a1f00000000, 0xffffffffffffffff, 0x9}) clock_adjtime(0x6, &(0x7f00000008c0)={0x4, 0x9, 0x3, 0xfffffffffffffff7, 0xb31, 0x1, 0x1, 0x2, 0x538, 0x0, 0x401, 0x1, 0xdd, 0xfffffffffffffff7, 0xec54, 0x4, 0x100000001, 0x0, 0xa, 0x1, 0x7ff, 0xcd, 0xf2, 0x80, 0x7, 0x8000}) clock_adjtime(0x0, &(0x7f00000009c0)={0x8, 0xff, 0x81, 0x2, 0x100000001, 0x11, 0x5, 0x1, 0x1, 0x9, 0x1000, 0x8, 0xdf6c, 0x9, 0x8, 0x1004000000000000, 0x1ff, 0x3, 0x6, 0xf5, 0x80000, 0x1, 0xfffffffffffffd6d, 0x2, 0x6, 0xfa}) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000ac0)={'wlan0\x00'}) mq_timedreceive(0xffffffffffffffff, &(0x7f0000000b00)=""/4096, 0x1000, 0x80, &(0x7f0000001b00)={0x0, 0x989680}) r2 = creat(&(0x7f0000001b40)='./file0\x00', 0x1) mknodat(r2, &(0x7f0000001b80)='./file1\x00', 0x4, 0x0) clock_adjtime(0x0, &(0x7f0000001bc0)={0xfff, 0x7fff, 0x7, 0x2, 0xfdc, 0x54, 0x8fa, 0x3f41, 0x0, 0x4, 0x4, 0x5, 0x101, 0x5, 0x4, 0x9, 0x9, 0x30e, 0x3f, 0x2, 0x7f, 0x7, 0x6, 0x4, 0x3ff, 0x100000000}) clock_adjtime(0x2, &(0x7f0000001cc0)={0x0, 0x6, 0x7, 0xe5, 0x5, 0x6, 0x10, 0x7, 0x281, 0x40, 0x1, 0x5, 0x1, 0x10001, 0x5, 0x100, 0x0, 0x4, 0xffffffffffffe001, 0xdf, 0x7f, 0x8000, 0x9, 0x400, 0xfffffffffffffe00, 0x3f}) 17:03:25 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc01000a, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000011", 0x9, 0x4e0}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="0200000012000000", 0x8, 0x800}, {&(0x7f0000003980)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d0f465001000005fd0f4655f00000000000001000c000000100008", 0x23, 0x11100}], 0x0, &(0x7f00000000c0)) 17:03:25 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc01000a, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005", 0x7, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000003980)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d0f465001000005fd0f4655f00000000000001000c00000010000800000000000af3010004", 0x2d, 0x11100}], 0x0, &(0x7f00000000c0)) 17:03:25 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc01000a, 0x6, &(0x7f0000000200)=[{&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000003980)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d0f465001000005fd0f4655f00000000000001", 0x1b, 0x11100}], 0x0, &(0x7f00000000c0)) [ 305.349960][T18378] loop1: detected capacity change from 0 to 264192 [ 305.357636][T18378] EXT4-fs warning (device loop1): read_mmp_block:107: Error -117 while reading MMP block 0 [ 305.360696][T18372] EXT4-fs warning (device loop5): read_mmp_block:107: Error -117 while reading MMP block 0 [ 305.378286][T18377] SELinux: duplicate or incompatible mount options 17:03:25 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc01000a, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="0100000000", 0x5, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000003980)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="80", 0x1, 0x11100}], 0x0, &(0x7f00000000c0)) [ 305.400449][T18380] loop4: detected capacity change from 0 to 264192 [ 305.412770][T18382] loop3: detected capacity change from 0 to 264192 [ 305.438429][T18382] EXT4-fs (loop3): ext4_check_descriptors: Inode table for group 0 overlaps superblock 17:03:25 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc01000a, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="0100000000", 0x5, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000003980)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="80", 0x1, 0x11100}], 0x0, &(0x7f00000000c0)) 17:03:25 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc01000a, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000011", 0x9, 0x4e0}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="0200000012000000", 0x8, 0x800}, {&(0x7f0000003980)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d0f465001000005fd0f4655f00000000000001000c000000100008", 0x23, 0x11100}], 0x0, &(0x7f00000000c0)) [ 305.448179][T18382] EXT4-fs (loop3): group descriptors corrupted! [ 305.457146][T18380] EXT4-fs warning (device loop4): read_mmp_block:107: Error -117 while reading MMP block 0 17:03:29 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc01000a, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005", 0x7, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000003980)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d0f465001000005fd0f4655f00000000000001000c00000010000800000000000af3010004", 0x2d, 0x11100}], 0x0, &(0x7f00000000c0)) [ 305.496140][T18387] loop1: detected capacity change from 0 to 264192 [ 305.508666][T18391] loop5: detected capacity change from 0 to 264192 [ 305.522020][T18387] EXT4-fs (loop1): VFS: Can't find ext4 filesystem [ 305.533297][T18393] SELinux: duplicate or incompatible mount options 17:03:29 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc01000a, 0x6, &(0x7f0000000200)=[{&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000003980)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d0f465001000005fd0f4655f00000000000001", 0x1b, 0x11100}], 0x0, &(0x7f00000000c0)) [ 305.542885][T18395] loop3: detected capacity change from 0 to 264192 [ 305.553521][T18397] loop4: detected capacity change from 0 to 264192 [ 305.561274][T18391] EXT4-fs warning (device loop5): read_mmp_block:107: Error -117 while reading MMP block 0 [ 305.572355][T18395] EXT4-fs (loop3): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 305.582590][T18395] EXT4-fs (loop3): group descriptors corrupted! 17:03:33 executing program 2: clock_adjtime(0x7, &(0x7f0000000000)={0x8000, 0x62, 0xff, 0x1, 0x3, 0x1ff, 0x3ff, 0x4, 0xff, 0x20, 0x6, 0x401, 0x20, 0x0, 0x1ff, 0x8000, 0xfffffffffffffffd, 0x400, 0x8, 0x100000000, 0x2, 0x8, 0xf32, 0x4, 0x6, 0x80}) clock_adjtime(0x2, &(0x7f0000000100)={0xd9, 0x9, 0x1, 0x2, 0x1f, 0x78, 0x4b1, 0x0, 0x401, 0x5, 0x8, 0x1, 0x101, 0x100000001, 0x7, 0x1fc, 0x9, 0x9, 0x0, 0x9, 0x8, 0x3, 0xff, 0x7, 0x73, 0x946c}) clock_adjtime(0x6, &(0x7f0000000200)={0x4, 0x1, 0x100, 0x6, 0x2, 0x6, 0x1, 0x1dd, 0x9, 0x1000000000000000, 0x0, 0x6, 0x1, 0x1, 0x9, 0x5, 0x3023, 0x2, 0x4, 0xfffffffffffffff9, 0x429, 0x3, 0x0, 0x9, 0xffffffffffffff05, 0x1000}) clock_adjtime(0x3, &(0x7f0000000300)={0x0, 0x8, 0x9, 0x9, 0x9, 0x9, 0x6, 0x9, 0x8, 0x1, 0xd0fc, 0x55, 0x2, 0x0, 0x1, 0x1f, 0x100000001, 0x8f44, 0x53, 0x0, 0x3, 0x140000000000, 0x9, 0x8000, 0x0, 0x10001}) r0 = syz_mount_image$iso9660(&(0x7f0000000400), &(0x7f0000000440)='./file0\x00', 0x4, 0x1, &(0x7f0000000480)=[{0xfffffffffffffffe, 0x0, 0x3}], 0x2014400, &(0x7f00000004c0)={[{@check_relaxed}, {@dmode}, {@check_relaxed}], [{@euid_lt={'euid<', 0xee01}}, {@euid_eq}, {@rootcontext={'rootcontext', 0x3d, 'staff_u'}}, {@obj_user={'obj_user', 0x3d, '#-_'}}, {@rootcontext={'rootcontext', 0x3d, 'staff_u'}}]}) faccessat(r0, &(0x7f0000000580)='./file0\x00', 0x88) clock_adjtime(0x4, &(0x7f00000005c0)={0x80000000, 0x100000000, 0xba, 0x80000000, 0x4, 0x20d4e190, 0x7, 0x400, 0x33, 0x7a, 0x1, 0x465d, 0x7f, 0x5, 0x3, 0x1, 0x0, 0x8, 0x7, 0x7ff, 0x1, 0x4, 0x3f, 0x7fff, 0x700b, 0x96}) r1 = accept$unix(0xffffffffffffffff, 0x0, &(0x7f00000006c0)) getsockname$unix(r1, &(0x7f0000000700), &(0x7f0000000780)=0x6e) clock_adjtime(0x3, &(0x7f00000007c0)={0x6, 0x6, 0x7, 0x8000, 0x7ff, 0x5c, 0x401, 0x2, 0x9, 0x4, 0x0, 0x61, 0x2, 0x9b71, 0x100000000, 0x7fffffff, 0x322, 0xc70d, 0x9, 0xd, 0x9, 0x0, 0x9, 0x1a1f00000000, 0xffffffffffffffff, 0x9}) clock_adjtime(0x6, &(0x7f00000008c0)={0x4, 0x9, 0x3, 0xfffffffffffffff7, 0xb31, 0x1, 0x1, 0x2, 0x538, 0x0, 0x401, 0x1, 0xdd, 0xfffffffffffffff7, 0xec54, 0x4, 0x100000001, 0x0, 0xa, 0x1, 0x7ff, 0xcd, 0xf2, 0x80, 0x7, 0x8000}) clock_adjtime(0x0, &(0x7f00000009c0)={0x8, 0xff, 0x81, 0x2, 0x100000001, 0x11, 0x5, 0x1, 0x1, 0x9, 0x1000, 0x8, 0xdf6c, 0x9, 0x8, 0x1004000000000000, 0x1ff, 0x3, 0x6, 0xf5, 0x80000, 0x1, 0xfffffffffffffd6d, 0x2, 0x6, 0xfa}) r2 = socket$unix(0x1, 0x5, 0x0) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f0000000ac0)={'wlan0\x00'}) mq_timedreceive(0xffffffffffffffff, &(0x7f0000000b00)=""/4096, 0x1000, 0x80, &(0x7f0000001b00)={0x0, 0x989680}) r3 = creat(&(0x7f0000001b40)='./file0\x00', 0x1) mknodat(r3, &(0x7f0000001b80)='./file1\x00', 0x4, 0x0) clock_adjtime(0x0, &(0x7f0000001bc0)={0xfff, 0x7fff, 0x0, 0x2, 0xfdc, 0x54, 0x8fa, 0x3f41, 0x0, 0x4, 0x4, 0x5, 0x101, 0x5, 0x4, 0x9, 0x9, 0x30e, 0x3f, 0x2, 0x7f, 0x7, 0x6, 0x4, 0x3ff, 0x100000000}) clock_adjtime(0x2, &(0x7f0000001cc0)={0x0, 0x6, 0x7, 0xe5, 0x5, 0x6, 0x10, 0x7, 0x281, 0x40, 0x1, 0x0, 0x1, 0x10001, 0x5, 0x100, 0x0, 0x4, 0xffffffffffffe001, 0xdf, 0x7f, 0x8000, 0x9, 0x400, 0xfffffffffffffe00, 0x3f}) 17:03:33 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc01000a, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000003980)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d9", 0x4, 0x6800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d0f465001000005fd0f4655f00000000000001000c00000010000800000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}], 0x0, &(0x7f00000000c0)) (fail_nth: 1) 17:03:33 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc01000a, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005", 0x7, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000003980)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="80", 0x1, 0x11100}], 0x0, &(0x7f00000000c0)) [ 305.616584][T18397] EXT4-fs warning (device loop4): read_mmp_block:107: Error -117 while reading MMP block 0 [ 305.637258][T18399] loop1: detected capacity change from 0 to 264192 [ 305.647663][T18403] FAULT_INJECTION: forcing a failure. [ 305.647663][T18403] name failslab, interval 1, probability 0, space 0, times 1 [ 305.660529][T18403] CPU: 0 PID: 18403 Comm: syz-executor.0 Not tainted 5.16.0-syzkaller #0 [ 305.668948][T18403] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 305.679001][T18403] Call Trace: [ 305.682280][T18403] [ 305.685331][T18403] dump_stack_lvl+0xd6/0x122 [ 305.690053][T18403] dump_stack+0x11/0x1b [ 305.694219][T18403] should_fail+0x23c/0x250 [ 305.698639][T18403] ? __se_sys_memfd_create+0xe9/0x350 [ 305.701759][T18406] SELinux: duplicate or incompatible mount options [ 305.704061][T18403] __should_failslab+0x81/0x90 [ 305.715874][T18403] should_failslab+0x5/0x20 [ 305.720489][T18403] __kmalloc+0x6f/0x370 [ 305.721546][T18399] EXT4-fs (loop1): VFS: Can't find ext4 filesystem [ 305.724705][T18403] ? strnlen_user+0x137/0x1c0 [ 305.735861][T18403] __se_sys_memfd_create+0xe9/0x350 [ 305.741592][T18403] __x64_sys_memfd_create+0x2d/0x40 [ 305.746812][T18403] do_syscall_64+0x44/0xd0 [ 305.751357][T18403] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 305.757257][T18403] RIP: 0033:0x7f1cb8affe99 [ 305.761679][T18403] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 305.781582][T18403] RSP: 002b:00007f1cb7c75f28 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 305.790071][T18403] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007f1cb8affe99 [ 305.798137][T18403] RDX: 0000000000022200 RSI: 0000000000000000 RDI: 00007f1cb8b59168 [ 305.806115][T18403] RBP: 0000000000000008 R08: 0000000000011100 R09: 00007f1cb7c761d0 17:03:38 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc01000a, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000011", 0x9, 0x4e0}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="0200000012000000", 0x8, 0x800}, {&(0x7f0000003980)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d0f465001000005fd0f4655f00000000000001000c000000100008", 0x23, 0x11100}], 0x0, &(0x7f00000000c0)) 17:03:38 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc01000a, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005", 0x7, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000003980)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="80", 0x1, 0x11100}], 0x0, &(0x7f00000000c0)) 17:03:38 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc01000a, 0x6, &(0x7f0000000200)=[{&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000003980)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d0f465001000005fd0f4655f00000000000001", 0x1b, 0x11100}], 0x0, &(0x7f00000000c0)) 17:03:38 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc01000a, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000003980)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d9", 0x4, 0x6800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d0f465001000005fd0f4655f00000000000001000c00000010000800000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}], 0x0, &(0x7f00000000c0)) (fail_nth: 2) [ 305.814085][T18403] R10: 0000000000000008 R11: 0000000000000246 R12: 0000000008100000 [ 305.822170][T18403] R13: 0000000020000100 R14: 0000000008100000 R15: 00000000200000c0 [ 305.830162][T18403] [ 305.847883][T18411] FAULT_INJECTION: forcing a failure. [ 305.847883][T18411] name fail_usercopy, interval 1, probability 0, space 0, times 1 [ 305.861251][T18411] CPU: 0 PID: 18411 Comm: syz-executor.0 Not tainted 5.16.0-syzkaller #0 [ 305.869821][T18411] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 305.879935][T18411] Call Trace: [ 305.883245][T18411] [ 305.886179][T18411] dump_stack_lvl+0xd6/0x122 [ 305.890765][T18411] dump_stack+0x11/0x1b [ 305.894976][T18411] should_fail+0x23c/0x250 [ 305.899382][T18411] should_fail_usercopy+0x16/0x20 [ 305.904422][T18411] _copy_from_user+0x1c/0xd0 [ 305.909003][T18411] __se_sys_memfd_create+0x125/0x350 [ 305.914303][T18411] __x64_sys_memfd_create+0x2d/0x40 [ 305.919675][T18411] do_syscall_64+0x44/0xd0 [ 305.924101][T18411] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 305.930035][T18411] RIP: 0033:0x7f1cb8affe99 [ 305.934451][T18411] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 305.954358][T18411] RSP: 002b:00007f1cb7c75f28 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 305.962862][T18411] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007f1cb8affe99 [ 305.971416][T18411] RDX: 0000000000022200 RSI: 0000000000000000 RDI: 00007f1cb8b59168 [ 305.979384][T18411] RBP: 0000000000000008 R08: 0000000000011100 R09: 00007f1cb7c761d0 [ 305.987442][T18411] R10: 0000000000000008 R11: 0000000000000246 R12: 0000000008100000 [ 305.995416][T18411] R13: 0000000020000100 R14: 0000000008100000 R15: 00000000200000c0 [ 306.003377][T18411] 17:03:38 executing program 2: clock_adjtime(0x7, &(0x7f0000000000)={0x8000, 0x62, 0xff, 0x1, 0x3, 0x1ff, 0x3ff, 0x4, 0xff, 0x20, 0x6, 0x401, 0x20, 0x0, 0x1ff, 0x8000, 0xfffffffffffffffd, 0x400, 0x8, 0x100000000, 0x2, 0x8, 0xf32, 0x4, 0x6, 0x80}) clock_adjtime(0x2, &(0x7f0000000100)={0xd9, 0x9, 0x1, 0x2, 0x1f, 0x78, 0x4b1, 0x0, 0x401, 0x5, 0x8, 0x1, 0x101, 0x100000001, 0x7, 0x1fc, 0x9, 0x9, 0x0, 0x9, 0x8, 0x3, 0xff, 0x7, 0x73, 0x946c}) clock_adjtime(0x6, &(0x7f0000000200)={0x4, 0x1, 0x100, 0x6, 0x2, 0x6, 0x1, 0x1dd, 0x9, 0x1000000000000000, 0x0, 0x6, 0x1, 0x1, 0x9, 0x5, 0x3023, 0x2, 0x4, 0xfffffffffffffff9, 0x429, 0x3, 0x0, 0x9, 0xffffffffffffff05, 0x1000}) clock_adjtime(0x3, &(0x7f0000000300)={0x0, 0x8, 0x9, 0x9, 0x9, 0x9, 0x6, 0x9, 0x8, 0x1, 0xd0fc, 0x55, 0x2, 0x0, 0x1, 0x1f, 0x100000001, 0x8f44, 0x53, 0x0, 0x3, 0x140000000000, 0x9, 0x8000, 0x0, 0x10001}) r0 = syz_mount_image$iso9660(&(0x7f0000000400), &(0x7f0000000440)='./file0\x00', 0x4, 0x1, &(0x7f0000000480)=[{0xfffffffffffffffe, 0x0, 0x3}], 0x2014400, &(0x7f00000004c0)={[{@check_relaxed}, {@dmode}, {@check_relaxed}], [{@euid_lt={'euid<', 0xee01}}, {@euid_eq}, {@rootcontext={'rootcontext', 0x3d, 'staff_u'}}, {@obj_user={'obj_user', 0x3d, '#-_'}}, {@rootcontext={'rootcontext', 0x3d, 'staff_u'}}]}) faccessat(r0, &(0x7f0000000580)='./file0\x00', 0x88) clock_adjtime(0x4, &(0x7f00000005c0)={0x80000000, 0x100000000, 0xba, 0x80000000, 0x4, 0x20d4e190, 0x7, 0x400, 0x33, 0x7a, 0x1, 0x465d, 0x7f, 0x5, 0x3, 0x1, 0x0, 0x8, 0x7, 0x7ff, 0x1, 0x4, 0x3f, 0x7fff, 0x700b, 0x96}) r1 = accept$unix(0xffffffffffffffff, 0x0, &(0x7f00000006c0)) getsockname$unix(r1, &(0x7f0000000700), &(0x7f0000000780)=0x6e) clock_adjtime(0x3, &(0x7f00000007c0)={0x6, 0x6, 0x7, 0x8000, 0x7ff, 0x5c, 0x401, 0x2, 0x9, 0x4, 0x0, 0x61, 0x2, 0x9b71, 0x100000000, 0x7fffffff, 0x322, 0xc70d, 0x9, 0xd, 0x9, 0x0, 0x9, 0x1a1f00000000, 0xffffffffffffffff, 0x9}) clock_adjtime(0x6, &(0x7f00000008c0)={0x4, 0x9, 0x3, 0xfffffffffffffff7, 0xb31, 0x1, 0x1, 0x2, 0x538, 0x0, 0x401, 0x1, 0xdd, 0xfffffffffffffff7, 0xec54, 0x4, 0x100000001, 0x0, 0xa, 0x1, 0x7ff, 0xcd, 0xf2, 0x80, 0x7, 0x8000}) clock_adjtime(0x0, &(0x7f00000009c0)={0x8, 0xff, 0x81, 0x2, 0x100000001, 0x11, 0x5, 0x1, 0x1, 0x9, 0x1000, 0x8, 0xdf6c, 0x9, 0x8, 0x1004000000000000, 0x1ff, 0x3, 0x6, 0xf5, 0x80000, 0x1, 0xfffffffffffffd6d, 0x2, 0x6, 0xfa}) r2 = socket$unix(0x1, 0x5, 0x0) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f0000000ac0)={'wlan0\x00'}) mq_timedreceive(0xffffffffffffffff, &(0x7f0000000b00)=""/4096, 0x1000, 0x80, &(0x7f0000001b00)={0x0, 0x989680}) r3 = creat(&(0x7f0000001b40)='./file0\x00', 0x1) mknodat(r3, &(0x7f0000001b80)='./file1\x00', 0x4, 0x0) clock_adjtime(0x0, &(0x7f0000001bc0)={0xfff, 0x7fff, 0x0, 0x2, 0xfdc, 0x54, 0x8fa, 0x3f41, 0x0, 0x4, 0x4, 0x5, 0x101, 0x5, 0x4, 0x9, 0x9, 0x30e, 0x3f, 0x2, 0x7f, 0x7, 0x6, 0x4, 0x3ff, 0x100000000}) clock_adjtime(0x2, &(0x7f0000001cc0)={0x0, 0x6, 0x7, 0xe5, 0x5, 0x6, 0x10, 0x7, 0x281, 0x40, 0x1, 0x0, 0x0, 0x10001, 0x5, 0x100, 0x0, 0x4, 0xffffffffffffe001, 0xdf, 0x7f, 0x8000, 0x9, 0x400, 0xfffffffffffffe00, 0x3f}) 17:03:38 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc01000a, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000003980)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d9", 0x4, 0x6800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d0f465001000005fd0f4655f00000000000001000c00000010000800000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}], 0x0, &(0x7f00000000c0)) (fail_nth: 3) [ 306.025811][T18415] loop1: detected capacity change from 0 to 264192 [ 306.029483][T18416] loop5: detected capacity change from 0 to 264192 [ 306.037566][T18417] loop3: detected capacity change from 0 to 264192 [ 306.045825][T18416] EXT4-fs warning (device loop5): read_mmp_block:107: Error -117 while reading MMP block 0 [ 306.074708][T18415] EXT4-fs (loop1): VFS: Can't find ext4 filesystem [ 306.083582][T18421] FAULT_INJECTION: forcing a failure. [ 306.083582][T18421] name failslab, interval 1, probability 0, space 0, times 0 [ 306.093507][T18419] SELinux: duplicate or incompatible mount options [ 306.096345][T18421] CPU: 0 PID: 18421 Comm: syz-executor.0 Not tainted 5.16.0-syzkaller #0 [ 306.111232][T18421] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 306.121357][T18421] Call Trace: 17:03:38 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc01000a, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005", 0x7, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000003980)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="80", 0x1, 0x11100}], 0x0, &(0x7f00000000c0)) [ 306.124636][T18421] [ 306.127633][T18421] dump_stack_lvl+0xd6/0x122 [ 306.132235][T18421] dump_stack+0x11/0x1b [ 306.136407][T18421] should_fail+0x23c/0x250 [ 306.140832][T18421] ? shmem_alloc_inode+0x22/0x30 [ 306.145828][T18421] __should_failslab+0x81/0x90 [ 306.150710][T18421] ? shmem_match+0xa0/0xa0 [ 306.155127][T18421] should_failslab+0x5/0x20 [ 306.159648][T18421] kmem_cache_alloc+0x4f/0x320 [ 306.164583][T18421] ? shmem_match+0xa0/0xa0 [ 306.169026][T18421] shmem_alloc_inode+0x22/0x30 [ 306.173790][T18421] new_inode_pseudo+0x38/0x190 [ 306.178615][T18421] new_inode+0x21/0x100 [ 306.182774][T18421] shmem_get_inode+0xb7/0x490 [ 306.187457][T18421] __shmem_file_setup+0xf1/0x1d0 [ 306.192561][T18421] shmem_file_setup+0x37/0x40 [ 306.197227][T18421] __se_sys_memfd_create+0x1c1/0x350 [ 306.202520][T18421] __x64_sys_memfd_create+0x2d/0x40 [ 306.207793][T18421] do_syscall_64+0x44/0xd0 [ 306.212201][T18421] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 306.218111][T18421] RIP: 0033:0x7f1cb8affe99 [ 306.222598][T18421] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 306.242319][T18421] RSP: 002b:00007f1cb7c75f28 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 306.250740][T18421] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007f1cb8affe99 [ 306.258786][T18421] RDX: 0000000000022200 RSI: 0000000000000000 RDI: 00007f1cb8b59168 [ 306.266743][T18421] RBP: 0000000000000008 R08: 0000000000011100 R09: 00007f1cb7c761d0 17:03:42 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc01000a, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005", 0x7, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000003980)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d0f465001000005fd0f4655f00000000000001000c00000010000800000000000af3010004", 0x2d, 0x11100}], 0x0, &(0x7f00000000c0)) 17:03:42 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc01000a, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="0100000000000500", 0x8, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000003980)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="80", 0x1, 0x11100}], 0x0, &(0x7f00000000c0)) 17:03:42 executing program 2: clock_adjtime(0x7, &(0x7f0000000000)={0x8000, 0x62, 0xff, 0x1, 0x3, 0x1ff, 0x3ff, 0x4, 0xff, 0x20, 0x6, 0x401, 0x20, 0x0, 0x1ff, 0x8000, 0xfffffffffffffffd, 0x400, 0x8, 0x100000000, 0x2, 0x8, 0xf32, 0x4, 0x6, 0x80}) clock_adjtime(0x2, &(0x7f0000000100)={0xd9, 0x9, 0x1, 0x2, 0x1f, 0x78, 0x4b1, 0x0, 0x401, 0x5, 0x8, 0x1, 0x101, 0x100000001, 0x7, 0x1fc, 0x9, 0x9, 0x0, 0x9, 0x8, 0x3, 0xff, 0x7, 0x73, 0x946c}) clock_adjtime(0x6, &(0x7f0000000200)={0x4, 0x1, 0x100, 0x6, 0x2, 0x6, 0x1, 0x1dd, 0x9, 0x1000000000000000, 0x0, 0x6, 0x1, 0x1, 0x9, 0x5, 0x3023, 0x2, 0x4, 0xfffffffffffffff9, 0x429, 0x3, 0x0, 0x9, 0xffffffffffffff05, 0x1000}) clock_adjtime(0x3, &(0x7f0000000300)={0x0, 0x8, 0x9, 0x9, 0x9, 0x9, 0x6, 0x9, 0x8, 0x1, 0xd0fc, 0x55, 0x2, 0x0, 0x1, 0x1f, 0x100000001, 0x8f44, 0x53, 0x0, 0x3, 0x140000000000, 0x9, 0x8000, 0x0, 0x10001}) r0 = syz_mount_image$iso9660(&(0x7f0000000400), &(0x7f0000000440)='./file0\x00', 0x4, 0x1, &(0x7f0000000480)=[{0xfffffffffffffffe, 0x0, 0x3}], 0x2014400, &(0x7f00000004c0)={[{@check_relaxed}, {@dmode}, {@check_relaxed}], [{@euid_lt={'euid<', 0xee01}}, {@euid_eq}, {@rootcontext={'rootcontext', 0x3d, 'staff_u'}}, {@obj_user={'obj_user', 0x3d, '#-_'}}, {@rootcontext={'rootcontext', 0x3d, 'staff_u'}}]}) faccessat(r0, &(0x7f0000000580)='./file0\x00', 0x88) clock_adjtime(0x4, &(0x7f00000005c0)={0x80000000, 0x100000000, 0xba, 0x80000000, 0x4, 0x20d4e190, 0x7, 0x400, 0x33, 0x7a, 0x1, 0x465d, 0x7f, 0x5, 0x3, 0x1, 0x0, 0x8, 0x7, 0x7ff, 0x1, 0x4, 0x3f, 0x7fff, 0x700b, 0x96}) r1 = accept$unix(0xffffffffffffffff, 0x0, &(0x7f00000006c0)) getsockname$unix(r1, &(0x7f0000000700), &(0x7f0000000780)=0x6e) clock_adjtime(0x3, &(0x7f00000007c0)={0x6, 0x6, 0x7, 0x8000, 0x7ff, 0x5c, 0x401, 0x2, 0x9, 0x4, 0x0, 0x61, 0x2, 0x9b71, 0x100000000, 0x7fffffff, 0x322, 0xc70d, 0x9, 0xd, 0x9, 0x0, 0x9, 0x1a1f00000000, 0xffffffffffffffff, 0x9}) clock_adjtime(0x6, &(0x7f00000008c0)={0x4, 0x9, 0x3, 0xfffffffffffffff7, 0xb31, 0x1, 0x1, 0x2, 0x538, 0x0, 0x401, 0x1, 0xdd, 0xfffffffffffffff7, 0xec54, 0x4, 0x100000001, 0x0, 0xa, 0x1, 0x7ff, 0xcd, 0xf2, 0x80, 0x7, 0x8000}) clock_adjtime(0x0, &(0x7f00000009c0)={0x8, 0xff, 0x81, 0x2, 0x100000001, 0x11, 0x5, 0x1, 0x1, 0x9, 0x1000, 0x8, 0xdf6c, 0x9, 0x8, 0x1004000000000000, 0x1ff, 0x3, 0x6, 0xf5, 0x80000, 0x1, 0xfffffffffffffd6d, 0x2, 0x6, 0xfa}) r2 = socket$unix(0x1, 0x5, 0x0) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f0000000ac0)={'wlan0\x00'}) mq_timedreceive(0xffffffffffffffff, &(0x7f0000000b00)=""/4096, 0x1000, 0x80, &(0x7f0000001b00)={0x0, 0x989680}) r3 = creat(&(0x7f0000001b40)='./file0\x00', 0x1) mknodat(r3, &(0x7f0000001b80)='./file1\x00', 0x4, 0x0) clock_adjtime(0x0, &(0x7f0000001bc0)={0xfff, 0x7fff, 0x0, 0x2, 0xfdc, 0x54, 0x8fa, 0x3f41, 0x0, 0x4, 0x4, 0x5, 0x101, 0x5, 0x4, 0x9, 0x9, 0x30e, 0x3f, 0x2, 0x7f, 0x7, 0x6, 0x4, 0x3ff, 0x100000000}) clock_adjtime(0x2, &(0x7f0000001cc0)={0x0, 0x6, 0x7, 0xe5, 0x5, 0x6, 0x10, 0x7, 0x281, 0x40, 0x1, 0x0, 0x0, 0x10001, 0x5, 0x100, 0x0, 0x4, 0xffffffffffffe001, 0xdf, 0x7f, 0x8000, 0x9, 0x400, 0xfffffffffffffe00, 0x3f}) [ 306.275028][T18421] R10: 0000000000000008 R11: 0000000000000246 R12: 0000000008100000 [ 306.283046][T18421] R13: 0000000020000100 R14: 0000000008100000 R15: 00000000200000c0 [ 306.291009][T18421] [ 306.303219][T18417] EXT4-fs (loop3): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 306.312954][T18417] EXT4-fs (loop3): group descriptors corrupted! 17:03:42 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc01000a, 0x7, &(0x7f0000000200)=[{0x0, 0x0, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000003980)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d0f465001000005fd0f4655f00000000000001", 0x1b, 0x11100}], 0x0, &(0x7f00000000c0)) 17:03:42 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc01000a, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000003980)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d9", 0x4, 0x6800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d0f465001000005fd0f4655f00000000000001000c00000010000800000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}], 0x0, &(0x7f00000000c0)) (fail_nth: 4) [ 306.368071][T18428] SELinux: duplicate or incompatible mount options [ 306.384002][T18430] loop4: detected capacity change from 0 to 264192 [ 306.391094][T18432] loop1: detected capacity change from 0 to 264192 [ 306.405912][T18435] loop5: detected capacity change from 0 to 264192 [ 306.419857][T18437] FAULT_INJECTION: forcing a failure. [ 306.419857][T18437] name failslab, interval 1, probability 0, space 0, times 0 [ 306.432510][T18437] CPU: 1 PID: 18437 Comm: syz-executor.0 Not tainted 5.16.0-syzkaller #0 [ 306.441092][T18437] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 306.451146][T18437] Call Trace: [ 306.454431][T18437] [ 306.457393][T18437] dump_stack_lvl+0xd6/0x122 [ 306.461978][T18437] dump_stack+0x11/0x1b [ 306.466303][T18437] should_fail+0x23c/0x250 [ 306.470770][T18437] ? security_inode_alloc+0x30/0x180 [ 306.476141][T18437] __should_failslab+0x81/0x90 [ 306.481010][T18437] should_failslab+0x5/0x20 [ 306.485702][T18437] kmem_cache_alloc+0x4f/0x320 [ 306.490466][T18437] security_inode_alloc+0x30/0x180 [ 306.495579][T18437] inode_init_always+0x214/0x3e0 [ 306.500603][T18437] ? shmem_match+0xa0/0xa0 [ 306.505110][T18437] new_inode_pseudo+0x6f/0x190 [ 306.509897][T18437] new_inode+0x21/0x100 [ 306.514087][T18437] shmem_get_inode+0xb7/0x490 [ 306.518858][T18437] __shmem_file_setup+0xf1/0x1d0 [ 306.523838][T18437] shmem_file_setup+0x37/0x40 [ 306.528514][T18437] __se_sys_memfd_create+0x1c1/0x350 [ 306.533792][T18437] __x64_sys_memfd_create+0x2d/0x40 [ 306.539053][T18437] do_syscall_64+0x44/0xd0 [ 306.543510][T18437] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 306.549471][T18437] RIP: 0033:0x7f1cb8affe99 [ 306.553874][T18437] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 306.578112][T18437] RSP: 002b:00007f1cb7c75f28 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 306.586539][T18437] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007f1cb8affe99 [ 306.594634][T18437] RDX: 0000000000022200 RSI: 0000000000000000 RDI: 00007f1cb8b59168 [ 306.602688][T18437] RBP: 0000000000000008 R08: 0000000000011100 R09: 00007f1cb7c761d0 [ 306.610825][T18437] R10: 0000000000000008 R11: 0000000000000246 R12: 0000000008100000 17:03:42 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc01000a, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000011", 0x9, 0x4e0}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9}, {&(0x7f0000003980)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d0f465001000005fd0f4655f00000000000001000c000000100008", 0x23, 0x11100}], 0x0, &(0x7f00000000c0)) 17:03:46 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc01000a, 0x7, &(0x7f0000000200)=[{0x0, 0x0, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000003980)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d0f465001000005fd0f4655f00000000000001", 0x1b, 0x11100}], 0x0, &(0x7f00000000c0)) [ 306.618839][T18437] R13: 0000000020000100 R14: 0000000008100000 R15: 00000000200000c0 [ 306.626877][T18437] [ 306.631056][T18432] EXT4-fs (loop1): VFS: Can't find ext4 filesystem [ 306.641556][T18439] loop3: detected capacity change from 0 to 264192 [ 306.646508][T18435] EXT4-fs warning (device loop5): read_mmp_block:107: Error -117 while reading MMP block 0 17:03:47 executing program 2: clock_adjtime(0x7, &(0x7f0000000000)={0x8000, 0x62, 0xff, 0x1, 0x3, 0x1ff, 0x3ff, 0x4, 0xff, 0x20, 0x6, 0x401, 0x20, 0x0, 0x1ff, 0x8000, 0xfffffffffffffffd, 0x400, 0x8, 0x100000000, 0x2, 0x8, 0xf32, 0x4, 0x6, 0x80}) clock_adjtime(0x2, &(0x7f0000000100)={0xd9, 0x9, 0x1, 0x2, 0x1f, 0x78, 0x4b1, 0x0, 0x401, 0x5, 0x8, 0x1, 0x101, 0x100000001, 0x7, 0x1fc, 0x9, 0x9, 0x0, 0x9, 0x8, 0x3, 0xff, 0x7, 0x73, 0x946c}) clock_adjtime(0x6, &(0x7f0000000200)={0x4, 0x1, 0x100, 0x6, 0x2, 0x6, 0x1, 0x1dd, 0x9, 0x1000000000000000, 0x0, 0x6, 0x1, 0x1, 0x9, 0x5, 0x3023, 0x2, 0x4, 0xfffffffffffffff9, 0x429, 0x3, 0x0, 0x9, 0xffffffffffffff05, 0x1000}) clock_adjtime(0x3, &(0x7f0000000300)={0x0, 0x8, 0x9, 0x9, 0x9, 0x9, 0x6, 0x9, 0x8, 0x1, 0xd0fc, 0x55, 0x2, 0x0, 0x1, 0x1f, 0x100000001, 0x8f44, 0x53, 0x0, 0x3, 0x140000000000, 0x9, 0x8000, 0x0, 0x10001}) r0 = syz_mount_image$iso9660(&(0x7f0000000400), &(0x7f0000000440)='./file0\x00', 0x4, 0x1, &(0x7f0000000480)=[{0xfffffffffffffffe, 0x0, 0x3}], 0x2014400, &(0x7f00000004c0)={[{@check_relaxed}, {@dmode}, {@check_relaxed}], [{@euid_lt={'euid<', 0xee01}}, {@euid_eq}, {@rootcontext={'rootcontext', 0x3d, 'staff_u'}}, {@obj_user={'obj_user', 0x3d, '#-_'}}, {@rootcontext={'rootcontext', 0x3d, 'staff_u'}}]}) faccessat(r0, &(0x7f0000000580)='./file0\x00', 0x88) clock_adjtime(0x4, &(0x7f00000005c0)={0x80000000, 0x100000000, 0xba, 0x80000000, 0x4, 0x20d4e190, 0x7, 0x400, 0x33, 0x7a, 0x1, 0x465d, 0x7f, 0x5, 0x3, 0x1, 0x0, 0x8, 0x7, 0x7ff, 0x1, 0x4, 0x3f, 0x7fff, 0x700b, 0x96}) r1 = accept$unix(0xffffffffffffffff, 0x0, &(0x7f00000006c0)) getsockname$unix(r1, &(0x7f0000000700), &(0x7f0000000780)=0x6e) clock_adjtime(0x3, &(0x7f00000007c0)={0x6, 0x6, 0x7, 0x8000, 0x7ff, 0x5c, 0x401, 0x2, 0x9, 0x4, 0x0, 0x61, 0x2, 0x9b71, 0x100000000, 0x7fffffff, 0x322, 0xc70d, 0x9, 0xd, 0x9, 0x0, 0x9, 0x1a1f00000000, 0xffffffffffffffff, 0x9}) clock_adjtime(0x6, &(0x7f00000008c0)={0x4, 0x9, 0x3, 0xfffffffffffffff7, 0xb31, 0x1, 0x1, 0x2, 0x538, 0x0, 0x401, 0x1, 0xdd, 0xfffffffffffffff7, 0xec54, 0x4, 0x100000001, 0x0, 0xa, 0x1, 0x7ff, 0xcd, 0xf2, 0x80, 0x7, 0x8000}) clock_adjtime(0x0, &(0x7f00000009c0)={0x8, 0xff, 0x81, 0x2, 0x100000001, 0x11, 0x5, 0x1, 0x1, 0x9, 0x1000, 0x8, 0xdf6c, 0x9, 0x8, 0x1004000000000000, 0x1ff, 0x3, 0x6, 0xf5, 0x80000, 0x1, 0xfffffffffffffd6d, 0x2, 0x6, 0xfa}) r2 = socket$unix(0x1, 0x5, 0x0) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f0000000ac0)={'wlan0\x00'}) mq_timedreceive(0xffffffffffffffff, &(0x7f0000000b00)=""/4096, 0x1000, 0x80, &(0x7f0000001b00)={0x0, 0x989680}) r3 = creat(&(0x7f0000001b40)='./file0\x00', 0x1) mknodat(r3, &(0x7f0000001b80)='./file1\x00', 0x4, 0x0) clock_adjtime(0x0, &(0x7f0000001bc0)={0xfff, 0x7fff, 0x0, 0x2, 0xfdc, 0x54, 0x8fa, 0x3f41, 0x0, 0x4, 0x4, 0x5, 0x101, 0x5, 0x4, 0x9, 0x9, 0x30e, 0x3f, 0x2, 0x7f, 0x7, 0x6, 0x4, 0x3ff, 0x100000000}) clock_adjtime(0x2, &(0x7f0000001cc0)={0x0, 0x6, 0x7, 0xe5, 0x5, 0x6, 0x10, 0x7, 0x281, 0x40, 0x1, 0x0, 0x0, 0x10001, 0x5, 0x100, 0x0, 0x4, 0xffffffffffffe001, 0xdf, 0x7f, 0x8000, 0x9, 0x400, 0xfffffffffffffe00, 0x3f}) [ 306.691627][T18439] EXT4-fs (loop3): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 306.701473][T18439] EXT4-fs (loop3): group descriptors corrupted! [ 306.727917][T18430] EXT4-fs warning (device loop4): read_mmp_block:107: Error -117 while reading MMP block 0 17:03:47 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc01000a, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="0100000000000500", 0x8, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000003980)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="80", 0x1, 0x11100}], 0x0, &(0x7f00000000c0)) 17:03:47 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc01000a, 0x7, &(0x7f0000000200)=[{0x0, 0x0, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000003980)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d0f465001000005fd0f4655f00000000000001", 0x1b, 0x11100}], 0x0, &(0x7f00000000c0)) 17:03:47 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc01000a, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000003980)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d9", 0x4, 0x6800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d0f465001000005fd0f4655f00000000000001000c00000010000800000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}], 0x0, &(0x7f00000000c0)) (fail_nth: 5) [ 306.731891][T18444] loop1: detected capacity change from 0 to 264192 [ 306.751265][T18445] SELinux: duplicate or incompatible mount options [ 306.760381][T18444] EXT4-fs (loop1): VFS: Can't find ext4 filesystem [ 306.793608][T18447] FAULT_INJECTION: forcing a failure. [ 306.793608][T18447] name failslab, interval 1, probability 0, space 0, times 0 [ 306.806251][T18447] CPU: 0 PID: 18447 Comm: syz-executor.0 Not tainted 5.16.0-syzkaller #0 [ 306.814723][T18447] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 306.824816][T18447] Call Trace: [ 306.828092][T18447] [ 306.831023][T18447] dump_stack_lvl+0xd6/0x122 [ 306.835626][T18447] dump_stack+0x11/0x1b [ 306.839815][T18447] should_fail+0x23c/0x250 [ 306.844243][T18447] ? __d_alloc+0x36/0x370 [ 306.848560][T18447] __should_failslab+0x81/0x90 [ 306.853426][T18447] should_failslab+0x5/0x20 [ 306.858029][T18447] kmem_cache_alloc+0x4f/0x320 [ 306.862841][T18447] ? security_inode_alloc+0x138/0x180 [ 306.868204][T18447] ? __init_rwsem+0x59/0x70 [ 306.872770][T18447] __d_alloc+0x36/0x370 [ 306.877027][T18447] ? debug_smp_processor_id+0x18/0x20 [ 306.882400][T18447] d_alloc_pseudo+0x1a/0x50 [ 306.886908][T18447] alloc_file_pseudo+0x77/0x150 [ 306.891805][T18447] __shmem_file_setup+0x14c/0x1d0 [ 306.896864][T18447] shmem_file_setup+0x37/0x40 [ 306.901583][T18447] __se_sys_memfd_create+0x1c1/0x350 [ 306.906922][T18447] __x64_sys_memfd_create+0x2d/0x40 [ 306.912579][T18447] do_syscall_64+0x44/0xd0 [ 306.917131][T18447] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 306.923053][T18447] RIP: 0033:0x7f1cb8affe99 [ 306.927463][T18447] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 306.947789][T18447] RSP: 002b:00007f1cb7c75f28 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 306.956242][T18447] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007f1cb8affe99 [ 306.964217][T18447] RDX: 0000000000022200 RSI: 0000000000000000 RDI: 00007f1cb8b59168 [ 306.972186][T18447] RBP: 0000000000000008 R08: 0000000000011100 R09: 00007f1cb7c761d0 [ 306.980231][T18447] R10: 0000000000000008 R11: 0000000000000246 R12: 0000000008100000 17:03:51 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc01000a, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000003980)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d9", 0x4, 0x6800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d0f465001000005fd0f4655f00000000000001000c00000010000800000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}], 0x0, &(0x7f00000000c0)) (fail_nth: 6) [ 306.988198][T18447] R13: 0000000020000100 R14: 0000000008100000 R15: 00000000200000c0 [ 306.996164][T18447] [ 307.008112][T18451] loop5: detected capacity change from 0 to 264192 [ 307.016647][T18453] loop1: detected capacity change from 0 to 264192 [ 307.041921][T18453] EXT4-fs (loop1): VFS: Can't find ext4 filesystem 17:03:51 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc01000a, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="0100000000000500", 0x8, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000003980)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d0f465001000005fd0f4655f00000000000001000c00000010000800000000000af3010004", 0x2d, 0x11100}], 0x0, &(0x7f00000000c0)) [ 307.065868][T18451] EXT4-fs warning (device loop5): read_mmp_block:107: Error -117 while reading MMP block 0 [ 307.075513][T18455] FAULT_INJECTION: forcing a failure. [ 307.075513][T18455] name failslab, interval 1, probability 0, space 0, times 0 [ 307.088590][T18455] CPU: 1 PID: 18455 Comm: syz-executor.0 Not tainted 5.16.0-syzkaller #0 [ 307.097138][T18455] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 307.107199][T18455] Call Trace: [ 307.110594][T18455] 17:03:51 executing program 2: clock_adjtime(0x7, &(0x7f0000000000)={0x8000, 0x62, 0xff, 0x1, 0x3, 0x1ff, 0x3ff, 0x4, 0xff, 0x20, 0x6, 0x401, 0x20, 0x0, 0x1ff, 0x8000, 0xfffffffffffffffd, 0x400, 0x8, 0x100000000, 0x2, 0x8, 0xf32, 0x4, 0x6, 0x80}) clock_adjtime(0x2, &(0x7f0000000100)={0xd9, 0x9, 0x1, 0x2, 0x1f, 0x78, 0x4b1, 0x0, 0x401, 0x5, 0x8, 0x1, 0x101, 0x100000001, 0x7, 0x1fc, 0x9, 0x9, 0x0, 0x9, 0x8, 0x3, 0xff, 0x7, 0x73, 0x946c}) clock_adjtime(0x6, &(0x7f0000000200)={0x4, 0x1, 0x100, 0x6, 0x2, 0x6, 0x1, 0x1dd, 0x9, 0x1000000000000000, 0x0, 0x6, 0x1, 0x1, 0x9, 0x5, 0x3023, 0x2, 0x4, 0xfffffffffffffff9, 0x429, 0x3, 0x0, 0x9, 0xffffffffffffff05, 0x1000}) clock_adjtime(0x3, &(0x7f0000000300)={0x0, 0x8, 0x9, 0x9, 0x9, 0x9, 0x6, 0x9, 0x8, 0x1, 0xd0fc, 0x55, 0x2, 0x0, 0x1, 0x1f, 0x100000001, 0x8f44, 0x53, 0x0, 0x3, 0x140000000000, 0x9, 0x8000, 0x0, 0x10001}) r0 = syz_mount_image$iso9660(&(0x7f0000000400), &(0x7f0000000440)='./file0\x00', 0x4, 0x1, &(0x7f0000000480)=[{0xfffffffffffffffe, 0x0, 0x3}], 0x2014400, &(0x7f00000004c0)={[{@check_relaxed}, {@dmode}, {@check_relaxed}], [{@euid_lt={'euid<', 0xee01}}, {@euid_eq}, {@rootcontext={'rootcontext', 0x3d, 'staff_u'}}, {@obj_user={'obj_user', 0x3d, '#-_'}}, {@rootcontext={'rootcontext', 0x3d, 'staff_u'}}]}) faccessat(r0, &(0x7f0000000580)='./file0\x00', 0x88) clock_adjtime(0x4, &(0x7f00000005c0)={0x80000000, 0x100000000, 0xba, 0x80000000, 0x4, 0x20d4e190, 0x7, 0x400, 0x33, 0x7a, 0x1, 0x465d, 0x7f, 0x5, 0x3, 0x1, 0x0, 0x8, 0x7, 0x7ff, 0x1, 0x4, 0x3f, 0x7fff, 0x700b, 0x96}) r1 = accept$unix(0xffffffffffffffff, 0x0, &(0x7f00000006c0)) getsockname$unix(r1, &(0x7f0000000700), &(0x7f0000000780)=0x6e) clock_adjtime(0x3, &(0x7f00000007c0)={0x6, 0x6, 0x7, 0x8000, 0x7ff, 0x5c, 0x401, 0x2, 0x9, 0x4, 0x0, 0x61, 0x2, 0x9b71, 0x100000000, 0x7fffffff, 0x322, 0xc70d, 0x9, 0xd, 0x9, 0x0, 0x9, 0x1a1f00000000, 0xffffffffffffffff, 0x9}) clock_adjtime(0x6, &(0x7f00000008c0)={0x4, 0x9, 0x3, 0xfffffffffffffff7, 0xb31, 0x1, 0x1, 0x2, 0x538, 0x0, 0x401, 0x1, 0xdd, 0xfffffffffffffff7, 0xec54, 0x4, 0x100000001, 0x0, 0xa, 0x1, 0x7ff, 0xcd, 0xf2, 0x80, 0x7, 0x8000}) clock_adjtime(0x0, &(0x7f00000009c0)={0x8, 0xff, 0x81, 0x2, 0x100000001, 0x11, 0x5, 0x1, 0x1, 0x9, 0x1000, 0x8, 0xdf6c, 0x9, 0x8, 0x1004000000000000, 0x1ff, 0x3, 0x6, 0xf5, 0x80000, 0x1, 0xfffffffffffffd6d, 0x2, 0x6, 0xfa}) r2 = socket$unix(0x1, 0x5, 0x0) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f0000000ac0)={'wlan0\x00'}) mq_timedreceive(0xffffffffffffffff, &(0x7f0000000b00)=""/4096, 0x1000, 0x80, &(0x7f0000001b00)={0x0, 0x989680}) r3 = creat(&(0x7f0000001b40)='./file0\x00', 0x1) mknodat(r3, &(0x7f0000001b80)='./file1\x00', 0x4, 0x0) clock_adjtime(0x0, &(0x7f0000001bc0)={0xfff, 0x7fff, 0x0, 0x2, 0xfdc, 0x54, 0x8fa, 0x3f41, 0x0, 0x4, 0x4, 0x5, 0x101, 0x5, 0x4, 0x9, 0x9, 0x30e, 0x3f, 0x2, 0x7f, 0x7, 0x6, 0x4, 0x3ff, 0x100000000}) clock_adjtime(0x2, &(0x7f0000001cc0)={0x0, 0x6, 0x7, 0xe5, 0x5, 0x6, 0x10, 0x7, 0x281, 0x40, 0x1, 0x0, 0x1, 0x0, 0x5, 0x100, 0x0, 0x4, 0xffffffffffffe001, 0xdf, 0x7f, 0x8000, 0x9, 0x400, 0xfffffffffffffe00, 0x3f}) 17:03:51 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc01000a, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000011", 0x9, 0x4e0}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9}, {&(0x7f0000003980)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d0f465001000005fd0f4655f00000000000001000c000000100008", 0x23, 0x11100}], 0x0, &(0x7f00000000c0)) [ 307.113562][T18455] dump_stack_lvl+0xd6/0x122 [ 307.118168][T18455] dump_stack+0x11/0x1b [ 307.122343][T18455] should_fail+0x23c/0x250 [ 307.126771][T18455] ? __alloc_file+0x2e/0x1a0 [ 307.131402][T18455] __should_failslab+0x81/0x90 [ 307.136221][T18455] should_failslab+0x5/0x20 [ 307.140742][T18455] kmem_cache_alloc+0x4f/0x320 [ 307.145686][T18455] __alloc_file+0x2e/0x1a0 [ 307.150120][T18455] alloc_empty_file+0xcd/0x1c0 [ 307.154902][T18455] alloc_file+0x3a/0x280 [ 307.159156][T18455] alloc_file_pseudo+0xfa/0x150 [ 307.164022][T18455] __shmem_file_setup+0x14c/0x1d0 [ 307.169063][T18455] shmem_file_setup+0x37/0x40 [ 307.173753][T18455] __se_sys_memfd_create+0x1c1/0x350 [ 307.174088][T18461] SELinux: duplicate or incompatible mount options [ 307.179051][T18455] __x64_sys_memfd_create+0x2d/0x40 [ 307.179121][T18455] do_syscall_64+0x44/0xd0 [ 307.187254][T18458] loop4: detected capacity change from 0 to 264192 [ 307.190898][T18455] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 307.190964][T18455] RIP: 0033:0x7f1cb8affe99 [ 307.212290][T18455] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 307.231939][T18455] RSP: 002b:00007f1cb7c75f28 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 307.240414][T18455] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007f1cb8affe99 [ 307.248405][T18455] RDX: 0000000000022200 RSI: 0000000000000000 RDI: 00007f1cb8b59168 [ 307.256367][T18455] RBP: 0000000000000008 R08: 0000000000011100 R09: 00007f1cb7c761d0 17:03:51 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc01000a, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000003980)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d9", 0x4, 0x6800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d0f465001000005fd0f4655f00000000000001000c00000010000800000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}], 0x0, &(0x7f00000000c0)) (fail_nth: 7) [ 307.264387][T18455] R10: 0000000000000008 R11: 0000000000000246 R12: 0000000008100000 [ 307.272410][T18455] R13: 0000000020000100 R14: 0000000008100000 R15: 00000000200000c0 [ 307.280388][T18455] [ 307.288763][T18464] loop3: detected capacity change from 0 to 264192 [ 307.313579][T18458] EXT4-fs warning (device loop4): read_mmp_block:107: Error -117 while reading MMP block 0 [ 307.351757][T18467] FAULT_INJECTION: forcing a failure. [ 307.351757][T18467] name failslab, interval 1, probability 0, space 0, times 0 17:03:55 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc01000a, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000), 0x0, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000003980)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d0f465001000005fd0f4655f00000000000001", 0x1b, 0x11100}], 0x0, &(0x7f00000000c0)) 17:03:55 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc01000a, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="0100000000000500", 0x8, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000003980)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="80", 0x1, 0x11100}], 0x0, &(0x7f00000000c0)) 17:03:55 executing program 2: clock_adjtime(0x7, &(0x7f0000000000)={0x8000, 0x62, 0xff, 0x1, 0x3, 0x1ff, 0x3ff, 0x4, 0xff, 0x20, 0x6, 0x401, 0x20, 0x0, 0x1ff, 0x8000, 0xfffffffffffffffd, 0x400, 0x8, 0x100000000, 0x2, 0x8, 0xf32, 0x4, 0x6, 0x80}) clock_adjtime(0x2, &(0x7f0000000100)={0xd9, 0x9, 0x1, 0x2, 0x1f, 0x78, 0x4b1, 0x0, 0x401, 0x5, 0x8, 0x1, 0x101, 0x100000001, 0x7, 0x1fc, 0x9, 0x9, 0x0, 0x9, 0x8, 0x3, 0xff, 0x7, 0x73, 0x946c}) clock_adjtime(0x6, &(0x7f0000000200)={0x4, 0x1, 0x100, 0x6, 0x2, 0x6, 0x1, 0x1dd, 0x9, 0x1000000000000000, 0x0, 0x6, 0x1, 0x1, 0x9, 0x5, 0x3023, 0x2, 0x4, 0xfffffffffffffff9, 0x429, 0x3, 0x0, 0x9, 0xffffffffffffff05, 0x1000}) clock_adjtime(0x3, &(0x7f0000000300)={0x0, 0x8, 0x9, 0x9, 0x9, 0x9, 0x6, 0x9, 0x8, 0x1, 0xd0fc, 0x55, 0x2, 0x0, 0x1, 0x1f, 0x100000001, 0x8f44, 0x53, 0x0, 0x3, 0x140000000000, 0x9, 0x8000, 0x0, 0x10001}) r0 = syz_mount_image$iso9660(&(0x7f0000000400), &(0x7f0000000440)='./file0\x00', 0x4, 0x1, &(0x7f0000000480)=[{0xfffffffffffffffe, 0x0, 0x3}], 0x2014400, &(0x7f00000004c0)={[{@check_relaxed}, {@dmode}, {@check_relaxed}], [{@euid_lt={'euid<', 0xee01}}, {@euid_eq}, {@rootcontext={'rootcontext', 0x3d, 'staff_u'}}, {@obj_user={'obj_user', 0x3d, '#-_'}}, {@rootcontext={'rootcontext', 0x3d, 'staff_u'}}]}) faccessat(r0, &(0x7f0000000580)='./file0\x00', 0x88) clock_adjtime(0x4, &(0x7f00000005c0)={0x80000000, 0x100000000, 0xba, 0x80000000, 0x4, 0x20d4e190, 0x7, 0x400, 0x33, 0x7a, 0x1, 0x465d, 0x7f, 0x5, 0x3, 0x1, 0x0, 0x8, 0x7, 0x7ff, 0x1, 0x4, 0x3f, 0x7fff, 0x700b, 0x96}) r1 = accept$unix(0xffffffffffffffff, 0x0, &(0x7f00000006c0)) getsockname$unix(r1, &(0x7f0000000700), &(0x7f0000000780)=0x6e) clock_adjtime(0x3, &(0x7f00000007c0)={0x6, 0x6, 0x7, 0x8000, 0x7ff, 0x5c, 0x401, 0x2, 0x9, 0x4, 0x0, 0x61, 0x2, 0x9b71, 0x100000000, 0x7fffffff, 0x322, 0xc70d, 0x9, 0xd, 0x9, 0x0, 0x9, 0x1a1f00000000, 0xffffffffffffffff, 0x9}) clock_adjtime(0x6, &(0x7f00000008c0)={0x4, 0x9, 0x3, 0xfffffffffffffff7, 0xb31, 0x1, 0x1, 0x2, 0x538, 0x0, 0x401, 0x1, 0xdd, 0xfffffffffffffff7, 0xec54, 0x4, 0x100000001, 0x0, 0xa, 0x1, 0x7ff, 0xcd, 0xf2, 0x80, 0x7, 0x8000}) clock_adjtime(0x0, &(0x7f00000009c0)={0x8, 0xff, 0x81, 0x2, 0x100000001, 0x11, 0x5, 0x1, 0x1, 0x9, 0x1000, 0x8, 0xdf6c, 0x9, 0x8, 0x1004000000000000, 0x1ff, 0x3, 0x6, 0xf5, 0x80000, 0x1, 0xfffffffffffffd6d, 0x2, 0x6, 0xfa}) r2 = socket$unix(0x1, 0x5, 0x0) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f0000000ac0)={'wlan0\x00'}) mq_timedreceive(0xffffffffffffffff, &(0x7f0000000b00)=""/4096, 0x1000, 0x80, &(0x7f0000001b00)={0x0, 0x989680}) r3 = creat(&(0x7f0000001b40)='./file0\x00', 0x1) mknodat(r3, &(0x7f0000001b80)='./file1\x00', 0x4, 0x0) clock_adjtime(0x0, &(0x7f0000001bc0)={0xfff, 0x7fff, 0x0, 0x2, 0xfdc, 0x54, 0x8fa, 0x3f41, 0x0, 0x4, 0x4, 0x5, 0x101, 0x5, 0x4, 0x9, 0x9, 0x30e, 0x3f, 0x2, 0x7f, 0x7, 0x6, 0x4, 0x3ff, 0x100000000}) clock_adjtime(0x2, &(0x7f0000001cc0)={0x0, 0x6, 0x7, 0xe5, 0x5, 0x6, 0x10, 0x7, 0x281, 0x40, 0x1, 0x0, 0x1, 0x0, 0x5, 0x100, 0x0, 0x4, 0xffffffffffffe001, 0xdf, 0x7f, 0x8000, 0x9, 0x400, 0xfffffffffffffe00, 0x3f}) [ 307.364507][T18467] CPU: 1 PID: 18467 Comm: syz-executor.0 Not tainted 5.16.0-syzkaller #0 [ 307.372956][T18467] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 307.383120][T18467] Call Trace: [ 307.386403][T18467] [ 307.389375][T18467] dump_stack_lvl+0xd6/0x122 [ 307.394288][T18467] dump_stack+0x11/0x1b [ 307.398453][T18467] should_fail+0x23c/0x250 [ 307.402875][T18467] ? security_file_alloc+0x30/0x190 [ 307.408085][T18467] __should_failslab+0x81/0x90 [ 307.412930][T18467] should_failslab+0x5/0x20 [ 307.417445][T18467] kmem_cache_alloc+0x4f/0x320 [ 307.422233][T18467] security_file_alloc+0x30/0x190 [ 307.424620][T18473] SELinux: duplicate or incompatible mount options [ 307.427301][T18467] __alloc_file+0x83/0x1a0 [ 307.427327][T18467] alloc_empty_file+0xcd/0x1c0 [ 307.435777][T18470] loop1: detected capacity change from 0 to 264192 [ 307.438322][T18467] alloc_file+0x3a/0x280 [ 307.438347][T18467] alloc_file_pseudo+0xfa/0x150 [ 307.438368][T18467] __shmem_file_setup+0x14c/0x1d0 [ 307.438391][T18467] shmem_file_setup+0x37/0x40 [ 307.466588][T18470] EXT4-fs (loop1): VFS: Can't find ext4 filesystem [ 307.468470][T18467] __se_sys_memfd_create+0x1c1/0x350 [ 307.468506][T18467] __x64_sys_memfd_create+0x2d/0x40 [ 307.468529][T18467] do_syscall_64+0x44/0xd0 [ 307.489910][T18467] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 307.495823][T18467] RIP: 0033:0x7f1cb8affe99 17:03:55 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc01000a, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000003980)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d9", 0x4, 0x6800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d0f465001000005fd0f4655f00000000000001000c00000010000800000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}], 0x0, &(0x7f00000000c0)) (fail_nth: 8) 17:03:55 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc01000a, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000), 0x0, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000003980)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d0f465001000005fd0f4655f00000000000001", 0x1b, 0x11100}], 0x0, &(0x7f00000000c0)) [ 307.500310][T18467] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 307.503409][T18471] loop5: detected capacity change from 0 to 264192 [ 307.519927][T18467] RSP: 002b:00007f1cb7c75f28 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 307.519981][T18467] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007f1cb8affe99 [ 307.519993][T18467] RDX: 0000000000022200 RSI: 0000000000000000 RDI: 00007f1cb8b59168 [ 307.520005][T18467] RBP: 0000000000000008 R08: 0000000000011100 R09: 00007f1cb7c761d0 [ 307.520016][T18467] R10: 0000000000000008 R11: 0000000000000246 R12: 0000000008100000 [ 307.520029][T18467] R13: 0000000020000100 R14: 0000000008100000 R15: 00000000200000c0 [ 307.520044][T18467] [ 307.542938][T18475] FAULT_INJECTION: forcing a failure. [ 307.542938][T18475] name fail_page_alloc, interval 1, probability 0, space 0, times 1 [ 307.591702][T18475] CPU: 1 PID: 18475 Comm: syz-executor.0 Not tainted 5.16.0-syzkaller #0 [ 307.600832][T18475] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 307.603094][T18464] EXT4-fs (loop3): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 307.611070][T18475] Call Trace: [ 307.611080][T18475] [ 307.611087][T18475] dump_stack_lvl+0xd6/0x122 [ 307.620934][T18464] EXT4-fs (loop3): group descriptors corrupted! [ 307.624153][T18475] dump_stack+0x11/0x1b [ 307.630568][T18471] EXT4-fs warning (device loop5): read_mmp_block:107: Error -117 while reading MMP block 0 [ 307.632073][T18475] should_fail+0x23c/0x250 [ 307.632097][T18475] __alloc_pages+0x102/0x330 [ 307.661522][T18475] alloc_pages_vma+0x5ee/0x770 17:03:59 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc01000a, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000003980)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="80", 0x1, 0x11100}], 0x0, &(0x7f00000000c0)) [ 307.666301][T18475] shmem_getpage_gfp+0x8bc/0x12c0 [ 307.671374][T18475] shmem_write_begin+0x7e/0x100 [ 307.676437][T18475] generic_perform_write+0x1c8/0x400 [ 307.681755][T18475] ? current_time+0xed/0x1a0 [ 307.686425][T18475] __generic_file_write_iter+0xf7/0x2b0 [ 307.691968][T18475] ? generic_write_checks+0x250/0x290 [ 307.697354][T18475] generic_file_write_iter+0x75/0x130 [ 307.702794][T18475] vfs_write+0x7f5/0x950 [ 307.707221][T18475] __x64_sys_pwrite64+0xf5/0x150 [ 307.712182][T18475] do_syscall_64+0x44/0xd0 [ 307.716594][T18475] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 307.722479][T18475] RIP: 0033:0x7f1cb8ab2e67 [ 307.726996][T18475] Code: 08 89 3c 24 48 89 4c 24 18 e8 e5 f8 ff ff 4c 8b 54 24 18 48 8b 54 24 10 41 89 c0 48 8b 74 24 08 8b 3c 24 b8 12 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 31 44 89 c7 48 89 04 24 e8 15 f9 ff ff 48 8b [ 307.747147][T18475] RSP: 002b:00007f1cb7c75f00 EFLAGS: 00000293 ORIG_RAX: 0000000000000012 [ 307.755549][T18475] RAX: ffffffffffffffda RBX: 00007f1cb8b499c8 RCX: 00007f1cb8ab2e67 [ 307.764030][T18475] RDX: 0000000000000066 RSI: 0000000020010000 RDI: 0000000000000004 [ 307.772600][T18475] RBP: 0000000000000008 R08: 0000000000000000 R09: 00007f1cb7c761d0 [ 307.780647][T18475] R10: 0000000000000400 R11: 0000000000000293 R12: 0000000000000004 [ 307.788604][T18475] R13: 0000000000000004 R14: 0000000020000200 R15: 0000000000000000 [ 307.796560][T18475] [ 307.801348][T18475] loop0: detected capacity change from 0 to 264192 [ 307.809386][T18475] EXT4-fs (loop0): VFS: Can't find ext4 filesystem 17:04:00 executing program 2: clock_adjtime(0x7, &(0x7f0000000000)={0x8000, 0x62, 0xff, 0x1, 0x3, 0x1ff, 0x3ff, 0x4, 0xff, 0x20, 0x6, 0x401, 0x20, 0x0, 0x1ff, 0x8000, 0xfffffffffffffffd, 0x400, 0x8, 0x100000000, 0x2, 0x8, 0xf32, 0x4, 0x6, 0x80}) clock_adjtime(0x2, &(0x7f0000000100)={0xd9, 0x9, 0x1, 0x2, 0x1f, 0x78, 0x4b1, 0x0, 0x401, 0x5, 0x8, 0x1, 0x101, 0x100000001, 0x7, 0x1fc, 0x9, 0x9, 0x0, 0x9, 0x8, 0x3, 0xff, 0x7, 0x73, 0x946c}) clock_adjtime(0x6, &(0x7f0000000200)={0x4, 0x1, 0x100, 0x6, 0x2, 0x6, 0x1, 0x1dd, 0x9, 0x1000000000000000, 0x0, 0x6, 0x1, 0x1, 0x9, 0x5, 0x3023, 0x2, 0x4, 0xfffffffffffffff9, 0x429, 0x3, 0x0, 0x9, 0xffffffffffffff05, 0x1000}) clock_adjtime(0x3, &(0x7f0000000300)={0x0, 0x8, 0x9, 0x9, 0x9, 0x9, 0x6, 0x9, 0x8, 0x1, 0xd0fc, 0x55, 0x2, 0x0, 0x1, 0x1f, 0x100000001, 0x8f44, 0x53, 0x0, 0x3, 0x140000000000, 0x9, 0x8000, 0x0, 0x10001}) r0 = syz_mount_image$iso9660(&(0x7f0000000400), &(0x7f0000000440)='./file0\x00', 0x4, 0x1, &(0x7f0000000480)=[{0xfffffffffffffffe, 0x0, 0x3}], 0x2014400, &(0x7f00000004c0)={[{@check_relaxed}, {@dmode}, {@check_relaxed}], [{@euid_lt={'euid<', 0xee01}}, {@euid_eq}, {@rootcontext={'rootcontext', 0x3d, 'staff_u'}}, {@obj_user={'obj_user', 0x3d, '#-_'}}, {@rootcontext={'rootcontext', 0x3d, 'staff_u'}}]}) faccessat(r0, &(0x7f0000000580)='./file0\x00', 0x88) clock_adjtime(0x4, &(0x7f00000005c0)={0x80000000, 0x100000000, 0xba, 0x80000000, 0x4, 0x20d4e190, 0x7, 0x400, 0x33, 0x7a, 0x1, 0x465d, 0x7f, 0x5, 0x3, 0x1, 0x0, 0x8, 0x7, 0x7ff, 0x1, 0x4, 0x3f, 0x7fff, 0x700b, 0x96}) r1 = accept$unix(0xffffffffffffffff, 0x0, &(0x7f00000006c0)) getsockname$unix(r1, &(0x7f0000000700), &(0x7f0000000780)=0x6e) clock_adjtime(0x3, &(0x7f00000007c0)={0x6, 0x6, 0x7, 0x8000, 0x7ff, 0x5c, 0x401, 0x2, 0x9, 0x4, 0x0, 0x61, 0x2, 0x9b71, 0x100000000, 0x7fffffff, 0x322, 0xc70d, 0x9, 0xd, 0x9, 0x0, 0x9, 0x1a1f00000000, 0xffffffffffffffff, 0x9}) clock_adjtime(0x6, &(0x7f00000008c0)={0x4, 0x9, 0x3, 0xfffffffffffffff7, 0xb31, 0x1, 0x1, 0x2, 0x538, 0x0, 0x401, 0x1, 0xdd, 0xfffffffffffffff7, 0xec54, 0x4, 0x100000001, 0x0, 0xa, 0x1, 0x7ff, 0xcd, 0xf2, 0x80, 0x7, 0x8000}) clock_adjtime(0x0, &(0x7f00000009c0)={0x8, 0xff, 0x81, 0x2, 0x100000001, 0x11, 0x5, 0x1, 0x1, 0x9, 0x1000, 0x8, 0xdf6c, 0x9, 0x8, 0x1004000000000000, 0x1ff, 0x3, 0x6, 0xf5, 0x80000, 0x1, 0xfffffffffffffd6d, 0x2, 0x6, 0xfa}) r2 = socket$unix(0x1, 0x5, 0x0) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f0000000ac0)={'wlan0\x00'}) mq_timedreceive(0xffffffffffffffff, &(0x7f0000000b00)=""/4096, 0x1000, 0x80, &(0x7f0000001b00)={0x0, 0x989680}) r3 = creat(&(0x7f0000001b40)='./file0\x00', 0x1) mknodat(r3, &(0x7f0000001b80)='./file1\x00', 0x4, 0x0) clock_adjtime(0x0, &(0x7f0000001bc0)={0xfff, 0x7fff, 0x0, 0x2, 0xfdc, 0x54, 0x8fa, 0x3f41, 0x0, 0x4, 0x4, 0x5, 0x101, 0x5, 0x4, 0x9, 0x9, 0x30e, 0x3f, 0x2, 0x7f, 0x7, 0x6, 0x4, 0x3ff, 0x100000000}) clock_adjtime(0x2, &(0x7f0000001cc0)={0x0, 0x6, 0x7, 0xe5, 0x5, 0x6, 0x10, 0x7, 0x281, 0x40, 0x1, 0x0, 0x1, 0x0, 0x5, 0x100, 0x0, 0x4, 0xffffffffffffe001, 0xdf, 0x7f, 0x8000, 0x9, 0x400, 0xfffffffffffffe00, 0x3f}) 17:04:00 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc01000a, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000003980)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d9", 0x4, 0x6800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d0f465001000005fd0f4655f00000000000001000c00000010000800000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}], 0x0, &(0x7f00000000c0)) (fail_nth: 9) 17:04:00 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc01000a, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="0100000000000500", 0x8, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000003980)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d0f465001000005fd0f4655f00000000000001000c00000010000800000000000af3010004", 0x2d, 0x11100}], 0x0, &(0x7f00000000c0)) 17:04:00 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc01000a, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000011", 0x9, 0x4e0}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9}, {&(0x7f0000003980)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d0f465001000005fd0f4655f00000000000001000c000000100008", 0x23, 0x11100}], 0x0, &(0x7f00000000c0)) [ 307.835256][T18481] loop1: detected capacity change from 0 to 264192 [ 307.846601][T18483] loop5: detected capacity change from 0 to 264192 [ 307.854971][T18485] SELinux: duplicate or incompatible mount options [ 307.868138][T18487] FAULT_INJECTION: forcing a failure. [ 307.868138][T18487] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 307.881411][T18487] CPU: 1 PID: 18487 Comm: syz-executor.0 Not tainted 5.16.0-syzkaller #0 [ 307.889909][T18487] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 307.892563][T18490] loop3: detected capacity change from 0 to 264192 [ 307.899965][T18487] Call Trace: [ 307.899975][T18487] [ 307.899981][T18487] dump_stack_lvl+0xd6/0x122 [ 307.900006][T18487] dump_stack+0x11/0x1b [ 307.907054][T18483] EXT4-fs warning (device loop5): read_mmp_block:107: Error -117 while reading MMP block 0 [ 307.909879][T18487] should_fail+0x23c/0x250 [ 307.909904][T18487] should_fail_usercopy+0x16/0x20 [ 307.916187][T18490] EXT4-fs (loop3): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 307.917431][T18487] copy_page_from_iter_atomic+0x2f1/0xc60 [ 307.921701][T18490] EXT4-fs (loop3): group descriptors corrupted! [ 307.925165][T18481] EXT4-fs (loop1): VFS: Can't find ext4 filesystem [ 307.931704][T18487] ? shmem_write_begin+0x7e/0x100 [ 307.931737][T18487] generic_perform_write+0x211/0x400 [ 307.931760][T18487] ? current_time+0xed/0x1a0 [ 307.931787][T18487] __generic_file_write_iter+0xf7/0x2b0 [ 307.940481][T18491] loop4: detected capacity change from 0 to 264192 [ 307.941200][T18487] ? generic_write_checks+0x250/0x290 [ 307.941226][T18487] generic_file_write_iter+0x75/0x130 [ 307.953755][T18491] EXT4-fs warning (device loop4): read_mmp_block:107: Error -117 while reading MMP block 0 [ 307.957109][T18487] vfs_write+0x7f5/0x950 [ 307.957133][T18487] __x64_sys_pwrite64+0xf5/0x150 [ 308.027058][T18487] do_syscall_64+0x44/0xd0 [ 308.031534][T18487] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 308.037478][T18487] RIP: 0033:0x7f1cb8ab2e67 [ 308.041974][T18487] Code: 08 89 3c 24 48 89 4c 24 18 e8 e5 f8 ff ff 4c 8b 54 24 18 48 8b 54 24 10 41 89 c0 48 8b 74 24 08 8b 3c 24 b8 12 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 31 44 89 c7 48 89 04 24 e8 15 f9 ff ff 48 8b [ 308.061578][T18487] RSP: 002b:00007f1cb7c75f00 EFLAGS: 00000293 ORIG_RAX: 0000000000000012 [ 308.070080][T18487] RAX: ffffffffffffffda RBX: 00007f1cb8b499c8 RCX: 00007f1cb8ab2e67 [ 308.078051][T18487] RDX: 0000000000000066 RSI: 0000000020010000 RDI: 0000000000000004 [ 308.086097][T18487] RBP: 0000000000000008 R08: 0000000000000000 R09: 00007f1cb7c761d0 [ 308.094066][T18487] R10: 0000000000000400 R11: 0000000000000293 R12: 0000000000000004 [ 308.102141][T18487] R13: 0000000000000004 R14: 0000000020000200 R15: 0000000000000000 [ 308.110143][T18487] 17:04:04 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc01000a, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000011", 0x9, 0x4e0}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000003980)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d0f465001000005fd0f4655f00000000000001000c000000100008", 0x23, 0x11100}], 0x0, &(0x7f00000000c0)) 17:04:04 executing program 2: clock_adjtime(0x7, &(0x7f0000000000)={0x8000, 0x62, 0xff, 0x1, 0x3, 0x1ff, 0x3ff, 0x4, 0xff, 0x20, 0x6, 0x401, 0x20, 0x0, 0x1ff, 0x8000, 0xfffffffffffffffd, 0x400, 0x8, 0x100000000, 0x2, 0x8, 0xf32, 0x4, 0x6, 0x80}) clock_adjtime(0x2, &(0x7f0000000100)={0xd9, 0x9, 0x1, 0x2, 0x1f, 0x78, 0x4b1, 0x0, 0x401, 0x5, 0x8, 0x1, 0x101, 0x100000001, 0x7, 0x1fc, 0x9, 0x9, 0x0, 0x9, 0x8, 0x3, 0xff, 0x7, 0x73, 0x946c}) clock_adjtime(0x6, &(0x7f0000000200)={0x4, 0x1, 0x100, 0x6, 0x2, 0x6, 0x1, 0x1dd, 0x9, 0x1000000000000000, 0x0, 0x6, 0x1, 0x1, 0x9, 0x5, 0x3023, 0x2, 0x4, 0xfffffffffffffff9, 0x429, 0x3, 0x0, 0x9, 0xffffffffffffff05, 0x1000}) clock_adjtime(0x3, &(0x7f0000000300)={0x0, 0x8, 0x9, 0x9, 0x9, 0x9, 0x6, 0x9, 0x8, 0x1, 0xd0fc, 0x55, 0x2, 0x0, 0x1, 0x1f, 0x100000001, 0x8f44, 0x53, 0x0, 0x3, 0x140000000000, 0x9, 0x8000, 0x0, 0x10001}) r0 = syz_mount_image$iso9660(&(0x7f0000000400), &(0x7f0000000440)='./file0\x00', 0x4, 0x1, &(0x7f0000000480)=[{0xfffffffffffffffe, 0x0, 0x3}], 0x2014400, &(0x7f00000004c0)={[{@check_relaxed}, {@dmode}, {@check_relaxed}], [{@euid_lt={'euid<', 0xee01}}, {@euid_eq}, {@rootcontext={'rootcontext', 0x3d, 'staff_u'}}, {@obj_user={'obj_user', 0x3d, '#-_'}}, {@rootcontext={'rootcontext', 0x3d, 'staff_u'}}]}) faccessat(r0, &(0x7f0000000580)='./file0\x00', 0x88) clock_adjtime(0x4, &(0x7f00000005c0)={0x80000000, 0x100000000, 0xba, 0x80000000, 0x4, 0x20d4e190, 0x7, 0x400, 0x33, 0x7a, 0x1, 0x465d, 0x7f, 0x5, 0x3, 0x1, 0x0, 0x8, 0x7, 0x7ff, 0x1, 0x4, 0x3f, 0x7fff, 0x700b, 0x96}) r1 = accept$unix(0xffffffffffffffff, 0x0, &(0x7f00000006c0)) getsockname$unix(r1, &(0x7f0000000700), &(0x7f0000000780)=0x6e) clock_adjtime(0x3, &(0x7f00000007c0)={0x6, 0x6, 0x7, 0x8000, 0x7ff, 0x5c, 0x401, 0x2, 0x9, 0x4, 0x0, 0x61, 0x2, 0x9b71, 0x100000000, 0x7fffffff, 0x322, 0xc70d, 0x9, 0xd, 0x9, 0x0, 0x9, 0x1a1f00000000, 0xffffffffffffffff, 0x9}) clock_adjtime(0x6, &(0x7f00000008c0)={0x4, 0x9, 0x3, 0xfffffffffffffff7, 0xb31, 0x1, 0x1, 0x2, 0x538, 0x0, 0x401, 0x1, 0xdd, 0xfffffffffffffff7, 0xec54, 0x4, 0x100000001, 0x0, 0xa, 0x1, 0x7ff, 0xcd, 0xf2, 0x80, 0x7, 0x8000}) clock_adjtime(0x0, &(0x7f00000009c0)={0x8, 0xff, 0x81, 0x2, 0x100000001, 0x11, 0x5, 0x1, 0x1, 0x9, 0x1000, 0x8, 0xdf6c, 0x9, 0x8, 0x1004000000000000, 0x1ff, 0x3, 0x6, 0xf5, 0x80000, 0x1, 0xfffffffffffffd6d, 0x2, 0x6, 0xfa}) r2 = socket$unix(0x1, 0x5, 0x0) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f0000000ac0)={'wlan0\x00'}) mq_timedreceive(0xffffffffffffffff, &(0x7f0000000b00)=""/4096, 0x1000, 0x80, &(0x7f0000001b00)={0x0, 0x989680}) r3 = creat(&(0x7f0000001b40)='./file0\x00', 0x1) mknodat(r3, &(0x7f0000001b80)='./file1\x00', 0x4, 0x0) clock_adjtime(0x0, &(0x7f0000001bc0)={0xfff, 0x7fff, 0x0, 0x2, 0xfdc, 0x54, 0x8fa, 0x3f41, 0x0, 0x4, 0x4, 0x5, 0x101, 0x5, 0x4, 0x9, 0x9, 0x30e, 0x3f, 0x2, 0x7f, 0x7, 0x6, 0x4, 0x3ff, 0x100000000}) clock_adjtime(0x2, &(0x7f0000001cc0)={0x0, 0x6, 0x7, 0xe5, 0x5, 0x6, 0x10, 0x7, 0x281, 0x40, 0x1, 0x0, 0x1, 0x10001, 0x0, 0x100, 0x0, 0x4, 0xffffffffffffe001, 0xdf, 0x7f, 0x8000, 0x9, 0x400, 0xfffffffffffffe00, 0x3f}) 17:04:04 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc01000a, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="0100000000000500", 0x8, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000003980)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d0f465001000005fd0f4655f00000000000001000c00000010000800000000000af3010004", 0x2d, 0x11100}], 0x0, &(0x7f00000000c0)) 17:04:04 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc01000a, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000), 0x0, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000003980)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d0f465001000005fd0f4655f00000000000001", 0x1b, 0x11100}], 0x0, &(0x7f00000000c0)) 17:04:04 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc01000a, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000003980)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="80", 0x1, 0x11100}], 0x0, &(0x7f00000000c0)) [ 308.140772][T18487] loop0: detected capacity change from 0 to 264192 [ 308.212742][T18497] SELinux: duplicate or incompatible mount options [ 308.222632][T18503] loop3: detected capacity change from 0 to 264192 [ 308.223740][T18504] loop5: detected capacity change from 0 to 264192 [ 308.231491][T18505] loop4: detected capacity change from 0 to 264192 [ 308.242591][T18506] loop1: detected capacity change from 0 to 264192 [ 308.250628][T18506] EXT4-fs (loop1): VFS: Can't find ext4 filesystem 17:04:04 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc01000a, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000003980)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d0f465001000005fd0f4655f00000000000001000c00000010000800000000000af3010004", 0x2d, 0x11100}], 0x0, &(0x7f00000000c0)) [ 308.257638][T18505] EXT4-fs warning (device loop4): read_mmp_block:107: Error -117 while reading MMP block 0 [ 308.258469][T18487] EXT4-fs warning (device loop0): ext4_enable_quotas:6363: Failed to enable quota tracking (type=0, err=-22). Please run e2fsck to fix. [ 308.289395][T18503] EXT4-fs error (device loop3): ext4_orphan_get:1419: comm syz-executor.3: bad orphan inode 17 [ 308.300919][T18504] EXT4-fs warning (device loop5): read_mmp_block:107: Error -117 while reading MMP block 0 17:04:08 executing program 2: clock_adjtime(0x7, &(0x7f0000000000)={0x8000, 0x62, 0xff, 0x1, 0x3, 0x1ff, 0x3ff, 0x4, 0xff, 0x20, 0x6, 0x401, 0x20, 0x0, 0x1ff, 0x8000, 0xfffffffffffffffd, 0x400, 0x8, 0x100000000, 0x2, 0x8, 0xf32, 0x4, 0x6, 0x80}) clock_adjtime(0x2, &(0x7f0000000100)={0xd9, 0x9, 0x1, 0x2, 0x1f, 0x78, 0x4b1, 0x0, 0x401, 0x5, 0x8, 0x1, 0x101, 0x100000001, 0x7, 0x1fc, 0x9, 0x9, 0x0, 0x9, 0x8, 0x3, 0xff, 0x7, 0x73, 0x946c}) clock_adjtime(0x6, &(0x7f0000000200)={0x4, 0x1, 0x100, 0x6, 0x2, 0x6, 0x1, 0x1dd, 0x9, 0x1000000000000000, 0x0, 0x6, 0x1, 0x1, 0x9, 0x5, 0x3023, 0x2, 0x4, 0xfffffffffffffff9, 0x429, 0x3, 0x0, 0x9, 0xffffffffffffff05, 0x1000}) clock_adjtime(0x3, &(0x7f0000000300)={0x0, 0x8, 0x9, 0x9, 0x9, 0x9, 0x6, 0x9, 0x8, 0x1, 0xd0fc, 0x55, 0x2, 0x0, 0x1, 0x1f, 0x100000001, 0x8f44, 0x53, 0x0, 0x3, 0x140000000000, 0x9, 0x8000, 0x0, 0x10001}) r0 = syz_mount_image$iso9660(&(0x7f0000000400), &(0x7f0000000440)='./file0\x00', 0x4, 0x1, &(0x7f0000000480)=[{0xfffffffffffffffe, 0x0, 0x3}], 0x2014400, &(0x7f00000004c0)={[{@check_relaxed}, {@dmode}, {@check_relaxed}], [{@euid_lt={'euid<', 0xee01}}, {@euid_eq}, {@rootcontext={'rootcontext', 0x3d, 'staff_u'}}, {@obj_user={'obj_user', 0x3d, '#-_'}}, {@rootcontext={'rootcontext', 0x3d, 'staff_u'}}]}) faccessat(r0, &(0x7f0000000580)='./file0\x00', 0x88) clock_adjtime(0x4, &(0x7f00000005c0)={0x80000000, 0x100000000, 0xba, 0x80000000, 0x4, 0x20d4e190, 0x7, 0x400, 0x33, 0x7a, 0x1, 0x465d, 0x7f, 0x5, 0x3, 0x1, 0x0, 0x8, 0x7, 0x7ff, 0x1, 0x4, 0x3f, 0x7fff, 0x700b, 0x96}) r1 = accept$unix(0xffffffffffffffff, 0x0, &(0x7f00000006c0)) getsockname$unix(r1, &(0x7f0000000700), &(0x7f0000000780)=0x6e) clock_adjtime(0x3, &(0x7f00000007c0)={0x6, 0x6, 0x7, 0x8000, 0x7ff, 0x5c, 0x401, 0x2, 0x9, 0x4, 0x0, 0x61, 0x2, 0x9b71, 0x100000000, 0x7fffffff, 0x322, 0xc70d, 0x9, 0xd, 0x9, 0x0, 0x9, 0x1a1f00000000, 0xffffffffffffffff, 0x9}) clock_adjtime(0x6, &(0x7f00000008c0)={0x4, 0x9, 0x3, 0xfffffffffffffff7, 0xb31, 0x1, 0x1, 0x2, 0x538, 0x0, 0x401, 0x1, 0xdd, 0xfffffffffffffff7, 0xec54, 0x4, 0x100000001, 0x0, 0xa, 0x1, 0x7ff, 0xcd, 0xf2, 0x80, 0x7, 0x8000}) clock_adjtime(0x0, &(0x7f00000009c0)={0x8, 0xff, 0x81, 0x2, 0x100000001, 0x11, 0x5, 0x1, 0x1, 0x9, 0x1000, 0x8, 0xdf6c, 0x9, 0x8, 0x1004000000000000, 0x1ff, 0x3, 0x6, 0xf5, 0x80000, 0x1, 0xfffffffffffffd6d, 0x2, 0x6, 0xfa}) r2 = socket$unix(0x1, 0x5, 0x0) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f0000000ac0)={'wlan0\x00'}) mq_timedreceive(0xffffffffffffffff, &(0x7f0000000b00)=""/4096, 0x1000, 0x80, &(0x7f0000001b00)={0x0, 0x989680}) r3 = creat(&(0x7f0000001b40)='./file0\x00', 0x1) mknodat(r3, &(0x7f0000001b80)='./file1\x00', 0x4, 0x0) clock_adjtime(0x0, &(0x7f0000001bc0)={0xfff, 0x7fff, 0x0, 0x2, 0xfdc, 0x54, 0x8fa, 0x3f41, 0x0, 0x4, 0x4, 0x5, 0x101, 0x5, 0x4, 0x9, 0x9, 0x30e, 0x3f, 0x2, 0x7f, 0x7, 0x6, 0x4, 0x3ff, 0x100000000}) clock_adjtime(0x2, &(0x7f0000001cc0)={0x0, 0x6, 0x7, 0xe5, 0x5, 0x6, 0x10, 0x7, 0x281, 0x40, 0x1, 0x0, 0x1, 0x10001, 0x0, 0x100, 0x0, 0x4, 0xffffffffffffe001, 0xdf, 0x7f, 0x8000, 0x9, 0x400, 0xfffffffffffffe00, 0x3f}) [ 308.337130][T18512] loop4: detected capacity change from 0 to 264192 [ 308.356223][T18487] EXT4-fs (loop0): mount failed [ 308.365795][T18512] EXT4-fs warning (device loop4): read_mmp_block:107: Error -117 while reading MMP block 0 17:04:08 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc01000a, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f465", 0x33, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000003980)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d0f465001000005fd0f4655f00000000000001", 0x1b, 0x11100}], 0x0, &(0x7f00000000c0)) [ 308.381432][T18515] SELinux: duplicate or incompatible mount options 17:04:08 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc01000a, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000003980)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="80", 0x1, 0x11100}], 0x0, &(0x7f00000000c0)) [ 308.408312][T18503] ext4_test_bit(bit=16, block=18) = 0 [ 308.413872][T18503] EXT4-fs (loop3): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: writeback. [ 308.435549][T18517] loop1: detected capacity change from 0 to 264192 17:04:08 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc01000a, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000003980)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d9", 0x4, 0x6800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d0f465001000005fd0f4655f00000000000001000c00000010000800000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}], 0x0, &(0x7f00000000c0)) (fail_nth: 10) [ 308.465650][T18517] EXT4-fs (loop1): VFS: Can't find ext4 filesystem [ 308.477480][T18519] loop5: detected capacity change from 0 to 264192 [ 308.495621][T18522] FAULT_INJECTION: forcing a failure. [ 308.495621][T18522] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 308.508725][T18522] CPU: 0 PID: 18522 Comm: syz-executor.0 Not tainted 5.16.0-syzkaller #0 [ 308.517201][T18522] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 308.527709][T18522] Call Trace: [ 308.531039][T18522] [ 308.533978][T18522] dump_stack_lvl+0xd6/0x122 [ 308.538644][T18522] dump_stack+0x11/0x1b [ 308.542869][T18522] should_fail+0x23c/0x250 [ 308.547401][T18522] should_fail_usercopy+0x16/0x20 [ 308.552494][T18522] copy_page_from_iter_atomic+0x2f1/0xc60 [ 308.558487][T18522] ? shmem_write_begin+0x7e/0x100 [ 308.563620][T18522] generic_perform_write+0x211/0x400 [ 308.568987][T18522] ? current_time+0xed/0x1a0 [ 308.573630][T18522] __generic_file_write_iter+0xf7/0x2b0 [ 308.579193][T18522] ? generic_write_checks+0x250/0x290 [ 308.584657][T18522] generic_file_write_iter+0x75/0x130 [ 308.590135][T18522] vfs_write+0x7f5/0x950 [ 308.594385][T18522] __x64_sys_pwrite64+0xf5/0x150 [ 308.599472][T18522] do_syscall_64+0x44/0xd0 [ 308.604050][T18522] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 308.609963][T18522] RIP: 0033:0x7f1cb8ab2e67 [ 308.614485][T18522] Code: 08 89 3c 24 48 89 4c 24 18 e8 e5 f8 ff ff 4c 8b 54 24 18 48 8b 54 24 10 41 89 c0 48 8b 74 24 08 8b 3c 24 b8 12 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 31 44 89 c7 48 89 04 24 e8 15 f9 ff ff 48 8b [ 308.634756][T18522] RSP: 002b:00007f1cb7c75f00 EFLAGS: 00000293 ORIG_RAX: 0000000000000012 [ 308.643186][T18522] RAX: ffffffffffffffda RBX: 00007f1cb8b499c8 RCX: 00007f1cb8ab2e67 [ 308.651302][T18522] RDX: 0000000000000009 RSI: 0000000020010200 RDI: 0000000000000004 17:04:13 executing program 2: clock_adjtime(0x7, &(0x7f0000000000)={0x8000, 0x62, 0xff, 0x1, 0x3, 0x1ff, 0x3ff, 0x4, 0xff, 0x20, 0x6, 0x401, 0x20, 0x0, 0x1ff, 0x8000, 0xfffffffffffffffd, 0x400, 0x8, 0x100000000, 0x2, 0x8, 0xf32, 0x4, 0x6, 0x80}) clock_adjtime(0x2, &(0x7f0000000100)={0xd9, 0x9, 0x1, 0x2, 0x1f, 0x78, 0x4b1, 0x0, 0x401, 0x5, 0x8, 0x1, 0x101, 0x100000001, 0x7, 0x1fc, 0x9, 0x9, 0x0, 0x9, 0x8, 0x3, 0xff, 0x7, 0x73, 0x946c}) clock_adjtime(0x6, &(0x7f0000000200)={0x4, 0x1, 0x100, 0x6, 0x2, 0x6, 0x1, 0x1dd, 0x9, 0x1000000000000000, 0x0, 0x6, 0x1, 0x1, 0x9, 0x5, 0x3023, 0x2, 0x4, 0xfffffffffffffff9, 0x429, 0x3, 0x0, 0x9, 0xffffffffffffff05, 0x1000}) clock_adjtime(0x3, &(0x7f0000000300)={0x0, 0x8, 0x9, 0x9, 0x9, 0x9, 0x6, 0x9, 0x8, 0x1, 0xd0fc, 0x55, 0x2, 0x0, 0x1, 0x1f, 0x100000001, 0x8f44, 0x53, 0x0, 0x3, 0x140000000000, 0x9, 0x8000, 0x0, 0x10001}) r0 = syz_mount_image$iso9660(&(0x7f0000000400), &(0x7f0000000440)='./file0\x00', 0x4, 0x1, &(0x7f0000000480)=[{0xfffffffffffffffe, 0x0, 0x3}], 0x2014400, &(0x7f00000004c0)={[{@check_relaxed}, {@dmode}, {@check_relaxed}], [{@euid_lt={'euid<', 0xee01}}, {@euid_eq}, {@rootcontext={'rootcontext', 0x3d, 'staff_u'}}, {@obj_user={'obj_user', 0x3d, '#-_'}}, {@rootcontext={'rootcontext', 0x3d, 'staff_u'}}]}) faccessat(r0, &(0x7f0000000580)='./file0\x00', 0x88) clock_adjtime(0x4, &(0x7f00000005c0)={0x80000000, 0x100000000, 0xba, 0x80000000, 0x4, 0x20d4e190, 0x7, 0x400, 0x33, 0x7a, 0x1, 0x465d, 0x7f, 0x5, 0x3, 0x1, 0x0, 0x8, 0x7, 0x7ff, 0x1, 0x4, 0x3f, 0x7fff, 0x700b, 0x96}) r1 = accept$unix(0xffffffffffffffff, 0x0, &(0x7f00000006c0)) getsockname$unix(r1, &(0x7f0000000700), &(0x7f0000000780)=0x6e) clock_adjtime(0x3, &(0x7f00000007c0)={0x6, 0x6, 0x7, 0x8000, 0x7ff, 0x5c, 0x401, 0x2, 0x9, 0x4, 0x0, 0x61, 0x2, 0x9b71, 0x100000000, 0x7fffffff, 0x322, 0xc70d, 0x9, 0xd, 0x9, 0x0, 0x9, 0x1a1f00000000, 0xffffffffffffffff, 0x9}) clock_adjtime(0x6, &(0x7f00000008c0)={0x4, 0x9, 0x3, 0xfffffffffffffff7, 0xb31, 0x1, 0x1, 0x2, 0x538, 0x0, 0x401, 0x1, 0xdd, 0xfffffffffffffff7, 0xec54, 0x4, 0x100000001, 0x0, 0xa, 0x1, 0x7ff, 0xcd, 0xf2, 0x80, 0x7, 0x8000}) clock_adjtime(0x0, &(0x7f00000009c0)={0x8, 0xff, 0x81, 0x2, 0x100000001, 0x11, 0x5, 0x1, 0x1, 0x9, 0x1000, 0x8, 0xdf6c, 0x9, 0x8, 0x1004000000000000, 0x1ff, 0x3, 0x6, 0xf5, 0x80000, 0x1, 0xfffffffffffffd6d, 0x2, 0x6, 0xfa}) r2 = socket$unix(0x1, 0x5, 0x0) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f0000000ac0)={'wlan0\x00'}) mq_timedreceive(0xffffffffffffffff, &(0x7f0000000b00)=""/4096, 0x1000, 0x80, &(0x7f0000001b00)={0x0, 0x989680}) r3 = creat(&(0x7f0000001b40)='./file0\x00', 0x1) mknodat(r3, &(0x7f0000001b80)='./file1\x00', 0x4, 0x0) clock_adjtime(0x0, &(0x7f0000001bc0)={0xfff, 0x7fff, 0x0, 0x2, 0xfdc, 0x54, 0x8fa, 0x3f41, 0x0, 0x4, 0x4, 0x5, 0x101, 0x5, 0x4, 0x9, 0x9, 0x30e, 0x3f, 0x2, 0x7f, 0x7, 0x6, 0x4, 0x3ff, 0x100000000}) clock_adjtime(0x2, &(0x7f0000001cc0)={0x0, 0x6, 0x7, 0xe5, 0x5, 0x6, 0x10, 0x7, 0x281, 0x40, 0x1, 0x0, 0x1, 0x10001, 0x0, 0x100, 0x0, 0x4, 0xffffffffffffe001, 0xdf, 0x7f, 0x8000, 0x9, 0x400, 0xfffffffffffffe00, 0x3f}) [ 308.659301][T18522] RBP: 0000000000000008 R08: 0000000000000000 R09: 00007f1cb7c761d0 [ 308.667295][T18522] R10: 0000000000000560 R11: 0000000000000293 R12: 0000000000000004 [ 308.675279][T18522] R13: 0000000000000004 R14: 0000000020000218 R15: 0000000000000001 [ 308.683351][T18522] [ 308.689026][T18503] ext4 filesystem being mounted at /root/syzkaller-testdir350550748/syzkaller.ONiyFI/850/file0 supports timestamps until 2038 (0x7fffffff) [ 308.706100][T18519] EXT4-fs warning (device loop5): read_mmp_block:107: Error -117 while reading MMP block 0 17:04:13 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc01000a, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000003980)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d0f465001000005fd0f4655f00000000000001000c00000010000800000000000af3010004", 0x2d, 0x11100}], 0x0, &(0x7f00000000c0)) 17:04:13 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc01000a, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000011", 0x9, 0x4e0}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000003980)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d0f465001000005fd0f4655f00000000000001000c000000100008", 0x23, 0x11100}], 0x0, &(0x7f00000000c0)) 17:04:13 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc01000a, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f465", 0x33, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000003980)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d0f465001000005fd0f4655f00000000000001", 0x1b, 0x11100}], 0x0, &(0x7f00000000c0)) 17:04:13 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc01000a, 0x6, &(0x7f0000000200)=[{&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000003980)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="80", 0x1, 0x11100}], 0x0, &(0x7f00000000c0)) [ 308.775425][T18527] loop4: detected capacity change from 0 to 264192 [ 308.786411][T18529] loop1: detected capacity change from 0 to 264192 [ 308.795900][T18530] SELinux: duplicate or incompatible mount options [ 308.803865][T18529] EXT4-fs (loop1): VFS: Can't find ext4 filesystem [ 308.812570][T18532] loop5: detected capacity change from 0 to 264192 [ 308.826728][T18527] EXT4-fs warning (device loop4): read_mmp_block:107: Error -117 while reading MMP block 0 [ 308.826960][T18532] EXT4-fs (loop5): VFS: Can't find ext4 filesystem [ 308.851130][T18534] loop3: detected capacity change from 0 to 264192 17:04:17 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc01000a, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f465", 0x33, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000003980)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d0f465001000005fd0f4655f00000000000001", 0x1b, 0x11100}], 0x0, &(0x7f00000000c0)) 17:04:17 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc01000a, 0x6, &(0x7f0000000200)=[{&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000003980)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="80", 0x1, 0x11100}], 0x0, &(0x7f00000000c0)) 17:04:17 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc01000a, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000003980)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d0f465001000005fd0f4655f00000000000001000c00000010000800000000000af3010004", 0x2d, 0x11100}], 0x0, &(0x7f00000000c0)) 17:04:17 executing program 2: clock_adjtime(0x7, &(0x7f0000000000)={0x8000, 0x62, 0xff, 0x1, 0x3, 0x1ff, 0x3ff, 0x4, 0xff, 0x20, 0x6, 0x401, 0x20, 0x0, 0x1ff, 0x8000, 0xfffffffffffffffd, 0x400, 0x8, 0x100000000, 0x2, 0x8, 0xf32, 0x4, 0x6, 0x80}) clock_adjtime(0x2, &(0x7f0000000100)={0xd9, 0x9, 0x1, 0x2, 0x1f, 0x78, 0x4b1, 0x0, 0x401, 0x5, 0x8, 0x1, 0x101, 0x100000001, 0x7, 0x1fc, 0x9, 0x9, 0x0, 0x9, 0x8, 0x3, 0xff, 0x7, 0x73, 0x946c}) clock_adjtime(0x6, &(0x7f0000000200)={0x4, 0x1, 0x100, 0x6, 0x2, 0x6, 0x1, 0x1dd, 0x9, 0x1000000000000000, 0x0, 0x6, 0x1, 0x1, 0x9, 0x5, 0x3023, 0x2, 0x4, 0xfffffffffffffff9, 0x429, 0x3, 0x0, 0x9, 0xffffffffffffff05, 0x1000}) clock_adjtime(0x3, &(0x7f0000000300)={0x0, 0x8, 0x9, 0x9, 0x9, 0x9, 0x6, 0x9, 0x8, 0x1, 0xd0fc, 0x55, 0x2, 0x0, 0x1, 0x1f, 0x100000001, 0x8f44, 0x53, 0x0, 0x3, 0x140000000000, 0x9, 0x8000, 0x0, 0x10001}) r0 = syz_mount_image$iso9660(&(0x7f0000000400), &(0x7f0000000440)='./file0\x00', 0x4, 0x1, &(0x7f0000000480)=[{0xfffffffffffffffe, 0x0, 0x3}], 0x2014400, &(0x7f00000004c0)={[{@check_relaxed}, {@dmode}, {@check_relaxed}], [{@euid_lt={'euid<', 0xee01}}, {@euid_eq}, {@rootcontext={'rootcontext', 0x3d, 'staff_u'}}, {@obj_user={'obj_user', 0x3d, '#-_'}}, {@rootcontext={'rootcontext', 0x3d, 'staff_u'}}]}) faccessat(r0, &(0x7f0000000580)='./file0\x00', 0x88) clock_adjtime(0x4, &(0x7f00000005c0)={0x80000000, 0x100000000, 0xba, 0x80000000, 0x4, 0x20d4e190, 0x7, 0x400, 0x33, 0x7a, 0x1, 0x465d, 0x7f, 0x5, 0x3, 0x1, 0x0, 0x8, 0x7, 0x7ff, 0x1, 0x4, 0x3f, 0x7fff, 0x700b, 0x96}) r1 = accept$unix(0xffffffffffffffff, 0x0, &(0x7f00000006c0)) getsockname$unix(r1, &(0x7f0000000700), &(0x7f0000000780)=0x6e) clock_adjtime(0x3, &(0x7f00000007c0)={0x6, 0x6, 0x7, 0x8000, 0x7ff, 0x5c, 0x401, 0x2, 0x9, 0x4, 0x0, 0x61, 0x2, 0x9b71, 0x100000000, 0x7fffffff, 0x322, 0xc70d, 0x9, 0xd, 0x9, 0x0, 0x9, 0x1a1f00000000, 0xffffffffffffffff, 0x9}) clock_adjtime(0x6, &(0x7f00000008c0)={0x4, 0x9, 0x3, 0xfffffffffffffff7, 0xb31, 0x1, 0x1, 0x2, 0x538, 0x0, 0x401, 0x1, 0xdd, 0xfffffffffffffff7, 0xec54, 0x4, 0x100000001, 0x0, 0xa, 0x1, 0x7ff, 0xcd, 0xf2, 0x80, 0x7, 0x8000}) clock_adjtime(0x0, &(0x7f00000009c0)={0x8, 0xff, 0x81, 0x2, 0x100000001, 0x11, 0x5, 0x1, 0x1, 0x9, 0x1000, 0x8, 0xdf6c, 0x9, 0x8, 0x1004000000000000, 0x1ff, 0x3, 0x6, 0xf5, 0x80000, 0x1, 0xfffffffffffffd6d, 0x2, 0x6, 0xfa}) r2 = socket$unix(0x1, 0x5, 0x0) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f0000000ac0)={'wlan0\x00'}) mq_timedreceive(0xffffffffffffffff, &(0x7f0000000b00)=""/4096, 0x1000, 0x80, &(0x7f0000001b00)={0x0, 0x989680}) r3 = creat(&(0x7f0000001b40)='./file0\x00', 0x1) mknodat(r3, &(0x7f0000001b80)='./file1\x00', 0x4, 0x0) clock_adjtime(0x0, &(0x7f0000001bc0)={0xfff, 0x7fff, 0x0, 0x2, 0xfdc, 0x54, 0x8fa, 0x3f41, 0x0, 0x4, 0x4, 0x5, 0x101, 0x5, 0x4, 0x9, 0x9, 0x30e, 0x3f, 0x2, 0x7f, 0x7, 0x6, 0x4, 0x3ff, 0x100000000}) clock_adjtime(0x2, &(0x7f0000001cc0)={0x0, 0x6, 0x7, 0xe5, 0x5, 0x6, 0x10, 0x7, 0x281, 0x40, 0x1, 0x0, 0x1, 0x10001, 0x5, 0x0, 0x0, 0x4, 0xffffffffffffe001, 0xdf, 0x7f, 0x8000, 0x9, 0x400, 0xfffffffffffffe00, 0x3f}) [ 308.938610][T18534] EXT4-fs error (device loop3): ext4_orphan_get:1419: comm syz-executor.3: bad orphan inode 17 [ 308.953122][T18541] loop1: detected capacity change from 0 to 264192 [ 308.969233][T18522] loop0: detected capacity change from 0 to 264192 [ 309.021014][T18547] loop4: detected capacity change from 0 to 264192 [ 309.024423][T18544] SELinux: duplicate or incompatible mount options [ 309.049563][T18546] loop5: detected capacity change from 0 to 264192 [ 309.059077][T18534] ext4_test_bit(bit=16, block=18) = 0 17:04:17 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc01000a, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001", 0x4d, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000003980)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d0f465001000005fd0f4655f00000000000001", 0x1b, 0x11100}], 0x0, &(0x7f00000000c0)) [ 309.064500][T18534] EXT4-fs (loop3): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: writeback. [ 309.077260][T18541] EXT4-fs (loop1): VFS: Can't find ext4 filesystem [ 309.084085][T18534] ext4 filesystem being mounted at /root/syzkaller-testdir350550748/syzkaller.ONiyFI/851/file0 supports timestamps until 2038 (0x7fffffff) [ 309.100892][T18547] EXT4-fs warning (device loop4): read_mmp_block:107: Error -117 while reading MMP block 0 [ 309.114099][T18546] EXT4-fs (loop5): VFS: Can't find ext4 filesystem 17:04:17 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc01000a, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000011", 0x9, 0x4e0}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000003980)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d0f465001000005fd0f4655f00000000000001000c000000100008", 0x23, 0x11100}], 0x0, &(0x7f00000000c0)) [ 309.127976][T18522] EXT4-fs warning (device loop0): ext4_enable_quotas:6363: Failed to enable quota tracking (type=0, err=-22). Please run e2fsck to fix. [ 309.165713][T18551] loop1: detected capacity change from 0 to 264192 [ 309.209046][T18522] EXT4-fs (loop0): mount failed [ 309.218055][T18551] EXT4-fs (loop1): invalid first ino: 0 17:04:21 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc01000a, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000003980)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d9", 0x4, 0x6800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d0f465001000005fd0f4655f00000000000001000c00000010000800000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}], 0x0, &(0x7f00000000c0)) (fail_nth: 11) 17:04:21 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc01000a, 0x6, &(0x7f0000000200)=[{&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000003980)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="80", 0x1, 0x11100}], 0x0, &(0x7f00000000c0)) 17:04:21 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc01000a, 0x6, &(0x7f0000000200)=[{&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000003980)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d0f465001000005fd0f4655f00000000000001000c00000010000800000000000af3010004", 0x2d, 0x11100}], 0x0, &(0x7f00000000c0)) 17:04:21 executing program 2: clock_adjtime(0x7, &(0x7f0000000000)={0x8000, 0x62, 0xff, 0x1, 0x3, 0x1ff, 0x3ff, 0x4, 0xff, 0x20, 0x6, 0x401, 0x20, 0x0, 0x1ff, 0x8000, 0xfffffffffffffffd, 0x400, 0x8, 0x100000000, 0x2, 0x8, 0xf32, 0x4, 0x6, 0x80}) clock_adjtime(0x2, &(0x7f0000000100)={0xd9, 0x9, 0x1, 0x2, 0x1f, 0x78, 0x4b1, 0x0, 0x401, 0x5, 0x8, 0x1, 0x101, 0x100000001, 0x7, 0x1fc, 0x9, 0x9, 0x0, 0x9, 0x8, 0x3, 0xff, 0x7, 0x73, 0x946c}) clock_adjtime(0x6, &(0x7f0000000200)={0x4, 0x1, 0x100, 0x6, 0x2, 0x6, 0x1, 0x1dd, 0x9, 0x1000000000000000, 0x0, 0x6, 0x1, 0x1, 0x9, 0x5, 0x3023, 0x2, 0x4, 0xfffffffffffffff9, 0x429, 0x3, 0x0, 0x9, 0xffffffffffffff05, 0x1000}) clock_adjtime(0x3, &(0x7f0000000300)={0x0, 0x8, 0x9, 0x9, 0x9, 0x9, 0x6, 0x9, 0x8, 0x1, 0xd0fc, 0x55, 0x2, 0x0, 0x1, 0x1f, 0x100000001, 0x8f44, 0x53, 0x0, 0x3, 0x140000000000, 0x9, 0x8000, 0x0, 0x10001}) r0 = syz_mount_image$iso9660(&(0x7f0000000400), &(0x7f0000000440)='./file0\x00', 0x4, 0x1, &(0x7f0000000480)=[{0xfffffffffffffffe, 0x0, 0x3}], 0x2014400, &(0x7f00000004c0)={[{@check_relaxed}, {@dmode}, {@check_relaxed}], [{@euid_lt={'euid<', 0xee01}}, {@euid_eq}, {@rootcontext={'rootcontext', 0x3d, 'staff_u'}}, {@obj_user={'obj_user', 0x3d, '#-_'}}, {@rootcontext={'rootcontext', 0x3d, 'staff_u'}}]}) faccessat(r0, &(0x7f0000000580)='./file0\x00', 0x88) clock_adjtime(0x4, &(0x7f00000005c0)={0x80000000, 0x100000000, 0xba, 0x80000000, 0x4, 0x20d4e190, 0x7, 0x400, 0x33, 0x7a, 0x1, 0x465d, 0x7f, 0x5, 0x3, 0x1, 0x0, 0x8, 0x7, 0x7ff, 0x1, 0x4, 0x3f, 0x7fff, 0x700b, 0x96}) r1 = accept$unix(0xffffffffffffffff, 0x0, &(0x7f00000006c0)) getsockname$unix(r1, &(0x7f0000000700), &(0x7f0000000780)=0x6e) clock_adjtime(0x3, &(0x7f00000007c0)={0x6, 0x6, 0x7, 0x8000, 0x7ff, 0x5c, 0x401, 0x2, 0x9, 0x4, 0x0, 0x61, 0x2, 0x9b71, 0x100000000, 0x7fffffff, 0x322, 0xc70d, 0x9, 0xd, 0x9, 0x0, 0x9, 0x1a1f00000000, 0xffffffffffffffff, 0x9}) clock_adjtime(0x6, &(0x7f00000008c0)={0x4, 0x9, 0x3, 0xfffffffffffffff7, 0xb31, 0x1, 0x1, 0x2, 0x538, 0x0, 0x401, 0x1, 0xdd, 0xfffffffffffffff7, 0xec54, 0x4, 0x100000001, 0x0, 0xa, 0x1, 0x7ff, 0xcd, 0xf2, 0x80, 0x7, 0x8000}) clock_adjtime(0x0, &(0x7f00000009c0)={0x8, 0xff, 0x81, 0x2, 0x100000001, 0x11, 0x5, 0x1, 0x1, 0x9, 0x1000, 0x8, 0xdf6c, 0x9, 0x8, 0x1004000000000000, 0x1ff, 0x3, 0x6, 0xf5, 0x80000, 0x1, 0xfffffffffffffd6d, 0x2, 0x6, 0xfa}) r2 = socket$unix(0x1, 0x5, 0x0) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f0000000ac0)={'wlan0\x00'}) mq_timedreceive(0xffffffffffffffff, &(0x7f0000000b00)=""/4096, 0x1000, 0x80, &(0x7f0000001b00)={0x0, 0x989680}) r3 = creat(&(0x7f0000001b40)='./file0\x00', 0x1) mknodat(r3, &(0x7f0000001b80)='./file1\x00', 0x4, 0x0) clock_adjtime(0x0, &(0x7f0000001bc0)={0xfff, 0x7fff, 0x0, 0x2, 0xfdc, 0x54, 0x8fa, 0x3f41, 0x0, 0x4, 0x4, 0x5, 0x101, 0x5, 0x4, 0x9, 0x9, 0x30e, 0x3f, 0x2, 0x7f, 0x7, 0x6, 0x4, 0x3ff, 0x100000000}) clock_adjtime(0x2, &(0x7f0000001cc0)={0x0, 0x6, 0x7, 0xe5, 0x5, 0x6, 0x10, 0x7, 0x281, 0x40, 0x1, 0x0, 0x1, 0x10001, 0x5, 0x0, 0x0, 0x4, 0xffffffffffffe001, 0xdf, 0x7f, 0x8000, 0x9, 0x400, 0xfffffffffffffe00, 0x3f}) 17:04:21 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc01000a, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001", 0x4d, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000003980)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d0f465001000005fd0f4655f00000000000001", 0x1b, 0x11100}], 0x0, &(0x7f00000000c0)) [ 309.287963][T18559] loop4: detected capacity change from 0 to 264192 [ 309.290025][T18561] loop3: detected capacity change from 0 to 264192 [ 309.302949][T18562] loop5: detected capacity change from 0 to 264192 [ 309.313818][T18560] SELinux: duplicate or incompatible mount options [ 309.320230][T18564] FAULT_INJECTION: forcing a failure. [ 309.320230][T18564] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 309.333490][T18564] CPU: 0 PID: 18564 Comm: syz-executor.0 Not tainted 5.16.0-syzkaller #0 [ 309.341929][T18564] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 309.352134][T18564] Call Trace: [ 309.355422][T18564] [ 309.358426][T18564] dump_stack_lvl+0xd6/0x122 [ 309.363021][T18564] dump_stack+0x11/0x1b [ 309.367212][T18564] should_fail+0x23c/0x250 [ 309.371618][T18564] should_fail_usercopy+0x16/0x20 [ 309.376641][T18564] copy_page_from_iter_atomic+0x2f1/0xc60 [ 309.382351][T18564] ? shmem_write_begin+0x7e/0x100 [ 309.387367][T18564] generic_perform_write+0x211/0x400 [ 309.392680][T18564] ? current_time+0xed/0x1a0 [ 309.397301][T18564] __generic_file_write_iter+0xf7/0x2b0 [ 309.402909][T18564] ? generic_write_checks+0x250/0x290 [ 309.408270][T18564] generic_file_write_iter+0x75/0x130 [ 309.413982][T18564] vfs_write+0x7f5/0x950 [ 309.418220][T18564] __x64_sys_pwrite64+0xf5/0x150 [ 309.423145][T18564] do_syscall_64+0x44/0xd0 [ 309.427553][T18564] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 309.433441][T18564] RIP: 0033:0x7f1cb8ab2e67 [ 309.437843][T18564] Code: 08 89 3c 24 48 89 4c 24 18 e8 e5 f8 ff ff 4c 8b 54 24 18 48 8b 54 24 10 41 89 c0 48 8b 74 24 08 8b 3c 24 b8 12 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 31 44 89 c7 48 89 04 24 e8 15 f9 ff ff 48 8b [ 309.457609][T18564] RSP: 002b:00007f1cb7c75f00 EFLAGS: 00000293 ORIG_RAX: 0000000000000012 [ 309.466150][T18564] RAX: ffffffffffffffda RBX: 00007f1cb8b499c8 RCX: 00007f1cb8ab2e67 [ 309.474109][T18564] RDX: 0000000000000001 RSI: 0000000020010300 RDI: 0000000000000004 17:04:21 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc01000a, 0x7, &(0x7f0000000200)=[{0x0, 0x0, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000003980)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="80", 0x1, 0x11100}], 0x0, &(0x7f00000000c0)) [ 309.482072][T18564] RBP: 0000000000000008 R08: 0000000000000000 R09: 00007f1cb7c761d0 [ 309.490231][T18564] R10: 0000000000000640 R11: 0000000000000293 R12: 0000000000000004 [ 309.498186][T18564] R13: 0000000000000004 R14: 0000000020000230 R15: 0000000000000002 [ 309.506192][T18564] [ 309.515609][T18567] loop1: detected capacity change from 0 to 264192 [ 309.517174][T18564] loop0: detected capacity change from 0 to 264192 [ 309.529105][T18562] EXT4-fs (loop5): VFS: Can't find ext4 filesystem [ 309.561251][T18559] EXT4-fs (loop4): VFS: Can't find ext4 filesystem [ 309.575235][T18567] EXT4-fs (loop1): invalid first ino: 0 [ 309.606661][T18564] EXT4-fs warning (device loop0): ext4_enable_quotas:6363: Failed to enable quota tracking (type=0, err=-22). Please run e2fsck to fix. [ 309.606691][T18561] EXT4-fs error (device loop3): ext4_orphan_get:1419: comm syz-executor.3: bad orphan inode 17 [ 309.629254][T18576] loop5: detected capacity change from 0 to 264192 [ 309.632073][T18561] ext4_test_bit(bit=16, block=18) = 0 [ 309.643043][T18561] EXT4-fs (loop3): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: writeback. 17:04:25 executing program 2: clock_adjtime(0x7, &(0x7f0000000000)={0x8000, 0x62, 0xff, 0x1, 0x3, 0x1ff, 0x3ff, 0x4, 0xff, 0x20, 0x6, 0x401, 0x20, 0x0, 0x1ff, 0x8000, 0xfffffffffffffffd, 0x400, 0x8, 0x100000000, 0x2, 0x8, 0xf32, 0x4, 0x6, 0x80}) clock_adjtime(0x2, &(0x7f0000000100)={0xd9, 0x9, 0x1, 0x2, 0x1f, 0x78, 0x4b1, 0x0, 0x401, 0x5, 0x8, 0x1, 0x101, 0x100000001, 0x7, 0x1fc, 0x9, 0x9, 0x0, 0x9, 0x8, 0x3, 0xff, 0x7, 0x73, 0x946c}) clock_adjtime(0x6, &(0x7f0000000200)={0x4, 0x1, 0x100, 0x6, 0x2, 0x6, 0x1, 0x1dd, 0x9, 0x1000000000000000, 0x0, 0x6, 0x1, 0x1, 0x9, 0x5, 0x3023, 0x2, 0x4, 0xfffffffffffffff9, 0x429, 0x3, 0x0, 0x9, 0xffffffffffffff05, 0x1000}) clock_adjtime(0x3, &(0x7f0000000300)={0x0, 0x8, 0x9, 0x9, 0x9, 0x9, 0x6, 0x9, 0x8, 0x1, 0xd0fc, 0x55, 0x2, 0x0, 0x1, 0x1f, 0x100000001, 0x8f44, 0x53, 0x0, 0x3, 0x140000000000, 0x9, 0x8000, 0x0, 0x10001}) r0 = syz_mount_image$iso9660(&(0x7f0000000400), &(0x7f0000000440)='./file0\x00', 0x4, 0x1, &(0x7f0000000480)=[{0xfffffffffffffffe, 0x0, 0x3}], 0x2014400, &(0x7f00000004c0)={[{@check_relaxed}, {@dmode}, {@check_relaxed}], [{@euid_lt={'euid<', 0xee01}}, {@euid_eq}, {@rootcontext={'rootcontext', 0x3d, 'staff_u'}}, {@obj_user={'obj_user', 0x3d, '#-_'}}, {@rootcontext={'rootcontext', 0x3d, 'staff_u'}}]}) faccessat(r0, &(0x7f0000000580)='./file0\x00', 0x88) clock_adjtime(0x4, &(0x7f00000005c0)={0x80000000, 0x100000000, 0xba, 0x80000000, 0x4, 0x20d4e190, 0x7, 0x400, 0x33, 0x7a, 0x1, 0x465d, 0x7f, 0x5, 0x3, 0x1, 0x0, 0x8, 0x7, 0x7ff, 0x1, 0x4, 0x3f, 0x7fff, 0x700b, 0x96}) r1 = accept$unix(0xffffffffffffffff, 0x0, &(0x7f00000006c0)) getsockname$unix(r1, &(0x7f0000000700), &(0x7f0000000780)=0x6e) clock_adjtime(0x3, &(0x7f00000007c0)={0x6, 0x6, 0x7, 0x8000, 0x7ff, 0x5c, 0x401, 0x2, 0x9, 0x4, 0x0, 0x61, 0x2, 0x9b71, 0x100000000, 0x7fffffff, 0x322, 0xc70d, 0x9, 0xd, 0x9, 0x0, 0x9, 0x1a1f00000000, 0xffffffffffffffff, 0x9}) clock_adjtime(0x6, &(0x7f00000008c0)={0x4, 0x9, 0x3, 0xfffffffffffffff7, 0xb31, 0x1, 0x1, 0x2, 0x538, 0x0, 0x401, 0x1, 0xdd, 0xfffffffffffffff7, 0xec54, 0x4, 0x100000001, 0x0, 0xa, 0x1, 0x7ff, 0xcd, 0xf2, 0x80, 0x7, 0x8000}) clock_adjtime(0x0, &(0x7f00000009c0)={0x8, 0xff, 0x81, 0x2, 0x100000001, 0x11, 0x5, 0x1, 0x1, 0x9, 0x1000, 0x8, 0xdf6c, 0x9, 0x8, 0x1004000000000000, 0x1ff, 0x3, 0x6, 0xf5, 0x80000, 0x1, 0xfffffffffffffd6d, 0x2, 0x6, 0xfa}) r2 = socket$unix(0x1, 0x5, 0x0) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f0000000ac0)={'wlan0\x00'}) mq_timedreceive(0xffffffffffffffff, &(0x7f0000000b00)=""/4096, 0x1000, 0x80, &(0x7f0000001b00)={0x0, 0x989680}) r3 = creat(&(0x7f0000001b40)='./file0\x00', 0x1) mknodat(r3, &(0x7f0000001b80)='./file1\x00', 0x4, 0x0) clock_adjtime(0x0, &(0x7f0000001bc0)={0xfff, 0x7fff, 0x0, 0x2, 0xfdc, 0x54, 0x8fa, 0x3f41, 0x0, 0x4, 0x4, 0x5, 0x101, 0x5, 0x4, 0x9, 0x9, 0x30e, 0x3f, 0x2, 0x7f, 0x7, 0x6, 0x4, 0x3ff, 0x100000000}) clock_adjtime(0x2, &(0x7f0000001cc0)={0x0, 0x6, 0x7, 0xe5, 0x5, 0x6, 0x10, 0x7, 0x281, 0x40, 0x1, 0x0, 0x1, 0x10001, 0x5, 0x0, 0x0, 0x4, 0xffffffffffffe001, 0xdf, 0x7f, 0x8000, 0x9, 0x400, 0xfffffffffffffe00, 0x3f}) 17:04:25 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc01000a, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001", 0x4d, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000003980)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d0f465001000005fd0f4655f00000000000001", 0x1b, 0x11100}], 0x0, &(0x7f00000000c0)) 17:04:26 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc01000a, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000003980)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d9", 0x4, 0x6800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d0f465001000005fd0f4655f00000000000001000c00000010000800000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}], 0x0, &(0x7f00000000c0)) (fail_nth: 12) [ 309.655762][T18561] ext4 filesystem being mounted at /root/syzkaller-testdir350550748/syzkaller.ONiyFI/852/file0 supports timestamps until 2038 (0x7fffffff) [ 309.690492][T18564] EXT4-fs (loop0): mount failed [ 309.698987][T18576] EXT4-fs (loop5): VFS: Can't find ext4 filesystem 17:04:26 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc01000a, 0x6, &(0x7f0000000200)=[{&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000003980)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d0f465001000005fd0f4655f00000000000001000c00000010000800000000000af3010004", 0x2d, 0x11100}], 0x0, &(0x7f00000000c0)) [ 309.721028][T18578] loop1: detected capacity change from 0 to 264192 [ 309.746495][T18581] SELinux: duplicate or incompatible mount options [ 309.767453][T18584] loop4: detected capacity change from 0 to 264192 [ 309.767680][T18582] FAULT_INJECTION: forcing a failure. [ 309.767680][T18582] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 309.783652][T18578] EXT4-fs (loop1): invalid first ino: 0 [ 309.787282][T18582] CPU: 1 PID: 18582 Comm: syz-executor.0 Not tainted 5.16.0-syzkaller #0 [ 309.801348][T18582] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 309.811590][T18582] Call Trace: [ 309.814866][T18582] [ 309.817795][T18582] dump_stack_lvl+0xd6/0x122 [ 309.822385][T18582] dump_stack+0x11/0x1b [ 309.826532][T18582] should_fail+0x23c/0x250 [ 309.830934][T18582] should_fail_usercopy+0x16/0x20 [ 309.835948][T18582] copy_page_from_iter_atomic+0x2f1/0xc60 [ 309.841833][T18582] ? shmem_write_begin+0x7e/0x100 [ 309.846926][T18582] generic_perform_write+0x211/0x400 [ 309.852205][T18582] ? current_time+0xed/0x1a0 [ 309.856784][T18582] __generic_file_write_iter+0xf7/0x2b0 [ 309.862322][T18582] ? generic_write_checks+0x250/0x290 [ 309.867683][T18582] generic_file_write_iter+0x75/0x130 [ 309.873125][T18582] vfs_write+0x7f5/0x950 [ 309.877420][T18582] __x64_sys_pwrite64+0xf5/0x150 [ 309.882347][T18582] do_syscall_64+0x44/0xd0 [ 309.886798][T18582] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 309.892736][T18582] RIP: 0033:0x7f1cb8ab2e67 [ 309.897145][T18582] Code: 08 89 3c 24 48 89 4c 24 18 e8 e5 f8 ff ff 4c 8b 54 24 18 48 8b 54 24 10 41 89 c0 48 8b 74 24 08 8b 3c 24 b8 12 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 31 44 89 c7 48 89 04 24 e8 15 f9 ff ff 48 8b [ 309.916912][T18582] RSP: 002b:00007f1cb7c75f00 EFLAGS: 00000293 ORIG_RAX: 0000000000000012 [ 309.925315][T18582] RAX: ffffffffffffffda RBX: 00007f1cb8b499c8 RCX: 00007f1cb8ab2e67 [ 309.933308][T18582] RDX: 0000000000000009 RSI: 0000000020010400 RDI: 0000000000000004 [ 309.941515][T18582] RBP: 0000000000000008 R08: 0000000000000000 R09: 00007f1cb7c761d0 [ 309.949476][T18582] R10: 0000000000000800 R11: 0000000000000293 R12: 0000000000000004 [ 309.957530][T18582] R13: 0000000000000004 R14: 0000000020000248 R15: 0000000000000003 [ 309.965521][T18582] 17:04:26 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc01000a, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000011", 0x9, 0x4e0}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {0x0, 0x0, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000003980)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d0f465001000005fd0f4655f00000000000001000c000000100008", 0x23, 0x11100}], 0x0, &(0x7f00000000c0)) [ 309.970457][T18582] loop0: detected capacity change from 0 to 264192 17:04:30 executing program 2: clock_adjtime(0x7, &(0x7f0000000000)={0x8000, 0x62, 0xff, 0x1, 0x3, 0x1ff, 0x3ff, 0x4, 0xff, 0x20, 0x6, 0x401, 0x20, 0x0, 0x1ff, 0x8000, 0xfffffffffffffffd, 0x400, 0x8, 0x100000000, 0x2, 0x8, 0xf32, 0x4, 0x6, 0x80}) clock_adjtime(0x2, &(0x7f0000000100)={0xd9, 0x9, 0x1, 0x2, 0x1f, 0x78, 0x4b1, 0x0, 0x401, 0x5, 0x8, 0x1, 0x101, 0x100000001, 0x7, 0x1fc, 0x9, 0x9, 0x0, 0x9, 0x8, 0x3, 0xff, 0x7, 0x73, 0x946c}) clock_adjtime(0x6, &(0x7f0000000200)={0x4, 0x1, 0x100, 0x6, 0x2, 0x6, 0x1, 0x1dd, 0x9, 0x1000000000000000, 0x0, 0x6, 0x1, 0x1, 0x9, 0x5, 0x3023, 0x2, 0x4, 0xfffffffffffffff9, 0x429, 0x3, 0x0, 0x9, 0xffffffffffffff05, 0x1000}) clock_adjtime(0x3, &(0x7f0000000300)={0x0, 0x8, 0x9, 0x9, 0x9, 0x9, 0x6, 0x9, 0x8, 0x1, 0xd0fc, 0x55, 0x2, 0x0, 0x1, 0x1f, 0x100000001, 0x8f44, 0x53, 0x0, 0x3, 0x140000000000, 0x9, 0x8000, 0x0, 0x10001}) r0 = syz_mount_image$iso9660(&(0x7f0000000400), &(0x7f0000000440)='./file0\x00', 0x4, 0x1, &(0x7f0000000480)=[{0xfffffffffffffffe, 0x0, 0x3}], 0x2014400, &(0x7f00000004c0)={[{@check_relaxed}, {@dmode}, {@check_relaxed}], [{@euid_lt={'euid<', 0xee01}}, {@euid_eq}, {@rootcontext={'rootcontext', 0x3d, 'staff_u'}}, {@obj_user={'obj_user', 0x3d, '#-_'}}, {@rootcontext={'rootcontext', 0x3d, 'staff_u'}}]}) faccessat(r0, &(0x7f0000000580)='./file0\x00', 0x88) clock_adjtime(0x4, &(0x7f00000005c0)={0x80000000, 0x100000000, 0xba, 0x80000000, 0x4, 0x20d4e190, 0x7, 0x400, 0x33, 0x7a, 0x1, 0x465d, 0x7f, 0x5, 0x3, 0x1, 0x0, 0x8, 0x7, 0x7ff, 0x1, 0x4, 0x3f, 0x7fff, 0x700b, 0x96}) r1 = accept$unix(0xffffffffffffffff, 0x0, &(0x7f00000006c0)) getsockname$unix(r1, &(0x7f0000000700), &(0x7f0000000780)=0x6e) clock_adjtime(0x3, &(0x7f00000007c0)={0x6, 0x6, 0x7, 0x8000, 0x7ff, 0x5c, 0x401, 0x2, 0x9, 0x4, 0x0, 0x61, 0x2, 0x9b71, 0x100000000, 0x7fffffff, 0x322, 0xc70d, 0x9, 0xd, 0x9, 0x0, 0x9, 0x1a1f00000000, 0xffffffffffffffff, 0x9}) clock_adjtime(0x6, &(0x7f00000008c0)={0x4, 0x9, 0x3, 0xfffffffffffffff7, 0xb31, 0x1, 0x1, 0x2, 0x538, 0x0, 0x401, 0x1, 0xdd, 0xfffffffffffffff7, 0xec54, 0x4, 0x100000001, 0x0, 0xa, 0x1, 0x7ff, 0xcd, 0xf2, 0x80, 0x7, 0x8000}) clock_adjtime(0x0, &(0x7f00000009c0)={0x8, 0xff, 0x81, 0x2, 0x100000001, 0x11, 0x5, 0x1, 0x1, 0x9, 0x1000, 0x8, 0xdf6c, 0x9, 0x8, 0x1004000000000000, 0x1ff, 0x3, 0x6, 0xf5, 0x80000, 0x1, 0xfffffffffffffd6d, 0x2, 0x6, 0xfa}) r2 = socket$unix(0x1, 0x5, 0x0) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f0000000ac0)={'wlan0\x00'}) mq_timedreceive(0xffffffffffffffff, &(0x7f0000000b00)=""/4096, 0x1000, 0x80, &(0x7f0000001b00)={0x0, 0x989680}) r3 = creat(&(0x7f0000001b40)='./file0\x00', 0x1) mknodat(r3, &(0x7f0000001b80)='./file1\x00', 0x4, 0x0) clock_adjtime(0x0, &(0x7f0000001bc0)={0xfff, 0x7fff, 0x0, 0x2, 0xfdc, 0x54, 0x8fa, 0x3f41, 0x0, 0x4, 0x4, 0x5, 0x101, 0x5, 0x4, 0x9, 0x9, 0x30e, 0x3f, 0x2, 0x7f, 0x7, 0x6, 0x4, 0x3ff, 0x100000000}) clock_adjtime(0x2, &(0x7f0000001cc0)={0x0, 0x6, 0x7, 0xe5, 0x5, 0x6, 0x10, 0x7, 0x281, 0x40, 0x1, 0x0, 0x1, 0x10001, 0x5, 0x100, 0x0, 0x0, 0xffffffffffffe001, 0xdf, 0x7f, 0x8000, 0x9, 0x400, 0xfffffffffffffe00, 0x3f}) 17:04:30 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc01000a, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000", 0x5a, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000003980)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d0f465001000005fd0f4655f00000000000001", 0x1b, 0x11100}], 0x0, &(0x7f00000000c0)) 17:04:30 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc01000a, 0x6, &(0x7f0000000200)=[{&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000003980)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d0f465001000005fd0f4655f00000000000001000c00000010000800000000000af3010004", 0x2d, 0x11100}], 0x0, &(0x7f00000000c0)) [ 309.997634][T18584] EXT4-fs (loop4): VFS: Can't find ext4 filesystem 17:04:30 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc01000a, 0x7, &(0x7f0000000200)=[{0x0, 0x0, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000003980)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="80", 0x1, 0x11100}], 0x0, &(0x7f00000000c0)) [ 310.051222][T18591] SELinux: duplicate or incompatible mount options [ 310.059522][T18593] loop1: detected capacity change from 0 to 264192 [ 310.073083][T18596] loop5: detected capacity change from 0 to 264192 [ 310.076217][T18593] EXT4-fs (loop1): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: none. [ 310.094601][T18590] loop4: detected capacity change from 0 to 264192 [ 310.097979][T18598] loop3: detected capacity change from 0 to 264192 [ 310.104788][T18596] EXT4-fs (loop5): VFS: Can't find ext4 filesystem [ 310.107819][T18593] ext4 filesystem being mounted at /root/syzkaller-testdir268235930/syzkaller.DrjInB/767/file0 supports timestamps until 2038 (0x7fffffff) 17:04:34 executing program 2: clock_adjtime(0x7, &(0x7f0000000000)={0x8000, 0x62, 0xff, 0x1, 0x3, 0x1ff, 0x3ff, 0x4, 0xff, 0x20, 0x6, 0x401, 0x20, 0x0, 0x1ff, 0x8000, 0xfffffffffffffffd, 0x400, 0x8, 0x100000000, 0x2, 0x8, 0xf32, 0x4, 0x6, 0x80}) clock_adjtime(0x2, &(0x7f0000000100)={0xd9, 0x9, 0x1, 0x2, 0x1f, 0x78, 0x4b1, 0x0, 0x401, 0x5, 0x8, 0x1, 0x101, 0x100000001, 0x7, 0x1fc, 0x9, 0x9, 0x0, 0x9, 0x8, 0x3, 0xff, 0x7, 0x73, 0x946c}) clock_adjtime(0x6, &(0x7f0000000200)={0x4, 0x1, 0x100, 0x6, 0x2, 0x6, 0x1, 0x1dd, 0x9, 0x1000000000000000, 0x0, 0x6, 0x1, 0x1, 0x9, 0x5, 0x3023, 0x2, 0x4, 0xfffffffffffffff9, 0x429, 0x3, 0x0, 0x9, 0xffffffffffffff05, 0x1000}) clock_adjtime(0x3, &(0x7f0000000300)={0x0, 0x8, 0x9, 0x9, 0x9, 0x9, 0x6, 0x9, 0x8, 0x1, 0xd0fc, 0x55, 0x2, 0x0, 0x1, 0x1f, 0x100000001, 0x8f44, 0x53, 0x0, 0x3, 0x140000000000, 0x9, 0x8000, 0x0, 0x10001}) r0 = syz_mount_image$iso9660(&(0x7f0000000400), &(0x7f0000000440)='./file0\x00', 0x4, 0x1, &(0x7f0000000480)=[{0xfffffffffffffffe, 0x0, 0x3}], 0x2014400, &(0x7f00000004c0)={[{@check_relaxed}, {@dmode}, {@check_relaxed}], [{@euid_lt={'euid<', 0xee01}}, {@euid_eq}, {@rootcontext={'rootcontext', 0x3d, 'staff_u'}}, {@obj_user={'obj_user', 0x3d, '#-_'}}, {@rootcontext={'rootcontext', 0x3d, 'staff_u'}}]}) faccessat(r0, &(0x7f0000000580)='./file0\x00', 0x88) clock_adjtime(0x4, &(0x7f00000005c0)={0x80000000, 0x100000000, 0xba, 0x80000000, 0x4, 0x20d4e190, 0x7, 0x400, 0x33, 0x7a, 0x1, 0x465d, 0x7f, 0x5, 0x3, 0x1, 0x0, 0x8, 0x7, 0x7ff, 0x1, 0x4, 0x3f, 0x7fff, 0x700b, 0x96}) r1 = accept$unix(0xffffffffffffffff, 0x0, &(0x7f00000006c0)) getsockname$unix(r1, &(0x7f0000000700), &(0x7f0000000780)=0x6e) clock_adjtime(0x3, &(0x7f00000007c0)={0x6, 0x6, 0x7, 0x8000, 0x7ff, 0x5c, 0x401, 0x2, 0x9, 0x4, 0x0, 0x61, 0x2, 0x9b71, 0x100000000, 0x7fffffff, 0x322, 0xc70d, 0x9, 0xd, 0x9, 0x0, 0x9, 0x1a1f00000000, 0xffffffffffffffff, 0x9}) clock_adjtime(0x6, &(0x7f00000008c0)={0x4, 0x9, 0x3, 0xfffffffffffffff7, 0xb31, 0x1, 0x1, 0x2, 0x538, 0x0, 0x401, 0x1, 0xdd, 0xfffffffffffffff7, 0xec54, 0x4, 0x100000001, 0x0, 0xa, 0x1, 0x7ff, 0xcd, 0xf2, 0x80, 0x7, 0x8000}) clock_adjtime(0x0, &(0x7f00000009c0)={0x8, 0xff, 0x81, 0x2, 0x100000001, 0x11, 0x5, 0x1, 0x1, 0x9, 0x1000, 0x8, 0xdf6c, 0x9, 0x8, 0x1004000000000000, 0x1ff, 0x3, 0x6, 0xf5, 0x80000, 0x1, 0xfffffffffffffd6d, 0x2, 0x6, 0xfa}) r2 = socket$unix(0x1, 0x5, 0x0) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f0000000ac0)={'wlan0\x00'}) mq_timedreceive(0xffffffffffffffff, &(0x7f0000000b00)=""/4096, 0x1000, 0x80, &(0x7f0000001b00)={0x0, 0x989680}) r3 = creat(&(0x7f0000001b40)='./file0\x00', 0x1) mknodat(r3, &(0x7f0000001b80)='./file1\x00', 0x4, 0x0) clock_adjtime(0x0, &(0x7f0000001bc0)={0xfff, 0x7fff, 0x0, 0x2, 0xfdc, 0x54, 0x8fa, 0x3f41, 0x0, 0x4, 0x4, 0x5, 0x101, 0x5, 0x4, 0x9, 0x9, 0x30e, 0x3f, 0x2, 0x7f, 0x7, 0x6, 0x4, 0x3ff, 0x100000000}) clock_adjtime(0x2, &(0x7f0000001cc0)={0x0, 0x6, 0x7, 0xe5, 0x5, 0x6, 0x10, 0x7, 0x281, 0x40, 0x1, 0x0, 0x1, 0x10001, 0x5, 0x100, 0x0, 0x0, 0xffffffffffffe001, 0xdf, 0x7f, 0x8000, 0x9, 0x400, 0xfffffffffffffe00, 0x3f}) 17:04:34 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc01000a, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000", 0x5a, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000003980)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d0f465001000005fd0f4655f00000000000001", 0x1b, 0x11100}], 0x0, &(0x7f00000000c0)) [ 310.151642][T18582] EXT4-fs warning (device loop0): ext4_enable_quotas:6363: Failed to enable quota tracking (type=0, err=-22). Please run e2fsck to fix. 17:04:34 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc01000a, 0x7, &(0x7f0000000200)=[{0x0, 0x0, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000003980)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d0f465001000005fd0f4655f00000000000001000c00000010000800000000000af3010004", 0x2d, 0x11100}], 0x0, &(0x7f00000000c0)) 17:04:34 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc01000a, 0x7, &(0x7f0000000200)=[{0x0, 0x0, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000003980)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="80", 0x1, 0x11100}], 0x0, &(0x7f00000000c0)) [ 310.193066][T18582] EXT4-fs (loop0): mount failed [ 310.198378][T18590] EXT4-fs (loop4): VFS: Can't find ext4 filesystem [ 310.207970][T18604] SELinux: duplicate or incompatible mount options 17:04:34 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc01000a, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000003980)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d9", 0x4, 0x6800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d0f465001000005fd0f4655f00000000000001000c00000010000800000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}], 0x0, &(0x7f00000000c0)) (fail_nth: 13) [ 310.262202][T18612] loop5: detected capacity change from 0 to 264192 [ 310.262696][T18598] EXT4-fs error (device loop3): ext4_orphan_get:1419: comm syz-executor.3: bad orphan inode 17 [ 310.275178][T18612] EXT4-fs (loop5): VFS: Can't find ext4 filesystem [ 310.286063][T18611] loop4: detected capacity change from 0 to 264192 [ 310.294375][T18611] EXT4-fs (loop4): VFS: Can't find ext4 filesystem [ 310.294814][T18607] loop1: detected capacity change from 0 to 264192 [ 310.308326][T18598] ext4_test_bit(bit=16, block=18) = 0 [ 310.313945][T18598] EXT4-fs (loop3): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: writeback. [ 310.325542][T18598] ext4 filesystem being mounted at /root/syzkaller-testdir350550748/syzkaller.ONiyFI/853/file0 supports timestamps until 2038 (0x7fffffff) 17:04:34 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc01000a, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000), 0x0, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000003980)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="80", 0x1, 0x11100}], 0x0, &(0x7f00000000c0)) 17:04:38 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc01000a, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000011", 0x9, 0x4e0}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {0x0, 0x0, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000003980)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d0f465001000005fd0f4655f00000000000001000c000000100008", 0x23, 0x11100}], 0x0, &(0x7f00000000c0)) 17:04:38 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc01000a, 0x7, &(0x7f0000000200)=[{0x0, 0x0, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000003980)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d0f465001000005fd0f4655f00000000000001000c00000010000800000000000af3010004", 0x2d, 0x11100}], 0x0, &(0x7f00000000c0)) [ 310.362334][T18607] EXT4-fs (loop1): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: none. [ 310.373341][T18607] ext4 filesystem being mounted at /root/syzkaller-testdir268235930/syzkaller.DrjInB/768/file0 supports timestamps until 2038 (0x7fffffff) [ 310.394382][T18615] FAULT_INJECTION: forcing a failure. [ 310.394382][T18615] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 310.407859][T18615] CPU: 0 PID: 18615 Comm: syz-executor.0 Not tainted 5.16.0-syzkaller #0 [ 310.416287][T18615] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 310.426354][T18615] Call Trace: [ 310.429644][T18615] [ 310.432584][T18615] dump_stack_lvl+0xd6/0x122 [ 310.437207][T18615] dump_stack+0x11/0x1b [ 310.441448][T18615] should_fail+0x23c/0x250 [ 310.445883][T18615] __alloc_pages+0x102/0x330 [ 310.450496][T18615] alloc_pages_vma+0x5ee/0x770 [ 310.455356][T18615] shmem_getpage_gfp+0x8bc/0x12c0 [ 310.460398][T18615] shmem_write_begin+0x7e/0x100 [ 310.465413][T18615] generic_perform_write+0x1c8/0x400 [ 310.471066][T18615] ? current_time+0xed/0x1a0 [ 310.475677][T18615] __generic_file_write_iter+0xf7/0x2b0 [ 310.481267][T18615] ? generic_write_checks+0x250/0x290 [ 310.486673][T18615] generic_file_write_iter+0x75/0x130 [ 310.489222][T18622] SELinux: duplicate or incompatible mount options [ 310.492153][T18615] vfs_write+0x7f5/0x950 [ 310.492235][T18615] __x64_sys_pwrite64+0xf5/0x150 [ 310.507910][T18615] do_syscall_64+0x44/0xd0 [ 310.512342][T18615] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 310.518267][T18615] RIP: 0033:0x7f1cb8ab2e67 [ 310.522713][T18615] Code: 08 89 3c 24 48 89 4c 24 18 e8 e5 f8 ff ff 4c 8b 54 24 18 48 8b 54 24 10 41 89 c0 48 8b 74 24 08 8b 3c 24 b8 12 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 31 44 89 c7 48 89 04 24 e8 15 f9 ff ff 48 8b [ 310.542417][T18615] RSP: 002b:00007f1cb7c75f00 EFLAGS: 00000293 ORIG_RAX: 0000000000000012 [ 310.550842][T18615] RAX: ffffffffffffffda RBX: 00007f1cb8b499c8 RCX: 00007f1cb8ab2e67 17:04:38 executing program 2: clock_adjtime(0x7, &(0x7f0000000000)={0x8000, 0x62, 0xff, 0x1, 0x3, 0x1ff, 0x3ff, 0x4, 0xff, 0x20, 0x6, 0x401, 0x20, 0x0, 0x1ff, 0x8000, 0xfffffffffffffffd, 0x400, 0x8, 0x100000000, 0x2, 0x8, 0xf32, 0x4, 0x6, 0x80}) clock_adjtime(0x2, &(0x7f0000000100)={0xd9, 0x9, 0x1, 0x2, 0x1f, 0x78, 0x4b1, 0x0, 0x401, 0x5, 0x8, 0x1, 0x101, 0x100000001, 0x7, 0x1fc, 0x9, 0x9, 0x0, 0x9, 0x8, 0x3, 0xff, 0x7, 0x73, 0x946c}) clock_adjtime(0x6, &(0x7f0000000200)={0x4, 0x1, 0x100, 0x6, 0x2, 0x6, 0x1, 0x1dd, 0x9, 0x1000000000000000, 0x0, 0x6, 0x1, 0x1, 0x9, 0x5, 0x3023, 0x2, 0x4, 0xfffffffffffffff9, 0x429, 0x3, 0x0, 0x9, 0xffffffffffffff05, 0x1000}) clock_adjtime(0x3, &(0x7f0000000300)={0x0, 0x8, 0x9, 0x9, 0x9, 0x9, 0x6, 0x9, 0x8, 0x1, 0xd0fc, 0x55, 0x2, 0x0, 0x1, 0x1f, 0x100000001, 0x8f44, 0x53, 0x0, 0x3, 0x140000000000, 0x9, 0x8000, 0x0, 0x10001}) r0 = syz_mount_image$iso9660(&(0x7f0000000400), &(0x7f0000000440)='./file0\x00', 0x4, 0x1, &(0x7f0000000480)=[{0xfffffffffffffffe, 0x0, 0x3}], 0x2014400, &(0x7f00000004c0)={[{@check_relaxed}, {@dmode}, {@check_relaxed}], [{@euid_lt={'euid<', 0xee01}}, {@euid_eq}, {@rootcontext={'rootcontext', 0x3d, 'staff_u'}}, {@obj_user={'obj_user', 0x3d, '#-_'}}, {@rootcontext={'rootcontext', 0x3d, 'staff_u'}}]}) faccessat(r0, &(0x7f0000000580)='./file0\x00', 0x88) clock_adjtime(0x4, &(0x7f00000005c0)={0x80000000, 0x100000000, 0xba, 0x80000000, 0x4, 0x20d4e190, 0x7, 0x400, 0x33, 0x7a, 0x1, 0x465d, 0x7f, 0x5, 0x3, 0x1, 0x0, 0x8, 0x7, 0x7ff, 0x1, 0x4, 0x3f, 0x7fff, 0x700b, 0x96}) r1 = accept$unix(0xffffffffffffffff, 0x0, &(0x7f00000006c0)) getsockname$unix(r1, &(0x7f0000000700), &(0x7f0000000780)=0x6e) clock_adjtime(0x3, &(0x7f00000007c0)={0x6, 0x6, 0x7, 0x8000, 0x7ff, 0x5c, 0x401, 0x2, 0x9, 0x4, 0x0, 0x61, 0x2, 0x9b71, 0x100000000, 0x7fffffff, 0x322, 0xc70d, 0x9, 0xd, 0x9, 0x0, 0x9, 0x1a1f00000000, 0xffffffffffffffff, 0x9}) clock_adjtime(0x6, &(0x7f00000008c0)={0x4, 0x9, 0x3, 0xfffffffffffffff7, 0xb31, 0x1, 0x1, 0x2, 0x538, 0x0, 0x401, 0x1, 0xdd, 0xfffffffffffffff7, 0xec54, 0x4, 0x100000001, 0x0, 0xa, 0x1, 0x7ff, 0xcd, 0xf2, 0x80, 0x7, 0x8000}) clock_adjtime(0x0, &(0x7f00000009c0)={0x8, 0xff, 0x81, 0x2, 0x100000001, 0x11, 0x5, 0x1, 0x1, 0x9, 0x1000, 0x8, 0xdf6c, 0x9, 0x8, 0x1004000000000000, 0x1ff, 0x3, 0x6, 0xf5, 0x80000, 0x1, 0xfffffffffffffd6d, 0x2, 0x6, 0xfa}) r2 = socket$unix(0x1, 0x5, 0x0) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f0000000ac0)={'wlan0\x00'}) mq_timedreceive(0xffffffffffffffff, &(0x7f0000000b00)=""/4096, 0x1000, 0x80, &(0x7f0000001b00)={0x0, 0x989680}) r3 = creat(&(0x7f0000001b40)='./file0\x00', 0x1) mknodat(r3, &(0x7f0000001b80)='./file1\x00', 0x4, 0x0) clock_adjtime(0x0, &(0x7f0000001bc0)={0xfff, 0x7fff, 0x0, 0x2, 0xfdc, 0x54, 0x8fa, 0x3f41, 0x0, 0x4, 0x4, 0x5, 0x101, 0x5, 0x4, 0x9, 0x9, 0x30e, 0x3f, 0x2, 0x7f, 0x7, 0x6, 0x4, 0x3ff, 0x100000000}) clock_adjtime(0x2, &(0x7f0000001cc0)={0x0, 0x6, 0x7, 0xe5, 0x5, 0x6, 0x10, 0x7, 0x281, 0x40, 0x1, 0x0, 0x1, 0x10001, 0x5, 0x100, 0x0, 0x0, 0xffffffffffffe001, 0xdf, 0x7f, 0x8000, 0x9, 0x400, 0xfffffffffffffe00, 0x3f}) 17:04:38 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc01000a, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000", 0x5a, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000003980)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d0f465001000005fd0f4655f00000000000001", 0x1b, 0x11100}], 0x0, &(0x7f00000000c0)) [ 310.559008][T18615] RDX: 0000000000000008 RSI: 0000000020003980 RDI: 0000000000000004 [ 310.566988][T18615] RBP: 0000000000000008 R08: 0000000000000000 R09: 00007f1cb7c761d0 [ 310.575261][T18615] R10: 0000000000006000 R11: 0000000000000293 R12: 0000000000000004 [ 310.583522][T18615] R13: 0000000000000004 R14: 0000000020000260 R15: 0000000000000004 [ 310.591520][T18615] [ 310.597881][T18615] loop0: detected capacity change from 0 to 264192 17:04:42 executing program 2: clock_adjtime(0x7, &(0x7f0000000000)={0x8000, 0x62, 0xff, 0x1, 0x3, 0x1ff, 0x3ff, 0x4, 0xff, 0x20, 0x6, 0x401, 0x20, 0x0, 0x1ff, 0x8000, 0xfffffffffffffffd, 0x400, 0x8, 0x100000000, 0x2, 0x8, 0xf32, 0x4, 0x6, 0x80}) clock_adjtime(0x2, &(0x7f0000000100)={0xd9, 0x9, 0x1, 0x2, 0x1f, 0x78, 0x4b1, 0x0, 0x401, 0x5, 0x8, 0x1, 0x101, 0x100000001, 0x7, 0x1fc, 0x9, 0x9, 0x0, 0x9, 0x8, 0x3, 0xff, 0x7, 0x73, 0x946c}) clock_adjtime(0x6, &(0x7f0000000200)={0x4, 0x1, 0x100, 0x6, 0x2, 0x6, 0x1, 0x1dd, 0x9, 0x1000000000000000, 0x0, 0x6, 0x1, 0x1, 0x9, 0x5, 0x3023, 0x2, 0x4, 0xfffffffffffffff9, 0x429, 0x3, 0x0, 0x9, 0xffffffffffffff05, 0x1000}) clock_adjtime(0x3, &(0x7f0000000300)={0x0, 0x8, 0x9, 0x9, 0x9, 0x9, 0x6, 0x9, 0x8, 0x1, 0xd0fc, 0x55, 0x2, 0x0, 0x1, 0x1f, 0x100000001, 0x8f44, 0x53, 0x0, 0x3, 0x140000000000, 0x9, 0x8000, 0x0, 0x10001}) r0 = syz_mount_image$iso9660(&(0x7f0000000400), &(0x7f0000000440)='./file0\x00', 0x4, 0x1, &(0x7f0000000480)=[{0xfffffffffffffffe, 0x0, 0x3}], 0x2014400, &(0x7f00000004c0)={[{@check_relaxed}, {@dmode}, {@check_relaxed}], [{@euid_lt={'euid<', 0xee01}}, {@euid_eq}, {@rootcontext={'rootcontext', 0x3d, 'staff_u'}}, {@obj_user={'obj_user', 0x3d, '#-_'}}, {@rootcontext={'rootcontext', 0x3d, 'staff_u'}}]}) faccessat(r0, &(0x7f0000000580)='./file0\x00', 0x88) clock_adjtime(0x4, &(0x7f00000005c0)={0x80000000, 0x100000000, 0xba, 0x80000000, 0x4, 0x20d4e190, 0x7, 0x400, 0x33, 0x7a, 0x1, 0x465d, 0x7f, 0x5, 0x3, 0x1, 0x0, 0x8, 0x7, 0x7ff, 0x1, 0x4, 0x3f, 0x7fff, 0x700b, 0x96}) r1 = accept$unix(0xffffffffffffffff, 0x0, &(0x7f00000006c0)) getsockname$unix(r1, &(0x7f0000000700), &(0x7f0000000780)=0x6e) clock_adjtime(0x3, &(0x7f00000007c0)={0x6, 0x6, 0x7, 0x8000, 0x7ff, 0x5c, 0x401, 0x2, 0x9, 0x4, 0x0, 0x61, 0x2, 0x9b71, 0x100000000, 0x7fffffff, 0x322, 0xc70d, 0x9, 0xd, 0x9, 0x0, 0x9, 0x1a1f00000000, 0xffffffffffffffff, 0x9}) clock_adjtime(0x6, &(0x7f00000008c0)={0x4, 0x9, 0x3, 0xfffffffffffffff7, 0xb31, 0x1, 0x1, 0x2, 0x538, 0x0, 0x401, 0x1, 0xdd, 0xfffffffffffffff7, 0xec54, 0x4, 0x100000001, 0x0, 0xa, 0x1, 0x7ff, 0xcd, 0xf2, 0x80, 0x7, 0x8000}) clock_adjtime(0x0, &(0x7f00000009c0)={0x8, 0xff, 0x81, 0x2, 0x100000001, 0x11, 0x5, 0x1, 0x1, 0x9, 0x1000, 0x8, 0xdf6c, 0x9, 0x8, 0x1004000000000000, 0x1ff, 0x3, 0x6, 0xf5, 0x80000, 0x1, 0xfffffffffffffd6d, 0x2, 0x6, 0xfa}) r2 = socket$unix(0x1, 0x5, 0x0) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f0000000ac0)={'wlan0\x00'}) mq_timedreceive(0xffffffffffffffff, &(0x7f0000000b00)=""/4096, 0x1000, 0x80, &(0x7f0000001b00)={0x0, 0x989680}) r3 = creat(&(0x7f0000001b40)='./file0\x00', 0x1) mknodat(r3, &(0x7f0000001b80)='./file1\x00', 0x4, 0x0) clock_adjtime(0x0, &(0x7f0000001bc0)={0xfff, 0x7fff, 0x0, 0x2, 0xfdc, 0x54, 0x8fa, 0x3f41, 0x0, 0x4, 0x4, 0x5, 0x101, 0x5, 0x4, 0x9, 0x9, 0x30e, 0x3f, 0x2, 0x7f, 0x7, 0x6, 0x4, 0x3ff, 0x100000000}) clock_adjtime(0x2, &(0x7f0000001cc0)={0x0, 0x6, 0x7, 0xe5, 0x5, 0x6, 0x10, 0x7, 0x281, 0x40, 0x1, 0x0, 0x1, 0x10001, 0x5, 0x100, 0x0, 0x4, 0x0, 0xdf, 0x7f, 0x8000, 0x9, 0x400, 0xfffffffffffffe00, 0x3f}) 17:04:42 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc01000a, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000003980)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d9", 0x4, 0x6800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d0f465001000005fd0f4655f00000000000001000c00000010000800000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}], 0x0, &(0x7f00000000c0)) (fail_nth: 14) [ 310.617089][T18620] loop4: detected capacity change from 0 to 264192 [ 310.624196][T18615] EXT4-fs warning (device loop0): read_mmp_block:107: Error -117 while reading MMP block 12 [ 310.637192][T18628] loop5: detected capacity change from 0 to 264192 [ 310.658407][T18631] loop3: detected capacity change from 0 to 264192 17:04:42 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc01000a, 0x7, &(0x7f0000000200)=[{0x0, 0x0, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000003980)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d0f465001000005fd0f4655f00000000000001000c00000010000800000000000af3010004", 0x2d, 0x11100}], 0x0, &(0x7f00000000c0)) [ 310.673108][T18620] EXT4-fs (loop4): VFS: Can't find ext4 filesystem [ 310.680048][T18629] loop1: detected capacity change from 0 to 264192 [ 310.688744][T18628] EXT4-fs (loop5): VFS: Can't find ext4 filesystem [ 310.720542][T18637] FAULT_INJECTION: forcing a failure. [ 310.720542][T18637] name failslab, interval 1, probability 0, space 0, times 0 [ 310.733290][T18637] CPU: 0 PID: 18637 Comm: syz-executor.0 Not tainted 5.16.0-syzkaller #0 [ 310.741831][T18637] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 310.751878][T18637] Call Trace: [ 310.755148][T18637] [ 310.758068][T18637] dump_stack_lvl+0xd6/0x122 [ 310.762653][T18637] dump_stack+0x11/0x1b [ 310.766879][T18637] should_fail+0x23c/0x250 [ 310.771291][T18637] ? xas_create+0x3fb/0xb10 [ 310.775860][T18637] __should_failslab+0x81/0x90 [ 310.780702][T18637] should_failslab+0x5/0x20 [ 310.785202][T18637] kmem_cache_alloc+0x4f/0x320 [ 310.789960][T18637] xas_create+0x3fb/0xb10 [ 310.794300][T18637] ? memcg_check_events+0x10/0x410 [ 310.799426][T18637] xas_create_range+0x146/0x360 [ 310.804417][T18637] shmem_add_to_page_cache+0x3dd/0x670 [ 310.809925][T18637] shmem_getpage_gfp+0xaf1/0x12c0 [ 310.815006][T18637] shmem_write_begin+0x7e/0x100 [ 310.819890][T18637] generic_perform_write+0x1c8/0x400 [ 310.825170][T18637] ? current_time+0xed/0x1a0 [ 310.829752][T18637] __generic_file_write_iter+0xf7/0x2b0 [ 310.835636][T18637] ? generic_write_checks+0x250/0x290 [ 310.841062][T18637] generic_file_write_iter+0x75/0x130 [ 310.846509][T18637] vfs_write+0x7f5/0x950 [ 310.850762][T18637] __x64_sys_pwrite64+0xf5/0x150 [ 310.855688][T18637] do_syscall_64+0x44/0xd0 [ 310.860102][T18637] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 310.866033][T18637] RIP: 0033:0x7f1cb8ab2e67 [ 310.870501][T18637] Code: 08 89 3c 24 48 89 4c 24 18 e8 e5 f8 ff ff 4c 8b 54 24 18 48 8b 54 24 10 41 89 c0 48 8b 74 24 08 8b 3c 24 b8 12 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 31 44 89 c7 48 89 04 24 e8 15 f9 ff ff 48 8b [ 310.890131][T18637] RSP: 002b:00007f1cb7c75f00 EFLAGS: 00000293 ORIG_RAX: 0000000000000012 [ 310.898597][T18637] RAX: ffffffffffffffda RBX: 00007f1cb8b499c8 RCX: 00007f1cb8ab2e67 [ 310.906611][T18637] RDX: 0000000000000008 RSI: 0000000020003980 RDI: 0000000000000004 [ 310.914578][T18637] RBP: 0000000000000008 R08: 0000000000000000 R09: 00007f1cb7c761d0 [ 310.922536][T18637] R10: 0000000000006000 R11: 0000000000000293 R12: 0000000000000004 [ 310.930496][T18637] R13: 0000000000000004 R14: 0000000020000260 R15: 0000000000000004 [ 310.938491][T18637] [ 310.943036][T18638] SELinux: duplicate or incompatible mount options [ 310.964658][T18637] loop0: detected capacity change from 0 to 264192 17:04:43 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc01000a, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000), 0x0, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000003980)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="80", 0x1, 0x11100}], 0x0, &(0x7f00000000c0)) [ 310.964899][T18631] EXT4-fs error (device loop3): ext4_orphan_get:1419: comm syz-executor.3: bad orphan inode 17 [ 310.984445][T18631] ext4_test_bit(bit=16, block=18) = 0 [ 310.990216][T18631] EXT4-fs (loop3): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: writeback. [ 311.004566][T18639] loop4: detected capacity change from 0 to 264192 [ 311.016875][T18643] loop5: detected capacity change from 0 to 264192 [ 311.033261][T18629] EXT4-fs (loop1): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: none. [ 311.037163][T18631] ext4 filesystem being mounted at /root/syzkaller-testdir350550748/syzkaller.ONiyFI/854/file0 supports timestamps until 2038 (0x7fffffff) [ 311.075429][T18639] EXT4-fs (loop4): VFS: Can't find ext4 filesystem [ 311.090689][T18637] EXT4-fs warning (device loop0): ext4_enable_quotas:6363: Failed to enable quota tracking (type=0, err=-22). Please run e2fsck to fix. [ 311.097121][T18643] EXT4-fs (loop5): VFS: Can't find ext4 filesystem [ 311.111482][T18629] ext4 filesystem being mounted at /root/syzkaller-testdir268235930/syzkaller.DrjInB/769/file0 supports timestamps until 2038 (0x7fffffff) 17:04:47 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc01000a, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000011", 0x9, 0x4e0}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {0x0, 0x0, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000003980)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d0f465001000005fd0f4655f00000000000001000c000000100008", 0x23, 0x11100}], 0x0, &(0x7f00000000c0)) 17:04:47 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc01000a, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000", 0x60, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000003980)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d0f465001000005fd0f4655f00000000000001", 0x1b, 0x11100}], 0x0, &(0x7f00000000c0)) 17:04:47 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc01000a, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000), 0x0, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000003980)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d0f465001000005fd0f4655f00000000000001000c00000010000800000000000af3010004", 0x2d, 0x11100}], 0x0, &(0x7f00000000c0)) [ 311.138397][T18637] EXT4-fs (loop0): mount failed 17:04:47 executing program 2: clock_adjtime(0x7, &(0x7f0000000000)={0x8000, 0x62, 0xff, 0x1, 0x3, 0x1ff, 0x3ff, 0x4, 0xff, 0x20, 0x6, 0x401, 0x20, 0x0, 0x1ff, 0x8000, 0xfffffffffffffffd, 0x400, 0x8, 0x100000000, 0x2, 0x8, 0xf32, 0x4, 0x6, 0x80}) clock_adjtime(0x2, &(0x7f0000000100)={0xd9, 0x9, 0x1, 0x2, 0x1f, 0x78, 0x4b1, 0x0, 0x401, 0x5, 0x8, 0x1, 0x101, 0x100000001, 0x7, 0x1fc, 0x9, 0x9, 0x0, 0x9, 0x8, 0x3, 0xff, 0x7, 0x73, 0x946c}) clock_adjtime(0x6, &(0x7f0000000200)={0x4, 0x1, 0x100, 0x6, 0x2, 0x6, 0x1, 0x1dd, 0x9, 0x1000000000000000, 0x0, 0x6, 0x1, 0x1, 0x9, 0x5, 0x3023, 0x2, 0x4, 0xfffffffffffffff9, 0x429, 0x3, 0x0, 0x9, 0xffffffffffffff05, 0x1000}) clock_adjtime(0x3, &(0x7f0000000300)={0x0, 0x8, 0x9, 0x9, 0x9, 0x9, 0x6, 0x9, 0x8, 0x1, 0xd0fc, 0x55, 0x2, 0x0, 0x1, 0x1f, 0x100000001, 0x8f44, 0x53, 0x0, 0x3, 0x140000000000, 0x9, 0x8000, 0x0, 0x10001}) r0 = syz_mount_image$iso9660(&(0x7f0000000400), &(0x7f0000000440)='./file0\x00', 0x4, 0x1, &(0x7f0000000480)=[{0xfffffffffffffffe, 0x0, 0x3}], 0x2014400, &(0x7f00000004c0)={[{@check_relaxed}, {@dmode}, {@check_relaxed}], [{@euid_lt={'euid<', 0xee01}}, {@euid_eq}, {@rootcontext={'rootcontext', 0x3d, 'staff_u'}}, {@obj_user={'obj_user', 0x3d, '#-_'}}, {@rootcontext={'rootcontext', 0x3d, 'staff_u'}}]}) faccessat(r0, &(0x7f0000000580)='./file0\x00', 0x88) clock_adjtime(0x4, &(0x7f00000005c0)={0x80000000, 0x100000000, 0xba, 0x80000000, 0x4, 0x20d4e190, 0x7, 0x400, 0x33, 0x7a, 0x1, 0x465d, 0x7f, 0x5, 0x3, 0x1, 0x0, 0x8, 0x7, 0x7ff, 0x1, 0x4, 0x3f, 0x7fff, 0x700b, 0x96}) r1 = accept$unix(0xffffffffffffffff, 0x0, &(0x7f00000006c0)) getsockname$unix(r1, &(0x7f0000000700), &(0x7f0000000780)=0x6e) clock_adjtime(0x3, &(0x7f00000007c0)={0x6, 0x6, 0x7, 0x8000, 0x7ff, 0x5c, 0x401, 0x2, 0x9, 0x4, 0x0, 0x61, 0x2, 0x9b71, 0x100000000, 0x7fffffff, 0x322, 0xc70d, 0x9, 0xd, 0x9, 0x0, 0x9, 0x1a1f00000000, 0xffffffffffffffff, 0x9}) clock_adjtime(0x6, &(0x7f00000008c0)={0x4, 0x9, 0x3, 0xfffffffffffffff7, 0xb31, 0x1, 0x1, 0x2, 0x538, 0x0, 0x401, 0x1, 0xdd, 0xfffffffffffffff7, 0xec54, 0x4, 0x100000001, 0x0, 0xa, 0x1, 0x7ff, 0xcd, 0xf2, 0x80, 0x7, 0x8000}) clock_adjtime(0x0, &(0x7f00000009c0)={0x8, 0xff, 0x81, 0x2, 0x100000001, 0x11, 0x5, 0x1, 0x1, 0x9, 0x1000, 0x8, 0xdf6c, 0x9, 0x8, 0x1004000000000000, 0x1ff, 0x3, 0x6, 0xf5, 0x80000, 0x1, 0xfffffffffffffd6d, 0x2, 0x6, 0xfa}) r2 = socket$unix(0x1, 0x5, 0x0) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f0000000ac0)={'wlan0\x00'}) mq_timedreceive(0xffffffffffffffff, &(0x7f0000000b00)=""/4096, 0x1000, 0x80, &(0x7f0000001b00)={0x0, 0x989680}) r3 = creat(&(0x7f0000001b40)='./file0\x00', 0x1) mknodat(r3, &(0x7f0000001b80)='./file1\x00', 0x4, 0x0) clock_adjtime(0x0, &(0x7f0000001bc0)={0xfff, 0x7fff, 0x0, 0x2, 0xfdc, 0x54, 0x8fa, 0x3f41, 0x0, 0x4, 0x4, 0x5, 0x101, 0x5, 0x4, 0x9, 0x9, 0x30e, 0x3f, 0x2, 0x7f, 0x7, 0x6, 0x4, 0x3ff, 0x100000000}) clock_adjtime(0x2, &(0x7f0000001cc0)={0x0, 0x6, 0x7, 0xe5, 0x5, 0x6, 0x10, 0x7, 0x281, 0x40, 0x1, 0x0, 0x1, 0x10001, 0x5, 0x100, 0x0, 0x4, 0x0, 0xdf, 0x7f, 0x8000, 0x9, 0x400, 0xfffffffffffffe00, 0x3f}) 17:04:47 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc01000a, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000), 0x0, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000003980)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d0f465001000005fd0f4655f00000000000001000c00000010000800000000000af3010004", 0x2d, 0x11100}], 0x0, &(0x7f00000000c0)) 17:04:47 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc01000a, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000003980)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d9", 0x4, 0x6800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d0f465001000005fd0f4655f00000000000001000c00000010000800000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}], 0x0, &(0x7f00000000c0)) (fail_nth: 15) 17:04:47 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc01000a, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000), 0x0, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000003980)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="80", 0x1, 0x11100}], 0x0, &(0x7f00000000c0)) [ 311.207905][T18657] loop3: detected capacity change from 0 to 264192 [ 311.210686][T18651] loop1: detected capacity change from 0 to 264192 [ 311.225851][T18654] SELinux: duplicate or incompatible mount options [ 311.242275][T18660] FAULT_INJECTION: forcing a failure. [ 311.242275][T18660] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 311.254467][T18661] loop5: detected capacity change from 0 to 264192 [ 311.255474][T18660] CPU: 1 PID: 18660 Comm: syz-executor.0 Not tainted 5.16.0-syzkaller #0 [ 311.270362][T18660] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 311.280411][T18660] Call Trace: [ 311.283681][T18660] [ 311.286607][T18660] dump_stack_lvl+0xd6/0x122 [ 311.291409][T18660] dump_stack+0x11/0x1b [ 311.295555][T18660] should_fail+0x23c/0x250 [ 311.300001][T18660] should_fail_usercopy+0x16/0x20 [ 311.305148][T18660] copy_page_from_iter_atomic+0x2f1/0xc60 [ 311.310937][T18660] ? shmem_write_begin+0x7e/0x100 [ 311.315956][T18660] generic_perform_write+0x211/0x400 [ 311.321825][T18660] ? current_time+0xed/0x1a0 [ 311.326408][T18660] __generic_file_write_iter+0xf7/0x2b0 [ 311.331948][T18660] ? generic_write_checks+0x250/0x290 [ 311.337322][T18660] generic_file_write_iter+0x75/0x130 [ 311.342862][T18660] vfs_write+0x7f5/0x950 [ 311.347147][T18660] __x64_sys_pwrite64+0xf5/0x150 [ 311.352073][T18660] do_syscall_64+0x44/0xd0 [ 311.356581][T18660] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 311.362490][T18660] RIP: 0033:0x7f1cb8ab2e67 [ 311.366894][T18660] Code: 08 89 3c 24 48 89 4c 24 18 e8 e5 f8 ff ff 4c 8b 54 24 18 48 8b 54 24 10 41 89 c0 48 8b 74 24 08 8b 3c 24 b8 12 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 31 44 89 c7 48 89 04 24 e8 15 f9 ff ff 48 8b [ 311.386558][T18660] RSP: 002b:00007f1cb7c75f00 EFLAGS: 00000293 ORIG_RAX: 0000000000000012 [ 311.394974][T18660] RAX: ffffffffffffffda RBX: 00007f1cb8b499c8 RCX: 00007f1cb8ab2e67 [ 311.402937][T18660] RDX: 0000000000000008 RSI: 0000000020003980 RDI: 0000000000000004 [ 311.410926][T18660] RBP: 0000000000000008 R08: 0000000000000000 R09: 00007f1cb7c761d0 [ 311.418887][T18660] R10: 0000000000006000 R11: 0000000000000293 R12: 0000000000000004 [ 311.426846][T18660] R13: 0000000000000004 R14: 0000000020000260 R15: 0000000000000004 [ 311.434844][T18660] 17:04:47 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc01000a, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000), 0x0, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000003980)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d0f465001000005fd0f4655f00000000000001000c00000010000800000000000af3010004", 0x2d, 0x11100}], 0x0, &(0x7f00000000c0)) [ 311.457032][T18661] EXT4-fs (loop5): VFS: Can't find ext4 filesystem 17:04:51 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc01000a, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f465", 0x33, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000003980)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="80", 0x1, 0x11100}], 0x0, &(0x7f00000000c0)) [ 311.488435][T18651] EXT4-fs (loop1): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: none. [ 311.503618][T18665] loop4: detected capacity change from 0 to 264192 [ 311.504413][T18651] ext4 filesystem being mounted at /root/syzkaller-testdir268235930/syzkaller.DrjInB/770/file0 supports timestamps until 2038 (0x7fffffff) [ 311.528134][T18660] loop0: detected capacity change from 0 to 264192 17:04:51 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc01000a, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000", 0x60, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000003980)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d0f465001000005fd0f4655f00000000000001", 0x1b, 0x11100}], 0x0, &(0x7f00000000c0)) 17:04:51 executing program 2: clock_adjtime(0x7, &(0x7f0000000000)={0x8000, 0x62, 0xff, 0x1, 0x3, 0x1ff, 0x3ff, 0x4, 0xff, 0x20, 0x6, 0x401, 0x20, 0x0, 0x1ff, 0x8000, 0xfffffffffffffffd, 0x400, 0x8, 0x100000000, 0x2, 0x8, 0xf32, 0x4, 0x6, 0x80}) clock_adjtime(0x2, &(0x7f0000000100)={0xd9, 0x9, 0x1, 0x2, 0x1f, 0x78, 0x4b1, 0x0, 0x401, 0x5, 0x8, 0x1, 0x101, 0x100000001, 0x7, 0x1fc, 0x9, 0x9, 0x0, 0x9, 0x8, 0x3, 0xff, 0x7, 0x73, 0x946c}) clock_adjtime(0x6, &(0x7f0000000200)={0x4, 0x1, 0x100, 0x6, 0x2, 0x6, 0x1, 0x1dd, 0x9, 0x1000000000000000, 0x0, 0x6, 0x1, 0x1, 0x9, 0x5, 0x3023, 0x2, 0x4, 0xfffffffffffffff9, 0x429, 0x3, 0x0, 0x9, 0xffffffffffffff05, 0x1000}) clock_adjtime(0x3, &(0x7f0000000300)={0x0, 0x8, 0x9, 0x9, 0x9, 0x9, 0x6, 0x9, 0x8, 0x1, 0xd0fc, 0x55, 0x2, 0x0, 0x1, 0x1f, 0x100000001, 0x8f44, 0x53, 0x0, 0x3, 0x140000000000, 0x9, 0x8000, 0x0, 0x10001}) r0 = syz_mount_image$iso9660(&(0x7f0000000400), &(0x7f0000000440)='./file0\x00', 0x4, 0x1, &(0x7f0000000480)=[{0xfffffffffffffffe, 0x0, 0x3}], 0x2014400, &(0x7f00000004c0)={[{@check_relaxed}, {@dmode}, {@check_relaxed}], [{@euid_lt={'euid<', 0xee01}}, {@euid_eq}, {@rootcontext={'rootcontext', 0x3d, 'staff_u'}}, {@obj_user={'obj_user', 0x3d, '#-_'}}, {@rootcontext={'rootcontext', 0x3d, 'staff_u'}}]}) faccessat(r0, &(0x7f0000000580)='./file0\x00', 0x88) clock_adjtime(0x4, &(0x7f00000005c0)={0x80000000, 0x100000000, 0xba, 0x80000000, 0x4, 0x20d4e190, 0x7, 0x400, 0x33, 0x7a, 0x1, 0x465d, 0x7f, 0x5, 0x3, 0x1, 0x0, 0x8, 0x7, 0x7ff, 0x1, 0x4, 0x3f, 0x7fff, 0x700b, 0x96}) r1 = accept$unix(0xffffffffffffffff, 0x0, &(0x7f00000006c0)) getsockname$unix(r1, &(0x7f0000000700), &(0x7f0000000780)=0x6e) clock_adjtime(0x3, &(0x7f00000007c0)={0x6, 0x6, 0x7, 0x8000, 0x7ff, 0x5c, 0x401, 0x2, 0x9, 0x4, 0x0, 0x61, 0x2, 0x9b71, 0x100000000, 0x7fffffff, 0x322, 0xc70d, 0x9, 0xd, 0x9, 0x0, 0x9, 0x1a1f00000000, 0xffffffffffffffff, 0x9}) clock_adjtime(0x6, &(0x7f00000008c0)={0x4, 0x9, 0x3, 0xfffffffffffffff7, 0xb31, 0x1, 0x1, 0x2, 0x538, 0x0, 0x401, 0x1, 0xdd, 0xfffffffffffffff7, 0xec54, 0x4, 0x100000001, 0x0, 0xa, 0x1, 0x7ff, 0xcd, 0xf2, 0x80, 0x7, 0x8000}) clock_adjtime(0x0, &(0x7f00000009c0)={0x8, 0xff, 0x81, 0x2, 0x100000001, 0x11, 0x5, 0x1, 0x1, 0x9, 0x1000, 0x8, 0xdf6c, 0x9, 0x8, 0x1004000000000000, 0x1ff, 0x3, 0x6, 0xf5, 0x80000, 0x1, 0xfffffffffffffd6d, 0x2, 0x6, 0xfa}) r2 = socket$unix(0x1, 0x5, 0x0) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f0000000ac0)={'wlan0\x00'}) mq_timedreceive(0xffffffffffffffff, &(0x7f0000000b00)=""/4096, 0x1000, 0x80, &(0x7f0000001b00)={0x0, 0x989680}) r3 = creat(&(0x7f0000001b40)='./file0\x00', 0x1) mknodat(r3, &(0x7f0000001b80)='./file1\x00', 0x4, 0x0) clock_adjtime(0x0, &(0x7f0000001bc0)={0xfff, 0x7fff, 0x0, 0x2, 0xfdc, 0x54, 0x8fa, 0x3f41, 0x0, 0x4, 0x4, 0x5, 0x101, 0x5, 0x4, 0x9, 0x9, 0x30e, 0x3f, 0x2, 0x7f, 0x7, 0x6, 0x4, 0x3ff, 0x100000000}) clock_adjtime(0x2, &(0x7f0000001cc0)={0x0, 0x6, 0x7, 0xe5, 0x5, 0x6, 0x10, 0x7, 0x281, 0x40, 0x1, 0x0, 0x1, 0x10001, 0x5, 0x100, 0x0, 0x4, 0x0, 0xdf, 0x7f, 0x8000, 0x9, 0x400, 0xfffffffffffffe00, 0x3f}) 17:04:51 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc01000a, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f465", 0x33, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000003980)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="80", 0x1, 0x11100}], 0x0, &(0x7f00000000c0)) [ 311.548291][T18668] loop5: detected capacity change from 0 to 264192 [ 311.572687][T18668] EXT4-fs (loop5): VFS: Can't find ext4 filesystem [ 311.590735][T18665] EXT4-fs (loop4): VFS: Can't find ext4 filesystem [ 311.640760][T18657] EXT4-fs error (device loop3): ext4_orphan_get:1419: comm syz-executor.3: bad orphan inode 17 [ 311.652862][T18657] ext4_test_bit(bit=16, block=18) = 0 [ 311.655843][T18678] SELinux: duplicate or incompatible mount options [ 311.658297][T18657] EXT4-fs (loop3): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: writeback. [ 311.676404][T18660] EXT4-fs warning (device loop0): ext4_enable_quotas:6363: Failed to enable quota tracking (type=0, err=-22). Please run e2fsck to fix. 17:04:52 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc01000a, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f465", 0x33, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000003980)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d0f465001000005fd0f4655f00000000000001000c00000010000800000000000af3010004", 0x2d, 0x11100}], 0x0, &(0x7f00000000c0)) 17:04:52 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc01000a, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f465", 0x33, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000003980)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="80", 0x1, 0x11100}], 0x0, &(0x7f00000000c0)) 17:04:52 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc01000a, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000011", 0x9, 0x4e0}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300), 0x0, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000003980)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d0f465001000005fd0f4655f00000000000001000c000000100008", 0x23, 0x11100}], 0x0, &(0x7f00000000c0)) 17:04:52 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc01000a, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000", 0x60, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000003980)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d0f465001000005fd0f4655f00000000000001", 0x1b, 0x11100}], 0x0, &(0x7f00000000c0)) [ 311.692430][T18660] EXT4-fs (loop0): mount failed [ 311.708427][T18657] ext4 filesystem being mounted at /root/syzkaller-testdir350550748/syzkaller.ONiyFI/855/file0 supports timestamps until 2038 (0x7fffffff) [ 311.742021][T18683] loop5: detected capacity change from 0 to 264192 [ 311.753529][T18684] loop4: detected capacity change from 0 to 264192 [ 311.754664][T18687] loop1: detected capacity change from 0 to 264192 [ 311.776947][T18683] EXT4-fs (loop5): VFS: Can't find ext4 filesystem [ 311.783543][T18684] EXT4-fs (loop4): VFS: Can't find ext4 filesystem 17:04:56 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc01000a, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f465", 0x33, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000003980)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d0f465001000005fd0f4655f00000000000001000c00000010000800000000000af3010004", 0x2d, 0x11100}], 0x0, &(0x7f00000000c0)) [ 311.815323][T18687] EXT4-fs (loop1): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: none. [ 311.830167][T18687] ext4 filesystem being mounted at /root/syzkaller-testdir268235930/syzkaller.DrjInB/772/file0 supports timestamps until 2038 (0x7fffffff) 17:04:56 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc01000a, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000003980)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d9", 0x4, 0x6800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d0f465001000005fd0f4655f00000000000001000c00000010000800000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}], 0x0, &(0x7f00000000c0)) (fail_nth: 16) 17:04:56 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc01000a, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001", 0x4d, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000003980)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="80", 0x1, 0x11100}], 0x0, &(0x7f00000000c0)) 17:04:56 executing program 2: clock_adjtime(0x7, &(0x7f0000000000)={0x8000, 0x62, 0xff, 0x1, 0x3, 0x1ff, 0x3ff, 0x4, 0xff, 0x20, 0x6, 0x401, 0x20, 0x0, 0x1ff, 0x8000, 0xfffffffffffffffd, 0x400, 0x8, 0x100000000, 0x2, 0x8, 0xf32, 0x4, 0x6, 0x80}) clock_adjtime(0x2, &(0x7f0000000100)={0xd9, 0x9, 0x1, 0x2, 0x1f, 0x78, 0x4b1, 0x0, 0x401, 0x5, 0x8, 0x1, 0x101, 0x100000001, 0x7, 0x1fc, 0x9, 0x9, 0x0, 0x9, 0x8, 0x3, 0xff, 0x7, 0x73, 0x946c}) clock_adjtime(0x6, &(0x7f0000000200)={0x4, 0x1, 0x100, 0x6, 0x2, 0x6, 0x1, 0x1dd, 0x9, 0x1000000000000000, 0x0, 0x6, 0x1, 0x1, 0x9, 0x5, 0x3023, 0x2, 0x4, 0xfffffffffffffff9, 0x429, 0x3, 0x0, 0x9, 0xffffffffffffff05, 0x1000}) clock_adjtime(0x3, &(0x7f0000000300)={0x0, 0x8, 0x9, 0x9, 0x9, 0x9, 0x6, 0x9, 0x8, 0x1, 0xd0fc, 0x55, 0x2, 0x0, 0x1, 0x1f, 0x100000001, 0x8f44, 0x53, 0x0, 0x3, 0x140000000000, 0x9, 0x8000, 0x0, 0x10001}) r0 = syz_mount_image$iso9660(&(0x7f0000000400), &(0x7f0000000440)='./file0\x00', 0x4, 0x1, &(0x7f0000000480)=[{0xfffffffffffffffe, 0x0, 0x3}], 0x2014400, &(0x7f00000004c0)={[{@check_relaxed}, {@dmode}, {@check_relaxed}], [{@euid_lt={'euid<', 0xee01}}, {@euid_eq}, {@rootcontext={'rootcontext', 0x3d, 'staff_u'}}, {@obj_user={'obj_user', 0x3d, '#-_'}}, {@rootcontext={'rootcontext', 0x3d, 'staff_u'}}]}) faccessat(r0, &(0x7f0000000580)='./file0\x00', 0x88) clock_adjtime(0x4, &(0x7f00000005c0)={0x80000000, 0x100000000, 0xba, 0x80000000, 0x4, 0x20d4e190, 0x7, 0x400, 0x33, 0x7a, 0x1, 0x465d, 0x7f, 0x5, 0x3, 0x1, 0x0, 0x8, 0x7, 0x7ff, 0x1, 0x4, 0x3f, 0x7fff, 0x700b, 0x96}) r1 = accept$unix(0xffffffffffffffff, 0x0, &(0x7f00000006c0)) getsockname$unix(r1, &(0x7f0000000700), &(0x7f0000000780)=0x6e) clock_adjtime(0x3, &(0x7f00000007c0)={0x6, 0x6, 0x7, 0x8000, 0x7ff, 0x5c, 0x401, 0x2, 0x9, 0x4, 0x0, 0x61, 0x2, 0x9b71, 0x100000000, 0x7fffffff, 0x322, 0xc70d, 0x9, 0xd, 0x9, 0x0, 0x9, 0x1a1f00000000, 0xffffffffffffffff, 0x9}) clock_adjtime(0x6, &(0x7f00000008c0)={0x4, 0x9, 0x3, 0xfffffffffffffff7, 0xb31, 0x1, 0x1, 0x2, 0x538, 0x0, 0x401, 0x1, 0xdd, 0xfffffffffffffff7, 0xec54, 0x4, 0x100000001, 0x0, 0xa, 0x1, 0x7ff, 0xcd, 0xf2, 0x80, 0x7, 0x8000}) clock_adjtime(0x0, &(0x7f00000009c0)={0x8, 0xff, 0x81, 0x2, 0x100000001, 0x11, 0x5, 0x1, 0x1, 0x9, 0x1000, 0x8, 0xdf6c, 0x9, 0x8, 0x1004000000000000, 0x1ff, 0x3, 0x6, 0xf5, 0x80000, 0x1, 0xfffffffffffffd6d, 0x2, 0x6, 0xfa}) r2 = socket$unix(0x1, 0x5, 0x0) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f0000000ac0)={'wlan0\x00'}) mq_timedreceive(0xffffffffffffffff, &(0x7f0000000b00)=""/4096, 0x1000, 0x80, &(0x7f0000001b00)={0x0, 0x989680}) r3 = creat(&(0x7f0000001b40)='./file0\x00', 0x1) mknodat(r3, &(0x7f0000001b80)='./file1\x00', 0x4, 0x0) clock_adjtime(0x0, &(0x7f0000001bc0)={0xfff, 0x7fff, 0x0, 0x2, 0xfdc, 0x54, 0x8fa, 0x3f41, 0x0, 0x4, 0x4, 0x5, 0x101, 0x5, 0x4, 0x9, 0x9, 0x30e, 0x3f, 0x2, 0x7f, 0x7, 0x6, 0x4, 0x3ff, 0x100000000}) clock_adjtime(0x2, &(0x7f0000001cc0)={0x0, 0x6, 0x7, 0xe5, 0x5, 0x6, 0x10, 0x7, 0x281, 0x40, 0x1, 0x0, 0x1, 0x10001, 0x5, 0x100, 0x0, 0x4, 0xffffffffffffe001, 0x0, 0x7f, 0x8000, 0x9, 0x400, 0xfffffffffffffe00, 0x3f}) 17:04:56 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc01000a, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700", 0x63, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000003980)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d0f465001000005fd0f4655f00000000000001", 0x1b, 0x11100}], 0x0, &(0x7f00000000c0)) [ 311.868226][T18692] loop3: detected capacity change from 0 to 264192 [ 311.884504][T18699] SELinux: duplicate or incompatible mount options [ 311.893420][T18698] FAULT_INJECTION: forcing a failure. [ 311.893420][T18698] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 311.901821][T18693] loop4: detected capacity change from 0 to 264192 [ 311.906535][T18698] CPU: 1 PID: 18698 Comm: syz-executor.0 Not tainted 5.16.0-syzkaller #0 [ 311.921371][T18698] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 311.931646][T18698] Call Trace: [ 311.934950][T18693] EXT4-fs (loop4): VFS: Can't find ext4 filesystem [ 311.934992][T18698] [ 311.944424][T18698] dump_stack_lvl+0xd6/0x122 [ 311.949049][T18698] dump_stack+0x11/0x1b [ 311.953298][T18698] should_fail+0x23c/0x250 [ 311.957992][T18698] should_fail_usercopy+0x16/0x20 [ 311.963026][T18698] copy_page_from_iter_atomic+0x2f1/0xc60 17:04:56 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc01000a, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f465", 0x33, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000003980)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d0f465001000005fd0f4655f00000000000001000c00000010000800000000000af3010004", 0x2d, 0x11100}], 0x0, &(0x7f00000000c0)) [ 311.968803][T18698] ? shmem_write_begin+0x7e/0x100 [ 311.973839][T18698] generic_perform_write+0x211/0x400 [ 311.979132][T18698] ? current_time+0xed/0x1a0 [ 311.983788][T18698] __generic_file_write_iter+0xf7/0x2b0 [ 311.985707][T18692] EXT4-fs error (device loop3): ext4_orphan_get:1419: comm syz-executor.3: bad orphan inode 17 [ 311.989391][T18698] ? generic_write_checks+0x250/0x290 [ 311.989417][T18698] generic_file_write_iter+0x75/0x130 [ 311.989485][T18698] vfs_write+0x7f5/0x950 17:04:56 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc01000a, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000011", 0x9, 0x4e0}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300), 0x0, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000003980)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d0f465001000005fd0f4655f00000000000001000c000000100008", 0x23, 0x11100}], 0x0, &(0x7f00000000c0)) [ 312.001316][T18692] ext4_test_bit(bit=16, block=18) = 0 [ 312.005157][T18698] __x64_sys_pwrite64+0xf5/0x150 [ 312.005180][T18698] do_syscall_64+0x44/0xd0 [ 312.010596][T18692] EXT4-fs (loop3): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: writeback. [ 312.014884][T18698] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 312.024391][T18692] ext4 filesystem being mounted at /root/syzkaller-testdir350550748/syzkaller.ONiyFI/856/file0 supports timestamps until 2038 (0x7fffffff) [ 312.025152][T18698] RIP: 0033:0x7f1cb8ab2e67 [ 312.025168][T18698] Code: 08 89 3c 24 48 89 4c 24 18 e8 e5 f8 ff ff 4c 8b 54 24 18 48 8b 54 24 10 41 89 c0 48 8b 74 24 08 8b 3c 24 b8 12 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 31 44 89 c7 48 89 04 24 e8 15 f9 ff ff 48 8b [ 312.084513][T18698] RSP: 002b:00007f1cb7c75f00 EFLAGS: 00000293 ORIG_RAX: 0000000000000012 [ 312.093153][T18698] RAX: ffffffffffffffda RBX: 00007f1cb8b499c8 RCX: 00007f1cb8ab2e67 [ 312.101321][T18698] RDX: 0000000000000004 RSI: 0000000020011700 RDI: 0000000000000004 [ 312.109358][T18698] RBP: 0000000000000008 R08: 0000000000000000 R09: 00007f1cb7c761d0 [ 312.117318][T18698] R10: 0000000000006800 R11: 0000000000000293 R12: 0000000000000004 [ 312.125330][T18698] R13: 0000000000000004 R14: 0000000020000278 R15: 0000000000000005 [ 312.133338][T18698] [ 312.137517][T18698] loop0: detected capacity change from 0 to 264192 [ 312.146346][T18696] loop5: detected capacity change from 0 to 264192 17:05:00 executing program 2: clock_adjtime(0x7, &(0x7f0000000000)={0x8000, 0x62, 0xff, 0x1, 0x3, 0x1ff, 0x3ff, 0x4, 0xff, 0x20, 0x6, 0x401, 0x20, 0x0, 0x1ff, 0x8000, 0xfffffffffffffffd, 0x400, 0x8, 0x100000000, 0x2, 0x8, 0xf32, 0x4, 0x6, 0x80}) clock_adjtime(0x2, &(0x7f0000000100)={0xd9, 0x9, 0x1, 0x2, 0x1f, 0x78, 0x4b1, 0x0, 0x401, 0x5, 0x8, 0x1, 0x101, 0x100000001, 0x7, 0x1fc, 0x9, 0x9, 0x0, 0x9, 0x8, 0x3, 0xff, 0x7, 0x73, 0x946c}) clock_adjtime(0x6, &(0x7f0000000200)={0x4, 0x1, 0x100, 0x6, 0x2, 0x6, 0x1, 0x1dd, 0x9, 0x1000000000000000, 0x0, 0x6, 0x1, 0x1, 0x9, 0x5, 0x3023, 0x2, 0x4, 0xfffffffffffffff9, 0x429, 0x3, 0x0, 0x9, 0xffffffffffffff05, 0x1000}) clock_adjtime(0x3, &(0x7f0000000300)={0x0, 0x8, 0x9, 0x9, 0x9, 0x9, 0x6, 0x9, 0x8, 0x1, 0xd0fc, 0x55, 0x2, 0x0, 0x1, 0x1f, 0x100000001, 0x8f44, 0x53, 0x0, 0x3, 0x140000000000, 0x9, 0x8000, 0x0, 0x10001}) r0 = syz_mount_image$iso9660(&(0x7f0000000400), &(0x7f0000000440)='./file0\x00', 0x4, 0x1, &(0x7f0000000480)=[{0xfffffffffffffffe, 0x0, 0x3}], 0x2014400, &(0x7f00000004c0)={[{@check_relaxed}, {@dmode}, {@check_relaxed}], [{@euid_lt={'euid<', 0xee01}}, {@euid_eq}, {@rootcontext={'rootcontext', 0x3d, 'staff_u'}}, {@obj_user={'obj_user', 0x3d, '#-_'}}, {@rootcontext={'rootcontext', 0x3d, 'staff_u'}}]}) faccessat(r0, &(0x7f0000000580)='./file0\x00', 0x88) clock_adjtime(0x4, &(0x7f00000005c0)={0x80000000, 0x100000000, 0xba, 0x80000000, 0x4, 0x20d4e190, 0x7, 0x400, 0x33, 0x7a, 0x1, 0x465d, 0x7f, 0x5, 0x3, 0x1, 0x0, 0x8, 0x7, 0x7ff, 0x1, 0x4, 0x3f, 0x7fff, 0x700b, 0x96}) r1 = accept$unix(0xffffffffffffffff, 0x0, &(0x7f00000006c0)) getsockname$unix(r1, &(0x7f0000000700), &(0x7f0000000780)=0x6e) clock_adjtime(0x3, &(0x7f00000007c0)={0x6, 0x6, 0x7, 0x8000, 0x7ff, 0x5c, 0x401, 0x2, 0x9, 0x4, 0x0, 0x61, 0x2, 0x9b71, 0x100000000, 0x7fffffff, 0x322, 0xc70d, 0x9, 0xd, 0x9, 0x0, 0x9, 0x1a1f00000000, 0xffffffffffffffff, 0x9}) clock_adjtime(0x6, &(0x7f00000008c0)={0x4, 0x9, 0x3, 0xfffffffffffffff7, 0xb31, 0x1, 0x1, 0x2, 0x538, 0x0, 0x401, 0x1, 0xdd, 0xfffffffffffffff7, 0xec54, 0x4, 0x100000001, 0x0, 0xa, 0x1, 0x7ff, 0xcd, 0xf2, 0x80, 0x7, 0x8000}) clock_adjtime(0x0, &(0x7f00000009c0)={0x8, 0xff, 0x81, 0x2, 0x100000001, 0x11, 0x5, 0x1, 0x1, 0x9, 0x1000, 0x8, 0xdf6c, 0x9, 0x8, 0x1004000000000000, 0x1ff, 0x3, 0x6, 0xf5, 0x80000, 0x1, 0xfffffffffffffd6d, 0x2, 0x6, 0xfa}) r2 = socket$unix(0x1, 0x5, 0x0) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f0000000ac0)={'wlan0\x00'}) mq_timedreceive(0xffffffffffffffff, &(0x7f0000000b00)=""/4096, 0x1000, 0x80, &(0x7f0000001b00)={0x0, 0x989680}) r3 = creat(&(0x7f0000001b40)='./file0\x00', 0x1) mknodat(r3, &(0x7f0000001b80)='./file1\x00', 0x4, 0x0) clock_adjtime(0x0, &(0x7f0000001bc0)={0xfff, 0x7fff, 0x0, 0x2, 0xfdc, 0x54, 0x8fa, 0x3f41, 0x0, 0x4, 0x4, 0x5, 0x101, 0x5, 0x4, 0x9, 0x9, 0x30e, 0x3f, 0x2, 0x7f, 0x7, 0x6, 0x4, 0x3ff, 0x100000000}) clock_adjtime(0x2, &(0x7f0000001cc0)={0x0, 0x6, 0x7, 0xe5, 0x5, 0x6, 0x10, 0x7, 0x281, 0x40, 0x1, 0x0, 0x1, 0x10001, 0x5, 0x100, 0x0, 0x4, 0xffffffffffffe001, 0x0, 0x7f, 0x8000, 0x9, 0x400, 0xfffffffffffffe00, 0x3f}) [ 312.167709][T18708] loop4: detected capacity change from 0 to 264192 [ 312.184957][T18710] SELinux: duplicate or incompatible mount options [ 312.191836][T18696] EXT4-fs (loop5): invalid first ino: 0 [ 312.200804][T18708] EXT4-fs (loop4): VFS: Can't find ext4 filesystem 17:05:00 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc01000a, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001", 0x4d, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000003980)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="80", 0x1, 0x11100}], 0x0, &(0x7f00000000c0)) 17:05:00 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc01000a, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001", 0x4d, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000003980)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d0f465001000005fd0f4655f00000000000001000c00000010000800000000000af3010004", 0x2d, 0x11100}], 0x0, &(0x7f00000000c0)) 17:05:00 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc01000a, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001", 0x4d, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000003980)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d0f465001000005fd0f4655f00000000000001000c00000010000800000000000af3010004", 0x2d, 0x11100}], 0x0, &(0x7f00000000c0)) 17:05:00 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc01000a, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001", 0x4d, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000003980)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d0f465001000005fd0f4655f00000000000001000c00000010000800000000000af3010004", 0x2d, 0x11100}], 0x0, &(0x7f00000000c0)) [ 312.222622][T18711] loop1: detected capacity change from 0 to 264192 [ 312.262419][T18716] loop3: detected capacity change from 0 to 264192 17:05:00 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc01000a, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001", 0x4d, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000003980)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="80", 0x1, 0x11100}], 0x0, &(0x7f00000000c0)) [ 312.299956][T18711] EXT4-fs (loop1): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: none. [ 312.314963][T18698] EXT4-fs warning (device loop0): ext4_enable_quotas:6363: Failed to enable quota tracking (type=0, err=-22). Please run e2fsck to fix. [ 312.330001][T18725] loop4: detected capacity change from 0 to 264192 [ 312.339938][T18711] ext4 filesystem being mounted at /root/syzkaller-testdir268235930/syzkaller.DrjInB/773/file0 supports timestamps until 2038 (0x7fffffff) [ 312.344518][T18731] loop5: detected capacity change from 0 to 264192 [ 312.354460][T18725] EXT4-fs (loop4): invalid first ino: 0 [ 312.369791][T18731] EXT4-fs (loop5): invalid first ino: 0 [ 312.370577][T18698] EXT4-fs (loop0): mount failed 17:05:04 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc01000a, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000003980)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d9", 0x4, 0x6800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d0f465001000005fd0f4655f00000000000001000c00000010000800000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}], 0x0, &(0x7f00000000c0)) (fail_nth: 17) 17:05:04 executing program 2: clock_adjtime(0x7, &(0x7f0000000000)={0x8000, 0x62, 0xff, 0x1, 0x3, 0x1ff, 0x3ff, 0x4, 0xff, 0x20, 0x6, 0x401, 0x20, 0x0, 0x1ff, 0x8000, 0xfffffffffffffffd, 0x400, 0x8, 0x100000000, 0x2, 0x8, 0xf32, 0x4, 0x6, 0x80}) clock_adjtime(0x2, &(0x7f0000000100)={0xd9, 0x9, 0x1, 0x2, 0x1f, 0x78, 0x4b1, 0x0, 0x401, 0x5, 0x8, 0x1, 0x101, 0x100000001, 0x7, 0x1fc, 0x9, 0x9, 0x0, 0x9, 0x8, 0x3, 0xff, 0x7, 0x73, 0x946c}) clock_adjtime(0x6, &(0x7f0000000200)={0x4, 0x1, 0x100, 0x6, 0x2, 0x6, 0x1, 0x1dd, 0x9, 0x1000000000000000, 0x0, 0x6, 0x1, 0x1, 0x9, 0x5, 0x3023, 0x2, 0x4, 0xfffffffffffffff9, 0x429, 0x3, 0x0, 0x9, 0xffffffffffffff05, 0x1000}) clock_adjtime(0x3, &(0x7f0000000300)={0x0, 0x8, 0x9, 0x9, 0x9, 0x9, 0x6, 0x9, 0x8, 0x1, 0xd0fc, 0x55, 0x2, 0x0, 0x1, 0x1f, 0x100000001, 0x8f44, 0x53, 0x0, 0x3, 0x140000000000, 0x9, 0x8000, 0x0, 0x10001}) r0 = syz_mount_image$iso9660(&(0x7f0000000400), &(0x7f0000000440)='./file0\x00', 0x4, 0x1, &(0x7f0000000480)=[{0xfffffffffffffffe, 0x0, 0x3}], 0x2014400, &(0x7f00000004c0)={[{@check_relaxed}, {@dmode}, {@check_relaxed}], [{@euid_lt={'euid<', 0xee01}}, {@euid_eq}, {@rootcontext={'rootcontext', 0x3d, 'staff_u'}}, {@obj_user={'obj_user', 0x3d, '#-_'}}, {@rootcontext={'rootcontext', 0x3d, 'staff_u'}}]}) faccessat(r0, &(0x7f0000000580)='./file0\x00', 0x88) clock_adjtime(0x4, &(0x7f00000005c0)={0x80000000, 0x100000000, 0xba, 0x80000000, 0x4, 0x20d4e190, 0x7, 0x400, 0x33, 0x7a, 0x1, 0x465d, 0x7f, 0x5, 0x3, 0x1, 0x0, 0x8, 0x7, 0x7ff, 0x1, 0x4, 0x3f, 0x7fff, 0x700b, 0x96}) r1 = accept$unix(0xffffffffffffffff, 0x0, &(0x7f00000006c0)) getsockname$unix(r1, &(0x7f0000000700), &(0x7f0000000780)=0x6e) clock_adjtime(0x3, &(0x7f00000007c0)={0x6, 0x6, 0x7, 0x8000, 0x7ff, 0x5c, 0x401, 0x2, 0x9, 0x4, 0x0, 0x61, 0x2, 0x9b71, 0x100000000, 0x7fffffff, 0x322, 0xc70d, 0x9, 0xd, 0x9, 0x0, 0x9, 0x1a1f00000000, 0xffffffffffffffff, 0x9}) clock_adjtime(0x6, &(0x7f00000008c0)={0x4, 0x9, 0x3, 0xfffffffffffffff7, 0xb31, 0x1, 0x1, 0x2, 0x538, 0x0, 0x401, 0x1, 0xdd, 0xfffffffffffffff7, 0xec54, 0x4, 0x100000001, 0x0, 0xa, 0x1, 0x7ff, 0xcd, 0xf2, 0x80, 0x7, 0x8000}) clock_adjtime(0x0, &(0x7f00000009c0)={0x8, 0xff, 0x81, 0x2, 0x100000001, 0x11, 0x5, 0x1, 0x1, 0x9, 0x1000, 0x8, 0xdf6c, 0x9, 0x8, 0x1004000000000000, 0x1ff, 0x3, 0x6, 0xf5, 0x80000, 0x1, 0xfffffffffffffd6d, 0x2, 0x6, 0xfa}) r2 = socket$unix(0x1, 0x5, 0x0) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f0000000ac0)={'wlan0\x00'}) mq_timedreceive(0xffffffffffffffff, &(0x7f0000000b00)=""/4096, 0x1000, 0x80, &(0x7f0000001b00)={0x0, 0x989680}) r3 = creat(&(0x7f0000001b40)='./file0\x00', 0x1) mknodat(r3, &(0x7f0000001b80)='./file1\x00', 0x4, 0x0) clock_adjtime(0x0, &(0x7f0000001bc0)={0xfff, 0x7fff, 0x0, 0x2, 0xfdc, 0x54, 0x8fa, 0x3f41, 0x0, 0x4, 0x4, 0x5, 0x101, 0x5, 0x4, 0x9, 0x9, 0x30e, 0x3f, 0x2, 0x7f, 0x7, 0x6, 0x4, 0x3ff, 0x100000000}) clock_adjtime(0x2, &(0x7f0000001cc0)={0x0, 0x6, 0x7, 0xe5, 0x5, 0x6, 0x10, 0x7, 0x281, 0x40, 0x1, 0x0, 0x1, 0x10001, 0x5, 0x100, 0x0, 0x4, 0xffffffffffffe001, 0x0, 0x7f, 0x8000, 0x9, 0x400, 0xfffffffffffffe00, 0x3f}) 17:05:04 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc01000a, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700", 0x63, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000003980)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d0f465001000005fd0f4655f00000000000001", 0x1b, 0x11100}], 0x0, &(0x7f00000000c0)) 17:05:04 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc01000a, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000", 0x5a, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000003980)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d0f465001000005fd0f4655f00000000000001000c00000010000800000000000af3010004", 0x2d, 0x11100}], 0x0, &(0x7f00000000c0)) 17:05:04 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc01000a, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000", 0x5a, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000003980)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="80", 0x1, 0x11100}], 0x0, &(0x7f00000000c0)) 17:05:04 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc01000a, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000011", 0x9, 0x4e0}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300), 0x0, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000003980)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d0f465001000005fd0f4655f00000000000001000c000000100008", 0x23, 0x11100}], 0x0, &(0x7f00000000c0)) [ 312.407088][T18716] EXT4-fs error (device loop3): ext4_orphan_get:1419: comm syz-executor.3: bad orphan inode 17 [ 312.419112][T18716] ext4_test_bit(bit=16, block=18) = 0 [ 312.424602][T18716] EXT4-fs (loop3): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: writeback. [ 312.436022][T18716] ext4 filesystem being mounted at /root/syzkaller-testdir350550748/syzkaller.ONiyFI/857/file0 supports timestamps until 2038 (0x7fffffff) [ 312.483161][T18736] loop1: detected capacity change from 0 to 264192 [ 312.486276][T18738] loop4: detected capacity change from 0 to 264192 [ 312.513547][T18741] loop5: detected capacity change from 0 to 264192 [ 312.513687][T18740] SELinux: duplicate or incompatible mount options [ 312.536726][T18741] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: none. [ 312.548191][T18736] EXT4-fs (loop1): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: none. [ 312.551936][T18745] FAULT_INJECTION: forcing a failure. [ 312.551936][T18745] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 312.559257][T18741] ext4 filesystem being mounted at /root/syzkaller-testdir978532967/syzkaller.UFCZ1t/860/file0 supports timestamps until 2038 (0x7fffffff) 17:05:04 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc01000a, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000", 0x5a, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000003980)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="80", 0x1, 0x11100}], 0x0, &(0x7f00000000c0)) [ 312.572046][T18745] CPU: 1 PID: 18745 Comm: syz-executor.0 Not tainted 5.16.0-syzkaller #0 [ 312.572071][T18745] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 312.586729][T18736] ext4 filesystem being mounted at /root/syzkaller-testdir268235930/syzkaller.DrjInB/774/file0 supports timestamps until 2038 (0x7fffffff) [ 312.594685][T18745] Call Trace: [ 312.594695][T18745] [ 312.594702][T18745] dump_stack_lvl+0xd6/0x122 [ 312.594727][T18745] dump_stack+0x11/0x1b 17:05:04 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc01000a, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700", 0x63, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000003980)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d0f465001000005fd0f4655f00000000000001", 0x1b, 0x11100}], 0x0, &(0x7f00000000c0)) [ 312.594761][T18745] should_fail+0x23c/0x250 [ 312.594779][T18745] __alloc_pages+0x102/0x330 [ 312.643345][T18745] alloc_pages_vma+0x5ee/0x770 [ 312.648170][T18745] shmem_getpage_gfp+0x8bc/0x12c0 [ 312.653215][T18745] shmem_write_begin+0x7e/0x100 [ 312.658089][T18745] generic_perform_write+0x1c8/0x400 [ 312.663550][T18745] ? current_time+0xed/0x1a0 [ 312.668156][T18745] __generic_file_write_iter+0xf7/0x2b0 [ 312.673865][T18745] ? generic_write_checks+0x250/0x290 [ 312.679334][T18745] generic_file_write_iter+0x75/0x130 [ 312.684888][T18745] vfs_write+0x7f5/0x950 [ 312.689137][T18745] __x64_sys_pwrite64+0xf5/0x150 [ 312.694136][T18745] do_syscall_64+0x44/0xd0 [ 312.698582][T18745] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 312.704605][T18745] RIP: 0033:0x7f1cb8ab2e67 [ 312.709029][T18745] Code: 08 89 3c 24 48 89 4c 24 18 e8 e5 f8 ff ff 4c 8b 54 24 18 48 8b 54 24 10 41 89 c0 48 8b 74 24 08 8b 3c 24 b8 12 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 31 44 89 c7 48 89 04 24 e8 15 f9 ff ff 48 8b [ 312.728732][T18745] RSP: 002b:00007f1cb7c75f00 EFLAGS: 00000293 ORIG_RAX: 0000000000000012 [ 312.737260][T18745] RAX: ffffffffffffffda RBX: 00007f1cb8b499c8 RCX: 00007f1cb8ab2e67 [ 312.745254][T18745] RDX: 000000000000001d RSI: 0000000020012e00 RDI: 0000000000000004 [ 312.753228][T18745] RBP: 0000000000000008 R08: 0000000000000000 R09: 00007f1cb7c761d0 [ 312.761269][T18745] R10: 0000000000011080 R11: 0000000000000293 R12: 0000000000000004 [ 312.769307][T18745] R13: 0000000000000004 R14: 0000000020000290 R15: 0000000000000006 [ 312.777289][T18745] [ 312.787878][T18745] loop0: detected capacity change from 0 to 264192 [ 312.795496][T18738] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: none. 17:05:09 executing program 2: clock_adjtime(0x7, &(0x7f0000000000)={0x8000, 0x62, 0xff, 0x1, 0x3, 0x1ff, 0x3ff, 0x4, 0xff, 0x20, 0x6, 0x401, 0x20, 0x0, 0x1ff, 0x8000, 0xfffffffffffffffd, 0x400, 0x8, 0x100000000, 0x2, 0x8, 0xf32, 0x4, 0x6, 0x80}) clock_adjtime(0x2, &(0x7f0000000100)={0xd9, 0x9, 0x1, 0x2, 0x1f, 0x78, 0x4b1, 0x0, 0x401, 0x5, 0x8, 0x1, 0x101, 0x100000001, 0x7, 0x1fc, 0x9, 0x9, 0x0, 0x9, 0x8, 0x3, 0xff, 0x7, 0x73, 0x946c}) clock_adjtime(0x6, &(0x7f0000000200)={0x4, 0x1, 0x100, 0x6, 0x2, 0x6, 0x1, 0x1dd, 0x9, 0x1000000000000000, 0x0, 0x6, 0x1, 0x1, 0x9, 0x5, 0x3023, 0x2, 0x4, 0xfffffffffffffff9, 0x429, 0x3, 0x0, 0x9, 0xffffffffffffff05, 0x1000}) clock_adjtime(0x3, &(0x7f0000000300)={0x0, 0x8, 0x9, 0x9, 0x9, 0x9, 0x6, 0x9, 0x8, 0x1, 0xd0fc, 0x55, 0x2, 0x0, 0x1, 0x1f, 0x100000001, 0x8f44, 0x53, 0x0, 0x3, 0x140000000000, 0x9, 0x8000, 0x0, 0x10001}) r0 = syz_mount_image$iso9660(&(0x7f0000000400), &(0x7f0000000440)='./file0\x00', 0x4, 0x1, &(0x7f0000000480)=[{0xfffffffffffffffe, 0x0, 0x3}], 0x2014400, &(0x7f00000004c0)={[{@check_relaxed}, {@dmode}, {@check_relaxed}], [{@euid_lt={'euid<', 0xee01}}, {@euid_eq}, {@rootcontext={'rootcontext', 0x3d, 'staff_u'}}, {@obj_user={'obj_user', 0x3d, '#-_'}}, {@rootcontext={'rootcontext', 0x3d, 'staff_u'}}]}) faccessat(r0, &(0x7f0000000580)='./file0\x00', 0x88) clock_adjtime(0x4, &(0x7f00000005c0)={0x80000000, 0x100000000, 0xba, 0x80000000, 0x4, 0x20d4e190, 0x7, 0x400, 0x33, 0x7a, 0x1, 0x465d, 0x7f, 0x5, 0x3, 0x1, 0x0, 0x8, 0x7, 0x7ff, 0x1, 0x4, 0x3f, 0x7fff, 0x700b, 0x96}) r1 = accept$unix(0xffffffffffffffff, 0x0, &(0x7f00000006c0)) getsockname$unix(r1, &(0x7f0000000700), &(0x7f0000000780)=0x6e) clock_adjtime(0x3, &(0x7f00000007c0)={0x6, 0x6, 0x7, 0x8000, 0x7ff, 0x5c, 0x401, 0x2, 0x9, 0x4, 0x0, 0x61, 0x2, 0x9b71, 0x100000000, 0x7fffffff, 0x322, 0xc70d, 0x9, 0xd, 0x9, 0x0, 0x9, 0x1a1f00000000, 0xffffffffffffffff, 0x9}) clock_adjtime(0x6, &(0x7f00000008c0)={0x4, 0x9, 0x3, 0xfffffffffffffff7, 0xb31, 0x1, 0x1, 0x2, 0x538, 0x0, 0x401, 0x1, 0xdd, 0xfffffffffffffff7, 0xec54, 0x4, 0x100000001, 0x0, 0xa, 0x1, 0x7ff, 0xcd, 0xf2, 0x80, 0x7, 0x8000}) clock_adjtime(0x0, &(0x7f00000009c0)={0x8, 0xff, 0x81, 0x2, 0x100000001, 0x11, 0x5, 0x1, 0x1, 0x9, 0x1000, 0x8, 0xdf6c, 0x9, 0x8, 0x1004000000000000, 0x1ff, 0x3, 0x6, 0xf5, 0x80000, 0x1, 0xfffffffffffffd6d, 0x2, 0x6, 0xfa}) r2 = socket$unix(0x1, 0x5, 0x0) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f0000000ac0)={'wlan0\x00'}) mq_timedreceive(0xffffffffffffffff, &(0x7f0000000b00)=""/4096, 0x1000, 0x80, &(0x7f0000001b00)={0x0, 0x989680}) r3 = creat(&(0x7f0000001b40)='./file0\x00', 0x1) mknodat(r3, &(0x7f0000001b80)='./file1\x00', 0x4, 0x0) clock_adjtime(0x0, &(0x7f0000001bc0)={0xfff, 0x7fff, 0x0, 0x2, 0xfdc, 0x54, 0x8fa, 0x3f41, 0x0, 0x4, 0x4, 0x5, 0x101, 0x5, 0x4, 0x9, 0x9, 0x30e, 0x3f, 0x2, 0x7f, 0x7, 0x6, 0x4, 0x3ff, 0x100000000}) clock_adjtime(0x2, &(0x7f0000001cc0)={0x0, 0x6, 0x7, 0xe5, 0x5, 0x6, 0x10, 0x7, 0x281, 0x40, 0x1, 0x0, 0x1, 0x10001, 0x5, 0x100, 0x0, 0x4, 0xffffffffffffe001, 0xdf, 0x0, 0x8000, 0x9, 0x400, 0xfffffffffffffe00, 0x3f}) 17:05:09 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc01000a, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000", 0x5a, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000003980)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d0f465001000005fd0f4655f00000000000001000c00000010000800000000000af3010004", 0x2d, 0x11100}], 0x0, &(0x7f00000000c0)) [ 312.831518][T18738] ext4 filesystem being mounted at /root/syzkaller-testdir125786251/syzkaller.yEZeTO/767/file0 supports timestamps until 2038 (0x7fffffff) [ 312.847542][T18750] loop1: detected capacity change from 0 to 264192 [ 312.855765][T18754] loop3: detected capacity change from 0 to 264192 [ 312.874227][T18757] loop5: detected capacity change from 0 to 264192 [ 312.891176][T18745] EXT4-fs error (device loop0): ext4_fill_super:4822: inode #2: comm syz-executor.0: iget: root inode unallocated [ 312.923277][T18759] SELinux: duplicate or incompatible mount options [ 312.952335][T18745] EXT4-fs (loop0): get root inode failed [ 312.958116][T18745] EXT4-fs (loop0): mount failed [ 312.980515][T18757] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: none. [ 312.996193][T18757] ext4 filesystem being mounted at /root/syzkaller-testdir978532967/syzkaller.UFCZ1t/861/file0 supports timestamps until 2038 (0x7fffffff) [ 313.013580][T18754] EXT4-fs error (device loop3): ext4_orphan_get:1419: comm syz-executor.3: bad orphan inode 17 [ 313.024688][T18754] ext4_test_bit(bit=16, block=18) = 0 [ 313.030136][T18754] EXT4-fs (loop3): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: writeback. 17:05:13 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc01000a, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000", 0x5a, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000003980)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="80", 0x1, 0x11100}], 0x0, &(0x7f00000000c0)) 17:05:13 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc01000a, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000011", 0x9, 0x4e0}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000003980)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d0f465001000005fd0f4655f00000000000001000c000000100008", 0x23, 0x11100}], 0x0, &(0x7f00000000c0)) [ 313.050448][T18754] ext4 filesystem being mounted at /root/syzkaller-testdir350550748/syzkaller.ONiyFI/858/file0 supports timestamps until 2038 (0x7fffffff) [ 313.066659][T18767] loop4: detected capacity change from 0 to 264192 [ 313.087121][T18750] EXT4-fs (loop1): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: none. [ 313.104489][T18750] ext4 filesystem being mounted at /root/syzkaller-testdir268235930/syzkaller.DrjInB/775/file0 supports timestamps until 2038 (0x7fffffff) 17:05:13 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc01000a, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000003980)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d9", 0x4, 0x6800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d0f465001000005fd0f4655f00000000000001000c00000010000800000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}], 0x0, &(0x7f00000000c0)) (fail_nth: 18) 17:05:13 executing program 2: clock_adjtime(0x7, &(0x7f0000000000)={0x8000, 0x62, 0xff, 0x1, 0x3, 0x1ff, 0x3ff, 0x4, 0xff, 0x20, 0x6, 0x401, 0x20, 0x0, 0x1ff, 0x8000, 0xfffffffffffffffd, 0x400, 0x8, 0x100000000, 0x2, 0x8, 0xf32, 0x4, 0x6, 0x80}) clock_adjtime(0x2, &(0x7f0000000100)={0xd9, 0x9, 0x1, 0x2, 0x1f, 0x78, 0x4b1, 0x0, 0x401, 0x5, 0x8, 0x1, 0x101, 0x100000001, 0x7, 0x1fc, 0x9, 0x9, 0x0, 0x9, 0x8, 0x3, 0xff, 0x7, 0x73, 0x946c}) clock_adjtime(0x6, &(0x7f0000000200)={0x4, 0x1, 0x100, 0x6, 0x2, 0x6, 0x1, 0x1dd, 0x9, 0x1000000000000000, 0x0, 0x6, 0x1, 0x1, 0x9, 0x5, 0x3023, 0x2, 0x4, 0xfffffffffffffff9, 0x429, 0x3, 0x0, 0x9, 0xffffffffffffff05, 0x1000}) clock_adjtime(0x3, &(0x7f0000000300)={0x0, 0x8, 0x9, 0x9, 0x9, 0x9, 0x6, 0x9, 0x8, 0x1, 0xd0fc, 0x55, 0x2, 0x0, 0x1, 0x1f, 0x100000001, 0x8f44, 0x53, 0x0, 0x3, 0x140000000000, 0x9, 0x8000, 0x0, 0x10001}) r0 = syz_mount_image$iso9660(&(0x7f0000000400), &(0x7f0000000440)='./file0\x00', 0x4, 0x1, &(0x7f0000000480)=[{0xfffffffffffffffe, 0x0, 0x3}], 0x2014400, &(0x7f00000004c0)={[{@check_relaxed}, {@dmode}, {@check_relaxed}], [{@euid_lt={'euid<', 0xee01}}, {@euid_eq}, {@rootcontext={'rootcontext', 0x3d, 'staff_u'}}, {@obj_user={'obj_user', 0x3d, '#-_'}}, {@rootcontext={'rootcontext', 0x3d, 'staff_u'}}]}) faccessat(r0, &(0x7f0000000580)='./file0\x00', 0x88) clock_adjtime(0x4, &(0x7f00000005c0)={0x80000000, 0x100000000, 0xba, 0x80000000, 0x4, 0x20d4e190, 0x7, 0x400, 0x33, 0x7a, 0x1, 0x465d, 0x7f, 0x5, 0x3, 0x1, 0x0, 0x8, 0x7, 0x7ff, 0x1, 0x4, 0x3f, 0x7fff, 0x700b, 0x96}) r1 = accept$unix(0xffffffffffffffff, 0x0, &(0x7f00000006c0)) getsockname$unix(r1, &(0x7f0000000700), &(0x7f0000000780)=0x6e) clock_adjtime(0x3, &(0x7f00000007c0)={0x6, 0x6, 0x7, 0x8000, 0x7ff, 0x5c, 0x401, 0x2, 0x9, 0x4, 0x0, 0x61, 0x2, 0x9b71, 0x100000000, 0x7fffffff, 0x322, 0xc70d, 0x9, 0xd, 0x9, 0x0, 0x9, 0x1a1f00000000, 0xffffffffffffffff, 0x9}) clock_adjtime(0x6, &(0x7f00000008c0)={0x4, 0x9, 0x3, 0xfffffffffffffff7, 0xb31, 0x1, 0x1, 0x2, 0x538, 0x0, 0x401, 0x1, 0xdd, 0xfffffffffffffff7, 0xec54, 0x4, 0x100000001, 0x0, 0xa, 0x1, 0x7ff, 0xcd, 0xf2, 0x80, 0x7, 0x8000}) clock_adjtime(0x0, &(0x7f00000009c0)={0x8, 0xff, 0x81, 0x2, 0x100000001, 0x11, 0x5, 0x1, 0x1, 0x9, 0x1000, 0x8, 0xdf6c, 0x9, 0x8, 0x1004000000000000, 0x1ff, 0x3, 0x6, 0xf5, 0x80000, 0x1, 0xfffffffffffffd6d, 0x2, 0x6, 0xfa}) r2 = socket$unix(0x1, 0x5, 0x0) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f0000000ac0)={'wlan0\x00'}) mq_timedreceive(0xffffffffffffffff, &(0x7f0000000b00)=""/4096, 0x1000, 0x80, &(0x7f0000001b00)={0x0, 0x989680}) r3 = creat(&(0x7f0000001b40)='./file0\x00', 0x1) mknodat(r3, &(0x7f0000001b80)='./file1\x00', 0x4, 0x0) clock_adjtime(0x0, &(0x7f0000001bc0)={0xfff, 0x7fff, 0x0, 0x2, 0xfdc, 0x54, 0x8fa, 0x3f41, 0x0, 0x4, 0x4, 0x5, 0x101, 0x5, 0x4, 0x9, 0x9, 0x30e, 0x3f, 0x2, 0x7f, 0x7, 0x6, 0x4, 0x3ff, 0x100000000}) clock_adjtime(0x2, &(0x7f0000001cc0)={0x0, 0x6, 0x7, 0xe5, 0x5, 0x6, 0x10, 0x7, 0x281, 0x40, 0x1, 0x0, 0x1, 0x10001, 0x5, 0x100, 0x0, 0x4, 0xffffffffffffe001, 0xdf, 0x0, 0x8000, 0x9, 0x400, 0xfffffffffffffe00, 0x3f}) 17:05:13 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc01000a, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b00000080000000080000005247000062", 0x65, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000003980)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d0f465001000005fd0f4655f00000000000001", 0x1b, 0x11100}], 0x0, &(0x7f00000000c0)) 17:05:13 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc01000a, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000", 0x60, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000003980)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="80", 0x1, 0x11100}], 0x0, &(0x7f00000000c0)) [ 313.147270][T18767] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: none. [ 313.166439][T18767] ext4 filesystem being mounted at /root/syzkaller-testdir125786251/syzkaller.yEZeTO/768/file0 supports timestamps until 2038 (0x7fffffff) [ 313.169880][T18774] SELinux: duplicate or incompatible mount options [ 313.191569][T18776] FAULT_INJECTION: forcing a failure. 17:05:13 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc01000a, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000", 0x5a, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000003980)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d0f465001000005fd0f4655f00000000000001000c00000010000800000000000af3010004", 0x2d, 0x11100}], 0x0, &(0x7f00000000c0)) [ 313.191569][T18776] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 313.204699][T18776] CPU: 0 PID: 18776 Comm: syz-executor.0 Not tainted 5.16.0-syzkaller #0 [ 313.213333][T18776] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 313.223553][T18776] Call Trace: [ 313.226839][T18776] [ 313.229810][T18776] dump_stack_lvl+0xd6/0x122 [ 313.234491][T18776] dump_stack+0x11/0x1b [ 313.238751][T18776] should_fail+0x23c/0x250 [ 313.239021][T18778] loop3: detected capacity change from 0 to 264192 [ 313.243196][T18776] should_fail_usercopy+0x16/0x20 [ 313.254714][T18776] copy_page_from_iter_atomic+0x2f1/0xc60 [ 313.260441][T18776] ? shmem_write_begin+0x7e/0x100 [ 313.265482][T18776] generic_perform_write+0x211/0x400 [ 313.270782][T18776] ? current_time+0xed/0x1a0 [ 313.275388][T18776] __generic_file_write_iter+0xf7/0x2b0 [ 313.281026][T18776] ? generic_write_checks+0x250/0x290 [ 313.286399][T18776] generic_file_write_iter+0x75/0x130 [ 313.291770][T18776] vfs_write+0x7f5/0x950 [ 313.296008][T18776] __x64_sys_pwrite64+0xf5/0x150 [ 313.300938][T18776] do_syscall_64+0x44/0xd0 [ 313.305411][T18776] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 313.311297][T18776] RIP: 0033:0x7f1cb8ab2e67 [ 313.315698][T18776] Code: 08 89 3c 24 48 89 4c 24 18 e8 e5 f8 ff ff 4c 8b 54 24 18 48 8b 54 24 10 41 89 c0 48 8b 74 24 08 8b 3c 24 b8 12 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 31 44 89 c7 48 89 04 24 e8 15 f9 ff ff 48 8b [ 313.335381][T18776] RSP: 002b:00007f1cb7c75f00 EFLAGS: 00000293 ORIG_RAX: 0000000000000012 [ 313.343788][T18776] RAX: ffffffffffffffda RBX: 00007f1cb8b499c8 RCX: 00007f1cb8ab2e67 [ 313.351818][T18776] RDX: 000000000000001d RSI: 0000000020012e00 RDI: 0000000000000004 [ 313.359780][T18776] RBP: 0000000000000008 R08: 0000000000000000 R09: 00007f1cb7c761d0 [ 313.367857][T18776] R10: 0000000000011080 R11: 0000000000000293 R12: 0000000000000004 [ 313.375894][T18776] R13: 0000000000000004 R14: 0000000020000290 R15: 0000000000000006 [ 313.383907][T18776] [ 313.389257][T18780] loop1: detected capacity change from 0 to 264192 [ 313.410115][T18783] loop5: detected capacity change from 0 to 264192 [ 313.418558][T18776] loop0: detected capacity change from 0 to 264192 [ 313.422747][T18783] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: none. [ 313.440148][T18778] EXT4-fs error (device loop3): ext4_orphan_get:1419: comm syz-executor.3: bad orphan inode 17 17:05:17 executing program 2: clock_adjtime(0x7, &(0x7f0000000000)={0x8000, 0x62, 0xff, 0x1, 0x3, 0x1ff, 0x3ff, 0x4, 0xff, 0x20, 0x6, 0x401, 0x20, 0x0, 0x1ff, 0x8000, 0xfffffffffffffffd, 0x400, 0x8, 0x100000000, 0x2, 0x8, 0xf32, 0x4, 0x6, 0x80}) clock_adjtime(0x2, &(0x7f0000000100)={0xd9, 0x9, 0x1, 0x2, 0x1f, 0x78, 0x4b1, 0x0, 0x401, 0x5, 0x8, 0x1, 0x101, 0x100000001, 0x7, 0x1fc, 0x9, 0x9, 0x0, 0x9, 0x8, 0x3, 0xff, 0x7, 0x73, 0x946c}) clock_adjtime(0x6, &(0x7f0000000200)={0x4, 0x1, 0x100, 0x6, 0x2, 0x6, 0x1, 0x1dd, 0x9, 0x1000000000000000, 0x0, 0x6, 0x1, 0x1, 0x9, 0x5, 0x3023, 0x2, 0x4, 0xfffffffffffffff9, 0x429, 0x3, 0x0, 0x9, 0xffffffffffffff05, 0x1000}) clock_adjtime(0x3, &(0x7f0000000300)={0x0, 0x8, 0x9, 0x9, 0x9, 0x9, 0x6, 0x9, 0x8, 0x1, 0xd0fc, 0x55, 0x2, 0x0, 0x1, 0x1f, 0x100000001, 0x8f44, 0x53, 0x0, 0x3, 0x140000000000, 0x9, 0x8000, 0x0, 0x10001}) r0 = syz_mount_image$iso9660(&(0x7f0000000400), &(0x7f0000000440)='./file0\x00', 0x4, 0x1, &(0x7f0000000480)=[{0xfffffffffffffffe, 0x0, 0x3}], 0x2014400, &(0x7f00000004c0)={[{@check_relaxed}, {@dmode}, {@check_relaxed}], [{@euid_lt={'euid<', 0xee01}}, {@euid_eq}, {@rootcontext={'rootcontext', 0x3d, 'staff_u'}}, {@obj_user={'obj_user', 0x3d, '#-_'}}, {@rootcontext={'rootcontext', 0x3d, 'staff_u'}}]}) faccessat(r0, &(0x7f0000000580)='./file0\x00', 0x88) clock_adjtime(0x4, &(0x7f00000005c0)={0x80000000, 0x100000000, 0xba, 0x80000000, 0x4, 0x20d4e190, 0x7, 0x400, 0x33, 0x7a, 0x1, 0x465d, 0x7f, 0x5, 0x3, 0x1, 0x0, 0x8, 0x7, 0x7ff, 0x1, 0x4, 0x3f, 0x7fff, 0x700b, 0x96}) r1 = accept$unix(0xffffffffffffffff, 0x0, &(0x7f00000006c0)) getsockname$unix(r1, &(0x7f0000000700), &(0x7f0000000780)=0x6e) clock_adjtime(0x3, &(0x7f00000007c0)={0x6, 0x6, 0x7, 0x8000, 0x7ff, 0x5c, 0x401, 0x2, 0x9, 0x4, 0x0, 0x61, 0x2, 0x9b71, 0x100000000, 0x7fffffff, 0x322, 0xc70d, 0x9, 0xd, 0x9, 0x0, 0x9, 0x1a1f00000000, 0xffffffffffffffff, 0x9}) clock_adjtime(0x6, &(0x7f00000008c0)={0x4, 0x9, 0x3, 0xfffffffffffffff7, 0xb31, 0x1, 0x1, 0x2, 0x538, 0x0, 0x401, 0x1, 0xdd, 0xfffffffffffffff7, 0xec54, 0x4, 0x100000001, 0x0, 0xa, 0x1, 0x7ff, 0xcd, 0xf2, 0x80, 0x7, 0x8000}) clock_adjtime(0x0, &(0x7f00000009c0)={0x8, 0xff, 0x81, 0x2, 0x100000001, 0x11, 0x5, 0x1, 0x1, 0x9, 0x1000, 0x8, 0xdf6c, 0x9, 0x8, 0x1004000000000000, 0x1ff, 0x3, 0x6, 0xf5, 0x80000, 0x1, 0xfffffffffffffd6d, 0x2, 0x6, 0xfa}) r2 = socket$unix(0x1, 0x5, 0x0) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f0000000ac0)={'wlan0\x00'}) mq_timedreceive(0xffffffffffffffff, &(0x7f0000000b00)=""/4096, 0x1000, 0x80, &(0x7f0000001b00)={0x0, 0x989680}) r3 = creat(&(0x7f0000001b40)='./file0\x00', 0x1) mknodat(r3, &(0x7f0000001b80)='./file1\x00', 0x4, 0x0) clock_adjtime(0x0, &(0x7f0000001bc0)={0xfff, 0x7fff, 0x0, 0x2, 0xfdc, 0x54, 0x8fa, 0x3f41, 0x0, 0x4, 0x4, 0x5, 0x101, 0x5, 0x4, 0x9, 0x9, 0x30e, 0x3f, 0x2, 0x7f, 0x7, 0x6, 0x4, 0x3ff, 0x100000000}) clock_adjtime(0x2, &(0x7f0000001cc0)={0x0, 0x6, 0x7, 0xe5, 0x5, 0x6, 0x10, 0x7, 0x281, 0x40, 0x1, 0x0, 0x1, 0x10001, 0x5, 0x100, 0x0, 0x4, 0xffffffffffffe001, 0xdf, 0x0, 0x8000, 0x9, 0x400, 0xfffffffffffffe00, 0x3f}) 17:05:17 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc01000a, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000", 0x60, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000003980)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="80", 0x1, 0x11100}], 0x0, &(0x7f00000000c0)) [ 313.444078][T18783] ext4 filesystem being mounted at /root/syzkaller-testdir978532967/syzkaller.UFCZ1t/863/file0 supports timestamps until 2038 (0x7fffffff) [ 313.477714][T18793] loop4: detected capacity change from 0 to 264192 [ 313.484996][T18778] ext4_test_bit(bit=16, block=18) = 0 [ 313.490508][T18778] EXT4-fs (loop3): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: writeback. 17:05:17 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc01000a, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000011", 0x9, 0x4e0}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000003980)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d0f465001000005fd0f4655f00000000000001000c000000100008", 0x23, 0x11100}], 0x0, &(0x7f00000000c0)) [ 313.505270][T18778] ext4 filesystem being mounted at /root/syzkaller-testdir350550748/syzkaller.ONiyFI/859/file0 supports timestamps until 2038 (0x7fffffff) [ 313.510317][T18780] EXT4-fs (loop1): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: none. [ 313.537681][T18780] ext4 filesystem being mounted at /root/syzkaller-testdir268235930/syzkaller.DrjInB/776/file0 supports timestamps until 2038 (0x7fffffff) 17:05:17 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc01000a, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b00000080000000080000005247000062", 0x65, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000003980)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d0f465001000005fd0f4655f00000000000001", 0x1b, 0x11100}], 0x0, &(0x7f00000000c0)) [ 313.564293][T18794] SELinux: duplicate or incompatible mount options [ 313.578535][T18793] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: none. [ 313.589935][T18776] EXT4-fs warning (device loop0): ext4_enable_quotas:6363: Failed to enable quota tracking (type=0, err=-22). Please run e2fsck to fix. [ 313.611031][T18776] EXT4-fs (loop0): mount failed [ 313.619394][T18793] ext4 filesystem being mounted at /root/syzkaller-testdir125786251/syzkaller.yEZeTO/769/file0 supports timestamps until 2038 (0x7fffffff) [ 313.638418][T18800] loop5: detected capacity change from 0 to 264192 17:05:17 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc01000a, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000", 0x60, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000003980)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d0f465001000005fd0f4655f00000000000001000c00000010000800000000000af3010004", 0x2d, 0x11100}], 0x0, &(0x7f00000000c0)) 17:05:22 executing program 2: clock_adjtime(0x7, &(0x7f0000000000)={0x8000, 0x62, 0xff, 0x1, 0x3, 0x1ff, 0x3ff, 0x4, 0xff, 0x20, 0x6, 0x401, 0x20, 0x0, 0x1ff, 0x8000, 0xfffffffffffffffd, 0x400, 0x8, 0x100000000, 0x2, 0x8, 0xf32, 0x4, 0x6, 0x80}) clock_adjtime(0x2, &(0x7f0000000100)={0xd9, 0x9, 0x1, 0x2, 0x1f, 0x78, 0x4b1, 0x0, 0x401, 0x5, 0x8, 0x1, 0x101, 0x100000001, 0x7, 0x1fc, 0x9, 0x9, 0x0, 0x9, 0x8, 0x3, 0xff, 0x7, 0x73, 0x946c}) clock_adjtime(0x6, &(0x7f0000000200)={0x4, 0x1, 0x100, 0x6, 0x2, 0x6, 0x1, 0x1dd, 0x9, 0x1000000000000000, 0x0, 0x6, 0x1, 0x1, 0x9, 0x5, 0x3023, 0x2, 0x4, 0xfffffffffffffff9, 0x429, 0x3, 0x0, 0x9, 0xffffffffffffff05, 0x1000}) clock_adjtime(0x3, &(0x7f0000000300)={0x0, 0x8, 0x9, 0x9, 0x9, 0x9, 0x6, 0x9, 0x8, 0x1, 0xd0fc, 0x55, 0x2, 0x0, 0x1, 0x1f, 0x100000001, 0x8f44, 0x53, 0x0, 0x3, 0x140000000000, 0x9, 0x8000, 0x0, 0x10001}) r0 = syz_mount_image$iso9660(&(0x7f0000000400), &(0x7f0000000440)='./file0\x00', 0x4, 0x1, &(0x7f0000000480)=[{0xfffffffffffffffe, 0x0, 0x3}], 0x2014400, &(0x7f00000004c0)={[{@check_relaxed}, {@dmode}, {@check_relaxed}], [{@euid_lt={'euid<', 0xee01}}, {@euid_eq}, {@rootcontext={'rootcontext', 0x3d, 'staff_u'}}, {@obj_user={'obj_user', 0x3d, '#-_'}}, {@rootcontext={'rootcontext', 0x3d, 'staff_u'}}]}) faccessat(r0, &(0x7f0000000580)='./file0\x00', 0x88) clock_adjtime(0x4, &(0x7f00000005c0)={0x80000000, 0x100000000, 0xba, 0x80000000, 0x4, 0x20d4e190, 0x7, 0x400, 0x33, 0x7a, 0x1, 0x465d, 0x7f, 0x5, 0x3, 0x1, 0x0, 0x8, 0x7, 0x7ff, 0x1, 0x4, 0x3f, 0x7fff, 0x700b, 0x96}) r1 = accept$unix(0xffffffffffffffff, 0x0, &(0x7f00000006c0)) getsockname$unix(r1, &(0x7f0000000700), &(0x7f0000000780)=0x6e) clock_adjtime(0x3, &(0x7f00000007c0)={0x6, 0x6, 0x7, 0x8000, 0x7ff, 0x5c, 0x401, 0x2, 0x9, 0x4, 0x0, 0x61, 0x2, 0x9b71, 0x100000000, 0x7fffffff, 0x322, 0xc70d, 0x9, 0xd, 0x9, 0x0, 0x9, 0x1a1f00000000, 0xffffffffffffffff, 0x9}) clock_adjtime(0x6, &(0x7f00000008c0)={0x4, 0x9, 0x3, 0xfffffffffffffff7, 0xb31, 0x1, 0x1, 0x2, 0x538, 0x0, 0x401, 0x1, 0xdd, 0xfffffffffffffff7, 0xec54, 0x4, 0x100000001, 0x0, 0xa, 0x1, 0x7ff, 0xcd, 0xf2, 0x80, 0x7, 0x8000}) clock_adjtime(0x0, &(0x7f00000009c0)={0x8, 0xff, 0x81, 0x2, 0x100000001, 0x11, 0x5, 0x1, 0x1, 0x9, 0x1000, 0x8, 0xdf6c, 0x9, 0x8, 0x1004000000000000, 0x1ff, 0x3, 0x6, 0xf5, 0x80000, 0x1, 0xfffffffffffffd6d, 0x2, 0x6, 0xfa}) r2 = socket$unix(0x1, 0x5, 0x0) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f0000000ac0)={'wlan0\x00'}) mq_timedreceive(0xffffffffffffffff, &(0x7f0000000b00)=""/4096, 0x1000, 0x80, &(0x7f0000001b00)={0x0, 0x989680}) r3 = creat(&(0x7f0000001b40)='./file0\x00', 0x1) mknodat(r3, &(0x7f0000001b80)='./file1\x00', 0x4, 0x0) clock_adjtime(0x0, &(0x7f0000001bc0)={0xfff, 0x7fff, 0x0, 0x2, 0xfdc, 0x54, 0x8fa, 0x3f41, 0x0, 0x4, 0x4, 0x5, 0x101, 0x5, 0x4, 0x9, 0x9, 0x30e, 0x3f, 0x2, 0x7f, 0x7, 0x6, 0x4, 0x3ff, 0x100000000}) clock_adjtime(0x2, &(0x7f0000001cc0)={0x0, 0x6, 0x7, 0xe5, 0x5, 0x6, 0x10, 0x7, 0x281, 0x40, 0x1, 0x0, 0x1, 0x10001, 0x5, 0x100, 0x0, 0x4, 0xffffffffffffe001, 0xdf, 0x7f, 0x0, 0x9, 0x400, 0xfffffffffffffe00, 0x3f}) [ 313.667785][T18803] loop3: detected capacity change from 0 to 264192 [ 313.701710][T18800] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: none. 17:05:22 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc01000a, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000", 0x60, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000003980)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="80", 0x1, 0x11100}], 0x0, &(0x7f00000000c0)) 17:05:22 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc01000a, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000003980)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d9", 0x4, 0x6800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d0f465001000005fd0f4655f00000000000001000c00000010000800000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}], 0x0, &(0x7f00000000c0)) (fail_nth: 19) [ 313.720840][T18808] SELinux: duplicate or incompatible mount options [ 313.725454][T18800] ext4 filesystem being mounted at /root/syzkaller-testdir978532967/syzkaller.UFCZ1t/864/file0 supports timestamps until 2038 (0x7fffffff) [ 313.731889][T18809] loop1: detected capacity change from 0 to 264192 [ 313.784449][T18816] FAULT_INJECTION: forcing a failure. [ 313.784449][T18816] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 313.795531][T18814] loop4: detected capacity change from 0 to 264192 [ 313.797744][T18816] CPU: 0 PID: 18816 Comm: syz-executor.0 Not tainted 5.16.0-syzkaller #0 [ 313.812644][T18816] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 313.823346][T18816] Call Trace: [ 313.826636][T18816] [ 313.829567][T18816] dump_stack_lvl+0xd6/0x122 [ 313.834173][T18816] dump_stack+0x11/0x1b [ 313.838334][T18816] should_fail+0x23c/0x250 [ 313.842755][T18816] should_fail_usercopy+0x16/0x20 [ 313.847794][T18816] copy_page_from_iter_atomic+0x2f1/0xc60 [ 313.853592][T18816] ? shmem_write_begin+0x7e/0x100 [ 313.858649][T18816] generic_perform_write+0x211/0x400 [ 313.864018][T18816] ? current_time+0xed/0x1a0 [ 313.868622][T18816] __generic_file_write_iter+0xf7/0x2b0 [ 313.874267][T18816] ? generic_write_checks+0x250/0x290 [ 313.879771][T18816] generic_file_write_iter+0x75/0x130 [ 313.885215][T18816] vfs_write+0x7f5/0x950 [ 313.889471][T18816] __x64_sys_pwrite64+0xf5/0x150 [ 313.894560][T18816] do_syscall_64+0x44/0xd0 [ 313.899116][T18816] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 313.905011][T18816] RIP: 0033:0x7f1cb8ab2e67 [ 313.909750][T18816] Code: 08 89 3c 24 48 89 4c 24 18 e8 e5 f8 ff ff 4c 8b 54 24 18 48 8b 54 24 10 41 89 c0 48 8b 74 24 08 8b 3c 24 b8 12 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 31 44 89 c7 48 89 04 24 e8 15 f9 ff ff 48 8b [ 313.929365][T18816] RSP: 002b:00007f1cb7c75f00 EFLAGS: 00000293 ORIG_RAX: 0000000000000012 [ 313.938080][T18816] RAX: ffffffffffffffda RBX: 00007f1cb8b499c8 RCX: 00007f1cb8ab2e67 [ 313.946228][T18816] RDX: 000000000000003d RSI: 0000000020012f00 RDI: 0000000000000004 [ 313.954275][T18816] RBP: 0000000000000008 R08: 0000000000000000 R09: 00007f1cb7c761d0 [ 313.962253][T18816] R10: 0000000000011100 R11: 0000000000000293 R12: 0000000000000004 [ 313.970360][T18816] R13: 0000000000000004 R14: 00000000200002a8 R15: 0000000000000007 [ 313.978333][T18816] 17:05:26 executing program 2: clock_adjtime(0x7, &(0x7f0000000000)={0x8000, 0x62, 0xff, 0x1, 0x3, 0x1ff, 0x3ff, 0x4, 0xff, 0x20, 0x6, 0x401, 0x20, 0x0, 0x1ff, 0x8000, 0xfffffffffffffffd, 0x400, 0x8, 0x100000000, 0x2, 0x8, 0xf32, 0x4, 0x6, 0x80}) clock_adjtime(0x2, &(0x7f0000000100)={0xd9, 0x9, 0x1, 0x2, 0x1f, 0x78, 0x4b1, 0x0, 0x401, 0x5, 0x8, 0x1, 0x101, 0x100000001, 0x7, 0x1fc, 0x9, 0x9, 0x0, 0x9, 0x8, 0x3, 0xff, 0x7, 0x73, 0x946c}) clock_adjtime(0x6, &(0x7f0000000200)={0x4, 0x1, 0x100, 0x6, 0x2, 0x6, 0x1, 0x1dd, 0x9, 0x1000000000000000, 0x0, 0x6, 0x1, 0x1, 0x9, 0x5, 0x3023, 0x2, 0x4, 0xfffffffffffffff9, 0x429, 0x3, 0x0, 0x9, 0xffffffffffffff05, 0x1000}) clock_adjtime(0x3, &(0x7f0000000300)={0x0, 0x8, 0x9, 0x9, 0x9, 0x9, 0x6, 0x9, 0x8, 0x1, 0xd0fc, 0x55, 0x2, 0x0, 0x1, 0x1f, 0x100000001, 0x8f44, 0x53, 0x0, 0x3, 0x140000000000, 0x9, 0x8000, 0x0, 0x10001}) r0 = syz_mount_image$iso9660(&(0x7f0000000400), &(0x7f0000000440)='./file0\x00', 0x4, 0x1, &(0x7f0000000480)=[{0xfffffffffffffffe, 0x0, 0x3}], 0x2014400, &(0x7f00000004c0)={[{@check_relaxed}, {@dmode}, {@check_relaxed}], [{@euid_lt={'euid<', 0xee01}}, {@euid_eq}, {@rootcontext={'rootcontext', 0x3d, 'staff_u'}}, {@obj_user={'obj_user', 0x3d, '#-_'}}, {@rootcontext={'rootcontext', 0x3d, 'staff_u'}}]}) faccessat(r0, &(0x7f0000000580)='./file0\x00', 0x88) clock_adjtime(0x4, &(0x7f00000005c0)={0x80000000, 0x100000000, 0xba, 0x80000000, 0x4, 0x20d4e190, 0x7, 0x400, 0x33, 0x7a, 0x1, 0x465d, 0x7f, 0x5, 0x3, 0x1, 0x0, 0x8, 0x7, 0x7ff, 0x1, 0x4, 0x3f, 0x7fff, 0x700b, 0x96}) r1 = accept$unix(0xffffffffffffffff, 0x0, &(0x7f00000006c0)) getsockname$unix(r1, &(0x7f0000000700), &(0x7f0000000780)=0x6e) clock_adjtime(0x3, &(0x7f00000007c0)={0x6, 0x6, 0x7, 0x8000, 0x7ff, 0x5c, 0x401, 0x2, 0x9, 0x4, 0x0, 0x61, 0x2, 0x9b71, 0x100000000, 0x7fffffff, 0x322, 0xc70d, 0x9, 0xd, 0x9, 0x0, 0x9, 0x1a1f00000000, 0xffffffffffffffff, 0x9}) clock_adjtime(0x6, &(0x7f00000008c0)={0x4, 0x9, 0x3, 0xfffffffffffffff7, 0xb31, 0x1, 0x1, 0x2, 0x538, 0x0, 0x401, 0x1, 0xdd, 0xfffffffffffffff7, 0xec54, 0x4, 0x100000001, 0x0, 0xa, 0x1, 0x7ff, 0xcd, 0xf2, 0x80, 0x7, 0x8000}) clock_adjtime(0x0, &(0x7f00000009c0)={0x8, 0xff, 0x81, 0x2, 0x100000001, 0x11, 0x5, 0x1, 0x1, 0x9, 0x1000, 0x8, 0xdf6c, 0x9, 0x8, 0x1004000000000000, 0x1ff, 0x3, 0x6, 0xf5, 0x80000, 0x1, 0xfffffffffffffd6d, 0x2, 0x6, 0xfa}) r2 = socket$unix(0x1, 0x5, 0x0) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f0000000ac0)={'wlan0\x00'}) mq_timedreceive(0xffffffffffffffff, &(0x7f0000000b00)=""/4096, 0x1000, 0x80, &(0x7f0000001b00)={0x0, 0x989680}) r3 = creat(&(0x7f0000001b40)='./file0\x00', 0x1) mknodat(r3, &(0x7f0000001b80)='./file1\x00', 0x4, 0x0) clock_adjtime(0x0, &(0x7f0000001bc0)={0xfff, 0x7fff, 0x0, 0x2, 0xfdc, 0x54, 0x8fa, 0x3f41, 0x0, 0x4, 0x4, 0x5, 0x101, 0x5, 0x4, 0x9, 0x9, 0x30e, 0x3f, 0x2, 0x7f, 0x7, 0x6, 0x4, 0x3ff, 0x100000000}) clock_adjtime(0x2, &(0x7f0000001cc0)={0x0, 0x6, 0x7, 0xe5, 0x5, 0x6, 0x10, 0x7, 0x281, 0x40, 0x1, 0x0, 0x1, 0x10001, 0x5, 0x100, 0x0, 0x4, 0xffffffffffffe001, 0xdf, 0x7f, 0x0, 0x9, 0x400, 0xfffffffffffffe00, 0x3f}) [ 313.984837][T18803] EXT4-fs error (device loop3): ext4_orphan_get:1419: comm syz-executor.3: bad orphan inode 17 [ 314.004363][T18822] SELinux: duplicate or incompatible mount options [ 314.011567][T18816] loop0: detected capacity change from 0 to 264192 [ 314.018592][T18809] EXT4-fs (loop1): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: none. [ 314.028953][T18803] ext4_test_bit(bit=16, block=18) = 0 [ 314.029415][T18809] ext4 filesystem being mounted at /root/syzkaller-testdir268235930/syzkaller.DrjInB/777/file0 supports timestamps until 2038 (0x7fffffff) [ 314.034518][T18803] EXT4-fs (loop3): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: writeback. [ 314.061351][T18803] ext4 filesystem being mounted at /root/syzkaller-testdir350550748/syzkaller.ONiyFI/860/file0 supports timestamps until 2038 (0x7fffffff) 17:05:26 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc01000a, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b00000080000000080000005247000062", 0x65, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000003980)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d0f465001000005fd0f4655f00000000000001", 0x1b, 0x11100}], 0x0, &(0x7f00000000c0)) 17:05:30 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc01000a, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000011", 0x9, 0x4e0}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000003980)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d0f465001000005fd0f4655f00000000000001000c000000100008", 0x23, 0x11100}], 0x0, &(0x7f00000000c0)) [ 314.081376][T18814] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: none. [ 314.081730][T18828] loop5: detected capacity change from 0 to 264192 [ 314.099507][T18814] ext4 filesystem being mounted at /root/syzkaller-testdir125786251/syzkaller.yEZeTO/770/file0 supports timestamps until 2038 (0x7fffffff) [ 314.113763][T18816] EXT4-fs warning (device loop0): ext4_enable_quotas:6363: Failed to enable quota tracking (type=0, err=-22). Please run e2fsck to fix. 17:05:30 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc01000a, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000", 0x60, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000003980)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d0f465001000005fd0f4655f00000000000001000c00000010000800000000000af3010004", 0x2d, 0x11100}], 0x0, &(0x7f00000000c0)) 17:05:30 executing program 2: clock_adjtime(0x7, &(0x7f0000000000)={0x8000, 0x62, 0xff, 0x1, 0x3, 0x1ff, 0x3ff, 0x4, 0xff, 0x20, 0x6, 0x401, 0x20, 0x0, 0x1ff, 0x8000, 0xfffffffffffffffd, 0x400, 0x8, 0x100000000, 0x2, 0x8, 0xf32, 0x4, 0x6, 0x80}) clock_adjtime(0x2, &(0x7f0000000100)={0xd9, 0x9, 0x1, 0x2, 0x1f, 0x78, 0x4b1, 0x0, 0x401, 0x5, 0x8, 0x1, 0x101, 0x100000001, 0x7, 0x1fc, 0x9, 0x9, 0x0, 0x9, 0x8, 0x3, 0xff, 0x7, 0x73, 0x946c}) clock_adjtime(0x6, &(0x7f0000000200)={0x4, 0x1, 0x100, 0x6, 0x2, 0x6, 0x1, 0x1dd, 0x9, 0x1000000000000000, 0x0, 0x6, 0x1, 0x1, 0x9, 0x5, 0x3023, 0x2, 0x4, 0xfffffffffffffff9, 0x429, 0x3, 0x0, 0x9, 0xffffffffffffff05, 0x1000}) clock_adjtime(0x3, &(0x7f0000000300)={0x0, 0x8, 0x9, 0x9, 0x9, 0x9, 0x6, 0x9, 0x8, 0x1, 0xd0fc, 0x55, 0x2, 0x0, 0x1, 0x1f, 0x100000001, 0x8f44, 0x53, 0x0, 0x3, 0x140000000000, 0x9, 0x8000, 0x0, 0x10001}) r0 = syz_mount_image$iso9660(&(0x7f0000000400), &(0x7f0000000440)='./file0\x00', 0x4, 0x1, &(0x7f0000000480)=[{0xfffffffffffffffe, 0x0, 0x3}], 0x2014400, &(0x7f00000004c0)={[{@check_relaxed}, {@dmode}, {@check_relaxed}], [{@euid_lt={'euid<', 0xee01}}, {@euid_eq}, {@rootcontext={'rootcontext', 0x3d, 'staff_u'}}, {@obj_user={'obj_user', 0x3d, '#-_'}}, {@rootcontext={'rootcontext', 0x3d, 'staff_u'}}]}) faccessat(r0, &(0x7f0000000580)='./file0\x00', 0x88) clock_adjtime(0x4, &(0x7f00000005c0)={0x80000000, 0x100000000, 0xba, 0x80000000, 0x4, 0x20d4e190, 0x7, 0x400, 0x33, 0x7a, 0x1, 0x465d, 0x7f, 0x5, 0x3, 0x1, 0x0, 0x8, 0x7, 0x7ff, 0x1, 0x4, 0x3f, 0x7fff, 0x700b, 0x96}) r1 = accept$unix(0xffffffffffffffff, 0x0, &(0x7f00000006c0)) getsockname$unix(r1, &(0x7f0000000700), &(0x7f0000000780)=0x6e) clock_adjtime(0x3, &(0x7f00000007c0)={0x6, 0x6, 0x7, 0x8000, 0x7ff, 0x5c, 0x401, 0x2, 0x9, 0x4, 0x0, 0x61, 0x2, 0x9b71, 0x100000000, 0x7fffffff, 0x322, 0xc70d, 0x9, 0xd, 0x9, 0x0, 0x9, 0x1a1f00000000, 0xffffffffffffffff, 0x9}) clock_adjtime(0x6, &(0x7f00000008c0)={0x4, 0x9, 0x3, 0xfffffffffffffff7, 0xb31, 0x1, 0x1, 0x2, 0x538, 0x0, 0x401, 0x1, 0xdd, 0xfffffffffffffff7, 0xec54, 0x4, 0x100000001, 0x0, 0xa, 0x1, 0x7ff, 0xcd, 0xf2, 0x80, 0x7, 0x8000}) clock_adjtime(0x0, &(0x7f00000009c0)={0x8, 0xff, 0x81, 0x2, 0x100000001, 0x11, 0x5, 0x1, 0x1, 0x9, 0x1000, 0x8, 0xdf6c, 0x9, 0x8, 0x1004000000000000, 0x1ff, 0x3, 0x6, 0xf5, 0x80000, 0x1, 0xfffffffffffffd6d, 0x2, 0x6, 0xfa}) r2 = socket$unix(0x1, 0x5, 0x0) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f0000000ac0)={'wlan0\x00'}) mq_timedreceive(0xffffffffffffffff, &(0x7f0000000b00)=""/4096, 0x1000, 0x80, &(0x7f0000001b00)={0x0, 0x989680}) r3 = creat(&(0x7f0000001b40)='./file0\x00', 0x1) mknodat(r3, &(0x7f0000001b80)='./file1\x00', 0x4, 0x0) clock_adjtime(0x0, &(0x7f0000001bc0)={0xfff, 0x7fff, 0x0, 0x2, 0xfdc, 0x54, 0x8fa, 0x3f41, 0x0, 0x4, 0x4, 0x5, 0x101, 0x5, 0x4, 0x9, 0x9, 0x30e, 0x3f, 0x2, 0x7f, 0x7, 0x6, 0x4, 0x3ff, 0x100000000}) clock_adjtime(0x2, &(0x7f0000001cc0)={0x0, 0x6, 0x7, 0xe5, 0x5, 0x6, 0x10, 0x7, 0x281, 0x40, 0x1, 0x0, 0x1, 0x10001, 0x5, 0x100, 0x0, 0x4, 0xffffffffffffe001, 0xdf, 0x7f, 0x0, 0x9, 0x400, 0xfffffffffffffe00, 0x3f}) [ 314.157830][T18816] EXT4-fs (loop0): mount failed [ 314.166645][T18828] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: none. [ 314.166848][T18833] SELinux: duplicate or incompatible mount options [ 314.192519][T18835] loop1: detected capacity change from 0 to 264192 [ 314.195497][T18837] loop3: detected capacity change from 0 to 264192 17:05:30 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc01000a, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700", 0x63, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000003980)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="80", 0x1, 0x11100}], 0x0, &(0x7f00000000c0)) [ 314.199716][T18828] ext4 filesystem being mounted at /root/syzkaller-testdir978532967/syzkaller.UFCZ1t/865/file0 supports timestamps until 2038 (0x7fffffff) [ 314.230965][T18835] EXT4-fs (loop1): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: none. [ 314.231315][T18837] EXT4-fs error (device loop3): ext4_orphan_get:1419: comm syz-executor.3: bad orphan inode 17 17:05:34 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc01000a, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000011", 0x9, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000003980)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d0f465001000005fd0f4655f00000000000001000c000000100008", 0x23, 0x11100}], 0x0, &(0x7f00000000c0)) 17:05:34 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc01000a, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000003980)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d0f465001000005fd0f4655f00000000000001", 0x1b, 0x11100}], 0x0, &(0x7f00000000c0)) [ 314.253834][T18837] ext4_test_bit(bit=16, block=18) = 0 [ 314.259314][T18837] EXT4-fs (loop3): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: writeback. [ 314.263746][T18835] ext4 filesystem being mounted at /root/syzkaller-testdir268235930/syzkaller.DrjInB/778/file0 supports timestamps until 2038 (0x7fffffff) [ 314.284389][T18844] loop4: detected capacity change from 0 to 264192 [ 314.292324][T18837] ext4 filesystem being mounted at /root/syzkaller-testdir350550748/syzkaller.ONiyFI/861/file0 supports timestamps until 2038 (0x7fffffff) 17:05:34 executing program 2: clock_adjtime(0x7, &(0x7f0000000000)={0x8000, 0x62, 0xff, 0x1, 0x3, 0x1ff, 0x3ff, 0x4, 0xff, 0x20, 0x6, 0x401, 0x20, 0x0, 0x1ff, 0x8000, 0xfffffffffffffffd, 0x400, 0x8, 0x100000000, 0x2, 0x8, 0xf32, 0x4, 0x6, 0x80}) clock_adjtime(0x2, &(0x7f0000000100)={0xd9, 0x9, 0x1, 0x2, 0x1f, 0x78, 0x4b1, 0x0, 0x401, 0x5, 0x8, 0x1, 0x101, 0x100000001, 0x7, 0x1fc, 0x9, 0x9, 0x0, 0x9, 0x8, 0x3, 0xff, 0x7, 0x73, 0x946c}) clock_adjtime(0x6, &(0x7f0000000200)={0x4, 0x1, 0x100, 0x6, 0x2, 0x6, 0x1, 0x1dd, 0x9, 0x1000000000000000, 0x0, 0x6, 0x1, 0x1, 0x9, 0x5, 0x3023, 0x2, 0x4, 0xfffffffffffffff9, 0x429, 0x3, 0x0, 0x9, 0xffffffffffffff05, 0x1000}) clock_adjtime(0x3, &(0x7f0000000300)={0x0, 0x8, 0x9, 0x9, 0x9, 0x9, 0x6, 0x9, 0x8, 0x1, 0xd0fc, 0x55, 0x2, 0x0, 0x1, 0x1f, 0x100000001, 0x8f44, 0x53, 0x0, 0x3, 0x140000000000, 0x9, 0x8000, 0x0, 0x10001}) r0 = syz_mount_image$iso9660(&(0x7f0000000400), &(0x7f0000000440)='./file0\x00', 0x4, 0x1, &(0x7f0000000480)=[{0xfffffffffffffffe, 0x0, 0x3}], 0x2014400, &(0x7f00000004c0)={[{@check_relaxed}, {@dmode}, {@check_relaxed}], [{@euid_lt={'euid<', 0xee01}}, {@euid_eq}, {@rootcontext={'rootcontext', 0x3d, 'staff_u'}}, {@obj_user={'obj_user', 0x3d, '#-_'}}, {@rootcontext={'rootcontext', 0x3d, 'staff_u'}}]}) faccessat(r0, &(0x7f0000000580)='./file0\x00', 0x88) clock_adjtime(0x4, &(0x7f00000005c0)={0x80000000, 0x100000000, 0xba, 0x80000000, 0x4, 0x20d4e190, 0x7, 0x400, 0x33, 0x7a, 0x1, 0x465d, 0x7f, 0x5, 0x3, 0x1, 0x0, 0x8, 0x7, 0x7ff, 0x1, 0x4, 0x3f, 0x7fff, 0x700b, 0x96}) r1 = accept$unix(0xffffffffffffffff, 0x0, &(0x7f00000006c0)) getsockname$unix(r1, &(0x7f0000000700), &(0x7f0000000780)=0x6e) clock_adjtime(0x3, &(0x7f00000007c0)={0x6, 0x6, 0x7, 0x8000, 0x7ff, 0x5c, 0x401, 0x2, 0x9, 0x4, 0x0, 0x61, 0x2, 0x9b71, 0x100000000, 0x7fffffff, 0x322, 0xc70d, 0x9, 0xd, 0x9, 0x0, 0x9, 0x1a1f00000000, 0xffffffffffffffff, 0x9}) clock_adjtime(0x6, &(0x7f00000008c0)={0x4, 0x9, 0x3, 0xfffffffffffffff7, 0xb31, 0x1, 0x1, 0x2, 0x538, 0x0, 0x401, 0x1, 0xdd, 0xfffffffffffffff7, 0xec54, 0x4, 0x100000001, 0x0, 0xa, 0x1, 0x7ff, 0xcd, 0xf2, 0x80, 0x7, 0x8000}) clock_adjtime(0x0, &(0x7f00000009c0)={0x8, 0xff, 0x81, 0x2, 0x100000001, 0x11, 0x5, 0x1, 0x1, 0x9, 0x1000, 0x8, 0xdf6c, 0x9, 0x8, 0x1004000000000000, 0x1ff, 0x3, 0x6, 0xf5, 0x80000, 0x1, 0xfffffffffffffd6d, 0x2, 0x6, 0xfa}) r2 = socket$unix(0x1, 0x5, 0x0) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f0000000ac0)={'wlan0\x00'}) mq_timedreceive(0xffffffffffffffff, &(0x7f0000000b00)=""/4096, 0x1000, 0x80, &(0x7f0000001b00)={0x0, 0x989680}) r3 = creat(&(0x7f0000001b40)='./file0\x00', 0x1) mknodat(r3, &(0x7f0000001b80)='./file1\x00', 0x4, 0x0) clock_adjtime(0x0, &(0x7f0000001bc0)={0xfff, 0x7fff, 0x0, 0x2, 0xfdc, 0x54, 0x8fa, 0x3f41, 0x0, 0x4, 0x4, 0x5, 0x101, 0x5, 0x4, 0x9, 0x9, 0x30e, 0x3f, 0x2, 0x7f, 0x7, 0x6, 0x4, 0x3ff, 0x100000000}) clock_adjtime(0x2, &(0x7f0000001cc0)={0x0, 0x6, 0x7, 0xe5, 0x5, 0x6, 0x10, 0x7, 0x281, 0x40, 0x1, 0x0, 0x1, 0x10001, 0x5, 0x100, 0x0, 0x4, 0xffffffffffffe001, 0xdf, 0x7f, 0x8000, 0x0, 0x400, 0xfffffffffffffe00, 0x3f}) 17:05:34 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc01000a, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000003980)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d9", 0x4, 0x6800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d0f465001000005fd0f4655f00000000000001000c00000010000800000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}], 0x0, &(0x7f00000000c0)) (fail_nth: 20) [ 314.334348][T18844] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: none. [ 314.345395][T18844] ext4 filesystem being mounted at /root/syzkaller-testdir125786251/syzkaller.yEZeTO/771/file0 supports timestamps until 2038 (0x7fffffff) [ 314.349970][T18850] SELinux: duplicate or incompatible mount options [ 314.360701][T18851] FAULT_INJECTION: forcing a failure. [ 314.360701][T18851] name failslab, interval 1, probability 0, space 0, times 0 [ 314.379004][T18851] CPU: 1 PID: 18851 Comm: syz-executor.0 Not tainted 5.16.0-syzkaller #0 [ 314.384152][T18853] loop5: detected capacity change from 0 to 264192 [ 314.387424][T18851] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 314.387437][T18851] Call Trace: [ 314.387444][T18851] [ 314.387451][T18851] dump_stack_lvl+0xd6/0x122 [ 314.414723][T18851] dump_stack+0x11/0x1b [ 314.418906][T18851] should_fail+0x23c/0x250 [ 314.423413][T18851] ? getname_flags+0x84/0x3f0 [ 314.428142][T18851] __should_failslab+0x81/0x90 [ 314.433077][T18851] should_failslab+0x5/0x20 [ 314.437796][T18851] kmem_cache_alloc+0x4f/0x320 [ 314.442550][T18851] getname_flags+0x84/0x3f0 [ 314.447041][T18851] ? vfs_write+0x667/0x950 [ 314.451452][T18851] getname+0x15/0x20 [ 314.455390][T18851] do_sys_openat2+0x6d/0x2b0 [ 314.460056][T18851] __x64_sys_openat+0xef/0x110 [ 314.464821][T18851] do_syscall_64+0x44/0xd0 [ 314.469315][T18851] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 314.475225][T18851] RIP: 0033:0x7f1cb8ab2db4 [ 314.479637][T18851] Code: 84 00 00 00 00 00 44 89 54 24 0c e8 96 f9 ff ff 44 8b 54 24 0c 44 89 e2 48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 89 44 24 0c e8 c8 f9 ff ff 8b 44 [ 314.499242][T18851] RSP: 002b:00007f1cb7c75eb0 EFLAGS: 00000293 ORIG_RAX: 0000000000000101 [ 314.507661][T18851] RAX: ffffffffffffffda RBX: 00007f1cb8b499c8 RCX: 00007f1cb8ab2db4 [ 314.515622][T18851] RDX: 0000000000000002 RSI: 00007f1cb7c75fe0 RDI: 00000000ffffff9c [ 314.523601][T18851] RBP: 00007f1cb7c75fe0 R08: 0000000000000000 R09: 00007f1cb7c761d0 17:05:34 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc01000a, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000", 0x60, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000003980)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d0f465001000005fd0f4655f00000000000001000c00000010000800000000000af3010004", 0x2d, 0x11100}], 0x0, &(0x7f00000000c0)) 17:05:34 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc01000a, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000003980)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d9", 0x4, 0x6800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d0f465001000005fd0f4655f00000000000001000c00000010000800000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}], 0x0, &(0x7f00000000c0)) (fail_nth: 21) [ 314.531565][T18851] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000002 [ 314.539618][T18851] R13: 0000000000000004 R14: 00000000200002c0 R15: 0000000000000008 [ 314.547685][T18851] [ 314.569248][T18857] loop3: detected capacity change from 0 to 264192 [ 314.575658][T18859] FAULT_INJECTION: forcing a failure. [ 314.575658][T18859] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 314.589034][T18859] CPU: 0 PID: 18859 Comm: syz-executor.0 Not tainted 5.16.0-syzkaller #0 [ 314.596535][T18857] EXT4-fs warning (device loop3): read_mmp_block:107: Error -117 while reading MMP block 0 [ 314.597594][T18859] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 314.597607][T18859] Call Trace: [ 314.597614][T18859] [ 314.622621][T18853] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: none. 17:05:38 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc01000a, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700", 0x63, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000003980)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="80", 0x1, 0x11100}], 0x0, &(0x7f00000000c0)) 17:05:38 executing program 2: clock_adjtime(0x7, &(0x7f0000000000)={0x8000, 0x62, 0xff, 0x1, 0x3, 0x1ff, 0x3ff, 0x4, 0xff, 0x20, 0x6, 0x401, 0x20, 0x0, 0x1ff, 0x8000, 0xfffffffffffffffd, 0x400, 0x8, 0x100000000, 0x2, 0x8, 0xf32, 0x4, 0x6, 0x80}) clock_adjtime(0x2, &(0x7f0000000100)={0xd9, 0x9, 0x1, 0x2, 0x1f, 0x78, 0x4b1, 0x0, 0x401, 0x5, 0x8, 0x1, 0x101, 0x100000001, 0x7, 0x1fc, 0x9, 0x9, 0x0, 0x9, 0x8, 0x3, 0xff, 0x7, 0x73, 0x946c}) clock_adjtime(0x6, &(0x7f0000000200)={0x4, 0x1, 0x100, 0x6, 0x2, 0x6, 0x1, 0x1dd, 0x9, 0x1000000000000000, 0x0, 0x6, 0x1, 0x1, 0x9, 0x5, 0x3023, 0x2, 0x4, 0xfffffffffffffff9, 0x429, 0x3, 0x0, 0x9, 0xffffffffffffff05, 0x1000}) clock_adjtime(0x3, &(0x7f0000000300)={0x0, 0x8, 0x9, 0x9, 0x9, 0x9, 0x6, 0x9, 0x8, 0x1, 0xd0fc, 0x55, 0x2, 0x0, 0x1, 0x1f, 0x100000001, 0x8f44, 0x53, 0x0, 0x3, 0x140000000000, 0x9, 0x8000, 0x0, 0x10001}) r0 = syz_mount_image$iso9660(&(0x7f0000000400), &(0x7f0000000440)='./file0\x00', 0x4, 0x1, &(0x7f0000000480)=[{0xfffffffffffffffe, 0x0, 0x3}], 0x2014400, &(0x7f00000004c0)={[{@check_relaxed}, {@dmode}, {@check_relaxed}], [{@euid_lt={'euid<', 0xee01}}, {@euid_eq}, {@rootcontext={'rootcontext', 0x3d, 'staff_u'}}, {@obj_user={'obj_user', 0x3d, '#-_'}}, {@rootcontext={'rootcontext', 0x3d, 'staff_u'}}]}) faccessat(r0, &(0x7f0000000580)='./file0\x00', 0x88) clock_adjtime(0x4, &(0x7f00000005c0)={0x80000000, 0x100000000, 0xba, 0x80000000, 0x4, 0x20d4e190, 0x7, 0x400, 0x33, 0x7a, 0x1, 0x465d, 0x7f, 0x5, 0x3, 0x1, 0x0, 0x8, 0x7, 0x7ff, 0x1, 0x4, 0x3f, 0x7fff, 0x700b, 0x96}) r1 = accept$unix(0xffffffffffffffff, 0x0, &(0x7f00000006c0)) getsockname$unix(r1, &(0x7f0000000700), &(0x7f0000000780)=0x6e) clock_adjtime(0x3, &(0x7f00000007c0)={0x6, 0x6, 0x7, 0x8000, 0x7ff, 0x5c, 0x401, 0x2, 0x9, 0x4, 0x0, 0x61, 0x2, 0x9b71, 0x100000000, 0x7fffffff, 0x322, 0xc70d, 0x9, 0xd, 0x9, 0x0, 0x9, 0x1a1f00000000, 0xffffffffffffffff, 0x9}) clock_adjtime(0x6, &(0x7f00000008c0)={0x4, 0x9, 0x3, 0xfffffffffffffff7, 0xb31, 0x1, 0x1, 0x2, 0x538, 0x0, 0x401, 0x1, 0xdd, 0xfffffffffffffff7, 0xec54, 0x4, 0x100000001, 0x0, 0xa, 0x1, 0x7ff, 0xcd, 0xf2, 0x80, 0x7, 0x8000}) clock_adjtime(0x0, &(0x7f00000009c0)={0x8, 0xff, 0x81, 0x2, 0x100000001, 0x11, 0x5, 0x1, 0x1, 0x9, 0x1000, 0x8, 0xdf6c, 0x9, 0x8, 0x1004000000000000, 0x1ff, 0x3, 0x6, 0xf5, 0x80000, 0x1, 0xfffffffffffffd6d, 0x2, 0x6, 0xfa}) r2 = socket$unix(0x1, 0x5, 0x0) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f0000000ac0)={'wlan0\x00'}) mq_timedreceive(0xffffffffffffffff, &(0x7f0000000b00)=""/4096, 0x1000, 0x80, &(0x7f0000001b00)={0x0, 0x989680}) r3 = creat(&(0x7f0000001b40)='./file0\x00', 0x1) mknodat(r3, &(0x7f0000001b80)='./file1\x00', 0x4, 0x0) clock_adjtime(0x0, &(0x7f0000001bc0)={0xfff, 0x7fff, 0x0, 0x2, 0xfdc, 0x54, 0x8fa, 0x3f41, 0x0, 0x4, 0x4, 0x5, 0x101, 0x5, 0x4, 0x9, 0x9, 0x30e, 0x3f, 0x2, 0x7f, 0x7, 0x6, 0x4, 0x3ff, 0x100000000}) clock_adjtime(0x2, &(0x7f0000001cc0)={0x0, 0x6, 0x7, 0xe5, 0x5, 0x6, 0x10, 0x7, 0x281, 0x40, 0x1, 0x0, 0x1, 0x10001, 0x5, 0x100, 0x0, 0x4, 0xffffffffffffe001, 0xdf, 0x7f, 0x8000, 0x0, 0x400, 0xfffffffffffffe00, 0x3f}) [ 314.624163][T18859] dump_stack_lvl+0xd6/0x122 [ 314.634802][T18853] ext4 filesystem being mounted at /root/syzkaller-testdir978532967/syzkaller.UFCZ1t/866/file0 supports timestamps until 2038 (0x7fffffff) [ 314.639296][T18859] dump_stack+0x11/0x1b [ 314.639319][T18859] should_fail+0x23c/0x250 [ 314.639337][T18859] should_fail_usercopy+0x16/0x20 [ 314.667375][T18859] strncpy_from_user+0x21/0x250 [ 314.672317][T18859] getname_flags+0xb8/0x3f0 [ 314.676871][T18859] ? vfs_write+0x667/0x950 [ 314.681292][T18859] getname+0x15/0x20 [ 314.684575][T18864] SELinux: duplicate or incompatible mount options [ 314.685192][T18859] do_sys_openat2+0x6d/0x2b0 [ 314.696349][T18859] __x64_sys_openat+0xef/0x110 [ 314.701693][T18859] do_syscall_64+0x44/0xd0 [ 314.706150][T18859] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 314.712204][T18859] RIP: 0033:0x7f1cb8ab2db4 [ 314.716615][T18859] Code: 84 00 00 00 00 00 44 89 54 24 0c e8 96 f9 ff ff 44 8b 54 24 0c 44 89 e2 48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 89 44 24 0c e8 c8 f9 ff ff 8b 44 [ 314.736260][T18859] RSP: 002b:00007f1cb7c75eb0 EFLAGS: 00000293 ORIG_RAX: 0000000000000101 [ 314.744690][T18859] RAX: ffffffffffffffda RBX: 00007f1cb8b499c8 RCX: 00007f1cb8ab2db4 [ 314.752689][T18859] RDX: 0000000000000002 RSI: 00007f1cb7c75fe0 RDI: 00000000ffffff9c [ 314.760642][T18859] RBP: 00007f1cb7c75fe0 R08: 0000000000000000 R09: 00007f1cb7c761d0 [ 314.768599][T18859] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000002 [ 314.776549][T18859] R13: 0000000000000004 R14: 00000000200002c0 R15: 0000000000000008 17:05:39 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc01000a, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000003980)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d9", 0x4, 0x6800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d0f465001000005fd0f4655f00000000000001000c00000010000800000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}], 0x0, &(0x7f00000000c0)) (fail_nth: 22) [ 314.784511][T18859] [ 314.803245][T18868] loop4: detected capacity change from 0 to 264192 [ 314.811893][T18871] loop1: detected capacity change from 0 to 264192 [ 314.824481][T18873] FAULT_INJECTION: forcing a failure. 17:05:39 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc01000a, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000011", 0x9, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000003980)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d0f465001000005fd0f4655f00000000000001000c000000100008", 0x23, 0x11100}], 0x0, &(0x7f00000000c0)) [ 314.824481][T18873] name failslab, interval 1, probability 0, space 0, times 0 [ 314.837230][T18873] CPU: 1 PID: 18873 Comm: syz-executor.0 Not tainted 5.16.0-syzkaller #0 [ 314.837979][T18871] EXT4-fs (loop1): VFS: Can't find ext4 filesystem [ 314.845680][T18873] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 314.845694][T18873] Call Trace: [ 314.845700][T18873] [ 314.845706][T18873] dump_stack_lvl+0xd6/0x122 [ 314.845732][T18873] dump_stack+0x11/0x1b 17:05:43 executing program 2: clock_adjtime(0x7, &(0x7f0000000000)={0x8000, 0x62, 0xff, 0x1, 0x3, 0x1ff, 0x3ff, 0x4, 0xff, 0x20, 0x6, 0x401, 0x20, 0x0, 0x1ff, 0x8000, 0xfffffffffffffffd, 0x400, 0x8, 0x100000000, 0x2, 0x8, 0xf32, 0x4, 0x6, 0x80}) clock_adjtime(0x2, &(0x7f0000000100)={0xd9, 0x9, 0x1, 0x2, 0x1f, 0x78, 0x4b1, 0x0, 0x401, 0x5, 0x8, 0x1, 0x101, 0x100000001, 0x7, 0x1fc, 0x9, 0x9, 0x0, 0x9, 0x8, 0x3, 0xff, 0x7, 0x73, 0x946c}) clock_adjtime(0x6, &(0x7f0000000200)={0x4, 0x1, 0x100, 0x6, 0x2, 0x6, 0x1, 0x1dd, 0x9, 0x1000000000000000, 0x0, 0x6, 0x1, 0x1, 0x9, 0x5, 0x3023, 0x2, 0x4, 0xfffffffffffffff9, 0x429, 0x3, 0x0, 0x9, 0xffffffffffffff05, 0x1000}) clock_adjtime(0x3, &(0x7f0000000300)={0x0, 0x8, 0x9, 0x9, 0x9, 0x9, 0x6, 0x9, 0x8, 0x1, 0xd0fc, 0x55, 0x2, 0x0, 0x1, 0x1f, 0x100000001, 0x8f44, 0x53, 0x0, 0x3, 0x140000000000, 0x9, 0x8000, 0x0, 0x10001}) r0 = syz_mount_image$iso9660(&(0x7f0000000400), &(0x7f0000000440)='./file0\x00', 0x4, 0x1, &(0x7f0000000480)=[{0xfffffffffffffffe, 0x0, 0x3}], 0x2014400, &(0x7f00000004c0)={[{@check_relaxed}, {@dmode}, {@check_relaxed}], [{@euid_lt={'euid<', 0xee01}}, {@euid_eq}, {@rootcontext={'rootcontext', 0x3d, 'staff_u'}}, {@obj_user={'obj_user', 0x3d, '#-_'}}, {@rootcontext={'rootcontext', 0x3d, 'staff_u'}}]}) faccessat(r0, &(0x7f0000000580)='./file0\x00', 0x88) clock_adjtime(0x4, &(0x7f00000005c0)={0x80000000, 0x100000000, 0xba, 0x80000000, 0x4, 0x20d4e190, 0x7, 0x400, 0x33, 0x7a, 0x1, 0x465d, 0x7f, 0x5, 0x3, 0x1, 0x0, 0x8, 0x7, 0x7ff, 0x1, 0x4, 0x3f, 0x7fff, 0x700b, 0x96}) r1 = accept$unix(0xffffffffffffffff, 0x0, &(0x7f00000006c0)) getsockname$unix(r1, &(0x7f0000000700), &(0x7f0000000780)=0x6e) clock_adjtime(0x3, &(0x7f00000007c0)={0x6, 0x6, 0x7, 0x8000, 0x7ff, 0x5c, 0x401, 0x2, 0x9, 0x4, 0x0, 0x61, 0x2, 0x9b71, 0x100000000, 0x7fffffff, 0x322, 0xc70d, 0x9, 0xd, 0x9, 0x0, 0x9, 0x1a1f00000000, 0xffffffffffffffff, 0x9}) clock_adjtime(0x6, &(0x7f00000008c0)={0x4, 0x9, 0x3, 0xfffffffffffffff7, 0xb31, 0x1, 0x1, 0x2, 0x538, 0x0, 0x401, 0x1, 0xdd, 0xfffffffffffffff7, 0xec54, 0x4, 0x100000001, 0x0, 0xa, 0x1, 0x7ff, 0xcd, 0xf2, 0x80, 0x7, 0x8000}) clock_adjtime(0x0, &(0x7f00000009c0)={0x8, 0xff, 0x81, 0x2, 0x100000001, 0x11, 0x5, 0x1, 0x1, 0x9, 0x1000, 0x8, 0xdf6c, 0x9, 0x8, 0x1004000000000000, 0x1ff, 0x3, 0x6, 0xf5, 0x80000, 0x1, 0xfffffffffffffd6d, 0x2, 0x6, 0xfa}) r2 = socket$unix(0x1, 0x5, 0x0) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f0000000ac0)={'wlan0\x00'}) mq_timedreceive(0xffffffffffffffff, &(0x7f0000000b00)=""/4096, 0x1000, 0x80, &(0x7f0000001b00)={0x0, 0x989680}) r3 = creat(&(0x7f0000001b40)='./file0\x00', 0x1) mknodat(r3, &(0x7f0000001b80)='./file1\x00', 0x4, 0x0) clock_adjtime(0x0, &(0x7f0000001bc0)={0xfff, 0x7fff, 0x0, 0x2, 0xfdc, 0x54, 0x8fa, 0x3f41, 0x0, 0x4, 0x4, 0x5, 0x101, 0x5, 0x4, 0x9, 0x9, 0x30e, 0x3f, 0x2, 0x7f, 0x7, 0x6, 0x4, 0x3ff, 0x100000000}) clock_adjtime(0x2, &(0x7f0000001cc0)={0x0, 0x6, 0x7, 0xe5, 0x5, 0x6, 0x10, 0x7, 0x281, 0x40, 0x1, 0x0, 0x1, 0x10001, 0x5, 0x100, 0x0, 0x4, 0xffffffffffffe001, 0xdf, 0x7f, 0x8000, 0x0, 0x400, 0xfffffffffffffe00, 0x3f}) [ 314.862730][T18868] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: none. [ 314.865613][T18873] should_fail+0x23c/0x250 [ 314.868667][T18868] ext4 filesystem being mounted at /root/syzkaller-testdir125786251/syzkaller.yEZeTO/772/file0 supports timestamps until 2038 (0x7fffffff) [ 314.873211][T18873] ? __alloc_file+0x2e/0x1a0 [ 314.892592][T18876] loop3: detected capacity change from 0 to 264192 [ 314.906772][T18873] __should_failslab+0x81/0x90 [ 314.919939][T18876] EXT4-fs warning (device loop3): read_mmp_block:107: Error -117 while reading MMP block 0 [ 314.922684][T18873] should_failslab+0x5/0x20 17:05:43 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc01000a, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700", 0x63, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000003980)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d0f465001000005fd0f4655f00000000000001000c00000010000800000000000af3010004", 0x2d, 0x11100}], 0x0, &(0x7f00000000c0)) [ 314.922713][T18873] kmem_cache_alloc+0x4f/0x320 [ 314.942091][T18873] __alloc_file+0x2e/0x1a0 [ 314.946513][T18873] alloc_empty_file+0xcd/0x1c0 [ 314.951343][T18873] path_openat+0x6a/0x1eb0 [ 314.955776][T18873] ? __set_page_dirty_no_writeback+0x96/0xc0 [ 314.959968][T18879] loop5: detected capacity change from 0 to 264192 [ 314.961844][T18873] ? folio_mark_dirty+0x84/0xe0 [ 314.961870][T18873] ? unlock_page+0x37/0x50 [ 314.972125][T18880] SELinux: duplicate or incompatible mount options 17:05:43 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc01000a, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700", 0x63, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000003980)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="80", 0x1, 0x11100}], 0x0, &(0x7f00000000c0)) [ 314.973193][T18873] ? inode_to_bdi+0x43/0xa0 [ 314.980303][T18879] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: none. [ 314.984174][T18873] ? balance_dirty_pages_ratelimited+0x47/0x280 [ 314.990291][T18879] ext4 filesystem being mounted at /root/syzkaller-testdir978532967/syzkaller.UFCZ1t/867/file0 supports timestamps until 2038 (0x7fffffff) [ 314.999150][T18873] ? generic_perform_write+0x397/0x400 [ 314.999181][T18873] do_filp_open+0x105/0x220 [ 314.999205][T18873] do_sys_openat2+0xb5/0x2b0 [ 315.034252][T18873] __x64_sys_openat+0xef/0x110 [ 315.039152][T18873] do_syscall_64+0x44/0xd0 [ 315.043555][T18873] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 315.049559][T18873] RIP: 0033:0x7f1cb8ab2db4 [ 315.053971][T18873] Code: 84 00 00 00 00 00 44 89 54 24 0c e8 96 f9 ff ff 44 8b 54 24 0c 44 89 e2 48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 89 44 24 0c e8 c8 f9 ff ff 8b 44 [ 315.073678][T18873] RSP: 002b:00007f1cb7c75eb0 EFLAGS: 00000293 ORIG_RAX: 0000000000000101 17:05:47 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc01000a, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000003980)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d0f465001000005fd0f4655f00000000000001", 0x1b, 0x11100}], 0x0, &(0x7f00000000c0)) 17:05:47 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc01000a, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000003980)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d9", 0x4, 0x6800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d0f465001000005fd0f4655f00000000000001000c00000010000800000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}], 0x0, &(0x7f00000000c0)) (fail_nth: 23) [ 315.085376][T18873] RAX: ffffffffffffffda RBX: 00007f1cb8b499c8 RCX: 00007f1cb8ab2db4 [ 315.093441][T18873] RDX: 0000000000000002 RSI: 00007f1cb7c75fe0 RDI: 00000000ffffff9c [ 315.101477][T18873] RBP: 00007f1cb7c75fe0 R08: 0000000000000000 R09: 00007f1cb7c761d0 [ 315.109671][T18873] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000002 [ 315.117672][T18873] R13: 0000000000000004 R14: 00000000200002c0 R15: 0000000000000008 [ 315.125693][T18873] [ 315.151042][T18887] FAULT_INJECTION: forcing a failure. [ 315.151042][T18887] name failslab, interval 1, probability 0, space 0, times 0 [ 315.154283][T18889] loop1: detected capacity change from 0 to 264192 [ 315.163900][T18887] CPU: 0 PID: 18887 Comm: syz-executor.0 Not tainted 5.16.0-syzkaller #0 [ 315.171491][T18889] EXT4-fs (loop1): VFS: Can't find ext4 filesystem [ 315.178884][T18887] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 315.178899][T18887] Call Trace: [ 315.178906][T18887] [ 315.178913][T18887] dump_stack_lvl+0xd6/0x122 [ 315.200254][T18893] loop4: detected capacity change from 0 to 264192 [ 315.201829][T18887] dump_stack+0x11/0x1b [ 315.201853][T18887] should_fail+0x23c/0x250 [ 315.206831][T18892] loop5: detected capacity change from 0 to 264192 [ 315.212912][T18887] ? security_file_alloc+0x30/0x190 [ 315.212938][T18887] __should_failslab+0x81/0x90 [ 315.212960][T18887] should_failslab+0x5/0x20 [ 315.242628][T18887] kmem_cache_alloc+0x4f/0x320 [ 315.247435][T18887] security_file_alloc+0x30/0x190 [ 315.252489][T18887] __alloc_file+0x83/0x1a0 [ 315.256893][T18887] alloc_empty_file+0xcd/0x1c0 [ 315.261647][T18887] path_openat+0x6a/0x1eb0 [ 315.266053][T18887] ? __set_page_dirty_no_writeback+0x96/0xc0 [ 315.272027][T18887] ? folio_mark_dirty+0x84/0xe0 [ 315.276870][T18887] ? unlock_page+0x37/0x50 [ 315.281434][T18887] ? inode_to_bdi+0x43/0xa0 [ 315.285925][T18887] ? balance_dirty_pages_ratelimited+0x47/0x280 [ 315.292211][T18887] ? generic_perform_write+0x397/0x400 [ 315.297665][T18887] do_filp_open+0x105/0x220 [ 315.302165][T18887] do_sys_openat2+0xb5/0x2b0 [ 315.306847][T18887] __x64_sys_openat+0xef/0x110 [ 315.311641][T18887] do_syscall_64+0x44/0xd0 [ 315.316050][T18887] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 315.321937][T18887] RIP: 0033:0x7f1cb8ab2db4 [ 315.326343][T18887] Code: 84 00 00 00 00 00 44 89 54 24 0c e8 96 f9 ff ff 44 8b 54 24 0c 44 89 e2 48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 89 44 24 0c e8 c8 f9 ff ff 8b 44 17:05:47 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc01000a, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000011", 0x9, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000003980)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d0f465001000005fd0f4655f00000000000001000c000000100008", 0x23, 0x11100}], 0x0, &(0x7f00000000c0)) 17:05:47 executing program 2: clock_adjtime(0x7, &(0x7f0000000000)={0x8000, 0x62, 0xff, 0x1, 0x3, 0x1ff, 0x3ff, 0x4, 0xff, 0x20, 0x6, 0x401, 0x20, 0x0, 0x1ff, 0x8000, 0xfffffffffffffffd, 0x400, 0x8, 0x100000000, 0x2, 0x8, 0xf32, 0x4, 0x6, 0x80}) clock_adjtime(0x2, &(0x7f0000000100)={0xd9, 0x9, 0x1, 0x2, 0x1f, 0x78, 0x4b1, 0x0, 0x401, 0x5, 0x8, 0x1, 0x101, 0x100000001, 0x7, 0x1fc, 0x9, 0x9, 0x0, 0x9, 0x8, 0x3, 0xff, 0x7, 0x73, 0x946c}) clock_adjtime(0x6, &(0x7f0000000200)={0x4, 0x1, 0x100, 0x6, 0x2, 0x6, 0x1, 0x1dd, 0x9, 0x1000000000000000, 0x0, 0x6, 0x1, 0x1, 0x9, 0x5, 0x3023, 0x2, 0x4, 0xfffffffffffffff9, 0x429, 0x3, 0x0, 0x9, 0xffffffffffffff05, 0x1000}) clock_adjtime(0x3, &(0x7f0000000300)={0x0, 0x8, 0x9, 0x9, 0x9, 0x9, 0x6, 0x9, 0x8, 0x1, 0xd0fc, 0x55, 0x2, 0x0, 0x1, 0x1f, 0x100000001, 0x8f44, 0x53, 0x0, 0x3, 0x140000000000, 0x9, 0x8000, 0x0, 0x10001}) r0 = syz_mount_image$iso9660(&(0x7f0000000400), &(0x7f0000000440)='./file0\x00', 0x4, 0x1, &(0x7f0000000480)=[{0xfffffffffffffffe, 0x0, 0x3}], 0x2014400, &(0x7f00000004c0)={[{@check_relaxed}, {@dmode}, {@check_relaxed}], [{@euid_lt={'euid<', 0xee01}}, {@euid_eq}, {@rootcontext={'rootcontext', 0x3d, 'staff_u'}}, {@obj_user={'obj_user', 0x3d, '#-_'}}, {@rootcontext={'rootcontext', 0x3d, 'staff_u'}}]}) faccessat(r0, &(0x7f0000000580)='./file0\x00', 0x88) clock_adjtime(0x4, &(0x7f00000005c0)={0x80000000, 0x100000000, 0xba, 0x80000000, 0x4, 0x20d4e190, 0x7, 0x400, 0x33, 0x7a, 0x1, 0x465d, 0x7f, 0x5, 0x3, 0x1, 0x0, 0x8, 0x7, 0x7ff, 0x1, 0x4, 0x3f, 0x7fff, 0x700b, 0x96}) r1 = accept$unix(0xffffffffffffffff, 0x0, &(0x7f00000006c0)) getsockname$unix(r1, &(0x7f0000000700), &(0x7f0000000780)=0x6e) clock_adjtime(0x3, &(0x7f00000007c0)={0x6, 0x6, 0x7, 0x8000, 0x7ff, 0x5c, 0x401, 0x2, 0x9, 0x4, 0x0, 0x61, 0x2, 0x9b71, 0x100000000, 0x7fffffff, 0x322, 0xc70d, 0x9, 0xd, 0x9, 0x0, 0x9, 0x1a1f00000000, 0xffffffffffffffff, 0x9}) clock_adjtime(0x6, &(0x7f00000008c0)={0x4, 0x9, 0x3, 0xfffffffffffffff7, 0xb31, 0x1, 0x1, 0x2, 0x538, 0x0, 0x401, 0x1, 0xdd, 0xfffffffffffffff7, 0xec54, 0x4, 0x100000001, 0x0, 0xa, 0x1, 0x7ff, 0xcd, 0xf2, 0x80, 0x7, 0x8000}) clock_adjtime(0x0, &(0x7f00000009c0)={0x8, 0xff, 0x81, 0x2, 0x100000001, 0x11, 0x5, 0x1, 0x1, 0x9, 0x1000, 0x8, 0xdf6c, 0x9, 0x8, 0x1004000000000000, 0x1ff, 0x3, 0x6, 0xf5, 0x80000, 0x1, 0xfffffffffffffd6d, 0x2, 0x6, 0xfa}) r2 = socket$unix(0x1, 0x5, 0x0) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f0000000ac0)={'wlan0\x00'}) mq_timedreceive(0xffffffffffffffff, &(0x7f0000000b00)=""/4096, 0x1000, 0x80, &(0x7f0000001b00)={0x0, 0x989680}) r3 = creat(&(0x7f0000001b40)='./file0\x00', 0x1) mknodat(r3, &(0x7f0000001b80)='./file1\x00', 0x4, 0x0) clock_adjtime(0x0, &(0x7f0000001bc0)={0xfff, 0x7fff, 0x0, 0x2, 0xfdc, 0x54, 0x8fa, 0x3f41, 0x0, 0x4, 0x4, 0x5, 0x101, 0x5, 0x4, 0x9, 0x9, 0x30e, 0x3f, 0x2, 0x7f, 0x7, 0x6, 0x4, 0x3ff, 0x100000000}) clock_adjtime(0x2, &(0x7f0000001cc0)={0x0, 0x6, 0x7, 0xe5, 0x5, 0x6, 0x10, 0x7, 0x281, 0x40, 0x1, 0x0, 0x1, 0x10001, 0x5, 0x100, 0x0, 0x4, 0xffffffffffffe001, 0xdf, 0x7f, 0x8000, 0x9, 0x0, 0xfffffffffffffe00, 0x3f}) [ 315.345967][T18887] RSP: 002b:00007f1cb7c75eb0 EFLAGS: 00000293 ORIG_RAX: 0000000000000101 [ 315.354458][T18887] RAX: ffffffffffffffda RBX: 00007f1cb8b499c8 RCX: 00007f1cb8ab2db4 [ 315.362498][T18887] RDX: 0000000000000002 RSI: 00007f1cb7c75fe0 RDI: 00000000ffffff9c [ 315.370471][T18887] RBP: 00007f1cb7c75fe0 R08: 0000000000000000 R09: 00007f1cb7c761d0 [ 315.378434][T18887] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000002 [ 315.386482][T18887] R13: 0000000000000004 R14: 00000000200002c0 R15: 0000000000000008 [ 315.394464][T18887] 17:05:47 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc01000a, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000003980)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d9", 0x4, 0x6800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d0f465001000005fd0f4655f00000000000001000c00000010000800000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}], 0x0, &(0x7f00000000c0)) (fail_nth: 24) 17:05:47 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc01000a, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000003980)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d0f465001000005fd0f4655f00000000000001", 0x1b, 0x11100}], 0x0, &(0x7f00000000c0)) [ 315.427972][T18898] loop3: detected capacity change from 0 to 264192 [ 315.431097][T18893] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: none. [ 315.441568][T18900] SELinux: duplicate or incompatible mount options [ 315.460489][T18903] FAULT_INJECTION: forcing a failure. [ 315.460489][T18903] name failslab, interval 1, probability 0, space 0, times 0 [ 315.467081][T18893] ext4 filesystem being mounted at /root/syzkaller-testdir125786251/syzkaller.yEZeTO/773/file0 supports timestamps until 2038 (0x7fffffff) [ 315.473230][T18903] CPU: 1 PID: 18903 Comm: syz-executor.0 Not tainted 5.16.0-syzkaller #0 [ 315.495761][T18903] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 315.505930][T18903] Call Trace: [ 315.509230][T18903] [ 315.512152][T18903] dump_stack_lvl+0xd6/0x122 [ 315.516739][T18903] dump_stack+0x11/0x1b [ 315.520883][T18903] should_fail+0x23c/0x250 [ 315.525290][T18903] ? kzalloc+0x16/0x20 [ 315.529368][T18903] __should_failslab+0x81/0x90 [ 315.534197][T18903] should_failslab+0x5/0x20 [ 315.538699][T18903] __kmalloc+0x6f/0x370 [ 315.542845][T18903] ? iput+0x1cd/0x580 [ 315.546812][T18903] kzalloc+0x16/0x20 [ 315.550792][T18903] alloc_workqueue+0x12f/0xad0 [ 315.555575][T18903] ? __rcu_read_unlock+0x5c/0x290 [ 315.560658][T18903] ? preempt_count_add+0x4e/0x90 [ 315.565734][T18903] ? _raw_spin_unlock+0x2e/0x50 [ 315.570640][T18903] ? bd_prepare_to_claim+0x1ac/0x200 [ 315.576050][T18903] loop_configure+0x70e/0xf30 [ 315.580738][T18903] lo_ioctl+0x583/0x1270 [ 315.585008][T18903] ? folio_mark_dirty+0x84/0xe0 [ 315.589852][T18903] ? unlock_page+0x37/0x50 [ 315.594257][T18903] ? __rcu_read_unlock+0x5c/0x290 [ 315.599276][T18903] ? blkdev_common_ioctl+0x438/0x1180 [ 315.604718][T18903] ? selinux_file_ioctl+0x522/0x590 [ 315.609966][T18903] ? do_vfs_ioctl+0x819/0x14a0 [ 315.614740][T18903] ? lo_release+0x120/0x120 [ 315.619244][T18903] blkdev_ioctl+0x20e/0x440 [ 315.623853][T18903] ? blkdev_compat_ptr_ioctl+0x80/0x80 [ 315.629316][T18903] __se_sys_ioctl+0xcb/0x140 [ 315.633921][T18903] __x64_sys_ioctl+0x3f/0x50 [ 315.638502][T18903] do_syscall_64+0x44/0xd0 [ 315.642996][T18903] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 315.649031][T18903] RIP: 0033:0x7f1cb8affc57 [ 315.653465][T18903] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 04 54 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 315.673060][T18903] RSP: 002b:00007f1cb7c75f28 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 315.681490][T18903] RAX: ffffffffffffffda RBX: 00007f1cb8b499c8 RCX: 00007f1cb8affc57 [ 315.689451][T18903] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 315.697616][T18903] RBP: 0000000000000005 R08: 0000000000000000 R09: 00007f1cb7c761d0 [ 315.705729][T18903] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 315.713704][T18903] R13: 0000000000000004 R14: 00000000200002c0 R15: 0000000000000008 [ 315.721754][T18903] 17:05:48 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc01000a, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000003980)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d9", 0x4, 0x6800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d0f465001000005fd0f4655f00000000000001000c00000010000800000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}], 0x0, &(0x7f00000000c0)) (fail_nth: 25) [ 315.731594][T18892] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: none. [ 315.741460][T18905] loop1: detected capacity change from 0 to 264192 [ 315.742462][T18892] ext4 filesystem being mounted at /root/syzkaller-testdir978532967/syzkaller.UFCZ1t/868/file0 supports timestamps until 2038 (0x7fffffff) [ 315.750417][T18898] EXT4-fs warning (device loop3): read_mmp_block:107: Error -117 while reading MMP block 0 17:05:48 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc01000a, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700", 0x63, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000003980)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d0f465001000005fd0f4655f00000000000001000c00000010000800000000000af3010004", 0x2d, 0x11100}], 0x0, &(0x7f00000000c0)) 17:05:48 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc01000a, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b00000080000000080000005247000062", 0x65, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000003980)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="80", 0x1, 0x11100}], 0x0, &(0x7f00000000c0)) [ 315.784108][T18905] EXT4-fs (loop1): VFS: Can't find ext4 filesystem [ 315.794284][T18909] FAULT_INJECTION: forcing a failure. [ 315.794284][T18909] name failslab, interval 1, probability 0, space 0, times 0 [ 315.806964][T18909] CPU: 0 PID: 18909 Comm: syz-executor.0 Not tainted 5.16.0-syzkaller #0 [ 315.815386][T18909] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 315.825456][T18909] Call Trace: [ 315.828790][T18909] 17:05:52 executing program 2: clock_adjtime(0x7, &(0x7f0000000000)={0x8000, 0x62, 0xff, 0x1, 0x3, 0x1ff, 0x3ff, 0x4, 0xff, 0x20, 0x6, 0x401, 0x20, 0x0, 0x1ff, 0x8000, 0xfffffffffffffffd, 0x400, 0x8, 0x100000000, 0x2, 0x8, 0xf32, 0x4, 0x6, 0x80}) clock_adjtime(0x2, &(0x7f0000000100)={0xd9, 0x9, 0x1, 0x2, 0x1f, 0x78, 0x4b1, 0x0, 0x401, 0x5, 0x8, 0x1, 0x101, 0x100000001, 0x7, 0x1fc, 0x9, 0x9, 0x0, 0x9, 0x8, 0x3, 0xff, 0x7, 0x73, 0x946c}) clock_adjtime(0x6, &(0x7f0000000200)={0x4, 0x1, 0x100, 0x6, 0x2, 0x6, 0x1, 0x1dd, 0x9, 0x1000000000000000, 0x0, 0x6, 0x1, 0x1, 0x9, 0x5, 0x3023, 0x2, 0x4, 0xfffffffffffffff9, 0x429, 0x3, 0x0, 0x9, 0xffffffffffffff05, 0x1000}) clock_adjtime(0x3, &(0x7f0000000300)={0x0, 0x8, 0x9, 0x9, 0x9, 0x9, 0x6, 0x9, 0x8, 0x1, 0xd0fc, 0x55, 0x2, 0x0, 0x1, 0x1f, 0x100000001, 0x8f44, 0x53, 0x0, 0x3, 0x140000000000, 0x9, 0x8000, 0x0, 0x10001}) r0 = syz_mount_image$iso9660(&(0x7f0000000400), &(0x7f0000000440)='./file0\x00', 0x4, 0x1, &(0x7f0000000480)=[{0xfffffffffffffffe, 0x0, 0x3}], 0x2014400, &(0x7f00000004c0)={[{@check_relaxed}, {@dmode}, {@check_relaxed}], [{@euid_lt={'euid<', 0xee01}}, {@euid_eq}, {@rootcontext={'rootcontext', 0x3d, 'staff_u'}}, {@obj_user={'obj_user', 0x3d, '#-_'}}, {@rootcontext={'rootcontext', 0x3d, 'staff_u'}}]}) faccessat(r0, &(0x7f0000000580)='./file0\x00', 0x88) clock_adjtime(0x4, &(0x7f00000005c0)={0x80000000, 0x100000000, 0xba, 0x80000000, 0x4, 0x20d4e190, 0x7, 0x400, 0x33, 0x7a, 0x1, 0x465d, 0x7f, 0x5, 0x3, 0x1, 0x0, 0x8, 0x7, 0x7ff, 0x1, 0x4, 0x3f, 0x7fff, 0x700b, 0x96}) r1 = accept$unix(0xffffffffffffffff, 0x0, &(0x7f00000006c0)) getsockname$unix(r1, &(0x7f0000000700), &(0x7f0000000780)=0x6e) clock_adjtime(0x3, &(0x7f00000007c0)={0x6, 0x6, 0x7, 0x8000, 0x7ff, 0x5c, 0x401, 0x2, 0x9, 0x4, 0x0, 0x61, 0x2, 0x9b71, 0x100000000, 0x7fffffff, 0x322, 0xc70d, 0x9, 0xd, 0x9, 0x0, 0x9, 0x1a1f00000000, 0xffffffffffffffff, 0x9}) clock_adjtime(0x6, &(0x7f00000008c0)={0x4, 0x9, 0x3, 0xfffffffffffffff7, 0xb31, 0x1, 0x1, 0x2, 0x538, 0x0, 0x401, 0x1, 0xdd, 0xfffffffffffffff7, 0xec54, 0x4, 0x100000001, 0x0, 0xa, 0x1, 0x7ff, 0xcd, 0xf2, 0x80, 0x7, 0x8000}) clock_adjtime(0x0, &(0x7f00000009c0)={0x8, 0xff, 0x81, 0x2, 0x100000001, 0x11, 0x5, 0x1, 0x1, 0x9, 0x1000, 0x8, 0xdf6c, 0x9, 0x8, 0x1004000000000000, 0x1ff, 0x3, 0x6, 0xf5, 0x80000, 0x1, 0xfffffffffffffd6d, 0x2, 0x6, 0xfa}) r2 = socket$unix(0x1, 0x5, 0x0) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f0000000ac0)={'wlan0\x00'}) mq_timedreceive(0xffffffffffffffff, &(0x7f0000000b00)=""/4096, 0x1000, 0x80, &(0x7f0000001b00)={0x0, 0x989680}) r3 = creat(&(0x7f0000001b40)='./file0\x00', 0x1) mknodat(r3, &(0x7f0000001b80)='./file1\x00', 0x4, 0x0) clock_adjtime(0x0, &(0x7f0000001bc0)={0xfff, 0x7fff, 0x0, 0x2, 0xfdc, 0x54, 0x8fa, 0x3f41, 0x0, 0x4, 0x4, 0x5, 0x101, 0x5, 0x4, 0x9, 0x9, 0x30e, 0x3f, 0x2, 0x7f, 0x7, 0x6, 0x4, 0x3ff, 0x100000000}) clock_adjtime(0x2, &(0x7f0000001cc0)={0x0, 0x6, 0x7, 0xe5, 0x5, 0x6, 0x10, 0x7, 0x281, 0x40, 0x1, 0x0, 0x1, 0x10001, 0x5, 0x100, 0x0, 0x4, 0xffffffffffffe001, 0xdf, 0x7f, 0x8000, 0x9, 0x0, 0xfffffffffffffe00, 0x3f}) [ 315.831770][T18909] dump_stack_lvl+0xd6/0x122 [ 315.833883][T18912] SELinux: duplicate or incompatible mount options [ 315.836389][T18909] dump_stack+0x11/0x1b [ 315.836413][T18909] should_fail+0x23c/0x250 [ 315.852071][T18909] ? alloc_workqueue+0x15d/0xad0 [ 315.857130][T18909] __should_failslab+0x81/0x90 [ 315.861912][T18909] should_failslab+0x5/0x20 [ 315.866465][T18909] kmem_cache_alloc_trace+0x52/0x350 [ 315.871848][T18909] ? kzalloc+0x16/0x20 [ 315.875905][T18909] alloc_workqueue+0x15d/0xad0 [ 315.880669][T18909] ? __rcu_read_unlock+0x5c/0x290 [ 315.885762][T18909] ? preempt_count_add+0x4e/0x90 [ 315.890687][T18909] ? _raw_spin_unlock+0x2e/0x50 [ 315.895526][T18909] ? bd_prepare_to_claim+0x1ac/0x200 [ 315.900801][T18909] loop_configure+0x70e/0xf30 [ 315.905584][T18909] lo_ioctl+0x583/0x1270 [ 315.909829][T18909] ? inode_to_bdi+0x29/0xa0 [ 315.914340][T18909] ? __rcu_read_unlock+0x5c/0x290 [ 315.919368][T18909] ? blkdev_common_ioctl+0x438/0x1180 [ 315.924742][T18909] ? selinux_file_ioctl+0x522/0x590 [ 315.929931][T18909] ? do_vfs_ioctl+0x819/0x14a0 [ 315.934722][T18909] ? lo_release+0x120/0x120 [ 315.939251][T18909] blkdev_ioctl+0x20e/0x440 [ 315.943776][T18909] ? blkdev_compat_ptr_ioctl+0x80/0x80 [ 315.949251][T18909] __se_sys_ioctl+0xcb/0x140 [ 315.953849][T18909] __x64_sys_ioctl+0x3f/0x50 [ 315.958444][T18909] do_syscall_64+0x44/0xd0 [ 315.962857][T18909] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 315.968792][T18909] RIP: 0033:0x7f1cb8affc57 [ 315.973190][T18909] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 04 54 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 315.992998][T18909] RSP: 002b:00007f1cb7c75f28 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 316.001423][T18909] RAX: ffffffffffffffda RBX: 00007f1cb8b499c8 RCX: 00007f1cb8affc57 [ 316.009450][T18909] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 316.017422][T18909] RBP: 0000000000000005 R08: 0000000000000000 R09: 00007f1cb7c761d0 [ 316.025372][T18909] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 17:05:56 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc01000a, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000003980)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d0f465001000005fd0f4655f00000000000001", 0x1b, 0x11100}], 0x0, 0x0) 17:05:56 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc01000a, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000011", 0x9, 0x4e0}, {0x0, 0x0, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000003980)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d0f465001000005fd0f4655f00000000000001000c000000100008", 0x23, 0x11100}], 0x0, &(0x7f00000000c0)) [ 316.033383][T18909] R13: 0000000000000004 R14: 00000000200002c0 R15: 0000000000000008 [ 316.041350][T18909] [ 316.069291][T18917] loop4: detected capacity change from 0 to 264192 [ 316.071563][T18919] loop1: detected capacity change from 0 to 264192 17:05:56 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc01000a, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000003980)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d9", 0x4, 0x6800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d0f465001000005fd0f4655f00000000000001000c00000010000800000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}], 0x0, &(0x7f00000000c0)) (fail_nth: 26) [ 316.083176][T18921] loop3: detected capacity change from 0 to 264192 [ 316.087745][T18923] FAULT_INJECTION: forcing a failure. [ 316.087745][T18923] name failslab, interval 1, probability 0, space 0, times 0 [ 316.102345][T18923] CPU: 0 PID: 18923 Comm: syz-executor.0 Not tainted 5.16.0-syzkaller #0 [ 316.103840][T18921] EXT4-fs warning (device loop3): read_mmp_block:107: Error -117 while reading MMP block 0 [ 316.110759][T18923] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 316.110770][T18923] Call Trace: [ 316.110776][T18923] [ 316.110784][T18923] dump_stack_lvl+0xd6/0x122 [ 316.142202][T18923] dump_stack+0x11/0x1b [ 316.146350][T18923] should_fail+0x23c/0x250 [ 316.150772][T18923] ? kzalloc+0x16/0x20 [ 316.154884][T18923] __should_failslab+0x81/0x90 [ 316.159666][T18923] should_failslab+0x5/0x20 [ 316.164152][T18923] __kmalloc+0x6f/0x370 [ 316.168343][T18923] ? number+0xa13/0xb60 [ 316.172500][T18923] kzalloc+0x16/0x20 [ 316.176394][T18923] apply_wqattrs_prepare+0x3a/0x630 [ 316.181582][T18923] ? vsnprintf+0xe8f/0xed0 [ 316.186023][T18923] apply_workqueue_attrs+0x9e/0x100 [ 316.191221][T18923] alloc_workqueue+0x777/0xad0 [ 316.195971][T18923] ? preempt_count_add+0x4e/0x90 [ 316.200891][T18923] ? _raw_spin_unlock+0x2e/0x50 [ 316.205722][T18923] ? bd_prepare_to_claim+0x1ac/0x200 [ 316.210996][T18923] loop_configure+0x70e/0xf30 [ 316.215718][T18923] lo_ioctl+0x583/0x1270 [ 316.219983][T18923] ? folio_mark_dirty+0x84/0xe0 [ 316.224902][T18923] ? unlock_page+0x37/0x50 [ 316.229296][T18923] ? __rcu_read_unlock+0x5c/0x290 [ 316.234370][T18923] ? blkdev_common_ioctl+0x438/0x1180 [ 316.239789][T18923] ? selinux_file_ioctl+0x522/0x590 [ 316.245007][T18923] ? do_vfs_ioctl+0x819/0x14a0 [ 316.249819][T18923] ? lo_release+0x120/0x120 [ 316.254310][T18923] blkdev_ioctl+0x20e/0x440 [ 316.258797][T18923] ? blkdev_compat_ptr_ioctl+0x80/0x80 [ 316.264325][T18923] __se_sys_ioctl+0xcb/0x140 [ 316.268979][T18923] __x64_sys_ioctl+0x3f/0x50 [ 316.273591][T18923] do_syscall_64+0x44/0xd0 [ 316.277997][T18923] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 316.284038][T18923] RIP: 0033:0x7f1cb8affc57 [ 316.288463][T18923] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 04 54 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 316.308061][T18923] RSP: 002b:00007f1cb7c75f28 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 316.316562][T18923] RAX: ffffffffffffffda RBX: 00007f1cb8b499c8 RCX: 00007f1cb8affc57 [ 316.324715][T18923] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 17:05:56 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc01000a, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000003980)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d9", 0x4, 0x6800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d0f465001000005fd0f4655f00000000000001000c00000010000800000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}], 0x0, &(0x7f00000000c0)) (fail_nth: 27) [ 316.332789][T18923] RBP: 0000000000000005 R08: 0000000000000000 R09: 00007f1cb7c761d0 [ 316.340929][T18923] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 316.348907][T18923] R13: 0000000000000004 R14: 00000000200002c0 R15: 0000000000000008 [ 316.356868][T18923] [ 316.377738][T18927] loop5: detected capacity change from 0 to 264192 [ 316.379384][T18929] FAULT_INJECTION: forcing a failure. [ 316.379384][T18929] name failslab, interval 1, probability 0, space 0, times 0 [ 316.396928][T18929] CPU: 0 PID: 18929 Comm: syz-executor.0 Not tainted 5.16.0-syzkaller #0 [ 316.405503][T18929] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 316.415643][T18929] Call Trace: [ 316.418946][T18929] [ 316.421868][T18929] dump_stack_lvl+0xd6/0x122 [ 316.426469][T18929] dump_stack+0x11/0x1b [ 316.430743][T18929] should_fail+0x23c/0x250 [ 316.435158][T18929] ? apply_wqattrs_prepare+0x5f/0x630 [ 316.440551][T18929] __should_failslab+0x81/0x90 [ 316.445316][T18929] should_failslab+0x5/0x20 [ 316.449901][T18929] kmem_cache_alloc_trace+0x52/0x350 [ 316.455174][T18929] ? kzalloc+0x16/0x20 [ 316.459232][T18929] apply_wqattrs_prepare+0x5f/0x630 [ 316.464422][T18929] ? vsnprintf+0xe8f/0xed0 [ 316.468838][T18929] apply_workqueue_attrs+0x9e/0x100 [ 316.474025][T18929] alloc_workqueue+0x777/0xad0 [ 316.478781][T18929] ? preempt_count_add+0x4e/0x90 [ 316.483777][T18929] ? _raw_spin_unlock+0x2e/0x50 [ 316.488658][T18929] ? bd_prepare_to_claim+0x1ac/0x200 [ 316.494004][T18929] loop_configure+0x70e/0xf30 [ 316.498724][T18929] lo_ioctl+0x583/0x1270 [ 316.502956][T18929] ? folio_mark_dirty+0x84/0xe0 [ 316.507829][T18929] ? unlock_page+0x37/0x50 [ 316.512263][T18929] ? __rcu_read_unlock+0x5c/0x290 [ 316.517367][T18929] ? blkdev_common_ioctl+0x438/0x1180 [ 316.522773][T18929] ? selinux_file_ioctl+0x522/0x590 [ 316.527974][T18929] ? do_vfs_ioctl+0x819/0x14a0 [ 316.532753][T18929] ? lo_release+0x120/0x120 [ 316.537317][T18929] blkdev_ioctl+0x20e/0x440 [ 316.541810][T18929] ? blkdev_compat_ptr_ioctl+0x80/0x80 [ 316.547326][T18929] __se_sys_ioctl+0xcb/0x140 [ 316.551906][T18929] __x64_sys_ioctl+0x3f/0x50 [ 316.556644][T18929] do_syscall_64+0x44/0xd0 [ 316.561137][T18929] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 316.567069][T18929] RIP: 0033:0x7f1cb8affc57 [ 316.571470][T18929] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 04 54 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 316.591134][T18929] RSP: 002b:00007f1cb7c75f28 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 316.599592][T18929] RAX: ffffffffffffffda RBX: 00007f1cb8b499c8 RCX: 00007f1cb8affc57 [ 316.607584][T18929] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 316.615621][T18929] RBP: 0000000000000005 R08: 0000000000000000 R09: 00007f1cb7c761d0 17:05:56 executing program 2: clock_adjtime(0x7, &(0x7f0000000000)={0x8000, 0x62, 0xff, 0x1, 0x3, 0x1ff, 0x3ff, 0x4, 0xff, 0x20, 0x6, 0x401, 0x20, 0x0, 0x1ff, 0x8000, 0xfffffffffffffffd, 0x400, 0x8, 0x100000000, 0x2, 0x8, 0xf32, 0x4, 0x6, 0x80}) clock_adjtime(0x2, &(0x7f0000000100)={0xd9, 0x9, 0x1, 0x2, 0x1f, 0x78, 0x4b1, 0x0, 0x401, 0x5, 0x8, 0x1, 0x101, 0x100000001, 0x7, 0x1fc, 0x9, 0x9, 0x0, 0x9, 0x8, 0x3, 0xff, 0x7, 0x73, 0x946c}) clock_adjtime(0x6, &(0x7f0000000200)={0x4, 0x1, 0x100, 0x6, 0x2, 0x6, 0x1, 0x1dd, 0x9, 0x1000000000000000, 0x0, 0x6, 0x1, 0x1, 0x9, 0x5, 0x3023, 0x2, 0x4, 0xfffffffffffffff9, 0x429, 0x3, 0x0, 0x9, 0xffffffffffffff05, 0x1000}) clock_adjtime(0x3, &(0x7f0000000300)={0x0, 0x8, 0x9, 0x9, 0x9, 0x9, 0x6, 0x9, 0x8, 0x1, 0xd0fc, 0x55, 0x2, 0x0, 0x1, 0x1f, 0x100000001, 0x8f44, 0x53, 0x0, 0x3, 0x140000000000, 0x9, 0x8000, 0x0, 0x10001}) r0 = syz_mount_image$iso9660(&(0x7f0000000400), &(0x7f0000000440)='./file0\x00', 0x4, 0x1, &(0x7f0000000480)=[{0xfffffffffffffffe, 0x0, 0x3}], 0x2014400, &(0x7f00000004c0)={[{@check_relaxed}, {@dmode}, {@check_relaxed}], [{@euid_lt={'euid<', 0xee01}}, {@euid_eq}, {@rootcontext={'rootcontext', 0x3d, 'staff_u'}}, {@obj_user={'obj_user', 0x3d, '#-_'}}, {@rootcontext={'rootcontext', 0x3d, 'staff_u'}}]}) faccessat(r0, &(0x7f0000000580)='./file0\x00', 0x88) clock_adjtime(0x4, &(0x7f00000005c0)={0x80000000, 0x100000000, 0xba, 0x80000000, 0x4, 0x20d4e190, 0x7, 0x400, 0x33, 0x7a, 0x1, 0x465d, 0x7f, 0x5, 0x3, 0x1, 0x0, 0x8, 0x7, 0x7ff, 0x1, 0x4, 0x3f, 0x7fff, 0x700b, 0x96}) r1 = accept$unix(0xffffffffffffffff, 0x0, &(0x7f00000006c0)) getsockname$unix(r1, &(0x7f0000000700), &(0x7f0000000780)=0x6e) clock_adjtime(0x3, &(0x7f00000007c0)={0x6, 0x6, 0x7, 0x8000, 0x7ff, 0x5c, 0x401, 0x2, 0x9, 0x4, 0x0, 0x61, 0x2, 0x9b71, 0x100000000, 0x7fffffff, 0x322, 0xc70d, 0x9, 0xd, 0x9, 0x0, 0x9, 0x1a1f00000000, 0xffffffffffffffff, 0x9}) clock_adjtime(0x6, &(0x7f00000008c0)={0x4, 0x9, 0x3, 0xfffffffffffffff7, 0xb31, 0x1, 0x1, 0x2, 0x538, 0x0, 0x401, 0x1, 0xdd, 0xfffffffffffffff7, 0xec54, 0x4, 0x100000001, 0x0, 0xa, 0x1, 0x7ff, 0xcd, 0xf2, 0x80, 0x7, 0x8000}) clock_adjtime(0x0, &(0x7f00000009c0)={0x8, 0xff, 0x81, 0x2, 0x100000001, 0x11, 0x5, 0x1, 0x1, 0x9, 0x1000, 0x8, 0xdf6c, 0x9, 0x8, 0x1004000000000000, 0x1ff, 0x3, 0x6, 0xf5, 0x80000, 0x1, 0xfffffffffffffd6d, 0x2, 0x6, 0xfa}) r2 = socket$unix(0x1, 0x5, 0x0) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f0000000ac0)={'wlan0\x00'}) mq_timedreceive(0xffffffffffffffff, &(0x7f0000000b00)=""/4096, 0x1000, 0x80, &(0x7f0000001b00)={0x0, 0x989680}) r3 = creat(&(0x7f0000001b40)='./file0\x00', 0x1) mknodat(r3, &(0x7f0000001b80)='./file1\x00', 0x4, 0x0) clock_adjtime(0x0, &(0x7f0000001bc0)={0xfff, 0x7fff, 0x0, 0x2, 0xfdc, 0x54, 0x8fa, 0x3f41, 0x0, 0x4, 0x4, 0x5, 0x101, 0x5, 0x4, 0x9, 0x9, 0x30e, 0x3f, 0x2, 0x7f, 0x7, 0x6, 0x4, 0x3ff, 0x100000000}) clock_adjtime(0x2, &(0x7f0000001cc0)={0x0, 0x6, 0x7, 0xe5, 0x5, 0x6, 0x10, 0x7, 0x281, 0x40, 0x1, 0x0, 0x1, 0x10001, 0x5, 0x100, 0x0, 0x4, 0xffffffffffffe001, 0xdf, 0x7f, 0x8000, 0x9, 0x0, 0xfffffffffffffe00, 0x3f}) 17:05:56 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc01000a, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000003980)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d0f465001000005fd0f4655f00000000000001", 0x1b, 0x11100}], 0x0, 0x0) [ 316.623578][T18929] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 316.631655][T18929] R13: 0000000000000004 R14: 00000000200002c0 R15: 0000000000000008 [ 316.639624][T18929] [ 316.668470][T18917] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: none. 17:05:57 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc01000a, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000003980)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d9", 0x4, 0x6800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d0f465001000005fd0f4655f00000000000001000c00000010000800000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}], 0x0, &(0x7f00000000c0)) (fail_nth: 28) [ 316.670590][T18927] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: none. [ 316.679160][T18917] ext4 filesystem being mounted at /root/syzkaller-testdir125786251/syzkaller.yEZeTO/774/file0 supports timestamps until 2038 (0x7fffffff) [ 316.699055][T18933] SELinux: duplicate or incompatible mount options [ 316.704860][T18927] ext4 filesystem being mounted at /root/syzkaller-testdir978532967/syzkaller.UFCZ1t/869/file0 supports timestamps until 2038 (0x7fffffff) 17:05:57 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc01000a, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b00000080000000080000005247000062", 0x65, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000003980)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="80", 0x1, 0x11100}], 0x0, &(0x7f00000000c0)) 17:05:57 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc01000a, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000011", 0x9, 0x4e0}, {0x0, 0x0, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000003980)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d0f465001000005fd0f4655f00000000000001000c000000100008", 0x23, 0x11100}], 0x0, &(0x7f00000000c0)) 17:05:57 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc01000a, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700", 0x63, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000003980)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d0f465001000005fd0f4655f00000000000001000c00000010000800000000000af3010004", 0x2d, 0x11100}], 0x0, &(0x7f00000000c0)) [ 316.726899][T18935] FAULT_INJECTION: forcing a failure. [ 316.726899][T18935] name failslab, interval 1, probability 0, space 0, times 0 [ 316.739535][T18935] CPU: 1 PID: 18935 Comm: syz-executor.0 Not tainted 5.16.0-syzkaller #0 [ 316.747958][T18935] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 316.758016][T18935] Call Trace: [ 316.761280][T18935] [ 316.764194][T18935] dump_stack_lvl+0xd6/0x122 [ 316.768770][T18935] dump_stack+0x11/0x1b [ 316.773043][T18935] should_fail+0x23c/0x250 [ 316.777480][T18935] ? apply_wqattrs_prepare+0xbe/0x630 [ 316.782893][T18935] __should_failslab+0x81/0x90 [ 316.787702][T18935] should_failslab+0x5/0x20 [ 316.792198][T18935] kmem_cache_alloc_trace+0x52/0x350 [ 316.797469][T18935] ? apply_wqattrs_prepare+0x5f/0x630 [ 316.802962][T18935] apply_wqattrs_prepare+0xbe/0x630 [ 316.808198][T18935] ? vsnprintf+0xe8f/0xed0 [ 316.812597][T18935] apply_workqueue_attrs+0x9e/0x100 [ 316.817779][T18935] alloc_workqueue+0x777/0xad0 [ 316.822527][T18935] ? preempt_count_add+0x4e/0x90 [ 316.827448][T18935] ? _raw_spin_unlock+0x2e/0x50 [ 316.832466][T18935] ? bd_prepare_to_claim+0x1ac/0x200 [ 316.838055][T18935] loop_configure+0x70e/0xf30 [ 316.842778][T18935] lo_ioctl+0x583/0x1270 [ 316.847120][T18935] ? folio_mark_dirty+0x84/0xe0 [ 316.852093][T18935] ? unlock_page+0x37/0x50 [ 316.856511][T18935] ? __rcu_read_unlock+0x5c/0x290 [ 316.861519][T18935] ? blkdev_common_ioctl+0x438/0x1180 [ 316.866924][T18935] ? selinux_file_ioctl+0x522/0x590 [ 316.872167][T18935] ? do_vfs_ioctl+0x819/0x14a0 [ 316.876942][T18935] ? lo_release+0x120/0x120 [ 316.881426][T18935] blkdev_ioctl+0x20e/0x440 [ 316.885920][T18935] ? blkdev_compat_ptr_ioctl+0x80/0x80 [ 316.891358][T18935] __se_sys_ioctl+0xcb/0x140 [ 316.895934][T18935] __x64_sys_ioctl+0x3f/0x50 [ 316.900571][T18935] do_syscall_64+0x44/0xd0 [ 316.904979][T18935] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 316.910853][T18935] RIP: 0033:0x7f1cb8affc57 [ 316.915251][T18935] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 04 54 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 316.935000][T18935] RSP: 002b:00007f1cb7c75f28 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 316.943393][T18935] RAX: ffffffffffffffda RBX: 00007f1cb8b499c8 RCX: 00007f1cb8affc57 [ 316.951360][T18935] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 316.959419][T18935] RBP: 0000000000000005 R08: 0000000000000000 R09: 00007f1cb7c761d0 [ 316.967400][T18935] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 316.975401][T18935] R13: 0000000000000004 R14: 00000000200002c0 R15: 0000000000000008 [ 316.983357][T18935] [ 316.989116][T18937] loop3: detected capacity change from 0 to 264192 [ 317.006483][T18942] loop1: detected capacity change from 0 to 264192 17:06:01 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc01000a, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000003980)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d9", 0x4, 0x6800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d0f465001000005fd0f4655f00000000000001000c00000010000800000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}], 0x0, &(0x7f00000000c0)) (fail_nth: 29) 17:06:01 executing program 2: clock_adjtime(0x7, &(0x7f0000000000)={0x8000, 0x62, 0xff, 0x1, 0x3, 0x1ff, 0x3ff, 0x4, 0xff, 0x20, 0x6, 0x401, 0x20, 0x0, 0x1ff, 0x8000, 0xfffffffffffffffd, 0x400, 0x8, 0x100000000, 0x2, 0x8, 0xf32, 0x4, 0x6, 0x80}) clock_adjtime(0x2, &(0x7f0000000100)={0xd9, 0x9, 0x1, 0x2, 0x1f, 0x78, 0x4b1, 0x0, 0x401, 0x5, 0x8, 0x1, 0x101, 0x100000001, 0x7, 0x1fc, 0x9, 0x9, 0x0, 0x9, 0x8, 0x3, 0xff, 0x7, 0x73, 0x946c}) clock_adjtime(0x6, &(0x7f0000000200)={0x4, 0x1, 0x100, 0x6, 0x2, 0x6, 0x1, 0x1dd, 0x9, 0x1000000000000000, 0x0, 0x6, 0x1, 0x1, 0x9, 0x5, 0x3023, 0x2, 0x4, 0xfffffffffffffff9, 0x429, 0x3, 0x0, 0x9, 0xffffffffffffff05, 0x1000}) clock_adjtime(0x3, &(0x7f0000000300)={0x0, 0x8, 0x9, 0x9, 0x9, 0x9, 0x6, 0x9, 0x8, 0x1, 0xd0fc, 0x55, 0x2, 0x0, 0x1, 0x1f, 0x100000001, 0x8f44, 0x53, 0x0, 0x3, 0x140000000000, 0x9, 0x8000, 0x0, 0x10001}) r0 = syz_mount_image$iso9660(&(0x7f0000000400), &(0x7f0000000440)='./file0\x00', 0x4, 0x1, &(0x7f0000000480)=[{0xfffffffffffffffe, 0x0, 0x3}], 0x2014400, &(0x7f00000004c0)={[{@check_relaxed}, {@dmode}, {@check_relaxed}], [{@euid_lt={'euid<', 0xee01}}, {@euid_eq}, {@rootcontext={'rootcontext', 0x3d, 'staff_u'}}, {@obj_user={'obj_user', 0x3d, '#-_'}}, {@rootcontext={'rootcontext', 0x3d, 'staff_u'}}]}) faccessat(r0, &(0x7f0000000580)='./file0\x00', 0x88) clock_adjtime(0x4, &(0x7f00000005c0)={0x80000000, 0x100000000, 0xba, 0x80000000, 0x4, 0x20d4e190, 0x7, 0x400, 0x33, 0x7a, 0x1, 0x465d, 0x7f, 0x5, 0x3, 0x1, 0x0, 0x8, 0x7, 0x7ff, 0x1, 0x4, 0x3f, 0x7fff, 0x700b, 0x96}) r1 = accept$unix(0xffffffffffffffff, 0x0, &(0x7f00000006c0)) getsockname$unix(r1, &(0x7f0000000700), &(0x7f0000000780)=0x6e) clock_adjtime(0x3, &(0x7f00000007c0)={0x6, 0x6, 0x7, 0x8000, 0x7ff, 0x5c, 0x401, 0x2, 0x9, 0x4, 0x0, 0x61, 0x2, 0x9b71, 0x100000000, 0x7fffffff, 0x322, 0xc70d, 0x9, 0xd, 0x9, 0x0, 0x9, 0x1a1f00000000, 0xffffffffffffffff, 0x9}) clock_adjtime(0x6, &(0x7f00000008c0)={0x4, 0x9, 0x3, 0xfffffffffffffff7, 0xb31, 0x1, 0x1, 0x2, 0x538, 0x0, 0x401, 0x1, 0xdd, 0xfffffffffffffff7, 0xec54, 0x4, 0x100000001, 0x0, 0xa, 0x1, 0x7ff, 0xcd, 0xf2, 0x80, 0x7, 0x8000}) clock_adjtime(0x0, &(0x7f00000009c0)={0x8, 0xff, 0x81, 0x2, 0x100000001, 0x11, 0x5, 0x1, 0x1, 0x9, 0x1000, 0x8, 0xdf6c, 0x9, 0x8, 0x1004000000000000, 0x1ff, 0x3, 0x6, 0xf5, 0x80000, 0x1, 0xfffffffffffffd6d, 0x2, 0x6, 0xfa}) r2 = socket$unix(0x1, 0x5, 0x0) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f0000000ac0)={'wlan0\x00'}) mq_timedreceive(0xffffffffffffffff, &(0x7f0000000b00)=""/4096, 0x1000, 0x80, &(0x7f0000001b00)={0x0, 0x989680}) r3 = creat(&(0x7f0000001b40)='./file0\x00', 0x1) mknodat(r3, &(0x7f0000001b80)='./file1\x00', 0x4, 0x0) clock_adjtime(0x0, &(0x7f0000001bc0)={0xfff, 0x7fff, 0x0, 0x2, 0xfdc, 0x54, 0x8fa, 0x3f41, 0x0, 0x4, 0x4, 0x5, 0x101, 0x5, 0x4, 0x9, 0x9, 0x30e, 0x3f, 0x2, 0x7f, 0x7, 0x6, 0x4, 0x3ff, 0x100000000}) clock_adjtime(0x2, &(0x7f0000001cc0)={0x0, 0x6, 0x7, 0xe5, 0x5, 0x6, 0x10, 0x7, 0x281, 0x40, 0x1, 0x0, 0x1, 0x10001, 0x5, 0x100, 0x0, 0x4, 0xffffffffffffe001, 0xdf, 0x7f, 0x8000, 0x9, 0x400, 0x0, 0x3f}) [ 317.023243][T18937] EXT4-fs warning (device loop3): read_mmp_block:107: Error -117 while reading MMP block 0 [ 317.037323][T18944] FAULT_INJECTION: forcing a failure. [ 317.037323][T18944] name failslab, interval 1, probability 0, space 0, times 0 [ 317.050236][T18944] CPU: 1 PID: 18944 Comm: syz-executor.0 Not tainted 5.16.0-syzkaller #0 [ 317.058638][T18944] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 317.068774][T18944] Call Trace: [ 317.072080][T18944] [ 317.075124][T18944] dump_stack_lvl+0xd6/0x122 [ 317.079719][T18944] dump_stack+0x11/0x1b [ 317.083856][T18944] should_fail+0x23c/0x250 [ 317.088255][T18944] __should_failslab+0x81/0x90 [ 317.093070][T18944] should_failslab+0x5/0x20 [ 317.097566][T18944] kmem_cache_alloc_node+0x61/0x2d0 [ 317.102839][T18944] ? should_fail+0xd6/0x250 [ 317.107343][T18944] ? should_fail+0xd6/0x250 [ 317.111867][T18944] ? alloc_unbound_pwq+0x3e6/0x780 [ 317.117037][T18944] alloc_unbound_pwq+0x3e6/0x780 [ 317.122180][T18944] apply_wqattrs_prepare+0x1ed/0x630 [ 317.127485][T18944] ? vsnprintf+0xe8f/0xed0 [ 317.131953][T18944] apply_workqueue_attrs+0x9e/0x100 [ 317.137270][T18944] alloc_workqueue+0x777/0xad0 [ 317.142034][T18944] ? preempt_count_add+0x4e/0x90 [ 317.147012][T18944] ? _raw_spin_unlock+0x2e/0x50 [ 317.151877][T18944] ? bd_prepare_to_claim+0x1ac/0x200 [ 317.157182][T18944] loop_configure+0x70e/0xf30 [ 317.161867][T18944] lo_ioctl+0x583/0x1270 [ 317.166179][T18944] ? folio_mark_dirty+0x84/0xe0 [ 317.171078][T18944] ? unlock_page+0x37/0x50 [ 317.175662][T18944] ? __rcu_read_unlock+0x5c/0x290 [ 317.180724][T18944] ? blkdev_common_ioctl+0x438/0x1180 [ 317.186125][T18944] ? selinux_file_ioctl+0x522/0x590 [ 317.191327][T18944] ? do_vfs_ioctl+0x819/0x14a0 [ 317.196147][T18944] ? lo_release+0x120/0x120 [ 317.200638][T18944] blkdev_ioctl+0x20e/0x440 [ 317.205235][T18944] ? blkdev_compat_ptr_ioctl+0x80/0x80 [ 317.211271][T18944] __se_sys_ioctl+0xcb/0x140 [ 317.215875][T18944] __x64_sys_ioctl+0x3f/0x50 [ 317.220538][T18944] do_syscall_64+0x44/0xd0 [ 317.224948][T18944] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 317.230829][T18944] RIP: 0033:0x7f1cb8affc57 [ 317.235226][T18944] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 04 54 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 317.254949][T18944] RSP: 002b:00007f1cb7c75f28 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 317.263375][T18944] RAX: ffffffffffffffda RBX: 00007f1cb8b499c8 RCX: 00007f1cb8affc57 [ 317.271340][T18944] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 317.279310][T18944] RBP: 0000000000000005 R08: 0000000000000000 R09: 00007f1cb7c761d0 [ 317.287354][T18944] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 317.295350][T18944] R13: 0000000000000004 R14: 00000000200002c0 R15: 0000000000000008 [ 317.303612][T18944] [ 317.317736][T18951] loop4: detected capacity change from 0 to 264192 [ 317.319811][ T24] kauditd_printk_skb: 50 callbacks suppressed 17:06:05 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc01000a, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000003980)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d0f465001000005fd0f4655f00000000000001", 0x1b, 0x11100}], 0x0, 0x0) 17:06:05 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc01000a, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000011", 0x9, 0x4e0}, {0x0, 0x0, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000003980)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d0f465001000005fd0f4655f00000000000001000c000000100008", 0x23, 0x11100}], 0x0, &(0x7f00000000c0)) [ 317.319824][ T24] audit: type=1400 audit(1641920765.617:126): avc: denied { mounton } for pid=18945 comm="syz-executor.2" path="/root/syzkaller-testdir100031793/syzkaller.zou5SD/938/file0" dev="sda1" ino=1182 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_home_t tclass=file permissive=1 [ 317.324845][T18953] loop5: detected capacity change from 0 to 264192 [ 317.330795][T18946] SELinux: duplicate or incompatible mount options 17:06:05 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc01000a, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000003980)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d9", 0x4, 0x6800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d0f465001000005fd0f4655f00000000000001000c00000010000800000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}], 0x0, &(0x7f00000000c0)) (fail_nth: 30) [ 317.388065][T18953] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: none. [ 317.393424][T18957] loop3: detected capacity change from 0 to 264192 [ 317.403483][T18959] FAULT_INJECTION: forcing a failure. [ 317.403483][T18959] name failslab, interval 1, probability 0, space 0, times 0 [ 317.406048][T18953] ext4 filesystem being mounted at /root/syzkaller-testdir978532967/syzkaller.UFCZ1t/870/file0 supports timestamps until 2038 (0x7fffffff) [ 317.417856][T18959] CPU: 0 PID: 18959 Comm: syz-executor.0 Not tainted 5.16.0-syzkaller #0 [ 317.440385][T18959] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 317.450447][T18959] Call Trace: [ 317.453722][T18959] [ 317.456672][T18959] dump_stack_lvl+0xd6/0x122 [ 317.461416][T18959] dump_stack+0x11/0x1b [ 317.465623][T18959] should_fail+0x23c/0x250 [ 317.470031][T18959] ? kobject_uevent_env+0x1a7/0xc40 [ 317.475318][T18959] __should_failslab+0x81/0x90 [ 317.480253][T18959] should_failslab+0x5/0x20 [ 317.484778][T18959] kmem_cache_alloc_trace+0x52/0x350 [ 317.490150][T18959] ? pwq_adjust_max_active+0x4c5/0x4e0 [ 317.495649][T18959] ? dev_uevent_filter+0x70/0x70 [ 317.500585][T18959] kobject_uevent_env+0x1a7/0xc40 [ 317.505679][T18959] ? preempt_count_add+0x4e/0x90 [ 317.510683][T18959] ? _raw_spin_unlock+0x2e/0x50 [ 317.515533][T18959] ? bd_prepare_to_claim+0x1ac/0x200 [ 317.520809][T18959] disk_force_media_change+0xe3/0x170 [ 317.526178][T18959] loop_configure+0x74d/0xf30 [ 317.530885][T18959] lo_ioctl+0x583/0x1270 [ 317.535193][T18959] ? folio_mark_dirty+0x84/0xe0 [ 317.540033][T18959] ? unlock_page+0x37/0x50 [ 317.544474][T18959] ? __rcu_read_unlock+0x5c/0x290 [ 317.549493][T18959] ? blkdev_common_ioctl+0x438/0x1180 [ 317.554913][T18959] ? selinux_file_ioctl+0x522/0x590 [ 317.560272][T18959] ? do_vfs_ioctl+0x819/0x14a0 [ 317.565108][T18959] ? lo_release+0x120/0x120 [ 317.569628][T18959] blkdev_ioctl+0x20e/0x440 [ 317.574187][T18959] ? blkdev_compat_ptr_ioctl+0x80/0x80 [ 317.579677][T18959] __se_sys_ioctl+0xcb/0x140 [ 317.584346][T18959] __x64_sys_ioctl+0x3f/0x50 [ 317.588948][T18959] do_syscall_64+0x44/0xd0 [ 317.593402][T18959] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 317.599361][T18959] RIP: 0033:0x7f1cb8affc57 [ 317.603763][T18959] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 04 54 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 317.623437][T18959] RSP: 002b:00007f1cb7c75f28 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 317.631838][T18959] RAX: ffffffffffffffda RBX: 00007f1cb8b499c8 RCX: 00007f1cb8affc57 [ 317.639902][T18959] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 317.647862][T18959] RBP: 0000000000000005 R08: 0000000000000000 R09: 00007f1cb7c761d0 [ 317.655872][T18959] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 317.663857][T18959] R13: 0000000000000004 R14: 00000000200002c0 R15: 0000000000000008 [ 317.671831][T18959] [ 317.675169][T18957] EXT4-fs warning (device loop3): read_mmp_block:107: Error -117 while reading MMP block 0 17:06:06 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc01000a, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000011", 0x9, 0x4e0}, {&(0x7f0000010200), 0x0, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000003980)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d0f465001000005fd0f4655f00000000000001000c000000100008", 0x23, 0x11100}], 0x0, &(0x7f00000000c0)) 17:06:06 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc01000a, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b00000080000000080000005247000062", 0x65, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000003980)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="80", 0x1, 0x11100}], 0x0, &(0x7f00000000c0)) 17:06:06 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc01000a, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b00000080000000080000005247000062", 0x65, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000003980)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d0f465001000005fd0f4655f00000000000001000c00000010000800000000000af3010004", 0x2d, 0x11100}], 0x0, &(0x7f00000000c0)) [ 317.684180][T18959] loop0: detected capacity change from 0 to 264192 [ 317.689579][T18962] loop1: detected capacity change from 0 to 264192 [ 317.699290][T18951] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: none. [ 317.711359][T18951] ext4 filesystem being mounted at /root/syzkaller-testdir125786251/syzkaller.yEZeTO/775/file0 supports timestamps until 2038 (0x7fffffff) 17:06:06 executing program 2: clock_adjtime(0x7, &(0x7f0000000000)={0x8000, 0x62, 0xff, 0x1, 0x3, 0x1ff, 0x3ff, 0x4, 0xff, 0x20, 0x6, 0x401, 0x20, 0x0, 0x1ff, 0x8000, 0xfffffffffffffffd, 0x400, 0x8, 0x100000000, 0x2, 0x8, 0xf32, 0x4, 0x6, 0x80}) clock_adjtime(0x2, &(0x7f0000000100)={0xd9, 0x9, 0x1, 0x2, 0x1f, 0x78, 0x4b1, 0x0, 0x401, 0x5, 0x8, 0x1, 0x101, 0x100000001, 0x7, 0x1fc, 0x9, 0x9, 0x0, 0x9, 0x8, 0x3, 0xff, 0x7, 0x73, 0x946c}) clock_adjtime(0x6, &(0x7f0000000200)={0x4, 0x1, 0x100, 0x6, 0x2, 0x6, 0x1, 0x1dd, 0x9, 0x1000000000000000, 0x0, 0x6, 0x1, 0x1, 0x9, 0x5, 0x3023, 0x2, 0x4, 0xfffffffffffffff9, 0x429, 0x3, 0x0, 0x9, 0xffffffffffffff05, 0x1000}) clock_adjtime(0x3, &(0x7f0000000300)={0x0, 0x8, 0x9, 0x9, 0x9, 0x9, 0x6, 0x9, 0x8, 0x1, 0xd0fc, 0x55, 0x2, 0x0, 0x1, 0x1f, 0x100000001, 0x8f44, 0x53, 0x0, 0x3, 0x140000000000, 0x9, 0x8000, 0x0, 0x10001}) r0 = syz_mount_image$iso9660(&(0x7f0000000400), &(0x7f0000000440)='./file0\x00', 0x4, 0x1, &(0x7f0000000480)=[{0xfffffffffffffffe, 0x0, 0x3}], 0x2014400, &(0x7f00000004c0)={[{@check_relaxed}, {@dmode}, {@check_relaxed}], [{@euid_lt={'euid<', 0xee01}}, {@euid_eq}, {@rootcontext={'rootcontext', 0x3d, 'staff_u'}}, {@obj_user={'obj_user', 0x3d, '#-_'}}, {@rootcontext={'rootcontext', 0x3d, 'staff_u'}}]}) faccessat(r0, &(0x7f0000000580)='./file0\x00', 0x88) clock_adjtime(0x4, &(0x7f00000005c0)={0x80000000, 0x100000000, 0xba, 0x80000000, 0x4, 0x20d4e190, 0x7, 0x400, 0x33, 0x7a, 0x1, 0x465d, 0x7f, 0x5, 0x3, 0x1, 0x0, 0x8, 0x7, 0x7ff, 0x1, 0x4, 0x3f, 0x7fff, 0x700b, 0x96}) r1 = accept$unix(0xffffffffffffffff, 0x0, &(0x7f00000006c0)) getsockname$unix(r1, &(0x7f0000000700), &(0x7f0000000780)=0x6e) clock_adjtime(0x3, &(0x7f00000007c0)={0x6, 0x6, 0x7, 0x8000, 0x7ff, 0x5c, 0x401, 0x2, 0x9, 0x4, 0x0, 0x61, 0x2, 0x9b71, 0x100000000, 0x7fffffff, 0x322, 0xc70d, 0x9, 0xd, 0x9, 0x0, 0x9, 0x1a1f00000000, 0xffffffffffffffff, 0x9}) clock_adjtime(0x6, &(0x7f00000008c0)={0x4, 0x9, 0x3, 0xfffffffffffffff7, 0xb31, 0x1, 0x1, 0x2, 0x538, 0x0, 0x401, 0x1, 0xdd, 0xfffffffffffffff7, 0xec54, 0x4, 0x100000001, 0x0, 0xa, 0x1, 0x7ff, 0xcd, 0xf2, 0x80, 0x7, 0x8000}) clock_adjtime(0x0, &(0x7f00000009c0)={0x8, 0xff, 0x81, 0x2, 0x100000001, 0x11, 0x5, 0x1, 0x1, 0x9, 0x1000, 0x8, 0xdf6c, 0x9, 0x8, 0x1004000000000000, 0x1ff, 0x3, 0x6, 0xf5, 0x80000, 0x1, 0xfffffffffffffd6d, 0x2, 0x6, 0xfa}) r2 = socket$unix(0x1, 0x5, 0x0) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f0000000ac0)={'wlan0\x00'}) mq_timedreceive(0xffffffffffffffff, &(0x7f0000000b00)=""/4096, 0x1000, 0x80, &(0x7f0000001b00)={0x0, 0x989680}) r3 = creat(&(0x7f0000001b40)='./file0\x00', 0x1) mknodat(r3, &(0x7f0000001b80)='./file1\x00', 0x4, 0x0) clock_adjtime(0x0, &(0x7f0000001bc0)={0xfff, 0x7fff, 0x0, 0x2, 0xfdc, 0x54, 0x8fa, 0x3f41, 0x0, 0x4, 0x4, 0x5, 0x101, 0x5, 0x4, 0x9, 0x9, 0x30e, 0x3f, 0x2, 0x7f, 0x7, 0x6, 0x4, 0x3ff, 0x100000000}) clock_adjtime(0x2, &(0x7f0000001cc0)={0x0, 0x6, 0x7, 0xe5, 0x5, 0x6, 0x10, 0x7, 0x281, 0x40, 0x1, 0x0, 0x1, 0x10001, 0x5, 0x100, 0x0, 0x4, 0xffffffffffffe001, 0xdf, 0x7f, 0x8000, 0x9, 0x400, 0x0, 0x3f}) 17:06:06 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc01000a, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000", 0x60, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000003980)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="80", 0x1, 0x11100}], 0x0, &(0x7f00000000c0)) 17:06:06 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc01000a, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000011", 0x9, 0x4e0}, {&(0x7f0000010200), 0x0, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000003980)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d0f465001000005fd0f4655f00000000000001000c000000100008", 0x23, 0x11100}], 0x0, &(0x7f00000000c0)) [ 317.746985][T18959] EXT4-fs warning (device loop0): ext4_enable_quotas:6363: Failed to enable quota tracking (type=0, err=-22). Please run e2fsck to fix. [ 317.771369][T18959] EXT4-fs (loop0): mount failed [ 317.783728][T18969] SELinux: duplicate or incompatible mount options [ 317.806688][T18971] loop4: detected capacity change from 0 to 264192 [ 317.817934][T18973] loop1: detected capacity change from 0 to 264192 [ 317.828387][T18975] loop5: detected capacity change from 0 to 264192 [ 317.836327][T18977] loop3: detected capacity change from 0 to 264192 [ 317.846695][T18973] EXT4-fs (loop1): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: none. 17:06:10 executing program 2: clock_adjtime(0x7, &(0x7f0000000000)={0x8000, 0x62, 0xff, 0x1, 0x3, 0x1ff, 0x3ff, 0x4, 0xff, 0x20, 0x6, 0x401, 0x20, 0x0, 0x1ff, 0x8000, 0xfffffffffffffffd, 0x400, 0x8, 0x100000000, 0x2, 0x8, 0xf32, 0x4, 0x6, 0x80}) clock_adjtime(0x2, &(0x7f0000000100)={0xd9, 0x9, 0x1, 0x2, 0x1f, 0x78, 0x4b1, 0x0, 0x401, 0x5, 0x8, 0x1, 0x101, 0x100000001, 0x7, 0x1fc, 0x9, 0x9, 0x0, 0x9, 0x8, 0x3, 0xff, 0x7, 0x73, 0x946c}) clock_adjtime(0x6, &(0x7f0000000200)={0x4, 0x1, 0x100, 0x6, 0x2, 0x6, 0x1, 0x1dd, 0x9, 0x1000000000000000, 0x0, 0x6, 0x1, 0x1, 0x9, 0x5, 0x3023, 0x2, 0x4, 0xfffffffffffffff9, 0x429, 0x3, 0x0, 0x9, 0xffffffffffffff05, 0x1000}) clock_adjtime(0x3, &(0x7f0000000300)={0x0, 0x8, 0x9, 0x9, 0x9, 0x9, 0x6, 0x9, 0x8, 0x1, 0xd0fc, 0x55, 0x2, 0x0, 0x1, 0x1f, 0x100000001, 0x8f44, 0x53, 0x0, 0x3, 0x140000000000, 0x9, 0x8000, 0x0, 0x10001}) r0 = syz_mount_image$iso9660(&(0x7f0000000400), &(0x7f0000000440)='./file0\x00', 0x4, 0x1, &(0x7f0000000480)=[{0xfffffffffffffffe, 0x0, 0x3}], 0x2014400, &(0x7f00000004c0)={[{@check_relaxed}, {@dmode}, {@check_relaxed}], [{@euid_lt={'euid<', 0xee01}}, {@euid_eq}, {@rootcontext={'rootcontext', 0x3d, 'staff_u'}}, {@obj_user={'obj_user', 0x3d, '#-_'}}, {@rootcontext={'rootcontext', 0x3d, 'staff_u'}}]}) faccessat(r0, &(0x7f0000000580)='./file0\x00', 0x88) clock_adjtime(0x4, &(0x7f00000005c0)={0x80000000, 0x100000000, 0xba, 0x80000000, 0x4, 0x20d4e190, 0x7, 0x400, 0x33, 0x7a, 0x1, 0x465d, 0x7f, 0x5, 0x3, 0x1, 0x0, 0x8, 0x7, 0x7ff, 0x1, 0x4, 0x3f, 0x7fff, 0x700b, 0x96}) r1 = accept$unix(0xffffffffffffffff, 0x0, &(0x7f00000006c0)) getsockname$unix(r1, &(0x7f0000000700), &(0x7f0000000780)=0x6e) clock_adjtime(0x3, &(0x7f00000007c0)={0x6, 0x6, 0x7, 0x8000, 0x7ff, 0x5c, 0x401, 0x2, 0x9, 0x4, 0x0, 0x61, 0x2, 0x9b71, 0x100000000, 0x7fffffff, 0x322, 0xc70d, 0x9, 0xd, 0x9, 0x0, 0x9, 0x1a1f00000000, 0xffffffffffffffff, 0x9}) clock_adjtime(0x6, &(0x7f00000008c0)={0x4, 0x9, 0x3, 0xfffffffffffffff7, 0xb31, 0x1, 0x1, 0x2, 0x538, 0x0, 0x401, 0x1, 0xdd, 0xfffffffffffffff7, 0xec54, 0x4, 0x100000001, 0x0, 0xa, 0x1, 0x7ff, 0xcd, 0xf2, 0x80, 0x7, 0x8000}) clock_adjtime(0x0, &(0x7f00000009c0)={0x8, 0xff, 0x81, 0x2, 0x100000001, 0x11, 0x5, 0x1, 0x1, 0x9, 0x1000, 0x8, 0xdf6c, 0x9, 0x8, 0x1004000000000000, 0x1ff, 0x3, 0x6, 0xf5, 0x80000, 0x1, 0xfffffffffffffd6d, 0x2, 0x6, 0xfa}) r2 = socket$unix(0x1, 0x5, 0x0) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f0000000ac0)={'wlan0\x00'}) mq_timedreceive(0xffffffffffffffff, &(0x7f0000000b00)=""/4096, 0x1000, 0x80, &(0x7f0000001b00)={0x0, 0x989680}) r3 = creat(&(0x7f0000001b40)='./file0\x00', 0x1) mknodat(r3, &(0x7f0000001b80)='./file1\x00', 0x4, 0x0) clock_adjtime(0x0, &(0x7f0000001bc0)={0xfff, 0x7fff, 0x0, 0x2, 0xfdc, 0x54, 0x8fa, 0x3f41, 0x0, 0x4, 0x4, 0x5, 0x101, 0x5, 0x4, 0x9, 0x9, 0x30e, 0x3f, 0x2, 0x7f, 0x7, 0x6, 0x4, 0x3ff, 0x100000000}) clock_adjtime(0x2, &(0x7f0000001cc0)={0x0, 0x6, 0x7, 0xe5, 0x5, 0x6, 0x10, 0x7, 0x281, 0x40, 0x1, 0x0, 0x1, 0x10001, 0x5, 0x100, 0x0, 0x4, 0xffffffffffffe001, 0xdf, 0x7f, 0x8000, 0x9, 0x400, 0x0, 0x3f}) [ 317.862633][T18977] EXT4-fs warning (device loop3): read_mmp_block:107: Error -117 while reading MMP block 0 [ 317.877513][T18971] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: none. [ 317.890912][T18984] SELinux: duplicate or incompatible mount options 17:06:10 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc01000a, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000003980)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d9", 0x4, 0x6800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d0f465001000005fd0f4655f00000000000001000c00000010000800000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}], 0x0, &(0x7f00000000c0)) (fail_nth: 31) [ 317.930296][T18973] ext4 filesystem being mounted at /root/syzkaller-testdir268235930/syzkaller.DrjInB/785/file0 supports timestamps until 2038 (0x7fffffff) [ 317.945232][T18971] ext4 filesystem being mounted at /root/syzkaller-testdir125786251/syzkaller.yEZeTO/776/file0 supports timestamps until 2038 (0x7fffffff) [ 317.966745][T18988] FAULT_INJECTION: forcing a failure. [ 317.966745][T18988] name failslab, interval 1, probability 0, space 0, times 0 17:06:10 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc01000a, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b00000080000000080000005247000062", 0x65, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000003980)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d0f465001000005fd0f4655f00000000000001000c00000010000800000000000af3010004", 0x2d, 0x11100}], 0x0, &(0x7f00000000c0)) [ 317.979487][T18988] CPU: 1 PID: 18988 Comm: syz-executor.0 Not tainted 5.16.0-syzkaller #0 [ 317.982896][T18975] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: none. [ 317.987968][T18988] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 317.987980][T18988] Call Trace: [ 317.987987][T18988] [ 317.987994][T18988] dump_stack_lvl+0xd6/0x122 [ 318.019309][T18988] dump_stack+0x11/0x1b [ 318.023480][T18988] should_fail+0x23c/0x250 17:06:10 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc01000a, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000011", 0x9, 0x4e0}, {&(0x7f0000010200), 0x0, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000003980)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d0f465001000005fd0f4655f00000000000001000c000000100008", 0x23, 0x11100}], 0x0, &(0x7f00000000c0)) 17:06:10 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc01000a, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000011", 0x9, 0x4e0}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000003980)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d0f465001000005fd0f4655f00000000000001000c000000100008", 0x23, 0x11100}], 0x0, &(0x7f00000000c0)) [ 318.027920][T18988] ? kzalloc+0x1d/0x30 [ 318.032047][T18988] __should_failslab+0x81/0x90 [ 318.036820][T18988] should_failslab+0x5/0x20 [ 318.040161][T18975] ext4 filesystem being mounted at /root/syzkaller-testdir978532967/syzkaller.UFCZ1t/871/file0 supports timestamps until 2038 (0x7fffffff) [ 318.041382][T18988] __kmalloc+0x6f/0x370 [ 318.041441][T18988] kzalloc+0x1d/0x30 [ 318.063574][T18988] kobject_get_path+0x7c/0x110 [ 318.068386][T18988] kobject_uevent_env+0x1be/0xc40 [ 318.073424][T18988] ? preempt_count_add+0x4e/0x90 17:06:10 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc01000a, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000003980)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="80", 0x1, 0x11100}], 0x0, &(0x7f00000000c0)) [ 318.078373][T18988] ? _raw_spin_unlock+0x2e/0x50 [ 318.083564][T18988] ? bd_prepare_to_claim+0x1ac/0x200 [ 318.088906][T18988] disk_force_media_change+0xe3/0x170 [ 318.094448][T18988] loop_configure+0x74d/0xf30 [ 318.099120][T18988] lo_ioctl+0x583/0x1270 [ 318.103481][T18988] ? folio_mark_dirty+0x84/0xe0 [ 318.108316][T18988] ? unlock_page+0x37/0x50 [ 318.112721][T18988] ? __rcu_read_unlock+0x5c/0x290 [ 318.117733][T18988] ? blkdev_common_ioctl+0x438/0x1180 [ 318.123141][T18988] ? selinux_file_ioctl+0x522/0x590 [ 318.128324][T18988] ? do_vfs_ioctl+0x819/0x14a0 [ 318.133077][T18988] ? lo_release+0x120/0x120 [ 318.137724][T18988] blkdev_ioctl+0x20e/0x440 [ 318.142212][T18988] ? blkdev_compat_ptr_ioctl+0x80/0x80 [ 318.147693][T18988] __se_sys_ioctl+0xcb/0x140 [ 318.152266][T18988] __x64_sys_ioctl+0x3f/0x50 [ 318.156841][T18988] do_syscall_64+0x44/0xd0 [ 318.161308][T18988] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 318.167189][T18988] RIP: 0033:0x7f1cb8affc57 [ 318.171654][T18988] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 04 54 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 318.191384][T18988] RSP: 002b:00007f1cb7c75f28 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 318.200027][T18988] RAX: ffffffffffffffda RBX: 00007f1cb8b499c8 RCX: 00007f1cb8affc57 [ 318.208187][T18988] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 318.216214][T18988] RBP: 0000000000000005 R08: 0000000000000000 R09: 00007f1cb7c761d0 17:06:14 executing program 2: clock_adjtime(0x7, &(0x7f0000000000)={0x8000, 0x62, 0xff, 0x1, 0x3, 0x1ff, 0x3ff, 0x4, 0xff, 0x20, 0x6, 0x401, 0x20, 0x0, 0x1ff, 0x8000, 0xfffffffffffffffd, 0x400, 0x8, 0x100000000, 0x2, 0x8, 0xf32, 0x4, 0x6, 0x80}) clock_adjtime(0x2, &(0x7f0000000100)={0xd9, 0x9, 0x1, 0x2, 0x1f, 0x78, 0x4b1, 0x0, 0x401, 0x5, 0x8, 0x1, 0x101, 0x100000001, 0x7, 0x1fc, 0x9, 0x9, 0x0, 0x9, 0x8, 0x3, 0xff, 0x7, 0x73, 0x946c}) clock_adjtime(0x6, &(0x7f0000000200)={0x4, 0x1, 0x100, 0x6, 0x2, 0x6, 0x1, 0x1dd, 0x9, 0x1000000000000000, 0x0, 0x6, 0x1, 0x1, 0x9, 0x5, 0x3023, 0x2, 0x4, 0xfffffffffffffff9, 0x429, 0x3, 0x0, 0x9, 0xffffffffffffff05, 0x1000}) clock_adjtime(0x3, &(0x7f0000000300)={0x0, 0x8, 0x9, 0x9, 0x9, 0x9, 0x6, 0x9, 0x8, 0x1, 0xd0fc, 0x55, 0x2, 0x0, 0x1, 0x1f, 0x100000001, 0x8f44, 0x53, 0x0, 0x3, 0x140000000000, 0x9, 0x8000, 0x0, 0x10001}) r0 = syz_mount_image$iso9660(&(0x7f0000000400), &(0x7f0000000440)='./file0\x00', 0x4, 0x1, &(0x7f0000000480)=[{0xfffffffffffffffe, 0x0, 0x3}], 0x2014400, &(0x7f00000004c0)={[{@check_relaxed}, {@dmode}, {@check_relaxed}], [{@euid_lt={'euid<', 0xee01}}, {@euid_eq}, {@rootcontext={'rootcontext', 0x3d, 'staff_u'}}, {@obj_user={'obj_user', 0x3d, '#-_'}}, {@rootcontext={'rootcontext', 0x3d, 'staff_u'}}]}) faccessat(r0, &(0x7f0000000580)='./file0\x00', 0x88) clock_adjtime(0x4, &(0x7f00000005c0)={0x80000000, 0x100000000, 0xba, 0x80000000, 0x4, 0x20d4e190, 0x7, 0x400, 0x33, 0x7a, 0x1, 0x465d, 0x7f, 0x5, 0x3, 0x1, 0x0, 0x8, 0x7, 0x7ff, 0x1, 0x4, 0x3f, 0x7fff, 0x700b, 0x96}) r1 = accept$unix(0xffffffffffffffff, 0x0, &(0x7f00000006c0)) getsockname$unix(r1, &(0x7f0000000700), &(0x7f0000000780)=0x6e) clock_adjtime(0x3, &(0x7f00000007c0)={0x6, 0x6, 0x7, 0x8000, 0x7ff, 0x5c, 0x401, 0x2, 0x9, 0x4, 0x0, 0x61, 0x2, 0x9b71, 0x100000000, 0x7fffffff, 0x322, 0xc70d, 0x9, 0xd, 0x9, 0x0, 0x9, 0x1a1f00000000, 0xffffffffffffffff, 0x9}) clock_adjtime(0x6, &(0x7f00000008c0)={0x4, 0x9, 0x3, 0xfffffffffffffff7, 0xb31, 0x1, 0x1, 0x2, 0x538, 0x0, 0x401, 0x1, 0xdd, 0xfffffffffffffff7, 0xec54, 0x4, 0x100000001, 0x0, 0xa, 0x1, 0x7ff, 0xcd, 0xf2, 0x80, 0x7, 0x8000}) clock_adjtime(0x0, &(0x7f00000009c0)={0x8, 0xff, 0x81, 0x2, 0x100000001, 0x11, 0x5, 0x1, 0x1, 0x9, 0x1000, 0x8, 0xdf6c, 0x9, 0x8, 0x1004000000000000, 0x1ff, 0x3, 0x6, 0xf5, 0x80000, 0x1, 0xfffffffffffffd6d, 0x2, 0x6, 0xfa}) r2 = socket$unix(0x1, 0x5, 0x0) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f0000000ac0)={'wlan0\x00'}) mq_timedreceive(0xffffffffffffffff, &(0x7f0000000b00)=""/4096, 0x1000, 0x80, &(0x7f0000001b00)={0x0, 0x989680}) r3 = creat(&(0x7f0000001b40)='./file0\x00', 0x1) mknodat(r3, &(0x7f0000001b80)='./file1\x00', 0x4, 0x0) clock_adjtime(0x0, &(0x7f0000001bc0)={0xfff, 0x7fff, 0x0, 0x2, 0xfdc, 0x54, 0x8fa, 0x3f41, 0x0, 0x4, 0x4, 0x5, 0x101, 0x5, 0x4, 0x9, 0x9, 0x30e, 0x3f, 0x2, 0x7f, 0x7, 0x6, 0x4, 0x3ff, 0x100000000}) clock_adjtime(0x2, &(0x7f0000001cc0)={0x0, 0x6, 0x7, 0xe5, 0x5, 0x6, 0x10, 0x7, 0x281, 0x40, 0x1, 0x0, 0x1, 0x10001, 0x5, 0x100, 0x0, 0x4, 0xffffffffffffe001, 0xdf, 0x7f, 0x8000, 0x9, 0x400, 0xfffffffffffffe00}) [ 318.224172][T18988] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 318.232215][T18988] R13: 0000000000000004 R14: 00000000200002c0 R15: 0000000000000008 [ 318.240303][T18988] [ 318.245965][T18988] loop0: detected capacity change from 0 to 264192 17:06:14 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc01000a, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000003980)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="80", 0x1, 0x11100}], 0x0, &(0x7f00000000c0)) 17:06:14 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc01000a, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b00000080000000080000005247000062", 0x65, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000003980)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d0f465001000005fd0f4655f00000000000001000c00000010000800000000000af3010004", 0x2d, 0x11100}], 0x0, &(0x7f00000000c0)) [ 318.307421][T18996] loop3: detected capacity change from 0 to 264192 [ 318.316617][T18999] SELinux: duplicate or incompatible mount options [ 318.340744][T19001] loop1: detected capacity change from 0 to 264192 [ 318.351561][T18996] EXT4-fs warning (device loop3): read_mmp_block:107: Error -117 while reading MMP block 0 [ 318.374714][T18988] EXT4-fs warning (device loop0): ext4_enable_quotas:6363: Failed to enable quota tracking (type=0, err=-22). Please run e2fsck to fix. [ 318.377654][T19005] loop4: detected capacity change from 0 to 264192 17:06:14 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc01000a, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000003980)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d9", 0x4, 0x6800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d0f465001000005fd0f4655f00000000000001000c00000010000800000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}], 0x0, &(0x7f00000000c0)) (fail_nth: 32) 17:06:18 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc01000a, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000011", 0x9, 0x4e0}, {&(0x7f0000010200)="0100000000", 0x5, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000003980)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d0f465001000005fd0f4655f00000000000001000c000000100008", 0x23, 0x11100}], 0x0, &(0x7f00000000c0)) [ 318.401981][T19009] loop5: detected capacity change from 0 to 264192 [ 318.422717][T18988] EXT4-fs (loop0): mount failed [ 318.436796][T19009] EXT4-fs (loop5): VFS: Can't find ext4 filesystem 17:06:18 executing program 2: clock_adjtime(0x7, &(0x7f0000000000)={0x8000, 0x62, 0xff, 0x1, 0x3, 0x1ff, 0x3ff, 0x4, 0xff, 0x20, 0x6, 0x401, 0x20, 0x0, 0x1ff, 0x8000, 0xfffffffffffffffd, 0x400, 0x8, 0x100000000, 0x2, 0x8, 0xf32, 0x4, 0x6, 0x80}) clock_adjtime(0x2, &(0x7f0000000100)={0xd9, 0x9, 0x1, 0x2, 0x1f, 0x78, 0x4b1, 0x0, 0x401, 0x5, 0x8, 0x1, 0x101, 0x100000001, 0x7, 0x1fc, 0x9, 0x9, 0x0, 0x9, 0x8, 0x3, 0xff, 0x7, 0x73, 0x946c}) clock_adjtime(0x6, &(0x7f0000000200)={0x4, 0x1, 0x100, 0x6, 0x2, 0x6, 0x1, 0x1dd, 0x9, 0x1000000000000000, 0x0, 0x6, 0x1, 0x1, 0x9, 0x5, 0x3023, 0x2, 0x4, 0xfffffffffffffff9, 0x429, 0x3, 0x0, 0x9, 0xffffffffffffff05, 0x1000}) clock_adjtime(0x3, &(0x7f0000000300)={0x0, 0x8, 0x9, 0x9, 0x9, 0x9, 0x6, 0x9, 0x8, 0x1, 0xd0fc, 0x55, 0x2, 0x0, 0x1, 0x1f, 0x100000001, 0x8f44, 0x53, 0x0, 0x3, 0x140000000000, 0x9, 0x8000, 0x0, 0x10001}) r0 = syz_mount_image$iso9660(&(0x7f0000000400), &(0x7f0000000440)='./file0\x00', 0x4, 0x1, &(0x7f0000000480)=[{0xfffffffffffffffe, 0x0, 0x3}], 0x2014400, &(0x7f00000004c0)={[{@check_relaxed}, {@dmode}, {@check_relaxed}], [{@euid_lt={'euid<', 0xee01}}, {@euid_eq}, {@rootcontext={'rootcontext', 0x3d, 'staff_u'}}, {@obj_user={'obj_user', 0x3d, '#-_'}}, {@rootcontext={'rootcontext', 0x3d, 'staff_u'}}]}) faccessat(r0, &(0x7f0000000580)='./file0\x00', 0x88) clock_adjtime(0x4, &(0x7f00000005c0)={0x80000000, 0x100000000, 0xba, 0x80000000, 0x4, 0x20d4e190, 0x7, 0x400, 0x33, 0x7a, 0x1, 0x465d, 0x7f, 0x5, 0x3, 0x1, 0x0, 0x8, 0x7, 0x7ff, 0x1, 0x4, 0x3f, 0x7fff, 0x700b, 0x96}) r1 = accept$unix(0xffffffffffffffff, 0x0, &(0x7f00000006c0)) getsockname$unix(r1, &(0x7f0000000700), &(0x7f0000000780)=0x6e) clock_adjtime(0x3, &(0x7f00000007c0)={0x6, 0x6, 0x7, 0x8000, 0x7ff, 0x5c, 0x401, 0x2, 0x9, 0x4, 0x0, 0x61, 0x2, 0x9b71, 0x100000000, 0x7fffffff, 0x322, 0xc70d, 0x9, 0xd, 0x9, 0x0, 0x9, 0x1a1f00000000, 0xffffffffffffffff, 0x9}) clock_adjtime(0x6, &(0x7f00000008c0)={0x4, 0x9, 0x3, 0xfffffffffffffff7, 0xb31, 0x1, 0x1, 0x2, 0x538, 0x0, 0x401, 0x1, 0xdd, 0xfffffffffffffff7, 0xec54, 0x4, 0x100000001, 0x0, 0xa, 0x1, 0x7ff, 0xcd, 0xf2, 0x80, 0x7, 0x8000}) clock_adjtime(0x0, &(0x7f00000009c0)={0x8, 0xff, 0x81, 0x2, 0x100000001, 0x11, 0x5, 0x1, 0x1, 0x9, 0x1000, 0x8, 0xdf6c, 0x9, 0x8, 0x1004000000000000, 0x1ff, 0x3, 0x6, 0xf5, 0x80000, 0x1, 0xfffffffffffffd6d, 0x2, 0x6, 0xfa}) r2 = socket$unix(0x1, 0x5, 0x0) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f0000000ac0)={'wlan0\x00'}) mq_timedreceive(0xffffffffffffffff, &(0x7f0000000b00)=""/4096, 0x1000, 0x80, &(0x7f0000001b00)={0x0, 0x989680}) r3 = creat(&(0x7f0000001b40)='./file0\x00', 0x1) mknodat(r3, &(0x7f0000001b80)='./file1\x00', 0x4, 0x0) clock_adjtime(0x0, &(0x7f0000001bc0)={0xfff, 0x7fff, 0x0, 0x2, 0xfdc, 0x54, 0x8fa, 0x3f41, 0x0, 0x4, 0x4, 0x5, 0x101, 0x5, 0x4, 0x9, 0x9, 0x30e, 0x3f, 0x2, 0x7f, 0x7, 0x6, 0x4, 0x3ff, 0x100000000}) clock_adjtime(0x2, &(0x7f0000001cc0)={0x0, 0x6, 0x7, 0xe5, 0x5, 0x6, 0x10, 0x7, 0x281, 0x40, 0x1, 0x0, 0x1, 0x10001, 0x5, 0x100, 0x0, 0x4, 0xffffffffffffe001, 0xdf, 0x7f, 0x8000, 0x9, 0x400, 0xfffffffffffffe00}) 17:06:18 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc01000a, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000003980)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="80", 0x1, 0x11100}], 0x0, &(0x7f00000000c0)) [ 318.461271][T19001] EXT4-fs error (device loop1): ext4_orphan_get:1419: comm syz-executor.1: bad orphan inode 17 [ 318.480533][T19001] ext4_test_bit(bit=16, block=18) = 0 [ 318.486156][T19001] EXT4-fs (loop1): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: writeback. [ 318.497239][T19001] ext4 filesystem being mounted at /root/syzkaller-testdir268235930/syzkaller.DrjInB/786/file0 supports timestamps until 2038 (0x7fffffff) [ 318.546588][T19020] loop5: detected capacity change from 0 to 264192 [ 318.547202][T19017] FAULT_INJECTION: forcing a failure. [ 318.547202][T19017] name failslab, interval 1, probability 0, space 0, times 0 [ 318.567263][T19017] CPU: 0 PID: 19017 Comm: syz-executor.0 Not tainted 5.16.0-syzkaller #0 [ 318.571314][T19005] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: none. [ 318.575691][T19017] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 318.586513][T19005] ext4 filesystem being mounted at /root/syzkaller-testdir125786251/syzkaller.yEZeTO/778/file0 supports timestamps until 2038 (0x7fffffff) [ 318.596360][T19017] Call Trace: [ 318.596370][T19017] [ 318.596377][T19017] dump_stack_lvl+0xd6/0x122 [ 318.596420][T19017] dump_stack+0x11/0x1b [ 318.625805][T19017] should_fail+0x23c/0x250 [ 318.630235][T19017] __should_failslab+0x81/0x90 [ 318.635009][T19017] should_failslab+0x5/0x20 [ 318.639562][T19017] kmem_cache_alloc_node+0x61/0x2d0 [ 318.644822][T19017] ? __alloc_skb+0xf0/0x450 [ 318.649355][T19017] __alloc_skb+0xf0/0x450 [ 318.653710][T19017] alloc_uevent_skb+0x5b/0x120 [ 318.658490][T19017] kobject_uevent_env+0x863/0xc40 [ 318.663572][T19017] ? preempt_count_add+0x4e/0x90 [ 318.668598][T19017] ? _raw_spin_unlock+0x2e/0x50 [ 318.673456][T19017] ? bd_prepare_to_claim+0x1ac/0x200 [ 318.678745][T19017] disk_force_media_change+0xe3/0x170 [ 318.684197][T19017] loop_configure+0x74d/0xf30 [ 318.688889][T19017] lo_ioctl+0x583/0x1270 [ 318.693173][T19017] ? folio_mark_dirty+0x84/0xe0 [ 318.698099][T19017] ? unlock_page+0x37/0x50 [ 318.702528][T19017] ? __rcu_read_unlock+0x5c/0x290 [ 318.707571][T19017] ? blkdev_common_ioctl+0x438/0x1180 [ 318.712978][T19017] ? selinux_file_ioctl+0x522/0x590 [ 318.718210][T19017] ? do_vfs_ioctl+0x819/0x14a0 [ 318.722982][T19017] ? lo_release+0x120/0x120 [ 318.727556][T19017] blkdev_ioctl+0x20e/0x440 [ 318.732167][T19017] ? blkdev_compat_ptr_ioctl+0x80/0x80 [ 318.738129][T19017] __se_sys_ioctl+0xcb/0x140 [ 318.743120][T19017] __x64_sys_ioctl+0x3f/0x50 [ 318.747725][T19017] do_syscall_64+0x44/0xd0 [ 318.752417][T19017] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 318.758432][T19017] RIP: 0033:0x7f1cb8affc57 [ 318.762846][T19017] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 04 54 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 318.782606][T19017] RSP: 002b:00007f1cb7c75f28 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 17:06:19 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc01000a, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000003980)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d0f465001000005fd0f4655f00000000000001000c00000010000800000000000af3010004", 0x2d, 0x11100}], 0x0, &(0x7f00000000c0)) 17:06:19 executing program 1: clock_adjtime(0x7, &(0x7f0000000000)={0x8000, 0x62, 0xff, 0x1, 0x3, 0x1ff, 0x3ff, 0x4, 0xff, 0x20, 0x6, 0x401, 0x20, 0x0, 0x1ff, 0x8000, 0xfffffffffffffffd, 0x400, 0x8, 0x100000000, 0x2, 0x8, 0xf32, 0x4, 0x6, 0x80}) clock_adjtime(0x2, &(0x7f0000000100)={0xd9, 0x9, 0x1, 0x2, 0x1f, 0x78, 0x4b1, 0x0, 0x401, 0x5, 0x8, 0x1, 0x101, 0x100000001, 0x7, 0x1fc, 0x9, 0x9, 0x0, 0x9, 0x8, 0x3, 0xff, 0x7, 0x73, 0x946c}) clock_adjtime(0x6, &(0x7f0000000200)={0x4, 0x1, 0x100, 0x6, 0x2, 0x6, 0x1, 0x1dd, 0x9, 0x1000000000000000, 0x0, 0x6, 0x1, 0x1, 0x9, 0x5, 0x3023, 0x2, 0x4, 0xfffffffffffffff9, 0x429, 0x3, 0x0, 0x9, 0xffffffffffffff05, 0x1000}) clock_adjtime(0x3, &(0x7f0000000300)={0x0, 0x8, 0x9, 0x9, 0x9, 0x9, 0x6, 0x9, 0x8, 0x1, 0xd0fc, 0x55, 0x2, 0x0, 0x1, 0x1f, 0x100000001, 0x8f44, 0x53, 0x0, 0x3, 0x140000000000, 0x9, 0x8000, 0x0, 0x10001}) r0 = syz_mount_image$iso9660(&(0x7f0000000400), &(0x7f0000000440)='./file0\x00', 0x4, 0x1, &(0x7f0000000480)=[{0xfffffffffffffffe, 0x0, 0x3}], 0x2014400, &(0x7f00000004c0)={[{@check_relaxed}, {@dmode}, {@check_relaxed}], [{@euid_lt={'euid<', 0xee01}}, {@euid_eq}, {@rootcontext={'rootcontext', 0x3d, 'staff_u'}}, {@obj_user={'obj_user', 0x3d, '#-_'}}, {@rootcontext={'rootcontext', 0x3d, 'staff_u'}}]}) faccessat(r0, &(0x7f0000000580)='./file0\x00', 0x88) clock_adjtime(0x4, &(0x7f00000005c0)={0x80000000, 0x100000000, 0xba, 0x80000000, 0x4, 0x20d4e190, 0x7, 0x400, 0x33, 0x7a, 0x1, 0x465d, 0x7f, 0x5, 0x3, 0x1, 0x0, 0x8, 0x7, 0x7ff, 0x1, 0x4, 0x3f, 0x7fff, 0x700b, 0x96}) r1 = accept$unix(0xffffffffffffffff, 0x0, &(0x7f00000006c0)) getsockname$unix(r1, &(0x7f0000000700), &(0x7f0000000780)=0x6e) clock_adjtime(0x3, &(0x7f00000007c0)={0x6, 0x6, 0x7, 0x8000, 0x7ff, 0x5c, 0x401, 0x2, 0x9, 0x4, 0x0, 0x61, 0x2, 0x9b71, 0x100000000, 0x7fffffff, 0x322, 0xc70d, 0x9, 0xd, 0x9, 0x0, 0x9, 0x1a1f00000000, 0xffffffffffffffff, 0x9}) clock_adjtime(0x6, &(0x7f00000008c0)={0x4, 0x9, 0x3, 0xfffffffffffffff7, 0xb31, 0x1, 0x1, 0x2, 0x538, 0x0, 0x401, 0x1, 0xdd, 0xfffffffffffffff7, 0xec54, 0x4, 0x100000001, 0x0, 0xa, 0x1, 0x7ff, 0xcd, 0xf2, 0x80, 0x7, 0x8000}) clock_adjtime(0x0, &(0x7f00000009c0)={0x8, 0xff, 0x81, 0x2, 0x100000001, 0x11, 0x5, 0x1, 0x1, 0x9, 0x1000, 0x8, 0xdf6c, 0x9, 0x8, 0x1004000000000000, 0x1ff, 0x3, 0x6, 0xf5, 0x80000, 0x1, 0xfffffffffffffd6d, 0x2, 0x6, 0xfa}) r2 = socket$unix(0x1, 0x5, 0x0) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f0000000ac0)={'wlan0\x00'}) mq_timedreceive(0xffffffffffffffff, &(0x7f0000000b00)=""/4096, 0x1000, 0x80, &(0x7f0000001b00)={0x0, 0x989680}) r3 = creat(&(0x7f0000001b40)='./file0\x00', 0x1) mknodat(r3, &(0x7f0000001b80)='./file1\x00', 0x4, 0x0) clock_adjtime(0x0, &(0x7f0000001bc0)={0xfff, 0x7fff, 0x0, 0x2, 0xfdc, 0x54, 0x8fa, 0x3f41, 0x0, 0x4, 0x4, 0x5, 0x101, 0x5, 0x4, 0x9, 0x9, 0x30e, 0x3f, 0x2, 0x7f, 0x7, 0x6, 0x4, 0x3ff, 0x100000000}) clock_adjtime(0x2, &(0x7f0000001cc0)={0x0, 0x6, 0x7, 0xe5, 0x5, 0x6, 0x10, 0x7, 0x281, 0x40, 0x1, 0x0, 0x1, 0x10001, 0x5, 0x100, 0x0, 0x0, 0xffffffffffffe001, 0xdf, 0x7f, 0x8000, 0x9, 0x400, 0xfffffffffffffe00, 0x3f}) [ 318.791030][T19017] RAX: ffffffffffffffda RBX: 00007f1cb8b499c8 RCX: 00007f1cb8affc57 [ 318.799142][T19017] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 318.807122][T19017] RBP: 0000000000000005 R08: 0000000000000000 R09: 00007f1cb7c761d0 [ 318.815241][T19017] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 318.823332][T19017] R13: 0000000000000004 R14: 00000000200002c0 R15: 0000000000000008 [ 318.831314][T19017] [ 318.842741][T19017] loop0: detected capacity change from 0 to 264192 [ 318.852274][T19021] loop3: detected capacity change from 0 to 264192 [ 318.859679][T19026] SELinux: duplicate or incompatible mount options [ 318.870366][T19020] EXT4-fs (loop5): VFS: Can't find ext4 filesystem 17:06:19 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc01000a, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000003980)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="80", 0x1, 0x11100}], 0x0, 0x0) 17:06:19 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc01000a, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000003980)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d0f465001000005fd0f4655f00000000000001000c00000010000800000000000af3010004", 0x2d, 0x11100}], 0x0, &(0x7f00000000c0)) 17:06:19 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc01000a, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000003980)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="80", 0x1, 0x11100}], 0x0, 0x0) [ 318.897724][T19030] SELinux: duplicate or incompatible mount options 17:06:23 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc01000a, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000003980)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="80", 0x1, 0x11100}], 0x0, 0x0) [ 318.952424][T19021] EXT4-fs warning (device loop3): read_mmp_block:107: Error -117 while reading MMP block 0 [ 318.973728][T19017] EXT4-fs warning (device loop0): ext4_enable_quotas:6363: Failed to enable quota tracking (type=0, err=-22). Please run e2fsck to fix. [ 318.990565][T19017] EXT4-fs (loop0): mount failed 17:06:23 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc01000a, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000003980)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d9", 0x4, 0x6800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d0f465001000005fd0f4655f00000000000001000c00000010000800000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}], 0x0, &(0x7f00000000c0)) (fail_nth: 33) 17:06:27 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc01000a, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000003980)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d0f465001000005fd0f4655f00000000000001000c00000010000800000000000af3010004", 0x2d, 0x11100}], 0x0, &(0x7f00000000c0)) [ 319.008405][T19041] loop4: detected capacity change from 0 to 264192 [ 319.015812][T19041] EXT4-fs (loop4): VFS: Can't find ext4 filesystem 17:06:27 executing program 1: clock_adjtime(0x7, &(0x7f0000000000)={0x8000, 0x62, 0xff, 0x1, 0x3, 0x1ff, 0x3ff, 0x4, 0xff, 0x20, 0x6, 0x401, 0x20, 0x0, 0x1ff, 0x8000, 0xfffffffffffffffd, 0x400, 0x8, 0x100000000, 0x2, 0x8, 0xf32, 0x4, 0x6, 0x80}) clock_adjtime(0x2, &(0x7f0000000100)={0xd9, 0x9, 0x1, 0x2, 0x1f, 0x78, 0x4b1, 0x0, 0x401, 0x5, 0x8, 0x1, 0x101, 0x100000001, 0x7, 0x1fc, 0x9, 0x9, 0x0, 0x9, 0x8, 0x3, 0xff, 0x7, 0x73, 0x946c}) clock_adjtime(0x6, &(0x7f0000000200)={0x4, 0x1, 0x100, 0x6, 0x2, 0x6, 0x1, 0x1dd, 0x9, 0x1000000000000000, 0x0, 0x6, 0x1, 0x1, 0x9, 0x5, 0x3023, 0x2, 0x4, 0xfffffffffffffff9, 0x429, 0x3, 0x0, 0x9, 0xffffffffffffff05, 0x1000}) clock_adjtime(0x3, &(0x7f0000000300)={0x0, 0x8, 0x9, 0x9, 0x9, 0x9, 0x6, 0x9, 0x8, 0x1, 0xd0fc, 0x55, 0x2, 0x0, 0x1, 0x1f, 0x100000001, 0x8f44, 0x53, 0x0, 0x3, 0x140000000000, 0x9, 0x8000, 0x0, 0x10001}) r0 = syz_mount_image$iso9660(&(0x7f0000000400), &(0x7f0000000440)='./file0\x00', 0x4, 0x1, &(0x7f0000000480)=[{0xfffffffffffffffe, 0x0, 0x3}], 0x2014400, &(0x7f00000004c0)={[{@check_relaxed}, {@dmode}, {@check_relaxed}], [{@euid_lt={'euid<', 0xee01}}, {@euid_eq}, {@rootcontext={'rootcontext', 0x3d, 'staff_u'}}, {@obj_user={'obj_user', 0x3d, '#-_'}}, {@rootcontext={'rootcontext', 0x3d, 'staff_u'}}]}) faccessat(r0, &(0x7f0000000580)='./file0\x00', 0x88) clock_adjtime(0x4, &(0x7f00000005c0)={0x80000000, 0x100000000, 0xba, 0x80000000, 0x4, 0x20d4e190, 0x7, 0x400, 0x33, 0x7a, 0x1, 0x465d, 0x7f, 0x5, 0x3, 0x1, 0x0, 0x8, 0x7, 0x7ff, 0x1, 0x4, 0x3f, 0x7fff, 0x700b, 0x96}) r1 = accept$unix(0xffffffffffffffff, 0x0, &(0x7f00000006c0)) getsockname$unix(r1, &(0x7f0000000700), &(0x7f0000000780)=0x6e) clock_adjtime(0x3, &(0x7f00000007c0)={0x6, 0x6, 0x7, 0x8000, 0x7ff, 0x5c, 0x401, 0x2, 0x9, 0x4, 0x0, 0x61, 0x2, 0x9b71, 0x100000000, 0x7fffffff, 0x322, 0xc70d, 0x9, 0xd, 0x9, 0x0, 0x9, 0x1a1f00000000, 0xffffffffffffffff, 0x9}) clock_adjtime(0x6, &(0x7f00000008c0)={0x4, 0x9, 0x3, 0xfffffffffffffff7, 0xb31, 0x1, 0x1, 0x2, 0x538, 0x0, 0x401, 0x1, 0xdd, 0xfffffffffffffff7, 0xec54, 0x4, 0x100000001, 0x0, 0xa, 0x1, 0x7ff, 0xcd, 0xf2, 0x80, 0x7, 0x8000}) clock_adjtime(0x0, &(0x7f00000009c0)={0x8, 0xff, 0x81, 0x2, 0x100000001, 0x11, 0x5, 0x1, 0x1, 0x9, 0x1000, 0x8, 0xdf6c, 0x9, 0x8, 0x1004000000000000, 0x1ff, 0x3, 0x6, 0xf5, 0x80000, 0x1, 0xfffffffffffffd6d, 0x2, 0x6, 0xfa}) r2 = socket$unix(0x1, 0x5, 0x0) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f0000000ac0)={'wlan0\x00'}) mq_timedreceive(0xffffffffffffffff, &(0x7f0000000b00)=""/4096, 0x1000, 0x80, &(0x7f0000001b00)={0x0, 0x989680}) r3 = creat(&(0x7f0000001b40)='./file0\x00', 0x1) mknodat(r3, &(0x7f0000001b80)='./file1\x00', 0x4, 0x0) clock_adjtime(0x0, &(0x7f0000001bc0)={0xfff, 0x7fff, 0x0, 0x2, 0xfdc, 0x54, 0x8fa, 0x3f41, 0x0, 0x4, 0x4, 0x5, 0x101, 0x5, 0x4, 0x9, 0x9, 0x30e, 0x3f, 0x2, 0x7f, 0x7, 0x6, 0x4, 0x3ff, 0x100000000}) clock_adjtime(0x2, &(0x7f0000001cc0)={0x0, 0x6, 0x7, 0xe5, 0x5, 0x6, 0x10, 0x7, 0x281, 0x40, 0x1, 0x0, 0x1, 0x10001, 0x5, 0x100, 0x0, 0x4, 0xffffffffffffe001, 0xdf, 0x7f, 0x8000, 0x9, 0x400, 0xfffffffffffffe00, 0x3f}) 17:06:27 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc01000a, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000011", 0x9, 0x4e0}, {&(0x7f0000010200)="0100000000", 0x5, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000003980)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d0f465001000005fd0f4655f00000000000001000c000000100008", 0x23, 0x11100}], 0x0, &(0x7f00000000c0)) 17:06:27 executing program 2: clock_adjtime(0x7, &(0x7f0000000000)={0x8000, 0x62, 0xff, 0x1, 0x3, 0x1ff, 0x3ff, 0x4, 0xff, 0x20, 0x6, 0x401, 0x20, 0x0, 0x1ff, 0x8000, 0xfffffffffffffffd, 0x400, 0x8, 0x100000000, 0x2, 0x8, 0xf32, 0x4, 0x6, 0x80}) clock_adjtime(0x2, &(0x7f0000000100)={0xd9, 0x9, 0x1, 0x2, 0x1f, 0x78, 0x4b1, 0x0, 0x401, 0x5, 0x8, 0x1, 0x101, 0x100000001, 0x7, 0x1fc, 0x9, 0x9, 0x0, 0x9, 0x8, 0x3, 0xff, 0x7, 0x73, 0x946c}) clock_adjtime(0x6, &(0x7f0000000200)={0x4, 0x1, 0x100, 0x6, 0x2, 0x6, 0x1, 0x1dd, 0x9, 0x1000000000000000, 0x0, 0x6, 0x1, 0x1, 0x9, 0x5, 0x3023, 0x2, 0x4, 0xfffffffffffffff9, 0x429, 0x3, 0x0, 0x9, 0xffffffffffffff05, 0x1000}) clock_adjtime(0x3, &(0x7f0000000300)={0x0, 0x8, 0x9, 0x9, 0x9, 0x9, 0x6, 0x9, 0x8, 0x1, 0xd0fc, 0x55, 0x2, 0x0, 0x1, 0x1f, 0x100000001, 0x8f44, 0x53, 0x0, 0x3, 0x140000000000, 0x9, 0x8000, 0x0, 0x10001}) r0 = syz_mount_image$iso9660(&(0x7f0000000400), &(0x7f0000000440)='./file0\x00', 0x4, 0x1, &(0x7f0000000480)=[{0xfffffffffffffffe, 0x0, 0x3}], 0x2014400, &(0x7f00000004c0)={[{@check_relaxed}, {@dmode}, {@check_relaxed}], [{@euid_lt={'euid<', 0xee01}}, {@euid_eq}, {@rootcontext={'rootcontext', 0x3d, 'staff_u'}}, {@obj_user={'obj_user', 0x3d, '#-_'}}, {@rootcontext={'rootcontext', 0x3d, 'staff_u'}}]}) faccessat(r0, &(0x7f0000000580)='./file0\x00', 0x88) clock_adjtime(0x4, &(0x7f00000005c0)={0x80000000, 0x100000000, 0xba, 0x80000000, 0x4, 0x20d4e190, 0x7, 0x400, 0x33, 0x7a, 0x1, 0x465d, 0x7f, 0x5, 0x3, 0x1, 0x0, 0x8, 0x7, 0x7ff, 0x1, 0x4, 0x3f, 0x7fff, 0x700b, 0x96}) r1 = accept$unix(0xffffffffffffffff, 0x0, &(0x7f00000006c0)) getsockname$unix(r1, &(0x7f0000000700), &(0x7f0000000780)=0x6e) clock_adjtime(0x3, &(0x7f00000007c0)={0x6, 0x6, 0x7, 0x8000, 0x7ff, 0x5c, 0x401, 0x2, 0x9, 0x4, 0x0, 0x61, 0x2, 0x9b71, 0x100000000, 0x7fffffff, 0x322, 0xc70d, 0x9, 0xd, 0x9, 0x0, 0x9, 0x1a1f00000000, 0xffffffffffffffff, 0x9}) clock_adjtime(0x6, &(0x7f00000008c0)={0x4, 0x9, 0x3, 0xfffffffffffffff7, 0xb31, 0x1, 0x1, 0x2, 0x538, 0x0, 0x401, 0x1, 0xdd, 0xfffffffffffffff7, 0xec54, 0x4, 0x100000001, 0x0, 0xa, 0x1, 0x7ff, 0xcd, 0xf2, 0x80, 0x7, 0x8000}) clock_adjtime(0x0, &(0x7f00000009c0)={0x8, 0xff, 0x81, 0x2, 0x100000001, 0x11, 0x5, 0x1, 0x1, 0x9, 0x1000, 0x8, 0xdf6c, 0x9, 0x8, 0x1004000000000000, 0x1ff, 0x3, 0x6, 0xf5, 0x80000, 0x1, 0xfffffffffffffd6d, 0x2, 0x6, 0xfa}) r2 = socket$unix(0x1, 0x5, 0x0) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f0000000ac0)={'wlan0\x00'}) mq_timedreceive(0xffffffffffffffff, &(0x7f0000000b00)=""/4096, 0x1000, 0x80, &(0x7f0000001b00)={0x0, 0x989680}) r3 = creat(&(0x7f0000001b40)='./file0\x00', 0x1) mknodat(r3, &(0x7f0000001b80)='./file1\x00', 0x4, 0x0) clock_adjtime(0x0, &(0x7f0000001bc0)={0xfff, 0x7fff, 0x0, 0x2, 0xfdc, 0x54, 0x8fa, 0x3f41, 0x0, 0x4, 0x4, 0x5, 0x101, 0x5, 0x4, 0x9, 0x9, 0x30e, 0x3f, 0x2, 0x7f, 0x7, 0x6, 0x4, 0x3ff, 0x100000000}) clock_adjtime(0x2, &(0x7f0000001cc0)={0x0, 0x6, 0x7, 0xe5, 0x5, 0x6, 0x10, 0x7, 0x281, 0x40, 0x1, 0x0, 0x1, 0x10001, 0x5, 0x100, 0x0, 0x4, 0xffffffffffffe001, 0xdf, 0x7f, 0x8000, 0x9, 0x400, 0xfffffffffffffe00}) 17:06:27 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc01000a, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000003980)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d0f465001000005fd0f4655f00000000000001000c00000010000800000000000af3010004", 0x2d, 0x11100}], 0x0, 0x0) [ 319.052135][T19048] loop5: detected capacity change from 0 to 264192 [ 319.087352][T19052] SELinux: duplicate or incompatible mount options [ 319.109196][T19044] FAULT_INJECTION: forcing a failure. [ 319.109196][T19044] name failslab, interval 1, probability 0, space 0, times 0 [ 319.122035][T19044] CPU: 1 PID: 19044 Comm: syz-executor.0 Not tainted 5.16.0-syzkaller #0 [ 319.130468][T19044] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 319.140623][T19044] Call Trace: [ 319.143982][T19044] [ 319.146905][T19044] dump_stack_lvl+0xd6/0x122 [ 319.151492][T19044] dump_stack+0x11/0x1b [ 319.155650][T19044] should_fail+0x23c/0x250 [ 319.160076][T19044] __should_failslab+0x81/0x90 [ 319.165014][T19044] should_failslab+0x5/0x20 [ 319.169509][T19044] kmem_cache_alloc_node_trace+0x61/0x310 [ 319.175382][T19044] ? __kmalloc_node_track_caller+0x30/0x40 [ 319.181185][T19044] __kmalloc_node_track_caller+0x30/0x40 [ 319.186836][T19044] ? alloc_uevent_skb+0x5b/0x120 [ 319.191767][T19044] __alloc_skb+0x19d/0x450 [ 319.196189][T19044] alloc_uevent_skb+0x5b/0x120 [ 319.200949][T19044] kobject_uevent_env+0x863/0xc40 [ 319.206058][T19044] ? preempt_count_add+0x4e/0x90 [ 319.211045][T19044] ? _raw_spin_unlock+0x2e/0x50 [ 319.215924][T19044] ? bd_prepare_to_claim+0x1ac/0x200 [ 319.221199][T19044] disk_force_media_change+0xe3/0x170 [ 319.226596][T19044] loop_configure+0x74d/0xf30 [ 319.231362][T19044] lo_ioctl+0x583/0x1270 [ 319.235691][T19044] ? folio_mark_dirty+0x84/0xe0 [ 319.240570][T19044] ? unlock_page+0x37/0x50 [ 319.244975][T19044] ? __rcu_read_unlock+0x5c/0x290 [ 319.250012][T19044] ? blkdev_common_ioctl+0x438/0x1180 [ 319.255376][T19044] ? selinux_file_ioctl+0x522/0x590 [ 319.260564][T19044] ? do_vfs_ioctl+0x819/0x14a0 [ 319.265395][T19044] ? lo_release+0x120/0x120 [ 319.269963][T19044] blkdev_ioctl+0x20e/0x440 [ 319.274457][T19044] ? blkdev_compat_ptr_ioctl+0x80/0x80 [ 319.279903][T19044] __se_sys_ioctl+0xcb/0x140 [ 319.284491][T19044] __x64_sys_ioctl+0x3f/0x50 [ 319.289139][T19044] do_syscall_64+0x44/0xd0 [ 319.293563][T19044] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 319.299592][T19044] RIP: 0033:0x7f1cb8affc57 [ 319.304011][T19044] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 04 54 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 319.323605][T19044] RSP: 002b:00007f1cb7c75f28 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 319.332006][T19044] RAX: ffffffffffffffda RBX: 00007f1cb8b499c8 RCX: 00007f1cb8affc57 [ 319.339966][T19044] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 319.347927][T19044] RBP: 0000000000000005 R08: 0000000000000000 R09: 00007f1cb7c761d0 17:06:27 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc01000a, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000003980)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="80", 0x1, 0x11100}], 0x0, &(0x7f00000000c0)) (fail_nth: 1) [ 319.355943][T19044] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 319.363994][T19044] R13: 0000000000000004 R14: 00000000200002c0 R15: 0000000000000008 [ 319.371958][T19044] [ 319.376007][T19044] loop0: detected capacity change from 0 to 264192 [ 319.389319][T19056] SELinux: duplicate or incompatible mount options [ 319.394179][T19054] loop3: detected capacity change from 0 to 264192 [ 319.407380][T19063] FAULT_INJECTION: forcing a failure. [ 319.407380][T19063] name failslab, interval 1, probability 0, space 0, times 0 [ 319.418840][T19054] EXT4-fs warning (device loop3): read_mmp_block:107: Error -117 while reading MMP block 0 [ 319.420057][T19063] CPU: 0 PID: 19063 Comm: syz-executor.5 Not tainted 5.16.0-syzkaller #0 [ 319.438391][T19063] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 319.448455][T19063] Call Trace: [ 319.451744][T19063] [ 319.454674][T19063] dump_stack_lvl+0xd6/0x122 [ 319.459280][T19063] dump_stack+0x11/0x1b [ 319.463500][T19063] should_fail+0x23c/0x250 [ 319.467920][T19063] ? __se_sys_memfd_create+0xe9/0x350 [ 319.470292][T19044] EXT4-fs warning (device loop0): ext4_enable_quotas:6363: Failed to enable quota tracking (type=0, err=-22). Please run e2fsck to fix. [ 319.473301][T19063] __should_failslab+0x81/0x90 [ 319.487819][T19044] EXT4-fs (loop0): mount failed [ 319.491934][T19063] should_failslab+0x5/0x20 [ 319.491961][T19063] __kmalloc+0x6f/0x370 [ 319.491980][T19063] ? strnlen_user+0x137/0x1c0 [ 319.498238][T19066] loop4: detected capacity change from 0 to 264192 [ 319.501312][T19063] __se_sys_memfd_create+0xe9/0x350 [ 319.521809][T19063] __x64_sys_memfd_create+0x2d/0x40 [ 319.527063][T19063] do_syscall_64+0x44/0xd0 [ 319.531511][T19063] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 319.537491][T19063] RIP: 0033:0x7fb452582e99 17:06:35 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc01000a, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000003980)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d0f465001000005fd0f4655f00000000000001", 0x1b, 0x11100}], 0x0, &(0x7f00000000c0)) (fail_nth: 1) 17:06:35 executing program 2: clock_adjtime(0x7, &(0x7f0000000000)={0x8000, 0x62, 0xff, 0x1, 0x3, 0x1ff, 0x3ff, 0x4, 0xff, 0x20, 0x6, 0x401, 0x20, 0x0, 0x1ff, 0x8000, 0xfffffffffffffffd, 0x400, 0x8, 0x100000000, 0x2, 0x8, 0xf32, 0x4, 0x6, 0x80}) clock_adjtime(0x2, &(0x7f0000000100)={0xd9, 0x9, 0x1, 0x2, 0x1f, 0x78, 0x4b1, 0x0, 0x401, 0x5, 0x8, 0x1, 0x101, 0x100000001, 0x7, 0x1fc, 0x9, 0x9, 0x0, 0x9, 0x8, 0x3, 0xff, 0x7, 0x73, 0x946c}) clock_adjtime(0x6, &(0x7f0000000200)={0x4, 0x1, 0x100, 0x6, 0x2, 0x6, 0x1, 0x1dd, 0x9, 0x1000000000000000, 0x0, 0x6, 0x1, 0x1, 0x9, 0x5, 0x3023, 0x2, 0x4, 0xfffffffffffffff9, 0x429, 0x3, 0x0, 0x9, 0xffffffffffffff05, 0x1000}) clock_adjtime(0x3, &(0x7f0000000300)={0x0, 0x8, 0x9, 0x9, 0x9, 0x9, 0x6, 0x9, 0x8, 0x1, 0xd0fc, 0x55, 0x2, 0x0, 0x1, 0x1f, 0x100000001, 0x8f44, 0x53, 0x0, 0x3, 0x140000000000, 0x9, 0x8000, 0x0, 0x10001}) r0 = syz_mount_image$iso9660(&(0x7f0000000400), &(0x7f0000000440)='./file0\x00', 0x4, 0x1, &(0x7f0000000480)=[{0xfffffffffffffffe, 0x0, 0x3}], 0x2014400, &(0x7f00000004c0)={[{@check_relaxed}, {@dmode}, {@check_relaxed}], [{@euid_lt={'euid<', 0xee01}}, {@euid_eq}, {@rootcontext={'rootcontext', 0x3d, 'staff_u'}}, {@obj_user={'obj_user', 0x3d, '#-_'}}, {@rootcontext={'rootcontext', 0x3d, 'staff_u'}}]}) faccessat(r0, &(0x7f0000000580)='./file0\x00', 0x88) clock_adjtime(0x4, &(0x7f00000005c0)={0x80000000, 0x100000000, 0xba, 0x80000000, 0x4, 0x20d4e190, 0x7, 0x400, 0x33, 0x7a, 0x1, 0x465d, 0x7f, 0x5, 0x3, 0x1, 0x0, 0x8, 0x7, 0x7ff, 0x1, 0x4, 0x3f, 0x7fff, 0x700b, 0x96}) r1 = accept$unix(0xffffffffffffffff, 0x0, &(0x7f00000006c0)) getsockname$unix(r1, &(0x7f0000000700), &(0x7f0000000780)=0x6e) clock_adjtime(0x3, &(0x7f00000007c0)={0x6, 0x6, 0x7, 0x8000, 0x7ff, 0x5c, 0x401, 0x2, 0x9, 0x4, 0x0, 0x61, 0x2, 0x9b71, 0x100000000, 0x7fffffff, 0x322, 0xc70d, 0x9, 0xd, 0x9, 0x0, 0x9, 0x1a1f00000000, 0xffffffffffffffff, 0x9}) clock_adjtime(0x6, &(0x7f00000008c0)={0x4, 0x9, 0x3, 0xfffffffffffffff7, 0xb31, 0x1, 0x1, 0x2, 0x538, 0x0, 0x401, 0x1, 0xdd, 0xfffffffffffffff7, 0xec54, 0x4, 0x100000001, 0x0, 0xa, 0x1, 0x7ff, 0xcd, 0xf2, 0x80, 0x7, 0x8000}) clock_adjtime(0x0, &(0x7f00000009c0)={0x8, 0xff, 0x81, 0x2, 0x100000001, 0x11, 0x5, 0x1, 0x1, 0x9, 0x1000, 0x8, 0xdf6c, 0x9, 0x8, 0x1004000000000000, 0x1ff, 0x3, 0x6, 0xf5, 0x80000, 0x1, 0xfffffffffffffd6d, 0x2, 0x6, 0xfa}) r2 = socket$unix(0x1, 0x5, 0x0) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f0000000ac0)={'wlan0\x00'}) mq_timedreceive(0xffffffffffffffff, &(0x7f0000000b00)=""/4096, 0x1000, 0x80, &(0x7f0000001b00)={0x0, 0x989680}) r3 = creat(&(0x7f0000001b40)='./file0\x00', 0x1) mknodat(r3, &(0x7f0000001b80)='./file1\x00', 0x4, 0x0) clock_adjtime(0x0, &(0x7f0000001bc0)={0xfff, 0x7fff, 0x0, 0x2, 0xfdc, 0x54, 0x8fa, 0x3f41, 0x0, 0x4, 0x4, 0x5, 0x101, 0x5, 0x4, 0x9, 0x9, 0x30e, 0x3f, 0x2, 0x7f, 0x7, 0x6, 0x4, 0x3ff, 0x100000000}) (fail_nth: 1) clock_adjtime(0x2, &(0x7f0000001cc0)={0x0, 0x6, 0x7, 0xe5, 0x5, 0x6, 0x10, 0x7, 0x281, 0x40, 0x1, 0x0, 0x1, 0x10001, 0x5, 0x100, 0x0, 0x4, 0xffffffffffffe001, 0xdf, 0x7f, 0x8000, 0x9, 0x400, 0xfffffffffffffe00, 0x3f}) [ 319.541910][T19063] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 319.550195][T19074] SELinux: duplicate or incompatible mount options [ 319.561539][T19063] RSP: 002b:00007fb4516f8f28 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 319.561562][T19063] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007fb452582e99 [ 319.561603][T19063] RDX: 0000000000022200 RSI: 0000000000000000 RDI: 00007fb4525dc168 [ 319.561616][T19063] RBP: 0000000000000007 R08: 0000000000011100 R09: 00007fb4516f91d0 [ 319.561628][T19063] R10: 0000000000000007 R11: 0000000000000246 R12: 0000000008100000 [ 319.561640][T19063] R13: 0000000020000100 R14: 0000000008100000 R15: 00000000200000c0 [ 319.561658][T19063] [ 319.567580][T19075] FAULT_INJECTION: forcing a failure. [ 319.567580][T19075] name failslab, interval 1, probability 0, space 0, times 0 [ 319.597843][T19077] FAULT_INJECTION: forcing a failure. [ 319.597843][T19077] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 319.600797][T19075] CPU: 0 PID: 19075 Comm: syz-executor.1 Not tainted 5.16.0-syzkaller #0 [ 319.654207][T19075] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 319.664540][T19075] Call Trace: [ 319.667806][T19075] [ 319.670750][T19075] dump_stack_lvl+0xd6/0x122 [ 319.675360][T19075] dump_stack+0x11/0x1b [ 319.679503][T19075] should_fail+0x23c/0x250 [ 319.683931][T19075] ? __se_sys_memfd_create+0xe9/0x350 [ 319.689302][T19075] __should_failslab+0x81/0x90 [ 319.694074][T19075] should_failslab+0x5/0x20 [ 319.698657][T19075] __kmalloc+0x6f/0x370 [ 319.702888][T19075] ? strnlen_user+0x137/0x1c0 [ 319.707625][T19075] __se_sys_memfd_create+0xe9/0x350 [ 319.712872][T19075] __x64_sys_memfd_create+0x2d/0x40 [ 319.718136][T19075] do_syscall_64+0x44/0xd0 [ 319.722576][T19075] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 319.728460][T19075] RIP: 0033:0x7f02285c1e99 [ 319.732905][T19075] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 319.752629][T19075] RSP: 002b:00007f0227737f28 EFLAGS: 00000246 ORIG_RAX: 000000000000013f 17:06:35 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc01000a, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000003980)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="80", 0x1, 0x11100}], 0x0, &(0x7f00000000c0)) (fail_nth: 2) [ 319.761029][T19075] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007f02285c1e99 [ 319.768990][T19075] RDX: 0000000000022200 RSI: 0000000000000000 RDI: 00007f022861b168 [ 319.776958][T19075] RBP: 0000000000000007 R08: 0000000000011100 R09: 00007f02277381d0 [ 319.785820][T19075] R10: 0000000000000007 R11: 0000000000000246 R12: 0000000008100000 [ 319.793780][T19075] R13: 0000000020000100 R14: 0000000008100000 R15: 00000000200000c0 [ 319.801742][T19075] [ 319.804802][T19077] CPU: 1 PID: 19077 Comm: syz-executor.5 Not tainted 5.16.0-syzkaller #0 [ 319.813228][T19077] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 319.823299][T19077] Call Trace: [ 319.826579][T19077] [ 319.829512][T19077] dump_stack_lvl+0xd6/0x122 [ 319.834191][T19077] dump_stack+0x11/0x1b [ 319.838421][T19077] should_fail+0x23c/0x250 [ 319.838631][T19078] FAULT_INJECTION: forcing a failure. [ 319.838631][T19078] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 319.842842][T19077] should_fail_usercopy+0x16/0x20 [ 319.842885][T19077] _copy_from_user+0x1c/0xd0 [ 319.865723][T19077] __se_sys_memfd_create+0x125/0x350 [ 319.871097][T19077] __x64_sys_memfd_create+0x2d/0x40 [ 319.876298][T19077] do_syscall_64+0x44/0xd0 [ 319.880769][T19077] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 319.886752][T19077] RIP: 0033:0x7fb452582e99 [ 319.891170][T19077] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 319.910765][T19077] RSP: 002b:00007fb4516f8f28 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 319.919164][T19077] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007fb452582e99 [ 319.927220][T19077] RDX: 0000000000022200 RSI: 0000000000000000 RDI: 00007fb4525dc168 [ 319.935186][T19077] RBP: 0000000000000007 R08: 0000000000011100 R09: 00007fb4516f91d0 [ 319.943146][T19077] R10: 0000000000000007 R11: 0000000000000246 R12: 0000000008100000 [ 319.951138][T19077] R13: 0000000020000100 R14: 0000000008100000 R15: 00000000200000c0 [ 319.959104][T19077] [ 319.962156][T19078] CPU: 0 PID: 19078 Comm: syz-executor.2 Not tainted 5.16.0-syzkaller #0 [ 319.970574][T19078] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 319.980631][T19078] Call Trace: [ 319.983946][T19078] [ 319.986881][T19078] dump_stack_lvl+0xd6/0x122 [ 319.991504][T19078] dump_stack+0x11/0x1b [ 319.995667][T19078] should_fail+0x23c/0x250 [ 320.000162][T19078] should_fail_usercopy+0x16/0x20 [ 320.005174][T19078] _copy_from_user+0x1c/0xd0 [ 320.009763][T19078] __x64_sys_clock_adjtime+0x63/0x1d0 [ 320.015134][T19078] do_syscall_64+0x44/0xd0 [ 320.019570][T19078] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 320.025456][T19078] RIP: 0033:0x7f04e741ae99 [ 320.029874][T19078] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 320.049470][T19078] RSP: 002b:00007f04e6570168 EFLAGS: 00000246 ORIG_RAX: 0000000000000131 17:06:36 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc01000a, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000003980)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d0f465001000005fd0f4655f00000000000001", 0x1b, 0x11100}], 0x0, &(0x7f00000000c0)) (fail_nth: 2) 17:06:36 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc01000a, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000003980)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d0f465001000005fd0f4655f00000000000001000c00000010000800000000000af3010004", 0x2d, 0x11100}], 0x0, 0x0) [ 320.057869][T19078] RAX: ffffffffffffffda RBX: 00007f04e752e030 RCX: 00007f04e741ae99 [ 320.065828][T19078] RDX: 0000000000000000 RSI: 0000000020001bc0 RDI: 0000000000000000 [ 320.073786][T19078] RBP: 00007f04e65701d0 R08: 0000000000000000 R09: 0000000000000000 [ 320.081763][T19078] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 320.089751][T19078] R13: 00007ffd358dfbcf R14: 00007f04e6570300 R15: 0000000000022000 [ 320.097724][T19078] [ 320.109419][T19084] FAULT_INJECTION: forcing a failure. [ 320.109419][T19084] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 320.122581][T19084] CPU: 0 PID: 19084 Comm: syz-executor.1 Not tainted 5.16.0-syzkaller #0 [ 320.131245][T19084] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 320.141387][T19084] Call Trace: [ 320.144666][T19084] [ 320.147606][T19084] dump_stack_lvl+0xd6/0x122 [ 320.152281][T19084] dump_stack+0x11/0x1b [ 320.156523][T19084] should_fail+0x23c/0x250 [ 320.160951][T19084] should_fail_usercopy+0x16/0x20 [ 320.165987][T19084] _copy_from_user+0x1c/0xd0 [ 320.170658][T19084] __se_sys_memfd_create+0x125/0x350 [ 320.176037][T19084] __x64_sys_memfd_create+0x2d/0x40 [ 320.181270][T19084] do_syscall_64+0x44/0xd0 [ 320.185842][T19084] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 320.191777][T19084] RIP: 0033:0x7f02285c1e99 [ 320.196234][T19084] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 320.215847][T19084] RSP: 002b:00007f0227737f28 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 320.224267][T19084] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007f02285c1e99 [ 320.232328][T19084] RDX: 0000000000022200 RSI: 0000000000000000 RDI: 00007f022861b168 [ 320.240304][T19084] RBP: 0000000000000007 R08: 0000000000011100 R09: 00007f02277381d0 [ 320.248284][T19084] R10: 0000000000000007 R11: 0000000000000246 R12: 0000000008100000 [ 320.256351][T19084] R13: 0000000020000100 R14: 0000000008100000 R15: 00000000200000c0 17:06:36 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc01000a, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000003980)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d9", 0x4, 0x6800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d0f465001000005fd0f4655f00000000000001000c00000010000800000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}], 0x0, &(0x7f00000000c0)) 17:06:36 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc01000a, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000003980)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="80", 0x1, 0x11100}], 0x0, &(0x7f00000000c0)) (fail_nth: 3) 17:06:36 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc01000a, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000011", 0x9, 0x4e0}, {&(0x7f0000010200)="0100000000", 0x5, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000003980)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d0f465001000005fd0f4655f00000000000001000c000000100008", 0x23, 0x11100}], 0x0, &(0x7f00000000c0)) 17:06:36 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc01000a, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000003980)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d0f465001000005fd0f4655f00000000000001", 0x1b, 0x11100}], 0x0, &(0x7f00000000c0)) (fail_nth: 3) [ 320.264331][T19084] [ 320.272926][T19085] loop4: detected capacity change from 0 to 264192 [ 320.305286][T19088] FAULT_INJECTION: forcing a failure. [ 320.305286][T19088] name failslab, interval 1, probability 0, space 0, times 0 [ 320.318035][T19088] CPU: 0 PID: 19088 Comm: syz-executor.5 Not tainted 5.16.0-syzkaller #0 [ 320.326469][T19088] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 320.336209][T19094] loop3: detected capacity change from 0 to 264192 [ 320.336616][T19088] Call Trace: [ 320.336624][T19088] [ 320.343950][T19093] SELinux: duplicate or incompatible mount options [ 320.346436][T19088] dump_stack_lvl+0xd6/0x122 [ 320.346465][T19088] dump_stack+0x11/0x1b [ 320.364679][T19088] should_fail+0x23c/0x250 [ 320.369095][T19088] ? shmem_alloc_inode+0x22/0x30 [ 320.374105][T19088] __should_failslab+0x81/0x90 [ 320.378927][T19088] ? shmem_match+0xa0/0xa0 [ 320.383383][T19088] should_failslab+0x5/0x20 [ 320.387878][T19088] kmem_cache_alloc+0x4f/0x320 [ 320.392644][T19088] ? shmem_match+0xa0/0xa0 [ 320.397067][T19088] shmem_alloc_inode+0x22/0x30 [ 320.401908][T19088] new_inode_pseudo+0x38/0x190 [ 320.406724][T19088] new_inode+0x21/0x100 [ 320.410921][T19088] shmem_get_inode+0xb7/0x490 [ 320.415674][T19088] __shmem_file_setup+0xf1/0x1d0 [ 320.420606][T19088] shmem_file_setup+0x37/0x40 [ 320.425360][T19088] __se_sys_memfd_create+0x1c1/0x350 [ 320.430754][T19088] __x64_sys_memfd_create+0x2d/0x40 [ 320.435943][T19088] do_syscall_64+0x44/0xd0 [ 320.440352][T19088] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 320.446257][T19088] RIP: 0033:0x7fb452582e99 [ 320.450661][T19088] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 320.470464][T19088] RSP: 002b:00007fb4516f8f28 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 320.478867][T19088] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007fb452582e99 [ 320.486896][T19088] RDX: 0000000000022200 RSI: 0000000000000000 RDI: 00007fb4525dc168 [ 320.494919][T19088] RBP: 0000000000000007 R08: 0000000000011100 R09: 00007fb4516f91d0 17:06:36 executing program 2: clock_adjtime(0x7, &(0x7f0000000000)={0x8000, 0x62, 0xff, 0x1, 0x3, 0x1ff, 0x3ff, 0x4, 0xff, 0x20, 0x6, 0x401, 0x20, 0x0, 0x1ff, 0x8000, 0xfffffffffffffffd, 0x400, 0x8, 0x100000000, 0x2, 0x8, 0xf32, 0x4, 0x6, 0x80}) clock_adjtime(0x2, &(0x7f0000000100)={0xd9, 0x9, 0x1, 0x2, 0x1f, 0x78, 0x4b1, 0x0, 0x401, 0x5, 0x8, 0x1, 0x101, 0x100000001, 0x7, 0x1fc, 0x9, 0x9, 0x0, 0x9, 0x8, 0x3, 0xff, 0x7, 0x73, 0x946c}) clock_adjtime(0x6, &(0x7f0000000200)={0x4, 0x1, 0x100, 0x6, 0x2, 0x6, 0x1, 0x1dd, 0x9, 0x1000000000000000, 0x0, 0x6, 0x1, 0x1, 0x9, 0x5, 0x3023, 0x2, 0x4, 0xfffffffffffffff9, 0x429, 0x3, 0x0, 0x9, 0xffffffffffffff05, 0x1000}) clock_adjtime(0x3, &(0x7f0000000300)={0x0, 0x8, 0x9, 0x9, 0x9, 0x9, 0x6, 0x9, 0x8, 0x1, 0xd0fc, 0x55, 0x2, 0x0, 0x1, 0x1f, 0x100000001, 0x8f44, 0x53, 0x0, 0x3, 0x140000000000, 0x9, 0x8000, 0x0, 0x10001}) r0 = syz_mount_image$iso9660(&(0x7f0000000400), &(0x7f0000000440)='./file0\x00', 0x4, 0x1, &(0x7f0000000480)=[{0xfffffffffffffffe, 0x0, 0x3}], 0x2014400, &(0x7f00000004c0)={[{@check_relaxed}, {@dmode}, {@check_relaxed}], [{@euid_lt={'euid<', 0xee01}}, {@euid_eq}, {@rootcontext={'rootcontext', 0x3d, 'staff_u'}}, {@obj_user={'obj_user', 0x3d, '#-_'}}, {@rootcontext={'rootcontext', 0x3d, 'staff_u'}}]}) faccessat(r0, &(0x7f0000000580)='./file0\x00', 0x88) clock_adjtime(0x4, &(0x7f00000005c0)={0x80000000, 0x100000000, 0xba, 0x80000000, 0x4, 0x20d4e190, 0x7, 0x400, 0x33, 0x7a, 0x1, 0x465d, 0x7f, 0x5, 0x3, 0x1, 0x0, 0x8, 0x7, 0x7ff, 0x1, 0x4, 0x3f, 0x7fff, 0x700b, 0x96}) r1 = accept$unix(0xffffffffffffffff, 0x0, &(0x7f00000006c0)) getsockname$unix(r1, &(0x7f0000000700), &(0x7f0000000780)=0x6e) clock_adjtime(0x3, &(0x7f00000007c0)={0x6, 0x6, 0x7, 0x8000, 0x7ff, 0x5c, 0x401, 0x2, 0x9, 0x4, 0x0, 0x61, 0x2, 0x9b71, 0x100000000, 0x7fffffff, 0x322, 0xc70d, 0x9, 0xd, 0x9, 0x0, 0x9, 0x1a1f00000000, 0xffffffffffffffff, 0x9}) clock_adjtime(0x6, &(0x7f00000008c0)={0x4, 0x9, 0x3, 0xfffffffffffffff7, 0xb31, 0x1, 0x1, 0x2, 0x538, 0x0, 0x401, 0x1, 0xdd, 0xfffffffffffffff7, 0xec54, 0x4, 0x100000001, 0x0, 0xa, 0x1, 0x7ff, 0xcd, 0xf2, 0x80, 0x7, 0x8000}) clock_adjtime(0x0, &(0x7f00000009c0)={0x8, 0xff, 0x81, 0x2, 0x100000001, 0x11, 0x5, 0x1, 0x1, 0x9, 0x1000, 0x8, 0xdf6c, 0x9, 0x8, 0x1004000000000000, 0x1ff, 0x3, 0x6, 0xf5, 0x80000, 0x1, 0xfffffffffffffd6d, 0x2, 0x6, 0xfa}) r2 = socket$unix(0x1, 0x5, 0x0) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f0000000ac0)={'wlan0\x00'}) mq_timedreceive(0xffffffffffffffff, &(0x7f0000000b00)=""/4096, 0x1000, 0x80, &(0x7f0000001b00)={0x0, 0x989680}) r3 = creat(&(0x7f0000001b40)='./file0\x00', 0x1) mknodat(r3, &(0x7f0000001b80)='./file1\x00', 0x4, 0x0) clock_adjtime(0x0, &(0x7f0000001bc0)={0xfff, 0x7fff, 0x0, 0x2, 0xfdc, 0x54, 0x8fa, 0x3f41, 0x0, 0x4, 0x4, 0x5, 0x101, 0x5, 0x4, 0x9, 0x9, 0x30e, 0x3f, 0x2, 0x7f, 0x7, 0x6, 0x4, 0x3ff, 0x100000000}) (fail_nth: 2) clock_adjtime(0x2, &(0x7f0000001cc0)={0x0, 0x6, 0x7, 0xe5, 0x5, 0x6, 0x10, 0x7, 0x281, 0x40, 0x1, 0x0, 0x1, 0x10001, 0x5, 0x100, 0x0, 0x4, 0xffffffffffffe001, 0xdf, 0x7f, 0x8000, 0x9, 0x400, 0xfffffffffffffe00, 0x3f}) [ 320.502954][T19088] R10: 0000000000000007 R11: 0000000000000246 R12: 0000000008100000 [ 320.510916][T19088] R13: 0000000020000100 R14: 0000000008100000 R15: 00000000200000c0 [ 320.518876][T19088] [ 320.522402][T19090] loop0: detected capacity change from 0 to 264192 [ 320.523755][T19094] EXT4-fs warning (device loop3): read_mmp_block:107: Error -117 while reading MMP block 0 [ 320.537126][T19097] FAULT_INJECTION: forcing a failure. [ 320.537126][T19097] name failslab, interval 1, probability 0, space 0, times 0 17:06:36 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc01000a, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000011", 0x9, 0x4e0}, {&(0x7f0000010200)="01000000000005", 0x7, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000003980)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d0f465001000005fd0f4655f00000000000001000c000000100008", 0x23, 0x11100}], 0x0, &(0x7f00000000c0)) 17:06:36 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc01000a, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000003980)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="80", 0x1, 0x11100}], 0x0, &(0x7f00000000c0)) (fail_nth: 4) [ 320.551741][T19097] CPU: 0 PID: 19097 Comm: syz-executor.1 Not tainted 5.16.0-syzkaller #0 [ 320.560233][T19097] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 320.570292][T19097] Call Trace: [ 320.573582][T19097] [ 320.573866][T19098] FAULT_INJECTION: forcing a failure. [ 320.573866][T19098] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 320.576509][T19097] dump_stack_lvl+0xd6/0x122 [ 320.594581][T19097] dump_stack+0x11/0x1b [ 320.598780][T19097] should_fail+0x23c/0x250 [ 320.603227][T19097] ? shmem_alloc_inode+0x22/0x30 [ 320.608236][T19097] __should_failslab+0x81/0x90 [ 320.612999][T19097] ? shmem_match+0xa0/0xa0 [ 320.617408][T19097] should_failslab+0x5/0x20 [ 320.621928][T19097] kmem_cache_alloc+0x4f/0x320 [ 320.626746][T19097] ? shmem_match+0xa0/0xa0 [ 320.631152][T19097] shmem_alloc_inode+0x22/0x30 [ 320.635906][T19097] new_inode_pseudo+0x38/0x190 [ 320.640660][T19097] new_inode+0x21/0x100 [ 320.644805][T19097] shmem_get_inode+0xb7/0x490 [ 320.649473][T19097] __shmem_file_setup+0xf1/0x1d0 [ 320.654452][T19097] shmem_file_setup+0x37/0x40 [ 320.659154][T19097] __se_sys_memfd_create+0x1c1/0x350 [ 320.664652][T19097] __x64_sys_memfd_create+0x2d/0x40 [ 320.669839][T19097] do_syscall_64+0x44/0xd0 [ 320.674337][T19097] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 320.680224][T19097] RIP: 0033:0x7f02285c1e99 [ 320.684640][T19097] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 320.704301][T19097] RSP: 002b:00007f0227737f28 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 320.712763][T19097] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007f02285c1e99 [ 320.720762][T19097] RDX: 0000000000022200 RSI: 0000000000000000 RDI: 00007f022861b168 [ 320.728958][T19097] RBP: 0000000000000007 R08: 0000000000011100 R09: 00007f02277381d0 [ 320.736948][T19097] R10: 0000000000000007 R11: 0000000000000246 R12: 0000000008100000 [ 320.744918][T19097] R13: 0000000020000100 R14: 0000000008100000 R15: 00000000200000c0 [ 320.753145][T19097] [ 320.756152][T19098] CPU: 1 PID: 19098 Comm: syz-executor.2 Not tainted 5.16.0-syzkaller #0 [ 320.764704][T19098] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 320.774936][T19098] Call Trace: [ 320.778304][T19098] [ 320.781307][T19098] dump_stack_lvl+0xd6/0x122 [ 320.785944][T19098] dump_stack+0x11/0x1b [ 320.789550][T19104] FAULT_INJECTION: forcing a failure. [ 320.789550][T19104] name failslab, interval 1, probability 0, space 0, times 0 [ 320.790150][T19098] should_fail+0x23c/0x250 [ 320.790172][T19098] should_fail_usercopy+0x16/0x20 [ 320.812225][T19098] _copy_to_user+0x1c/0x90 [ 320.816643][T19098] __x64_sys_clock_adjtime+0x160/0x1d0 [ 320.822107][T19098] do_syscall_64+0x44/0xd0 [ 320.826519][T19098] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 320.832414][T19098] RIP: 0033:0x7f04e741ae99 [ 320.836819][T19098] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 320.856501][T19098] RSP: 002b:00007f04e654f168 EFLAGS: 00000246 ORIG_RAX: 0000000000000131 [ 320.864923][T19098] RAX: ffffffffffffffda RBX: 00007f04e752e100 RCX: 00007f04e741ae99 [ 320.873003][T19098] RDX: 0000000000000000 RSI: 0000000020001bc0 RDI: 0000000000000000 [ 320.881096][T19098] RBP: 00007f04e654f1d0 R08: 0000000000000000 R09: 0000000000000000 [ 320.889151][T19098] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 320.897294][T19098] R13: 00007ffd358dfbcf R14: 00007f04e654f300 R15: 0000000000022000 17:06:41 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc01000a, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000003980)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d0f465001000005fd0f4655f00000000000001", 0x1b, 0x11100}], 0x0, &(0x7f00000000c0)) (fail_nth: 4) 17:06:41 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc01000a, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000003980)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d0f465001000005fd0f4655f00000000000001000c00000010000800000000000af3010004", 0x2d, 0x11100}], 0x0, 0x0) [ 320.905307][T19098] [ 320.908383][T19104] CPU: 0 PID: 19104 Comm: syz-executor.1 Not tainted 5.16.0-syzkaller #0 [ 320.917045][T19104] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 320.927162][T19104] Call Trace: [ 320.930468][T19104] [ 320.933444][T19104] dump_stack_lvl+0xd6/0x122 [ 320.938047][T19104] dump_stack+0x11/0x1b [ 320.942189][T19104] should_fail+0x23c/0x250 [ 320.946595][T19104] ? security_inode_alloc+0x30/0x180 [ 320.951875][T19104] __should_failslab+0x81/0x90 [ 320.956629][T19104] should_failslab+0x5/0x20 [ 320.961228][T19104] kmem_cache_alloc+0x4f/0x320 [ 320.965988][T19104] security_inode_alloc+0x30/0x180 [ 320.971086][T19104] inode_init_always+0x214/0x3e0 [ 320.976041][T19104] ? shmem_match+0xa0/0xa0 [ 320.980446][T19104] new_inode_pseudo+0x6f/0x190 [ 320.985201][T19104] new_inode+0x21/0x100 [ 320.989466][T19104] shmem_get_inode+0xb7/0x490 [ 320.994131][T19104] __shmem_file_setup+0xf1/0x1d0 [ 320.999061][T19104] shmem_file_setup+0x37/0x40 [ 321.003794][T19104] __se_sys_memfd_create+0x1c1/0x350 [ 321.009108][T19104] __x64_sys_memfd_create+0x2d/0x40 [ 321.014311][T19104] do_syscall_64+0x44/0xd0 [ 321.018769][T19104] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 321.024660][T19104] RIP: 0033:0x7f02285c1e99 [ 321.029094][T19104] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 321.048687][T19104] RSP: 002b:00007f0227737f28 EFLAGS: 00000246 ORIG_RAX: 000000000000013f 17:06:41 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc01000a, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000011", 0x9, 0x4e0}, {&(0x7f0000010200)="01000000000005", 0x7, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000003980)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d0f465001000005fd0f4655f00000000000001000c000000100008", 0x23, 0x11100}], 0x0, &(0x7f00000000c0)) [ 321.057161][T19104] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007f02285c1e99 [ 321.065241][T19104] RDX: 0000000000022200 RSI: 0000000000000000 RDI: 00007f022861b168 [ 321.073200][T19104] RBP: 0000000000000007 R08: 0000000000011100 R09: 00007f02277381d0 [ 321.081261][T19104] R10: 0000000000000007 R11: 0000000000000246 R12: 0000000008100000 [ 321.089219][T19104] R13: 0000000020000100 R14: 0000000008100000 R15: 00000000200000c0 [ 321.097251][T19104] [ 321.100628][T19105] FAULT_INJECTION: forcing a failure. 17:06:41 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc01000a, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000003980)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d0f465001000005fd0f4655f00000000000001", 0x1b, 0x11100}], 0x0, &(0x7f00000000c0)) (fail_nth: 5) [ 321.100628][T19105] name failslab, interval 1, probability 0, space 0, times 0 [ 321.113393][T19105] CPU: 0 PID: 19105 Comm: syz-executor.5 Not tainted 5.16.0-syzkaller #0 [ 321.121875][T19105] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 321.131941][T19105] Call Trace: [ 321.135221][T19105] [ 321.138167][T19105] dump_stack_lvl+0xd6/0x122 [ 321.142805][T19105] dump_stack+0x11/0x1b [ 321.145303][T19090] EXT4-fs warning (device loop0): ext4_multi_mount_protect:385: Unable to create kmmpd thread for loop0. [ 321.146968][T19105] should_fail+0x23c/0x250 [ 321.162686][T19105] ? security_inode_alloc+0x30/0x180 [ 321.168025][T19105] __should_failslab+0x81/0x90 [ 321.173070][T19105] should_failslab+0x5/0x20 [ 321.177685][T19105] kmem_cache_alloc+0x4f/0x320 [ 321.182467][T19105] security_inode_alloc+0x30/0x180 [ 321.187262][T19111] FAULT_INJECTION: forcing a failure. [ 321.187262][T19111] name failslab, interval 1, probability 0, space 0, times 0 [ 321.187588][T19105] inode_init_always+0x214/0x3e0 [ 321.187614][T19105] ? shmem_match+0xa0/0xa0 [ 321.209535][T19105] new_inode_pseudo+0x6f/0x190 [ 321.214299][T19105] new_inode+0x21/0x100 [ 321.218443][T19105] shmem_get_inode+0xb7/0x490 [ 321.223230][T19105] __shmem_file_setup+0xf1/0x1d0 [ 321.228174][T19105] shmem_file_setup+0x37/0x40 [ 321.232915][T19105] __se_sys_memfd_create+0x1c1/0x350 [ 321.238352][T19105] __x64_sys_memfd_create+0x2d/0x40 [ 321.243617][T19105] do_syscall_64+0x44/0xd0 [ 321.248101][T19105] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 321.254052][T19105] RIP: 0033:0x7fb452582e99 [ 321.258465][T19105] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 321.278254][T19105] RSP: 002b:00007fb4516f8f28 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 321.286666][T19105] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007fb452582e99 [ 321.294884][T19105] RDX: 0000000000022200 RSI: 0000000000000000 RDI: 00007fb4525dc168 17:06:41 executing program 2: clock_adjtime(0x7, &(0x7f0000000000)={0x8000, 0x62, 0xff, 0x1, 0x3, 0x1ff, 0x3ff, 0x4, 0xff, 0x20, 0x6, 0x401, 0x20, 0x0, 0x1ff, 0x8000, 0xfffffffffffffffd, 0x400, 0x8, 0x100000000, 0x2, 0x8, 0xf32, 0x4, 0x6, 0x80}) clock_adjtime(0x2, &(0x7f0000000100)={0xd9, 0x9, 0x1, 0x2, 0x1f, 0x78, 0x4b1, 0x0, 0x401, 0x5, 0x8, 0x1, 0x101, 0x100000001, 0x7, 0x1fc, 0x9, 0x9, 0x0, 0x9, 0x8, 0x3, 0xff, 0x7, 0x73, 0x946c}) clock_adjtime(0x6, &(0x7f0000000200)={0x4, 0x1, 0x100, 0x6, 0x2, 0x6, 0x1, 0x1dd, 0x9, 0x1000000000000000, 0x0, 0x6, 0x1, 0x1, 0x9, 0x5, 0x3023, 0x2, 0x4, 0xfffffffffffffff9, 0x429, 0x3, 0x0, 0x9, 0xffffffffffffff05, 0x1000}) clock_adjtime(0x3, &(0x7f0000000300)={0x0, 0x8, 0x9, 0x9, 0x9, 0x9, 0x6, 0x9, 0x8, 0x1, 0xd0fc, 0x55, 0x2, 0x0, 0x1, 0x1f, 0x100000001, 0x8f44, 0x53, 0x0, 0x3, 0x140000000000, 0x9, 0x8000, 0x0, 0x10001}) r0 = syz_mount_image$iso9660(&(0x7f0000000400), &(0x7f0000000440)='./file0\x00', 0x4, 0x1, &(0x7f0000000480)=[{0xfffffffffffffffe, 0x0, 0x3}], 0x2014400, &(0x7f00000004c0)={[{@check_relaxed}, {@dmode}, {@check_relaxed}], [{@euid_lt={'euid<', 0xee01}}, {@euid_eq}, {@rootcontext={'rootcontext', 0x3d, 'staff_u'}}, {@obj_user={'obj_user', 0x3d, '#-_'}}, {@rootcontext={'rootcontext', 0x3d, 'staff_u'}}]}) faccessat(r0, &(0x7f0000000580)='./file0\x00', 0x88) clock_adjtime(0x4, &(0x7f00000005c0)={0x80000000, 0x100000000, 0xba, 0x80000000, 0x4, 0x20d4e190, 0x7, 0x400, 0x33, 0x7a, 0x1, 0x465d, 0x7f, 0x5, 0x3, 0x1, 0x0, 0x8, 0x7, 0x7ff, 0x1, 0x4, 0x3f, 0x7fff, 0x700b, 0x96}) r1 = accept$unix(0xffffffffffffffff, 0x0, &(0x7f00000006c0)) getsockname$unix(r1, &(0x7f0000000700), &(0x7f0000000780)=0x6e) clock_adjtime(0x3, &(0x7f00000007c0)={0x6, 0x6, 0x7, 0x8000, 0x7ff, 0x5c, 0x401, 0x2, 0x9, 0x4, 0x0, 0x61, 0x2, 0x9b71, 0x100000000, 0x7fffffff, 0x322, 0xc70d, 0x9, 0xd, 0x9, 0x0, 0x9, 0x1a1f00000000, 0xffffffffffffffff, 0x9}) clock_adjtime(0x6, &(0x7f00000008c0)={0x4, 0x9, 0x3, 0xfffffffffffffff7, 0xb31, 0x1, 0x1, 0x2, 0x538, 0x0, 0x401, 0x1, 0xdd, 0xfffffffffffffff7, 0xec54, 0x4, 0x100000001, 0x0, 0xa, 0x1, 0x7ff, 0xcd, 0xf2, 0x80, 0x7, 0x8000}) clock_adjtime(0x0, &(0x7f00000009c0)={0x8, 0xff, 0x81, 0x2, 0x100000001, 0x11, 0x5, 0x1, 0x1, 0x9, 0x1000, 0x8, 0xdf6c, 0x9, 0x8, 0x1004000000000000, 0x1ff, 0x3, 0x6, 0xf5, 0x80000, 0x1, 0xfffffffffffffd6d, 0x2, 0x6, 0xfa}) r2 = socket$unix(0x1, 0x5, 0x0) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f0000000ac0)={'wlan0\x00'}) mq_timedreceive(0xffffffffffffffff, &(0x7f0000000b00)=""/4096, 0x1000, 0x80, &(0x7f0000001b00)={0x0, 0x989680}) r3 = creat(&(0x7f0000001b40)='./file0\x00', 0x1) mknodat(r3, &(0x7f0000001b80)='./file1\x00', 0x4, 0x0) clock_adjtime(0x0, &(0x7f0000001bc0)={0xfff, 0x7fff, 0x0, 0x2, 0xfdc, 0x54, 0x8fa, 0x3f41, 0x0, 0x4, 0x4, 0x5, 0x101, 0x5, 0x4, 0x9, 0x9, 0x30e, 0x3f, 0x2, 0x7f, 0x7, 0x6, 0x4, 0x3ff, 0x100000000}) (fail_nth: 3) clock_adjtime(0x2, &(0x7f0000001cc0)={0x0, 0x6, 0x7, 0xe5, 0x5, 0x6, 0x10, 0x7, 0x281, 0x40, 0x1, 0x0, 0x1, 0x10001, 0x5, 0x100, 0x0, 0x4, 0xffffffffffffe001, 0xdf, 0x7f, 0x8000, 0x9, 0x400, 0xfffffffffffffe00, 0x3f}) [ 321.302944][T19105] RBP: 0000000000000007 R08: 0000000000011100 R09: 00007fb4516f91d0 [ 321.310906][T19105] R10: 0000000000000007 R11: 0000000000000246 R12: 0000000008100000 [ 321.318890][T19105] R13: 0000000020000100 R14: 0000000008100000 R15: 00000000200000c0 [ 321.326938][T19105] [ 321.330139][T19111] CPU: 1 PID: 19111 Comm: syz-executor.1 Not tainted 5.16.0-syzkaller #0 [ 321.339193][T19111] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 321.349275][T19111] Call Trace: [ 321.352569][T19111] [ 321.355507][T19111] dump_stack_lvl+0xd6/0x122 [ 321.357866][T19113] SELinux: duplicate or incompatible mount options [ 321.360105][T19111] dump_stack+0x11/0x1b [ 321.370867][T19111] should_fail+0x23c/0x250 [ 321.375271][T19111] ? __d_alloc+0x36/0x370 [ 321.379611][T19111] __should_failslab+0x81/0x90 [ 321.384406][T19111] should_failslab+0x5/0x20 [ 321.388909][T19111] kmem_cache_alloc+0x4f/0x320 [ 321.393926][T19111] ? security_inode_alloc+0x138/0x180 [ 321.399539][T19111] ? __init_rwsem+0x59/0x70 [ 321.404106][T19111] __d_alloc+0x36/0x370 [ 321.408403][T19111] ? debug_smp_processor_id+0x18/0x20 [ 321.413779][T19111] d_alloc_pseudo+0x1a/0x50 [ 321.418338][T19111] alloc_file_pseudo+0x77/0x150 [ 321.423195][T19111] __shmem_file_setup+0x14c/0x1d0 [ 321.428268][T19111] shmem_file_setup+0x37/0x40 [ 321.433028][T19111] __se_sys_memfd_create+0x1c1/0x350 [ 321.438294][T19111] __x64_sys_memfd_create+0x2d/0x40 [ 321.443530][T19111] do_syscall_64+0x44/0xd0 [ 321.447942][T19111] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 321.453926][T19111] RIP: 0033:0x7f02285c1e99 [ 321.458358][T19111] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 321.473128][T19114] FAULT_INJECTION: forcing a failure. [ 321.473128][T19114] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 321.477964][T19111] RSP: 002b:00007f0227737f28 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 321.477988][T19111] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007f02285c1e99 [ 321.478000][T19111] RDX: 0000000000022200 RSI: 0000000000000000 RDI: 00007f022861b168 [ 321.515561][T19111] RBP: 0000000000000007 R08: 0000000000011100 R09: 00007f02277381d0 [ 321.523691][T19111] R10: 0000000000000007 R11: 0000000000000246 R12: 0000000008100000 [ 321.531753][T19111] R13: 0000000020000100 R14: 0000000008100000 R15: 00000000200000c0 [ 321.539718][T19111] [ 321.542723][T19114] CPU: 0 PID: 19114 Comm: syz-executor.2 Not tainted 5.16.0-syzkaller #0 [ 321.551177][T19114] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 321.561231][T19114] Call Trace: [ 321.564508][T19114] [ 321.567420][T19114] dump_stack_lvl+0xd6/0x122 [ 321.572014][T19114] dump_stack+0x11/0x1b [ 321.576273][T19114] should_fail+0x23c/0x250 [ 321.580709][T19114] should_fail_usercopy+0x16/0x20 [ 321.585775][T19114] _copy_to_user+0x1c/0x90 [ 321.590259][T19114] simple_read_from_buffer+0xab/0x120 [ 321.595667][T19114] proc_fail_nth_read+0x10d/0x150 [ 321.600731][T19114] ? proc_fault_inject_write+0x230/0x230 [ 321.606344][T19114] vfs_read+0x1e6/0x750 [ 321.610556][T19114] ? __fget_files+0x1d2/0x210 [ 321.615318][T19114] ksys_read+0xd9/0x190 [ 321.619642][T19114] __x64_sys_read+0x3e/0x50 [ 321.624130][T19114] do_syscall_64+0x44/0xd0 [ 321.628530][T19114] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 321.634456][T19114] RIP: 0033:0x7f04e73cda4c [ 321.639120][T19114] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 f9 fc ff ff 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 2f fd ff ff 48 [ 321.658837][T19114] RSP: 002b:00007f04e6570160 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 321.667237][T19114] RAX: ffffffffffffffda RBX: 00007f04e752e030 RCX: 00007f04e73cda4c [ 321.675230][T19114] RDX: 000000000000000f RSI: 00007f04e65701e0 RDI: 0000000000000006 [ 321.683299][T19114] RBP: 00007f04e65701d0 R08: 0000000000000000 R09: 0000000000000000 [ 321.691250][T19114] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 321.699205][T19114] R13: 00007ffd358dfbcf R14: 00007f04e6570300 R15: 0000000000022000 [ 321.707203][T19114] 17:06:46 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc01000b, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000003980)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d9", 0x4, 0x6800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d0f465001000005fd0f4655f00000000000001000c00000010000800000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}], 0x0, &(0x7f00000000c0)) 17:06:46 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc01000a, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000003980)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="80", 0x1, 0x11100}], 0x0, &(0x7f00000000c0)) (fail_nth: 5) 17:06:46 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc01000a, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000003980)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d0f465001000005fd0f4655f00000000000001", 0x1b, 0x11100}], 0x0, &(0x7f00000000c0)) (fail_nth: 6) 17:06:46 executing program 2: clock_adjtime(0x7, &(0x7f0000000000)={0x8000, 0x62, 0xff, 0x1, 0x3, 0x1ff, 0x3ff, 0x4, 0xff, 0x20, 0x6, 0x401, 0x20, 0x0, 0x1ff, 0x8000, 0xfffffffffffffffd, 0x400, 0x8, 0x100000000, 0x2, 0x8, 0xf32, 0x4, 0x6, 0x80}) clock_adjtime(0x2, &(0x7f0000000100)={0xd9, 0x9, 0x1, 0x2, 0x1f, 0x78, 0x4b1, 0x0, 0x401, 0x5, 0x8, 0x1, 0x101, 0x100000001, 0x7, 0x1fc, 0x9, 0x9, 0x0, 0x9, 0x8, 0x3, 0xff, 0x7, 0x73, 0x946c}) clock_adjtime(0x6, &(0x7f0000000200)={0x4, 0x1, 0x100, 0x6, 0x2, 0x6, 0x1, 0x1dd, 0x9, 0x1000000000000000, 0x0, 0x6, 0x1, 0x1, 0x9, 0x5, 0x3023, 0x2, 0x4, 0xfffffffffffffff9, 0x429, 0x3, 0x0, 0x9, 0xffffffffffffff05, 0x1000}) clock_adjtime(0x3, &(0x7f0000000300)={0x0, 0x8, 0x9, 0x9, 0x9, 0x9, 0x6, 0x9, 0x8, 0x1, 0xd0fc, 0x55, 0x2, 0x0, 0x1, 0x1f, 0x100000001, 0x8f44, 0x53, 0x0, 0x3, 0x140000000000, 0x9, 0x8000, 0x0, 0x10001}) r0 = syz_mount_image$iso9660(&(0x7f0000000400), &(0x7f0000000440)='./file0\x00', 0x4, 0x1, &(0x7f0000000480)=[{0xfffffffffffffffe, 0x0, 0x3}], 0x2014400, &(0x7f00000004c0)={[{@check_relaxed}, {@dmode}, {@check_relaxed}], [{@euid_lt={'euid<', 0xee01}}, {@euid_eq}, {@rootcontext={'rootcontext', 0x3d, 'staff_u'}}, {@obj_user={'obj_user', 0x3d, '#-_'}}, {@rootcontext={'rootcontext', 0x3d, 'staff_u'}}]}) faccessat(r0, &(0x7f0000000580)='./file0\x00', 0x88) clock_adjtime(0x4, &(0x7f00000005c0)={0x80000000, 0x100000000, 0xba, 0x80000000, 0x4, 0x20d4e190, 0x7, 0x400, 0x33, 0x7a, 0x1, 0x465d, 0x7f, 0x5, 0x3, 0x1, 0x0, 0x8, 0x7, 0x7ff, 0x1, 0x4, 0x3f, 0x7fff, 0x700b, 0x96}) r1 = accept$unix(0xffffffffffffffff, 0x0, &(0x7f00000006c0)) getsockname$unix(r1, &(0x7f0000000700), &(0x7f0000000780)=0x6e) clock_adjtime(0x3, &(0x7f00000007c0)={0x6, 0x6, 0x7, 0x8000, 0x7ff, 0x5c, 0x401, 0x2, 0x9, 0x4, 0x0, 0x61, 0x2, 0x9b71, 0x100000000, 0x7fffffff, 0x322, 0xc70d, 0x9, 0xd, 0x9, 0x0, 0x9, 0x1a1f00000000, 0xffffffffffffffff, 0x9}) clock_adjtime(0x6, &(0x7f00000008c0)={0x4, 0x9, 0x3, 0xfffffffffffffff7, 0xb31, 0x1, 0x1, 0x2, 0x538, 0x0, 0x401, 0x1, 0xdd, 0xfffffffffffffff7, 0xec54, 0x4, 0x100000001, 0x0, 0xa, 0x1, 0x7ff, 0xcd, 0xf2, 0x80, 0x7, 0x8000}) clock_adjtime(0x0, &(0x7f00000009c0)={0x8, 0xff, 0x81, 0x2, 0x100000001, 0x11, 0x5, 0x1, 0x1, 0x9, 0x1000, 0x8, 0xdf6c, 0x9, 0x8, 0x1004000000000000, 0x1ff, 0x3, 0x6, 0xf5, 0x80000, 0x1, 0xfffffffffffffd6d, 0x2, 0x6, 0xfa}) r2 = socket$unix(0x1, 0x5, 0x0) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f0000000ac0)={'wlan0\x00'}) mq_timedreceive(0xffffffffffffffff, &(0x7f0000000b00)=""/4096, 0x1000, 0x80, &(0x7f0000001b00)={0x0, 0x989680}) r3 = creat(&(0x7f0000001b40)='./file0\x00', 0x1) mknodat(r3, &(0x7f0000001b80)='./file1\x00', 0x4, 0x0) clock_adjtime(0x0, &(0x7f0000001bc0)={0xfff, 0x7fff, 0x0, 0x2, 0xfdc, 0x54, 0x8fa, 0x3f41, 0x0, 0x4, 0x4, 0x5, 0x101, 0x5, 0x4, 0x9, 0x9, 0x30e, 0x3f, 0x2, 0x7f, 0x7, 0x6, 0x4, 0x3ff, 0x100000000}) clock_adjtime(0x2, &(0x7f0000001cc0)={0x0, 0x6, 0x7, 0xe5, 0x5, 0x6, 0x10, 0x7, 0x281, 0x40, 0x1, 0x0, 0x1, 0x10001, 0x5, 0x100, 0x0, 0x4, 0xffffffffffffe001, 0xdf, 0x7f, 0x8000, 0x9, 0x400, 0xfffffffffffffe00, 0x3f}) [ 321.722932][T19108] loop3: detected capacity change from 0 to 264192 [ 321.732085][T19108] EXT4-fs warning (device loop3): read_mmp_block:107: Error -117 while reading MMP block 0 [ 321.732588][T19119] FAULT_INJECTION: forcing a failure. [ 321.732588][T19119] name failslab, interval 1, probability 0, space 0, times 0 [ 321.755059][T19119] CPU: 1 PID: 19119 Comm: syz-executor.5 Not tainted 5.16.0-syzkaller #0 [ 321.760753][T19123] SELinux: duplicate or incompatible mount options [ 321.763495][T19119] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 321.763508][T19119] Call Trace: [ 321.763514][T19119] [ 321.772629][T19121] FAULT_INJECTION: forcing a failure. [ 321.772629][T19121] name failslab, interval 1, probability 0, space 0, times 0 [ 321.780143][T19119] dump_stack_lvl+0xd6/0x122 [ 321.780192][T19119] dump_stack+0x11/0x1b [ 321.780210][T19119] should_fail+0x23c/0x250 [ 321.812093][T19119] ? __d_alloc+0x36/0x370 [ 321.816475][T19119] __should_failslab+0x81/0x90 [ 321.821494][T19119] should_failslab+0x5/0x20 [ 321.825991][T19119] kmem_cache_alloc+0x4f/0x320 [ 321.830774][T19119] ? security_inode_alloc+0x138/0x180 [ 321.836129][T19119] ? __init_rwsem+0x59/0x70 [ 321.840616][T19119] __d_alloc+0x36/0x370 [ 321.844772][T19119] ? debug_smp_processor_id+0x18/0x20 [ 321.850136][T19119] d_alloc_pseudo+0x1a/0x50 [ 321.854628][T19119] alloc_file_pseudo+0x77/0x150 [ 321.859583][T19119] __shmem_file_setup+0x14c/0x1d0 [ 321.864599][T19119] shmem_file_setup+0x37/0x40 [ 321.869271][T19119] __se_sys_memfd_create+0x1c1/0x350 [ 321.874544][T19119] __x64_sys_memfd_create+0x2d/0x40 [ 321.879730][T19119] do_syscall_64+0x44/0xd0 [ 321.884176][T19119] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 321.890057][T19119] RIP: 0033:0x7fb452582e99 [ 321.894612][T19119] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 321.914204][T19119] RSP: 002b:00007fb4516f8f28 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 321.922614][T19119] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007fb452582e99 [ 321.930666][T19119] RDX: 0000000000022200 RSI: 0000000000000000 RDI: 00007fb4525dc168 [ 321.938644][T19119] RBP: 0000000000000007 R08: 0000000000011100 R09: 00007fb4516f91d0 [ 321.946612][T19119] R10: 0000000000000007 R11: 0000000000000246 R12: 0000000008100000 [ 321.954567][T19119] R13: 0000000020000100 R14: 0000000008100000 R15: 00000000200000c0 [ 321.962539][T19119] [ 321.965554][T19121] CPU: 0 PID: 19121 Comm: syz-executor.1 Not tainted 5.16.0-syzkaller #0 [ 321.974026][T19121] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 321.984073][T19121] Call Trace: [ 321.987355][T19121] [ 321.990298][T19121] dump_stack_lvl+0xd6/0x122 [ 321.994900][T19121] dump_stack+0x11/0x1b [ 321.999080][T19121] should_fail+0x23c/0x250 [ 322.003621][T19121] ? __alloc_file+0x2e/0x1a0 [ 322.008259][T19121] __should_failslab+0x81/0x90 [ 322.013008][T19121] should_failslab+0x5/0x20 [ 322.017515][T19121] kmem_cache_alloc+0x4f/0x320 [ 322.022262][T19121] __alloc_file+0x2e/0x1a0 [ 322.027099][T19121] alloc_empty_file+0xcd/0x1c0 [ 322.031846][T19121] alloc_file+0x3a/0x280 [ 322.036077][T19121] alloc_file_pseudo+0xfa/0x150 [ 322.040955][T19121] __shmem_file_setup+0x14c/0x1d0 [ 322.045963][T19121] shmem_file_setup+0x37/0x40 [ 322.050649][T19121] __se_sys_memfd_create+0x1c1/0x350 [ 322.055956][T19121] __x64_sys_memfd_create+0x2d/0x40 [ 322.061140][T19121] do_syscall_64+0x44/0xd0 [ 322.065542][T19121] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 322.071424][T19121] RIP: 0033:0x7f02285c1e99 [ 322.075819][T19121] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 322.095497][T19121] RSP: 002b:00007f0227737f28 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 322.103933][T19121] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007f02285c1e99 [ 322.111985][T19121] RDX: 0000000000022200 RSI: 0000000000000000 RDI: 00007f022861b168 17:06:46 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc01000a, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000011", 0x9, 0x4e0}, {&(0x7f0000010200)="01000000000005", 0x7, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000003980)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d0f465001000005fd0f4655f00000000000001000c000000100008", 0x23, 0x11100}], 0x0, &(0x7f00000000c0)) 17:06:46 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc01000a, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000003980)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="80", 0x1, 0x11100}], 0x0, &(0x7f00000000c0)) (fail_nth: 6) [ 322.119963][T19121] RBP: 0000000000000007 R08: 0000000000011100 R09: 00007f02277381d0 [ 322.127927][T19121] R10: 0000000000000007 R11: 0000000000000246 R12: 0000000008100000 [ 322.135886][T19121] R13: 0000000020000100 R14: 0000000008100000 R15: 00000000200000c0 [ 322.143843][T19121] [ 322.149811][T19128] loop4: detected capacity change from 0 to 264192 [ 322.171934][T19131] loop3: detected capacity change from 0 to 264192 [ 322.182978][T19133] FAULT_INJECTION: forcing a failure. [ 322.182978][T19133] name failslab, interval 1, probability 0, space 0, times 0 [ 322.195622][T19133] CPU: 0 PID: 19133 Comm: syz-executor.5 Not tainted 5.16.0-syzkaller #0 [ 322.204092][T19133] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 322.214150][T19133] Call Trace: [ 322.217421][T19133] [ 322.220339][T19133] dump_stack_lvl+0xd6/0x122 [ 322.224976][T19133] dump_stack+0x11/0x1b [ 322.229113][T19133] should_fail+0x23c/0x250 [ 322.233509][T19133] ? __alloc_file+0x2e/0x1a0 [ 322.238086][T19133] __should_failslab+0x81/0x90 [ 322.242834][T19133] should_failslab+0x5/0x20 [ 322.247329][T19133] kmem_cache_alloc+0x4f/0x320 [ 322.252136][T19133] __alloc_file+0x2e/0x1a0 [ 322.256622][T19133] alloc_empty_file+0xcd/0x1c0 [ 322.261376][T19133] alloc_file+0x3a/0x280 [ 322.265639][T19133] alloc_file_pseudo+0xfa/0x150 [ 322.270538][T19133] __shmem_file_setup+0x14c/0x1d0 [ 322.275751][T19133] shmem_file_setup+0x37/0x40 [ 322.280483][T19133] __se_sys_memfd_create+0x1c1/0x350 [ 322.285754][T19133] __x64_sys_memfd_create+0x2d/0x40 [ 322.290934][T19133] do_syscall_64+0x44/0xd0 [ 322.295335][T19133] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 322.301262][T19133] RIP: 0033:0x7fb452582e99 [ 322.305678][T19133] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 322.325370][T19133] RSP: 002b:00007fb4516f8f28 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 322.333764][T19133] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007fb452582e99 [ 322.341804][T19133] RDX: 0000000000022200 RSI: 0000000000000000 RDI: 00007fb4525dc168 [ 322.349849][T19133] RBP: 0000000000000007 R08: 0000000000011100 R09: 00007fb4516f91d0 [ 322.357801][T19133] R10: 0000000000000007 R11: 0000000000000246 R12: 0000000008100000 [ 322.365831][T19133] R13: 0000000020000100 R14: 0000000008100000 R15: 00000000200000c0 17:06:50 executing program 2: clock_adjtime(0x7, &(0x7f0000000000)={0x8000, 0x62, 0xff, 0x1, 0x3, 0x1ff, 0x3ff, 0x4, 0xff, 0x20, 0x6, 0x401, 0x20, 0x0, 0x1ff, 0x8000, 0xfffffffffffffffd, 0x400, 0x8, 0x100000000, 0x2, 0x8, 0xf32, 0x4, 0x6, 0x80}) clock_adjtime(0x2, &(0x7f0000000100)={0xd9, 0x9, 0x1, 0x2, 0x1f, 0x78, 0x4b1, 0x0, 0x401, 0x5, 0x8, 0x1, 0x101, 0x100000001, 0x7, 0x1fc, 0x9, 0x9, 0x0, 0x9, 0x8, 0x3, 0xff, 0x7, 0x73, 0x946c}) clock_adjtime(0x6, &(0x7f0000000200)={0x4, 0x1, 0x100, 0x6, 0x2, 0x6, 0x1, 0x1dd, 0x9, 0x1000000000000000, 0x0, 0x6, 0x1, 0x1, 0x9, 0x5, 0x3023, 0x2, 0x4, 0xfffffffffffffff9, 0x429, 0x3, 0x0, 0x9, 0xffffffffffffff05, 0x1000}) clock_adjtime(0x3, &(0x7f0000000300)={0x0, 0x8, 0x9, 0x9, 0x9, 0x9, 0x6, 0x9, 0x8, 0x1, 0xd0fc, 0x55, 0x2, 0x0, 0x1, 0x1f, 0x100000001, 0x8f44, 0x53, 0x0, 0x3, 0x140000000000, 0x9, 0x8000, 0x0, 0x10001}) r0 = syz_mount_image$iso9660(&(0x7f0000000400), &(0x7f0000000440)='./file0\x00', 0x4, 0x1, &(0x7f0000000480)=[{0xfffffffffffffffe, 0x0, 0x3}], 0x2014400, &(0x7f00000004c0)={[{@check_relaxed}, {@dmode}, {@check_relaxed}], [{@euid_lt={'euid<', 0xee01}}, {@euid_eq}, {@rootcontext={'rootcontext', 0x3d, 'staff_u'}}, {@obj_user={'obj_user', 0x3d, '#-_'}}, {@rootcontext={'rootcontext', 0x3d, 'staff_u'}}]}) faccessat(r0, &(0x7f0000000580)='./file0\x00', 0x88) clock_adjtime(0x4, &(0x7f00000005c0)={0x80000000, 0x100000000, 0xba, 0x80000000, 0x4, 0x20d4e190, 0x7, 0x400, 0x33, 0x7a, 0x1, 0x465d, 0x7f, 0x5, 0x3, 0x1, 0x0, 0x8, 0x7, 0x7ff, 0x1, 0x4, 0x3f, 0x7fff, 0x700b, 0x96}) r1 = accept$unix(0xffffffffffffffff, 0x0, &(0x7f00000006c0)) getsockname$unix(r1, &(0x7f0000000700), &(0x7f0000000780)=0x6e) clock_adjtime(0x3, &(0x7f00000007c0)={0x6, 0x6, 0x7, 0x8000, 0x7ff, 0x5c, 0x401, 0x2, 0x9, 0x4, 0x0, 0x61, 0x2, 0x9b71, 0x100000000, 0x7fffffff, 0x322, 0xc70d, 0x9, 0xd, 0x9, 0x0, 0x9, 0x1a1f00000000, 0xffffffffffffffff, 0x9}) clock_adjtime(0x6, &(0x7f00000008c0)={0x4, 0x9, 0x3, 0xfffffffffffffff7, 0xb31, 0x1, 0x1, 0x2, 0x538, 0x0, 0x401, 0x1, 0xdd, 0xfffffffffffffff7, 0xec54, 0x4, 0x100000001, 0x0, 0xa, 0x1, 0x7ff, 0xcd, 0xf2, 0x80, 0x7, 0x8000}) clock_adjtime(0x0, &(0x7f00000009c0)={0x8, 0xff, 0x81, 0x2, 0x100000001, 0x11, 0x5, 0x1, 0x1, 0x9, 0x1000, 0x8, 0xdf6c, 0x9, 0x8, 0x1004000000000000, 0x1ff, 0x3, 0x6, 0xf5, 0x80000, 0x1, 0xfffffffffffffd6d, 0x2, 0x6, 0xfa}) r2 = socket$unix(0x1, 0x5, 0x0) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f0000000ac0)={'wlan0\x00'}) mq_timedreceive(0xffffffffffffffff, &(0x7f0000000b00)=""/4096, 0x1000, 0x80, &(0x7f0000001b00)={0x0, 0x989680}) r3 = creat(&(0x7f0000001b40)='./file0\x00', 0x1) mknodat(r3, &(0x7f0000001b80)='./file1\x00', 0x4, 0x0) clock_adjtime(0x2, &(0x7f0000001bc0)={0xfff, 0x7fff, 0x0, 0x2, 0xfdc, 0x54, 0x8fa, 0x3f41, 0x0, 0x4, 0x4, 0x5, 0x101, 0x5, 0x4, 0x9, 0x9, 0x30e, 0x3f, 0x2, 0x7f, 0x7, 0x6, 0x4, 0x3ff, 0x100000000}) clock_adjtime(0x2, &(0x7f0000001cc0)={0x0, 0x6, 0x7, 0xe5, 0x5, 0x6, 0x10, 0x7, 0x281, 0x40, 0x1, 0x0, 0x1, 0x10001, 0x5, 0x100, 0x0, 0x4, 0xffffffffffffe001, 0xdf, 0x7f, 0x8000, 0x9, 0x400, 0xfffffffffffffe00, 0x3f}) 17:06:50 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc01000a, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000003980)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d0f465001000005fd0f4655f00000000000001", 0x1b, 0x11100}], 0x0, &(0x7f00000000c0)) (fail_nth: 7) [ 322.373861][T19133] [ 322.400153][T19131] EXT4-fs warning (device loop3): read_mmp_block:107: Error -117 while reading MMP block 0 [ 322.422772][T19137] FAULT_INJECTION: forcing a failure. [ 322.422772][T19137] name failslab, interval 1, probability 0, space 0, times 0 [ 322.425724][T19135] SELinux: duplicate or incompatible mount options [ 322.435440][T19137] CPU: 1 PID: 19137 Comm: syz-executor.1 Not tainted 5.16.0-syzkaller #0 17:06:50 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc01000a, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000011", 0x9, 0x4e0}, {&(0x7f0000010200)="0100000000000500", 0x8, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000003980)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d0f465001000005fd0f4655f00000000000001000c000000100008", 0x23, 0x11100}], 0x0, &(0x7f00000000c0)) 17:06:50 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc01000a, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000003980)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="80", 0x1, 0x11100}], 0x0, &(0x7f00000000c0)) (fail_nth: 7) [ 322.450407][T19137] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 322.455706][T19139] loop0: detected capacity change from 0 to 264192 [ 322.460524][T19137] Call Trace: [ 322.460534][T19137] [ 322.460541][T19137] dump_stack_lvl+0xd6/0x122 [ 322.477836][T19137] dump_stack+0x11/0x1b [ 322.481993][T19137] should_fail+0x23c/0x250 [ 322.486408][T19137] ? security_file_alloc+0x30/0x190 [ 322.491794][T19137] __should_failslab+0x81/0x90 [ 322.496031][T19143] FAULT_INJECTION: forcing a failure. [ 322.496031][T19143] name failslab, interval 1, probability 0, space 0, times 0 [ 322.496696][T19137] should_failslab+0x5/0x20 [ 322.513771][T19137] kmem_cache_alloc+0x4f/0x320 [ 322.518547][T19137] security_file_alloc+0x30/0x190 [ 322.523593][T19137] __alloc_file+0x83/0x1a0 [ 322.527995][T19137] alloc_empty_file+0xcd/0x1c0 [ 322.532746][T19137] alloc_file+0x3a/0x280 [ 322.537041][T19137] alloc_file_pseudo+0xfa/0x150 [ 322.541881][T19137] __shmem_file_setup+0x14c/0x1d0 [ 322.546894][T19137] shmem_file_setup+0x37/0x40 [ 322.551561][T19137] __se_sys_memfd_create+0x1c1/0x350 [ 322.556834][T19137] __x64_sys_memfd_create+0x2d/0x40 [ 322.562070][T19137] do_syscall_64+0x44/0xd0 [ 322.566540][T19137] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 322.572482][T19137] RIP: 0033:0x7f02285c1e99 [ 322.576883][T19137] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 322.596674][T19137] RSP: 002b:00007f0227737f28 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 322.605083][T19137] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007f02285c1e99 [ 322.613051][T19137] RDX: 0000000000022200 RSI: 0000000000000000 RDI: 00007f022861b168 [ 322.621021][T19137] RBP: 0000000000000007 R08: 0000000000011100 R09: 00007f02277381d0 [ 322.628977][T19137] R10: 0000000000000007 R11: 0000000000000246 R12: 0000000008100000 [ 322.636948][T19137] R13: 0000000020000100 R14: 0000000008100000 R15: 00000000200000c0 [ 322.645016][T19137] [ 322.648027][T19143] CPU: 0 PID: 19143 Comm: syz-executor.5 Not tainted 5.16.0-syzkaller #0 [ 322.656441][T19143] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 322.666512][T19143] Call Trace: [ 322.669827][T19143] [ 322.672758][T19143] dump_stack_lvl+0xd6/0x122 [ 322.677357][T19143] dump_stack+0x11/0x1b [ 322.681516][T19143] should_fail+0x23c/0x250 [ 322.685935][T19143] ? security_file_alloc+0x30/0x190 [ 322.688797][T19146] FAULT_INJECTION: forcing a failure. [ 322.688797][T19146] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 322.691202][T19143] __should_failslab+0x81/0x90 [ 322.691230][T19143] should_failslab+0x5/0x20 [ 322.713612][T19143] kmem_cache_alloc+0x4f/0x320 [ 322.718370][T19143] security_file_alloc+0x30/0x190 [ 322.723444][T19143] __alloc_file+0x83/0x1a0 [ 322.727859][T19143] alloc_empty_file+0xcd/0x1c0 [ 322.732608][T19143] alloc_file+0x3a/0x280 [ 322.736837][T19143] alloc_file_pseudo+0xfa/0x150 [ 322.741737][T19143] __shmem_file_setup+0x14c/0x1d0 [ 322.746753][T19143] shmem_file_setup+0x37/0x40 [ 322.751489][T19143] __se_sys_memfd_create+0x1c1/0x350 [ 322.756765][T19143] __x64_sys_memfd_create+0x2d/0x40 [ 322.761998][T19143] do_syscall_64+0x44/0xd0 [ 322.766407][T19143] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 322.772293][T19143] RIP: 0033:0x7fb452582e99 [ 322.776746][T19143] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 322.796342][T19143] RSP: 002b:00007fb4516f8f28 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 322.804741][T19143] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007fb452582e99 [ 322.812756][T19143] RDX: 0000000000022200 RSI: 0000000000000000 RDI: 00007fb4525dc168 [ 322.820718][T19143] RBP: 0000000000000007 R08: 0000000000011100 R09: 00007fb4516f91d0 [ 322.828673][T19143] R10: 0000000000000007 R11: 0000000000000246 R12: 0000000008100000 [ 322.836628][T19143] R13: 0000000020000100 R14: 0000000008100000 R15: 00000000200000c0 [ 322.844597][T19143] [ 322.847601][T19146] CPU: 1 PID: 19146 Comm: syz-executor.1 Not tainted 5.16.0-syzkaller #0 [ 322.856082][T19146] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 322.866180][T19146] Call Trace: [ 322.869450][T19146] [ 322.872369][T19146] dump_stack_lvl+0xd6/0x122 [ 322.876951][T19146] dump_stack+0x11/0x1b [ 322.881094][T19146] should_fail+0x23c/0x250 [ 322.885609][T19146] __alloc_pages+0x102/0x330 [ 322.890188][T19146] alloc_pages_vma+0x5ee/0x770 [ 322.894980][T19146] shmem_getpage_gfp+0x8bc/0x12c0 [ 322.899996][T19146] shmem_write_begin+0x7e/0x100 [ 322.904905][T19146] generic_perform_write+0x1c8/0x400 [ 322.910202][T19146] ? current_time+0xed/0x1a0 [ 322.914943][T19146] __generic_file_write_iter+0xf7/0x2b0 [ 322.920593][T19146] ? generic_write_checks+0x250/0x290 [ 322.926030][T19146] generic_file_write_iter+0x75/0x130 [ 322.931454][T19146] vfs_write+0x7f5/0x950 [ 322.935692][T19146] __x64_sys_pwrite64+0xf5/0x150 [ 322.940669][T19146] do_syscall_64+0x44/0xd0 [ 322.945070][T19146] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 322.950992][T19146] RIP: 0033:0x7f0228574e67 [ 322.955386][T19146] Code: 08 89 3c 24 48 89 4c 24 18 e8 e5 f8 ff ff 4c 8b 54 24 18 48 8b 54 24 10 41 89 c0 48 8b 74 24 08 8b 3c 24 b8 12 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 31 44 89 c7 48 89 04 24 e8 15 f9 ff ff 48 8b [ 322.975089][T19146] RSP: 002b:00007f0227737f00 EFLAGS: 00000293 ORIG_RAX: 0000000000000012 [ 322.983490][T19146] RAX: ffffffffffffffda RBX: 00007f022860b9c8 RCX: 00007f0228574e67 [ 322.991445][T19146] RDX: 0000000000000066 RSI: 0000000020010000 RDI: 0000000000000004 17:06:50 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc01000a, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000003980)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d0f465001000005fd0f4655f00000000000001000c00000010000800000000000af3010004", 0x2d, 0x11100}], 0x0, &(0x7f00000000c0)) (fail_nth: 1) 17:06:50 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc01000a, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000003980)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d0f465001000005fd0f4655f00000000000001", 0x1b, 0x11100}], 0x0, &(0x7f00000000c0)) (fail_nth: 8) [ 322.999399][T19146] RBP: 0000000000000007 R08: 0000000000000000 R09: 00007f02277381d0 [ 323.007437][T19146] R10: 0000000000000400 R11: 0000000000000293 R12: 0000000000000004 [ 323.015388][T19146] R13: 0000000000000004 R14: 0000000020000200 R15: 0000000000000000 [ 323.023342][T19146] [ 323.033240][T19146] loop1: detected capacity change from 0 to 264192 [ 323.084684][T19152] FAULT_INJECTION: forcing a failure. [ 323.084684][T19152] name failslab, interval 1, probability 0, space 0, times 0 [ 323.097350][T19152] CPU: 1 PID: 19152 Comm: syz-executor.4 Not tainted 5.16.0-syzkaller #0 [ 323.105819][T19152] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 323.115876][T19152] Call Trace: [ 323.119159][T19152] [ 323.122092][T19152] dump_stack_lvl+0xd6/0x122 [ 323.126707][T19152] dump_stack+0x11/0x1b [ 323.130932][T19152] should_fail+0x23c/0x250 [ 323.131777][T19146] EXT4-fs (loop1): VFS: Can't find ext4 filesystem [ 323.135386][T19152] ? __se_sys_memfd_create+0xe9/0x350 [ 323.147240][T19152] __should_failslab+0x81/0x90 [ 323.152062][T19152] should_failslab+0x5/0x20 [ 323.156577][T19152] __kmalloc+0x6f/0x370 [ 323.160741][T19152] ? strnlen_user+0x137/0x1c0 [ 323.165523][T19152] __se_sys_memfd_create+0xe9/0x350 [ 323.170740][T19152] __x64_sys_memfd_create+0x2d/0x40 [ 323.175952][T19152] do_syscall_64+0x44/0xd0 [ 323.180394][T19152] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 323.186641][T19152] RIP: 0033:0x7f6f94c22e99 [ 323.191069][T19152] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 323.210829][T19152] RSP: 002b:00007f6f93d98f28 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 323.219240][T19152] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007f6f94c22e99 [ 323.227299][T19152] RDX: 0000000000022200 RSI: 0000000000000000 RDI: 00007f6f94c7c168 [ 323.235272][T19152] RBP: 0000000000000007 R08: 0000000000011100 R09: 00007f6f93d991d0 [ 323.243304][T19152] R10: 0000000000000007 R11: 0000000000000246 R12: 0000000008100000 [ 323.251277][T19152] R13: 0000000020000100 R14: 0000000008100000 R15: 00000000200000c0 [ 323.259248][T19152] 17:06:51 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc01000c, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000003980)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d9", 0x4, 0x6800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d0f465001000005fd0f4655f00000000000001000c00000010000800000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}], 0x0, &(0x7f00000000c0)) 17:06:51 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc01000a, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000011", 0x9, 0x4e0}, {&(0x7f0000010200)="0100000000000500", 0x8, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000003980)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d0f465001000005fd0f4655f00000000000001000c000000100008", 0x23, 0x11100}], 0x0, &(0x7f00000000c0)) 17:06:51 executing program 2: clock_adjtime(0x7, &(0x7f0000000000)={0x8000, 0x62, 0xff, 0x1, 0x3, 0x1ff, 0x3ff, 0x4, 0xff, 0x20, 0x6, 0x401, 0x20, 0x0, 0x1ff, 0x8000, 0xfffffffffffffffd, 0x400, 0x8, 0x100000000, 0x2, 0x8, 0xf32, 0x4, 0x6, 0x80}) clock_adjtime(0x2, &(0x7f0000000100)={0xd9, 0x9, 0x1, 0x2, 0x1f, 0x78, 0x4b1, 0x0, 0x401, 0x5, 0x8, 0x1, 0x101, 0x100000001, 0x7, 0x1fc, 0x9, 0x9, 0x0, 0x9, 0x8, 0x3, 0xff, 0x7, 0x73, 0x946c}) clock_adjtime(0x6, &(0x7f0000000200)={0x4, 0x1, 0x100, 0x6, 0x2, 0x6, 0x1, 0x1dd, 0x9, 0x1000000000000000, 0x0, 0x6, 0x1, 0x1, 0x9, 0x5, 0x3023, 0x2, 0x4, 0xfffffffffffffff9, 0x429, 0x3, 0x0, 0x9, 0xffffffffffffff05, 0x1000}) clock_adjtime(0x3, &(0x7f0000000300)={0x0, 0x8, 0x9, 0x9, 0x9, 0x9, 0x6, 0x9, 0x8, 0x1, 0xd0fc, 0x55, 0x2, 0x0, 0x1, 0x1f, 0x100000001, 0x8f44, 0x53, 0x0, 0x3, 0x140000000000, 0x9, 0x8000, 0x0, 0x10001}) r0 = syz_mount_image$iso9660(&(0x7f0000000400), &(0x7f0000000440)='./file0\x00', 0x4, 0x1, &(0x7f0000000480)=[{0xfffffffffffffffe, 0x0, 0x3}], 0x2014400, &(0x7f00000004c0)={[{@check_relaxed}, {@dmode}, {@check_relaxed}], [{@euid_lt={'euid<', 0xee01}}, {@euid_eq}, {@rootcontext={'rootcontext', 0x3d, 'staff_u'}}, {@obj_user={'obj_user', 0x3d, '#-_'}}, {@rootcontext={'rootcontext', 0x3d, 'staff_u'}}]}) faccessat(r0, &(0x7f0000000580)='./file0\x00', 0x88) clock_adjtime(0x4, &(0x7f00000005c0)={0x80000000, 0x100000000, 0xba, 0x80000000, 0x4, 0x20d4e190, 0x7, 0x400, 0x33, 0x7a, 0x1, 0x465d, 0x7f, 0x5, 0x3, 0x1, 0x0, 0x8, 0x7, 0x7ff, 0x1, 0x4, 0x3f, 0x7fff, 0x700b, 0x96}) r1 = accept$unix(0xffffffffffffffff, 0x0, &(0x7f00000006c0)) getsockname$unix(r1, &(0x7f0000000700), &(0x7f0000000780)=0x6e) clock_adjtime(0x3, &(0x7f00000007c0)={0x6, 0x6, 0x7, 0x8000, 0x7ff, 0x5c, 0x401, 0x2, 0x9, 0x4, 0x0, 0x61, 0x2, 0x9b71, 0x100000000, 0x7fffffff, 0x322, 0xc70d, 0x9, 0xd, 0x9, 0x0, 0x9, 0x1a1f00000000, 0xffffffffffffffff, 0x9}) clock_adjtime(0x6, &(0x7f00000008c0)={0x4, 0x9, 0x3, 0xfffffffffffffff7, 0xb31, 0x1, 0x1, 0x2, 0x538, 0x0, 0x401, 0x1, 0xdd, 0xfffffffffffffff7, 0xec54, 0x4, 0x100000001, 0x0, 0xa, 0x1, 0x7ff, 0xcd, 0xf2, 0x80, 0x7, 0x8000}) clock_adjtime(0x0, &(0x7f00000009c0)={0x8, 0xff, 0x81, 0x2, 0x100000001, 0x11, 0x5, 0x1, 0x1, 0x9, 0x1000, 0x8, 0xdf6c, 0x9, 0x8, 0x1004000000000000, 0x1ff, 0x3, 0x6, 0xf5, 0x80000, 0x1, 0xfffffffffffffd6d, 0x2, 0x6, 0xfa}) r2 = socket$unix(0x1, 0x5, 0x0) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f0000000ac0)={'wlan0\x00'}) mq_timedreceive(0xffffffffffffffff, &(0x7f0000000b00)=""/4096, 0x1000, 0x80, &(0x7f0000001b00)={0x0, 0x989680}) r3 = creat(&(0x7f0000001b40)='./file0\x00', 0x1) mknodat(r3, &(0x7f0000001b80)='./file1\x00', 0x4, 0x0) clock_adjtime(0x3, &(0x7f0000001bc0)={0xfff, 0x7fff, 0x0, 0x2, 0xfdc, 0x54, 0x8fa, 0x3f41, 0x0, 0x4, 0x4, 0x5, 0x101, 0x5, 0x4, 0x9, 0x9, 0x30e, 0x3f, 0x2, 0x7f, 0x7, 0x6, 0x4, 0x3ff, 0x100000000}) clock_adjtime(0x2, &(0x7f0000001cc0)={0x0, 0x6, 0x7, 0xe5, 0x5, 0x6, 0x10, 0x7, 0x281, 0x40, 0x1, 0x0, 0x1, 0x10001, 0x5, 0x100, 0x0, 0x4, 0xffffffffffffe001, 0xdf, 0x7f, 0x8000, 0x9, 0x400, 0xfffffffffffffe00, 0x3f}) 17:06:51 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc01000a, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000003980)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="80", 0x1, 0x11100}], 0x0, &(0x7f00000000c0)) (fail_nth: 8) 17:06:51 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc01000a, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000003980)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d0f465001000005fd0f4655f00000000000001000c00000010000800000000000af3010004", 0x2d, 0x11100}], 0x0, &(0x7f00000000c0)) (fail_nth: 2) 17:06:51 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc01000a, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000003980)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d0f465001000005fd0f4655f00000000000001", 0x1b, 0x11100}], 0x0, &(0x7f00000000c0)) (fail_nth: 9) [ 323.273923][T19139] EXT4-fs warning (device loop0): ext4_enable_quotas:6363: Failed to enable quota tracking (type=0, err=-22). Please run e2fsck to fix. [ 323.292131][T19139] EXT4-fs (loop0): mount failed [ 323.342460][T19163] FAULT_INJECTION: forcing a failure. [ 323.342460][T19163] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 323.355667][T19163] CPU: 0 PID: 19163 Comm: syz-executor.4 Not tainted 5.16.0-syzkaller #0 [ 323.364092][T19163] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 323.365316][T19165] SELinux: duplicate or incompatible mount options [ 323.374143][T19163] Call Trace: [ 323.374151][T19163] [ 323.374158][T19163] dump_stack_lvl+0xd6/0x122 [ 323.381562][T19159] loop3: detected capacity change from 0 to 264192 [ 323.384116][T19163] dump_stack+0x11/0x1b [ 323.388322][T19159] EXT4-fs warning (device loop3): read_mmp_block:107: Error -117 while reading MMP block 0 [ 323.391632][T19163] should_fail+0x23c/0x250 [ 323.391656][T19163] should_fail_usercopy+0x16/0x20 [ 323.402698][T19166] FAULT_INJECTION: forcing a failure. [ 323.402698][T19166] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 323.412394][T19163] _copy_from_user+0x1c/0xd0 [ 323.412425][T19163] __se_sys_memfd_create+0x125/0x350 [ 323.445091][T19163] __x64_sys_memfd_create+0x2d/0x40 [ 323.450279][T19163] do_syscall_64+0x44/0xd0 [ 323.454691][T19163] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 323.460574][T19163] RIP: 0033:0x7f6f94c22e99 [ 323.464971][T19163] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 323.484621][T19163] RSP: 002b:00007f6f93d98f28 EFLAGS: 00000246 ORIG_RAX: 000000000000013f 17:06:51 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc01000a, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000003980)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d9", 0x4, 0x6800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d0f465001000005fd0f4655f00000000000001000c00000010000800000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}], 0x0, &(0x7f00000000c0)) [ 323.493017][T19163] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007f6f94c22e99 [ 323.501030][T19163] RDX: 0000000000022200 RSI: 0000000000000000 RDI: 00007f6f94c7c168 [ 323.508985][T19163] RBP: 0000000000000007 R08: 0000000000011100 R09: 00007f6f93d991d0 [ 323.516940][T19163] R10: 0000000000000007 R11: 0000000000000246 R12: 0000000008100000 [ 323.524958][T19163] R13: 0000000020000100 R14: 0000000008100000 R15: 00000000200000c0 [ 323.532942][T19163] 17:06:51 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc01000a, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000003980)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d0f465001000005fd0f4655f00000000000001000c00000010000800000000000af3010004", 0x2d, 0x11100}], 0x0, &(0x7f00000000c0)) (fail_nth: 3) [ 323.535983][T19166] CPU: 1 PID: 19166 Comm: syz-executor.5 Not tainted 5.16.0-syzkaller #0 [ 323.544480][T19166] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 323.554536][T19166] Call Trace: [ 323.556800][T19170] FAULT_INJECTION: forcing a failure. [ 323.556800][T19170] name failslab, interval 1, probability 0, space 0, times 0 [ 323.557846][T19166] [ 323.557854][T19166] dump_stack_lvl+0xd6/0x122 [ 323.577910][T19166] dump_stack+0x11/0x1b [ 323.582105][T19166] should_fail+0x23c/0x250 [ 323.586512][T19166] __alloc_pages+0x102/0x330 [ 323.591089][T19166] alloc_pages_vma+0x5ee/0x770 [ 323.595879][T19166] shmem_getpage_gfp+0x8bc/0x12c0 [ 323.600921][T19166] shmem_write_begin+0x7e/0x100 [ 323.605856][T19166] generic_perform_write+0x1c8/0x400 [ 323.611145][T19166] ? current_time+0xed/0x1a0 [ 323.615759][T19166] __generic_file_write_iter+0xf7/0x2b0 [ 323.621303][T19166] ? generic_write_checks+0x250/0x290 [ 323.626801][T19166] generic_file_write_iter+0x75/0x130 [ 323.632214][T19166] vfs_write+0x7f5/0x950 [ 323.637053][T19166] __x64_sys_pwrite64+0xf5/0x150 [ 323.641978][T19166] do_syscall_64+0x44/0xd0 [ 323.646437][T19166] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 323.652668][T19166] RIP: 0033:0x7fb452535e67 [ 323.657065][T19166] Code: 08 89 3c 24 48 89 4c 24 18 e8 e5 f8 ff ff 4c 8b 54 24 18 48 8b 54 24 10 41 89 c0 48 8b 74 24 08 8b 3c 24 b8 12 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 31 44 89 c7 48 89 04 24 e8 15 f9 ff ff 48 8b [ 323.676661][T19166] RSP: 002b:00007fb4516f8f00 EFLAGS: 00000293 ORIG_RAX: 0000000000000012 [ 323.685188][T19166] RAX: ffffffffffffffda RBX: 00007fb4525cc9c8 RCX: 00007fb452535e67 [ 323.693201][T19166] RDX: 0000000000000066 RSI: 0000000020010000 RDI: 0000000000000004 [ 323.701166][T19166] RBP: 0000000000000007 R08: 0000000000000000 R09: 00007fb4516f91d0 [ 323.709121][T19166] R10: 0000000000000400 R11: 0000000000000293 R12: 0000000000000004 [ 323.717158][T19166] R13: 0000000000000004 R14: 0000000020000200 R15: 0000000000000000 [ 323.725161][T19166] [ 323.728171][T19170] CPU: 0 PID: 19170 Comm: syz-executor.4 Not tainted 5.16.0-syzkaller #0 [ 323.728873][T19167] FAULT_INJECTION: forcing a failure. [ 323.728873][T19167] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 323.736621][T19170] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 323.759745][T19170] Call Trace: [ 323.763013][T19170] [ 323.765936][T19170] dump_stack_lvl+0xd6/0x122 [ 323.770525][T19170] dump_stack+0x11/0x1b [ 323.774668][T19170] should_fail+0x23c/0x250 [ 323.779128][T19170] ? shmem_alloc_inode+0x22/0x30 [ 323.784065][T19170] __should_failslab+0x81/0x90 [ 323.788814][T19170] ? shmem_match+0xa0/0xa0 [ 323.793217][T19170] should_failslab+0x5/0x20 [ 323.797768][T19170] kmem_cache_alloc+0x4f/0x320 [ 323.802527][T19170] ? shmem_match+0xa0/0xa0 [ 323.807039][T19170] shmem_alloc_inode+0x22/0x30 [ 323.811789][T19170] new_inode_pseudo+0x38/0x190 [ 323.816600][T19170] new_inode+0x21/0x100 [ 323.820799][T19170] shmem_get_inode+0xb7/0x490 [ 323.825470][T19170] __shmem_file_setup+0xf1/0x1d0 [ 323.830401][T19170] shmem_file_setup+0x37/0x40 [ 323.835100][T19170] __se_sys_memfd_create+0x1c1/0x350 [ 323.840493][T19170] __x64_sys_memfd_create+0x2d/0x40 [ 323.845687][T19170] do_syscall_64+0x44/0xd0 [ 323.850104][T19170] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 323.856208][T19170] RIP: 0033:0x7f6f94c22e99 [ 323.860606][T19170] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 323.880203][T19170] RSP: 002b:00007f6f93d98f28 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 323.888652][T19170] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007f6f94c22e99 [ 323.896607][T19170] RDX: 0000000000022200 RSI: 0000000000000000 RDI: 00007f6f94c7c168 [ 323.904702][T19170] RBP: 0000000000000007 R08: 0000000000011100 R09: 00007f6f93d991d0 [ 323.912661][T19170] R10: 0000000000000007 R11: 0000000000000246 R12: 0000000008100000 [ 323.920860][T19170] R13: 0000000020000100 R14: 0000000008100000 R15: 00000000200000c0 [ 323.928904][T19170] [ 323.931964][T19167] CPU: 1 PID: 19167 Comm: syz-executor.1 Not tainted 5.16.0-syzkaller #0 17:06:52 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc01000a, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000003980)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d0f465001000005fd0f4655f00000000000001000c00000010000800000000000af3010004", 0x2d, 0x11100}], 0x0, &(0x7f00000000c0)) (fail_nth: 4) [ 323.932650][T19166] loop5: detected capacity change from 0 to 264192 [ 323.940454][T19167] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 323.940465][T19167] Call Trace: [ 323.940471][T19167] [ 323.940478][T19167] dump_stack_lvl+0xd6/0x122 [ 323.959118][T19166] EXT4-fs (loop5): VFS: Can't find ext4 filesystem [ 323.960294][T19167] dump_stack+0x11/0x1b [ 323.978403][T19167] should_fail+0x23c/0x250 [ 323.982865][T19167] should_fail_usercopy+0x16/0x20 [ 323.987991][T19167] copy_page_from_iter_atomic+0x2f1/0xc60 [ 323.993783][T19167] ? shmem_write_begin+0x7e/0x100 [ 323.998808][T19167] generic_perform_write+0x211/0x400 [ 324.004090][T19167] ? current_time+0xed/0x1a0 [ 324.008664][T19167] __generic_file_write_iter+0xf7/0x2b0 [ 324.014259][T19167] ? generic_write_checks+0x250/0x290 [ 324.019631][T19167] generic_file_write_iter+0x75/0x130 [ 324.025123][T19167] vfs_write+0x7f5/0x950 [ 324.029349][T19167] __x64_sys_pwrite64+0xf5/0x150 [ 324.034277][T19167] do_syscall_64+0x44/0xd0 [ 324.038773][T19167] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 324.044710][T19167] RIP: 0033:0x7f0228574e67 [ 324.049191][T19167] Code: 08 89 3c 24 48 89 4c 24 18 e8 e5 f8 ff ff 4c 8b 54 24 18 48 8b 54 24 10 41 89 c0 48 8b 74 24 08 8b 3c 24 b8 12 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 31 44 89 c7 48 89 04 24 e8 15 f9 ff ff 48 8b [ 324.068818][T19167] RSP: 002b:00007f0227737f00 EFLAGS: 00000293 ORIG_RAX: 0000000000000012 [ 324.077265][T19167] RAX: ffffffffffffffda RBX: 00007f022860b9c8 RCX: 00007f0228574e67 [ 324.085280][T19167] RDX: 0000000000000066 RSI: 0000000020010000 RDI: 0000000000000004 [ 324.093248][T19167] RBP: 0000000000000007 R08: 0000000000000000 R09: 00007f02277381d0 [ 324.101210][T19167] R10: 0000000000000400 R11: 0000000000000293 R12: 0000000000000004 [ 324.109239][T19167] R13: 0000000000000004 R14: 0000000020000200 R15: 0000000000000000 [ 324.117306][T19167] [ 324.122004][T19167] loop1: detected capacity change from 0 to 264192 [ 324.130302][T19175] FAULT_INJECTION: forcing a failure. [ 324.130302][T19175] name failslab, interval 1, probability 0, space 0, times 0 [ 324.142984][T19175] CPU: 0 PID: 19175 Comm: syz-executor.4 Not tainted 5.16.0-syzkaller #0 [ 324.151415][T19175] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 324.161476][T19175] Call Trace: [ 324.164855][T19175] [ 324.167773][T19175] dump_stack_lvl+0xd6/0x122 [ 324.172393][T19175] dump_stack+0x11/0x1b [ 324.176531][T19175] should_fail+0x23c/0x250 [ 324.180931][T19175] ? security_inode_alloc+0x30/0x180 [ 324.186206][T19175] __should_failslab+0x81/0x90 [ 324.191061][T19175] should_failslab+0x5/0x20 [ 324.195559][T19175] kmem_cache_alloc+0x4f/0x320 [ 324.200368][T19175] security_inode_alloc+0x30/0x180 [ 324.205465][T19175] inode_init_always+0x214/0x3e0 [ 324.210400][T19175] ? shmem_match+0xa0/0xa0 [ 324.214803][T19175] new_inode_pseudo+0x6f/0x190 [ 324.219571][T19175] new_inode+0x21/0x100 [ 324.223744][T19175] shmem_get_inode+0xb7/0x490 [ 324.228432][T19175] __shmem_file_setup+0xf1/0x1d0 [ 324.233443][T19175] shmem_file_setup+0x37/0x40 [ 324.238195][T19175] __se_sys_memfd_create+0x1c1/0x350 [ 324.243500][T19175] __x64_sys_memfd_create+0x2d/0x40 [ 324.248772][T19175] do_syscall_64+0x44/0xd0 [ 324.253235][T19175] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 324.259175][T19175] RIP: 0033:0x7f6f94c22e99 [ 324.263666][T19175] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 324.283382][T19175] RSP: 002b:00007f6f93d98f28 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 324.291832][T19175] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007f6f94c22e99 [ 324.299785][T19175] RDX: 0000000000022200 RSI: 0000000000000000 RDI: 00007f6f94c7c168 [ 324.307813][T19175] RBP: 0000000000000007 R08: 0000000000011100 R09: 00007f6f93d991d0 [ 324.315805][T19175] R10: 0000000000000007 R11: 0000000000000246 R12: 0000000008100000 [ 324.323876][T19175] R13: 0000000020000100 R14: 0000000008100000 R15: 00000000200000c0 [ 324.331834][T19175] 17:06:52 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc01000a, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000003980)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="80", 0x1, 0x11100}], 0x0, &(0x7f00000000c0)) 17:06:52 executing program 2: clock_adjtime(0x7, &(0x7f0000000000)={0x8000, 0x62, 0xff, 0x1, 0x3, 0x1ff, 0x3ff, 0x4, 0xff, 0x20, 0x6, 0x401, 0x20, 0x0, 0x1ff, 0x8000, 0xfffffffffffffffd, 0x400, 0x8, 0x100000000, 0x2, 0x8, 0xf32, 0x4, 0x6, 0x80}) clock_adjtime(0x2, &(0x7f0000000100)={0xd9, 0x9, 0x1, 0x2, 0x1f, 0x78, 0x4b1, 0x0, 0x401, 0x5, 0x8, 0x1, 0x101, 0x100000001, 0x7, 0x1fc, 0x9, 0x9, 0x0, 0x9, 0x8, 0x3, 0xff, 0x7, 0x73, 0x946c}) clock_adjtime(0x6, &(0x7f0000000200)={0x4, 0x1, 0x100, 0x6, 0x2, 0x6, 0x1, 0x1dd, 0x9, 0x1000000000000000, 0x0, 0x6, 0x1, 0x1, 0x9, 0x5, 0x3023, 0x2, 0x4, 0xfffffffffffffff9, 0x429, 0x3, 0x0, 0x9, 0xffffffffffffff05, 0x1000}) clock_adjtime(0x3, &(0x7f0000000300)={0x0, 0x8, 0x9, 0x9, 0x9, 0x9, 0x6, 0x9, 0x8, 0x1, 0xd0fc, 0x55, 0x2, 0x0, 0x1, 0x1f, 0x100000001, 0x8f44, 0x53, 0x0, 0x3, 0x140000000000, 0x9, 0x8000, 0x0, 0x10001}) r0 = syz_mount_image$iso9660(&(0x7f0000000400), &(0x7f0000000440)='./file0\x00', 0x4, 0x1, &(0x7f0000000480)=[{0xfffffffffffffffe, 0x0, 0x3}], 0x2014400, &(0x7f00000004c0)={[{@check_relaxed}, {@dmode}, {@check_relaxed}], [{@euid_lt={'euid<', 0xee01}}, {@euid_eq}, {@rootcontext={'rootcontext', 0x3d, 'staff_u'}}, {@obj_user={'obj_user', 0x3d, '#-_'}}, {@rootcontext={'rootcontext', 0x3d, 'staff_u'}}]}) faccessat(r0, &(0x7f0000000580)='./file0\x00', 0x88) clock_adjtime(0x4, &(0x7f00000005c0)={0x80000000, 0x100000000, 0xba, 0x80000000, 0x4, 0x20d4e190, 0x7, 0x400, 0x33, 0x7a, 0x1, 0x465d, 0x7f, 0x5, 0x3, 0x1, 0x0, 0x8, 0x7, 0x7ff, 0x1, 0x4, 0x3f, 0x7fff, 0x700b, 0x96}) r1 = accept$unix(0xffffffffffffffff, 0x0, &(0x7f00000006c0)) getsockname$unix(r1, &(0x7f0000000700), &(0x7f0000000780)=0x6e) clock_adjtime(0x3, &(0x7f00000007c0)={0x6, 0x6, 0x7, 0x8000, 0x7ff, 0x5c, 0x401, 0x2, 0x9, 0x4, 0x0, 0x61, 0x2, 0x9b71, 0x100000000, 0x7fffffff, 0x322, 0xc70d, 0x9, 0xd, 0x9, 0x0, 0x9, 0x1a1f00000000, 0xffffffffffffffff, 0x9}) clock_adjtime(0x6, &(0x7f00000008c0)={0x4, 0x9, 0x3, 0xfffffffffffffff7, 0xb31, 0x1, 0x1, 0x2, 0x538, 0x0, 0x401, 0x1, 0xdd, 0xfffffffffffffff7, 0xec54, 0x4, 0x100000001, 0x0, 0xa, 0x1, 0x7ff, 0xcd, 0xf2, 0x80, 0x7, 0x8000}) clock_adjtime(0x0, &(0x7f00000009c0)={0x8, 0xff, 0x81, 0x2, 0x100000001, 0x11, 0x5, 0x1, 0x1, 0x9, 0x1000, 0x8, 0xdf6c, 0x9, 0x8, 0x1004000000000000, 0x1ff, 0x3, 0x6, 0xf5, 0x80000, 0x1, 0xfffffffffffffd6d, 0x2, 0x6, 0xfa}) r2 = socket$unix(0x1, 0x5, 0x0) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f0000000ac0)={'wlan0\x00'}) mq_timedreceive(0xffffffffffffffff, &(0x7f0000000b00)=""/4096, 0x1000, 0x80, &(0x7f0000001b00)={0x0, 0x989680}) r3 = creat(&(0x7f0000001b40)='./file0\x00', 0x1) mknodat(r3, &(0x7f0000001b80)='./file1\x00', 0x4, 0x0) clock_adjtime(0x7, &(0x7f0000001bc0)={0xfff, 0x7fff, 0x0, 0x2, 0xfdc, 0x54, 0x8fa, 0x3f41, 0x0, 0x4, 0x4, 0x5, 0x101, 0x5, 0x4, 0x9, 0x9, 0x30e, 0x3f, 0x2, 0x7f, 0x7, 0x6, 0x4, 0x3ff, 0x100000000}) clock_adjtime(0x2, &(0x7f0000001cc0)={0x0, 0x6, 0x7, 0xe5, 0x5, 0x6, 0x10, 0x7, 0x281, 0x40, 0x1, 0x0, 0x1, 0x10001, 0x5, 0x100, 0x0, 0x4, 0xffffffffffffe001, 0xdf, 0x7f, 0x8000, 0x9, 0x400, 0xfffffffffffffe00, 0x3f}) 17:06:52 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc01000a, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000003980)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d0f465001000005fd0f4655f00000000000001000c00000010000800000000000af3010004", 0x2d, 0x11100}], 0x0, &(0x7f00000000c0)) (fail_nth: 5) [ 324.363838][T19178] loop0: detected capacity change from 0 to 264192 [ 324.383437][T19167] EXT4-fs warning (device loop1): ext4_multi_mount_protect:385: Unable to create kmmpd thread for loop1. [ 324.392259][T19182] FAULT_INJECTION: forcing a failure. [ 324.392259][T19182] name failslab, interval 1, probability 0, space 0, times 0 [ 324.407336][T19182] CPU: 1 PID: 19182 Comm: syz-executor.4 Not tainted 5.16.0-syzkaller #0 [ 324.415955][T19182] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 324.416362][T19184] loop5: detected capacity change from 0 to 264192 [ 324.426008][T19182] Call Trace: [ 324.426016][T19182] [ 324.426023][T19182] dump_stack_lvl+0xd6/0x122 [ 324.426066][T19182] dump_stack+0x11/0x1b [ 324.447599][T19182] should_fail+0x23c/0x250 [ 324.452278][T19182] ? __d_alloc+0x36/0x370 [ 324.456615][T19182] __should_failslab+0x81/0x90 [ 324.461457][T19182] should_failslab+0x5/0x20 [ 324.465983][T19182] kmem_cache_alloc+0x4f/0x320 [ 324.470809][T19182] ? security_inode_alloc+0x138/0x180 [ 324.476247][T19182] ? __init_rwsem+0x59/0x70 [ 324.480733][T19182] __d_alloc+0x36/0x370 [ 324.484869][T19182] ? debug_smp_processor_id+0x18/0x20 [ 324.490281][T19182] d_alloc_pseudo+0x1a/0x50 [ 324.494769][T19182] alloc_file_pseudo+0x77/0x150 [ 324.499714][T19182] __shmem_file_setup+0x14c/0x1d0 [ 324.504976][T19182] shmem_file_setup+0x37/0x40 [ 324.509656][T19182] __se_sys_memfd_create+0x1c1/0x350 [ 324.514989][T19182] __x64_sys_memfd_create+0x2d/0x40 [ 324.520202][T19182] do_syscall_64+0x44/0xd0 [ 324.524623][T19182] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 324.530577][T19182] RIP: 0033:0x7f6f94c22e99 [ 324.535037][T19182] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 324.554627][T19182] RSP: 002b:00007f6f93d98f28 EFLAGS: 00000246 ORIG_RAX: 000000000000013f 17:06:52 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc01000a, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000011", 0x9, 0x4e0}, {&(0x7f0000010200)="0100000000000500", 0x8, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000003980)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d0f465001000005fd0f4655f00000000000001000c000000100008", 0x23, 0x11100}], 0x0, &(0x7f00000000c0)) [ 324.563029][T19182] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007f6f94c22e99 [ 324.570995][T19182] RDX: 0000000000022200 RSI: 0000000000000000 RDI: 00007f6f94c7c168 [ 324.579397][T19182] RBP: 0000000000000007 R08: 0000000000011100 R09: 00007f6f93d991d0 [ 324.587355][T19182] R10: 0000000000000007 R11: 0000000000000246 R12: 0000000008100000 [ 324.595336][T19182] R13: 0000000020000100 R14: 0000000008100000 R15: 00000000200000c0 [ 324.603330][T19182] [ 324.613169][T19186] SELinux: duplicate or incompatible mount options [ 324.621776][T19187] loop3: detected capacity change from 0 to 264192 [ 324.637997][T19187] EXT4-fs warning (device loop3): read_mmp_block:107: Error -117 while reading MMP block 0 [ 324.653479][T19178] EXT4-fs (loop0): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock 17:06:52 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc01000a, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000003980)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d0f465001000005fd0f4655f00000000000001", 0x1b, 0x11100}], 0x0, &(0x7f00000000c0)) 17:06:52 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc01000a, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000003980)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d0f465001000005fd0f4655f00000000000001000c00000010000800000000000af3010004", 0x2d, 0x11100}], 0x0, &(0x7f00000000c0)) (fail_nth: 6) 17:06:52 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc01000a, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000011", 0x9, 0x4e0}, {&(0x7f0000010200)="01000000000005000c", 0x9}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000003980)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d0f465001000005fd0f4655f00000000000001000c000000100008", 0x23, 0x11100}], 0x0, &(0x7f00000000c0)) [ 324.663277][T19178] EXT4-fs (loop0): group descriptors corrupted! [ 324.700299][T19191] FAULT_INJECTION: forcing a failure. [ 324.700299][T19191] name failslab, interval 1, probability 0, space 0, times 0 [ 324.714074][T19191] CPU: 1 PID: 19191 Comm: syz-executor.4 Not tainted 5.16.0-syzkaller #0 [ 324.722485][T19191] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 324.732563][T19191] Call Trace: [ 324.735836][T19191] [ 324.738764][T19191] dump_stack_lvl+0xd6/0x122 [ 324.741770][T19194] loop1: detected capacity change from 0 to 264192 [ 324.743443][T19191] dump_stack+0x11/0x1b [ 324.743468][T19191] should_fail+0x23c/0x250 [ 324.758551][T19191] ? __alloc_file+0x2e/0x1a0 [ 324.763301][T19191] __should_failslab+0x81/0x90 [ 324.768206][T19191] should_failslab+0x5/0x20 [ 324.772728][T19191] kmem_cache_alloc+0x4f/0x320 [ 324.777513][T19191] __alloc_file+0x2e/0x1a0 [ 324.781927][T19191] alloc_empty_file+0xcd/0x1c0 [ 324.786677][T19191] alloc_file+0x3a/0x280 [ 324.790925][T19191] alloc_file_pseudo+0xfa/0x150 [ 324.795807][T19191] __shmem_file_setup+0x14c/0x1d0 [ 324.800820][T19191] shmem_file_setup+0x37/0x40 [ 324.805482][T19191] __se_sys_memfd_create+0x1c1/0x350 [ 324.810772][T19191] __x64_sys_memfd_create+0x2d/0x40 [ 324.815969][T19191] do_syscall_64+0x44/0xd0 [ 324.820374][T19191] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 324.826288][T19191] RIP: 0033:0x7f6f94c22e99 [ 324.830702][T19191] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 324.850680][T19191] RSP: 002b:00007f6f93d98f28 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 324.859119][T19191] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007f6f94c22e99 [ 324.867245][T19191] RDX: 0000000000022200 RSI: 0000000000000000 RDI: 00007f6f94c7c168 [ 324.875241][T19191] RBP: 0000000000000007 R08: 0000000000011100 R09: 00007f6f93d991d0 [ 324.883195][T19191] R10: 0000000000000007 R11: 0000000000000246 R12: 0000000008100000 [ 324.891263][T19191] R13: 0000000020000100 R14: 0000000008100000 R15: 00000000200000c0 17:06:53 executing program 2: clock_adjtime(0x7, &(0x7f0000000000)={0x8000, 0x62, 0xff, 0x1, 0x3, 0x1ff, 0x3ff, 0x4, 0xff, 0x20, 0x6, 0x401, 0x20, 0x0, 0x1ff, 0x8000, 0xfffffffffffffffd, 0x400, 0x8, 0x100000000, 0x2, 0x8, 0xf32, 0x4, 0x6, 0x80}) clock_adjtime(0x2, &(0x7f0000000100)={0xd9, 0x9, 0x1, 0x2, 0x1f, 0x78, 0x4b1, 0x0, 0x401, 0x5, 0x8, 0x1, 0x101, 0x100000001, 0x7, 0x1fc, 0x9, 0x9, 0x0, 0x9, 0x8, 0x3, 0xff, 0x7, 0x73, 0x946c}) clock_adjtime(0x6, &(0x7f0000000200)={0x4, 0x1, 0x100, 0x6, 0x2, 0x6, 0x1, 0x1dd, 0x9, 0x1000000000000000, 0x0, 0x6, 0x1, 0x1, 0x9, 0x5, 0x3023, 0x2, 0x4, 0xfffffffffffffff9, 0x429, 0x3, 0x0, 0x9, 0xffffffffffffff05, 0x1000}) clock_adjtime(0x3, &(0x7f0000000300)={0x0, 0x8, 0x9, 0x9, 0x9, 0x9, 0x6, 0x9, 0x8, 0x1, 0xd0fc, 0x55, 0x2, 0x0, 0x1, 0x1f, 0x100000001, 0x8f44, 0x53, 0x0, 0x3, 0x140000000000, 0x9, 0x8000, 0x0, 0x10001}) r0 = syz_mount_image$iso9660(&(0x7f0000000400), &(0x7f0000000440)='./file0\x00', 0x4, 0x1, &(0x7f0000000480)=[{0xfffffffffffffffe, 0x0, 0x3}], 0x2014400, &(0x7f00000004c0)={[{@check_relaxed}, {@dmode}, {@check_relaxed}], [{@euid_lt={'euid<', 0xee01}}, {@euid_eq}, {@rootcontext={'rootcontext', 0x3d, 'staff_u'}}, {@obj_user={'obj_user', 0x3d, '#-_'}}, {@rootcontext={'rootcontext', 0x3d, 'staff_u'}}]}) faccessat(r0, &(0x7f0000000580)='./file0\x00', 0x88) clock_adjtime(0x4, &(0x7f00000005c0)={0x80000000, 0x100000000, 0xba, 0x80000000, 0x4, 0x20d4e190, 0x7, 0x400, 0x33, 0x7a, 0x1, 0x465d, 0x7f, 0x5, 0x3, 0x1, 0x0, 0x8, 0x7, 0x7ff, 0x1, 0x4, 0x3f, 0x7fff, 0x700b, 0x96}) r1 = accept$unix(0xffffffffffffffff, 0x0, &(0x7f00000006c0)) getsockname$unix(r1, &(0x7f0000000700), &(0x7f0000000780)=0x6e) clock_adjtime(0x3, &(0x7f00000007c0)={0x6, 0x6, 0x7, 0x8000, 0x7ff, 0x5c, 0x401, 0x2, 0x9, 0x4, 0x0, 0x61, 0x2, 0x9b71, 0x100000000, 0x7fffffff, 0x322, 0xc70d, 0x9, 0xd, 0x9, 0x0, 0x9, 0x1a1f00000000, 0xffffffffffffffff, 0x9}) clock_adjtime(0x6, &(0x7f00000008c0)={0x4, 0x9, 0x3, 0xfffffffffffffff7, 0xb31, 0x1, 0x1, 0x2, 0x538, 0x0, 0x401, 0x1, 0xdd, 0xfffffffffffffff7, 0xec54, 0x4, 0x100000001, 0x0, 0xa, 0x1, 0x7ff, 0xcd, 0xf2, 0x80, 0x7, 0x8000}) clock_adjtime(0x0, &(0x7f00000009c0)={0x8, 0xff, 0x81, 0x2, 0x100000001, 0x11, 0x5, 0x1, 0x1, 0x9, 0x1000, 0x8, 0xdf6c, 0x9, 0x8, 0x1004000000000000, 0x1ff, 0x3, 0x6, 0xf5, 0x80000, 0x1, 0xfffffffffffffd6d, 0x2, 0x6, 0xfa}) r2 = socket$unix(0x1, 0x5, 0x0) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f0000000ac0)={'wlan0\x00'}) mq_timedreceive(0xffffffffffffffff, &(0x7f0000000b00)=""/4096, 0x1000, 0x80, &(0x7f0000001b00)={0x0, 0x989680}) r3 = creat(&(0x7f0000001b40)='./file0\x00', 0x1) mknodat(r3, &(0x7f0000001b80)='./file1\x00', 0x4, 0x0) clock_adjtime(0x8, &(0x7f0000001bc0)={0xfff, 0x7fff, 0x0, 0x2, 0xfdc, 0x54, 0x8fa, 0x3f41, 0x0, 0x4, 0x4, 0x5, 0x101, 0x5, 0x4, 0x9, 0x9, 0x30e, 0x3f, 0x2, 0x7f, 0x7, 0x6, 0x4, 0x3ff, 0x100000000}) clock_adjtime(0x2, &(0x7f0000001cc0)={0x0, 0x6, 0x7, 0xe5, 0x5, 0x6, 0x10, 0x7, 0x281, 0x40, 0x1, 0x0, 0x1, 0x10001, 0x5, 0x100, 0x0, 0x4, 0xffffffffffffe001, 0xdf, 0x7f, 0x8000, 0x9, 0x400, 0xfffffffffffffe00, 0x3f}) [ 324.899314][T19191] [ 324.917025][T19184] EXT4-fs error (device loop5): ext4_quota_enable:6323: comm syz-executor.5: Bad quota inode # 3 [ 324.940962][T19202] SELinux: duplicate or incompatible mount options 17:06:53 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc01000a, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000003980)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d0f465001000005fd0f4655f00000000000001000c00000010000800000000000af3010004", 0x2d, 0x11100}], 0x0, &(0x7f00000000c0)) (fail_nth: 7) 17:06:53 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc01000a, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000003980)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d9", 0x4, 0x6800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d0f465001000005fd0f4655f00000000000001000c00000010000800000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}], 0x0, &(0x7f00000000c0)) [ 324.947768][T19184] EXT4-fs warning (device loop5): ext4_enable_quotas:6363: Failed to enable quota tracking (type=0, err=-116). Please run e2fsck to fix. [ 324.961225][T19204] FAULT_INJECTION: forcing a failure. [ 324.961225][T19204] name failslab, interval 1, probability 0, space 0, times 0 [ 324.966886][T19200] loop3: detected capacity change from 0 to 264192 [ 324.974483][T19204] CPU: 0 PID: 19204 Comm: syz-executor.4 Not tainted 5.16.0-syzkaller #0 [ 324.989418][T19204] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 324.999473][T19204] Call Trace: [ 325.002755][T19204] [ 325.005680][T19204] dump_stack_lvl+0xd6/0x122 [ 325.010275][T19204] dump_stack+0x11/0x1b [ 325.014453][T19204] should_fail+0x23c/0x250 [ 325.018869][T19204] ? security_file_alloc+0x30/0x190 [ 325.024147][T19204] __should_failslab+0x81/0x90 [ 325.028965][T19204] should_failslab+0x5/0x20 [ 325.033472][T19204] kmem_cache_alloc+0x4f/0x320 [ 325.038340][T19204] security_file_alloc+0x30/0x190 [ 325.043355][T19204] __alloc_file+0x83/0x1a0 [ 325.047757][T19204] alloc_empty_file+0xcd/0x1c0 [ 325.052538][T19204] alloc_file+0x3a/0x280 [ 325.056768][T19204] alloc_file_pseudo+0xfa/0x150 [ 325.061603][T19204] __shmem_file_setup+0x14c/0x1d0 [ 325.066616][T19204] shmem_file_setup+0x37/0x40 [ 325.071349][T19204] __se_sys_memfd_create+0x1c1/0x350 [ 325.076773][T19204] __x64_sys_memfd_create+0x2d/0x40 [ 325.082110][T19204] do_syscall_64+0x44/0xd0 [ 325.086519][T19204] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 325.092580][T19204] RIP: 0033:0x7f6f94c22e99 [ 325.096977][T19204] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 325.116567][T19204] RSP: 002b:00007f6f93d98f28 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 325.125072][T19204] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007f6f94c22e99 [ 325.133233][T19204] RDX: 0000000000022200 RSI: 0000000000000000 RDI: 00007f6f94c7c168 [ 325.141344][T19204] RBP: 0000000000000007 R08: 0000000000011100 R09: 00007f6f93d991d0 [ 325.149437][T19204] R10: 0000000000000007 R11: 0000000000000246 R12: 0000000008100000 [ 325.157392][T19204] R13: 0000000020000100 R14: 0000000008100000 R15: 00000000200000c0 [ 325.165376][T19204] [ 325.173792][T19208] loop0: detected capacity change from 0 to 264192 [ 325.184120][T19208] EXT4-fs (loop0): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 325.193946][T19208] EXT4-fs (loop0): group descriptors corrupted! 17:06:53 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc01000a, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000003980)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d9", 0x4, 0x6800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d0f465001000005fd0f4655f00000000000001000c00000010000800000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}], 0x0, &(0x7f00000000c0)) 17:06:53 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc01000a, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000003980)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d9", 0x4, 0x6800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d0f465001000005fd0f4655f00000000000001000c00000010000800000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}], 0x0, &(0x7f00000000c0)) [ 325.207731][T19194] EXT4-fs warning (device loop1): ext4_enable_quotas:6363: Failed to enable quota tracking (type=0, err=-22). Please run e2fsck to fix. [ 325.212848][T19184] EXT4-fs (loop5): mount failed [ 325.241719][T19194] EXT4-fs (loop1): mount failed 17:06:53 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc010009, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000003980)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="80", 0x1, 0x11100}], 0x0, &(0x7f00000000c0)) 17:06:53 executing program 2: clock_adjtime(0x7, &(0x7f0000000000)={0x8000, 0x62, 0xff, 0x1, 0x3, 0x1ff, 0x3ff, 0x4, 0xff, 0x20, 0x6, 0x401, 0x20, 0x0, 0x1ff, 0x8000, 0xfffffffffffffffd, 0x400, 0x8, 0x100000000, 0x2, 0x8, 0xf32, 0x4, 0x6, 0x80}) clock_adjtime(0x2, &(0x7f0000000100)={0xd9, 0x9, 0x1, 0x2, 0x1f, 0x78, 0x4b1, 0x0, 0x401, 0x5, 0x8, 0x1, 0x101, 0x100000001, 0x7, 0x1fc, 0x9, 0x9, 0x0, 0x9, 0x8, 0x3, 0xff, 0x7, 0x73, 0x946c}) clock_adjtime(0x6, &(0x7f0000000200)={0x4, 0x1, 0x100, 0x6, 0x2, 0x6, 0x1, 0x1dd, 0x9, 0x1000000000000000, 0x0, 0x6, 0x1, 0x1, 0x9, 0x5, 0x3023, 0x2, 0x4, 0xfffffffffffffff9, 0x429, 0x3, 0x0, 0x9, 0xffffffffffffff05, 0x1000}) clock_adjtime(0x3, &(0x7f0000000300)={0x0, 0x8, 0x9, 0x9, 0x9, 0x9, 0x6, 0x9, 0x8, 0x1, 0xd0fc, 0x55, 0x2, 0x0, 0x1, 0x1f, 0x100000001, 0x8f44, 0x53, 0x0, 0x3, 0x140000000000, 0x9, 0x8000, 0x0, 0x10001}) r0 = syz_mount_image$iso9660(&(0x7f0000000400), &(0x7f0000000440)='./file0\x00', 0x4, 0x1, &(0x7f0000000480)=[{0xfffffffffffffffe, 0x0, 0x3}], 0x2014400, &(0x7f00000004c0)={[{@check_relaxed}, {@dmode}, {@check_relaxed}], [{@euid_lt={'euid<', 0xee01}}, {@euid_eq}, {@rootcontext={'rootcontext', 0x3d, 'staff_u'}}, {@obj_user={'obj_user', 0x3d, '#-_'}}, {@rootcontext={'rootcontext', 0x3d, 'staff_u'}}]}) faccessat(r0, &(0x7f0000000580)='./file0\x00', 0x88) clock_adjtime(0x4, &(0x7f00000005c0)={0x80000000, 0x100000000, 0xba, 0x80000000, 0x4, 0x20d4e190, 0x7, 0x400, 0x33, 0x7a, 0x1, 0x465d, 0x7f, 0x5, 0x3, 0x1, 0x0, 0x8, 0x7, 0x7ff, 0x1, 0x4, 0x3f, 0x7fff, 0x700b, 0x96}) r1 = accept$unix(0xffffffffffffffff, 0x0, &(0x7f00000006c0)) getsockname$unix(r1, &(0x7f0000000700), &(0x7f0000000780)=0x6e) clock_adjtime(0x3, &(0x7f00000007c0)={0x6, 0x6, 0x7, 0x8000, 0x7ff, 0x5c, 0x401, 0x2, 0x9, 0x4, 0x0, 0x61, 0x2, 0x9b71, 0x100000000, 0x7fffffff, 0x322, 0xc70d, 0x9, 0xd, 0x9, 0x0, 0x9, 0x1a1f00000000, 0xffffffffffffffff, 0x9}) clock_adjtime(0x6, &(0x7f00000008c0)={0x4, 0x9, 0x3, 0xfffffffffffffff7, 0xb31, 0x1, 0x1, 0x2, 0x538, 0x0, 0x401, 0x1, 0xdd, 0xfffffffffffffff7, 0xec54, 0x4, 0x100000001, 0x0, 0xa, 0x1, 0x7ff, 0xcd, 0xf2, 0x80, 0x7, 0x8000}) clock_adjtime(0x0, &(0x7f00000009c0)={0x8, 0xff, 0x81, 0x2, 0x100000001, 0x11, 0x5, 0x1, 0x1, 0x9, 0x1000, 0x8, 0xdf6c, 0x9, 0x8, 0x1004000000000000, 0x1ff, 0x3, 0x6, 0xf5, 0x80000, 0x1, 0xfffffffffffffd6d, 0x2, 0x6, 0xfa}) r2 = socket$unix(0x1, 0x5, 0x0) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f0000000ac0)={'wlan0\x00'}) mq_timedreceive(0xffffffffffffffff, &(0x7f0000000b00)=""/4096, 0x1000, 0x80, &(0x7f0000001b00)={0x0, 0x989680}) r3 = creat(&(0x7f0000001b40)='./file0\x00', 0x1) mknodat(r3, &(0x7f0000001b80)='./file1\x00', 0x4, 0x0) clock_adjtime(0xa, &(0x7f0000001bc0)={0xfff, 0x7fff, 0x0, 0x2, 0xfdc, 0x54, 0x8fa, 0x3f41, 0x0, 0x4, 0x4, 0x5, 0x101, 0x5, 0x4, 0x9, 0x9, 0x30e, 0x3f, 0x2, 0x7f, 0x7, 0x6, 0x4, 0x3ff, 0x100000000}) clock_adjtime(0x2, &(0x7f0000001cc0)={0x0, 0x6, 0x7, 0xe5, 0x5, 0x6, 0x10, 0x7, 0x281, 0x40, 0x1, 0x0, 0x1, 0x10001, 0x5, 0x100, 0x0, 0x4, 0xffffffffffffe001, 0xdf, 0x7f, 0x8000, 0x9, 0x400, 0xfffffffffffffe00, 0x3f}) 17:06:53 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc01000a, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000003980)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d0f465001000005fd0f4655f00000000000001000c00000010000800000000000af3010004", 0x2d, 0x11100}], 0x0, &(0x7f00000000c0)) (fail_nth: 8) [ 325.277638][T19200] EXT4-fs warning (device loop3): read_mmp_block:107: Error -117 while reading MMP block 0 [ 325.303255][T19215] SELinux: duplicate or incompatible mount options [ 325.308640][T19217] FAULT_INJECTION: forcing a failure. [ 325.308640][T19217] name fail_page_alloc, interval 1, probability 0, space 0, times 0 17:06:53 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc01000a, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000011", 0x9, 0x4e0}, {&(0x7f0000010200)="01000000000005000c", 0x9}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000003980)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d0f465001000005fd0f4655f00000000000001000c000000100008", 0x23, 0x11100}], 0x0, &(0x7f00000000c0)) [ 325.323092][T19217] CPU: 1 PID: 19217 Comm: syz-executor.4 Not tainted 5.16.0-syzkaller #0 [ 325.331534][T19217] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 325.341671][T19217] Call Trace: [ 325.344991][T19217] [ 325.346151][T19219] loop0: detected capacity change from 0 to 264192 [ 325.347913][T19217] dump_stack_lvl+0xd6/0x122 [ 325.347940][T19217] dump_stack+0x11/0x1b [ 325.363279][T19217] should_fail+0x23c/0x250 [ 325.367772][T19217] __alloc_pages+0x102/0x330 [ 325.372365][T19217] alloc_pages_vma+0x5ee/0x770 [ 325.377195][T19217] shmem_getpage_gfp+0x8bc/0x12c0 [ 325.382233][T19217] shmem_write_begin+0x7e/0x100 [ 325.387089][T19217] generic_perform_write+0x1c8/0x400 [ 325.387713][T19219] EXT4-fs error (device loop0): ext4_quota_enable:6323: comm syz-executor.0: Bad quota inode # 3 [ 325.392453][T19217] ? current_time+0xed/0x1a0 [ 325.403724][T19219] EXT4-fs warning (device loop0): ext4_enable_quotas:6363: Failed to enable quota tracking (type=0, err=-116). Please run e2fsck to fix. [ 325.407550][T19217] __generic_file_write_iter+0xf7/0x2b0 [ 325.407580][T19217] ? generic_write_checks+0x250/0x290 [ 325.422553][T19219] EXT4-fs (loop0): mount failed [ 325.427069][T19217] generic_file_write_iter+0x75/0x130 [ 325.442612][T19217] vfs_write+0x7f5/0x950 [ 325.446858][T19217] __x64_sys_pwrite64+0xf5/0x150 [ 325.451928][T19217] do_syscall_64+0x44/0xd0 [ 325.456371][T19217] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 325.462264][T19217] RIP: 0033:0x7f6f94bd5e67 [ 325.466732][T19217] Code: 08 89 3c 24 48 89 4c 24 18 e8 e5 f8 ff ff 4c 8b 54 24 18 48 8b 54 24 10 41 89 c0 48 8b 74 24 08 8b 3c 24 b8 12 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 31 44 89 c7 48 89 04 24 e8 15 f9 ff ff 48 8b [ 325.486336][T19217] RSP: 002b:00007f6f93d98f00 EFLAGS: 00000293 ORIG_RAX: 0000000000000012 [ 325.495002][T19217] RAX: ffffffffffffffda RBX: 00007f6f94c6c9c8 RCX: 00007f6f94bd5e67 [ 325.503034][T19217] RDX: 0000000000000066 RSI: 0000000020010000 RDI: 0000000000000004 [ 325.511016][T19217] RBP: 0000000000000007 R08: 0000000000000000 R09: 00007f6f93d991d0 [ 325.518971][T19217] R10: 0000000000000400 R11: 0000000000000293 R12: 0000000000000004 [ 325.526921][T19217] R13: 0000000000000004 R14: 0000000020000200 R15: 0000000000000000 [ 325.534925][T19217] [ 325.546783][T19226] loop3: detected capacity change from 0 to 264192 [ 325.561892][T19217] loop4: detected capacity change from 0 to 264192 17:06:53 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc010002, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000003980)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d0f465001000005fd0f4655f00000000000001", 0x1b, 0x11100}], 0x0, &(0x7f00000000c0)) 17:06:53 executing program 2: clock_adjtime(0x7, &(0x7f0000000000)={0x8000, 0x62, 0xff, 0x1, 0x3, 0x1ff, 0x3ff, 0x4, 0xff, 0x20, 0x6, 0x401, 0x20, 0x0, 0x1ff, 0x8000, 0xfffffffffffffffd, 0x400, 0x8, 0x100000000, 0x2, 0x8, 0xf32, 0x4, 0x6, 0x80}) clock_adjtime(0x2, &(0x7f0000000100)={0xd9, 0x9, 0x1, 0x2, 0x1f, 0x78, 0x4b1, 0x0, 0x401, 0x5, 0x8, 0x1, 0x101, 0x100000001, 0x7, 0x1fc, 0x9, 0x9, 0x0, 0x9, 0x8, 0x3, 0xff, 0x7, 0x73, 0x946c}) clock_adjtime(0x6, &(0x7f0000000200)={0x4, 0x1, 0x100, 0x6, 0x2, 0x6, 0x1, 0x1dd, 0x9, 0x1000000000000000, 0x0, 0x6, 0x1, 0x1, 0x9, 0x5, 0x3023, 0x2, 0x4, 0xfffffffffffffff9, 0x429, 0x3, 0x0, 0x9, 0xffffffffffffff05, 0x1000}) clock_adjtime(0x3, &(0x7f0000000300)={0x0, 0x8, 0x9, 0x9, 0x9, 0x9, 0x6, 0x9, 0x8, 0x1, 0xd0fc, 0x55, 0x2, 0x0, 0x1, 0x1f, 0x100000001, 0x8f44, 0x53, 0x0, 0x3, 0x140000000000, 0x9, 0x8000, 0x0, 0x10001}) r0 = syz_mount_image$iso9660(&(0x7f0000000400), &(0x7f0000000440)='./file0\x00', 0x4, 0x1, &(0x7f0000000480)=[{0xfffffffffffffffe, 0x0, 0x3}], 0x2014400, &(0x7f00000004c0)={[{@check_relaxed}, {@dmode}, {@check_relaxed}], [{@euid_lt={'euid<', 0xee01}}, {@euid_eq}, {@rootcontext={'rootcontext', 0x3d, 'staff_u'}}, {@obj_user={'obj_user', 0x3d, '#-_'}}, {@rootcontext={'rootcontext', 0x3d, 'staff_u'}}]}) faccessat(r0, &(0x7f0000000580)='./file0\x00', 0x88) clock_adjtime(0x4, &(0x7f00000005c0)={0x80000000, 0x100000000, 0xba, 0x80000000, 0x4, 0x20d4e190, 0x7, 0x400, 0x33, 0x7a, 0x1, 0x465d, 0x7f, 0x5, 0x3, 0x1, 0x0, 0x8, 0x7, 0x7ff, 0x1, 0x4, 0x3f, 0x7fff, 0x700b, 0x96}) r1 = accept$unix(0xffffffffffffffff, 0x0, &(0x7f00000006c0)) getsockname$unix(r1, &(0x7f0000000700), &(0x7f0000000780)=0x6e) clock_adjtime(0x3, &(0x7f00000007c0)={0x6, 0x6, 0x7, 0x8000, 0x7ff, 0x5c, 0x401, 0x2, 0x9, 0x4, 0x0, 0x61, 0x2, 0x9b71, 0x100000000, 0x7fffffff, 0x322, 0xc70d, 0x9, 0xd, 0x9, 0x0, 0x9, 0x1a1f00000000, 0xffffffffffffffff, 0x9}) clock_adjtime(0x6, &(0x7f00000008c0)={0x4, 0x9, 0x3, 0xfffffffffffffff7, 0xb31, 0x1, 0x1, 0x2, 0x538, 0x0, 0x401, 0x1, 0xdd, 0xfffffffffffffff7, 0xec54, 0x4, 0x100000001, 0x0, 0xa, 0x1, 0x7ff, 0xcd, 0xf2, 0x80, 0x7, 0x8000}) clock_adjtime(0x0, &(0x7f00000009c0)={0x8, 0xff, 0x81, 0x2, 0x100000001, 0x11, 0x5, 0x1, 0x1, 0x9, 0x1000, 0x8, 0xdf6c, 0x9, 0x8, 0x1004000000000000, 0x1ff, 0x3, 0x6, 0xf5, 0x80000, 0x1, 0xfffffffffffffd6d, 0x2, 0x6, 0xfa}) r2 = socket$unix(0x1, 0x5, 0x0) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f0000000ac0)={'wlan0\x00'}) mq_timedreceive(0xffffffffffffffff, &(0x7f0000000b00)=""/4096, 0x1000, 0x80, &(0x7f0000001b00)={0x0, 0x989680}) r3 = creat(&(0x7f0000001b40)='./file0\x00', 0x1) mknodat(r3, &(0x7f0000001b80)='./file1\x00', 0x4, 0x0) clock_adjtime(0xb, &(0x7f0000001bc0)={0xfff, 0x7fff, 0x0, 0x2, 0xfdc, 0x54, 0x8fa, 0x3f41, 0x0, 0x4, 0x4, 0x5, 0x101, 0x5, 0x4, 0x9, 0x9, 0x30e, 0x3f, 0x2, 0x7f, 0x7, 0x6, 0x4, 0x3ff, 0x100000000}) clock_adjtime(0x2, &(0x7f0000001cc0)={0x0, 0x6, 0x7, 0xe5, 0x5, 0x6, 0x10, 0x7, 0x281, 0x40, 0x1, 0x0, 0x1, 0x10001, 0x5, 0x100, 0x0, 0x4, 0xffffffffffffe001, 0xdf, 0x7f, 0x8000, 0x9, 0x400, 0xfffffffffffffe00, 0x3f}) [ 325.573112][T19217] EXT4-fs (loop4): VFS: Can't find ext4 filesystem 17:06:53 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc01000a, 0x10, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000003980)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d9", 0x4, 0x6800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d0f465001000005fd0f4655f00000000000001000c00000010000800000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}], 0x0, &(0x7f00000000c0)) [ 325.599394][T19226] EXT4-fs warning (device loop3): read_mmp_block:107: Error -117 while reading MMP block 0 [ 325.600326][T19231] loop1: detected capacity change from 0 to 264192 [ 325.617221][T19232] SELinux: duplicate or incompatible mount options [ 325.622084][T19228] loop5: detected capacity change from 0 to 264192 17:06:54 executing program 2: clock_adjtime(0x7, &(0x7f0000000000)={0x8000, 0x62, 0xff, 0x1, 0x3, 0x1ff, 0x3ff, 0x4, 0xff, 0x20, 0x6, 0x401, 0x20, 0x0, 0x1ff, 0x8000, 0xfffffffffffffffd, 0x400, 0x8, 0x100000000, 0x2, 0x8, 0xf32, 0x4, 0x6, 0x80}) clock_adjtime(0x2, &(0x7f0000000100)={0xd9, 0x9, 0x1, 0x2, 0x1f, 0x78, 0x4b1, 0x0, 0x401, 0x5, 0x8, 0x1, 0x101, 0x100000001, 0x7, 0x1fc, 0x9, 0x9, 0x0, 0x9, 0x8, 0x3, 0xff, 0x7, 0x73, 0x946c}) clock_adjtime(0x6, &(0x7f0000000200)={0x4, 0x1, 0x100, 0x6, 0x2, 0x6, 0x1, 0x1dd, 0x9, 0x1000000000000000, 0x0, 0x6, 0x1, 0x1, 0x9, 0x5, 0x3023, 0x2, 0x4, 0xfffffffffffffff9, 0x429, 0x3, 0x0, 0x9, 0xffffffffffffff05, 0x1000}) clock_adjtime(0x3, &(0x7f0000000300)={0x0, 0x8, 0x9, 0x9, 0x9, 0x9, 0x6, 0x9, 0x8, 0x1, 0xd0fc, 0x55, 0x2, 0x0, 0x1, 0x1f, 0x100000001, 0x8f44, 0x53, 0x0, 0x3, 0x140000000000, 0x9, 0x8000, 0x0, 0x10001}) r0 = syz_mount_image$iso9660(&(0x7f0000000400), &(0x7f0000000440)='./file0\x00', 0x4, 0x1, &(0x7f0000000480)=[{0xfffffffffffffffe, 0x0, 0x3}], 0x2014400, &(0x7f00000004c0)={[{@check_relaxed}, {@dmode}, {@check_relaxed}], [{@euid_lt={'euid<', 0xee01}}, {@euid_eq}, {@rootcontext={'rootcontext', 0x3d, 'staff_u'}}, {@obj_user={'obj_user', 0x3d, '#-_'}}, {@rootcontext={'rootcontext', 0x3d, 'staff_u'}}]}) faccessat(r0, &(0x7f0000000580)='./file0\x00', 0x88) clock_adjtime(0x4, &(0x7f00000005c0)={0x80000000, 0x100000000, 0xba, 0x80000000, 0x4, 0x20d4e190, 0x7, 0x400, 0x33, 0x7a, 0x1, 0x465d, 0x7f, 0x5, 0x3, 0x1, 0x0, 0x8, 0x7, 0x7ff, 0x1, 0x4, 0x3f, 0x7fff, 0x700b, 0x96}) r1 = accept$unix(0xffffffffffffffff, 0x0, &(0x7f00000006c0)) getsockname$unix(r1, &(0x7f0000000700), &(0x7f0000000780)=0x6e) clock_adjtime(0x3, &(0x7f00000007c0)={0x6, 0x6, 0x7, 0x8000, 0x7ff, 0x5c, 0x401, 0x2, 0x9, 0x4, 0x0, 0x61, 0x2, 0x9b71, 0x100000000, 0x7fffffff, 0x322, 0xc70d, 0x9, 0xd, 0x9, 0x0, 0x9, 0x1a1f00000000, 0xffffffffffffffff, 0x9}) clock_adjtime(0x6, &(0x7f00000008c0)={0x4, 0x9, 0x3, 0xfffffffffffffff7, 0xb31, 0x1, 0x1, 0x2, 0x538, 0x0, 0x401, 0x1, 0xdd, 0xfffffffffffffff7, 0xec54, 0x4, 0x100000001, 0x0, 0xa, 0x1, 0x7ff, 0xcd, 0xf2, 0x80, 0x7, 0x8000}) clock_adjtime(0x0, &(0x7f00000009c0)={0x8, 0xff, 0x81, 0x2, 0x100000001, 0x11, 0x5, 0x1, 0x1, 0x9, 0x1000, 0x8, 0xdf6c, 0x9, 0x8, 0x1004000000000000, 0x1ff, 0x3, 0x6, 0xf5, 0x80000, 0x1, 0xfffffffffffffd6d, 0x2, 0x6, 0xfa}) r2 = socket$unix(0x1, 0x5, 0x0) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f0000000ac0)={'wlan0\x00'}) mq_timedreceive(0xffffffffffffffff, &(0x7f0000000b00)=""/4096, 0x1000, 0x80, &(0x7f0000001b00)={0x0, 0x989680}) r3 = creat(&(0x7f0000001b40)='./file0\x00', 0x1) mknodat(r3, &(0x7f0000001b80)='./file1\x00', 0x4, 0x0) clock_adjtime(0x300, &(0x7f0000001bc0)={0xfff, 0x7fff, 0x0, 0x2, 0xfdc, 0x54, 0x8fa, 0x3f41, 0x0, 0x4, 0x4, 0x5, 0x101, 0x5, 0x4, 0x9, 0x9, 0x30e, 0x3f, 0x2, 0x7f, 0x7, 0x6, 0x4, 0x3ff, 0x100000000}) clock_adjtime(0x2, &(0x7f0000001cc0)={0x0, 0x6, 0x7, 0xe5, 0x5, 0x6, 0x10, 0x7, 0x281, 0x40, 0x1, 0x0, 0x1, 0x10001, 0x5, 0x100, 0x0, 0x4, 0xffffffffffffe001, 0xdf, 0x7f, 0x8000, 0x9, 0x400, 0xfffffffffffffe00, 0x3f}) [ 325.688084][T19236] loop0: detected capacity change from 0 to 264192 [ 325.722913][T19231] EXT4-fs warning (device loop1): ext4_enable_quotas:6363: Failed to enable quota tracking (type=0, err=-22). Please run e2fsck to fix. 17:06:54 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc01000a, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000003980)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d0f465001000005fd0f4655f00000000000001000c00000010000800000000000af3010004", 0x2d, 0x11100}], 0x0, &(0x7f00000000c0)) (fail_nth: 9) [ 325.744329][T19243] SELinux: duplicate or incompatible mount options [ 325.758879][T19231] EXT4-fs (loop1): mount failed [ 325.771242][T19236] EXT4-fs warning (device loop0): ext4_enable_quotas:6363: Failed to enable quota tracking (type=0, err=-22). Please run e2fsck to fix. 17:06:54 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc01000a, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000011", 0x9, 0x4e0}, {&(0x7f0000010200)="01000000000005000c", 0x9}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000003980)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d0f465001000005fd0f4655f00000000000001000c000000100008", 0x23, 0x11100}], 0x0, &(0x7f00000000c0)) [ 325.788154][T19228] EXT4-fs error (device loop5): ext4_quota_enable:6323: comm syz-executor.5: Bad quota inode # 3 [ 325.807416][T19247] FAULT_INJECTION: forcing a failure. [ 325.807416][T19247] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 325.807546][T19228] EXT4-fs warning (device loop5): ext4_enable_quotas:6363: Failed to enable quota tracking (type=0, err=-116). Please run e2fsck to fix. [ 325.820605][T19247] CPU: 0 PID: 19247 Comm: syz-executor.4 Not tainted 5.16.0-syzkaller #0 [ 325.820645][T19247] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 325.853100][T19247] Call Trace: [ 325.856457][T19247] [ 325.859458][T19247] dump_stack_lvl+0xd6/0x122 [ 325.864062][T19247] dump_stack+0x11/0x1b [ 325.868267][T19247] should_fail+0x23c/0x250 [ 325.872731][T19247] should_fail_usercopy+0x16/0x20 [ 325.877823][T19247] copy_page_from_iter_atomic+0x2f1/0xc60 [ 325.883549][T19247] ? shmem_write_begin+0x7e/0x100 [ 325.888567][T19247] generic_perform_write+0x211/0x400 [ 325.893891][T19247] ? current_time+0xed/0x1a0 [ 325.898467][T19247] __generic_file_write_iter+0xf7/0x2b0 [ 325.904091][T19247] ? generic_write_checks+0x250/0x290 [ 325.909531][T19247] generic_file_write_iter+0x75/0x130 [ 325.914889][T19247] vfs_write+0x7f5/0x950 [ 325.919127][T19247] __x64_sys_pwrite64+0xf5/0x150 [ 325.924046][T19247] do_syscall_64+0x44/0xd0 [ 325.928450][T19247] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 325.934340][T19247] RIP: 0033:0x7f6f94bd5e67 [ 325.938755][T19247] Code: 08 89 3c 24 48 89 4c 24 18 e8 e5 f8 ff ff 4c 8b 54 24 18 48 8b 54 24 10 41 89 c0 48 8b 74 24 08 8b 3c 24 b8 12 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 31 44 89 c7 48 89 04 24 e8 15 f9 ff ff 48 8b [ 325.958377][T19247] RSP: 002b:00007f6f93d98f00 EFLAGS: 00000293 ORIG_RAX: 0000000000000012 [ 325.966769][T19247] RAX: ffffffffffffffda RBX: 00007f6f94c6c9c8 RCX: 00007f6f94bd5e67 [ 325.974765][T19247] RDX: 0000000000000066 RSI: 0000000020010000 RDI: 0000000000000004 [ 325.982715][T19247] RBP: 0000000000000007 R08: 0000000000000000 R09: 00007f6f93d991d0 [ 325.990678][T19247] R10: 0000000000000400 R11: 0000000000000293 R12: 0000000000000004 [ 325.998635][T19247] R13: 0000000000000004 R14: 0000000020000200 R15: 0000000000000000 [ 326.006591][T19247] [ 326.013685][T19228] EXT4-fs (loop5): mount failed [ 326.030369][T19236] EXT4-fs (loop0): mount failed [ 326.036782][T19250] loop3: detected capacity change from 0 to 264192 17:06:54 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc01000b, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000003980)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="80", 0x1, 0x11100}], 0x0, &(0x7f00000000c0)) 17:06:54 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc010007, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000003980)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d0f465001000005fd0f4655f00000000000001", 0x1b, 0x11100}], 0x0, &(0x7f00000000c0)) 17:06:54 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc01000a, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000003980)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d0f465001000005fd0f4655f00000000000001000c000000100008", 0x23, 0x11100}], 0x0, &(0x7f00000000c0)) [ 326.042559][T19247] loop4: detected capacity change from 0 to 264192 [ 326.058342][T19250] EXT4-fs warning (device loop3): read_mmp_block:107: Error -117 while reading MMP block 0 17:06:54 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc01000a, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000003980)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d0f465001000005fd0f4655f00000000000001000c000000100008", 0x23, 0x11100}], 0x0, &(0x7f00000000c0)) [ 326.096697][T19254] loop1: detected capacity change from 0 to 264192 [ 326.124374][T19260] loop5: detected capacity change from 0 to 264192 17:06:54 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc01000a, 0x2e, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000003980)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d9", 0x4, 0x6800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d0f465001000005fd0f4655f00000000000001000c00000010000800000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}], 0x0, &(0x7f00000000c0)) 17:06:54 executing program 2: clock_adjtime(0x7, &(0x7f0000000000)={0x8000, 0x62, 0xff, 0x1, 0x3, 0x1ff, 0x3ff, 0x4, 0xff, 0x20, 0x6, 0x401, 0x20, 0x0, 0x1ff, 0x8000, 0xfffffffffffffffd, 0x400, 0x8, 0x100000000, 0x2, 0x8, 0xf32, 0x4, 0x6, 0x80}) clock_adjtime(0x2, &(0x7f0000000100)={0xd9, 0x9, 0x1, 0x2, 0x1f, 0x78, 0x4b1, 0x0, 0x401, 0x5, 0x8, 0x1, 0x101, 0x100000001, 0x7, 0x1fc, 0x9, 0x9, 0x0, 0x9, 0x8, 0x3, 0xff, 0x7, 0x73, 0x946c}) clock_adjtime(0x6, &(0x7f0000000200)={0x4, 0x1, 0x100, 0x6, 0x2, 0x6, 0x1, 0x1dd, 0x9, 0x1000000000000000, 0x0, 0x6, 0x1, 0x1, 0x9, 0x5, 0x3023, 0x2, 0x4, 0xfffffffffffffff9, 0x429, 0x3, 0x0, 0x9, 0xffffffffffffff05, 0x1000}) clock_adjtime(0x3, &(0x7f0000000300)={0x0, 0x8, 0x9, 0x9, 0x9, 0x9, 0x6, 0x9, 0x8, 0x1, 0xd0fc, 0x55, 0x2, 0x0, 0x1, 0x1f, 0x100000001, 0x8f44, 0x53, 0x0, 0x3, 0x140000000000, 0x9, 0x8000, 0x0, 0x10001}) r0 = syz_mount_image$iso9660(&(0x7f0000000400), &(0x7f0000000440)='./file0\x00', 0x4, 0x1, &(0x7f0000000480)=[{0xfffffffffffffffe, 0x0, 0x3}], 0x2014400, &(0x7f00000004c0)={[{@check_relaxed}, {@dmode}, {@check_relaxed}], [{@euid_lt={'euid<', 0xee01}}, {@euid_eq}, {@rootcontext={'rootcontext', 0x3d, 'staff_u'}}, {@obj_user={'obj_user', 0x3d, '#-_'}}, {@rootcontext={'rootcontext', 0x3d, 'staff_u'}}]}) faccessat(r0, &(0x7f0000000580)='./file0\x00', 0x88) clock_adjtime(0x4, &(0x7f00000005c0)={0x80000000, 0x100000000, 0xba, 0x80000000, 0x4, 0x20d4e190, 0x7, 0x400, 0x33, 0x7a, 0x1, 0x465d, 0x7f, 0x5, 0x3, 0x1, 0x0, 0x8, 0x7, 0x7ff, 0x1, 0x4, 0x3f, 0x7fff, 0x700b, 0x96}) r1 = accept$unix(0xffffffffffffffff, 0x0, &(0x7f00000006c0)) getsockname$unix(r1, &(0x7f0000000700), &(0x7f0000000780)=0x6e) clock_adjtime(0x3, &(0x7f00000007c0)={0x6, 0x6, 0x7, 0x8000, 0x7ff, 0x5c, 0x401, 0x2, 0x9, 0x4, 0x0, 0x61, 0x2, 0x9b71, 0x100000000, 0x7fffffff, 0x322, 0xc70d, 0x9, 0xd, 0x9, 0x0, 0x9, 0x1a1f00000000, 0xffffffffffffffff, 0x9}) clock_adjtime(0x6, &(0x7f00000008c0)={0x4, 0x9, 0x3, 0xfffffffffffffff7, 0xb31, 0x1, 0x1, 0x2, 0x538, 0x0, 0x401, 0x1, 0xdd, 0xfffffffffffffff7, 0xec54, 0x4, 0x100000001, 0x0, 0xa, 0x1, 0x7ff, 0xcd, 0xf2, 0x80, 0x7, 0x8000}) clock_adjtime(0x0, &(0x7f00000009c0)={0x8, 0xff, 0x81, 0x2, 0x100000001, 0x11, 0x5, 0x1, 0x1, 0x9, 0x1000, 0x8, 0xdf6c, 0x9, 0x8, 0x1004000000000000, 0x1ff, 0x3, 0x6, 0xf5, 0x80000, 0x1, 0xfffffffffffffd6d, 0x2, 0x6, 0xfa}) r2 = socket$unix(0x1, 0x5, 0x0) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f0000000ac0)={'wlan0\x00'}) mq_timedreceive(0xffffffffffffffff, &(0x7f0000000b00)=""/4096, 0x1000, 0x80, &(0x7f0000001b00)={0x0, 0x989680}) r3 = creat(&(0x7f0000001b40)='./file0\x00', 0x1) mknodat(r3, &(0x7f0000001b80)='./file1\x00', 0x4, 0x0) clock_adjtime(0x700, &(0x7f0000001bc0)={0xfff, 0x7fff, 0x0, 0x2, 0xfdc, 0x54, 0x8fa, 0x3f41, 0x0, 0x4, 0x4, 0x5, 0x101, 0x5, 0x4, 0x9, 0x9, 0x30e, 0x3f, 0x2, 0x7f, 0x7, 0x6, 0x4, 0x3ff, 0x100000000}) clock_adjtime(0x2, &(0x7f0000001cc0)={0x0, 0x6, 0x7, 0xe5, 0x5, 0x6, 0x10, 0x7, 0x281, 0x40, 0x1, 0x0, 0x1, 0x10001, 0x5, 0x100, 0x0, 0x4, 0xffffffffffffe001, 0xdf, 0x7f, 0x8000, 0x9, 0x400, 0xfffffffffffffe00, 0x3f}) [ 326.137073][T19247] EXT4-fs error (device loop4): ext4_ext_check_inode:497: inode #3: comm syz-executor.4: pblk 0 bad header/extent: invalid extent entries - magic f30a, entries 1, max 4(4), depth 0(0) [ 326.171457][T19265] loop0: detected capacity change from 0 to 264192 [ 326.172203][T19247] EXT4-fs error (device loop4): ext4_quota_enable:6323: comm syz-executor.4: Bad quota inode # 3 [ 326.180023][T19267] SELinux: duplicate or incompatible mount options [ 326.195400][T19263] loop3: detected capacity change from 0 to 264192 [ 326.208282][T19254] EXT4-fs warning (device loop1): ext4_enable_quotas:6363: Failed to enable quota tracking (type=0, err=-22). Please run e2fsck to fix. [ 326.219720][T19247] EXT4-fs warning (device loop4): ext4_enable_quotas:6363: Failed to enable quota tracking (type=0, err=-117). Please run e2fsck to fix. [ 326.226584][T19260] EXT4-fs error (device loop5): ext4_quota_enable:6323: comm syz-executor.5: Bad quota inode # 3 [ 326.238425][T19247] EXT4-fs (loop4): mount failed [ 326.256531][T19254] EXT4-fs (loop1): mount failed [ 326.277281][T19260] EXT4-fs warning (device loop5): ext4_enable_quotas:6363: Failed to enable quota tracking (type=0, err=-116). Please run e2fsck to fix. 17:06:54 executing program 2: clock_adjtime(0x7, &(0x7f0000000000)={0x8000, 0x62, 0xff, 0x1, 0x3, 0x1ff, 0x3ff, 0x4, 0xff, 0x20, 0x6, 0x401, 0x20, 0x0, 0x1ff, 0x8000, 0xfffffffffffffffd, 0x400, 0x8, 0x100000000, 0x2, 0x8, 0xf32, 0x4, 0x6, 0x80}) clock_adjtime(0x2, &(0x7f0000000100)={0xd9, 0x9, 0x1, 0x2, 0x1f, 0x78, 0x4b1, 0x0, 0x401, 0x5, 0x8, 0x1, 0x101, 0x100000001, 0x7, 0x1fc, 0x9, 0x9, 0x0, 0x9, 0x8, 0x3, 0xff, 0x7, 0x73, 0x946c}) clock_adjtime(0x6, &(0x7f0000000200)={0x4, 0x1, 0x100, 0x6, 0x2, 0x6, 0x1, 0x1dd, 0x9, 0x1000000000000000, 0x0, 0x6, 0x1, 0x1, 0x9, 0x5, 0x3023, 0x2, 0x4, 0xfffffffffffffff9, 0x429, 0x3, 0x0, 0x9, 0xffffffffffffff05, 0x1000}) clock_adjtime(0x3, &(0x7f0000000300)={0x0, 0x8, 0x9, 0x9, 0x9, 0x9, 0x6, 0x9, 0x8, 0x1, 0xd0fc, 0x55, 0x2, 0x0, 0x1, 0x1f, 0x100000001, 0x8f44, 0x53, 0x0, 0x3, 0x140000000000, 0x9, 0x8000, 0x0, 0x10001}) r0 = syz_mount_image$iso9660(&(0x7f0000000400), &(0x7f0000000440)='./file0\x00', 0x4, 0x1, &(0x7f0000000480)=[{0xfffffffffffffffe, 0x0, 0x3}], 0x2014400, &(0x7f00000004c0)={[{@check_relaxed}, {@dmode}, {@check_relaxed}], [{@euid_lt={'euid<', 0xee01}}, {@euid_eq}, {@rootcontext={'rootcontext', 0x3d, 'staff_u'}}, {@obj_user={'obj_user', 0x3d, '#-_'}}, {@rootcontext={'rootcontext', 0x3d, 'staff_u'}}]}) faccessat(r0, &(0x7f0000000580)='./file0\x00', 0x88) clock_adjtime(0x4, &(0x7f00000005c0)={0x80000000, 0x100000000, 0xba, 0x80000000, 0x4, 0x20d4e190, 0x7, 0x400, 0x33, 0x7a, 0x1, 0x465d, 0x7f, 0x5, 0x3, 0x1, 0x0, 0x8, 0x7, 0x7ff, 0x1, 0x4, 0x3f, 0x7fff, 0x700b, 0x96}) r1 = accept$unix(0xffffffffffffffff, 0x0, &(0x7f00000006c0)) getsockname$unix(r1, &(0x7f0000000700), &(0x7f0000000780)=0x6e) clock_adjtime(0x3, &(0x7f00000007c0)={0x6, 0x6, 0x7, 0x8000, 0x7ff, 0x5c, 0x401, 0x2, 0x9, 0x4, 0x0, 0x61, 0x2, 0x9b71, 0x100000000, 0x7fffffff, 0x322, 0xc70d, 0x9, 0xd, 0x9, 0x0, 0x9, 0x1a1f00000000, 0xffffffffffffffff, 0x9}) clock_adjtime(0x6, &(0x7f00000008c0)={0x4, 0x9, 0x3, 0xfffffffffffffff7, 0xb31, 0x1, 0x1, 0x2, 0x538, 0x0, 0x401, 0x1, 0xdd, 0xfffffffffffffff7, 0xec54, 0x4, 0x100000001, 0x0, 0xa, 0x1, 0x7ff, 0xcd, 0xf2, 0x80, 0x7, 0x8000}) clock_adjtime(0x0, &(0x7f00000009c0)={0x8, 0xff, 0x81, 0x2, 0x100000001, 0x11, 0x5, 0x1, 0x1, 0x9, 0x1000, 0x8, 0xdf6c, 0x9, 0x8, 0x1004000000000000, 0x1ff, 0x3, 0x6, 0xf5, 0x80000, 0x1, 0xfffffffffffffd6d, 0x2, 0x6, 0xfa}) r2 = socket$unix(0x1, 0x5, 0x0) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f0000000ac0)={'wlan0\x00'}) mq_timedreceive(0xffffffffffffffff, &(0x7f0000000b00)=""/4096, 0x1000, 0x80, &(0x7f0000001b00)={0x0, 0x989680}) r3 = creat(&(0x7f0000001b40)='./file0\x00', 0x1) mknodat(r3, &(0x7f0000001b80)='./file1\x00', 0x4, 0x0) clock_adjtime(0xa00, &(0x7f0000001bc0)={0xfff, 0x7fff, 0x0, 0x2, 0xfdc, 0x54, 0x8fa, 0x3f41, 0x0, 0x4, 0x4, 0x5, 0x101, 0x5, 0x4, 0x9, 0x9, 0x30e, 0x3f, 0x2, 0x7f, 0x7, 0x6, 0x4, 0x3ff, 0x100000000}) clock_adjtime(0x2, &(0x7f0000001cc0)={0x0, 0x6, 0x7, 0xe5, 0x5, 0x6, 0x10, 0x7, 0x281, 0x40, 0x1, 0x0, 0x1, 0x10001, 0x5, 0x100, 0x0, 0x4, 0xffffffffffffe001, 0xdf, 0x7f, 0x8000, 0x9, 0x400, 0xfffffffffffffe00, 0x3f}) [ 326.297828][T19260] EXT4-fs (loop5): mount failed [ 326.315676][T19263] EXT4-fs error (device loop3): ext4_ext_check_inode:497: inode #3: comm syz-executor.3: pblk 0 bad header/extent: invalid magic - magic 0, entries 0, max 0(0), depth 0(0) [ 326.338568][T19263] EXT4-fs error (device loop3): ext4_quota_enable:6323: comm syz-executor.3: Bad quota inode # 3 [ 326.351150][T19263] EXT4-fs warning (device loop3): ext4_enable_quotas:6363: Failed to enable quota tracking (type=0, err=-117). Please run e2fsck to fix. [ 326.365663][T19263] EXT4-fs (loop3): mount failed [ 326.378045][T19279] SELinux: duplicate or incompatible mount options 17:06:54 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc01000a, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000003980)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d0f465001000005fd0f4655f00000000000001000c00000010000800000000000af3010004", 0x2d, 0x11100}], 0x0, &(0x7f00000000c0)) (fail_nth: 10) 17:06:54 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc01000c, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000003980)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="80", 0x1, 0x11100}], 0x0, &(0x7f00000000c0)) [ 326.385631][T19265] EXT4-fs warning (device loop0): ext4_enable_quotas:6363: Failed to enable quota tracking (type=0, err=-22). Please run e2fsck to fix. [ 326.417519][T19265] EXT4-fs (loop0): mount failed [ 326.422749][T19281] FAULT_INJECTION: forcing a failure. [ 326.422749][T19281] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 326.435850][T19281] CPU: 0 PID: 19281 Comm: syz-executor.4 Not tainted 5.16.0-syzkaller #0 [ 326.437129][T19283] loop1: detected capacity change from 0 to 264192 [ 326.444324][T19281] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 326.444338][T19281] Call Trace: [ 326.444345][T19281] [ 326.444351][T19281] dump_stack_lvl+0xd6/0x122 [ 326.471759][T19281] dump_stack+0x11/0x1b [ 326.475905][T19281] should_fail+0x23c/0x250 [ 326.480342][T19281] should_fail_usercopy+0x16/0x20 [ 326.485347][T19281] copy_page_from_iter_atomic+0x2f1/0xc60 [ 326.491055][T19281] ? shmem_write_begin+0x7e/0x100 [ 326.496065][T19281] generic_perform_write+0x211/0x400 [ 326.501342][T19281] ? current_time+0xed/0x1a0 [ 326.505920][T19281] __generic_file_write_iter+0xf7/0x2b0 [ 326.511466][T19281] ? generic_write_checks+0x250/0x290 [ 326.516899][T19281] generic_file_write_iter+0x75/0x130 [ 326.522259][T19281] vfs_write+0x7f5/0x950 [ 326.526598][T19281] __x64_sys_pwrite64+0xf5/0x150 [ 326.531542][T19281] do_syscall_64+0x44/0xd0 [ 326.535940][T19281] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 326.541873][T19281] RIP: 0033:0x7f6f94bd5e67 [ 326.546272][T19281] Code: 08 89 3c 24 48 89 4c 24 18 e8 e5 f8 ff ff 4c 8b 54 24 18 48 8b 54 24 10 41 89 c0 48 8b 74 24 08 8b 3c 24 b8 12 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 31 44 89 c7 48 89 04 24 e8 15 f9 ff ff 48 8b [ 326.565859][T19281] RSP: 002b:00007f6f93d98f00 EFLAGS: 00000293 ORIG_RAX: 0000000000000012 [ 326.574251][T19281] RAX: ffffffffffffffda RBX: 00007f6f94c6c9c8 RCX: 00007f6f94bd5e67 [ 326.582230][T19281] RDX: 0000000000000009 RSI: 0000000020010200 RDI: 0000000000000004 [ 326.590189][T19281] RBP: 0000000000000007 R08: 0000000000000000 R09: 00007f6f93d991d0 17:06:54 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc01000a, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {0x0, 0x0, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000003980)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d0f465001000005fd0f4655f00000000000001000c000000100008", 0x23, 0x11100}], 0x0, &(0x7f00000000c0)) 17:06:54 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc010009, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000003980)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d0f465001000005fd0f4655f00000000000001", 0x1b, 0x11100}], 0x0, &(0x7f00000000c0)) [ 326.598161][T19281] R10: 0000000000000560 R11: 0000000000000293 R12: 0000000000000004 [ 326.606188][T19281] R13: 0000000000000004 R14: 0000000020000218 R15: 0000000000000001 [ 326.614197][T19281] [ 326.629861][T19287] loop3: detected capacity change from 0 to 264192 [ 326.643898][T19290] loop5: detected capacity change from 0 to 264192 [ 326.645291][T19281] loop4: detected capacity change from 0 to 264192 17:06:55 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc01000a, 0x110, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000003980)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d9", 0x4, 0x6800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d0f465001000005fd0f4655f00000000000001000c00000010000800000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}], 0x0, &(0x7f00000000c0)) 17:06:55 executing program 2: clock_adjtime(0x7, &(0x7f0000000000)={0x8000, 0x62, 0xff, 0x1, 0x3, 0x1ff, 0x3ff, 0x4, 0xff, 0x20, 0x6, 0x401, 0x20, 0x0, 0x1ff, 0x8000, 0xfffffffffffffffd, 0x400, 0x8, 0x100000000, 0x2, 0x8, 0xf32, 0x4, 0x6, 0x80}) clock_adjtime(0x2, &(0x7f0000000100)={0xd9, 0x9, 0x1, 0x2, 0x1f, 0x78, 0x4b1, 0x0, 0x401, 0x5, 0x8, 0x1, 0x101, 0x100000001, 0x7, 0x1fc, 0x9, 0x9, 0x0, 0x9, 0x8, 0x3, 0xff, 0x7, 0x73, 0x946c}) clock_adjtime(0x6, &(0x7f0000000200)={0x4, 0x1, 0x100, 0x6, 0x2, 0x6, 0x1, 0x1dd, 0x9, 0x1000000000000000, 0x0, 0x6, 0x1, 0x1, 0x9, 0x5, 0x3023, 0x2, 0x4, 0xfffffffffffffff9, 0x429, 0x3, 0x0, 0x9, 0xffffffffffffff05, 0x1000}) clock_adjtime(0x3, &(0x7f0000000300)={0x0, 0x8, 0x9, 0x9, 0x9, 0x9, 0x6, 0x9, 0x8, 0x1, 0xd0fc, 0x55, 0x2, 0x0, 0x1, 0x1f, 0x100000001, 0x8f44, 0x53, 0x0, 0x3, 0x140000000000, 0x9, 0x8000, 0x0, 0x10001}) r0 = syz_mount_image$iso9660(&(0x7f0000000400), &(0x7f0000000440)='./file0\x00', 0x4, 0x1, &(0x7f0000000480)=[{0xfffffffffffffffe, 0x0, 0x3}], 0x2014400, &(0x7f00000004c0)={[{@check_relaxed}, {@dmode}, {@check_relaxed}], [{@euid_lt={'euid<', 0xee01}}, {@euid_eq}, {@rootcontext={'rootcontext', 0x3d, 'staff_u'}}, {@obj_user={'obj_user', 0x3d, '#-_'}}, {@rootcontext={'rootcontext', 0x3d, 'staff_u'}}]}) faccessat(r0, &(0x7f0000000580)='./file0\x00', 0x88) clock_adjtime(0x4, &(0x7f00000005c0)={0x80000000, 0x100000000, 0xba, 0x80000000, 0x4, 0x20d4e190, 0x7, 0x400, 0x33, 0x7a, 0x1, 0x465d, 0x7f, 0x5, 0x3, 0x1, 0x0, 0x8, 0x7, 0x7ff, 0x1, 0x4, 0x3f, 0x7fff, 0x700b, 0x96}) r1 = accept$unix(0xffffffffffffffff, 0x0, &(0x7f00000006c0)) getsockname$unix(r1, &(0x7f0000000700), &(0x7f0000000780)=0x6e) clock_adjtime(0x3, &(0x7f00000007c0)={0x6, 0x6, 0x7, 0x8000, 0x7ff, 0x5c, 0x401, 0x2, 0x9, 0x4, 0x0, 0x61, 0x2, 0x9b71, 0x100000000, 0x7fffffff, 0x322, 0xc70d, 0x9, 0xd, 0x9, 0x0, 0x9, 0x1a1f00000000, 0xffffffffffffffff, 0x9}) clock_adjtime(0x6, &(0x7f00000008c0)={0x4, 0x9, 0x3, 0xfffffffffffffff7, 0xb31, 0x1, 0x1, 0x2, 0x538, 0x0, 0x401, 0x1, 0xdd, 0xfffffffffffffff7, 0xec54, 0x4, 0x100000001, 0x0, 0xa, 0x1, 0x7ff, 0xcd, 0xf2, 0x80, 0x7, 0x8000}) clock_adjtime(0x0, &(0x7f00000009c0)={0x8, 0xff, 0x81, 0x2, 0x100000001, 0x11, 0x5, 0x1, 0x1, 0x9, 0x1000, 0x8, 0xdf6c, 0x9, 0x8, 0x1004000000000000, 0x1ff, 0x3, 0x6, 0xf5, 0x80000, 0x1, 0xfffffffffffffd6d, 0x2, 0x6, 0xfa}) r2 = socket$unix(0x1, 0x5, 0x0) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f0000000ac0)={'wlan0\x00'}) mq_timedreceive(0xffffffffffffffff, &(0x7f0000000b00)=""/4096, 0x1000, 0x80, &(0x7f0000001b00)={0x0, 0x989680}) r3 = creat(&(0x7f0000001b40)='./file0\x00', 0x1) mknodat(r3, &(0x7f0000001b80)='./file1\x00', 0x4, 0x0) clock_adjtime(0xb00, &(0x7f0000001bc0)={0xfff, 0x7fff, 0x0, 0x2, 0xfdc, 0x54, 0x8fa, 0x3f41, 0x0, 0x4, 0x4, 0x5, 0x101, 0x5, 0x4, 0x9, 0x9, 0x30e, 0x3f, 0x2, 0x7f, 0x7, 0x6, 0x4, 0x3ff, 0x100000000}) clock_adjtime(0x2, &(0x7f0000001cc0)={0x0, 0x6, 0x7, 0xe5, 0x5, 0x6, 0x10, 0x7, 0x281, 0x40, 0x1, 0x0, 0x1, 0x10001, 0x5, 0x100, 0x0, 0x4, 0xffffffffffffe001, 0xdf, 0x7f, 0x8000, 0x9, 0x400, 0xfffffffffffffe00, 0x3f}) [ 326.706871][T19287] EXT4-fs warning (device loop3): read_mmp_block:107: Error -117 while reading MMP block 0 [ 326.726631][T19283] EXT4-fs warning (device loop1): ext4_enable_quotas:6363: Failed to enable quota tracking (type=0, err=-22). Please run e2fsck to fix. 17:06:55 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc01000a, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {0x0, 0x0, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000003980)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d0f465001000005fd0f4655f00000000000001000c000000100008", 0x23, 0x11100}], 0x0, &(0x7f00000000c0)) [ 326.758635][T19283] EXT4-fs (loop1): mount failed [ 326.762890][T19281] EXT4-fs error (device loop4): ext4_ext_check_inode:497: inode #3: comm syz-executor.4: pblk 0 bad header/extent: invalid extent entries - magic f30a, entries 1, max 4(4), depth 0(0) [ 326.775333][T19298] loop0: detected capacity change from 0 to 264192 [ 326.786579][T19290] EXT4-fs error (device loop5): ext4_quota_enable:6323: comm syz-executor.5: Bad quota inode # 3 [ 326.803450][T19302] loop3: detected capacity change from 0 to 264192 [ 326.804016][T19300] SELinux: duplicate or incompatible mount options [ 326.817776][T19302] EXT4-fs warning (device loop3): read_mmp_block:107: Error -117 while reading MMP block 0 [ 326.828182][T19290] EXT4-fs warning (device loop5): ext4_enable_quotas:6363: Failed to enable quota tracking (type=0, err=-116). Please run e2fsck to fix. [ 326.842710][T19290] EXT4-fs (loop5): mount failed [ 326.847850][T19281] EXT4-fs error (device loop4): ext4_quota_enable:6323: comm syz-executor.4: Bad quota inode # 3 17:06:55 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc01000b, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000003980)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d0f465001000005fd0f4655f00000000000001", 0x1b, 0x11100}], 0x0, &(0x7f00000000c0)) [ 326.863877][T19281] EXT4-fs warning (device loop4): ext4_enable_quotas:6363: Failed to enable quota tracking (type=0, err=-117). Please run e2fsck to fix. [ 326.872203][T19305] loop1: detected capacity change from 0 to 264192 [ 326.878514][T19281] EXT4-fs (loop4): mount failed [ 326.887084][T19298] EXT4-fs warning (device loop0): ext4_enable_quotas:6363: Failed to enable quota tracking (type=0, err=-22). Please run e2fsck to fix. 17:06:55 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc01000a, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {0x0, 0x0, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000003980)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d0f465001000005fd0f4655f00000000000001000c000000100008", 0x23, 0x11100}], 0x0, &(0x7f00000000c0)) [ 326.920847][T19298] EXT4-fs (loop0): mount failed 17:06:55 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc01000f, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000003980)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="80", 0x1, 0x11100}], 0x0, &(0x7f00000000c0)) [ 326.952546][T19305] EXT4-fs warning (device loop1): ext4_enable_quotas:6363: Failed to enable quota tracking (type=0, err=-22). Please run e2fsck to fix. 17:06:55 executing program 2: clock_adjtime(0x7, &(0x7f0000000000)={0x8000, 0x62, 0xff, 0x1, 0x3, 0x1ff, 0x3ff, 0x4, 0xff, 0x20, 0x6, 0x401, 0x20, 0x0, 0x1ff, 0x8000, 0xfffffffffffffffd, 0x400, 0x8, 0x100000000, 0x2, 0x8, 0xf32, 0x4, 0x6, 0x80}) clock_adjtime(0x2, &(0x7f0000000100)={0xd9, 0x9, 0x1, 0x2, 0x1f, 0x78, 0x4b1, 0x0, 0x401, 0x5, 0x8, 0x1, 0x101, 0x100000001, 0x7, 0x1fc, 0x9, 0x9, 0x0, 0x9, 0x8, 0x3, 0xff, 0x7, 0x73, 0x946c}) clock_adjtime(0x6, &(0x7f0000000200)={0x4, 0x1, 0x100, 0x6, 0x2, 0x6, 0x1, 0x1dd, 0x9, 0x1000000000000000, 0x0, 0x6, 0x1, 0x1, 0x9, 0x5, 0x3023, 0x2, 0x4, 0xfffffffffffffff9, 0x429, 0x3, 0x0, 0x9, 0xffffffffffffff05, 0x1000}) clock_adjtime(0x3, &(0x7f0000000300)={0x0, 0x8, 0x9, 0x9, 0x9, 0x9, 0x6, 0x9, 0x8, 0x1, 0xd0fc, 0x55, 0x2, 0x0, 0x1, 0x1f, 0x100000001, 0x8f44, 0x53, 0x0, 0x3, 0x140000000000, 0x9, 0x8000, 0x0, 0x10001}) r0 = syz_mount_image$iso9660(&(0x7f0000000400), &(0x7f0000000440)='./file0\x00', 0x4, 0x1, &(0x7f0000000480)=[{0xfffffffffffffffe, 0x0, 0x3}], 0x2014400, &(0x7f00000004c0)={[{@check_relaxed}, {@dmode}, {@check_relaxed}], [{@euid_lt={'euid<', 0xee01}}, {@euid_eq}, {@rootcontext={'rootcontext', 0x3d, 'staff_u'}}, {@obj_user={'obj_user', 0x3d, '#-_'}}, {@rootcontext={'rootcontext', 0x3d, 'staff_u'}}]}) faccessat(r0, &(0x7f0000000580)='./file0\x00', 0x88) clock_adjtime(0x4, &(0x7f00000005c0)={0x80000000, 0x100000000, 0xba, 0x80000000, 0x4, 0x20d4e190, 0x7, 0x400, 0x33, 0x7a, 0x1, 0x465d, 0x7f, 0x5, 0x3, 0x1, 0x0, 0x8, 0x7, 0x7ff, 0x1, 0x4, 0x3f, 0x7fff, 0x700b, 0x96}) r1 = accept$unix(0xffffffffffffffff, 0x0, &(0x7f00000006c0)) getsockname$unix(r1, &(0x7f0000000700), &(0x7f0000000780)=0x6e) clock_adjtime(0x3, &(0x7f00000007c0)={0x6, 0x6, 0x7, 0x8000, 0x7ff, 0x5c, 0x401, 0x2, 0x9, 0x4, 0x0, 0x61, 0x2, 0x9b71, 0x100000000, 0x7fffffff, 0x322, 0xc70d, 0x9, 0xd, 0x9, 0x0, 0x9, 0x1a1f00000000, 0xffffffffffffffff, 0x9}) clock_adjtime(0x6, &(0x7f00000008c0)={0x4, 0x9, 0x3, 0xfffffffffffffff7, 0xb31, 0x1, 0x1, 0x2, 0x538, 0x0, 0x401, 0x1, 0xdd, 0xfffffffffffffff7, 0xec54, 0x4, 0x100000001, 0x0, 0xa, 0x1, 0x7ff, 0xcd, 0xf2, 0x80, 0x7, 0x8000}) clock_adjtime(0x0, &(0x7f00000009c0)={0x8, 0xff, 0x81, 0x2, 0x100000001, 0x11, 0x5, 0x1, 0x1, 0x9, 0x1000, 0x8, 0xdf6c, 0x9, 0x8, 0x1004000000000000, 0x1ff, 0x3, 0x6, 0xf5, 0x80000, 0x1, 0xfffffffffffffd6d, 0x2, 0x6, 0xfa}) r2 = socket$unix(0x1, 0x5, 0x0) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f0000000ac0)={'wlan0\x00'}) mq_timedreceive(0xffffffffffffffff, &(0x7f0000000b00)=""/4096, 0x1000, 0x80, &(0x7f0000001b00)={0x0, 0x989680}) r3 = creat(&(0x7f0000001b40)='./file0\x00', 0x1) mknodat(r3, &(0x7f0000001b80)='./file1\x00', 0x4, 0x0) clock_adjtime(0xccc8b, &(0x7f0000001bc0)={0xfff, 0x7fff, 0x0, 0x2, 0xfdc, 0x54, 0x8fa, 0x3f41, 0x0, 0x4, 0x4, 0x5, 0x101, 0x5, 0x4, 0x9, 0x9, 0x30e, 0x3f, 0x2, 0x7f, 0x7, 0x6, 0x4, 0x3ff, 0x100000000}) clock_adjtime(0x2, &(0x7f0000001cc0)={0x0, 0x6, 0x7, 0xe5, 0x5, 0x6, 0x10, 0x7, 0x281, 0x40, 0x1, 0x0, 0x1, 0x10001, 0x5, 0x100, 0x0, 0x4, 0xffffffffffffe001, 0xdf, 0x7f, 0x8000, 0x9, 0x400, 0xfffffffffffffe00, 0x3f}) 17:06:55 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc01000a, 0xff01, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000003980)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d9", 0x4, 0x6800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d0f465001000005fd0f4655f00000000000001000c00000010000800000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}], 0x0, &(0x7f00000000c0)) 17:06:55 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc01000a, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000003980)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d0f465001000005fd0f4655f00000000000001000c00000010000800000000000af3010004", 0x2d, 0x11100}], 0x0, &(0x7f00000000c0)) (fail_nth: 11) [ 326.999776][T19313] loop5: detected capacity change from 0 to 264192 [ 327.008682][T19305] EXT4-fs (loop1): mount failed [ 327.046997][T19316] SELinux: duplicate or incompatible mount options [ 327.062028][T19321] FAULT_INJECTION: forcing a failure. [ 327.062028][T19321] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 327.062685][T19322] loop3: detected capacity change from 0 to 264192 [ 327.075154][T19321] CPU: 0 PID: 19321 Comm: syz-executor.4 Not tainted 5.16.0-syzkaller #0 [ 327.090053][T19321] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 327.100109][T19321] Call Trace: [ 327.103474][T19321] [ 327.106441][T19321] dump_stack_lvl+0xd6/0x122 [ 327.111108][T19321] dump_stack+0x11/0x1b [ 327.115344][T19321] should_fail+0x23c/0x250 [ 327.119751][T19321] should_fail_usercopy+0x16/0x20 [ 327.124767][T19321] copy_page_from_iter_atomic+0x2f1/0xc60 [ 327.130522][T19321] ? shmem_write_begin+0x7e/0x100 [ 327.135599][T19321] generic_perform_write+0x211/0x400 [ 327.141062][T19321] ? current_time+0xed/0x1a0 [ 327.145641][T19321] __generic_file_write_iter+0xf7/0x2b0 [ 327.151241][T19321] ? generic_write_checks+0x250/0x290 [ 327.156683][T19321] generic_file_write_iter+0x75/0x130 [ 327.162057][T19321] vfs_write+0x7f5/0x950 [ 327.166329][T19321] __x64_sys_pwrite64+0xf5/0x150 [ 327.171262][T19321] do_syscall_64+0x44/0xd0 [ 327.175664][T19321] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 327.181631][T19321] RIP: 0033:0x7f6f94bd5e67 [ 327.186030][T19321] Code: 08 89 3c 24 48 89 4c 24 18 e8 e5 f8 ff ff 4c 8b 54 24 18 48 8b 54 24 10 41 89 c0 48 8b 74 24 08 8b 3c 24 b8 12 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 31 44 89 c7 48 89 04 24 e8 15 f9 ff ff 48 8b [ 327.205620][T19321] RSP: 002b:00007f6f93d98f00 EFLAGS: 00000293 ORIG_RAX: 0000000000000012 [ 327.214024][T19321] RAX: ffffffffffffffda RBX: 00007f6f94c6c9c8 RCX: 00007f6f94bd5e67 [ 327.221988][T19321] RDX: 0000000000000001 RSI: 0000000020010300 RDI: 0000000000000004 [ 327.229951][T19321] RBP: 0000000000000007 R08: 0000000000000000 R09: 00007f6f93d991d0 [ 327.237902][T19321] R10: 0000000000000640 R11: 0000000000000293 R12: 0000000000000004 17:06:55 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc01000c, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000003980)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d0f465001000005fd0f4655f00000000000001", 0x1b, 0x11100}], 0x0, &(0x7f00000000c0)) [ 327.245854][T19321] R13: 0000000000000004 R14: 0000000020000230 R15: 0000000000000002 [ 327.253864][T19321] [ 327.272045][T19313] EXT4-fs error (device loop5): ext4_quota_enable:6323: comm syz-executor.5: Bad quota inode # 3 17:06:55 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc01000a, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200), 0x0, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000003980)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d0f465001000005fd0f4655f00000000000001000c000000100008", 0x23, 0x11100}], 0x0, &(0x7f00000000c0)) 17:06:55 executing program 2: clock_adjtime(0x7, &(0x7f0000000000)={0x8000, 0x62, 0xff, 0x1, 0x3, 0x1ff, 0x3ff, 0x4, 0xff, 0x20, 0x6, 0x401, 0x20, 0x0, 0x1ff, 0x8000, 0xfffffffffffffffd, 0x400, 0x8, 0x100000000, 0x2, 0x8, 0xf32, 0x4, 0x6, 0x80}) clock_adjtime(0x2, &(0x7f0000000100)={0xd9, 0x9, 0x1, 0x2, 0x1f, 0x78, 0x4b1, 0x0, 0x401, 0x5, 0x8, 0x1, 0x101, 0x100000001, 0x7, 0x1fc, 0x9, 0x9, 0x0, 0x9, 0x8, 0x3, 0xff, 0x7, 0x73, 0x946c}) clock_adjtime(0x6, &(0x7f0000000200)={0x4, 0x1, 0x100, 0x6, 0x2, 0x6, 0x1, 0x1dd, 0x9, 0x1000000000000000, 0x0, 0x6, 0x1, 0x1, 0x9, 0x5, 0x3023, 0x2, 0x4, 0xfffffffffffffff9, 0x429, 0x3, 0x0, 0x9, 0xffffffffffffff05, 0x1000}) clock_adjtime(0x3, &(0x7f0000000300)={0x0, 0x8, 0x9, 0x9, 0x9, 0x9, 0x6, 0x9, 0x8, 0x1, 0xd0fc, 0x55, 0x2, 0x0, 0x1, 0x1f, 0x100000001, 0x8f44, 0x53, 0x0, 0x3, 0x140000000000, 0x9, 0x8000, 0x0, 0x10001}) r0 = syz_mount_image$iso9660(&(0x7f0000000400), &(0x7f0000000440)='./file0\x00', 0x4, 0x1, &(0x7f0000000480)=[{0xfffffffffffffffe, 0x0, 0x3}], 0x2014400, &(0x7f00000004c0)={[{@check_relaxed}, {@dmode}, {@check_relaxed}], [{@euid_lt={'euid<', 0xee01}}, {@euid_eq}, {@rootcontext={'rootcontext', 0x3d, 'staff_u'}}, {@obj_user={'obj_user', 0x3d, '#-_'}}, {@rootcontext={'rootcontext', 0x3d, 'staff_u'}}]}) faccessat(r0, &(0x7f0000000580)='./file0\x00', 0x88) clock_adjtime(0x4, &(0x7f00000005c0)={0x80000000, 0x100000000, 0xba, 0x80000000, 0x4, 0x20d4e190, 0x7, 0x400, 0x33, 0x7a, 0x1, 0x465d, 0x7f, 0x5, 0x3, 0x1, 0x0, 0x8, 0x7, 0x7ff, 0x1, 0x4, 0x3f, 0x7fff, 0x700b, 0x96}) r1 = accept$unix(0xffffffffffffffff, 0x0, &(0x7f00000006c0)) getsockname$unix(r1, &(0x7f0000000700), &(0x7f0000000780)=0x6e) clock_adjtime(0x3, &(0x7f00000007c0)={0x6, 0x6, 0x7, 0x8000, 0x7ff, 0x5c, 0x401, 0x2, 0x9, 0x4, 0x0, 0x61, 0x2, 0x9b71, 0x100000000, 0x7fffffff, 0x322, 0xc70d, 0x9, 0xd, 0x9, 0x0, 0x9, 0x1a1f00000000, 0xffffffffffffffff, 0x9}) clock_adjtime(0x6, &(0x7f00000008c0)={0x4, 0x9, 0x3, 0xfffffffffffffff7, 0xb31, 0x1, 0x1, 0x2, 0x538, 0x0, 0x401, 0x1, 0xdd, 0xfffffffffffffff7, 0xec54, 0x4, 0x100000001, 0x0, 0xa, 0x1, 0x7ff, 0xcd, 0xf2, 0x80, 0x7, 0x8000}) clock_adjtime(0x0, &(0x7f00000009c0)={0x8, 0xff, 0x81, 0x2, 0x100000001, 0x11, 0x5, 0x1, 0x1, 0x9, 0x1000, 0x8, 0xdf6c, 0x9, 0x8, 0x1004000000000000, 0x1ff, 0x3, 0x6, 0xf5, 0x80000, 0x1, 0xfffffffffffffd6d, 0x2, 0x6, 0xfa}) r2 = socket$unix(0x1, 0x5, 0x0) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f0000000ac0)={'wlan0\x00'}) mq_timedreceive(0xffffffffffffffff, &(0x7f0000000b00)=""/4096, 0x1000, 0x80, &(0x7f0000001b00)={0x0, 0x989680}) r3 = creat(&(0x7f0000001b40)='./file0\x00', 0x1) mknodat(r3, &(0x7f0000001b80)='./file1\x00', 0x4, 0x0) clock_adjtime(0x1000000, &(0x7f0000001bc0)={0xfff, 0x7fff, 0x0, 0x2, 0xfdc, 0x54, 0x8fa, 0x3f41, 0x0, 0x4, 0x4, 0x5, 0x101, 0x5, 0x4, 0x9, 0x9, 0x30e, 0x3f, 0x2, 0x7f, 0x7, 0x6, 0x4, 0x3ff, 0x100000000}) clock_adjtime(0x2, &(0x7f0000001cc0)={0x0, 0x6, 0x7, 0xe5, 0x5, 0x6, 0x10, 0x7, 0x281, 0x40, 0x1, 0x0, 0x1, 0x10001, 0x5, 0x100, 0x0, 0x4, 0xffffffffffffe001, 0xdf, 0x7f, 0x8000, 0x9, 0x400, 0xfffffffffffffe00, 0x3f}) [ 327.293089][T19327] loop1: detected capacity change from 0 to 264192 [ 327.295921][T19321] loop4: detected capacity change from 0 to 264192 [ 327.313752][T19322] EXT4-fs warning (device loop3): read_mmp_block:107: Error -117 while reading MMP block 0 [ 327.348997][T19313] EXT4-fs warning (device loop5): ext4_enable_quotas:6363: Failed to enable quota tracking (type=0, err=-116). Please run e2fsck to fix. [ 327.357153][T19331] SELinux: duplicate or incompatible mount options [ 327.365059][T19313] EXT4-fs (loop5): mount failed 17:06:55 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc01000a, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200), 0x0, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000003980)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d0f465001000005fd0f4655f00000000000001000c000000100008", 0x23, 0x11100}], 0x0, &(0x7f00000000c0)) [ 327.397120][T19321] EXT4-fs error (device loop4): ext4_ext_check_inode:497: inode #3: comm syz-executor.4: pblk 0 bad header/extent: invalid extent entries - magic f30a, entries 1, max 4(4), depth 0(0) [ 327.416027][T19327] EXT4-fs warning (device loop1): ext4_enable_quotas:6363: Failed to enable quota tracking (type=0, err=-22). Please run e2fsck to fix. [ 327.430641][T19327] EXT4-fs (loop1): mount failed [ 327.435604][T19321] EXT4-fs error (device loop4): ext4_quota_enable:6323: comm syz-executor.4: Bad quota inode # 3 17:06:55 executing program 2: clock_adjtime(0x7, &(0x7f0000000000)={0x8000, 0x62, 0xff, 0x1, 0x3, 0x1ff, 0x3ff, 0x4, 0xff, 0x20, 0x6, 0x401, 0x20, 0x0, 0x1ff, 0x8000, 0xfffffffffffffffd, 0x400, 0x8, 0x100000000, 0x2, 0x8, 0xf32, 0x4, 0x6, 0x80}) clock_adjtime(0x2, &(0x7f0000000100)={0xd9, 0x9, 0x1, 0x2, 0x1f, 0x78, 0x4b1, 0x0, 0x401, 0x5, 0x8, 0x1, 0x101, 0x100000001, 0x7, 0x1fc, 0x9, 0x9, 0x0, 0x9, 0x8, 0x3, 0xff, 0x7, 0x73, 0x946c}) clock_adjtime(0x6, &(0x7f0000000200)={0x4, 0x1, 0x100, 0x6, 0x2, 0x6, 0x1, 0x1dd, 0x9, 0x1000000000000000, 0x0, 0x6, 0x1, 0x1, 0x9, 0x5, 0x3023, 0x2, 0x4, 0xfffffffffffffff9, 0x429, 0x3, 0x0, 0x9, 0xffffffffffffff05, 0x1000}) clock_adjtime(0x3, &(0x7f0000000300)={0x0, 0x8, 0x9, 0x9, 0x9, 0x9, 0x6, 0x9, 0x8, 0x1, 0xd0fc, 0x55, 0x2, 0x0, 0x1, 0x1f, 0x100000001, 0x8f44, 0x53, 0x0, 0x3, 0x140000000000, 0x9, 0x8000, 0x0, 0x10001}) r0 = syz_mount_image$iso9660(&(0x7f0000000400), &(0x7f0000000440)='./file0\x00', 0x4, 0x1, &(0x7f0000000480)=[{0xfffffffffffffffe, 0x0, 0x3}], 0x2014400, &(0x7f00000004c0)={[{@check_relaxed}, {@dmode}, {@check_relaxed}], [{@euid_lt={'euid<', 0xee01}}, {@euid_eq}, {@rootcontext={'rootcontext', 0x3d, 'staff_u'}}, {@obj_user={'obj_user', 0x3d, '#-_'}}, {@rootcontext={'rootcontext', 0x3d, 'staff_u'}}]}) faccessat(r0, &(0x7f0000000580)='./file0\x00', 0x88) clock_adjtime(0x4, &(0x7f00000005c0)={0x80000000, 0x100000000, 0xba, 0x80000000, 0x4, 0x20d4e190, 0x7, 0x400, 0x33, 0x7a, 0x1, 0x465d, 0x7f, 0x5, 0x3, 0x1, 0x0, 0x8, 0x7, 0x7ff, 0x1, 0x4, 0x3f, 0x7fff, 0x700b, 0x96}) r1 = accept$unix(0xffffffffffffffff, 0x0, &(0x7f00000006c0)) getsockname$unix(r1, &(0x7f0000000700), &(0x7f0000000780)=0x6e) clock_adjtime(0x3, &(0x7f00000007c0)={0x6, 0x6, 0x7, 0x8000, 0x7ff, 0x5c, 0x401, 0x2, 0x9, 0x4, 0x0, 0x61, 0x2, 0x9b71, 0x100000000, 0x7fffffff, 0x322, 0xc70d, 0x9, 0xd, 0x9, 0x0, 0x9, 0x1a1f00000000, 0xffffffffffffffff, 0x9}) clock_adjtime(0x6, &(0x7f00000008c0)={0x4, 0x9, 0x3, 0xfffffffffffffff7, 0xb31, 0x1, 0x1, 0x2, 0x538, 0x0, 0x401, 0x1, 0xdd, 0xfffffffffffffff7, 0xec54, 0x4, 0x100000001, 0x0, 0xa, 0x1, 0x7ff, 0xcd, 0xf2, 0x80, 0x7, 0x8000}) clock_adjtime(0x0, &(0x7f00000009c0)={0x8, 0xff, 0x81, 0x2, 0x100000001, 0x11, 0x5, 0x1, 0x1, 0x9, 0x1000, 0x8, 0xdf6c, 0x9, 0x8, 0x1004000000000000, 0x1ff, 0x3, 0x6, 0xf5, 0x80000, 0x1, 0xfffffffffffffd6d, 0x2, 0x6, 0xfa}) r2 = socket$unix(0x1, 0x5, 0x0) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f0000000ac0)={'wlan0\x00'}) mq_timedreceive(0xffffffffffffffff, &(0x7f0000000b00)=""/4096, 0x1000, 0x80, &(0x7f0000001b00)={0x0, 0x989680}) r3 = creat(&(0x7f0000001b40)='./file0\x00', 0x1) mknodat(r3, &(0x7f0000001b80)='./file1\x00', 0x4, 0x0) clock_adjtime(0x2000000, &(0x7f0000001bc0)={0xfff, 0x7fff, 0x0, 0x2, 0xfdc, 0x54, 0x8fa, 0x3f41, 0x0, 0x4, 0x4, 0x5, 0x101, 0x5, 0x4, 0x9, 0x9, 0x30e, 0x3f, 0x2, 0x7f, 0x7, 0x6, 0x4, 0x3ff, 0x100000000}) clock_adjtime(0x2, &(0x7f0000001cc0)={0x0, 0x6, 0x7, 0xe5, 0x5, 0x6, 0x10, 0x7, 0x281, 0x40, 0x1, 0x0, 0x1, 0x10001, 0x5, 0x100, 0x0, 0x4, 0xffffffffffffe001, 0xdf, 0x7f, 0x8000, 0x9, 0x400, 0xfffffffffffffe00, 0x3f}) [ 327.454616][T19338] loop3: detected capacity change from 0 to 264192 [ 327.473351][T19321] EXT4-fs warning (device loop4): ext4_enable_quotas:6363: Failed to enable quota tracking (type=0, err=-117). Please run e2fsck to fix. 17:06:55 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc01000f, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000003980)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d0f465001000005fd0f4655f00000000000001", 0x1b, 0x11100}], 0x0, &(0x7f00000000c0)) 17:06:55 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc01000a, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200), 0x0, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000003980)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d0f465001000005fd0f4655f00000000000001000c000000100008", 0x23, 0x11100}], 0x0, &(0x7f00000000c0)) 17:06:55 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc0100fe, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000003980)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="80", 0x1, 0x11100}], 0x0, &(0x7f00000000c0)) 17:06:55 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc01000a, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000003980)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d0f465001000005fd0f4655f00000000000001000c00000010000800000000000af3010004", 0x2d, 0x11100}], 0x0, &(0x7f00000000c0)) (fail_nth: 12) [ 327.519716][T19321] EXT4-fs (loop4): mount failed [ 327.530876][T19338] EXT4-fs warning (device loop3): read_mmp_block:107: Error -117 while reading MMP block 0 [ 327.548292][T19345] loop1: detected capacity change from 0 to 264192 [ 327.558687][T19343] SELinux: duplicate or incompatible mount options [ 327.599415][T19351] loop3: detected capacity change from 0 to 264192 [ 327.607067][T19349] loop5: detected capacity change from 0 to 264192 [ 327.618224][T19353] FAULT_INJECTION: forcing a failure. [ 327.618224][T19353] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 327.631381][T19353] CPU: 0 PID: 19353 Comm: syz-executor.4 Not tainted 5.16.0-syzkaller #0 [ 327.639830][T19353] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 327.649957][T19353] Call Trace: [ 327.653241][T19353] [ 327.656162][T19353] dump_stack_lvl+0xd6/0x122 [ 327.660786][T19353] dump_stack+0x11/0x1b [ 327.665053][T19353] should_fail+0x23c/0x250 [ 327.669471][T19353] should_fail_usercopy+0x16/0x20 [ 327.674490][T19353] copy_page_from_iter_atomic+0x2f1/0xc60 [ 327.680218][T19353] ? shmem_write_begin+0x7e/0x100 [ 327.685275][T19353] generic_perform_write+0x211/0x400 [ 327.690591][T19353] ? current_time+0xed/0x1a0 [ 327.695187][T19353] __generic_file_write_iter+0xf7/0x2b0 [ 327.700740][T19353] ? generic_write_checks+0x250/0x290 [ 327.706237][T19353] generic_file_write_iter+0x75/0x130 [ 327.711789][T19353] vfs_write+0x7f5/0x950 [ 327.716093][T19353] __x64_sys_pwrite64+0xf5/0x150 [ 327.721114][T19353] do_syscall_64+0x44/0xd0 [ 327.725544][T19353] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 327.731444][T19353] RIP: 0033:0x7f6f94bd5e67 [ 327.735885][T19353] Code: 08 89 3c 24 48 89 4c 24 18 e8 e5 f8 ff ff 4c 8b 54 24 18 48 8b 54 24 10 41 89 c0 48 8b 74 24 08 8b 3c 24 b8 12 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 31 44 89 c7 48 89 04 24 e8 15 f9 ff ff 48 8b [ 327.755573][T19353] RSP: 002b:00007f6f93d98f00 EFLAGS: 00000293 ORIG_RAX: 0000000000000012 [ 327.764005][T19353] RAX: ffffffffffffffda RBX: 00007f6f94c6c9c8 RCX: 00007f6f94bd5e67 [ 327.771986][T19353] RDX: 0000000000000009 RSI: 0000000020010400 RDI: 0000000000000004 [ 327.779951][T19353] RBP: 0000000000000007 R08: 0000000000000000 R09: 00007f6f93d991d0 [ 327.787949][T19353] R10: 0000000000000800 R11: 0000000000000293 R12: 0000000000000004 [ 327.795926][T19353] R13: 0000000000000004 R14: 0000000020000248 R15: 0000000000000003 [ 327.803897][T19353] [ 327.817513][T19351] EXT4-fs warning (device loop3): read_mmp_block:107: Error -117 while reading MMP block 0 [ 327.827995][T19345] EXT4-fs warning (device loop1): ext4_enable_quotas:6363: Failed to enable quota tracking (type=0, err=-22). Please run e2fsck to fix. [ 327.831618][T19353] loop4: detected capacity change from 0 to 264192 [ 327.859356][T19345] EXT4-fs (loop1): mount failed 17:06:56 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc01000a, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="0100000000", 0x5, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000003980)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d0f465001000005fd0f4655f00000000000001000c000000100008", 0x23, 0x11100}], 0x0, &(0x7f00000000c0)) [ 327.886408][T19349] EXT4-fs error (device loop5): ext4_quota_enable:6323: comm syz-executor.5: Bad quota inode # 3 [ 327.910202][T19349] EXT4-fs warning (device loop5): ext4_enable_quotas:6363: Failed to enable quota tracking (type=0, err=-116). Please run e2fsck to fix. 17:06:56 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc01000a, 0xff0f, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000003980)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d9", 0x4, 0x6800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d0f465001000005fd0f4655f00000000000001000c00000010000800000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}], 0x0, &(0x7f00000000c0)) 17:06:56 executing program 2: clock_adjtime(0x7, &(0x7f0000000000)={0x8000, 0x62, 0xff, 0x1, 0x3, 0x1ff, 0x3ff, 0x4, 0xff, 0x20, 0x6, 0x401, 0x20, 0x0, 0x1ff, 0x8000, 0xfffffffffffffffd, 0x400, 0x8, 0x100000000, 0x2, 0x8, 0xf32, 0x4, 0x6, 0x80}) clock_adjtime(0x2, &(0x7f0000000100)={0xd9, 0x9, 0x1, 0x2, 0x1f, 0x78, 0x4b1, 0x0, 0x401, 0x5, 0x8, 0x1, 0x101, 0x100000001, 0x7, 0x1fc, 0x9, 0x9, 0x0, 0x9, 0x8, 0x3, 0xff, 0x7, 0x73, 0x946c}) clock_adjtime(0x6, &(0x7f0000000200)={0x4, 0x1, 0x100, 0x6, 0x2, 0x6, 0x1, 0x1dd, 0x9, 0x1000000000000000, 0x0, 0x6, 0x1, 0x1, 0x9, 0x5, 0x3023, 0x2, 0x4, 0xfffffffffffffff9, 0x429, 0x3, 0x0, 0x9, 0xffffffffffffff05, 0x1000}) clock_adjtime(0x3, &(0x7f0000000300)={0x0, 0x8, 0x9, 0x9, 0x9, 0x9, 0x6, 0x9, 0x8, 0x1, 0xd0fc, 0x55, 0x2, 0x0, 0x1, 0x1f, 0x100000001, 0x8f44, 0x53, 0x0, 0x3, 0x140000000000, 0x9, 0x8000, 0x0, 0x10001}) r0 = syz_mount_image$iso9660(&(0x7f0000000400), &(0x7f0000000440)='./file0\x00', 0x4, 0x1, &(0x7f0000000480)=[{0xfffffffffffffffe, 0x0, 0x3}], 0x2014400, &(0x7f00000004c0)={[{@check_relaxed}, {@dmode}, {@check_relaxed}], [{@euid_lt={'euid<', 0xee01}}, {@euid_eq}, {@rootcontext={'rootcontext', 0x3d, 'staff_u'}}, {@obj_user={'obj_user', 0x3d, '#-_'}}, {@rootcontext={'rootcontext', 0x3d, 'staff_u'}}]}) faccessat(r0, &(0x7f0000000580)='./file0\x00', 0x88) clock_adjtime(0x4, &(0x7f00000005c0)={0x80000000, 0x100000000, 0xba, 0x80000000, 0x4, 0x20d4e190, 0x7, 0x400, 0x33, 0x7a, 0x1, 0x465d, 0x7f, 0x5, 0x3, 0x1, 0x0, 0x8, 0x7, 0x7ff, 0x1, 0x4, 0x3f, 0x7fff, 0x700b, 0x96}) r1 = accept$unix(0xffffffffffffffff, 0x0, &(0x7f00000006c0)) getsockname$unix(r1, &(0x7f0000000700), &(0x7f0000000780)=0x6e) clock_adjtime(0x3, &(0x7f00000007c0)={0x6, 0x6, 0x7, 0x8000, 0x7ff, 0x5c, 0x401, 0x2, 0x9, 0x4, 0x0, 0x61, 0x2, 0x9b71, 0x100000000, 0x7fffffff, 0x322, 0xc70d, 0x9, 0xd, 0x9, 0x0, 0x9, 0x1a1f00000000, 0xffffffffffffffff, 0x9}) clock_adjtime(0x6, &(0x7f00000008c0)={0x4, 0x9, 0x3, 0xfffffffffffffff7, 0xb31, 0x1, 0x1, 0x2, 0x538, 0x0, 0x401, 0x1, 0xdd, 0xfffffffffffffff7, 0xec54, 0x4, 0x100000001, 0x0, 0xa, 0x1, 0x7ff, 0xcd, 0xf2, 0x80, 0x7, 0x8000}) clock_adjtime(0x0, &(0x7f00000009c0)={0x8, 0xff, 0x81, 0x2, 0x100000001, 0x11, 0x5, 0x1, 0x1, 0x9, 0x1000, 0x8, 0xdf6c, 0x9, 0x8, 0x1004000000000000, 0x1ff, 0x3, 0x6, 0xf5, 0x80000, 0x1, 0xfffffffffffffd6d, 0x2, 0x6, 0xfa}) r2 = socket$unix(0x1, 0x5, 0x0) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f0000000ac0)={'wlan0\x00'}) mq_timedreceive(0xffffffffffffffff, &(0x7f0000000b00)=""/4096, 0x1000, 0x80, &(0x7f0000001b00)={0x0, 0x989680}) r3 = creat(&(0x7f0000001b40)='./file0\x00', 0x1) mknodat(r3, &(0x7f0000001b80)='./file1\x00', 0x4, 0x0) clock_adjtime(0x3000000, &(0x7f0000001bc0)={0xfff, 0x7fff, 0x0, 0x2, 0xfdc, 0x54, 0x8fa, 0x3f41, 0x0, 0x4, 0x4, 0x5, 0x101, 0x5, 0x4, 0x9, 0x9, 0x30e, 0x3f, 0x2, 0x7f, 0x7, 0x6, 0x4, 0x3ff, 0x100000000}) clock_adjtime(0x2, &(0x7f0000001cc0)={0x0, 0x6, 0x7, 0xe5, 0x5, 0x6, 0x10, 0x7, 0x281, 0x40, 0x1, 0x0, 0x1, 0x10001, 0x5, 0x100, 0x0, 0x4, 0xffffffffffffe001, 0xdf, 0x7f, 0x8000, 0x9, 0x400, 0xfffffffffffffe00, 0x3f}) 17:06:56 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc01000a, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="0100000000", 0x5, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000003980)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d0f465001000005fd0f4655f00000000000001000c000000100008", 0x23, 0x11100}], 0x0, &(0x7f00000000c0)) 17:06:56 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc010011, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000003980)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d0f465001000005fd0f4655f00000000000001", 0x1b, 0x11100}], 0x0, &(0x7f00000000c0)) [ 327.934194][T19360] loop3: detected capacity change from 0 to 264192 [ 327.941076][T19349] EXT4-fs (loop5): mount failed [ 327.942798][T19362] SELinux: duplicate or incompatible mount options [ 327.953154][T19360] EXT4-fs warning (device loop3): read_mmp_block:107: Error -117 while reading MMP block 0 17:06:56 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc01feff, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000003980)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="80", 0x1, 0x11100}], 0x0, &(0x7f00000000c0)) 17:06:56 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc01000a, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="0100000000", 0x5, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000003980)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d0f465001000005fd0f4655f00000000000001000c000000100008", 0x23, 0x11100}], 0x0, &(0x7f00000000c0)) [ 328.019198][T19353] EXT4-fs error (device loop4): ext4_ext_check_inode:497: inode #3: comm syz-executor.4: pblk 0 bad header/extent: invalid extent entries - magic f30a, entries 1, max 4(4), depth 0(0) [ 328.029096][T19370] loop1: detected capacity change from 0 to 264192 [ 328.052651][T19372] loop5: detected capacity change from 0 to 264192 [ 328.054439][T19353] EXT4-fs error (device loop4): ext4_quota_enable:6323: comm syz-executor.4: Bad quota inode # 3 [ 328.074309][T19375] loop3: detected capacity change from 0 to 264192 [ 328.093868][T19353] EXT4-fs warning (device loop4): ext4_enable_quotas:6363: Failed to enable quota tracking (type=0, err=-117). Please run e2fsck to fix. 17:06:56 executing program 2: clock_adjtime(0x7, &(0x7f0000000000)={0x8000, 0x62, 0xff, 0x1, 0x3, 0x1ff, 0x3ff, 0x4, 0xff, 0x20, 0x6, 0x401, 0x20, 0x0, 0x1ff, 0x8000, 0xfffffffffffffffd, 0x400, 0x8, 0x100000000, 0x2, 0x8, 0xf32, 0x4, 0x6, 0x80}) clock_adjtime(0x2, &(0x7f0000000100)={0xd9, 0x9, 0x1, 0x2, 0x1f, 0x78, 0x4b1, 0x0, 0x401, 0x5, 0x8, 0x1, 0x101, 0x100000001, 0x7, 0x1fc, 0x9, 0x9, 0x0, 0x9, 0x8, 0x3, 0xff, 0x7, 0x73, 0x946c}) clock_adjtime(0x6, &(0x7f0000000200)={0x4, 0x1, 0x100, 0x6, 0x2, 0x6, 0x1, 0x1dd, 0x9, 0x1000000000000000, 0x0, 0x6, 0x1, 0x1, 0x9, 0x5, 0x3023, 0x2, 0x4, 0xfffffffffffffff9, 0x429, 0x3, 0x0, 0x9, 0xffffffffffffff05, 0x1000}) clock_adjtime(0x3, &(0x7f0000000300)={0x0, 0x8, 0x9, 0x9, 0x9, 0x9, 0x6, 0x9, 0x8, 0x1, 0xd0fc, 0x55, 0x2, 0x0, 0x1, 0x1f, 0x100000001, 0x8f44, 0x53, 0x0, 0x3, 0x140000000000, 0x9, 0x8000, 0x0, 0x10001}) r0 = syz_mount_image$iso9660(&(0x7f0000000400), &(0x7f0000000440)='./file0\x00', 0x4, 0x1, &(0x7f0000000480)=[{0xfffffffffffffffe, 0x0, 0x3}], 0x2014400, &(0x7f00000004c0)={[{@check_relaxed}, {@dmode}, {@check_relaxed}], [{@euid_lt={'euid<', 0xee01}}, {@euid_eq}, {@rootcontext={'rootcontext', 0x3d, 'staff_u'}}, {@obj_user={'obj_user', 0x3d, '#-_'}}, {@rootcontext={'rootcontext', 0x3d, 'staff_u'}}]}) faccessat(r0, &(0x7f0000000580)='./file0\x00', 0x88) clock_adjtime(0x4, &(0x7f00000005c0)={0x80000000, 0x100000000, 0xba, 0x80000000, 0x4, 0x20d4e190, 0x7, 0x400, 0x33, 0x7a, 0x1, 0x465d, 0x7f, 0x5, 0x3, 0x1, 0x0, 0x8, 0x7, 0x7ff, 0x1, 0x4, 0x3f, 0x7fff, 0x700b, 0x96}) r1 = accept$unix(0xffffffffffffffff, 0x0, &(0x7f00000006c0)) getsockname$unix(r1, &(0x7f0000000700), &(0x7f0000000780)=0x6e) clock_adjtime(0x3, &(0x7f00000007c0)={0x6, 0x6, 0x7, 0x8000, 0x7ff, 0x5c, 0x401, 0x2, 0x9, 0x4, 0x0, 0x61, 0x2, 0x9b71, 0x100000000, 0x7fffffff, 0x322, 0xc70d, 0x9, 0xd, 0x9, 0x0, 0x9, 0x1a1f00000000, 0xffffffffffffffff, 0x9}) clock_adjtime(0x6, &(0x7f00000008c0)={0x4, 0x9, 0x3, 0xfffffffffffffff7, 0xb31, 0x1, 0x1, 0x2, 0x538, 0x0, 0x401, 0x1, 0xdd, 0xfffffffffffffff7, 0xec54, 0x4, 0x100000001, 0x0, 0xa, 0x1, 0x7ff, 0xcd, 0xf2, 0x80, 0x7, 0x8000}) clock_adjtime(0x0, &(0x7f00000009c0)={0x8, 0xff, 0x81, 0x2, 0x100000001, 0x11, 0x5, 0x1, 0x1, 0x9, 0x1000, 0x8, 0xdf6c, 0x9, 0x8, 0x1004000000000000, 0x1ff, 0x3, 0x6, 0xf5, 0x80000, 0x1, 0xfffffffffffffd6d, 0x2, 0x6, 0xfa}) r2 = socket$unix(0x1, 0x5, 0x0) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f0000000ac0)={'wlan0\x00'}) mq_timedreceive(0xffffffffffffffff, &(0x7f0000000b00)=""/4096, 0x1000, 0x80, &(0x7f0000001b00)={0x0, 0x989680}) r3 = creat(&(0x7f0000001b40)='./file0\x00', 0x1) mknodat(r3, &(0x7f0000001b80)='./file1\x00', 0x4, 0x0) clock_adjtime(0x7000000, &(0x7f0000001bc0)={0xfff, 0x7fff, 0x0, 0x2, 0xfdc, 0x54, 0x8fa, 0x3f41, 0x0, 0x4, 0x4, 0x5, 0x101, 0x5, 0x4, 0x9, 0x9, 0x30e, 0x3f, 0x2, 0x7f, 0x7, 0x6, 0x4, 0x3ff, 0x100000000}) clock_adjtime(0x2, &(0x7f0000001cc0)={0x0, 0x6, 0x7, 0xe5, 0x5, 0x6, 0x10, 0x7, 0x281, 0x40, 0x1, 0x0, 0x1, 0x10001, 0x5, 0x100, 0x0, 0x4, 0xffffffffffffe001, 0xdf, 0x7f, 0x8000, 0x9, 0x400, 0xfffffffffffffe00, 0x3f}) [ 328.115842][T19375] EXT4-fs warning (device loop3): read_mmp_block:107: Error -117 while reading MMP block 0 [ 328.126849][T19370] EXT4-fs warning (device loop1): ext4_enable_quotas:6363: Failed to enable quota tracking (type=0, err=-22). Please run e2fsck to fix. [ 328.141991][T19372] EXT4-fs error (device loop5): ext4_quota_enable:6323: comm syz-executor.5: Bad quota inode # 3 [ 328.173564][T19383] SELinux: duplicate or incompatible mount options [ 328.213441][T19372] EXT4-fs warning (device loop5): ext4_enable_quotas:6363: Failed to enable quota tracking (type=0, err=-116). Please run e2fsck to fix. 17:06:56 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc01000a, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005", 0x7, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000003980)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d0f465001000005fd0f4655f00000000000001000c000000100008", 0x23, 0x11100}], 0x0, &(0x7f00000000c0)) [ 328.249138][T19353] EXT4-fs (loop4): mount failed [ 328.254625][T19370] EXT4-fs (loop1): mount failed [ 328.266356][T19372] EXT4-fs (loop5): mount failed 17:06:56 executing program 2: clock_adjtime(0x7, &(0x7f0000000000)={0x8000, 0x62, 0xff, 0x1, 0x3, 0x1ff, 0x3ff, 0x4, 0xff, 0x20, 0x6, 0x401, 0x20, 0x0, 0x1ff, 0x8000, 0xfffffffffffffffd, 0x400, 0x8, 0x100000000, 0x2, 0x8, 0xf32, 0x4, 0x6, 0x80}) clock_adjtime(0x2, &(0x7f0000000100)={0xd9, 0x9, 0x1, 0x2, 0x1f, 0x78, 0x4b1, 0x0, 0x401, 0x5, 0x8, 0x1, 0x101, 0x100000001, 0x7, 0x1fc, 0x9, 0x9, 0x0, 0x9, 0x8, 0x3, 0xff, 0x7, 0x73, 0x946c}) clock_adjtime(0x6, &(0x7f0000000200)={0x4, 0x1, 0x100, 0x6, 0x2, 0x6, 0x1, 0x1dd, 0x9, 0x1000000000000000, 0x0, 0x6, 0x1, 0x1, 0x9, 0x5, 0x3023, 0x2, 0x4, 0xfffffffffffffff9, 0x429, 0x3, 0x0, 0x9, 0xffffffffffffff05, 0x1000}) clock_adjtime(0x3, &(0x7f0000000300)={0x0, 0x8, 0x9, 0x9, 0x9, 0x9, 0x6, 0x9, 0x8, 0x1, 0xd0fc, 0x55, 0x2, 0x0, 0x1, 0x1f, 0x100000001, 0x8f44, 0x53, 0x0, 0x3, 0x140000000000, 0x9, 0x8000, 0x0, 0x10001}) r0 = syz_mount_image$iso9660(&(0x7f0000000400), &(0x7f0000000440)='./file0\x00', 0x4, 0x1, &(0x7f0000000480)=[{0xfffffffffffffffe, 0x0, 0x3}], 0x2014400, &(0x7f00000004c0)={[{@check_relaxed}, {@dmode}, {@check_relaxed}], [{@euid_lt={'euid<', 0xee01}}, {@euid_eq}, {@rootcontext={'rootcontext', 0x3d, 'staff_u'}}, {@obj_user={'obj_user', 0x3d, '#-_'}}, {@rootcontext={'rootcontext', 0x3d, 'staff_u'}}]}) faccessat(r0, &(0x7f0000000580)='./file0\x00', 0x88) clock_adjtime(0x4, &(0x7f00000005c0)={0x80000000, 0x100000000, 0xba, 0x80000000, 0x4, 0x20d4e190, 0x7, 0x400, 0x33, 0x7a, 0x1, 0x465d, 0x7f, 0x5, 0x3, 0x1, 0x0, 0x8, 0x7, 0x7ff, 0x1, 0x4, 0x3f, 0x7fff, 0x700b, 0x96}) r1 = accept$unix(0xffffffffffffffff, 0x0, &(0x7f00000006c0)) getsockname$unix(r1, &(0x7f0000000700), &(0x7f0000000780)=0x6e) clock_adjtime(0x3, &(0x7f00000007c0)={0x6, 0x6, 0x7, 0x8000, 0x7ff, 0x5c, 0x401, 0x2, 0x9, 0x4, 0x0, 0x61, 0x2, 0x9b71, 0x100000000, 0x7fffffff, 0x322, 0xc70d, 0x9, 0xd, 0x9, 0x0, 0x9, 0x1a1f00000000, 0xffffffffffffffff, 0x9}) clock_adjtime(0x6, &(0x7f00000008c0)={0x4, 0x9, 0x3, 0xfffffffffffffff7, 0xb31, 0x1, 0x1, 0x2, 0x538, 0x0, 0x401, 0x1, 0xdd, 0xfffffffffffffff7, 0xec54, 0x4, 0x100000001, 0x0, 0xa, 0x1, 0x7ff, 0xcd, 0xf2, 0x80, 0x7, 0x8000}) clock_adjtime(0x0, &(0x7f00000009c0)={0x8, 0xff, 0x81, 0x2, 0x100000001, 0x11, 0x5, 0x1, 0x1, 0x9, 0x1000, 0x8, 0xdf6c, 0x9, 0x8, 0x1004000000000000, 0x1ff, 0x3, 0x6, 0xf5, 0x80000, 0x1, 0xfffffffffffffd6d, 0x2, 0x6, 0xfa}) r2 = socket$unix(0x1, 0x5, 0x0) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f0000000ac0)={'wlan0\x00'}) mq_timedreceive(0xffffffffffffffff, &(0x7f0000000b00)=""/4096, 0x1000, 0x80, &(0x7f0000001b00)={0x0, 0x989680}) r3 = creat(&(0x7f0000001b40)='./file0\x00', 0x1) mknodat(r3, &(0x7f0000001b80)='./file1\x00', 0x4, 0x0) clock_adjtime(0x8000000, &(0x7f0000001bc0)={0xfff, 0x7fff, 0x0, 0x2, 0xfdc, 0x54, 0x8fa, 0x3f41, 0x0, 0x4, 0x4, 0x5, 0x101, 0x5, 0x4, 0x9, 0x9, 0x30e, 0x3f, 0x2, 0x7f, 0x7, 0x6, 0x4, 0x3ff, 0x100000000}) clock_adjtime(0x2, &(0x7f0000001cc0)={0x0, 0x6, 0x7, 0xe5, 0x5, 0x6, 0x10, 0x7, 0x281, 0x40, 0x1, 0x0, 0x1, 0x10001, 0x5, 0x100, 0x0, 0x4, 0xffffffffffffe001, 0xdf, 0x7f, 0x8000, 0x9, 0x400, 0xfffffffffffffe00, 0x3f}) [ 328.297558][T19387] loop3: detected capacity change from 0 to 264192 17:06:56 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc01000a, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000003980)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d0f465001000005fd0f4655f00000000000001000c00000010000800000000000af3010004", 0x2d, 0x11100}], 0x0, &(0x7f00000000c0)) (fail_nth: 13) [ 328.339195][T19387] EXT4-fs warning (device loop3): read_mmp_block:107: Error -117 while reading MMP block 0 [ 328.351667][T19389] SELinux: duplicate or incompatible mount options 17:06:56 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc01000a, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005", 0x7, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000003980)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d0f465001000005fd0f4655f00000000000001000c000000100008", 0x23, 0x11100}], 0x0, &(0x7f00000000c0)) [ 328.386695][T19392] FAULT_INJECTION: forcing a failure. [ 328.386695][T19392] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 328.399980][T19392] CPU: 0 PID: 19392 Comm: syz-executor.4 Not tainted 5.16.0-syzkaller #0 [ 328.408485][T19392] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 328.418706][T19392] Call Trace: [ 328.421981][T19392] [ 328.424909][T19392] dump_stack_lvl+0xd6/0x122 [ 328.429503][T19392] dump_stack+0x11/0x1b [ 328.433805][T19392] should_fail+0x23c/0x250 [ 328.438309][T19392] __alloc_pages+0x102/0x330 [ 328.442919][T19392] alloc_pages_vma+0x5ee/0x770 [ 328.447896][T19392] shmem_getpage_gfp+0x8bc/0x12c0 [ 328.452992][T19392] shmem_write_begin+0x7e/0x100 [ 328.457843][T19392] generic_perform_write+0x1c8/0x400 [ 328.463215][T19392] ? current_time+0xed/0x1a0 [ 328.467810][T19392] __generic_file_write_iter+0xf7/0x2b0 [ 328.473419][T19392] ? generic_write_checks+0x250/0x290 [ 328.479065][T19392] generic_file_write_iter+0x75/0x130 [ 328.484538][T19392] vfs_write+0x7f5/0x950 [ 328.488825][T19392] __x64_sys_pwrite64+0xf5/0x150 [ 328.493794][T19392] do_syscall_64+0x44/0xd0 [ 328.498208][T19392] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 328.504103][T19392] RIP: 0033:0x7f6f94bd5e67 [ 328.508509][T19392] Code: 08 89 3c 24 48 89 4c 24 18 e8 e5 f8 ff ff 4c 8b 54 24 18 48 8b 54 24 10 41 89 c0 48 8b 74 24 08 8b 3c 24 b8 12 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 31 44 89 c7 48 89 04 24 e8 15 f9 ff ff 48 8b [ 328.528261][T19392] RSP: 002b:00007f6f93d98f00 EFLAGS: 00000293 ORIG_RAX: 0000000000000012 17:06:56 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc010016, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000003980)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d0f465001000005fd0f4655f00000000000001", 0x1b, 0x11100}], 0x0, &(0x7f00000000c0)) [ 328.536803][T19392] RAX: ffffffffffffffda RBX: 00007f6f94c6c9c8 RCX: 00007f6f94bd5e67 [ 328.544777][T19392] RDX: 0000000000000008 RSI: 0000000020003980 RDI: 0000000000000004 [ 328.548203][T19364] loop0: detected capacity change from 0 to 264192 [ 328.552736][T19392] RBP: 0000000000000007 R08: 0000000000000000 R09: 00007f6f93d991d0 [ 328.552756][T19392] R10: 0000000000006000 R11: 0000000000000293 R12: 0000000000000004 [ 328.552769][T19392] R13: 0000000000000004 R14: 0000000020000260 R15: 0000000000000004 17:06:56 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc01000a, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="1b0000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000003980)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d9", 0x4, 0x6800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d0f465001000005fd0f4655f00000000000001000c00000010000800000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}], 0x0, &(0x7f00000000c0)) 17:06:56 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc01fffe, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000003980)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="80", 0x1, 0x11100}], 0x0, &(0x7f00000000c0)) 17:06:56 executing program 2: clock_adjtime(0x7, &(0x7f0000000000)={0x8000, 0x62, 0xff, 0x1, 0x3, 0x1ff, 0x3ff, 0x4, 0xff, 0x20, 0x6, 0x401, 0x20, 0x0, 0x1ff, 0x8000, 0xfffffffffffffffd, 0x400, 0x8, 0x100000000, 0x2, 0x8, 0xf32, 0x4, 0x6, 0x80}) clock_adjtime(0x2, &(0x7f0000000100)={0xd9, 0x9, 0x1, 0x2, 0x1f, 0x78, 0x4b1, 0x0, 0x401, 0x5, 0x8, 0x1, 0x101, 0x100000001, 0x7, 0x1fc, 0x9, 0x9, 0x0, 0x9, 0x8, 0x3, 0xff, 0x7, 0x73, 0x946c}) clock_adjtime(0x6, &(0x7f0000000200)={0x4, 0x1, 0x100, 0x6, 0x2, 0x6, 0x1, 0x1dd, 0x9, 0x1000000000000000, 0x0, 0x6, 0x1, 0x1, 0x9, 0x5, 0x3023, 0x2, 0x4, 0xfffffffffffffff9, 0x429, 0x3, 0x0, 0x9, 0xffffffffffffff05, 0x1000}) clock_adjtime(0x3, &(0x7f0000000300)={0x0, 0x8, 0x9, 0x9, 0x9, 0x9, 0x6, 0x9, 0x8, 0x1, 0xd0fc, 0x55, 0x2, 0x0, 0x1, 0x1f, 0x100000001, 0x8f44, 0x53, 0x0, 0x3, 0x140000000000, 0x9, 0x8000, 0x0, 0x10001}) r0 = syz_mount_image$iso9660(&(0x7f0000000400), &(0x7f0000000440)='./file0\x00', 0x4, 0x1, &(0x7f0000000480)=[{0xfffffffffffffffe, 0x0, 0x3}], 0x2014400, &(0x7f00000004c0)={[{@check_relaxed}, {@dmode}, {@check_relaxed}], [{@euid_lt={'euid<', 0xee01}}, {@euid_eq}, {@rootcontext={'rootcontext', 0x3d, 'staff_u'}}, {@obj_user={'obj_user', 0x3d, '#-_'}}, {@rootcontext={'rootcontext', 0x3d, 'staff_u'}}]}) faccessat(r0, &(0x7f0000000580)='./file0\x00', 0x88) clock_adjtime(0x4, &(0x7f00000005c0)={0x80000000, 0x100000000, 0xba, 0x80000000, 0x4, 0x20d4e190, 0x7, 0x400, 0x33, 0x7a, 0x1, 0x465d, 0x7f, 0x5, 0x3, 0x1, 0x0, 0x8, 0x7, 0x7ff, 0x1, 0x4, 0x3f, 0x7fff, 0x700b, 0x96}) r1 = accept$unix(0xffffffffffffffff, 0x0, &(0x7f00000006c0)) getsockname$unix(r1, &(0x7f0000000700), &(0x7f0000000780)=0x6e) clock_adjtime(0x3, &(0x7f00000007c0)={0x6, 0x6, 0x7, 0x8000, 0x7ff, 0x5c, 0x401, 0x2, 0x9, 0x4, 0x0, 0x61, 0x2, 0x9b71, 0x100000000, 0x7fffffff, 0x322, 0xc70d, 0x9, 0xd, 0x9, 0x0, 0x9, 0x1a1f00000000, 0xffffffffffffffff, 0x9}) clock_adjtime(0x6, &(0x7f00000008c0)={0x4, 0x9, 0x3, 0xfffffffffffffff7, 0xb31, 0x1, 0x1, 0x2, 0x538, 0x0, 0x401, 0x1, 0xdd, 0xfffffffffffffff7, 0xec54, 0x4, 0x100000001, 0x0, 0xa, 0x1, 0x7ff, 0xcd, 0xf2, 0x80, 0x7, 0x8000}) clock_adjtime(0x0, &(0x7f00000009c0)={0x8, 0xff, 0x81, 0x2, 0x100000001, 0x11, 0x5, 0x1, 0x1, 0x9, 0x1000, 0x8, 0xdf6c, 0x9, 0x8, 0x1004000000000000, 0x1ff, 0x3, 0x6, 0xf5, 0x80000, 0x1, 0xfffffffffffffd6d, 0x2, 0x6, 0xfa}) r2 = socket$unix(0x1, 0x5, 0x0) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f0000000ac0)={'wlan0\x00'}) mq_timedreceive(0xffffffffffffffff, &(0x7f0000000b00)=""/4096, 0x1000, 0x80, &(0x7f0000001b00)={0x0, 0x989680}) r3 = creat(&(0x7f0000001b40)='./file0\x00', 0x1) mknodat(r3, &(0x7f0000001b80)='./file1\x00', 0x4, 0x0) clock_adjtime(0xa000000, &(0x7f0000001bc0)={0xfff, 0x7fff, 0x0, 0x2, 0xfdc, 0x54, 0x8fa, 0x3f41, 0x0, 0x4, 0x4, 0x5, 0x101, 0x5, 0x4, 0x9, 0x9, 0x30e, 0x3f, 0x2, 0x7f, 0x7, 0x6, 0x4, 0x3ff, 0x100000000}) clock_adjtime(0x2, &(0x7f0000001cc0)={0x0, 0x6, 0x7, 0xe5, 0x5, 0x6, 0x10, 0x7, 0x281, 0x40, 0x1, 0x0, 0x1, 0x10001, 0x5, 0x100, 0x0, 0x4, 0xffffffffffffe001, 0xdf, 0x7f, 0x8000, 0x9, 0x400, 0xfffffffffffffe00, 0x3f}) [ 328.568327][T19395] loop1: detected capacity change from 0 to 264192 [ 328.575175][T19392] [ 328.594988][T19364] EXT4-fs (loop0): VFS: Can't find ext4 filesystem [ 328.597315][T19392] loop4: detected capacity change from 0 to 264192 [ 328.615178][T19398] loop3: detected capacity change from 0 to 264192 [ 328.636322][T19401] loop0: detected capacity change from 0 to 264192 [ 328.645350][T19404] SELinux: duplicate or incompatible mount options [ 328.653690][T19403] loop5: detected capacity change from 0 to 264192 [ 328.660224][T19401] EXT4-fs (loop0): inodes count not valid: 27 vs 32 [ 328.669921][T19392] EXT4-fs warning (device loop4): read_mmp_block:107: Error -117 while reading MMP block 12 17:06:57 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc01000a, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="200000080000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000003980)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d9", 0x4, 0x6800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d0f465001000005fd0f4655f00000000000001000c00000010000800000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}], 0x0, &(0x7f00000000c0)) 17:06:57 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc01000a, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005", 0x7, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000003980)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d0f465001000005fd0f4655f00000000000001000c000000100008", 0x23, 0x11100}], 0x0, &(0x7f00000000c0)) [ 328.681195][T19395] EXT4-fs warning (device loop1): ext4_enable_quotas:6363: Failed to enable quota tracking (type=0, err=-22). Please run e2fsck to fix. [ 328.698058][T19398] EXT4-fs warning (device loop3): read_mmp_block:107: Error -117 while reading MMP block 0 [ 328.699640][T19395] EXT4-fs (loop1): mount failed [ 328.714222][T19403] EXT4-fs error (device loop5): ext4_quota_enable:6323: comm syz-executor.5: Bad quota inode # 3 17:06:57 executing program 2: clock_adjtime(0x7, &(0x7f0000000000)={0x8000, 0x62, 0xff, 0x1, 0x3, 0x1ff, 0x3ff, 0x4, 0xff, 0x20, 0x6, 0x401, 0x20, 0x0, 0x1ff, 0x8000, 0xfffffffffffffffd, 0x400, 0x8, 0x100000000, 0x2, 0x8, 0xf32, 0x4, 0x6, 0x80}) clock_adjtime(0x2, &(0x7f0000000100)={0xd9, 0x9, 0x1, 0x2, 0x1f, 0x78, 0x4b1, 0x0, 0x401, 0x5, 0x8, 0x1, 0x101, 0x100000001, 0x7, 0x1fc, 0x9, 0x9, 0x0, 0x9, 0x8, 0x3, 0xff, 0x7, 0x73, 0x946c}) clock_adjtime(0x6, &(0x7f0000000200)={0x4, 0x1, 0x100, 0x6, 0x2, 0x6, 0x1, 0x1dd, 0x9, 0x1000000000000000, 0x0, 0x6, 0x1, 0x1, 0x9, 0x5, 0x3023, 0x2, 0x4, 0xfffffffffffffff9, 0x429, 0x3, 0x0, 0x9, 0xffffffffffffff05, 0x1000}) clock_adjtime(0x3, &(0x7f0000000300)={0x0, 0x8, 0x9, 0x9, 0x9, 0x9, 0x6, 0x9, 0x8, 0x1, 0xd0fc, 0x55, 0x2, 0x0, 0x1, 0x1f, 0x100000001, 0x8f44, 0x53, 0x0, 0x3, 0x140000000000, 0x9, 0x8000, 0x0, 0x10001}) r0 = syz_mount_image$iso9660(&(0x7f0000000400), &(0x7f0000000440)='./file0\x00', 0x4, 0x1, &(0x7f0000000480)=[{0xfffffffffffffffe, 0x0, 0x3}], 0x2014400, &(0x7f00000004c0)={[{@check_relaxed}, {@dmode}, {@check_relaxed}], [{@euid_lt={'euid<', 0xee01}}, {@euid_eq}, {@rootcontext={'rootcontext', 0x3d, 'staff_u'}}, {@obj_user={'obj_user', 0x3d, '#-_'}}, {@rootcontext={'rootcontext', 0x3d, 'staff_u'}}]}) faccessat(r0, &(0x7f0000000580)='./file0\x00', 0x88) clock_adjtime(0x4, &(0x7f00000005c0)={0x80000000, 0x100000000, 0xba, 0x80000000, 0x4, 0x20d4e190, 0x7, 0x400, 0x33, 0x7a, 0x1, 0x465d, 0x7f, 0x5, 0x3, 0x1, 0x0, 0x8, 0x7, 0x7ff, 0x1, 0x4, 0x3f, 0x7fff, 0x700b, 0x96}) r1 = accept$unix(0xffffffffffffffff, 0x0, &(0x7f00000006c0)) getsockname$unix(r1, &(0x7f0000000700), &(0x7f0000000780)=0x6e) clock_adjtime(0x3, &(0x7f00000007c0)={0x6, 0x6, 0x7, 0x8000, 0x7ff, 0x5c, 0x401, 0x2, 0x9, 0x4, 0x0, 0x61, 0x2, 0x9b71, 0x100000000, 0x7fffffff, 0x322, 0xc70d, 0x9, 0xd, 0x9, 0x0, 0x9, 0x1a1f00000000, 0xffffffffffffffff, 0x9}) clock_adjtime(0x6, &(0x7f00000008c0)={0x4, 0x9, 0x3, 0xfffffffffffffff7, 0xb31, 0x1, 0x1, 0x2, 0x538, 0x0, 0x401, 0x1, 0xdd, 0xfffffffffffffff7, 0xec54, 0x4, 0x100000001, 0x0, 0xa, 0x1, 0x7ff, 0xcd, 0xf2, 0x80, 0x7, 0x8000}) clock_adjtime(0x0, &(0x7f00000009c0)={0x8, 0xff, 0x81, 0x2, 0x100000001, 0x11, 0x5, 0x1, 0x1, 0x9, 0x1000, 0x8, 0xdf6c, 0x9, 0x8, 0x1004000000000000, 0x1ff, 0x3, 0x6, 0xf5, 0x80000, 0x1, 0xfffffffffffffd6d, 0x2, 0x6, 0xfa}) r2 = socket$unix(0x1, 0x5, 0x0) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f0000000ac0)={'wlan0\x00'}) mq_timedreceive(0xffffffffffffffff, &(0x7f0000000b00)=""/4096, 0x1000, 0x80, &(0x7f0000001b00)={0x0, 0x989680}) r3 = creat(&(0x7f0000001b40)='./file0\x00', 0x1) mknodat(r3, &(0x7f0000001b80)='./file1\x00', 0x4, 0x0) clock_adjtime(0xb000000, &(0x7f0000001bc0)={0xfff, 0x7fff, 0x0, 0x2, 0xfdc, 0x54, 0x8fa, 0x3f41, 0x0, 0x4, 0x4, 0x5, 0x101, 0x5, 0x4, 0x9, 0x9, 0x30e, 0x3f, 0x2, 0x7f, 0x7, 0x6, 0x4, 0x3ff, 0x100000000}) clock_adjtime(0x2, &(0x7f0000001cc0)={0x0, 0x6, 0x7, 0xe5, 0x5, 0x6, 0x10, 0x7, 0x281, 0x40, 0x1, 0x0, 0x1, 0x10001, 0x5, 0x100, 0x0, 0x4, 0xffffffffffffe001, 0xdf, 0x7f, 0x8000, 0x9, 0x400, 0xfffffffffffffe00, 0x3f}) 17:06:57 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc010025, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000003980)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d0f465001000005fd0f4655f00000000000001", 0x1b, 0x11100}], 0x0, &(0x7f00000000c0)) 17:06:57 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc01000a, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000003980)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d0f465001000005fd0f4655f00000000000001000c00000010000800000000000af3010004", 0x2d, 0x11100}], 0x0, &(0x7f00000000c0)) (fail_nth: 14) [ 328.774695][T19403] EXT4-fs warning (device loop5): ext4_enable_quotas:6363: Failed to enable quota tracking (type=0, err=-116). Please run e2fsck to fix. 17:06:57 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc01000a, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000003980)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="80", 0x1, 0x11100}], 0x0, &(0x7f00000000c0)) [ 328.814929][T19403] EXT4-fs (loop5): mount failed [ 328.820273][T19417] loop1: detected capacity change from 0 to 264192 [ 328.832281][T19414] loop0: detected capacity change from 0 to 264192 [ 328.835627][T19419] loop3: detected capacity change from 0 to 264192 [ 328.855734][T19422] FAULT_INJECTION: forcing a failure. [ 328.855734][T19422] name failslab, interval 1, probability 0, space 0, times 0 [ 328.860348][T19418] SELinux: duplicate or incompatible mount options [ 328.868329][T19422] CPU: 0 PID: 19422 Comm: syz-executor.4 Not tainted 5.16.0-syzkaller #0 [ 328.868353][T19422] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 328.893422][T19422] Call Trace: [ 328.896692][T19422] [ 328.899609][T19422] dump_stack_lvl+0xd6/0x122 [ 328.904239][T19422] dump_stack+0x11/0x1b [ 328.908389][T19422] should_fail+0x23c/0x250 [ 328.912789][T19422] ? xas_create+0x3fb/0xb10 [ 328.917347][T19422] __should_failslab+0x81/0x90 [ 328.922099][T19422] should_failslab+0x5/0x20 [ 328.926594][T19422] kmem_cache_alloc+0x4f/0x320 [ 328.931344][T19422] xas_create+0x3fb/0xb10 [ 328.935663][T19422] ? memcg_check_events+0x10/0x410 [ 328.940780][T19422] xas_create_range+0x146/0x360 [ 328.945713][T19422] shmem_add_to_page_cache+0x3dd/0x670 [ 328.951234][T19422] shmem_getpage_gfp+0xaf1/0x12c0 [ 328.956303][T19422] shmem_write_begin+0x7e/0x100 [ 328.961142][T19422] generic_perform_write+0x1c8/0x400 [ 328.966472][T19422] ? current_time+0xed/0x1a0 [ 328.971056][T19422] __generic_file_write_iter+0xf7/0x2b0 [ 328.976712][T19422] ? generic_write_checks+0x250/0x290 [ 328.982158][T19422] generic_file_write_iter+0x75/0x130 [ 328.987551][T19422] vfs_write+0x7f5/0x950 [ 328.991781][T19422] __x64_sys_pwrite64+0xf5/0x150 [ 328.996739][T19422] do_syscall_64+0x44/0xd0 [ 329.001203][T19422] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 329.007140][T19422] RIP: 0033:0x7f6f94bd5e67 [ 329.011538][T19422] Code: 08 89 3c 24 48 89 4c 24 18 e8 e5 f8 ff ff 4c 8b 54 24 18 48 8b 54 24 10 41 89 c0 48 8b 74 24 08 8b 3c 24 b8 12 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 31 44 89 c7 48 89 04 24 e8 15 f9 ff ff 48 8b [ 329.031200][T19422] RSP: 002b:00007f6f93d98f00 EFLAGS: 00000293 ORIG_RAX: 0000000000000012 [ 329.039654][T19422] RAX: ffffffffffffffda RBX: 00007f6f94c6c9c8 RCX: 00007f6f94bd5e67 [ 329.047608][T19422] RDX: 0000000000000008 RSI: 0000000020003980 RDI: 0000000000000004 [ 329.055562][T19422] RBP: 0000000000000007 R08: 0000000000000000 R09: 00007f6f93d991d0 [ 329.063522][T19422] R10: 0000000000006000 R11: 0000000000000293 R12: 0000000000000004 [ 329.071479][T19422] R13: 0000000000000004 R14: 0000000020000260 R15: 0000000000000004 [ 329.079437][T19422] [ 329.084866][T19422] loop4: detected capacity change from 0 to 264192 [ 329.098751][T19419] EXT4-fs warning (device loop3): read_mmp_block:107: Error -117 while reading MMP block 0 17:06:57 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc01000a, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="0100000000000500", 0x8, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000003980)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d0f465001000005fd0f4655f00000000000001000c000000100008", 0x23, 0x11100}], 0x0, &(0x7f00000000c0)) [ 329.133811][T19421] loop5: detected capacity change from 0 to 264192 [ 329.154561][T19417] EXT4-fs warning (device loop1): ext4_enable_quotas:6363: Failed to enable quota tracking (type=0, err=-22). Please run e2fsck to fix. 17:06:57 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc0100fe, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000003980)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d0f465001000005fd0f4655f00000000000001", 0x1b, 0x11100}], 0x0, &(0x7f00000000c0)) [ 329.181084][T19417] EXT4-fs (loop1): mount failed [ 329.187315][T19422] EXT4-fs error (device loop4): ext4_ext_check_inode:497: inode #3: comm syz-executor.4: pblk 0 bad header/extent: invalid extent entries - magic f30a, entries 1, max 4(4), depth 0(0) [ 329.207708][T19414] EXT4-fs (loop0): bad geometry: first data block 0 is beyond end of filesystem (0) 17:06:57 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc01000a, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="200000003a00000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000003980)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d9", 0x4, 0x6800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d0f465001000005fd0f4655f00000000000001000c00000010000800000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}], 0x0, &(0x7f00000000c0)) [ 329.225617][T19422] EXT4-fs error (device loop4): ext4_quota_enable:6323: comm syz-executor.4: Bad quota inode # 3 17:06:57 executing program 2: clock_adjtime(0x7, &(0x7f0000000000)={0x8000, 0x62, 0xff, 0x1, 0x3, 0x1ff, 0x3ff, 0x4, 0xff, 0x20, 0x6, 0x401, 0x20, 0x0, 0x1ff, 0x8000, 0xfffffffffffffffd, 0x400, 0x8, 0x100000000, 0x2, 0x8, 0xf32, 0x4, 0x6, 0x80}) clock_adjtime(0x2, &(0x7f0000000100)={0xd9, 0x9, 0x1, 0x2, 0x1f, 0x78, 0x4b1, 0x0, 0x401, 0x5, 0x8, 0x1, 0x101, 0x100000001, 0x7, 0x1fc, 0x9, 0x9, 0x0, 0x9, 0x8, 0x3, 0xff, 0x7, 0x73, 0x946c}) clock_adjtime(0x6, &(0x7f0000000200)={0x4, 0x1, 0x100, 0x6, 0x2, 0x6, 0x1, 0x1dd, 0x9, 0x1000000000000000, 0x0, 0x6, 0x1, 0x1, 0x9, 0x5, 0x3023, 0x2, 0x4, 0xfffffffffffffff9, 0x429, 0x3, 0x0, 0x9, 0xffffffffffffff05, 0x1000}) clock_adjtime(0x3, &(0x7f0000000300)={0x0, 0x8, 0x9, 0x9, 0x9, 0x9, 0x6, 0x9, 0x8, 0x1, 0xd0fc, 0x55, 0x2, 0x0, 0x1, 0x1f, 0x100000001, 0x8f44, 0x53, 0x0, 0x3, 0x140000000000, 0x9, 0x8000, 0x0, 0x10001}) r0 = syz_mount_image$iso9660(&(0x7f0000000400), &(0x7f0000000440)='./file0\x00', 0x4, 0x1, &(0x7f0000000480)=[{0xfffffffffffffffe, 0x0, 0x3}], 0x2014400, &(0x7f00000004c0)={[{@check_relaxed}, {@dmode}, {@check_relaxed}], [{@euid_lt={'euid<', 0xee01}}, {@euid_eq}, {@rootcontext={'rootcontext', 0x3d, 'staff_u'}}, {@obj_user={'obj_user', 0x3d, '#-_'}}, {@rootcontext={'rootcontext', 0x3d, 'staff_u'}}]}) faccessat(r0, &(0x7f0000000580)='./file0\x00', 0x88) clock_adjtime(0x4, &(0x7f00000005c0)={0x80000000, 0x100000000, 0xba, 0x80000000, 0x4, 0x20d4e190, 0x7, 0x400, 0x33, 0x7a, 0x1, 0x465d, 0x7f, 0x5, 0x3, 0x1, 0x0, 0x8, 0x7, 0x7ff, 0x1, 0x4, 0x3f, 0x7fff, 0x700b, 0x96}) r1 = accept$unix(0xffffffffffffffff, 0x0, &(0x7f00000006c0)) getsockname$unix(r1, &(0x7f0000000700), &(0x7f0000000780)=0x6e) clock_adjtime(0x3, &(0x7f00000007c0)={0x6, 0x6, 0x7, 0x8000, 0x7ff, 0x5c, 0x401, 0x2, 0x9, 0x4, 0x0, 0x61, 0x2, 0x9b71, 0x100000000, 0x7fffffff, 0x322, 0xc70d, 0x9, 0xd, 0x9, 0x0, 0x9, 0x1a1f00000000, 0xffffffffffffffff, 0x9}) clock_adjtime(0x6, &(0x7f00000008c0)={0x4, 0x9, 0x3, 0xfffffffffffffff7, 0xb31, 0x1, 0x1, 0x2, 0x538, 0x0, 0x401, 0x1, 0xdd, 0xfffffffffffffff7, 0xec54, 0x4, 0x100000001, 0x0, 0xa, 0x1, 0x7ff, 0xcd, 0xf2, 0x80, 0x7, 0x8000}) clock_adjtime(0x0, &(0x7f00000009c0)={0x8, 0xff, 0x81, 0x2, 0x100000001, 0x11, 0x5, 0x1, 0x1, 0x9, 0x1000, 0x8, 0xdf6c, 0x9, 0x8, 0x1004000000000000, 0x1ff, 0x3, 0x6, 0xf5, 0x80000, 0x1, 0xfffffffffffffd6d, 0x2, 0x6, 0xfa}) r2 = socket$unix(0x1, 0x5, 0x0) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f0000000ac0)={'wlan0\x00'}) mq_timedreceive(0xffffffffffffffff, &(0x7f0000000b00)=""/4096, 0x1000, 0x80, &(0x7f0000001b00)={0x0, 0x989680}) r3 = creat(&(0x7f0000001b40)='./file0\x00', 0x1) mknodat(r3, &(0x7f0000001b80)='./file1\x00', 0x4, 0x0) clock_adjtime(0x20a10700, &(0x7f0000001bc0)={0xfff, 0x7fff, 0x0, 0x2, 0xfdc, 0x54, 0x8fa, 0x3f41, 0x0, 0x4, 0x4, 0x5, 0x101, 0x5, 0x4, 0x9, 0x9, 0x30e, 0x3f, 0x2, 0x7f, 0x7, 0x6, 0x4, 0x3ff, 0x100000000}) clock_adjtime(0x2, &(0x7f0000001cc0)={0x0, 0x6, 0x7, 0xe5, 0x5, 0x6, 0x10, 0x7, 0x281, 0x40, 0x1, 0x0, 0x1, 0x10001, 0x5, 0x100, 0x0, 0x4, 0xffffffffffffe001, 0xdf, 0x7f, 0x8000, 0x9, 0x400, 0xfffffffffffffe00, 0x3f}) 17:06:57 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc010145, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000003980)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d0f465001000005fd0f4655f00000000000001", 0x1b, 0x11100}], 0x0, &(0x7f00000000c0)) [ 329.258811][T19422] EXT4-fs warning (device loop4): ext4_enable_quotas:6363: Failed to enable quota tracking (type=0, err=-117). Please run e2fsck to fix. [ 329.261965][T19430] loop3: detected capacity change from 0 to 264192 [ 329.283162][T19421] EXT4-fs (loop5): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 329.292976][T19421] EXT4-fs (loop5): group descriptors corrupted! [ 329.294767][T19422] EXT4-fs (loop4): mount failed 17:06:57 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc01000a, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000003980)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="80", 0x1, 0x11100}], 0x0, &(0x7f00000000c0)) [ 329.305085][T19436] SELinux: duplicate or incompatible mount options [ 329.315892][T19430] EXT4-fs warning (device loop3): read_mmp_block:107: Error -117 while reading MMP block 0 [ 329.320628][T19437] loop1: detected capacity change from 0 to 264192 [ 329.337004][T19439] loop0: detected capacity change from 0 to 264192 17:06:57 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc01000a, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000003980)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d0f465001000005fd0f4655f00000000000001000c00000010000800000000000af3010004", 0x2d, 0x11100}], 0x0, &(0x7f00000000c0)) (fail_nth: 15) 17:06:57 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc01000a, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="0100000000000500", 0x8, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000003980)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d0f465001000005fd0f4655f00000000000001000c000000100008", 0x23, 0x11100}], 0x0, &(0x7f00000000c0)) 17:06:57 executing program 2: clock_adjtime(0x7, &(0x7f0000000000)={0x8000, 0x62, 0xff, 0x1, 0x3, 0x1ff, 0x3ff, 0x4, 0xff, 0x20, 0x6, 0x401, 0x20, 0x0, 0x1ff, 0x8000, 0xfffffffffffffffd, 0x400, 0x8, 0x100000000, 0x2, 0x8, 0xf32, 0x4, 0x6, 0x80}) clock_adjtime(0x2, &(0x7f0000000100)={0xd9, 0x9, 0x1, 0x2, 0x1f, 0x78, 0x4b1, 0x0, 0x401, 0x5, 0x8, 0x1, 0x101, 0x100000001, 0x7, 0x1fc, 0x9, 0x9, 0x0, 0x9, 0x8, 0x3, 0xff, 0x7, 0x73, 0x946c}) clock_adjtime(0x6, &(0x7f0000000200)={0x4, 0x1, 0x100, 0x6, 0x2, 0x6, 0x1, 0x1dd, 0x9, 0x1000000000000000, 0x0, 0x6, 0x1, 0x1, 0x9, 0x5, 0x3023, 0x2, 0x4, 0xfffffffffffffff9, 0x429, 0x3, 0x0, 0x9, 0xffffffffffffff05, 0x1000}) clock_adjtime(0x3, &(0x7f0000000300)={0x0, 0x8, 0x9, 0x9, 0x9, 0x9, 0x6, 0x9, 0x8, 0x1, 0xd0fc, 0x55, 0x2, 0x0, 0x1, 0x1f, 0x100000001, 0x8f44, 0x53, 0x0, 0x3, 0x140000000000, 0x9, 0x8000, 0x0, 0x10001}) r0 = syz_mount_image$iso9660(&(0x7f0000000400), &(0x7f0000000440)='./file0\x00', 0x4, 0x1, &(0x7f0000000480)=[{0xfffffffffffffffe, 0x0, 0x3}], 0x2014400, &(0x7f00000004c0)={[{@check_relaxed}, {@dmode}, {@check_relaxed}], [{@euid_lt={'euid<', 0xee01}}, {@euid_eq}, {@rootcontext={'rootcontext', 0x3d, 'staff_u'}}, {@obj_user={'obj_user', 0x3d, '#-_'}}, {@rootcontext={'rootcontext', 0x3d, 'staff_u'}}]}) faccessat(r0, &(0x7f0000000580)='./file0\x00', 0x88) clock_adjtime(0x4, &(0x7f00000005c0)={0x80000000, 0x100000000, 0xba, 0x80000000, 0x4, 0x20d4e190, 0x7, 0x400, 0x33, 0x7a, 0x1, 0x465d, 0x7f, 0x5, 0x3, 0x1, 0x0, 0x8, 0x7, 0x7ff, 0x1, 0x4, 0x3f, 0x7fff, 0x700b, 0x96}) r1 = accept$unix(0xffffffffffffffff, 0x0, &(0x7f00000006c0)) getsockname$unix(r1, &(0x7f0000000700), &(0x7f0000000780)=0x6e) clock_adjtime(0x3, &(0x7f00000007c0)={0x6, 0x6, 0x7, 0x8000, 0x7ff, 0x5c, 0x401, 0x2, 0x9, 0x4, 0x0, 0x61, 0x2, 0x9b71, 0x100000000, 0x7fffffff, 0x322, 0xc70d, 0x9, 0xd, 0x9, 0x0, 0x9, 0x1a1f00000000, 0xffffffffffffffff, 0x9}) clock_adjtime(0x6, &(0x7f00000008c0)={0x4, 0x9, 0x3, 0xfffffffffffffff7, 0xb31, 0x1, 0x1, 0x2, 0x538, 0x0, 0x401, 0x1, 0xdd, 0xfffffffffffffff7, 0xec54, 0x4, 0x100000001, 0x0, 0xa, 0x1, 0x7ff, 0xcd, 0xf2, 0x80, 0x7, 0x8000}) clock_adjtime(0x0, &(0x7f00000009c0)={0x8, 0xff, 0x81, 0x2, 0x100000001, 0x11, 0x5, 0x1, 0x1, 0x9, 0x1000, 0x8, 0xdf6c, 0x9, 0x8, 0x1004000000000000, 0x1ff, 0x3, 0x6, 0xf5, 0x80000, 0x1, 0xfffffffffffffd6d, 0x2, 0x6, 0xfa}) r2 = socket$unix(0x1, 0x5, 0x0) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f0000000ac0)={'wlan0\x00'}) mq_timedreceive(0xffffffffffffffff, &(0x7f0000000b00)=""/4096, 0x1000, 0x80, &(0x7f0000001b00)={0x0, 0x989680}) r3 = creat(&(0x7f0000001b40)='./file0\x00', 0x1) mknodat(r3, &(0x7f0000001b80)='./file1\x00', 0x4, 0x0) clock_adjtime(0x8bcc0c00, &(0x7f0000001bc0)={0xfff, 0x7fff, 0x0, 0x2, 0xfdc, 0x54, 0x8fa, 0x3f41, 0x0, 0x4, 0x4, 0x5, 0x101, 0x5, 0x4, 0x9, 0x9, 0x30e, 0x3f, 0x2, 0x7f, 0x7, 0x6, 0x4, 0x3ff, 0x100000000}) clock_adjtime(0x2, &(0x7f0000001cc0)={0x0, 0x6, 0x7, 0xe5, 0x5, 0x6, 0x10, 0x7, 0x281, 0x40, 0x1, 0x0, 0x1, 0x10001, 0x5, 0x100, 0x0, 0x4, 0xffffffffffffe001, 0xdf, 0x7f, 0x8000, 0x9, 0x400, 0xfffffffffffffe00, 0x3f}) [ 329.398951][T19443] loop5: detected capacity change from 0 to 264192 [ 329.422858][T19439] EXT4-fs warning (device loop0): ext4_enable_quotas:6363: Failed to enable quota tracking (type=0, err=-22). Please run e2fsck to fix. [ 329.435405][T19450] loop3: detected capacity change from 0 to 264192 17:06:57 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc01000a, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000003980)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="80", 0x1, 0x11100}], 0x0, &(0x7f00000000c0)) [ 329.445821][T19443] EXT4-fs (loop5): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 329.454216][T19452] SELinux: duplicate or incompatible mount options [ 329.455616][T19443] EXT4-fs (loop5): group descriptors corrupted! [ 329.476499][T19439] EXT4-fs (loop0): mount failed [ 329.481992][T19448] FAULT_INJECTION: forcing a failure. [ 329.481992][T19448] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 329.495102][T19448] CPU: 0 PID: 19448 Comm: syz-executor.4 Not tainted 5.16.0-syzkaller #0 [ 329.502432][T19450] EXT4-fs warning (device loop3): read_mmp_block:107: Error -117 while reading MMP block 0 [ 329.503567][T19448] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 329.503580][T19448] Call Trace: [ 329.503587][T19448] [ 329.503594][T19448] dump_stack_lvl+0xd6/0x122 [ 329.515009][T19437] EXT4-fs warning (device loop1): ext4_enable_quotas:6363: Failed to enable quota tracking (type=0, err=-22). Please run e2fsck to fix. [ 329.523713][T19448] dump_stack+0x11/0x1b [ 329.523738][T19448] should_fail+0x23c/0x250 [ 329.527838][T19437] EXT4-fs (loop1): mount failed [ 329.529917][T19448] should_fail_usercopy+0x16/0x20 [ 329.529939][T19448] copy_page_from_iter_atomic+0x2f1/0xc60 [ 329.572441][T19448] ? shmem_write_begin+0x7e/0x100 [ 329.577526][T19448] generic_perform_write+0x211/0x400 [ 329.582851][T19448] ? current_time+0xed/0x1a0 [ 329.587479][T19448] __generic_file_write_iter+0xf7/0x2b0 [ 329.593073][T19448] ? generic_write_checks+0x250/0x290 [ 329.598435][T19448] generic_file_write_iter+0x75/0x130 [ 329.603922][T19448] vfs_write+0x7f5/0x950 [ 329.608150][T19448] __x64_sys_pwrite64+0xf5/0x150 [ 329.613170][T19448] do_syscall_64+0x44/0xd0 [ 329.617663][T19448] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 329.623617][T19448] RIP: 0033:0x7f6f94bd5e67 [ 329.628017][T19448] Code: 08 89 3c 24 48 89 4c 24 18 e8 e5 f8 ff ff 4c 8b 54 24 18 48 8b 54 24 10 41 89 c0 48 8b 74 24 08 8b 3c 24 b8 12 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 31 44 89 c7 48 89 04 24 e8 15 f9 ff ff 48 8b [ 329.647806][T19448] RSP: 002b:00007f6f93d98f00 EFLAGS: 00000293 ORIG_RAX: 0000000000000012 [ 329.656199][T19448] RAX: ffffffffffffffda RBX: 00007f6f94c6c9c8 RCX: 00007f6f94bd5e67 [ 329.664234][T19448] RDX: 0000000000000008 RSI: 0000000020003980 RDI: 0000000000000004 [ 329.672265][T19448] RBP: 0000000000000007 R08: 0000000000000000 R09: 00007f6f93d991d0 [ 329.680223][T19448] R10: 0000000000006000 R11: 0000000000000293 R12: 0000000000000004 [ 329.688174][T19448] R13: 0000000000000004 R14: 0000000020000260 R15: 0000000000000004 [ 329.696278][T19448] [ 329.700146][T19448] loop4: detected capacity change from 0 to 264192 [ 329.712772][T19448] EXT4-fs error (device loop4): ext4_ext_check_inode:497: inode #3: comm syz-executor.4: pblk 0 bad header/extent: invalid extent entries - magic f30a, entries 1, max 4(4), depth 0(0) [ 329.732950][T19461] loop5: detected capacity change from 0 to 264192 17:06:58 executing program 2: clock_adjtime(0x7, &(0x7f0000000000)={0x8000, 0x62, 0xff, 0x1, 0x3, 0x1ff, 0x3ff, 0x4, 0xff, 0x20, 0x6, 0x401, 0x20, 0x0, 0x1ff, 0x8000, 0xfffffffffffffffd, 0x400, 0x8, 0x100000000, 0x2, 0x8, 0xf32, 0x4, 0x6, 0x80}) clock_adjtime(0x2, &(0x7f0000000100)={0xd9, 0x9, 0x1, 0x2, 0x1f, 0x78, 0x4b1, 0x0, 0x401, 0x5, 0x8, 0x1, 0x101, 0x100000001, 0x7, 0x1fc, 0x9, 0x9, 0x0, 0x9, 0x8, 0x3, 0xff, 0x7, 0x73, 0x946c}) clock_adjtime(0x6, &(0x7f0000000200)={0x4, 0x1, 0x100, 0x6, 0x2, 0x6, 0x1, 0x1dd, 0x9, 0x1000000000000000, 0x0, 0x6, 0x1, 0x1, 0x9, 0x5, 0x3023, 0x2, 0x4, 0xfffffffffffffff9, 0x429, 0x3, 0x0, 0x9, 0xffffffffffffff05, 0x1000}) clock_adjtime(0x3, &(0x7f0000000300)={0x0, 0x8, 0x9, 0x9, 0x9, 0x9, 0x6, 0x9, 0x8, 0x1, 0xd0fc, 0x55, 0x2, 0x0, 0x1, 0x1f, 0x100000001, 0x8f44, 0x53, 0x0, 0x3, 0x140000000000, 0x9, 0x8000, 0x0, 0x10001}) r0 = syz_mount_image$iso9660(&(0x7f0000000400), &(0x7f0000000440)='./file0\x00', 0x4, 0x1, &(0x7f0000000480)=[{0xfffffffffffffffe, 0x0, 0x3}], 0x2014400, &(0x7f00000004c0)={[{@check_relaxed}, {@dmode}, {@check_relaxed}], [{@euid_lt={'euid<', 0xee01}}, {@euid_eq}, {@rootcontext={'rootcontext', 0x3d, 'staff_u'}}, {@obj_user={'obj_user', 0x3d, '#-_'}}, {@rootcontext={'rootcontext', 0x3d, 'staff_u'}}]}) faccessat(r0, &(0x7f0000000580)='./file0\x00', 0x88) clock_adjtime(0x4, &(0x7f00000005c0)={0x80000000, 0x100000000, 0xba, 0x80000000, 0x4, 0x20d4e190, 0x7, 0x400, 0x33, 0x7a, 0x1, 0x465d, 0x7f, 0x5, 0x3, 0x1, 0x0, 0x8, 0x7, 0x7ff, 0x1, 0x4, 0x3f, 0x7fff, 0x700b, 0x96}) r1 = accept$unix(0xffffffffffffffff, 0x0, &(0x7f00000006c0)) getsockname$unix(r1, &(0x7f0000000700), &(0x7f0000000780)=0x6e) clock_adjtime(0x3, &(0x7f00000007c0)={0x6, 0x6, 0x7, 0x8000, 0x7ff, 0x5c, 0x401, 0x2, 0x9, 0x4, 0x0, 0x61, 0x2, 0x9b71, 0x100000000, 0x7fffffff, 0x322, 0xc70d, 0x9, 0xd, 0x9, 0x0, 0x9, 0x1a1f00000000, 0xffffffffffffffff, 0x9}) clock_adjtime(0x6, &(0x7f00000008c0)={0x4, 0x9, 0x3, 0xfffffffffffffff7, 0xb31, 0x1, 0x1, 0x2, 0x538, 0x0, 0x401, 0x1, 0xdd, 0xfffffffffffffff7, 0xec54, 0x4, 0x100000001, 0x0, 0xa, 0x1, 0x7ff, 0xcd, 0xf2, 0x80, 0x7, 0x8000}) clock_adjtime(0x0, &(0x7f00000009c0)={0x8, 0xff, 0x81, 0x2, 0x100000001, 0x11, 0x5, 0x1, 0x1, 0x9, 0x1000, 0x8, 0xdf6c, 0x9, 0x8, 0x1004000000000000, 0x1ff, 0x3, 0x6, 0xf5, 0x80000, 0x1, 0xfffffffffffffd6d, 0x2, 0x6, 0xfa}) r2 = socket$unix(0x1, 0x5, 0x0) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f0000000ac0)={'wlan0\x00'}) mq_timedreceive(0xffffffffffffffff, &(0x7f0000000b00)=""/4096, 0x1000, 0x80, &(0x7f0000001b00)={0x0, 0x989680}) r3 = creat(&(0x7f0000001b40)='./file0\x00', 0x1) mknodat(r3, &(0x7f0000001b80)='./file1\x00', 0x4, 0x0) clock_adjtime(0xe05ef8ff, &(0x7f0000001bc0)={0xfff, 0x7fff, 0x0, 0x2, 0xfdc, 0x54, 0x8fa, 0x3f41, 0x0, 0x4, 0x4, 0x5, 0x101, 0x5, 0x4, 0x9, 0x9, 0x30e, 0x3f, 0x2, 0x7f, 0x7, 0x6, 0x4, 0x3ff, 0x100000000}) clock_adjtime(0x2, &(0x7f0000001cc0)={0x0, 0x6, 0x7, 0xe5, 0x5, 0x6, 0x10, 0x7, 0x281, 0x40, 0x1, 0x0, 0x1, 0x10001, 0x5, 0x100, 0x0, 0x4, 0xffffffffffffe001, 0xdf, 0x7f, 0x8000, 0x9, 0x400, 0xfffffffffffffe00, 0x3f}) 17:06:58 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc01000a, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="0100000000000500", 0x8, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000003980)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d0f465001000005fd0f4655f00000000000001000c000000100008", 0x23, 0x11100}], 0x0, &(0x7f00000000c0)) 17:06:58 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc01000a, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000003980)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d0f465001000005fd0f4655f00000000000001000c00000010000800000000000af3010004", 0x2d, 0x11100}], 0x0, &(0x7f00000000c0)) (fail_nth: 16) [ 329.732995][T19448] EXT4-fs error (device loop4): ext4_quota_enable:6323: comm syz-executor.4: Bad quota inode # 3 [ 329.752897][T19448] EXT4-fs warning (device loop4): ext4_enable_quotas:6363: Failed to enable quota tracking (type=0, err=-117). Please run e2fsck to fix. [ 329.781825][T19448] EXT4-fs (loop4): mount failed [ 329.790487][T19461] EXT4-fs warning (device loop5): read_mmp_block:107: Error -117 while reading MMP block 12 [ 329.816089][T19465] FAULT_INJECTION: forcing a failure. [ 329.816089][T19465] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 329.829411][T19465] CPU: 1 PID: 19465 Comm: syz-executor.4 Not tainted 5.16.0-syzkaller #0 [ 329.837878][T19465] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 329.841952][T19463] SELinux: duplicate or incompatible mount options [ 329.848195][T19465] Call Trace: [ 329.848204][T19465] [ 329.848212][T19465] dump_stack_lvl+0xd6/0x122 [ 329.865609][T19465] dump_stack+0x11/0x1b [ 329.869846][T19465] should_fail+0x23c/0x250 [ 329.874269][T19465] __alloc_pages+0x102/0x330 [ 329.878935][T19465] alloc_pages_vma+0x5ee/0x770 [ 329.881676][T19467] loop3: detected capacity change from 0 to 264192 [ 329.883702][T19465] shmem_getpage_gfp+0x8bc/0x12c0 [ 329.895045][T19469] loop0: detected capacity change from 0 to 264192 [ 329.895361][T19465] shmem_write_begin+0x7e/0x100 [ 329.906662][T19465] generic_perform_write+0x1c8/0x400 [ 329.911996][T19465] ? current_time+0xed/0x1a0 [ 329.916640][T19465] __generic_file_write_iter+0xf7/0x2b0 [ 329.922235][T19465] ? generic_write_checks+0x250/0x290 [ 329.927737][T19465] generic_file_write_iter+0x75/0x130 [ 329.933205][T19465] vfs_write+0x7f5/0x950 [ 329.937469][T19465] __x64_sys_pwrite64+0xf5/0x150 [ 329.942617][T19465] do_syscall_64+0x44/0xd0 [ 329.943238][T19467] EXT4-fs warning (device loop3): read_mmp_block:107: Error -117 while reading MMP block 0 [ 329.947057][T19465] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 329.963022][T19465] RIP: 0033:0x7f6f94bd5e67 [ 329.967543][T19465] Code: 08 89 3c 24 48 89 4c 24 18 e8 e5 f8 ff ff 4c 8b 54 24 18 48 8b 54 24 10 41 89 c0 48 8b 74 24 08 8b 3c 24 b8 12 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 31 44 89 c7 48 89 04 24 e8 15 f9 ff ff 48 8b [ 329.987253][T19465] RSP: 002b:00007f6f93d98f00 EFLAGS: 00000293 ORIG_RAX: 0000000000000012 [ 329.995762][T19465] RAX: ffffffffffffffda RBX: 00007f6f94c6c9c8 RCX: 00007f6f94bd5e67 [ 330.003745][T19465] RDX: 000000000000001d RSI: 0000000020012e00 RDI: 0000000000000004 17:06:58 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc01000a, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="200000006800000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000003980)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d9", 0x4, 0x6800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d0f465001000005fd0f4655f00000000000001000c00000010000800000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}], 0x0, &(0x7f00000000c0)) 17:06:58 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc01000a, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000003980)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d0f465001000005fd0f4655f00000000000001000c000000100008", 0x23, 0x11100}], 0x0, &(0x7f00000000c0)) 17:06:58 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc0107cd, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000003980)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d0f465001000005fd0f4655f00000000000001", 0x1b, 0x11100}], 0x0, &(0x7f00000000c0)) 17:06:58 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc01000a, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000003980)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="80", 0x1, 0x11100}], 0x0, &(0x7f00000000c0)) [ 330.011776][T19465] RBP: 0000000000000007 R08: 0000000000000000 R09: 00007f6f93d991d0 [ 330.019750][T19465] R10: 0000000000011080 R11: 0000000000000293 R12: 0000000000000004 [ 330.027754][T19465] R13: 0000000000000004 R14: 0000000020000278 R15: 0000000000000005 [ 330.035731][T19465] [ 330.047463][T19476] loop1: detected capacity change from 0 to 264192 17:06:58 executing program 2: clock_adjtime(0x7, &(0x7f0000000000)={0x8000, 0x62, 0xff, 0x1, 0x3, 0x1ff, 0x3ff, 0x4, 0xff, 0x20, 0x6, 0x401, 0x20, 0x0, 0x1ff, 0x8000, 0xfffffffffffffffd, 0x400, 0x8, 0x100000000, 0x2, 0x8, 0xf32, 0x4, 0x6, 0x80}) clock_adjtime(0x2, &(0x7f0000000100)={0xd9, 0x9, 0x1, 0x2, 0x1f, 0x78, 0x4b1, 0x0, 0x401, 0x5, 0x8, 0x1, 0x101, 0x100000001, 0x7, 0x1fc, 0x9, 0x9, 0x0, 0x9, 0x8, 0x3, 0xff, 0x7, 0x73, 0x946c}) clock_adjtime(0x6, &(0x7f0000000200)={0x4, 0x1, 0x100, 0x6, 0x2, 0x6, 0x1, 0x1dd, 0x9, 0x1000000000000000, 0x0, 0x6, 0x1, 0x1, 0x9, 0x5, 0x3023, 0x2, 0x4, 0xfffffffffffffff9, 0x429, 0x3, 0x0, 0x9, 0xffffffffffffff05, 0x1000}) clock_adjtime(0x3, &(0x7f0000000300)={0x0, 0x8, 0x9, 0x9, 0x9, 0x9, 0x6, 0x9, 0x8, 0x1, 0xd0fc, 0x55, 0x2, 0x0, 0x1, 0x1f, 0x100000001, 0x8f44, 0x53, 0x0, 0x3, 0x140000000000, 0x9, 0x8000, 0x0, 0x10001}) r0 = syz_mount_image$iso9660(&(0x7f0000000400), &(0x7f0000000440)='./file0\x00', 0x4, 0x1, &(0x7f0000000480)=[{0xfffffffffffffffe, 0x0, 0x3}], 0x2014400, &(0x7f00000004c0)={[{@check_relaxed}, {@dmode}, {@check_relaxed}], [{@euid_lt={'euid<', 0xee01}}, {@euid_eq}, {@rootcontext={'rootcontext', 0x3d, 'staff_u'}}, {@obj_user={'obj_user', 0x3d, '#-_'}}, {@rootcontext={'rootcontext', 0x3d, 'staff_u'}}]}) faccessat(r0, &(0x7f0000000580)='./file0\x00', 0x88) clock_adjtime(0x4, &(0x7f00000005c0)={0x80000000, 0x100000000, 0xba, 0x80000000, 0x4, 0x20d4e190, 0x7, 0x400, 0x33, 0x7a, 0x1, 0x465d, 0x7f, 0x5, 0x3, 0x1, 0x0, 0x8, 0x7, 0x7ff, 0x1, 0x4, 0x3f, 0x7fff, 0x700b, 0x96}) r1 = accept$unix(0xffffffffffffffff, 0x0, &(0x7f00000006c0)) getsockname$unix(r1, &(0x7f0000000700), &(0x7f0000000780)=0x6e) clock_adjtime(0x3, &(0x7f00000007c0)={0x6, 0x6, 0x7, 0x8000, 0x7ff, 0x5c, 0x401, 0x2, 0x9, 0x4, 0x0, 0x61, 0x2, 0x9b71, 0x100000000, 0x7fffffff, 0x322, 0xc70d, 0x9, 0xd, 0x9, 0x0, 0x9, 0x1a1f00000000, 0xffffffffffffffff, 0x9}) clock_adjtime(0x6, &(0x7f00000008c0)={0x4, 0x9, 0x3, 0xfffffffffffffff7, 0xb31, 0x1, 0x1, 0x2, 0x538, 0x0, 0x401, 0x1, 0xdd, 0xfffffffffffffff7, 0xec54, 0x4, 0x100000001, 0x0, 0xa, 0x1, 0x7ff, 0xcd, 0xf2, 0x80, 0x7, 0x8000}) clock_adjtime(0x0, &(0x7f00000009c0)={0x8, 0xff, 0x81, 0x2, 0x100000001, 0x11, 0x5, 0x1, 0x1, 0x9, 0x1000, 0x8, 0xdf6c, 0x9, 0x8, 0x1004000000000000, 0x1ff, 0x3, 0x6, 0xf5, 0x80000, 0x1, 0xfffffffffffffd6d, 0x2, 0x6, 0xfa}) r2 = socket$unix(0x1, 0x5, 0x0) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f0000000ac0)={'wlan0\x00'}) mq_timedreceive(0xffffffffffffffff, &(0x7f0000000b00)=""/4096, 0x1000, 0x80, &(0x7f0000001b00)={0x0, 0x989680}) r3 = creat(&(0x7f0000001b40)='./file0\x00', 0x1) mknodat(r3, &(0x7f0000001b80)='./file1\x00', 0x4, 0x0) clock_adjtime(0x7a12000000000, &(0x7f0000001bc0)={0xfff, 0x7fff, 0x0, 0x2, 0xfdc, 0x54, 0x8fa, 0x3f41, 0x0, 0x4, 0x4, 0x5, 0x101, 0x5, 0x4, 0x9, 0x9, 0x30e, 0x3f, 0x2, 0x7f, 0x7, 0x6, 0x4, 0x3ff, 0x100000000}) clock_adjtime(0x2, &(0x7f0000001cc0)={0x0, 0x6, 0x7, 0xe5, 0x5, 0x6, 0x10, 0x7, 0x281, 0x40, 0x1, 0x0, 0x1, 0x10001, 0x5, 0x100, 0x0, 0x4, 0xffffffffffffe001, 0xdf, 0x7f, 0x8000, 0x9, 0x400, 0xfffffffffffffe00, 0x3f}) [ 330.062664][T19465] loop4: detected capacity change from 0 to 264192 [ 330.068288][T19469] EXT4-fs warning (device loop0): ext4_enable_quotas:6363: Failed to enable quota tracking (type=0, err=-22). Please run e2fsck to fix. [ 330.071134][T19481] loop5: detected capacity change from 0 to 264192 [ 330.083725][T19469] EXT4-fs (loop0): mount failed [ 330.099340][T19480] loop3: detected capacity change from 0 to 264192 [ 330.120975][T19486] SELinux: duplicate or incompatible mount options [ 330.128979][T19465] EXT4-fs error (device loop4): ext4_fill_super:4822: inode #2: comm syz-executor.4: iget: root inode unallocated [ 330.141860][T19465] EXT4-fs (loop4): get root inode failed [ 330.147596][T19465] EXT4-fs (loop4): mount failed [ 330.158569][T19481] EXT4-fs error (device loop5): ext4_fill_super:4822: inode #2: comm syz-executor.5: iget: root inode unallocated 17:07:02 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc01000a, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000003980)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d0f465001000005fd0f4655f00000000000001000c00000010000800000000000af3010004", 0x2d, 0x11100}], 0x0, &(0x7f00000000c0)) (fail_nth: 17) 17:07:02 executing program 2: clock_adjtime(0x7, &(0x7f0000000000)={0x8000, 0x62, 0xff, 0x1, 0x3, 0x1ff, 0x3ff, 0x4, 0xff, 0x20, 0x6, 0x401, 0x20, 0x0, 0x1ff, 0x8000, 0xfffffffffffffffd, 0x400, 0x8, 0x100000000, 0x2, 0x8, 0xf32, 0x4, 0x6, 0x80}) clock_adjtime(0x2, &(0x7f0000000100)={0xd9, 0x9, 0x1, 0x2, 0x1f, 0x78, 0x4b1, 0x0, 0x401, 0x5, 0x8, 0x1, 0x101, 0x100000001, 0x7, 0x1fc, 0x9, 0x9, 0x0, 0x9, 0x8, 0x3, 0xff, 0x7, 0x73, 0x946c}) clock_adjtime(0x6, &(0x7f0000000200)={0x4, 0x1, 0x100, 0x6, 0x2, 0x6, 0x1, 0x1dd, 0x9, 0x1000000000000000, 0x0, 0x6, 0x1, 0x1, 0x9, 0x5, 0x3023, 0x2, 0x4, 0xfffffffffffffff9, 0x429, 0x3, 0x0, 0x9, 0xffffffffffffff05, 0x1000}) clock_adjtime(0x3, &(0x7f0000000300)={0x0, 0x8, 0x9, 0x9, 0x9, 0x9, 0x6, 0x9, 0x8, 0x1, 0xd0fc, 0x55, 0x2, 0x0, 0x1, 0x1f, 0x100000001, 0x8f44, 0x53, 0x0, 0x3, 0x140000000000, 0x9, 0x8000, 0x0, 0x10001}) r0 = syz_mount_image$iso9660(&(0x7f0000000400), &(0x7f0000000440)='./file0\x00', 0x4, 0x1, &(0x7f0000000480)=[{0xfffffffffffffffe, 0x0, 0x3}], 0x2014400, &(0x7f00000004c0)={[{@check_relaxed}, {@dmode}, {@check_relaxed}], [{@euid_lt={'euid<', 0xee01}}, {@euid_eq}, {@rootcontext={'rootcontext', 0x3d, 'staff_u'}}, {@obj_user={'obj_user', 0x3d, '#-_'}}, {@rootcontext={'rootcontext', 0x3d, 'staff_u'}}]}) faccessat(r0, &(0x7f0000000580)='./file0\x00', 0x88) clock_adjtime(0x4, &(0x7f00000005c0)={0x80000000, 0x100000000, 0xba, 0x80000000, 0x4, 0x20d4e190, 0x7, 0x400, 0x33, 0x7a, 0x1, 0x465d, 0x7f, 0x5, 0x3, 0x1, 0x0, 0x8, 0x7, 0x7ff, 0x1, 0x4, 0x3f, 0x7fff, 0x700b, 0x96}) r1 = accept$unix(0xffffffffffffffff, 0x0, &(0x7f00000006c0)) getsockname$unix(r1, &(0x7f0000000700), &(0x7f0000000780)=0x6e) clock_adjtime(0x3, &(0x7f00000007c0)={0x6, 0x6, 0x7, 0x8000, 0x7ff, 0x5c, 0x401, 0x2, 0x9, 0x4, 0x0, 0x61, 0x2, 0x9b71, 0x100000000, 0x7fffffff, 0x322, 0xc70d, 0x9, 0xd, 0x9, 0x0, 0x9, 0x1a1f00000000, 0xffffffffffffffff, 0x9}) clock_adjtime(0x6, &(0x7f00000008c0)={0x4, 0x9, 0x3, 0xfffffffffffffff7, 0xb31, 0x1, 0x1, 0x2, 0x538, 0x0, 0x401, 0x1, 0xdd, 0xfffffffffffffff7, 0xec54, 0x4, 0x100000001, 0x0, 0xa, 0x1, 0x7ff, 0xcd, 0xf2, 0x80, 0x7, 0x8000}) clock_adjtime(0x0, &(0x7f00000009c0)={0x8, 0xff, 0x81, 0x2, 0x100000001, 0x11, 0x5, 0x1, 0x1, 0x9, 0x1000, 0x8, 0xdf6c, 0x9, 0x8, 0x1004000000000000, 0x1ff, 0x3, 0x6, 0xf5, 0x80000, 0x1, 0xfffffffffffffd6d, 0x2, 0x6, 0xfa}) r2 = socket$unix(0x1, 0x5, 0x0) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f0000000ac0)={'wlan0\x00'}) mq_timedreceive(0xffffffffffffffff, &(0x7f0000000b00)=""/4096, 0x1000, 0x80, &(0x7f0000001b00)={0x0, 0x989680}) r3 = creat(&(0x7f0000001b40)='./file0\x00', 0x1) mknodat(r3, &(0x7f0000001b80)='./file1\x00', 0x4, 0x0) clock_adjtime(0x100000000000000, &(0x7f0000001bc0)={0xfff, 0x7fff, 0x0, 0x2, 0xfdc, 0x54, 0x8fa, 0x3f41, 0x0, 0x4, 0x4, 0x5, 0x101, 0x5, 0x4, 0x9, 0x9, 0x30e, 0x3f, 0x2, 0x7f, 0x7, 0x6, 0x4, 0x3ff, 0x100000000}) clock_adjtime(0x2, &(0x7f0000001cc0)={0x0, 0x6, 0x7, 0xe5, 0x5, 0x6, 0x10, 0x7, 0x281, 0x40, 0x1, 0x0, 0x1, 0x10001, 0x5, 0x100, 0x0, 0x4, 0xffffffffffffe001, 0xdf, 0x7f, 0x8000, 0x9, 0x400, 0xfffffffffffffe00, 0x3f}) [ 330.185469][T19480] EXT4-fs warning (device loop3): read_mmp_block:107: Error -117 while reading MMP block 0 [ 330.189139][T19476] EXT4-fs warning (device loop1): ext4_enable_quotas:6363: Failed to enable quota tracking (type=0, err=-22). Please run e2fsck to fix. [ 330.196080][T19481] EXT4-fs (loop5): get root inode failed [ 330.215219][T19481] EXT4-fs (loop5): mount failed 17:07:02 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc01000a, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000003980)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d0f465001000005fd0f4655f00000000000001000c000000100008", 0x23, 0x11100}], 0x0, &(0x7f00000000c0)) 17:07:02 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc01000a, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="200000006900000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000003980)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d9", 0x4, 0x6800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d0f465001000005fd0f4655f00000000000001000c00000010000800000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}], 0x0, &(0x7f00000000c0)) [ 330.239640][T19476] EXT4-fs (loop1): mount failed [ 330.266479][T19495] loop0: detected capacity change from 0 to 264192 [ 330.278593][T19498] loop3: detected capacity change from 0 to 264192 [ 330.280688][T19500] FAULT_INJECTION: forcing a failure. [ 330.280688][T19500] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 330.298251][T19500] CPU: 0 PID: 19500 Comm: syz-executor.4 Not tainted 5.16.0-syzkaller #0 [ 330.306864][T19500] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 330.316964][T19500] Call Trace: [ 330.320232][T19500] [ 330.323155][T19500] dump_stack_lvl+0xd6/0x122 [ 330.327736][T19500] dump_stack+0x11/0x1b [ 330.331877][T19500] should_fail+0x23c/0x250 [ 330.336278][T19500] should_fail_usercopy+0x16/0x20 [ 330.341290][T19500] copy_page_from_iter_atomic+0x2f1/0xc60 [ 330.346995][T19500] ? shmem_write_begin+0x7e/0x100 [ 330.352028][T19500] generic_perform_write+0x211/0x400 [ 330.357370][T19500] ? current_time+0xed/0x1a0 [ 330.362065][T19500] __generic_file_write_iter+0xf7/0x2b0 [ 330.367696][T19500] ? generic_write_checks+0x250/0x290 [ 330.373087][T19500] generic_file_write_iter+0x75/0x130 [ 330.378494][T19500] vfs_write+0x7f5/0x950 [ 330.382779][T19500] __x64_sys_pwrite64+0xf5/0x150 [ 330.387701][T19500] do_syscall_64+0x44/0xd0 [ 330.392125][T19500] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 330.398008][T19500] RIP: 0033:0x7f6f94bd5e67 [ 330.402405][T19500] Code: 08 89 3c 24 48 89 4c 24 18 e8 e5 f8 ff ff 4c 8b 54 24 18 48 8b 54 24 10 41 89 c0 48 8b 74 24 08 8b 3c 24 b8 12 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 31 44 89 c7 48 89 04 24 e8 15 f9 ff ff 48 8b [ 330.422000][T19500] RSP: 002b:00007f6f93d98f00 EFLAGS: 00000293 ORIG_RAX: 0000000000000012 [ 330.430420][T19500] RAX: ffffffffffffffda RBX: 00007f6f94c6c9c8 RCX: 00007f6f94bd5e67 [ 330.438382][T19500] RDX: 000000000000001d RSI: 0000000020012e00 RDI: 0000000000000004 [ 330.446464][T19500] RBP: 0000000000000007 R08: 0000000000000000 R09: 00007f6f93d991d0 [ 330.454525][T19500] R10: 0000000000011080 R11: 0000000000000293 R12: 0000000000000004 [ 330.462486][T19500] R13: 0000000000000004 R14: 0000000020000278 R15: 0000000000000005 [ 330.470564][T19500] [ 330.475258][T19501] SELinux: duplicate or incompatible mount options [ 330.478618][T19500] loop4: detected capacity change from 0 to 264192 17:07:02 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc0118db, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000003980)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d0f465001000005fd0f4655f00000000000001", 0x1b, 0x11100}], 0x0, &(0x7f00000000c0)) [ 330.524898][T19500] EXT4-fs error (device loop4): ext4_ext_check_inode:497: inode #3: comm syz-executor.4: pblk 0 bad header/extent: invalid extent entries - magic f30a, entries 1, max 4(4), depth 0(0) [ 330.557441][T19500] EXT4-fs error (device loop4): ext4_quota_enable:6323: comm syz-executor.4: Bad quota inode # 3 [ 330.568787][T19498] EXT4-fs warning (device loop3): read_mmp_block:107: Error -117 while reading MMP block 0 [ 330.579581][T19500] EXT4-fs warning (device loop4): ext4_enable_quotas:6363: Failed to enable quota tracking (type=0, err=-117). Please run e2fsck to fix. [ 330.587416][T19506] loop1: detected capacity change from 0 to 264192 [ 330.608556][T19495] EXT4-fs warning (device loop0): ext4_enable_quotas:6363: Failed to enable quota tracking (type=0, err=-22). Please run e2fsck to fix. 17:07:02 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc01000a, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000003980)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d0f465001000005fd0f4655f00000000000001000c000000100008", 0x23, 0x11100}], 0x0, &(0x7f00000000c0)) 17:07:06 executing program 2: clock_adjtime(0x7, &(0x7f0000000000)={0x8000, 0x62, 0xff, 0x1, 0x3, 0x1ff, 0x3ff, 0x4, 0xff, 0x20, 0x6, 0x401, 0x20, 0x0, 0x1ff, 0x8000, 0xfffffffffffffffd, 0x400, 0x8, 0x100000000, 0x2, 0x8, 0xf32, 0x4, 0x6, 0x80}) clock_adjtime(0x2, &(0x7f0000000100)={0xd9, 0x9, 0x1, 0x2, 0x1f, 0x78, 0x4b1, 0x0, 0x401, 0x5, 0x8, 0x1, 0x101, 0x100000001, 0x7, 0x1fc, 0x9, 0x9, 0x0, 0x9, 0x8, 0x3, 0xff, 0x7, 0x73, 0x946c}) clock_adjtime(0x6, &(0x7f0000000200)={0x4, 0x1, 0x100, 0x6, 0x2, 0x6, 0x1, 0x1dd, 0x9, 0x1000000000000000, 0x0, 0x6, 0x1, 0x1, 0x9, 0x5, 0x3023, 0x2, 0x4, 0xfffffffffffffff9, 0x429, 0x3, 0x0, 0x9, 0xffffffffffffff05, 0x1000}) clock_adjtime(0x3, &(0x7f0000000300)={0x0, 0x8, 0x9, 0x9, 0x9, 0x9, 0x6, 0x9, 0x8, 0x1, 0xd0fc, 0x55, 0x2, 0x0, 0x1, 0x1f, 0x100000001, 0x8f44, 0x53, 0x0, 0x3, 0x140000000000, 0x9, 0x8000, 0x0, 0x10001}) r0 = syz_mount_image$iso9660(&(0x7f0000000400), &(0x7f0000000440)='./file0\x00', 0x4, 0x1, &(0x7f0000000480)=[{0xfffffffffffffffe, 0x0, 0x3}], 0x2014400, &(0x7f00000004c0)={[{@check_relaxed}, {@dmode}, {@check_relaxed}], [{@euid_lt={'euid<', 0xee01}}, {@euid_eq}, {@rootcontext={'rootcontext', 0x3d, 'staff_u'}}, {@obj_user={'obj_user', 0x3d, '#-_'}}, {@rootcontext={'rootcontext', 0x3d, 'staff_u'}}]}) faccessat(r0, &(0x7f0000000580)='./file0\x00', 0x88) clock_adjtime(0x4, &(0x7f00000005c0)={0x80000000, 0x100000000, 0xba, 0x80000000, 0x4, 0x20d4e190, 0x7, 0x400, 0x33, 0x7a, 0x1, 0x465d, 0x7f, 0x5, 0x3, 0x1, 0x0, 0x8, 0x7, 0x7ff, 0x1, 0x4, 0x3f, 0x7fff, 0x700b, 0x96}) r1 = accept$unix(0xffffffffffffffff, 0x0, &(0x7f00000006c0)) getsockname$unix(r1, &(0x7f0000000700), &(0x7f0000000780)=0x6e) clock_adjtime(0x3, &(0x7f00000007c0)={0x6, 0x6, 0x7, 0x8000, 0x7ff, 0x5c, 0x401, 0x2, 0x9, 0x4, 0x0, 0x61, 0x2, 0x9b71, 0x100000000, 0x7fffffff, 0x322, 0xc70d, 0x9, 0xd, 0x9, 0x0, 0x9, 0x1a1f00000000, 0xffffffffffffffff, 0x9}) clock_adjtime(0x6, &(0x7f00000008c0)={0x4, 0x9, 0x3, 0xfffffffffffffff7, 0xb31, 0x1, 0x1, 0x2, 0x538, 0x0, 0x401, 0x1, 0xdd, 0xfffffffffffffff7, 0xec54, 0x4, 0x100000001, 0x0, 0xa, 0x1, 0x7ff, 0xcd, 0xf2, 0x80, 0x7, 0x8000}) clock_adjtime(0x0, &(0x7f00000009c0)={0x8, 0xff, 0x81, 0x2, 0x100000001, 0x11, 0x5, 0x1, 0x1, 0x9, 0x1000, 0x8, 0xdf6c, 0x9, 0x8, 0x1004000000000000, 0x1ff, 0x3, 0x6, 0xf5, 0x80000, 0x1, 0xfffffffffffffd6d, 0x2, 0x6, 0xfa}) r2 = socket$unix(0x1, 0x5, 0x0) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f0000000ac0)={'wlan0\x00'}) mq_timedreceive(0xffffffffffffffff, &(0x7f0000000b00)=""/4096, 0x1000, 0x80, &(0x7f0000001b00)={0x0, 0x989680}) r3 = creat(&(0x7f0000001b40)='./file0\x00', 0x1) mknodat(r3, &(0x7f0000001b80)='./file1\x00', 0x4, 0x0) clock_adjtime(0x200000000000000, &(0x7f0000001bc0)={0xfff, 0x7fff, 0x0, 0x2, 0xfdc, 0x54, 0x8fa, 0x3f41, 0x0, 0x4, 0x4, 0x5, 0x101, 0x5, 0x4, 0x9, 0x9, 0x30e, 0x3f, 0x2, 0x7f, 0x7, 0x6, 0x4, 0x3ff, 0x100000000}) clock_adjtime(0x2, &(0x7f0000001cc0)={0x0, 0x6, 0x7, 0xe5, 0x5, 0x6, 0x10, 0x7, 0x281, 0x40, 0x1, 0x0, 0x1, 0x10001, 0x5, 0x100, 0x0, 0x4, 0xffffffffffffe001, 0xdf, 0x7f, 0x8000, 0x9, 0x400, 0xfffffffffffffe00, 0x3f}) [ 330.615785][T19500] EXT4-fs (loop4): mount failed [ 330.628685][T19495] EXT4-fs (loop0): mount failed [ 330.648727][T19506] EXT4-fs warning (device loop1): ext4_enable_quotas:6363: Failed to enable quota tracking (type=0, err=-22). Please run e2fsck to fix. [ 330.666987][T19513] SELinux: duplicate or incompatible mount options 17:07:07 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc01000a, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="200000006b00000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000003980)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d9", 0x4, 0x6800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d0f465001000005fd0f4655f00000000000001000c00000010000800000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}], 0x0, &(0x7f00000000c0)) [ 330.673597][T19506] EXT4-fs (loop1): mount failed [ 330.684287][T19515] loop3: detected capacity change from 0 to 264192 [ 330.702849][T19515] EXT4-fs warning (device loop3): read_mmp_block:107: Error -117 while reading MMP block 0 17:07:07 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc01000a, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000003980)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d0f465001000005fd0f4655f00000000000001000c00000010000800000000000af3010004", 0x2d, 0x11100}], 0x0, &(0x7f00000000c0)) (fail_nth: 18) [ 330.725631][T19518] loop0: detected capacity change from 0 to 264192 [ 330.743785][T19520] FAULT_INJECTION: forcing a failure. [ 330.743785][T19520] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 330.756874][T19520] CPU: 1 PID: 19520 Comm: syz-executor.4 Not tainted 5.16.0-syzkaller #0 [ 330.765356][T19520] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 17:07:07 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc01000a, 0x6, &(0x7f0000000200)=[{&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000003980)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d0f465001000005fd0f4655f00000000000001000c000000100008", 0x23, 0x11100}], 0x0, &(0x7f00000000c0)) [ 330.775488][T19520] Call Trace: [ 330.778813][T19520] [ 330.781740][T19520] dump_stack_lvl+0xd6/0x122 [ 330.788153][T19520] dump_stack+0x11/0x1b [ 330.792313][T19520] should_fail+0x23c/0x250 [ 330.796779][T19520] should_fail_usercopy+0x16/0x20 [ 330.801807][T19520] copy_page_from_iter_atomic+0x2f1/0xc60 [ 330.807557][T19520] ? shmem_write_begin+0x7e/0x100 [ 330.812628][T19520] generic_perform_write+0x211/0x400 [ 330.817940][T19520] ? current_time+0xed/0x1a0 [ 330.822541][T19520] __generic_file_write_iter+0xf7/0x2b0 [ 330.828102][T19520] ? generic_write_checks+0x250/0x290 [ 330.832882][T19518] EXT4-fs warning (device loop0): ext4_enable_quotas:6363: Failed to enable quota tracking (type=0, err=-22). Please run e2fsck to fix. [ 330.833473][T19520] generic_file_write_iter+0x75/0x130 [ 330.852708][T19520] vfs_write+0x7f5/0x950 [ 330.855715][T19518] EXT4-fs (loop0): mount failed [ 330.856955][T19520] __x64_sys_pwrite64+0xf5/0x150 [ 330.856980][T19520] do_syscall_64+0x44/0xd0 [ 330.871349][T19520] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 330.877312][T19520] RIP: 0033:0x7f6f94bd5e67 [ 330.881810][T19520] Code: 08 89 3c 24 48 89 4c 24 18 e8 e5 f8 ff ff 4c 8b 54 24 18 48 8b 54 24 10 41 89 c0 48 8b 74 24 08 8b 3c 24 b8 12 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 31 44 89 c7 48 89 04 24 e8 15 f9 ff ff 48 8b [ 330.901456][T19520] RSP: 002b:00007f6f93d98f00 EFLAGS: 00000293 ORIG_RAX: 0000000000000012 [ 330.910291][T19520] RAX: ffffffffffffffda RBX: 00007f6f94c6c9c8 RCX: 00007f6f94bd5e67 [ 330.918490][T19520] RDX: 000000000000002d RSI: 0000000020012f00 RDI: 0000000000000004 [ 330.926954][T19520] RBP: 0000000000000007 R08: 0000000000000000 R09: 00007f6f93d991d0 [ 330.934907][T19520] R10: 0000000000011100 R11: 0000000000000293 R12: 0000000000000004 [ 330.942871][T19520] R13: 0000000000000004 R14: 0000000020000290 R15: 0000000000000006 [ 330.950830][T19520] [ 330.954574][T19520] loop4: detected capacity change from 0 to 264192 [ 330.967109][T19527] loop3: detected capacity change from 0 to 264192 [ 330.975943][T19527] EXT4-fs (loop3): VFS: Can't find ext4 filesystem [ 331.016072][T19520] EXT4-fs error (device loop4): ext4_ext_check_inode:497: inode #3: comm syz-executor.4: pblk 0 bad header/extent: invalid extent entries - magic f30a, entries 1, max 4(4), depth 0(0) [ 331.036244][T19520] EXT4-fs error (device loop4): ext4_quota_enable:6323: comm syz-executor.4: Bad quota inode # 3 [ 331.047319][T19520] EXT4-fs warning (device loop4): ext4_enable_quotas:6363: Failed to enable quota tracking (type=0, err=-117). Please run e2fsck to fix. [ 331.062632][T19520] EXT4-fs (loop4): mount failed 17:07:15 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc01000a, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000003980)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="80", 0x1, 0x11100}], 0x0, &(0x7f00000000c0)) 17:07:15 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc014afa, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000003980)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d0f465001000005fd0f4655f00000000000001", 0x1b, 0x11100}], 0x0, &(0x7f00000000c0)) 17:07:15 executing program 2: clock_adjtime(0x7, &(0x7f0000000000)={0x8000, 0x62, 0xff, 0x1, 0x3, 0x1ff, 0x3ff, 0x4, 0xff, 0x20, 0x6, 0x401, 0x20, 0x0, 0x1ff, 0x8000, 0xfffffffffffffffd, 0x400, 0x8, 0x100000000, 0x2, 0x8, 0xf32, 0x4, 0x6, 0x80}) clock_adjtime(0x2, &(0x7f0000000100)={0xd9, 0x9, 0x1, 0x2, 0x1f, 0x78, 0x4b1, 0x0, 0x401, 0x5, 0x8, 0x1, 0x101, 0x100000001, 0x7, 0x1fc, 0x9, 0x9, 0x0, 0x9, 0x8, 0x3, 0xff, 0x7, 0x73, 0x946c}) clock_adjtime(0x6, &(0x7f0000000200)={0x4, 0x1, 0x100, 0x6, 0x2, 0x6, 0x1, 0x1dd, 0x9, 0x1000000000000000, 0x0, 0x6, 0x1, 0x1, 0x9, 0x5, 0x3023, 0x2, 0x4, 0xfffffffffffffff9, 0x429, 0x3, 0x0, 0x9, 0xffffffffffffff05, 0x1000}) clock_adjtime(0x3, &(0x7f0000000300)={0x0, 0x8, 0x9, 0x9, 0x9, 0x9, 0x6, 0x9, 0x8, 0x1, 0xd0fc, 0x55, 0x2, 0x0, 0x1, 0x1f, 0x100000001, 0x8f44, 0x53, 0x0, 0x3, 0x140000000000, 0x9, 0x8000, 0x0, 0x10001}) r0 = syz_mount_image$iso9660(&(0x7f0000000400), &(0x7f0000000440)='./file0\x00', 0x4, 0x1, &(0x7f0000000480)=[{0xfffffffffffffffe, 0x0, 0x3}], 0x2014400, &(0x7f00000004c0)={[{@check_relaxed}, {@dmode}, {@check_relaxed}], [{@euid_lt={'euid<', 0xee01}}, {@euid_eq}, {@rootcontext={'rootcontext', 0x3d, 'staff_u'}}, {@obj_user={'obj_user', 0x3d, '#-_'}}, {@rootcontext={'rootcontext', 0x3d, 'staff_u'}}]}) faccessat(r0, &(0x7f0000000580)='./file0\x00', 0x88) clock_adjtime(0x4, &(0x7f00000005c0)={0x80000000, 0x100000000, 0xba, 0x80000000, 0x4, 0x20d4e190, 0x7, 0x400, 0x33, 0x7a, 0x1, 0x465d, 0x7f, 0x5, 0x3, 0x1, 0x0, 0x8, 0x7, 0x7ff, 0x1, 0x4, 0x3f, 0x7fff, 0x700b, 0x96}) r1 = accept$unix(0xffffffffffffffff, 0x0, &(0x7f00000006c0)) getsockname$unix(r1, &(0x7f0000000700), &(0x7f0000000780)=0x6e) clock_adjtime(0x3, &(0x7f00000007c0)={0x6, 0x6, 0x7, 0x8000, 0x7ff, 0x5c, 0x401, 0x2, 0x9, 0x4, 0x0, 0x61, 0x2, 0x9b71, 0x100000000, 0x7fffffff, 0x322, 0xc70d, 0x9, 0xd, 0x9, 0x0, 0x9, 0x1a1f00000000, 0xffffffffffffffff, 0x9}) clock_adjtime(0x6, &(0x7f00000008c0)={0x4, 0x9, 0x3, 0xfffffffffffffff7, 0xb31, 0x1, 0x1, 0x2, 0x538, 0x0, 0x401, 0x1, 0xdd, 0xfffffffffffffff7, 0xec54, 0x4, 0x100000001, 0x0, 0xa, 0x1, 0x7ff, 0xcd, 0xf2, 0x80, 0x7, 0x8000}) clock_adjtime(0x0, &(0x7f00000009c0)={0x8, 0xff, 0x81, 0x2, 0x100000001, 0x11, 0x5, 0x1, 0x1, 0x9, 0x1000, 0x8, 0xdf6c, 0x9, 0x8, 0x1004000000000000, 0x1ff, 0x3, 0x6, 0xf5, 0x80000, 0x1, 0xfffffffffffffd6d, 0x2, 0x6, 0xfa}) r2 = socket$unix(0x1, 0x5, 0x0) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f0000000ac0)={'wlan0\x00'}) mq_timedreceive(0xffffffffffffffff, &(0x7f0000000b00)=""/4096, 0x1000, 0x80, &(0x7f0000001b00)={0x0, 0x989680}) r3 = creat(&(0x7f0000001b40)='./file0\x00', 0x1) mknodat(r3, &(0x7f0000001b80)='./file1\x00', 0x4, 0x0) clock_adjtime(0x300000000000000, &(0x7f0000001bc0)={0xfff, 0x7fff, 0x0, 0x2, 0xfdc, 0x54, 0x8fa, 0x3f41, 0x0, 0x4, 0x4, 0x5, 0x101, 0x5, 0x4, 0x9, 0x9, 0x30e, 0x3f, 0x2, 0x7f, 0x7, 0x6, 0x4, 0x3ff, 0x100000000}) clock_adjtime(0x2, &(0x7f0000001cc0)={0x0, 0x6, 0x7, 0xe5, 0x5, 0x6, 0x10, 0x7, 0x281, 0x40, 0x1, 0x0, 0x1, 0x10001, 0x5, 0x100, 0x0, 0x4, 0xffffffffffffe001, 0xdf, 0x7f, 0x8000, 0x9, 0x400, 0xfffffffffffffe00, 0x3f}) 17:07:15 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc01000a, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="200200008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000003980)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d9", 0x4, 0x6800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d0f465001000005fd0f4655f00000000000001000c00000010000800000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}], 0x0, &(0x7f00000000c0)) 17:07:15 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc01000a, 0x6, &(0x7f0000000200)=[{&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000003980)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d0f465001000005fd0f4655f00000000000001000c000000100008", 0x23, 0x11100}], 0x0, &(0x7f00000000c0)) 17:07:15 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc01000a, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000003980)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d0f465001000005fd0f4655f00000000000001000c00000010000800000000000af3010004", 0x2d, 0x11100}], 0x0, &(0x7f00000000c0)) (fail_nth: 19) [ 335.260949][T19534] FAULT_INJECTION: forcing a failure. [ 335.260949][T19534] name failslab, interval 1, probability 0, space 0, times 0 [ 335.262847][T19537] loop3: detected capacity change from 0 to 264192 [ 335.273623][T19534] CPU: 0 PID: 19534 Comm: syz-executor.4 Not tainted 5.16.0-syzkaller #0 [ 335.283404][T19538] loop1: detected capacity change from 0 to 264192 [ 335.288511][T19534] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 335.288526][T19534] Call Trace: [ 335.297420][T19537] EXT4-fs (loop3): VFS: Can't find ext4 filesystem [ 335.305056][T19534] [ 335.305110][T19534] dump_stack_lvl+0xd6/0x122 [ 335.322662][T19534] dump_stack+0x11/0x1b [ 335.326808][T19534] should_fail+0x23c/0x250 [ 335.331206][T19534] ? getname_flags+0x84/0x3f0 [ 335.335956][T19534] __should_failslab+0x81/0x90 [ 335.340706][T19534] should_failslab+0x5/0x20 [ 335.345199][T19534] kmem_cache_alloc+0x4f/0x320 [ 335.350085][T19534] getname_flags+0x84/0x3f0 [ 335.354575][T19534] ? vfs_write+0x667/0x950 [ 335.358976][T19534] getname+0x15/0x20 [ 335.362858][T19534] do_sys_openat2+0x6d/0x2b0 [ 335.367502][T19534] __x64_sys_openat+0xef/0x110 [ 335.372345][T19534] do_syscall_64+0x44/0xd0 [ 335.376748][T19534] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 335.382690][T19534] RIP: 0033:0x7f6f94bd5db4 [ 335.387091][T19534] Code: 84 00 00 00 00 00 44 89 54 24 0c e8 96 f9 ff ff 44 8b 54 24 0c 44 89 e2 48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 89 44 24 0c e8 c8 f9 ff ff 8b 44 [ 335.406808][T19534] RSP: 002b:00007f6f93d98eb0 EFLAGS: 00000293 ORIG_RAX: 0000000000000101 [ 335.415229][T19534] RAX: ffffffffffffffda RBX: 00007f6f94c6c9c8 RCX: 00007f6f94bd5db4 [ 335.423339][T19534] RDX: 0000000000000002 RSI: 00007f6f93d98fe0 RDI: 00000000ffffff9c [ 335.431293][T19534] RBP: 00007f6f93d98fe0 R08: 0000000000000000 R09: 00007f6f93d991d0 [ 335.439250][T19534] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000002 [ 335.447356][T19534] R13: 0000000000000004 R14: 00000000200002a8 R15: 0000000000000007 [ 335.455408][T19534] 17:07:15 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc01000a, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000003980)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d0f465001000005fd0f4655f00000000000001000c00000010000800000000000af3010004", 0x2d, 0x11100}], 0x0, &(0x7f00000000c0)) (fail_nth: 20) [ 335.462244][T19540] SELinux: duplicate or incompatible mount options [ 335.463369][T19536] loop0: detected capacity change from 0 to 264192 [ 335.487380][T19536] EXT4-fs (loop0): inodes count not valid: 544 vs 32 [ 335.496285][T19546] loop5: detected capacity change from 0 to 264192 17:07:19 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc01000a, 0x6, &(0x7f0000000200)=[{&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000003980)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d0f465001000005fd0f4655f00000000000001000c000000100008", 0x23, 0x11100}], 0x0, &(0x7f00000000c0)) [ 335.516671][T19549] FAULT_INJECTION: forcing a failure. [ 335.516671][T19549] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 335.529786][T19549] CPU: 0 PID: 19549 Comm: syz-executor.4 Not tainted 5.16.0-syzkaller #0 [ 335.538205][T19549] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 335.548263][T19549] Call Trace: [ 335.551552][T19549] [ 335.554492][T19549] dump_stack_lvl+0xd6/0x122 [ 335.559128][T19549] dump_stack+0x11/0x1b [ 335.563291][T19549] should_fail+0x23c/0x250 [ 335.567726][T19549] should_fail_usercopy+0x16/0x20 [ 335.572765][T19549] strncpy_from_user+0x21/0x250 [ 335.577629][T19549] getname_flags+0xb8/0x3f0 [ 335.582232][T19549] ? vfs_write+0x667/0x950 [ 335.586666][T19549] getname+0x15/0x20 [ 335.590574][T19549] do_sys_openat2+0x6d/0x2b0 [ 335.595199][T19549] __x64_sys_openat+0xef/0x110 [ 335.600129][T19549] do_syscall_64+0x44/0xd0 [ 335.604539][T19549] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 335.610425][T19549] RIP: 0033:0x7f6f94bd5db4 [ 335.614850][T19549] Code: 84 00 00 00 00 00 44 89 54 24 0c e8 96 f9 ff ff 44 8b 54 24 0c 44 89 e2 48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 89 44 24 0c e8 c8 f9 ff ff 8b 44 [ 335.634707][T19549] RSP: 002b:00007f6f93d98eb0 EFLAGS: 00000293 ORIG_RAX: 0000000000000101 [ 335.643125][T19549] RAX: ffffffffffffffda RBX: 00007f6f94c6c9c8 RCX: 00007f6f94bd5db4 [ 335.651127][T19549] RDX: 0000000000000002 RSI: 00007f6f93d98fe0 RDI: 00000000ffffff9c [ 335.659258][T19549] RBP: 00007f6f93d98fe0 R08: 0000000000000000 R09: 00007f6f93d991d0 17:07:19 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc01000a, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="200300008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000003980)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d9", 0x4, 0x6800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d0f465001000005fd0f4655f00000000000001000c00000010000800000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}], 0x0, &(0x7f00000000c0)) [ 335.667387][T19549] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000002 [ 335.675351][T19549] R13: 0000000000000004 R14: 00000000200002a8 R15: 0000000000000007 [ 335.683316][T19549] [ 335.696271][T19555] loop3: detected capacity change from 0 to 264192 [ 335.696754][T19538] EXT4-fs warning (device loop1): ext4_enable_quotas:6363: Failed to enable quota tracking (type=0, err=-22). Please run e2fsck to fix. 17:07:20 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc01000a, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000003980)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d0f465001000005fd0f4655f00000000000001000c00000010000800000000000af3010004", 0x2d, 0x11100}], 0x0, &(0x7f00000000c0)) (fail_nth: 21) [ 335.706394][T19555] EXT4-fs (loop3): VFS: Can't find ext4 filesystem [ 335.723946][T19538] EXT4-fs (loop1): mount failed [ 335.742734][T19561] FAULT_INJECTION: forcing a failure. [ 335.742734][T19561] name failslab, interval 1, probability 0, space 0, times 0 [ 335.755398][T19561] CPU: 1 PID: 19561 Comm: syz-executor.4 Not tainted 5.16.0-syzkaller #0 [ 335.763777][T19562] loop0: detected capacity change from 0 to 264192 [ 335.763819][T19561] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 335.780362][T19561] Call Trace: [ 335.783630][T19561] [ 335.786581][T19561] dump_stack_lvl+0xd6/0x122 [ 335.791162][T19561] dump_stack+0x11/0x1b [ 335.795413][T19561] should_fail+0x23c/0x250 [ 335.799817][T19561] ? __alloc_file+0x2e/0x1a0 [ 335.804487][T19561] __should_failslab+0x81/0x90 [ 335.809269][T19561] should_failslab+0x5/0x20 [ 335.813786][T19561] kmem_cache_alloc+0x4f/0x320 [ 335.818542][T19561] __alloc_file+0x2e/0x1a0 [ 335.823003][T19561] alloc_empty_file+0xcd/0x1c0 [ 335.827789][T19561] path_openat+0x6a/0x1eb0 [ 335.832205][T19561] ? __set_page_dirty_no_writeback+0x96/0xc0 [ 335.838187][T19561] ? folio_mark_dirty+0x84/0xe0 [ 335.843123][T19561] ? unlock_page+0x37/0x50 [ 335.847606][T19561] ? inode_to_bdi+0x43/0xa0 [ 335.852108][T19561] ? balance_dirty_pages_ratelimited+0x47/0x280 [ 335.858375][T19561] ? generic_perform_write+0x397/0x400 [ 335.863872][T19561] do_filp_open+0x105/0x220 [ 335.868559][T19561] do_sys_openat2+0xb5/0x2b0 [ 335.873218][T19561] __x64_sys_openat+0xef/0x110 [ 335.877968][T19561] do_syscall_64+0x44/0xd0 [ 335.882422][T19561] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 335.888308][T19561] RIP: 0033:0x7f6f94bd5db4 [ 335.892705][T19561] Code: 84 00 00 00 00 00 44 89 54 24 0c e8 96 f9 ff ff 44 8b 54 24 0c 44 89 e2 48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 89 44 24 0c e8 c8 f9 ff ff 8b 44 [ 335.912408][T19561] RSP: 002b:00007f6f93d98eb0 EFLAGS: 00000293 ORIG_RAX: 0000000000000101 [ 335.920804][T19561] RAX: ffffffffffffffda RBX: 00007f6f94c6c9c8 RCX: 00007f6f94bd5db4 [ 335.928758][T19561] RDX: 0000000000000002 RSI: 00007f6f93d98fe0 RDI: 00000000ffffff9c [ 335.936743][T19561] RBP: 00007f6f93d98fe0 R08: 0000000000000000 R09: 00007f6f93d991d0 [ 335.945909][T19561] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000002 [ 335.953895][T19561] R13: 0000000000000004 R14: 00000000200002a8 R15: 0000000000000007 [ 335.961936][T19561] 17:07:20 executing program 2: clock_adjtime(0x7, &(0x7f0000000000)={0x8000, 0x62, 0xff, 0x1, 0x3, 0x1ff, 0x3ff, 0x4, 0xff, 0x20, 0x6, 0x401, 0x20, 0x0, 0x1ff, 0x8000, 0xfffffffffffffffd, 0x400, 0x8, 0x100000000, 0x2, 0x8, 0xf32, 0x4, 0x6, 0x80}) clock_adjtime(0x2, &(0x7f0000000100)={0xd9, 0x9, 0x1, 0x2, 0x1f, 0x78, 0x4b1, 0x0, 0x401, 0x5, 0x8, 0x1, 0x101, 0x100000001, 0x7, 0x1fc, 0x9, 0x9, 0x0, 0x9, 0x8, 0x3, 0xff, 0x7, 0x73, 0x946c}) clock_adjtime(0x6, &(0x7f0000000200)={0x4, 0x1, 0x100, 0x6, 0x2, 0x6, 0x1, 0x1dd, 0x9, 0x1000000000000000, 0x0, 0x6, 0x1, 0x1, 0x9, 0x5, 0x3023, 0x2, 0x4, 0xfffffffffffffff9, 0x429, 0x3, 0x0, 0x9, 0xffffffffffffff05, 0x1000}) clock_adjtime(0x3, &(0x7f0000000300)={0x0, 0x8, 0x9, 0x9, 0x9, 0x9, 0x6, 0x9, 0x8, 0x1, 0xd0fc, 0x55, 0x2, 0x0, 0x1, 0x1f, 0x100000001, 0x8f44, 0x53, 0x0, 0x3, 0x140000000000, 0x9, 0x8000, 0x0, 0x10001}) r0 = syz_mount_image$iso9660(&(0x7f0000000400), &(0x7f0000000440)='./file0\x00', 0x4, 0x1, &(0x7f0000000480)=[{0xfffffffffffffffe, 0x0, 0x3}], 0x2014400, &(0x7f00000004c0)={[{@check_relaxed}, {@dmode}, {@check_relaxed}], [{@euid_lt={'euid<', 0xee01}}, {@euid_eq}, {@rootcontext={'rootcontext', 0x3d, 'staff_u'}}, {@obj_user={'obj_user', 0x3d, '#-_'}}, {@rootcontext={'rootcontext', 0x3d, 'staff_u'}}]}) faccessat(r0, &(0x7f0000000580)='./file0\x00', 0x88) clock_adjtime(0x4, &(0x7f00000005c0)={0x80000000, 0x100000000, 0xba, 0x80000000, 0x4, 0x20d4e190, 0x7, 0x400, 0x33, 0x7a, 0x1, 0x465d, 0x7f, 0x5, 0x3, 0x1, 0x0, 0x8, 0x7, 0x7ff, 0x1, 0x4, 0x3f, 0x7fff, 0x700b, 0x96}) r1 = accept$unix(0xffffffffffffffff, 0x0, &(0x7f00000006c0)) getsockname$unix(r1, &(0x7f0000000700), &(0x7f0000000780)=0x6e) clock_adjtime(0x3, &(0x7f00000007c0)={0x6, 0x6, 0x7, 0x8000, 0x7ff, 0x5c, 0x401, 0x2, 0x9, 0x4, 0x0, 0x61, 0x2, 0x9b71, 0x100000000, 0x7fffffff, 0x322, 0xc70d, 0x9, 0xd, 0x9, 0x0, 0x9, 0x1a1f00000000, 0xffffffffffffffff, 0x9}) clock_adjtime(0x6, &(0x7f00000008c0)={0x4, 0x9, 0x3, 0xfffffffffffffff7, 0xb31, 0x1, 0x1, 0x2, 0x538, 0x0, 0x401, 0x1, 0xdd, 0xfffffffffffffff7, 0xec54, 0x4, 0x100000001, 0x0, 0xa, 0x1, 0x7ff, 0xcd, 0xf2, 0x80, 0x7, 0x8000}) clock_adjtime(0x0, &(0x7f00000009c0)={0x8, 0xff, 0x81, 0x2, 0x100000001, 0x11, 0x5, 0x1, 0x1, 0x9, 0x1000, 0x8, 0xdf6c, 0x9, 0x8, 0x1004000000000000, 0x1ff, 0x3, 0x6, 0xf5, 0x80000, 0x1, 0xfffffffffffffd6d, 0x2, 0x6, 0xfa}) r2 = socket$unix(0x1, 0x5, 0x0) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f0000000ac0)={'wlan0\x00'}) mq_timedreceive(0xffffffffffffffff, &(0x7f0000000b00)=""/4096, 0x1000, 0x80, &(0x7f0000001b00)={0x0, 0x989680}) r3 = creat(&(0x7f0000001b40)='./file0\x00', 0x1) mknodat(r3, &(0x7f0000001b80)='./file1\x00', 0x4, 0x0) clock_adjtime(0x700000000000000, &(0x7f0000001bc0)={0xfff, 0x7fff, 0x0, 0x2, 0xfdc, 0x54, 0x8fa, 0x3f41, 0x0, 0x4, 0x4, 0x5, 0x101, 0x5, 0x4, 0x9, 0x9, 0x30e, 0x3f, 0x2, 0x7f, 0x7, 0x6, 0x4, 0x3ff, 0x100000000}) clock_adjtime(0x2, &(0x7f0000001cc0)={0x0, 0x6, 0x7, 0xe5, 0x5, 0x6, 0x10, 0x7, 0x281, 0x40, 0x1, 0x0, 0x1, 0x10001, 0x5, 0x100, 0x0, 0x4, 0xffffffffffffe001, 0xdf, 0x7f, 0x8000, 0x9, 0x400, 0xfffffffffffffe00, 0x3f}) [ 335.966985][T19546] EXT4-fs error (device loop5): ext4_quota_enable:6323: comm syz-executor.5: Bad quota inode # 3 [ 335.977736][T19562] EXT4-fs (loop0): inodes count not valid: 800 vs 32 17:07:20 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc01000a, 0x7, &(0x7f0000000200)=[{0x0, 0x0, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000003980)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d0f465001000005fd0f4655f00000000000001000c000000100008", 0x23, 0x11100}], 0x0, &(0x7f00000000c0)) [ 336.011215][T19564] SELinux: duplicate or incompatible mount options [ 336.018461][T19546] EXT4-fs warning (device loop5): ext4_enable_quotas:6363: Failed to enable quota tracking (type=0, err=-116). Please run e2fsck to fix. [ 336.039802][T19546] EXT4-fs (loop5): mount failed 17:07:24 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc01000a, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000003980)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="80", 0x1, 0x11100}], 0x0, &(0x7f00000000c0)) 17:07:24 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc01000a, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="200400008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000003980)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d9", 0x4, 0x6800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d0f465001000005fd0f4655f00000000000001000c00000010000800000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}], 0x0, &(0x7f00000000c0)) 17:07:24 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc01000a, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000003980)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d0f465001000005fd0f4655f00000000000001000c00000010000800000000000af3010004", 0x2d, 0x11100}], 0x0, &(0x7f00000000c0)) (fail_nth: 22) 17:07:24 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc01757f, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000003980)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d0f465001000005fd0f4655f00000000000001", 0x1b, 0x11100}], 0x0, &(0x7f00000000c0)) 17:07:24 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc01000a, 0x7, &(0x7f0000000200)=[{0x0, 0x0, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000003980)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d0f465001000005fd0f4655f00000000000001000c000000100008", 0x23, 0x11100}], 0x0, &(0x7f00000000c0)) [ 336.064825][T19567] loop3: detected capacity change from 0 to 264192 [ 336.095148][T19567] EXT4-fs (loop3): VFS: Can't find ext4 filesystem 17:07:24 executing program 2: clock_adjtime(0x7, &(0x7f0000000000)={0x8000, 0x62, 0xff, 0x1, 0x3, 0x1ff, 0x3ff, 0x4, 0xff, 0x20, 0x6, 0x401, 0x20, 0x0, 0x1ff, 0x8000, 0xfffffffffffffffd, 0x400, 0x8, 0x100000000, 0x2, 0x8, 0xf32, 0x4, 0x6, 0x80}) clock_adjtime(0x2, &(0x7f0000000100)={0xd9, 0x9, 0x1, 0x2, 0x1f, 0x78, 0x4b1, 0x0, 0x401, 0x5, 0x8, 0x1, 0x101, 0x100000001, 0x7, 0x1fc, 0x9, 0x9, 0x0, 0x9, 0x8, 0x3, 0xff, 0x7, 0x73, 0x946c}) clock_adjtime(0x6, &(0x7f0000000200)={0x4, 0x1, 0x100, 0x6, 0x2, 0x6, 0x1, 0x1dd, 0x9, 0x1000000000000000, 0x0, 0x6, 0x1, 0x1, 0x9, 0x5, 0x3023, 0x2, 0x4, 0xfffffffffffffff9, 0x429, 0x3, 0x0, 0x9, 0xffffffffffffff05, 0x1000}) clock_adjtime(0x3, &(0x7f0000000300)={0x0, 0x8, 0x9, 0x9, 0x9, 0x9, 0x6, 0x9, 0x8, 0x1, 0xd0fc, 0x55, 0x2, 0x0, 0x1, 0x1f, 0x100000001, 0x8f44, 0x53, 0x0, 0x3, 0x140000000000, 0x9, 0x8000, 0x0, 0x10001}) r0 = syz_mount_image$iso9660(&(0x7f0000000400), &(0x7f0000000440)='./file0\x00', 0x4, 0x1, &(0x7f0000000480)=[{0xfffffffffffffffe, 0x0, 0x3}], 0x2014400, &(0x7f00000004c0)={[{@check_relaxed}, {@dmode}, {@check_relaxed}], [{@euid_lt={'euid<', 0xee01}}, {@euid_eq}, {@rootcontext={'rootcontext', 0x3d, 'staff_u'}}, {@obj_user={'obj_user', 0x3d, '#-_'}}, {@rootcontext={'rootcontext', 0x3d, 'staff_u'}}]}) faccessat(r0, &(0x7f0000000580)='./file0\x00', 0x88) clock_adjtime(0x4, &(0x7f00000005c0)={0x80000000, 0x100000000, 0xba, 0x80000000, 0x4, 0x20d4e190, 0x7, 0x400, 0x33, 0x7a, 0x1, 0x465d, 0x7f, 0x5, 0x3, 0x1, 0x0, 0x8, 0x7, 0x7ff, 0x1, 0x4, 0x3f, 0x7fff, 0x700b, 0x96}) r1 = accept$unix(0xffffffffffffffff, 0x0, &(0x7f00000006c0)) getsockname$unix(r1, &(0x7f0000000700), &(0x7f0000000780)=0x6e) clock_adjtime(0x3, &(0x7f00000007c0)={0x6, 0x6, 0x7, 0x8000, 0x7ff, 0x5c, 0x401, 0x2, 0x9, 0x4, 0x0, 0x61, 0x2, 0x9b71, 0x100000000, 0x7fffffff, 0x322, 0xc70d, 0x9, 0xd, 0x9, 0x0, 0x9, 0x1a1f00000000, 0xffffffffffffffff, 0x9}) clock_adjtime(0x6, &(0x7f00000008c0)={0x4, 0x9, 0x3, 0xfffffffffffffff7, 0xb31, 0x1, 0x1, 0x2, 0x538, 0x0, 0x401, 0x1, 0xdd, 0xfffffffffffffff7, 0xec54, 0x4, 0x100000001, 0x0, 0xa, 0x1, 0x7ff, 0xcd, 0xf2, 0x80, 0x7, 0x8000}) clock_adjtime(0x0, &(0x7f00000009c0)={0x8, 0xff, 0x81, 0x2, 0x100000001, 0x11, 0x5, 0x1, 0x1, 0x9, 0x1000, 0x8, 0xdf6c, 0x9, 0x8, 0x1004000000000000, 0x1ff, 0x3, 0x6, 0xf5, 0x80000, 0x1, 0xfffffffffffffd6d, 0x2, 0x6, 0xfa}) r2 = socket$unix(0x1, 0x5, 0x0) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f0000000ac0)={'wlan0\x00'}) mq_timedreceive(0xffffffffffffffff, &(0x7f0000000b00)=""/4096, 0x1000, 0x80, &(0x7f0000001b00)={0x0, 0x989680}) r3 = creat(&(0x7f0000001b40)='./file0\x00', 0x1) mknodat(r3, &(0x7f0000001b80)='./file1\x00', 0x4, 0x0) clock_adjtime(0x800000000000000, &(0x7f0000001bc0)={0xfff, 0x7fff, 0x0, 0x2, 0xfdc, 0x54, 0x8fa, 0x3f41, 0x0, 0x4, 0x4, 0x5, 0x101, 0x5, 0x4, 0x9, 0x9, 0x30e, 0x3f, 0x2, 0x7f, 0x7, 0x6, 0x4, 0x3ff, 0x100000000}) clock_adjtime(0x2, &(0x7f0000001cc0)={0x0, 0x6, 0x7, 0xe5, 0x5, 0x6, 0x10, 0x7, 0x281, 0x40, 0x1, 0x0, 0x1, 0x10001, 0x5, 0x100, 0x0, 0x4, 0xffffffffffffe001, 0xdf, 0x7f, 0x8000, 0x9, 0x400, 0xfffffffffffffe00, 0x3f}) [ 336.125857][T19573] FAULT_INJECTION: forcing a failure. [ 336.125857][T19573] name failslab, interval 1, probability 0, space 0, times 0 [ 336.130272][T19574] loop1: detected capacity change from 0 to 264192 [ 336.139787][T19573] CPU: 0 PID: 19573 Comm: syz-executor.4 Not tainted 5.16.0-syzkaller #0 [ 336.148747][T19575] loop0: detected capacity change from 0 to 264192 [ 336.154650][T19573] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 336.154664][T19573] Call Trace: [ 336.174551][T19573] [ 336.177472][T19573] dump_stack_lvl+0xd6/0x122 [ 336.182057][T19573] dump_stack+0x11/0x1b [ 336.186807][T19573] should_fail+0x23c/0x250 [ 336.191263][T19573] ? security_file_alloc+0x30/0x190 [ 336.197739][T19573] __should_failslab+0x81/0x90 [ 336.202550][T19573] should_failslab+0x5/0x20 [ 336.207132][T19573] kmem_cache_alloc+0x4f/0x320 [ 336.211959][T19573] security_file_alloc+0x30/0x190 [ 336.217133][T19573] __alloc_file+0x83/0x1a0 [ 336.221540][T19573] alloc_empty_file+0xcd/0x1c0 [ 336.226286][T19573] path_openat+0x6a/0x1eb0 [ 336.230765][T19573] ? __set_page_dirty_no_writeback+0x96/0xc0 [ 336.236819][T19573] ? folio_mark_dirty+0x84/0xe0 [ 336.241745][T19573] ? unlock_page+0x37/0x50 [ 336.246166][T19573] ? inode_to_bdi+0x43/0xa0 [ 336.250739][T19573] ? balance_dirty_pages_ratelimited+0x47/0x280 [ 336.257087][T19573] ? generic_perform_write+0x397/0x400 [ 336.262579][T19573] do_filp_open+0x105/0x220 [ 336.267113][T19573] do_sys_openat2+0xb5/0x2b0 [ 336.271691][T19573] __x64_sys_openat+0xef/0x110 [ 336.276529][T19573] do_syscall_64+0x44/0xd0 [ 336.280927][T19573] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 336.287308][T19573] RIP: 0033:0x7f6f94bd5db4 [ 336.291705][T19573] Code: 84 00 00 00 00 00 44 89 54 24 0c e8 96 f9 ff ff 44 8b 54 24 0c 44 89 e2 48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 89 44 24 0c e8 c8 f9 ff ff 8b 44 [ 336.311423][T19573] RSP: 002b:00007f6f93d98eb0 EFLAGS: 00000293 ORIG_RAX: 0000000000000101 [ 336.319849][T19573] RAX: ffffffffffffffda RBX: 00007f6f94c6c9c8 RCX: 00007f6f94bd5db4 [ 336.327938][T19573] RDX: 0000000000000002 RSI: 00007f6f93d98fe0 RDI: 00000000ffffff9c [ 336.336066][T19573] RBP: 00007f6f93d98fe0 R08: 0000000000000000 R09: 00007f6f93d991d0 [ 336.344033][T19573] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000002 [ 336.351986][T19573] R13: 0000000000000004 R14: 00000000200002a8 R15: 0000000000000007 [ 336.359947][T19573] [ 336.366987][T19575] EXT4-fs (loop0): inodes count not valid: 1056 vs 32 [ 336.376147][T19579] loop5: detected capacity change from 0 to 264192 [ 336.387535][T19577] SELinux: duplicate or incompatible mount options [ 336.404200][T19582] loop3: detected capacity change from 0 to 264192 [ 336.416431][T19582] EXT4-fs (loop3): VFS: Can't find ext4 filesystem [ 336.425919][T19574] EXT4-fs warning (device loop1): ext4_enable_quotas:6363: Failed to enable quota tracking (type=0, err=-22). Please run e2fsck to fix. 17:07:24 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc01000a, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="200500008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000003980)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d9", 0x4, 0x6800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d0f465001000005fd0f4655f00000000000001000c00000010000800000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}], 0x0, &(0x7f00000000c0)) 17:07:24 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc01000a, 0x7, &(0x7f0000000200)=[{0x0, 0x0, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000003980)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d0f465001000005fd0f4655f00000000000001000c000000100008", 0x23, 0x11100}], 0x0, &(0x7f00000000c0)) 17:07:28 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc01000a, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000003980)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d0f465001000005fd0f4655f00000000000001000c00000010000800000000000af3010004", 0x2d, 0x11100}], 0x0, &(0x7f00000000c0)) (fail_nth: 23) [ 336.478298][T19574] EXT4-fs (loop1): mount failed [ 336.483837][T19579] EXT4-fs error (device loop5): ext4_quota_enable:6323: comm syz-executor.5: Bad quota inode # 3 [ 336.503265][T19590] loop3: detected capacity change from 0 to 264192 [ 336.509279][T19593] FAULT_INJECTION: forcing a failure. [ 336.509279][T19593] name failslab, interval 1, probability 0, space 0, times 0 [ 336.510806][T19579] EXT4-fs warning (device loop5): ext4_enable_quotas:6363: Failed to enable quota tracking (type=0, err=-116). Please run e2fsck to fix. [ 336.522402][T19593] CPU: 1 PID: 19593 Comm: syz-executor.4 Not tainted 5.16.0-syzkaller #0 [ 336.536787][T19579] EXT4-fs (loop5): mount failed [ 336.544929][T19593] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 336.544994][T19593] Call Trace: [ 336.545000][T19593] [ 336.545007][T19593] dump_stack_lvl+0xd6/0x122 [ 336.545031][T19593] dump_stack+0x11/0x1b [ 336.545047][T19593] should_fail+0x23c/0x250 [ 336.559548][T19594] loop0: detected capacity change from 0 to 264192 [ 336.559910][T19593] ? kzalloc+0x16/0x20 [ 336.589831][T19593] __should_failslab+0x81/0x90 [ 336.594608][T19593] should_failslab+0x5/0x20 [ 336.599134][T19593] __kmalloc+0x6f/0x370 [ 336.603286][T19593] ? iput+0x1cd/0x580 [ 336.607254][T19593] kzalloc+0x16/0x20 [ 336.611197][T19593] alloc_workqueue+0x12f/0xad0 [ 336.616013][T19593] ? __rcu_read_unlock+0x5c/0x290 [ 336.621094][T19593] ? preempt_count_add+0x4e/0x90 [ 336.626131][T19593] ? _raw_spin_unlock+0x2e/0x50 [ 336.631028][T19593] ? bd_prepare_to_claim+0x1ac/0x200 [ 336.636305][T19593] loop_configure+0x70e/0xf30 [ 336.641108][T19593] lo_ioctl+0x583/0x1270 [ 336.645451][T19593] ? folio_mark_dirty+0x84/0xe0 [ 336.650337][T19593] ? unlock_page+0x37/0x50 [ 336.654737][T19593] ? __rcu_read_unlock+0x5c/0x290 [ 336.659939][T19593] ? blkdev_common_ioctl+0x438/0x1180 [ 336.665362][T19593] ? selinux_file_ioctl+0x522/0x590 [ 336.670547][T19593] ? do_vfs_ioctl+0x819/0x14a0 [ 336.675308][T19593] ? lo_release+0x120/0x120 [ 336.679829][T19593] blkdev_ioctl+0x20e/0x440 [ 336.684321][T19593] ? blkdev_compat_ptr_ioctl+0x80/0x80 [ 336.689764][T19593] __se_sys_ioctl+0xcb/0x140 [ 336.694502][T19593] __x64_sys_ioctl+0x3f/0x50 [ 336.699259][T19593] do_syscall_64+0x44/0xd0 [ 336.703678][T19593] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 336.709568][T19593] RIP: 0033:0x7f6f94c22c57 [ 336.713978][T19593] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 04 54 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 336.733831][T19593] RSP: 002b:00007f6f93d98f28 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 336.742429][T19593] RAX: ffffffffffffffda RBX: 00007f6f94c6c9c8 RCX: 00007f6f94c22c57 [ 336.750502][T19593] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 336.758540][T19593] RBP: 0000000000000005 R08: 0000000000000000 R09: 00007f6f93d991d0 [ 336.766550][T19593] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 17:07:29 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc01000a, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000003980)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d0f465001000005fd0f4655f00000000000001000c00000010000800000000000af3010004", 0x2d, 0x11100}], 0x0, &(0x7f00000000c0)) (fail_nth: 24) 17:07:29 executing program 2: clock_adjtime(0x7, &(0x7f0000000000)={0x8000, 0x62, 0xff, 0x1, 0x3, 0x1ff, 0x3ff, 0x4, 0xff, 0x20, 0x6, 0x401, 0x20, 0x0, 0x1ff, 0x8000, 0xfffffffffffffffd, 0x400, 0x8, 0x100000000, 0x2, 0x8, 0xf32, 0x4, 0x6, 0x80}) clock_adjtime(0x2, &(0x7f0000000100)={0xd9, 0x9, 0x1, 0x2, 0x1f, 0x78, 0x4b1, 0x0, 0x401, 0x5, 0x8, 0x1, 0x101, 0x100000001, 0x7, 0x1fc, 0x9, 0x9, 0x0, 0x9, 0x8, 0x3, 0xff, 0x7, 0x73, 0x946c}) clock_adjtime(0x6, &(0x7f0000000200)={0x4, 0x1, 0x100, 0x6, 0x2, 0x6, 0x1, 0x1dd, 0x9, 0x1000000000000000, 0x0, 0x6, 0x1, 0x1, 0x9, 0x5, 0x3023, 0x2, 0x4, 0xfffffffffffffff9, 0x429, 0x3, 0x0, 0x9, 0xffffffffffffff05, 0x1000}) clock_adjtime(0x3, &(0x7f0000000300)={0x0, 0x8, 0x9, 0x9, 0x9, 0x9, 0x6, 0x9, 0x8, 0x1, 0xd0fc, 0x55, 0x2, 0x0, 0x1, 0x1f, 0x100000001, 0x8f44, 0x53, 0x0, 0x3, 0x140000000000, 0x9, 0x8000, 0x0, 0x10001}) r0 = syz_mount_image$iso9660(&(0x7f0000000400), &(0x7f0000000440)='./file0\x00', 0x4, 0x1, &(0x7f0000000480)=[{0xfffffffffffffffe, 0x0, 0x3}], 0x2014400, &(0x7f00000004c0)={[{@check_relaxed}, {@dmode}, {@check_relaxed}], [{@euid_lt={'euid<', 0xee01}}, {@euid_eq}, {@rootcontext={'rootcontext', 0x3d, 'staff_u'}}, {@obj_user={'obj_user', 0x3d, '#-_'}}, {@rootcontext={'rootcontext', 0x3d, 'staff_u'}}]}) faccessat(r0, &(0x7f0000000580)='./file0\x00', 0x88) clock_adjtime(0x4, &(0x7f00000005c0)={0x80000000, 0x100000000, 0xba, 0x80000000, 0x4, 0x20d4e190, 0x7, 0x400, 0x33, 0x7a, 0x1, 0x465d, 0x7f, 0x5, 0x3, 0x1, 0x0, 0x8, 0x7, 0x7ff, 0x1, 0x4, 0x3f, 0x7fff, 0x700b, 0x96}) r1 = accept$unix(0xffffffffffffffff, 0x0, &(0x7f00000006c0)) getsockname$unix(r1, &(0x7f0000000700), &(0x7f0000000780)=0x6e) clock_adjtime(0x3, &(0x7f00000007c0)={0x6, 0x6, 0x7, 0x8000, 0x7ff, 0x5c, 0x401, 0x2, 0x9, 0x4, 0x0, 0x61, 0x2, 0x9b71, 0x100000000, 0x7fffffff, 0x322, 0xc70d, 0x9, 0xd, 0x9, 0x0, 0x9, 0x1a1f00000000, 0xffffffffffffffff, 0x9}) clock_adjtime(0x6, &(0x7f00000008c0)={0x4, 0x9, 0x3, 0xfffffffffffffff7, 0xb31, 0x1, 0x1, 0x2, 0x538, 0x0, 0x401, 0x1, 0xdd, 0xfffffffffffffff7, 0xec54, 0x4, 0x100000001, 0x0, 0xa, 0x1, 0x7ff, 0xcd, 0xf2, 0x80, 0x7, 0x8000}) clock_adjtime(0x0, &(0x7f00000009c0)={0x8, 0xff, 0x81, 0x2, 0x100000001, 0x11, 0x5, 0x1, 0x1, 0x9, 0x1000, 0x8, 0xdf6c, 0x9, 0x8, 0x1004000000000000, 0x1ff, 0x3, 0x6, 0xf5, 0x80000, 0x1, 0xfffffffffffffd6d, 0x2, 0x6, 0xfa}) r2 = socket$unix(0x1, 0x5, 0x0) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f0000000ac0)={'wlan0\x00'}) mq_timedreceive(0xffffffffffffffff, &(0x7f0000000b00)=""/4096, 0x1000, 0x80, &(0x7f0000001b00)={0x0, 0x989680}) r3 = creat(&(0x7f0000001b40)='./file0\x00', 0x1) mknodat(r3, &(0x7f0000001b80)='./file1\x00', 0x4, 0x0) clock_adjtime(0xa00000000000000, &(0x7f0000001bc0)={0xfff, 0x7fff, 0x0, 0x2, 0xfdc, 0x54, 0x8fa, 0x3f41, 0x0, 0x4, 0x4, 0x5, 0x101, 0x5, 0x4, 0x9, 0x9, 0x30e, 0x3f, 0x2, 0x7f, 0x7, 0x6, 0x4, 0x3ff, 0x100000000}) clock_adjtime(0x2, &(0x7f0000001cc0)={0x0, 0x6, 0x7, 0xe5, 0x5, 0x6, 0x10, 0x7, 0x281, 0x40, 0x1, 0x0, 0x1, 0x10001, 0x5, 0x100, 0x0, 0x4, 0xffffffffffffe001, 0xdf, 0x7f, 0x8000, 0x9, 0x400, 0xfffffffffffffe00, 0x3f}) [ 336.774544][T19593] R13: 0000000000000004 R14: 00000000200002a8 R15: 0000000000000007 [ 336.782512][T19593] [ 336.796452][T19590] EXT4-fs (loop3): VFS: Can't find ext4 filesystem 17:07:29 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc017580, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000003980)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d0f465001000005fd0f4655f00000000000001", 0x1b, 0x11100}], 0x0, &(0x7f00000000c0)) [ 336.838494][T19597] FAULT_INJECTION: forcing a failure. [ 336.838494][T19597] name failslab, interval 1, probability 0, space 0, times 0 [ 336.851168][T19597] CPU: 1 PID: 19597 Comm: syz-executor.4 Not tainted 5.16.0-syzkaller #0 [ 336.851499][T19598] SELinux: duplicate or incompatible mount options [ 336.859611][T19597] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 336.859626][T19597] Call Trace: [ 336.859633][T19597] [ 336.867199][T19594] EXT4-fs (loop0): inodes count not valid: 1312 vs 32 [ 336.876355][T19597] dump_stack_lvl+0xd6/0x122 [ 336.894351][T19597] dump_stack+0x11/0x1b [ 336.898553][T19597] should_fail+0x23c/0x250 [ 336.903090][T19597] ? alloc_workqueue+0x15d/0xad0 [ 336.908072][T19597] __should_failslab+0x81/0x90 [ 336.911433][T19600] loop1: detected capacity change from 0 to 264192 [ 336.912845][T19597] should_failslab+0x5/0x20 [ 336.912872][T19597] kmem_cache_alloc_trace+0x52/0x350 [ 336.929102][T19597] ? kzalloc+0x16/0x20 [ 336.933238][T19597] alloc_workqueue+0x15d/0xad0 [ 336.938140][T19597] ? __rcu_read_unlock+0x5c/0x290 [ 336.943253][T19597] ? preempt_count_add+0x4e/0x90 [ 336.948195][T19597] ? _raw_spin_unlock+0x2e/0x50 [ 336.953064][T19597] ? bd_prepare_to_claim+0x1ac/0x200 [ 336.958356][T19597] loop_configure+0x70e/0xf30 [ 336.963068][T19597] lo_ioctl+0x583/0x1270 [ 336.966713][T19600] EXT4-fs warning (device loop1): ext4_enable_quotas:6363: Failed to enable quota tracking (type=0, err=-22). Please run e2fsck to fix. [ 336.967309][T19597] ? folio_mark_dirty+0x84/0xe0 [ 336.967334][T19597] ? unlock_page+0x37/0x50 [ 336.983361][T19600] EXT4-fs (loop1): mount failed [ 336.986458][T19597] ? __rcu_read_unlock+0x5c/0x290 [ 336.986488][T19597] ? blkdev_common_ioctl+0x438/0x1180 [ 336.986509][T19597] ? selinux_file_ioctl+0x522/0x590 [ 336.986530][T19597] ? do_vfs_ioctl+0x819/0x14a0 [ 337.016179][T19597] ? lo_release+0x120/0x120 [ 337.020666][T19597] blkdev_ioctl+0x20e/0x440 [ 337.025167][T19597] ? blkdev_compat_ptr_ioctl+0x80/0x80 [ 337.030631][T19597] __se_sys_ioctl+0xcb/0x140 [ 337.035259][T19597] __x64_sys_ioctl+0x3f/0x50 [ 337.039882][T19597] do_syscall_64+0x44/0xd0 [ 337.044311][T19597] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 337.050207][T19597] RIP: 0033:0x7f6f94c22c57 [ 337.054600][T19597] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 04 54 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 337.074449][T19597] RSP: 002b:00007f6f93d98f28 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 17:07:33 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc01000a, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000), 0x0, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000003980)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d0f465001000005fd0f4655f00000000000001000c000000100008", 0x23, 0x11100}], 0x0, &(0x7f00000000c0)) 17:07:33 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc01000a, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000003980)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="80", 0x1, 0x11100}], 0x0, &(0x7f00000000c0)) 17:07:33 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc01000a, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="200700008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000003980)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d9", 0x4, 0x6800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d0f465001000005fd0f4655f00000000000001000c00000010000800000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}], 0x0, &(0x7f00000000c0)) [ 337.082919][T19597] RAX: ffffffffffffffda RBX: 00007f6f94c6c9c8 RCX: 00007f6f94c22c57 [ 337.090877][T19597] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 337.098853][T19597] RBP: 0000000000000005 R08: 0000000000000000 R09: 00007f6f93d991d0 [ 337.107112][T19597] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 337.115161][T19597] R13: 0000000000000004 R14: 00000000200002a8 R15: 0000000000000007 [ 337.123227][T19597] 17:07:33 executing program 2: clock_adjtime(0x7, &(0x7f0000000000)={0x8000, 0x62, 0xff, 0x1, 0x3, 0x1ff, 0x3ff, 0x4, 0xff, 0x20, 0x6, 0x401, 0x20, 0x0, 0x1ff, 0x8000, 0xfffffffffffffffd, 0x400, 0x8, 0x100000000, 0x2, 0x8, 0xf32, 0x4, 0x6, 0x80}) clock_adjtime(0x2, &(0x7f0000000100)={0xd9, 0x9, 0x1, 0x2, 0x1f, 0x78, 0x4b1, 0x0, 0x401, 0x5, 0x8, 0x1, 0x101, 0x100000001, 0x7, 0x1fc, 0x9, 0x9, 0x0, 0x9, 0x8, 0x3, 0xff, 0x7, 0x73, 0x946c}) clock_adjtime(0x6, &(0x7f0000000200)={0x4, 0x1, 0x100, 0x6, 0x2, 0x6, 0x1, 0x1dd, 0x9, 0x1000000000000000, 0x0, 0x6, 0x1, 0x1, 0x9, 0x5, 0x3023, 0x2, 0x4, 0xfffffffffffffff9, 0x429, 0x3, 0x0, 0x9, 0xffffffffffffff05, 0x1000}) clock_adjtime(0x3, &(0x7f0000000300)={0x0, 0x8, 0x9, 0x9, 0x9, 0x9, 0x6, 0x9, 0x8, 0x1, 0xd0fc, 0x55, 0x2, 0x0, 0x1, 0x1f, 0x100000001, 0x8f44, 0x53, 0x0, 0x3, 0x140000000000, 0x9, 0x8000, 0x0, 0x10001}) r0 = syz_mount_image$iso9660(&(0x7f0000000400), &(0x7f0000000440)='./file0\x00', 0x4, 0x1, &(0x7f0000000480)=[{0xfffffffffffffffe, 0x0, 0x3}], 0x2014400, &(0x7f00000004c0)={[{@check_relaxed}, {@dmode}, {@check_relaxed}], [{@euid_lt={'euid<', 0xee01}}, {@euid_eq}, {@rootcontext={'rootcontext', 0x3d, 'staff_u'}}, {@obj_user={'obj_user', 0x3d, '#-_'}}, {@rootcontext={'rootcontext', 0x3d, 'staff_u'}}]}) faccessat(r0, &(0x7f0000000580)='./file0\x00', 0x88) clock_adjtime(0x4, &(0x7f00000005c0)={0x80000000, 0x100000000, 0xba, 0x80000000, 0x4, 0x20d4e190, 0x7, 0x400, 0x33, 0x7a, 0x1, 0x465d, 0x7f, 0x5, 0x3, 0x1, 0x0, 0x8, 0x7, 0x7ff, 0x1, 0x4, 0x3f, 0x7fff, 0x700b, 0x96}) r1 = accept$unix(0xffffffffffffffff, 0x0, &(0x7f00000006c0)) getsockname$unix(r1, &(0x7f0000000700), &(0x7f0000000780)=0x6e) clock_adjtime(0x3, &(0x7f00000007c0)={0x6, 0x6, 0x7, 0x8000, 0x7ff, 0x5c, 0x401, 0x2, 0x9, 0x4, 0x0, 0x61, 0x2, 0x9b71, 0x100000000, 0x7fffffff, 0x322, 0xc70d, 0x9, 0xd, 0x9, 0x0, 0x9, 0x1a1f00000000, 0xffffffffffffffff, 0x9}) clock_adjtime(0x6, &(0x7f00000008c0)={0x4, 0x9, 0x3, 0xfffffffffffffff7, 0xb31, 0x1, 0x1, 0x2, 0x538, 0x0, 0x401, 0x1, 0xdd, 0xfffffffffffffff7, 0xec54, 0x4, 0x100000001, 0x0, 0xa, 0x1, 0x7ff, 0xcd, 0xf2, 0x80, 0x7, 0x8000}) clock_adjtime(0x0, &(0x7f00000009c0)={0x8, 0xff, 0x81, 0x2, 0x100000001, 0x11, 0x5, 0x1, 0x1, 0x9, 0x1000, 0x8, 0xdf6c, 0x9, 0x8, 0x1004000000000000, 0x1ff, 0x3, 0x6, 0xf5, 0x80000, 0x1, 0xfffffffffffffd6d, 0x2, 0x6, 0xfa}) r2 = socket$unix(0x1, 0x5, 0x0) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f0000000ac0)={'wlan0\x00'}) mq_timedreceive(0xffffffffffffffff, &(0x7f0000000b00)=""/4096, 0x1000, 0x80, &(0x7f0000001b00)={0x0, 0x989680}) r3 = creat(&(0x7f0000001b40)='./file0\x00', 0x1) mknodat(r3, &(0x7f0000001b80)='./file1\x00', 0x4, 0x0) clock_adjtime(0xb00000000000000, &(0x7f0000001bc0)={0xfff, 0x7fff, 0x0, 0x2, 0xfdc, 0x54, 0x8fa, 0x3f41, 0x0, 0x4, 0x4, 0x5, 0x101, 0x5, 0x4, 0x9, 0x9, 0x30e, 0x3f, 0x2, 0x7f, 0x7, 0x6, 0x4, 0x3ff, 0x100000000}) clock_adjtime(0x2, &(0x7f0000001cc0)={0x0, 0x6, 0x7, 0xe5, 0x5, 0x6, 0x10, 0x7, 0x281, 0x40, 0x1, 0x0, 0x1, 0x10001, 0x5, 0x100, 0x0, 0x4, 0xffffffffffffe001, 0xdf, 0x7f, 0x8000, 0x9, 0x400, 0xfffffffffffffe00, 0x3f}) 17:07:33 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc01feff, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000003980)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d0f465001000005fd0f4655f00000000000001", 0x1b, 0x11100}], 0x0, &(0x7f00000000c0)) 17:07:33 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc01000a, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000003980)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d0f465001000005fd0f4655f00000000000001000c00000010000800000000000af3010004", 0x2d, 0x11100}], 0x0, &(0x7f00000000c0)) (fail_nth: 25) [ 337.163563][T19607] loop3: detected capacity change from 0 to 264192 [ 337.179536][T19611] loop0: detected capacity change from 0 to 264192 [ 337.192336][T19613] SELinux: duplicate or incompatible mount options [ 337.194662][T19615] loop1: detected capacity change from 0 to 264192 [ 337.200217][T19614] loop5: detected capacity change from 0 to 264192 [ 337.219062][T19607] EXT4-fs (loop3): VFS: Can't find ext4 filesystem [ 337.227923][T19611] EXT4-fs (loop0): inodes count not valid: 1824 vs 32 [ 337.237061][T19617] FAULT_INJECTION: forcing a failure. [ 337.237061][T19617] name failslab, interval 1, probability 0, space 0, times 0 [ 337.249690][T19617] CPU: 1 PID: 19617 Comm: syz-executor.4 Not tainted 5.16.0-syzkaller #0 [ 337.258259][T19617] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 337.268305][T19617] Call Trace: [ 337.271594][T19617] [ 337.274569][T19617] dump_stack_lvl+0xd6/0x122 [ 337.279690][T19617] dump_stack+0x11/0x1b [ 337.283920][T19617] should_fail+0x23c/0x250 [ 337.288345][T19617] ? kzalloc+0x16/0x20 [ 337.292396][T19617] __should_failslab+0x81/0x90 [ 337.297228][T19617] should_failslab+0x5/0x20 [ 337.301720][T19617] __kmalloc+0x6f/0x370 [ 337.305866][T19617] ? number+0xa13/0xb60 [ 337.310083][T19617] kzalloc+0x16/0x20 [ 337.314047][T19617] apply_wqattrs_prepare+0x3a/0x630 [ 337.319237][T19617] ? vsnprintf+0xe8f/0xed0 [ 337.323656][T19617] apply_workqueue_attrs+0x9e/0x100 [ 337.328850][T19617] alloc_workqueue+0x777/0xad0 [ 337.333604][T19617] ? preempt_count_add+0x4e/0x90 [ 337.338527][T19617] ? _raw_spin_unlock+0x2e/0x50 [ 337.343417][T19617] ? bd_prepare_to_claim+0x1ac/0x200 [ 337.348686][T19617] loop_configure+0x70e/0xf30 [ 337.353356][T19617] lo_ioctl+0x583/0x1270 [ 337.357766][T19617] ? folio_mark_dirty+0x84/0xe0 [ 337.362840][T19617] ? unlock_page+0x37/0x50 [ 337.367256][T19617] ? __rcu_read_unlock+0x5c/0x290 [ 337.372322][T19617] ? blkdev_common_ioctl+0x438/0x1180 [ 337.377725][T19617] ? selinux_file_ioctl+0x522/0x590 [ 337.382937][T19617] ? do_vfs_ioctl+0x819/0x14a0 [ 337.387688][T19617] ? lo_release+0x120/0x120 [ 337.392264][T19617] blkdev_ioctl+0x20e/0x440 [ 337.396763][T19617] ? blkdev_compat_ptr_ioctl+0x80/0x80 [ 337.402268][T19617] __se_sys_ioctl+0xcb/0x140 [ 337.406905][T19617] __x64_sys_ioctl+0x3f/0x50 [ 337.411486][T19617] do_syscall_64+0x44/0xd0 [ 337.415909][T19617] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 337.421788][T19617] RIP: 0033:0x7f6f94c22c57 [ 337.426256][T19617] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 04 54 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 337.445871][T19617] RSP: 002b:00007f6f93d98f28 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 337.454344][T19617] RAX: ffffffffffffffda RBX: 00007f6f94c6c9c8 RCX: 00007f6f94c22c57 [ 337.462308][T19617] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 17:07:33 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc01000a, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000003980)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d0f465001000005fd0f4655f00000000000001000c00000010000800000000000af3010004", 0x2d, 0x11100}], 0x0, &(0x7f00000000c0)) (fail_nth: 26) [ 337.470263][T19617] RBP: 0000000000000005 R08: 0000000000000000 R09: 00007f6f93d991d0 [ 337.478217][T19617] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 337.486530][T19617] R13: 0000000000000004 R14: 00000000200002a8 R15: 0000000000000007 [ 337.494486][T19617] [ 337.528173][T19614] EXT4-fs error (device loop5): ext4_quota_enable:6323: comm syz-executor.5: Bad quota inode # 3 [ 337.545171][T19614] EXT4-fs warning (device loop5): ext4_enable_quotas:6363: Failed to enable quota tracking (type=0, err=-116). Please run e2fsck to fix. [ 337.554367][T19625] FAULT_INJECTION: forcing a failure. [ 337.554367][T19625] name failslab, interval 1, probability 0, space 0, times 0 [ 337.561470][T19614] EXT4-fs (loop5): mount failed [ 337.571978][T19625] CPU: 0 PID: 19625 Comm: syz-executor.4 Not tainted 5.16.0-syzkaller #0 [ 337.585191][T19625] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 337.595363][T19625] Call Trace: [ 337.598638][T19625] [ 337.601565][T19625] dump_stack_lvl+0xd6/0x122 [ 337.606159][T19625] dump_stack+0x11/0x1b [ 337.610320][T19625] should_fail+0x23c/0x250 [ 337.614760][T19625] ? apply_wqattrs_prepare+0x5f/0x630 [ 337.620161][T19625] __should_failslab+0x81/0x90 [ 337.625102][T19625] should_failslab+0x5/0x20 [ 337.629631][T19625] kmem_cache_alloc_trace+0x52/0x350 [ 337.634993][T19625] ? kzalloc+0x16/0x20 [ 337.639169][T19625] apply_wqattrs_prepare+0x5f/0x630 [ 337.644462][T19625] ? vsnprintf+0xe8f/0xed0 [ 337.648894][T19625] apply_workqueue_attrs+0x9e/0x100 [ 337.654100][T19625] alloc_workqueue+0x777/0xad0 [ 337.658890][T19625] ? preempt_count_add+0x4e/0x90 [ 337.663958][T19625] ? _raw_spin_unlock+0x2e/0x50 [ 337.668869][T19625] ? bd_prepare_to_claim+0x1ac/0x200 [ 337.674161][T19625] loop_configure+0x70e/0xf30 [ 337.678915][T19625] lo_ioctl+0x583/0x1270 [ 337.683336][T19625] ? folio_mark_dirty+0x84/0xe0 [ 337.688234][T19625] ? unlock_page+0x37/0x50 [ 337.692683][T19625] ? __rcu_read_unlock+0x5c/0x290 [ 337.697781][T19625] ? blkdev_common_ioctl+0x438/0x1180 [ 337.703165][T19625] ? selinux_file_ioctl+0x522/0x590 [ 337.708397][T19625] ? do_vfs_ioctl+0x819/0x14a0 [ 337.713329][T19625] ? lo_release+0x120/0x120 [ 337.717834][T19625] blkdev_ioctl+0x20e/0x440 [ 337.722381][T19625] ? blkdev_compat_ptr_ioctl+0x80/0x80 17:07:37 executing program 2: clock_adjtime(0x7, &(0x7f0000000000)={0x8000, 0x62, 0xff, 0x1, 0x3, 0x1ff, 0x3ff, 0x4, 0xff, 0x20, 0x6, 0x401, 0x20, 0x0, 0x1ff, 0x8000, 0xfffffffffffffffd, 0x400, 0x8, 0x100000000, 0x2, 0x8, 0xf32, 0x4, 0x6, 0x80}) clock_adjtime(0x2, &(0x7f0000000100)={0xd9, 0x9, 0x1, 0x2, 0x1f, 0x78, 0x4b1, 0x0, 0x401, 0x5, 0x8, 0x1, 0x101, 0x100000001, 0x7, 0x1fc, 0x9, 0x9, 0x0, 0x9, 0x8, 0x3, 0xff, 0x7, 0x73, 0x946c}) clock_adjtime(0x6, &(0x7f0000000200)={0x4, 0x1, 0x100, 0x6, 0x2, 0x6, 0x1, 0x1dd, 0x9, 0x1000000000000000, 0x0, 0x6, 0x1, 0x1, 0x9, 0x5, 0x3023, 0x2, 0x4, 0xfffffffffffffff9, 0x429, 0x3, 0x0, 0x9, 0xffffffffffffff05, 0x1000}) clock_adjtime(0x3, &(0x7f0000000300)={0x0, 0x8, 0x9, 0x9, 0x9, 0x9, 0x6, 0x9, 0x8, 0x1, 0xd0fc, 0x55, 0x2, 0x0, 0x1, 0x1f, 0x100000001, 0x8f44, 0x53, 0x0, 0x3, 0x140000000000, 0x9, 0x8000, 0x0, 0x10001}) r0 = syz_mount_image$iso9660(&(0x7f0000000400), &(0x7f0000000440)='./file0\x00', 0x4, 0x1, &(0x7f0000000480)=[{0xfffffffffffffffe, 0x0, 0x3}], 0x2014400, &(0x7f00000004c0)={[{@check_relaxed}, {@dmode}, {@check_relaxed}], [{@euid_lt={'euid<', 0xee01}}, {@euid_eq}, {@rootcontext={'rootcontext', 0x3d, 'staff_u'}}, {@obj_user={'obj_user', 0x3d, '#-_'}}, {@rootcontext={'rootcontext', 0x3d, 'staff_u'}}]}) faccessat(r0, &(0x7f0000000580)='./file0\x00', 0x88) clock_adjtime(0x4, &(0x7f00000005c0)={0x80000000, 0x100000000, 0xba, 0x80000000, 0x4, 0x20d4e190, 0x7, 0x400, 0x33, 0x7a, 0x1, 0x465d, 0x7f, 0x5, 0x3, 0x1, 0x0, 0x8, 0x7, 0x7ff, 0x1, 0x4, 0x3f, 0x7fff, 0x700b, 0x96}) r1 = accept$unix(0xffffffffffffffff, 0x0, &(0x7f00000006c0)) getsockname$unix(r1, &(0x7f0000000700), &(0x7f0000000780)=0x6e) clock_adjtime(0x3, &(0x7f00000007c0)={0x6, 0x6, 0x7, 0x8000, 0x7ff, 0x5c, 0x401, 0x2, 0x9, 0x4, 0x0, 0x61, 0x2, 0x9b71, 0x100000000, 0x7fffffff, 0x322, 0xc70d, 0x9, 0xd, 0x9, 0x0, 0x9, 0x1a1f00000000, 0xffffffffffffffff, 0x9}) clock_adjtime(0x6, &(0x7f00000008c0)={0x4, 0x9, 0x3, 0xfffffffffffffff7, 0xb31, 0x1, 0x1, 0x2, 0x538, 0x0, 0x401, 0x1, 0xdd, 0xfffffffffffffff7, 0xec54, 0x4, 0x100000001, 0x0, 0xa, 0x1, 0x7ff, 0xcd, 0xf2, 0x80, 0x7, 0x8000}) clock_adjtime(0x0, &(0x7f00000009c0)={0x8, 0xff, 0x81, 0x2, 0x100000001, 0x11, 0x5, 0x1, 0x1, 0x9, 0x1000, 0x8, 0xdf6c, 0x9, 0x8, 0x1004000000000000, 0x1ff, 0x3, 0x6, 0xf5, 0x80000, 0x1, 0xfffffffffffffd6d, 0x2, 0x6, 0xfa}) r2 = socket$unix(0x1, 0x5, 0x0) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f0000000ac0)={'wlan0\x00'}) mq_timedreceive(0xffffffffffffffff, &(0x7f0000000b00)=""/4096, 0x1000, 0x80, &(0x7f0000001b00)={0x0, 0x989680}) r3 = creat(&(0x7f0000001b40)='./file0\x00', 0x1) mknodat(r3, &(0x7f0000001b80)='./file1\x00', 0x4, 0x0) clock_adjtime(0x8bcc0c0000000000, &(0x7f0000001bc0)={0xfff, 0x7fff, 0x0, 0x2, 0xfdc, 0x54, 0x8fa, 0x3f41, 0x0, 0x4, 0x4, 0x5, 0x101, 0x5, 0x4, 0x9, 0x9, 0x30e, 0x3f, 0x2, 0x7f, 0x7, 0x6, 0x4, 0x3ff, 0x100000000}) clock_adjtime(0x2, &(0x7f0000001cc0)={0x0, 0x6, 0x7, 0xe5, 0x5, 0x6, 0x10, 0x7, 0x281, 0x40, 0x1, 0x0, 0x1, 0x10001, 0x5, 0x100, 0x0, 0x4, 0xffffffffffffe001, 0xdf, 0x7f, 0x8000, 0x9, 0x400, 0xfffffffffffffe00, 0x3f}) 17:07:38 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc01000a, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000), 0x0, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000003980)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d0f465001000005fd0f4655f00000000000001000c000000100008", 0x23, 0x11100}], 0x0, &(0x7f00000000c0)) 17:07:38 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc01000a, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="200900008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000003980)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d9", 0x4, 0x6800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d0f465001000005fd0f4655f00000000000001000c00000010000800000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}], 0x0, &(0x7f00000000c0)) [ 337.727867][T19625] __se_sys_ioctl+0xcb/0x140 [ 337.732528][T19625] __x64_sys_ioctl+0x3f/0x50 [ 337.737186][T19625] do_syscall_64+0x44/0xd0 [ 337.741994][T19625] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 337.748130][T19625] RIP: 0033:0x7f6f94c22c57 [ 337.752533][T19625] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 04 54 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 337.772152][T19625] RSP: 002b:00007f6f93d98f28 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 337.780550][T19625] RAX: ffffffffffffffda RBX: 00007f6f94c6c9c8 RCX: 00007f6f94c22c57 [ 337.788536][T19625] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 337.796544][T19625] RBP: 0000000000000005 R08: 0000000000000000 R09: 00007f6f93d991d0 [ 337.804614][T19625] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 337.817628][T19625] R13: 0000000000000004 R14: 00000000200002a8 R15: 0000000000000007 [ 337.825671][T19625] 17:07:42 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc01000a, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000003980)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d0f465001000005fd0f4655f00000000000001000c00000010000800000000000af3010004", 0x2d, 0x11100}], 0x0, &(0x7f00000000c0)) (fail_nth: 27) [ 337.831440][T19615] EXT4-fs warning (device loop1): ext4_enable_quotas:6363: Failed to enable quota tracking (type=0, err=-22). Please run e2fsck to fix. [ 337.834284][T19629] SELinux: duplicate or incompatible mount options [ 337.846459][T19615] EXT4-fs (loop1): mount failed [ 337.855495][T19631] loop3: detected capacity change from 0 to 264192 [ 337.864024][T19633] loop0: detected capacity change from 0 to 264192 [ 337.876918][T19639] FAULT_INJECTION: forcing a failure. [ 337.876918][T19639] name failslab, interval 1, probability 0, space 0, times 0 [ 337.889635][T19639] CPU: 0 PID: 19639 Comm: syz-executor.4 Not tainted 5.16.0-syzkaller #0 [ 337.898078][T19639] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 337.899452][T19633] EXT4-fs (loop0): inodes count not valid: 2336 vs 32 [ 337.908159][T19639] Call Trace: [ 337.908171][T19639] [ 337.908178][T19639] dump_stack_lvl+0xd6/0x122 [ 337.925712][T19639] dump_stack+0x11/0x1b 17:07:42 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc01000a, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000), 0x0, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000003980)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d0f465001000005fd0f4655f00000000000001000c000000100008", 0x23, 0x11100}], 0x0, &(0x7f00000000c0)) [ 337.929950][T19639] should_fail+0x23c/0x250 [ 337.931047][T19631] EXT4-fs (loop3): VFS: Can't find ext4 filesystem [ 337.934364][T19639] ? apply_wqattrs_prepare+0xbe/0x630 [ 337.946354][T19639] __should_failslab+0x81/0x90 [ 337.951159][T19639] should_failslab+0x5/0x20 [ 337.955677][T19639] kmem_cache_alloc_trace+0x52/0x350 [ 337.961026][T19639] ? apply_wqattrs_prepare+0x5f/0x630 [ 337.966407][T19639] apply_wqattrs_prepare+0xbe/0x630 [ 337.971688][T19639] ? vsnprintf+0xe8f/0xed0 [ 337.976189][T19639] apply_workqueue_attrs+0x9e/0x100 [ 337.981571][T19639] alloc_workqueue+0x777/0xad0 [ 337.986321][T19639] ? preempt_count_add+0x4e/0x90 [ 337.991244][T19639] ? _raw_spin_unlock+0x2e/0x50 [ 337.996223][T19639] ? bd_prepare_to_claim+0x1ac/0x200 [ 338.001713][T19639] loop_configure+0x70e/0xf30 [ 338.006499][T19639] lo_ioctl+0x583/0x1270 [ 338.010727][T19639] ? enqueue_entity+0x4bf/0x6c0 [ 338.015571][T19639] ? __rcu_read_unlock+0x5c/0x290 [ 338.020774][T19639] ? blkdev_common_ioctl+0x438/0x1180 [ 338.026178][T19639] ? selinux_file_ioctl+0x522/0x590 [ 338.031366][T19639] ? do_vfs_ioctl+0x819/0x14a0 [ 338.036297][T19639] ? lo_release+0x120/0x120 [ 338.040785][T19639] blkdev_ioctl+0x20e/0x440 [ 338.045318][T19639] ? blkdev_compat_ptr_ioctl+0x80/0x80 [ 338.051189][T19639] __se_sys_ioctl+0xcb/0x140 [ 338.055774][T19639] __x64_sys_ioctl+0x3f/0x50 [ 338.060389][T19639] do_syscall_64+0x44/0xd0 [ 338.064830][T19639] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 338.070704][T19639] RIP: 0033:0x7f6f94c22c57 [ 338.075106][T19639] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 04 54 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 338.094781][T19639] RSP: 002b:00007f6f93d98f28 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 338.103245][T19639] RAX: ffffffffffffffda RBX: 00007f6f94c6c9c8 RCX: 00007f6f94c22c57 [ 338.111294][T19639] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 338.119252][T19639] RBP: 0000000000000005 R08: 0000000000000000 R09: 00007f6f93d991d0 [ 338.127210][T19639] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 338.135159][T19639] R13: 0000000000000004 R14: 00000000200002a8 R15: 0000000000000007 [ 338.143383][T19639] 17:07:42 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc01000a, 0xc, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000003980)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="80", 0x1, 0x11100}], 0x0, &(0x7f00000000c0)) 17:07:42 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc01000a, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="200a00008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000003980)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d9", 0x4, 0x6800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d0f465001000005fd0f4655f00000000000001000c00000010000800000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}], 0x0, &(0x7f00000000c0)) 17:07:42 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc01000a, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000003980)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d0f465001000005fd0f4655f00000000000001000c00000010000800000000000af3010004", 0x2d, 0x11100}], 0x0, &(0x7f00000000c0)) (fail_nth: 28) 17:07:42 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc01fffe, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000003980)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d0f465001000005fd0f4655f00000000000001", 0x1b, 0x11100}], 0x0, &(0x7f00000000c0)) 17:07:42 executing program 2: clock_adjtime(0x7, &(0x7f0000000000)={0x8000, 0x62, 0xff, 0x1, 0x3, 0x1ff, 0x3ff, 0x4, 0xff, 0x20, 0x6, 0x401, 0x20, 0x0, 0x1ff, 0x8000, 0xfffffffffffffffd, 0x400, 0x8, 0x100000000, 0x2, 0x8, 0xf32, 0x4, 0x6, 0x80}) clock_adjtime(0x2, &(0x7f0000000100)={0xd9, 0x9, 0x1, 0x2, 0x1f, 0x78, 0x4b1, 0x0, 0x401, 0x5, 0x8, 0x1, 0x101, 0x100000001, 0x7, 0x1fc, 0x9, 0x9, 0x0, 0x9, 0x8, 0x3, 0xff, 0x7, 0x73, 0x946c}) clock_adjtime(0x6, &(0x7f0000000200)={0x4, 0x1, 0x100, 0x6, 0x2, 0x6, 0x1, 0x1dd, 0x9, 0x1000000000000000, 0x0, 0x6, 0x1, 0x1, 0x9, 0x5, 0x3023, 0x2, 0x4, 0xfffffffffffffff9, 0x429, 0x3, 0x0, 0x9, 0xffffffffffffff05, 0x1000}) clock_adjtime(0x3, &(0x7f0000000300)={0x0, 0x8, 0x9, 0x9, 0x9, 0x9, 0x6, 0x9, 0x8, 0x1, 0xd0fc, 0x55, 0x2, 0x0, 0x1, 0x1f, 0x100000001, 0x8f44, 0x53, 0x0, 0x3, 0x140000000000, 0x9, 0x8000, 0x0, 0x10001}) r0 = syz_mount_image$iso9660(&(0x7f0000000400), &(0x7f0000000440)='./file0\x00', 0x4, 0x1, &(0x7f0000000480)=[{0xfffffffffffffffe, 0x0, 0x3}], 0x2014400, &(0x7f00000004c0)={[{@check_relaxed}, {@dmode}, {@check_relaxed}], [{@euid_lt={'euid<', 0xee01}}, {@euid_eq}, {@rootcontext={'rootcontext', 0x3d, 'staff_u'}}, {@obj_user={'obj_user', 0x3d, '#-_'}}, {@rootcontext={'rootcontext', 0x3d, 'staff_u'}}]}) faccessat(r0, &(0x7f0000000580)='./file0\x00', 0x88) clock_adjtime(0x4, &(0x7f00000005c0)={0x80000000, 0x100000000, 0xba, 0x80000000, 0x4, 0x20d4e190, 0x7, 0x400, 0x33, 0x7a, 0x1, 0x465d, 0x7f, 0x5, 0x3, 0x1, 0x0, 0x8, 0x7, 0x7ff, 0x1, 0x4, 0x3f, 0x7fff, 0x700b, 0x96}) r1 = accept$unix(0xffffffffffffffff, 0x0, &(0x7f00000006c0)) getsockname$unix(r1, &(0x7f0000000700), &(0x7f0000000780)=0x6e) clock_adjtime(0x3, &(0x7f00000007c0)={0x6, 0x6, 0x7, 0x8000, 0x7ff, 0x5c, 0x401, 0x2, 0x9, 0x4, 0x0, 0x61, 0x2, 0x9b71, 0x100000000, 0x7fffffff, 0x322, 0xc70d, 0x9, 0xd, 0x9, 0x0, 0x9, 0x1a1f00000000, 0xffffffffffffffff, 0x9}) clock_adjtime(0x6, &(0x7f00000008c0)={0x4, 0x9, 0x3, 0xfffffffffffffff7, 0xb31, 0x1, 0x1, 0x2, 0x538, 0x0, 0x401, 0x1, 0xdd, 0xfffffffffffffff7, 0xec54, 0x4, 0x100000001, 0x0, 0xa, 0x1, 0x7ff, 0xcd, 0xf2, 0x80, 0x7, 0x8000}) clock_adjtime(0x0, &(0x7f00000009c0)={0x8, 0xff, 0x81, 0x2, 0x100000001, 0x11, 0x5, 0x1, 0x1, 0x9, 0x1000, 0x8, 0xdf6c, 0x9, 0x8, 0x1004000000000000, 0x1ff, 0x3, 0x6, 0xf5, 0x80000, 0x1, 0xfffffffffffffd6d, 0x2, 0x6, 0xfa}) r2 = socket$unix(0x1, 0x5, 0x0) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f0000000ac0)={'wlan0\x00'}) mq_timedreceive(0xffffffffffffffff, &(0x7f0000000b00)=""/4096, 0x1000, 0x80, &(0x7f0000001b00)={0x0, 0x989680}) r3 = creat(&(0x7f0000001b40)='./file0\x00', 0x1) mknodat(r3, &(0x7f0000001b80)='./file1\x00', 0x4, 0x0) clock_adjtime(0xfff85ee000000000, &(0x7f0000001bc0)={0xfff, 0x7fff, 0x0, 0x2, 0xfdc, 0x54, 0x8fa, 0x3f41, 0x0, 0x4, 0x4, 0x5, 0x101, 0x5, 0x4, 0x9, 0x9, 0x30e, 0x3f, 0x2, 0x7f, 0x7, 0x6, 0x4, 0x3ff, 0x100000000}) clock_adjtime(0x2, &(0x7f0000001cc0)={0x0, 0x6, 0x7, 0xe5, 0x5, 0x6, 0x10, 0x7, 0x281, 0x40, 0x1, 0x0, 0x1, 0x10001, 0x5, 0x100, 0x0, 0x4, 0xffffffffffffe001, 0xdf, 0x7f, 0x8000, 0x9, 0x400, 0xfffffffffffffe00, 0x3f}) [ 338.178076][T19641] loop3: detected capacity change from 0 to 264192 [ 338.200882][T19645] FAULT_INJECTION: forcing a failure. [ 338.200882][T19645] name failslab, interval 1, probability 0, space 0, times 0 [ 338.213606][T19645] CPU: 1 PID: 19645 Comm: syz-executor.4 Not tainted 5.16.0-syzkaller #0 [ 338.221573][T19641] EXT4-fs (loop3): VFS: Can't find ext4 filesystem [ 338.222031][T19645] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 338.238691][T19645] Call Trace: [ 338.242068][T19645] [ 338.244981][T19645] dump_stack_lvl+0xd6/0x122 [ 338.249587][T19645] dump_stack+0x11/0x1b [ 338.253743][T19645] should_fail+0x23c/0x250 [ 338.258181][T19645] __should_failslab+0x81/0x90 [ 338.262929][T19645] should_failslab+0x5/0x20 [ 338.267442][T19645] kmem_cache_alloc_node+0x61/0x2d0 [ 338.272674][T19645] ? should_fail+0xd6/0x250 [ 338.277154][T19645] ? should_fail+0xd6/0x250 [ 338.281633][T19645] ? alloc_unbound_pwq+0x3e6/0x780 [ 338.287236][T19645] alloc_unbound_pwq+0x3e6/0x780 [ 338.292177][T19645] apply_wqattrs_prepare+0x1ed/0x630 [ 338.297475][T19645] ? vsnprintf+0xe8f/0xed0 [ 338.301890][T19645] apply_workqueue_attrs+0x9e/0x100 [ 338.307188][T19645] alloc_workqueue+0x777/0xad0 [ 338.311945][T19645] ? preempt_count_add+0x4e/0x90 [ 338.317313][T19645] ? _raw_spin_unlock+0x2e/0x50 [ 338.322179][T19645] ? bd_prepare_to_claim+0x1ac/0x200 [ 338.327446][T19645] loop_configure+0x70e/0xf30 [ 338.332138][T19645] lo_ioctl+0x583/0x1270 [ 338.336398][T19645] ? folio_mark_dirty+0x84/0xe0 [ 338.341348][T19645] ? unlock_page+0x37/0x50 [ 338.345770][T19645] ? __rcu_read_unlock+0x5c/0x290 [ 338.350808][T19645] ? blkdev_common_ioctl+0x438/0x1180 [ 338.356209][T19645] ? selinux_file_ioctl+0x522/0x590 [ 338.361411][T19645] ? do_vfs_ioctl+0x819/0x14a0 [ 338.366277][T19645] ? lo_release+0x120/0x120 [ 338.370772][T19645] blkdev_ioctl+0x20e/0x440 [ 338.375392][T19645] ? blkdev_compat_ptr_ioctl+0x80/0x80 [ 338.381025][T19645] __se_sys_ioctl+0xcb/0x140 [ 338.385628][T19645] __x64_sys_ioctl+0x3f/0x50 [ 338.390213][T19645] do_syscall_64+0x44/0xd0 [ 338.394619][T19645] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 338.400606][T19645] RIP: 0033:0x7f6f94c22c57 [ 338.405004][T19645] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 04 54 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 338.425866][T19645] RSP: 002b:00007f6f93d98f28 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 338.434266][T19645] RAX: ffffffffffffffda RBX: 00007f6f94c6c9c8 RCX: 00007f6f94c22c57 [ 338.442257][T19645] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 338.450290][T19645] RBP: 0000000000000005 R08: 0000000000000000 R09: 00007f6f93d991d0 [ 338.458251][T19645] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 338.466243][T19645] R13: 0000000000000004 R14: 00000000200002a8 R15: 0000000000000007 [ 338.474498][T19645] 17:07:46 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc01000a, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000003980)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d0f465001000005fd0f4655f00000000000001000c00000010000800000000000af3010004", 0x2d, 0x11100}], 0x0, &(0x7f00000000c0)) (fail_nth: 29) [ 338.479574][T19646] loop5: detected capacity change from 0 to 264192 [ 338.486310][T19647] loop0: detected capacity change from 0 to 264192 [ 338.490872][T19650] loop1: detected capacity change from 0 to 264192 [ 338.498488][T19651] SELinux: duplicate or incompatible mount options [ 338.514689][T19656] FAULT_INJECTION: forcing a failure. [ 338.514689][T19656] name failslab, interval 1, probability 0, space 0, times 0 17:07:46 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc01000a, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f465", 0x33, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000003980)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d0f465001000005fd0f4655f00000000000001000c000000100008", 0x23, 0x11100}], 0x0, &(0x7f00000000c0)) 17:07:46 executing program 2: clock_adjtime(0x7, &(0x7f0000000000)={0x8000, 0x62, 0xff, 0x1, 0x3, 0x1ff, 0x3ff, 0x4, 0xff, 0x20, 0x6, 0x401, 0x20, 0x0, 0x1ff, 0x8000, 0xfffffffffffffffd, 0x400, 0x8, 0x100000000, 0x2, 0x8, 0xf32, 0x4, 0x6, 0x80}) clock_adjtime(0x2, &(0x7f0000000100)={0xd9, 0x9, 0x1, 0x2, 0x1f, 0x78, 0x4b1, 0x0, 0x401, 0x5, 0x8, 0x1, 0x101, 0x100000001, 0x7, 0x1fc, 0x9, 0x9, 0x0, 0x9, 0x8, 0x3, 0xff, 0x7, 0x73, 0x946c}) clock_adjtime(0x6, &(0x7f0000000200)={0x4, 0x1, 0x100, 0x6, 0x2, 0x6, 0x1, 0x1dd, 0x9, 0x1000000000000000, 0x0, 0x6, 0x1, 0x1, 0x9, 0x5, 0x3023, 0x2, 0x4, 0xfffffffffffffff9, 0x429, 0x3, 0x0, 0x9, 0xffffffffffffff05, 0x1000}) clock_adjtime(0x3, &(0x7f0000000300)={0x0, 0x8, 0x9, 0x9, 0x9, 0x9, 0x6, 0x9, 0x8, 0x1, 0xd0fc, 0x55, 0x2, 0x0, 0x1, 0x1f, 0x100000001, 0x8f44, 0x53, 0x0, 0x3, 0x140000000000, 0x9, 0x8000, 0x0, 0x10001}) r0 = syz_mount_image$iso9660(&(0x7f0000000400), &(0x7f0000000440)='./file0\x00', 0x4, 0x1, &(0x7f0000000480)=[{0xfffffffffffffffe, 0x0, 0x3}], 0x2014400, &(0x7f00000004c0)={[{@check_relaxed}, {@dmode}, {@check_relaxed}], [{@euid_lt={'euid<', 0xee01}}, {@euid_eq}, {@rootcontext={'rootcontext', 0x3d, 'staff_u'}}, {@obj_user={'obj_user', 0x3d, '#-_'}}, {@rootcontext={'rootcontext', 0x3d, 'staff_u'}}]}) faccessat(r0, &(0x7f0000000580)='./file0\x00', 0x88) clock_adjtime(0x4, &(0x7f00000005c0)={0x80000000, 0x100000000, 0xba, 0x80000000, 0x4, 0x20d4e190, 0x7, 0x400, 0x33, 0x7a, 0x1, 0x465d, 0x7f, 0x5, 0x3, 0x1, 0x0, 0x8, 0x7, 0x7ff, 0x1, 0x4, 0x3f, 0x7fff, 0x700b, 0x96}) r1 = accept$unix(0xffffffffffffffff, 0x0, &(0x7f00000006c0)) getsockname$unix(r1, &(0x7f0000000700), &(0x7f0000000780)=0x6e) clock_adjtime(0x3, &(0x7f00000007c0)={0x6, 0x6, 0x7, 0x8000, 0x7ff, 0x5c, 0x401, 0x2, 0x9, 0x4, 0x0, 0x61, 0x2, 0x9b71, 0x100000000, 0x7fffffff, 0x322, 0xc70d, 0x9, 0xd, 0x9, 0x0, 0x9, 0x1a1f00000000, 0xffffffffffffffff, 0x9}) clock_adjtime(0x6, &(0x7f00000008c0)={0x4, 0x9, 0x3, 0xfffffffffffffff7, 0xb31, 0x1, 0x1, 0x2, 0x538, 0x0, 0x401, 0x1, 0xdd, 0xfffffffffffffff7, 0xec54, 0x4, 0x100000001, 0x0, 0xa, 0x1, 0x7ff, 0xcd, 0xf2, 0x80, 0x7, 0x8000}) clock_adjtime(0x0, &(0x7f00000009c0)={0x8, 0xff, 0x81, 0x2, 0x100000001, 0x11, 0x5, 0x1, 0x1, 0x9, 0x1000, 0x8, 0xdf6c, 0x9, 0x8, 0x1004000000000000, 0x1ff, 0x3, 0x6, 0xf5, 0x80000, 0x1, 0xfffffffffffffd6d, 0x2, 0x6, 0xfa}) r2 = socket$unix(0x1, 0x5, 0x0) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f0000000ac0)={'wlan0\x00'}) mq_timedreceive(0xffffffffffffffff, &(0x7f0000000b00)=""/4096, 0x1000, 0x80, &(0x7f0000001b00)={0x0, 0x989680}) r3 = creat(&(0x7f0000001b40)='./file0\x00', 0x1) mknodat(r3, &(0x7f0000001b80)='./file1\x00', 0x4, 0x0) clock_adjtime(0xffffffff00000000, &(0x7f0000001bc0)={0xfff, 0x7fff, 0x0, 0x2, 0xfdc, 0x54, 0x8fa, 0x3f41, 0x0, 0x4, 0x4, 0x5, 0x101, 0x5, 0x4, 0x9, 0x9, 0x30e, 0x3f, 0x2, 0x7f, 0x7, 0x6, 0x4, 0x3ff, 0x100000000}) clock_adjtime(0x2, &(0x7f0000001cc0)={0x0, 0x6, 0x7, 0xe5, 0x5, 0x6, 0x10, 0x7, 0x281, 0x40, 0x1, 0x0, 0x1, 0x10001, 0x5, 0x100, 0x0, 0x4, 0xffffffffffffe001, 0xdf, 0x7f, 0x8000, 0x9, 0x400, 0xfffffffffffffe00, 0x3f}) [ 338.527527][T19656] CPU: 1 PID: 19656 Comm: syz-executor.4 Not tainted 5.16.0-syzkaller #0 [ 338.528619][T19647] EXT4-fs (loop0): inodes count not valid: 2592 vs 32 [ 338.535945][T19656] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 338.535958][T19656] Call Trace: [ 338.535964][T19656] [ 338.535992][T19656] dump_stack_lvl+0xd6/0x122 [ 338.536017][T19656] dump_stack+0x11/0x1b [ 338.536033][T19656] should_fail+0x23c/0x250 [ 338.557034][T19650] EXT4-fs warning (device loop1): ext4_enable_quotas:6363: Failed to enable quota tracking (type=0, err=-22). Please run e2fsck to fix. [ 338.559119][T19656] ? kobject_uevent_env+0x1a7/0xc40 [ 338.559148][T19656] __should_failslab+0x81/0x90 [ 338.572123][T19650] EXT4-fs (loop1): mount failed [ 338.572509][T19656] should_failslab+0x5/0x20 [ 338.590352][T19646] EXT4-fs error (device loop5): ext4_quota_enable:6323: comm syz-executor.5: Bad quota inode # 3 [ 338.591579][T19656] kmem_cache_alloc_trace+0x52/0x350 [ 338.596732][T19646] EXT4-fs warning (device loop5): ext4_enable_quotas:6363: Failed to enable quota tracking (type=0, err=-116). Please run e2fsck to fix. [ 338.601383][T19656] ? pwq_adjust_max_active+0x4c5/0x4e0 [ 338.601415][T19656] ? dev_uevent_filter+0x70/0x70 [ 338.601452][T19656] kobject_uevent_env+0x1a7/0xc40 [ 338.601476][T19656] ? preempt_count_add+0x4e/0x90 [ 338.606910][T19646] EXT4-fs (loop5): mount failed [ 338.616559][T19656] ? _raw_spin_unlock+0x2e/0x50 [ 338.616594][T19656] ? bd_prepare_to_claim+0x1ac/0x200 [ 338.616612][T19656] disk_force_media_change+0xe3/0x170 [ 338.616636][T19656] loop_configure+0x74d/0xf30 [ 338.624793][T19663] loop3: detected capacity change from 0 to 264192 [ 338.635869][T19656] lo_ioctl+0x583/0x1270 [ 338.635928][T19656] ? folio_mark_dirty+0x84/0xe0 [ 338.635949][T19656] ? unlock_page+0x37/0x50 [ 338.635968][T19656] ? __rcu_read_unlock+0x5c/0x290 [ 338.636066][T19656] ? blkdev_common_ioctl+0x438/0x1180 [ 338.643285][T19663] EXT4-fs (loop3): VFS: Can't find ext4 filesystem [ 338.646661][T19656] ? selinux_file_ioctl+0x522/0x590 [ 338.653136][T19664] SELinux: duplicate or incompatible mount options [ 338.656629][T19656] ? do_vfs_ioctl+0x819/0x14a0 [ 338.734904][T19656] ? lo_release+0x120/0x120 [ 338.739399][T19656] blkdev_ioctl+0x20e/0x440 [ 338.743918][T19656] ? blkdev_compat_ptr_ioctl+0x80/0x80 [ 338.749416][T19656] __se_sys_ioctl+0xcb/0x140 [ 338.754072][T19656] __x64_sys_ioctl+0x3f/0x50 [ 338.758673][T19656] do_syscall_64+0x44/0xd0 [ 338.763122][T19656] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 338.769044][T19656] RIP: 0033:0x7f6f94c22c57 [ 338.773572][T19656] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 04 54 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 338.793467][T19656] RSP: 002b:00007f6f93d98f28 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 338.801984][T19656] RAX: ffffffffffffffda RBX: 00007f6f94c6c9c8 RCX: 00007f6f94c22c57 [ 338.810070][T19656] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 338.818256][T19656] RBP: 0000000000000005 R08: 0000000000000000 R09: 00007f6f93d991d0 [ 338.826550][T19656] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 338.834511][T19656] R13: 0000000000000004 R14: 00000000200002a8 R15: 0000000000000007 [ 338.842604][T19656] [ 338.846854][T19656] loop4: detected capacity change from 0 to 264192 [ 338.860320][T19656] EXT4-fs error (device loop4): ext4_ext_check_inode:497: inode #3: comm syz-executor.4: pblk 0 bad header/extent: invalid extent entries - magic f30a, entries 1, max 4(4), depth 0(0) 17:07:51 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc01000a, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000003980)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d0f465001000005fd0f4655f00000000000001", 0x1b, 0x11100}], 0x0, &(0x7f00000000c0)) 17:07:51 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc01000a, 0xe, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000003980)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="80", 0x1, 0x11100}], 0x0, &(0x7f00000000c0)) 17:07:51 executing program 2: clock_adjtime(0x7, &(0x7f0000000000)={0x8000, 0x62, 0xff, 0x1, 0x3, 0x1ff, 0x3ff, 0x4, 0xff, 0x20, 0x6, 0x401, 0x20, 0x0, 0x1ff, 0x8000, 0xfffffffffffffffd, 0x400, 0x8, 0x100000000, 0x2, 0x8, 0xf32, 0x4, 0x6, 0x80}) clock_adjtime(0x2, &(0x7f0000000100)={0xd9, 0x9, 0x1, 0x2, 0x1f, 0x78, 0x4b1, 0x0, 0x401, 0x5, 0x8, 0x1, 0x101, 0x100000001, 0x7, 0x1fc, 0x9, 0x9, 0x0, 0x9, 0x8, 0x3, 0xff, 0x7, 0x73, 0x946c}) clock_adjtime(0x6, &(0x7f0000000200)={0x4, 0x1, 0x100, 0x6, 0x2, 0x6, 0x1, 0x1dd, 0x9, 0x1000000000000000, 0x0, 0x6, 0x1, 0x1, 0x9, 0x5, 0x3023, 0x2, 0x4, 0xfffffffffffffff9, 0x429, 0x3, 0x0, 0x9, 0xffffffffffffff05, 0x1000}) clock_adjtime(0x3, &(0x7f0000000300)={0x0, 0x8, 0x9, 0x9, 0x9, 0x9, 0x6, 0x9, 0x8, 0x1, 0xd0fc, 0x55, 0x2, 0x0, 0x1, 0x1f, 0x100000001, 0x8f44, 0x53, 0x0, 0x3, 0x140000000000, 0x9, 0x8000, 0x0, 0x10001}) r0 = syz_mount_image$iso9660(&(0x7f0000000400), &(0x7f0000000440)='./file0\x00', 0x4, 0x1, &(0x7f0000000480)=[{0xfffffffffffffffe, 0x0, 0x3}], 0x2014400, &(0x7f00000004c0)={[{@check_relaxed}, {@dmode}, {@check_relaxed}], [{@euid_lt={'euid<', 0xee01}}, {@euid_eq}, {@rootcontext={'rootcontext', 0x3d, 'staff_u'}}, {@obj_user={'obj_user', 0x3d, '#-_'}}, {@rootcontext={'rootcontext', 0x3d, 'staff_u'}}]}) faccessat(r0, &(0x7f0000000580)='./file0\x00', 0x88) clock_adjtime(0x4, &(0x7f00000005c0)={0x80000000, 0x100000000, 0xba, 0x80000000, 0x4, 0x20d4e190, 0x7, 0x400, 0x33, 0x7a, 0x1, 0x465d, 0x7f, 0x5, 0x3, 0x1, 0x0, 0x8, 0x7, 0x7ff, 0x1, 0x4, 0x3f, 0x7fff, 0x700b, 0x96}) r1 = accept$unix(0xffffffffffffffff, 0x0, &(0x7f00000006c0)) getsockname$unix(r1, &(0x7f0000000700), &(0x7f0000000780)=0x6e) clock_adjtime(0x3, &(0x7f00000007c0)={0x6, 0x6, 0x7, 0x8000, 0x7ff, 0x5c, 0x401, 0x2, 0x9, 0x4, 0x0, 0x61, 0x2, 0x9b71, 0x100000000, 0x7fffffff, 0x322, 0xc70d, 0x9, 0xd, 0x9, 0x0, 0x9, 0x1a1f00000000, 0xffffffffffffffff, 0x9}) clock_adjtime(0x6, &(0x7f00000008c0)={0x4, 0x9, 0x3, 0xfffffffffffffff7, 0xb31, 0x1, 0x1, 0x2, 0x538, 0x0, 0x401, 0x1, 0xdd, 0xfffffffffffffff7, 0xec54, 0x4, 0x100000001, 0x0, 0xa, 0x1, 0x7ff, 0xcd, 0xf2, 0x80, 0x7, 0x8000}) clock_adjtime(0x0, &(0x7f00000009c0)={0x8, 0xff, 0x81, 0x2, 0x100000001, 0x11, 0x5, 0x1, 0x1, 0x9, 0x1000, 0x8, 0xdf6c, 0x9, 0x8, 0x1004000000000000, 0x1ff, 0x3, 0x6, 0xf5, 0x80000, 0x1, 0xfffffffffffffd6d, 0x2, 0x6, 0xfa}) r2 = socket$unix(0x1, 0x5, 0x0) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f0000000ac0)={'wlan0\x00'}) mq_timedreceive(0xffffffffffffffff, &(0x7f0000000b00)=""/4096, 0x1000, 0x80, &(0x7f0000001b00)={0x0, 0x989680}) r3 = creat(&(0x7f0000001b40)='./file0\x00', 0x1) mknodat(r3, &(0x7f0000001b80)='./file1\x00', 0x4, 0x0) clock_adjtime(0x0, &(0x7f0000001bc0)={0xfff, 0x7fff, 0x2, 0x2, 0xfdc, 0x54, 0x8fa, 0x3f41, 0x0, 0x4, 0x4, 0x5, 0x101, 0x5, 0x4, 0x9, 0x9, 0x30e, 0x3f, 0x2, 0x7f, 0x7, 0x6, 0x4, 0x3ff, 0x100000000}) clock_adjtime(0x2, &(0x7f0000001cc0)={0x0, 0x6, 0x7, 0xe5, 0x5, 0x6, 0x10, 0x7, 0x281, 0x40, 0x1, 0x0, 0x1, 0x10001, 0x5, 0x100, 0x0, 0x4, 0xffffffffffffe001, 0xdf, 0x7f, 0x8000, 0x9, 0x400, 0xfffffffffffffe00, 0x3f}) 17:07:51 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc01000a, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f465", 0x33, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000003980)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d0f465001000005fd0f4655f00000000000001000c000000100008", 0x23, 0x11100}], 0x0, &(0x7f00000000c0)) [ 338.879265][T19656] EXT4-fs error (device loop4): ext4_quota_enable:6323: comm syz-executor.4: Bad quota inode # 3 [ 338.891562][T19656] EXT4-fs warning (device loop4): ext4_enable_quotas:6363: Failed to enable quota tracking (type=0, err=-117). Please run e2fsck to fix. [ 338.906273][T19656] EXT4-fs (loop4): mount failed 17:07:51 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc01000a, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="200b00008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000003980)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d9", 0x4, 0x6800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d0f465001000005fd0f4655f00000000000001000c00000010000800000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}], 0x0, &(0x7f00000000c0)) 17:07:51 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc01000a, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000003980)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d0f465001000005fd0f4655f00000000000001000c00000010000800000000000af3010004", 0x2d, 0x11100}], 0x0, &(0x7f00000000c0)) (fail_nth: 30) [ 338.944461][T19671] SELinux: duplicate or incompatible mount options [ 338.955859][T19674] loop1: detected capacity change from 0 to 264192 [ 338.968548][T19676] loop5: detected capacity change from 0 to 264192 [ 338.975516][T19678] loop0: detected capacity change from 0 to 264192 [ 338.976259][T19679] loop3: detected capacity change from 0 to 264192 [ 338.986610][T19681] FAULT_INJECTION: forcing a failure. [ 338.986610][T19681] name failslab, interval 1, probability 0, space 0, times 0 [ 338.991236][T19679] EXT4-fs (loop3): VFS: Can't find ext4 filesystem [ 339.001178][T19681] CPU: 1 PID: 19681 Comm: syz-executor.4 Not tainted 5.16.0-syzkaller #0 [ 339.016078][T19681] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 339.026123][T19681] Call Trace: [ 339.029398][T19681] [ 339.032322][T19681] dump_stack_lvl+0xd6/0x122 [ 339.036907][T19681] dump_stack+0x11/0x1b [ 339.041172][T19681] should_fail+0x23c/0x250 [ 339.045570][T19681] ? kzalloc+0x1d/0x30 [ 339.049645][T19681] __should_failslab+0x81/0x90 [ 339.054406][T19681] should_failslab+0x5/0x20 [ 339.058912][T19681] __kmalloc+0x6f/0x370 [ 339.063120][T19681] kzalloc+0x1d/0x30 [ 339.067005][T19681] kobject_get_path+0x7c/0x110 [ 339.071850][T19681] kobject_uevent_env+0x1be/0xc40 [ 339.076863][T19681] ? preempt_count_add+0x4e/0x90 [ 339.081829][T19681] ? _raw_spin_unlock+0x2e/0x50 [ 339.086665][T19681] ? bd_prepare_to_claim+0x1ac/0x200 [ 339.091935][T19681] disk_force_media_change+0xe3/0x170 [ 339.097446][T19681] loop_configure+0x74d/0xf30 [ 339.102142][T19681] lo_ioctl+0x583/0x1270 [ 339.106402][T19681] ? folio_mark_dirty+0x84/0xe0 [ 339.111269][T19681] ? unlock_page+0x37/0x50 [ 339.115839][T19681] ? __rcu_read_unlock+0x5c/0x290 [ 339.120942][T19681] ? blkdev_common_ioctl+0x438/0x1180 [ 339.126309][T19681] ? selinux_file_ioctl+0x522/0x590 [ 339.131525][T19681] ? do_vfs_ioctl+0x819/0x14a0 [ 339.136275][T19681] ? lo_release+0x120/0x120 [ 339.140965][T19681] blkdev_ioctl+0x20e/0x440 [ 339.145469][T19681] ? blkdev_compat_ptr_ioctl+0x80/0x80 [ 339.150920][T19681] __se_sys_ioctl+0xcb/0x140 [ 339.155579][T19681] __x64_sys_ioctl+0x3f/0x50 [ 339.160172][T19681] do_syscall_64+0x44/0xd0 [ 339.164619][T19681] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 339.170640][T19681] RIP: 0033:0x7f6f94c22c57 [ 339.175128][T19681] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 04 54 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 339.194808][T19681] RSP: 002b:00007f6f93d98f28 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 339.203207][T19681] RAX: ffffffffffffffda RBX: 00007f6f94c6c9c8 RCX: 00007f6f94c22c57 [ 339.211337][T19681] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 339.219301][T19681] RBP: 0000000000000005 R08: 0000000000000000 R09: 00007f6f93d991d0 [ 339.227258][T19681] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 339.235216][T19681] R13: 0000000000000004 R14: 00000000200002a8 R15: 0000000000000007 17:07:55 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc01000a, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000003980)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d0f465001000005fd0f4655f00000000000001", 0x1b, 0x11100}], 0x0, &(0x7f00000000c0)) [ 339.243174][T19681] [ 339.249399][T19674] EXT4-fs (loop1): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 339.255181][T19681] loop4: detected capacity change from 0 to 264192 [ 339.259223][T19674] EXT4-fs (loop1): group descriptors corrupted! [ 339.274826][T19678] EXT4-fs (loop0): inodes count not valid: 2848 vs 32 17:07:55 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc01000a, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f465", 0x33, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000003980)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d0f465001000005fd0f4655f00000000000001000c000000100008", 0x23, 0x11100}], 0x0, &(0x7f00000000c0)) [ 339.303115][T19681] EXT4-fs error (device loop4): ext4_ext_check_inode:497: inode #3: comm syz-executor.4: pblk 0 bad header/extent: invalid extent entries - magic f30a, entries 1, max 4(4), depth 0(0) [ 339.318226][T19691] loop3: detected capacity change from 0 to 264192 [ 339.328160][T19681] EXT4-fs error (device loop4): ext4_quota_enable:6323: comm syz-executor.4: Bad quota inode # 3 17:07:55 executing program 2: clock_adjtime(0x7, &(0x7f0000000000)={0x8000, 0x62, 0xff, 0x1, 0x3, 0x1ff, 0x3ff, 0x4, 0xff, 0x20, 0x6, 0x401, 0x20, 0x0, 0x1ff, 0x8000, 0xfffffffffffffffd, 0x400, 0x8, 0x100000000, 0x2, 0x8, 0xf32, 0x4, 0x6, 0x80}) clock_adjtime(0x2, &(0x7f0000000100)={0xd9, 0x9, 0x1, 0x2, 0x1f, 0x78, 0x4b1, 0x0, 0x401, 0x5, 0x8, 0x1, 0x101, 0x100000001, 0x7, 0x1fc, 0x9, 0x9, 0x0, 0x9, 0x8, 0x3, 0xff, 0x7, 0x73, 0x946c}) clock_adjtime(0x6, &(0x7f0000000200)={0x4, 0x1, 0x100, 0x6, 0x2, 0x6, 0x1, 0x1dd, 0x9, 0x1000000000000000, 0x0, 0x6, 0x1, 0x1, 0x9, 0x5, 0x3023, 0x2, 0x4, 0xfffffffffffffff9, 0x429, 0x3, 0x0, 0x9, 0xffffffffffffff05, 0x1000}) clock_adjtime(0x3, &(0x7f0000000300)={0x0, 0x8, 0x9, 0x9, 0x9, 0x9, 0x6, 0x9, 0x8, 0x1, 0xd0fc, 0x55, 0x2, 0x0, 0x1, 0x1f, 0x100000001, 0x8f44, 0x53, 0x0, 0x3, 0x140000000000, 0x9, 0x8000, 0x0, 0x10001}) r0 = syz_mount_image$iso9660(&(0x7f0000000400), &(0x7f0000000440)='./file0\x00', 0x4, 0x1, &(0x7f0000000480)=[{0xfffffffffffffffe, 0x0, 0x3}], 0x2014400, &(0x7f00000004c0)={[{@check_relaxed}, {@dmode}, {@check_relaxed}], [{@euid_lt={'euid<', 0xee01}}, {@euid_eq}, {@rootcontext={'rootcontext', 0x3d, 'staff_u'}}, {@obj_user={'obj_user', 0x3d, '#-_'}}, {@rootcontext={'rootcontext', 0x3d, 'staff_u'}}]}) faccessat(r0, &(0x7f0000000580)='./file0\x00', 0x88) clock_adjtime(0x4, &(0x7f00000005c0)={0x80000000, 0x100000000, 0xba, 0x80000000, 0x4, 0x20d4e190, 0x7, 0x400, 0x33, 0x7a, 0x1, 0x465d, 0x7f, 0x5, 0x3, 0x1, 0x0, 0x8, 0x7, 0x7ff, 0x1, 0x4, 0x3f, 0x7fff, 0x700b, 0x96}) r1 = accept$unix(0xffffffffffffffff, 0x0, &(0x7f00000006c0)) getsockname$unix(r1, &(0x7f0000000700), &(0x7f0000000780)=0x6e) clock_adjtime(0x3, &(0x7f00000007c0)={0x6, 0x6, 0x7, 0x8000, 0x7ff, 0x5c, 0x401, 0x2, 0x9, 0x4, 0x0, 0x61, 0x2, 0x9b71, 0x100000000, 0x7fffffff, 0x322, 0xc70d, 0x9, 0xd, 0x9, 0x0, 0x9, 0x1a1f00000000, 0xffffffffffffffff, 0x9}) clock_adjtime(0x6, &(0x7f00000008c0)={0x4, 0x9, 0x3, 0xfffffffffffffff7, 0xb31, 0x1, 0x1, 0x2, 0x538, 0x0, 0x401, 0x1, 0xdd, 0xfffffffffffffff7, 0xec54, 0x4, 0x100000001, 0x0, 0xa, 0x1, 0x7ff, 0xcd, 0xf2, 0x80, 0x7, 0x8000}) clock_adjtime(0x0, &(0x7f00000009c0)={0x8, 0xff, 0x81, 0x2, 0x100000001, 0x11, 0x5, 0x1, 0x1, 0x9, 0x1000, 0x8, 0xdf6c, 0x9, 0x8, 0x1004000000000000, 0x1ff, 0x3, 0x6, 0xf5, 0x80000, 0x1, 0xfffffffffffffd6d, 0x2, 0x6, 0xfa}) r2 = socket$unix(0x1, 0x5, 0x0) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f0000000ac0)={'wlan0\x00'}) mq_timedreceive(0xffffffffffffffff, &(0x7f0000000b00)=""/4096, 0x1000, 0x80, &(0x7f0000001b00)={0x0, 0x989680}) r3 = creat(&(0x7f0000001b40)='./file0\x00', 0x1) mknodat(r3, &(0x7f0000001b80)='./file1\x00', 0x4, 0x0) clock_adjtime(0x0, &(0x7f0000001bc0)={0xfff, 0x7fff, 0x3, 0x2, 0xfdc, 0x54, 0x8fa, 0x3f41, 0x0, 0x4, 0x4, 0x5, 0x101, 0x5, 0x4, 0x9, 0x9, 0x30e, 0x3f, 0x2, 0x7f, 0x7, 0x6, 0x4, 0x3ff, 0x100000000}) clock_adjtime(0x2, &(0x7f0000001cc0)={0x0, 0x6, 0x7, 0xe5, 0x5, 0x6, 0x10, 0x7, 0x281, 0x40, 0x1, 0x0, 0x1, 0x10001, 0x5, 0x100, 0x0, 0x4, 0xffffffffffffe001, 0xdf, 0x7f, 0x8000, 0x9, 0x400, 0xfffffffffffffe00, 0x3f}) [ 339.340446][T19681] EXT4-fs warning (device loop4): ext4_enable_quotas:6363: Failed to enable quota tracking (type=0, err=-117). Please run e2fsck to fix. [ 339.340501][T19691] EXT4-fs (loop3): VFS: Can't find ext4 filesystem [ 339.355177][T19676] EXT4-fs error (device loop5): ext4_quota_enable:6323: comm syz-executor.5: Bad quota inode # 3 [ 339.376537][T19681] EXT4-fs (loop4): mount failed [ 339.379864][T19676] EXT4-fs warning (device loop5): ext4_enable_quotas:6363: Failed to enable quota tracking (type=0, err=-116). Please run e2fsck to fix. [ 339.386264][T19694] SELinux: duplicate or incompatible mount options 17:07:55 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc01000a, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="200c00008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000003980)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d9", 0x4, 0x6800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d0f465001000005fd0f4655f00000000000001000c00000010000800000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}], 0x0, &(0x7f00000000c0)) [ 339.396998][T19676] EXT4-fs (loop5): mount failed [ 339.419182][T19696] loop0: detected capacity change from 0 to 264192 [ 339.426442][T19696] EXT4-fs (loop0): inodes count not valid: 3104 vs 32 [ 339.436415][T19692] loop1: detected capacity change from 0 to 264192 [ 339.444138][T19692] EXT4-fs (loop1): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock 17:07:55 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc01000a, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000003980)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d0f465001000005fd0f4655f00000000000001000c00000010000800000000000af3010004", 0x2d, 0x11100}], 0x0, &(0x7f00000000c0)) (fail_nth: 31) 17:07:55 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc01000a, 0xf, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000003980)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="80", 0x1, 0x11100}], 0x0, &(0x7f00000000c0)) 17:07:55 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc01000a, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="200d00008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000003980)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d9", 0x4, 0x6800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d0f465001000005fd0f4655f00000000000001000c00000010000800000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}], 0x0, &(0x7f00000000c0)) 17:07:55 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc01000a, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001", 0x4d, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000003980)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d0f465001000005fd0f4655f00000000000001000c000000100008", 0x23, 0x11100}], 0x0, &(0x7f00000000c0)) 17:07:59 executing program 2: clock_adjtime(0x7, &(0x7f0000000000)={0x8000, 0x62, 0xff, 0x1, 0x3, 0x1ff, 0x3ff, 0x4, 0xff, 0x20, 0x6, 0x401, 0x20, 0x0, 0x1ff, 0x8000, 0xfffffffffffffffd, 0x400, 0x8, 0x100000000, 0x2, 0x8, 0xf32, 0x4, 0x6, 0x80}) clock_adjtime(0x2, &(0x7f0000000100)={0xd9, 0x9, 0x1, 0x2, 0x1f, 0x78, 0x4b1, 0x0, 0x401, 0x5, 0x8, 0x1, 0x101, 0x100000001, 0x7, 0x1fc, 0x9, 0x9, 0x0, 0x9, 0x8, 0x3, 0xff, 0x7, 0x73, 0x946c}) clock_adjtime(0x6, &(0x7f0000000200)={0x4, 0x1, 0x100, 0x6, 0x2, 0x6, 0x1, 0x1dd, 0x9, 0x1000000000000000, 0x0, 0x6, 0x1, 0x1, 0x9, 0x5, 0x3023, 0x2, 0x4, 0xfffffffffffffff9, 0x429, 0x3, 0x0, 0x9, 0xffffffffffffff05, 0x1000}) clock_adjtime(0x3, &(0x7f0000000300)={0x0, 0x8, 0x9, 0x9, 0x9, 0x9, 0x6, 0x9, 0x8, 0x1, 0xd0fc, 0x55, 0x2, 0x0, 0x1, 0x1f, 0x100000001, 0x8f44, 0x53, 0x0, 0x3, 0x140000000000, 0x9, 0x8000, 0x0, 0x10001}) r0 = syz_mount_image$iso9660(&(0x7f0000000400), &(0x7f0000000440)='./file0\x00', 0x4, 0x1, &(0x7f0000000480)=[{0xfffffffffffffffe, 0x0, 0x3}], 0x2014400, &(0x7f00000004c0)={[{@check_relaxed}, {@dmode}, {@check_relaxed}], [{@euid_lt={'euid<', 0xee01}}, {@euid_eq}, {@rootcontext={'rootcontext', 0x3d, 'staff_u'}}, {@obj_user={'obj_user', 0x3d, '#-_'}}, {@rootcontext={'rootcontext', 0x3d, 'staff_u'}}]}) faccessat(r0, &(0x7f0000000580)='./file0\x00', 0x88) clock_adjtime(0x4, &(0x7f00000005c0)={0x80000000, 0x100000000, 0xba, 0x80000000, 0x4, 0x20d4e190, 0x7, 0x400, 0x33, 0x7a, 0x1, 0x465d, 0x7f, 0x5, 0x3, 0x1, 0x0, 0x8, 0x7, 0x7ff, 0x1, 0x4, 0x3f, 0x7fff, 0x700b, 0x96}) r1 = accept$unix(0xffffffffffffffff, 0x0, &(0x7f00000006c0)) getsockname$unix(r1, &(0x7f0000000700), &(0x7f0000000780)=0x6e) clock_adjtime(0x3, &(0x7f00000007c0)={0x6, 0x6, 0x7, 0x8000, 0x7ff, 0x5c, 0x401, 0x2, 0x9, 0x4, 0x0, 0x61, 0x2, 0x9b71, 0x100000000, 0x7fffffff, 0x322, 0xc70d, 0x9, 0xd, 0x9, 0x0, 0x9, 0x1a1f00000000, 0xffffffffffffffff, 0x9}) clock_adjtime(0x6, &(0x7f00000008c0)={0x4, 0x9, 0x3, 0xfffffffffffffff7, 0xb31, 0x1, 0x1, 0x2, 0x538, 0x0, 0x401, 0x1, 0xdd, 0xfffffffffffffff7, 0xec54, 0x4, 0x100000001, 0x0, 0xa, 0x1, 0x7ff, 0xcd, 0xf2, 0x80, 0x7, 0x8000}) clock_adjtime(0x0, &(0x7f00000009c0)={0x8, 0xff, 0x81, 0x2, 0x100000001, 0x11, 0x5, 0x1, 0x1, 0x9, 0x1000, 0x8, 0xdf6c, 0x9, 0x8, 0x1004000000000000, 0x1ff, 0x3, 0x6, 0xf5, 0x80000, 0x1, 0xfffffffffffffd6d, 0x2, 0x6, 0xfa}) r2 = socket$unix(0x1, 0x5, 0x0) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f0000000ac0)={'wlan0\x00'}) mq_timedreceive(0xffffffffffffffff, &(0x7f0000000b00)=""/4096, 0x1000, 0x80, &(0x7f0000001b00)={0x0, 0x989680}) r3 = creat(&(0x7f0000001b40)='./file0\x00', 0x1) mknodat(r3, &(0x7f0000001b80)='./file1\x00', 0x4, 0x0) clock_adjtime(0x0, &(0x7f0000001bc0)={0xfff, 0x7fff, 0x7, 0x2, 0xfdc, 0x54, 0x8fa, 0x3f41, 0x0, 0x4, 0x4, 0x5, 0x101, 0x5, 0x4, 0x9, 0x9, 0x30e, 0x3f, 0x2, 0x7f, 0x7, 0x6, 0x4, 0x3ff, 0x100000000}) clock_adjtime(0x2, &(0x7f0000001cc0)={0x0, 0x6, 0x7, 0xe5, 0x5, 0x6, 0x10, 0x7, 0x281, 0x40, 0x1, 0x0, 0x1, 0x10001, 0x5, 0x100, 0x0, 0x4, 0xffffffffffffe001, 0xdf, 0x7f, 0x8000, 0x9, 0x400, 0xfffffffffffffe00, 0x3f}) [ 339.454035][T19692] EXT4-fs (loop1): group descriptors corrupted! [ 339.496746][T19704] loop5: detected capacity change from 0 to 264192 [ 339.502211][T19705] loop0: detected capacity change from 0 to 264192 [ 339.504586][T19703] loop3: detected capacity change from 0 to 264192 [ 339.514407][T19708] SELinux: duplicate or incompatible mount options [ 339.516958][T19706] FAULT_INJECTION: forcing a failure. [ 339.516958][T19706] name failslab, interval 1, probability 0, space 0, times 0 [ 339.535839][T19706] CPU: 0 PID: 19706 Comm: syz-executor.4 Not tainted 5.16.0-syzkaller #0 [ 339.544312][T19706] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 339.554354][T19706] Call Trace: [ 339.557626][T19706] [ 339.560539][T19706] dump_stack_lvl+0xd6/0x122 [ 339.565114][T19706] dump_stack+0x11/0x1b [ 339.569336][T19706] should_fail+0x23c/0x250 [ 339.573760][T19706] __should_failslab+0x81/0x90 [ 339.578507][T19706] should_failslab+0x5/0x20 [ 339.582995][T19706] kmem_cache_alloc_node+0x61/0x2d0 [ 339.588284][T19706] ? __alloc_skb+0xf0/0x450 [ 339.592886][T19706] __alloc_skb+0xf0/0x450 [ 339.597510][T19706] alloc_uevent_skb+0x5b/0x120 [ 339.602439][T19706] kobject_uevent_env+0x863/0xc40 [ 339.607566][T19706] ? preempt_count_add+0x4e/0x90 [ 339.612498][T19706] ? _raw_spin_unlock+0x2e/0x50 [ 339.617480][T19706] ? bd_prepare_to_claim+0x1ac/0x200 [ 339.622794][T19706] disk_force_media_change+0xe3/0x170 [ 339.628183][T19706] loop_configure+0x74d/0xf30 [ 339.632881][T19706] lo_ioctl+0x583/0x1270 [ 339.637133][T19706] ? folio_mark_dirty+0x84/0xe0 [ 339.642008][T19706] ? unlock_page+0x37/0x50 [ 339.646495][T19706] ? __rcu_read_unlock+0x5c/0x290 [ 339.651521][T19706] ? blkdev_common_ioctl+0x438/0x1180 [ 339.656875][T19706] ? selinux_file_ioctl+0x522/0x590 [ 339.662173][T19706] ? do_vfs_ioctl+0x819/0x14a0 [ 339.667005][T19706] ? lo_release+0x120/0x120 [ 339.671574][T19706] blkdev_ioctl+0x20e/0x440 [ 339.676105][T19706] ? blkdev_compat_ptr_ioctl+0x80/0x80 [ 339.681632][T19706] __se_sys_ioctl+0xcb/0x140 [ 339.686285][T19706] __x64_sys_ioctl+0x3f/0x50 [ 339.690880][T19706] do_syscall_64+0x44/0xd0 [ 339.695282][T19706] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 339.701176][T19706] RIP: 0033:0x7f6f94c22c57 [ 339.705602][T19706] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 04 54 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 339.725222][T19706] RSP: 002b:00007f6f93d98f28 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 339.733627][T19706] RAX: ffffffffffffffda RBX: 00007f6f94c6c9c8 RCX: 00007f6f94c22c57 [ 339.741586][T19706] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 339.749723][T19706] RBP: 0000000000000005 R08: 0000000000000000 R09: 00007f6f93d991d0 [ 339.757680][T19706] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 339.765736][T19706] R13: 0000000000000004 R14: 00000000200002a8 R15: 0000000000000007 [ 339.773806][T19706] [ 339.777595][T19706] loop4: detected capacity change from 0 to 264192 [ 339.786198][T19705] EXT4-fs (loop0): inodes count not valid: 3360 vs 32 17:08:04 executing program 2: clock_adjtime(0x7, &(0x7f0000000000)={0x8000, 0x62, 0xff, 0x1, 0x3, 0x1ff, 0x3ff, 0x4, 0xff, 0x20, 0x6, 0x401, 0x20, 0x0, 0x1ff, 0x8000, 0xfffffffffffffffd, 0x400, 0x8, 0x100000000, 0x2, 0x8, 0xf32, 0x4, 0x6, 0x80}) clock_adjtime(0x2, &(0x7f0000000100)={0xd9, 0x9, 0x1, 0x2, 0x1f, 0x78, 0x4b1, 0x0, 0x401, 0x5, 0x8, 0x1, 0x101, 0x100000001, 0x7, 0x1fc, 0x9, 0x9, 0x0, 0x9, 0x8, 0x3, 0xff, 0x7, 0x73, 0x946c}) clock_adjtime(0x6, &(0x7f0000000200)={0x4, 0x1, 0x100, 0x6, 0x2, 0x6, 0x1, 0x1dd, 0x9, 0x1000000000000000, 0x0, 0x6, 0x1, 0x1, 0x9, 0x5, 0x3023, 0x2, 0x4, 0xfffffffffffffff9, 0x429, 0x3, 0x0, 0x9, 0xffffffffffffff05, 0x1000}) clock_adjtime(0x3, &(0x7f0000000300)={0x0, 0x8, 0x9, 0x9, 0x9, 0x9, 0x6, 0x9, 0x8, 0x1, 0xd0fc, 0x55, 0x2, 0x0, 0x1, 0x1f, 0x100000001, 0x8f44, 0x53, 0x0, 0x3, 0x140000000000, 0x9, 0x8000, 0x0, 0x10001}) r0 = syz_mount_image$iso9660(&(0x7f0000000400), &(0x7f0000000440)='./file0\x00', 0x4, 0x1, &(0x7f0000000480)=[{0xfffffffffffffffe, 0x0, 0x3}], 0x2014400, &(0x7f00000004c0)={[{@check_relaxed}, {@dmode}, {@check_relaxed}], [{@euid_lt={'euid<', 0xee01}}, {@euid_eq}, {@rootcontext={'rootcontext', 0x3d, 'staff_u'}}, {@obj_user={'obj_user', 0x3d, '#-_'}}, {@rootcontext={'rootcontext', 0x3d, 'staff_u'}}]}) faccessat(r0, &(0x7f0000000580)='./file0\x00', 0x88) clock_adjtime(0x4, &(0x7f00000005c0)={0x80000000, 0x100000000, 0xba, 0x80000000, 0x4, 0x20d4e190, 0x7, 0x400, 0x33, 0x7a, 0x1, 0x465d, 0x7f, 0x5, 0x3, 0x1, 0x0, 0x8, 0x7, 0x7ff, 0x1, 0x4, 0x3f, 0x7fff, 0x700b, 0x96}) r1 = accept$unix(0xffffffffffffffff, 0x0, &(0x7f00000006c0)) getsockname$unix(r1, &(0x7f0000000700), &(0x7f0000000780)=0x6e) clock_adjtime(0x3, &(0x7f00000007c0)={0x6, 0x6, 0x7, 0x8000, 0x7ff, 0x5c, 0x401, 0x2, 0x9, 0x4, 0x0, 0x61, 0x2, 0x9b71, 0x100000000, 0x7fffffff, 0x322, 0xc70d, 0x9, 0xd, 0x9, 0x0, 0x9, 0x1a1f00000000, 0xffffffffffffffff, 0x9}) clock_adjtime(0x6, &(0x7f00000008c0)={0x4, 0x9, 0x3, 0xfffffffffffffff7, 0xb31, 0x1, 0x1, 0x2, 0x538, 0x0, 0x401, 0x1, 0xdd, 0xfffffffffffffff7, 0xec54, 0x4, 0x100000001, 0x0, 0xa, 0x1, 0x7ff, 0xcd, 0xf2, 0x80, 0x7, 0x8000}) clock_adjtime(0x0, &(0x7f00000009c0)={0x8, 0xff, 0x81, 0x2, 0x100000001, 0x11, 0x5, 0x1, 0x1, 0x9, 0x1000, 0x8, 0xdf6c, 0x9, 0x8, 0x1004000000000000, 0x1ff, 0x3, 0x6, 0xf5, 0x80000, 0x1, 0xfffffffffffffd6d, 0x2, 0x6, 0xfa}) r2 = socket$unix(0x1, 0x5, 0x0) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f0000000ac0)={'wlan0\x00'}) mq_timedreceive(0xffffffffffffffff, &(0x7f0000000b00)=""/4096, 0x1000, 0x80, &(0x7f0000001b00)={0x0, 0x989680}) r3 = creat(&(0x7f0000001b40)='./file0\x00', 0x1) mknodat(r3, &(0x7f0000001b80)='./file1\x00', 0x4, 0x0) clock_adjtime(0x0, &(0x7f0000001bc0)={0xfff, 0x7fff, 0x8, 0x2, 0xfdc, 0x54, 0x8fa, 0x3f41, 0x0, 0x4, 0x4, 0x5, 0x101, 0x5, 0x4, 0x9, 0x9, 0x30e, 0x3f, 0x2, 0x7f, 0x7, 0x6, 0x4, 0x3ff, 0x100000000}) clock_adjtime(0x2, &(0x7f0000001cc0)={0x0, 0x6, 0x7, 0xe5, 0x5, 0x6, 0x10, 0x7, 0x281, 0x40, 0x1, 0x0, 0x1, 0x10001, 0x5, 0x100, 0x0, 0x4, 0xffffffffffffe001, 0xdf, 0x7f, 0x8000, 0x9, 0x400, 0xfffffffffffffe00, 0x3f}) 17:08:04 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc01000a, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000003980)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d0f465001000005fd0f4655f00000000000001", 0x1b, 0x11100}], 0x0, &(0x7f00000000c0)) [ 339.793051][T19703] EXT4-fs (loop3): invalid first ino: 0 [ 339.805938][T19706] EXT4-fs error (device loop4): ext4_ext_check_inode:497: inode #3: comm syz-executor.4: pblk 0 bad header/extent: invalid extent entries - magic f30a, entries 1, max 4(4), depth 0(0) [ 339.821457][T19716] SELinux: duplicate or incompatible mount options [ 339.827993][T19706] EXT4-fs error (device loop4): ext4_quota_enable:6323: comm syz-executor.4: Bad quota inode # 3 [ 339.832696][T19718] loop1: detected capacity change from 0 to 264192 [ 339.847949][T19706] EXT4-fs warning (device loop4): ext4_enable_quotas:6363: Failed to enable quota tracking (type=0, err=-117). Please run e2fsck to fix. [ 339.850786][T19718] EXT4-fs warning (device loop1): read_mmp_block:107: Error -117 while reading MMP block 12 [ 339.876304][T19704] EXT4-fs error (device loop5): ext4_quota_enable:6323: comm syz-executor.5: Bad quota inode # 3 [ 339.884614][T19706] EXT4-fs (loop4): mount failed 17:08:04 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc01000a, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="200f00008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000003980)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d9", 0x4, 0x6800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d0f465001000005fd0f4655f00000000000001000c00000010000800000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}], 0x0, &(0x7f00000000c0)) 17:08:04 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc01000a, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001", 0x4d, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000003980)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d0f465001000005fd0f4655f00000000000001000c000000100008", 0x23, 0x11100}], 0x0, &(0x7f00000000c0)) [ 339.892470][T19704] EXT4-fs warning (device loop5): ext4_enable_quotas:6363: Failed to enable quota tracking (type=0, err=-116). Please run e2fsck to fix. [ 339.917462][T19723] loop3: detected capacity change from 0 to 264192 [ 339.917979][T19725] loop0: detected capacity change from 0 to 264192 [ 339.935468][T19704] EXT4-fs (loop5): mount failed [ 339.939212][T19723] EXT4-fs (loop3): invalid first ino: 0 17:08:08 executing program 2: clock_adjtime(0x7, &(0x7f0000000000)={0x8000, 0x62, 0xff, 0x1, 0x3, 0x1ff, 0x3ff, 0x4, 0xff, 0x20, 0x6, 0x401, 0x20, 0x0, 0x1ff, 0x8000, 0xfffffffffffffffd, 0x400, 0x8, 0x100000000, 0x2, 0x8, 0xf32, 0x4, 0x6, 0x80}) clock_adjtime(0x2, &(0x7f0000000100)={0xd9, 0x9, 0x1, 0x2, 0x1f, 0x78, 0x4b1, 0x0, 0x401, 0x5, 0x8, 0x1, 0x101, 0x100000001, 0x7, 0x1fc, 0x9, 0x9, 0x0, 0x9, 0x8, 0x3, 0xff, 0x7, 0x73, 0x946c}) clock_adjtime(0x6, &(0x7f0000000200)={0x4, 0x1, 0x100, 0x6, 0x2, 0x6, 0x1, 0x1dd, 0x9, 0x1000000000000000, 0x0, 0x6, 0x1, 0x1, 0x9, 0x5, 0x3023, 0x2, 0x4, 0xfffffffffffffff9, 0x429, 0x3, 0x0, 0x9, 0xffffffffffffff05, 0x1000}) clock_adjtime(0x3, &(0x7f0000000300)={0x0, 0x8, 0x9, 0x9, 0x9, 0x9, 0x6, 0x9, 0x8, 0x1, 0xd0fc, 0x55, 0x2, 0x0, 0x1, 0x1f, 0x100000001, 0x8f44, 0x53, 0x0, 0x3, 0x140000000000, 0x9, 0x8000, 0x0, 0x10001}) r0 = syz_mount_image$iso9660(&(0x7f0000000400), &(0x7f0000000440)='./file0\x00', 0x4, 0x1, &(0x7f0000000480)=[{0xfffffffffffffffe, 0x0, 0x3}], 0x2014400, &(0x7f00000004c0)={[{@check_relaxed}, {@dmode}, {@check_relaxed}], [{@euid_lt={'euid<', 0xee01}}, {@euid_eq}, {@rootcontext={'rootcontext', 0x3d, 'staff_u'}}, {@obj_user={'obj_user', 0x3d, '#-_'}}, {@rootcontext={'rootcontext', 0x3d, 'staff_u'}}]}) faccessat(r0, &(0x7f0000000580)='./file0\x00', 0x88) clock_adjtime(0x4, &(0x7f00000005c0)={0x80000000, 0x100000000, 0xba, 0x80000000, 0x4, 0x20d4e190, 0x7, 0x400, 0x33, 0x7a, 0x1, 0x465d, 0x7f, 0x5, 0x3, 0x1, 0x0, 0x8, 0x7, 0x7ff, 0x1, 0x4, 0x3f, 0x7fff, 0x700b, 0x96}) r1 = accept$unix(0xffffffffffffffff, 0x0, &(0x7f00000006c0)) getsockname$unix(r1, &(0x7f0000000700), &(0x7f0000000780)=0x6e) clock_adjtime(0x3, &(0x7f00000007c0)={0x6, 0x6, 0x7, 0x8000, 0x7ff, 0x5c, 0x401, 0x2, 0x9, 0x4, 0x0, 0x61, 0x2, 0x9b71, 0x100000000, 0x7fffffff, 0x322, 0xc70d, 0x9, 0xd, 0x9, 0x0, 0x9, 0x1a1f00000000, 0xffffffffffffffff, 0x9}) clock_adjtime(0x6, &(0x7f00000008c0)={0x4, 0x9, 0x3, 0xfffffffffffffff7, 0xb31, 0x1, 0x1, 0x2, 0x538, 0x0, 0x401, 0x1, 0xdd, 0xfffffffffffffff7, 0xec54, 0x4, 0x100000001, 0x0, 0xa, 0x1, 0x7ff, 0xcd, 0xf2, 0x80, 0x7, 0x8000}) clock_adjtime(0x0, &(0x7f00000009c0)={0x8, 0xff, 0x81, 0x2, 0x100000001, 0x11, 0x5, 0x1, 0x1, 0x9, 0x1000, 0x8, 0xdf6c, 0x9, 0x8, 0x1004000000000000, 0x1ff, 0x3, 0x6, 0xf5, 0x80000, 0x1, 0xfffffffffffffd6d, 0x2, 0x6, 0xfa}) r2 = socket$unix(0x1, 0x5, 0x0) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f0000000ac0)={'wlan0\x00'}) mq_timedreceive(0xffffffffffffffff, &(0x7f0000000b00)=""/4096, 0x1000, 0x80, &(0x7f0000001b00)={0x0, 0x989680}) r3 = creat(&(0x7f0000001b40)='./file0\x00', 0x1) mknodat(r3, &(0x7f0000001b80)='./file1\x00', 0x4, 0x0) clock_adjtime(0x0, &(0x7f0000001bc0)={0xfff, 0x7fff, 0xa, 0x2, 0xfdc, 0x54, 0x8fa, 0x3f41, 0x0, 0x4, 0x4, 0x5, 0x101, 0x5, 0x4, 0x9, 0x9, 0x30e, 0x3f, 0x2, 0x7f, 0x7, 0x6, 0x4, 0x3ff, 0x100000000}) clock_adjtime(0x2, &(0x7f0000001cc0)={0x0, 0x6, 0x7, 0xe5, 0x5, 0x6, 0x10, 0x7, 0x281, 0x40, 0x1, 0x0, 0x1, 0x10001, 0x5, 0x100, 0x0, 0x4, 0xffffffffffffe001, 0xdf, 0x7f, 0x8000, 0x9, 0x400, 0xfffffffffffffe00, 0x3f}) 17:08:08 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc01000a, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000003980)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d0f465001000005fd0f4655f00000000000001", 0x1b, 0x11100}], 0x0, &(0x7f00000000c0)) 17:08:08 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc01000a, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000003980)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d0f465001000005fd0f4655f00000000000001000c00000010000800000000000af3010004", 0x2d, 0x11100}], 0x0, &(0x7f00000000c0)) (fail_nth: 32) 17:08:08 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc01000a, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001", 0x4d, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000003980)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d0f465001000005fd0f4655f00000000000001000c000000100008", 0x23, 0x11100}], 0x0, &(0x7f00000000c0)) [ 339.949711][T19725] EXT4-fs (loop0): inodes count not valid: 3872 vs 32 [ 339.968552][T19728] SELinux: duplicate or incompatible mount options [ 339.985444][T19730] loop1: detected capacity change from 0 to 264192 17:08:08 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc01000a, 0x10, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000003980)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="80", 0x1, 0x11100}], 0x0, &(0x7f00000000c0)) 17:08:08 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc01000a, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="201100008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000003980)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d9", 0x4, 0x6800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d0f465001000005fd0f4655f00000000000001000c00000010000800000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}], 0x0, &(0x7f00000000c0)) [ 340.003828][T19734] loop3: detected capacity change from 0 to 264192 [ 340.010915][T19735] FAULT_INJECTION: forcing a failure. [ 340.010915][T19735] name failslab, interval 1, probability 0, space 0, times 0 [ 340.023547][T19735] CPU: 1 PID: 19735 Comm: syz-executor.4 Not tainted 5.16.0-syzkaller #0 [ 340.029027][T19730] EXT4-fs error (device loop1): ext4_fill_super:4822: inode #2: comm syz-executor.1: iget: root inode unallocated [ 340.032051][T19735] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 340.032065][T19735] Call Trace: [ 340.032072][T19735] [ 340.032079][T19735] dump_stack_lvl+0xd6/0x122 [ 340.045634][T19730] EXT4-fs (loop1): get root inode failed [ 340.054084][T19735] dump_stack+0x11/0x1b [ 340.054111][T19735] should_fail+0x23c/0x250 [ 340.054128][T19735] __should_failslab+0x81/0x90 [ 340.057421][T19730] EXT4-fs (loop1): mount failed [ 340.060331][T19735] should_failslab+0x5/0x20 [ 340.060354][T19735] kmem_cache_alloc_node_trace+0x61/0x310 [ 340.099150][T19735] ? __kmalloc_node_track_caller+0x30/0x40 [ 340.104964][T19735] __kmalloc_node_track_caller+0x30/0x40 [ 340.110596][T19735] ? alloc_uevent_skb+0x5b/0x120 [ 340.115534][T19735] __alloc_skb+0x19d/0x450 [ 340.120115][T19735] alloc_uevent_skb+0x5b/0x120 [ 340.124887][T19735] kobject_uevent_env+0x863/0xc40 [ 340.129922][T19735] ? preempt_count_add+0x4e/0x90 [ 340.134849][T19735] ? _raw_spin_unlock+0x2e/0x50 [ 340.139764][T19735] ? bd_prepare_to_claim+0x1ac/0x200 [ 340.145071][T19735] disk_force_media_change+0xe3/0x170 [ 340.150428][T19735] loop_configure+0x74d/0xf30 [ 340.155174][T19735] lo_ioctl+0x583/0x1270 [ 340.159420][T19735] ? folio_mark_dirty+0x84/0xe0 [ 340.164320][T19735] ? unlock_page+0x37/0x50 [ 340.168971][T19735] ? __rcu_read_unlock+0x5c/0x290 [ 340.174090][T19735] ? blkdev_common_ioctl+0x438/0x1180 [ 340.179519][T19735] ? selinux_file_ioctl+0x522/0x590 [ 340.184844][T19735] ? do_vfs_ioctl+0x819/0x14a0 [ 340.189939][T19735] ? lo_release+0x120/0x120 [ 340.194479][T19735] blkdev_ioctl+0x20e/0x440 [ 340.198976][T19735] ? blkdev_compat_ptr_ioctl+0x80/0x80 [ 340.204584][T19735] __se_sys_ioctl+0xcb/0x140 [ 340.209224][T19735] __x64_sys_ioctl+0x3f/0x50 [ 340.214005][T19735] do_syscall_64+0x44/0xd0 [ 340.218436][T19735] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 340.224354][T19735] RIP: 0033:0x7f6f94c22c57 [ 340.228783][T19735] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 04 54 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 340.248494][T19735] RSP: 002b:00007f6f93d98f28 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 340.256883][T19735] RAX: ffffffffffffffda RBX: 00007f6f94c6c9c8 RCX: 00007f6f94c22c57 [ 340.264913][T19735] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 340.272885][T19735] RBP: 0000000000000005 R08: 0000000000000000 R09: 00007f6f93d991d0 [ 340.280853][T19735] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 340.288977][T19735] R13: 0000000000000004 R14: 00000000200002a8 R15: 0000000000000007 [ 340.296945][T19735] 17:08:12 executing program 2: clock_adjtime(0x7, &(0x7f0000000000)={0x8000, 0x62, 0xff, 0x1, 0x3, 0x1ff, 0x3ff, 0x4, 0xff, 0x20, 0x6, 0x401, 0x20, 0x0, 0x1ff, 0x8000, 0xfffffffffffffffd, 0x400, 0x8, 0x100000000, 0x2, 0x8, 0xf32, 0x4, 0x6, 0x80}) clock_adjtime(0x2, &(0x7f0000000100)={0xd9, 0x9, 0x1, 0x2, 0x1f, 0x78, 0x4b1, 0x0, 0x401, 0x5, 0x8, 0x1, 0x101, 0x100000001, 0x7, 0x1fc, 0x9, 0x9, 0x0, 0x9, 0x8, 0x3, 0xff, 0x7, 0x73, 0x946c}) clock_adjtime(0x6, &(0x7f0000000200)={0x4, 0x1, 0x100, 0x6, 0x2, 0x6, 0x1, 0x1dd, 0x9, 0x1000000000000000, 0x0, 0x6, 0x1, 0x1, 0x9, 0x5, 0x3023, 0x2, 0x4, 0xfffffffffffffff9, 0x429, 0x3, 0x0, 0x9, 0xffffffffffffff05, 0x1000}) clock_adjtime(0x3, &(0x7f0000000300)={0x0, 0x8, 0x9, 0x9, 0x9, 0x9, 0x6, 0x9, 0x8, 0x1, 0xd0fc, 0x55, 0x2, 0x0, 0x1, 0x1f, 0x100000001, 0x8f44, 0x53, 0x0, 0x3, 0x140000000000, 0x9, 0x8000, 0x0, 0x10001}) r0 = syz_mount_image$iso9660(&(0x7f0000000400), &(0x7f0000000440)='./file0\x00', 0x4, 0x1, &(0x7f0000000480)=[{0xfffffffffffffffe, 0x0, 0x3}], 0x2014400, &(0x7f00000004c0)={[{@check_relaxed}, {@dmode}, {@check_relaxed}], [{@euid_lt={'euid<', 0xee01}}, {@euid_eq}, {@rootcontext={'rootcontext', 0x3d, 'staff_u'}}, {@obj_user={'obj_user', 0x3d, '#-_'}}, {@rootcontext={'rootcontext', 0x3d, 'staff_u'}}]}) faccessat(r0, &(0x7f0000000580)='./file0\x00', 0x88) clock_adjtime(0x4, &(0x7f00000005c0)={0x80000000, 0x100000000, 0xba, 0x80000000, 0x4, 0x20d4e190, 0x7, 0x400, 0x33, 0x7a, 0x1, 0x465d, 0x7f, 0x5, 0x3, 0x1, 0x0, 0x8, 0x7, 0x7ff, 0x1, 0x4, 0x3f, 0x7fff, 0x700b, 0x96}) r1 = accept$unix(0xffffffffffffffff, 0x0, &(0x7f00000006c0)) getsockname$unix(r1, &(0x7f0000000700), &(0x7f0000000780)=0x6e) clock_adjtime(0x3, &(0x7f00000007c0)={0x6, 0x6, 0x7, 0x8000, 0x7ff, 0x5c, 0x401, 0x2, 0x9, 0x4, 0x0, 0x61, 0x2, 0x9b71, 0x100000000, 0x7fffffff, 0x322, 0xc70d, 0x9, 0xd, 0x9, 0x0, 0x9, 0x1a1f00000000, 0xffffffffffffffff, 0x9}) clock_adjtime(0x6, &(0x7f00000008c0)={0x4, 0x9, 0x3, 0xfffffffffffffff7, 0xb31, 0x1, 0x1, 0x2, 0x538, 0x0, 0x401, 0x1, 0xdd, 0xfffffffffffffff7, 0xec54, 0x4, 0x100000001, 0x0, 0xa, 0x1, 0x7ff, 0xcd, 0xf2, 0x80, 0x7, 0x8000}) clock_adjtime(0x0, &(0x7f00000009c0)={0x8, 0xff, 0x81, 0x2, 0x100000001, 0x11, 0x5, 0x1, 0x1, 0x9, 0x1000, 0x8, 0xdf6c, 0x9, 0x8, 0x1004000000000000, 0x1ff, 0x3, 0x6, 0xf5, 0x80000, 0x1, 0xfffffffffffffd6d, 0x2, 0x6, 0xfa}) r2 = socket$unix(0x1, 0x5, 0x0) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f0000000ac0)={'wlan0\x00'}) mq_timedreceive(0xffffffffffffffff, &(0x7f0000000b00)=""/4096, 0x1000, 0x80, &(0x7f0000001b00)={0x0, 0x989680}) r3 = creat(&(0x7f0000001b40)='./file0\x00', 0x1) mknodat(r3, &(0x7f0000001b80)='./file1\x00', 0x4, 0x0) clock_adjtime(0x0, &(0x7f0000001bc0)={0xfff, 0x7fff, 0xb, 0x2, 0xfdc, 0x54, 0x8fa, 0x3f41, 0x0, 0x4, 0x4, 0x5, 0x101, 0x5, 0x4, 0x9, 0x9, 0x30e, 0x3f, 0x2, 0x7f, 0x7, 0x6, 0x4, 0x3ff, 0x100000000}) clock_adjtime(0x2, &(0x7f0000001cc0)={0x0, 0x6, 0x7, 0xe5, 0x5, 0x6, 0x10, 0x7, 0x281, 0x40, 0x1, 0x0, 0x1, 0x10001, 0x5, 0x100, 0x0, 0x4, 0xffffffffffffe001, 0xdf, 0x7f, 0x8000, 0x9, 0x400, 0xfffffffffffffe00, 0x3f}) [ 340.302167][T19735] loop4: detected capacity change from 0 to 264192 [ 340.302670][T19739] loop5: detected capacity change from 0 to 264192 [ 340.319298][T19734] EXT4-fs (loop3): invalid first ino: 0 [ 340.333716][T19735] EXT4-fs error (device loop4): ext4_ext_check_inode:497: inode #3: comm syz-executor.4: pblk 0 bad header/extent: invalid extent entries - magic f30a, entries 1, max 4(4), depth 0(0) 17:08:12 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc01000a, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000003980)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d0f465001000005fd0f4655f00000000000001", 0x1b, 0x11100}], 0x0, &(0x7f00000000c0)) [ 340.341193][T19737] loop0: detected capacity change from 0 to 264192 [ 340.353329][T19735] EXT4-fs error (device loop4): ext4_quota_enable:6323: comm syz-executor.4: Bad quota inode # 3 [ 340.374026][T19747] SELinux: duplicate or incompatible mount options [ 340.382677][T19735] EXT4-fs warning (device loop4): ext4_enable_quotas:6363: Failed to enable quota tracking (type=0, err=-117). Please run e2fsck to fix. [ 340.397759][T19749] loop1: detected capacity change from 0 to 264192 17:08:12 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc01000a, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000", 0x5a, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000003980)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d0f465001000005fd0f4655f00000000000001000c000000100008", 0x23, 0x11100}], 0x0, &(0x7f00000000c0)) [ 340.410794][T19737] EXT4-fs (loop0): inodes count not valid: 4384 vs 32 [ 340.428429][T19735] EXT4-fs (loop4): mount failed [ 340.448619][T19749] EXT4-fs error (device loop1): ext4_quota_enable:6323: comm syz-executor.1: Bad quota inode # 3 17:08:16 executing program 2: clock_adjtime(0x7, &(0x7f0000000000)={0x8000, 0x62, 0xff, 0x1, 0x3, 0x1ff, 0x3ff, 0x4, 0xff, 0x20, 0x6, 0x401, 0x20, 0x0, 0x1ff, 0x8000, 0xfffffffffffffffd, 0x400, 0x8, 0x100000000, 0x2, 0x8, 0xf32, 0x4, 0x6, 0x80}) clock_adjtime(0x2, &(0x7f0000000100)={0xd9, 0x9, 0x1, 0x2, 0x1f, 0x78, 0x4b1, 0x0, 0x401, 0x5, 0x8, 0x1, 0x101, 0x100000001, 0x7, 0x1fc, 0x9, 0x9, 0x0, 0x9, 0x8, 0x3, 0xff, 0x7, 0x73, 0x946c}) clock_adjtime(0x6, &(0x7f0000000200)={0x4, 0x1, 0x100, 0x6, 0x2, 0x6, 0x1, 0x1dd, 0x9, 0x1000000000000000, 0x0, 0x6, 0x1, 0x1, 0x9, 0x5, 0x3023, 0x2, 0x4, 0xfffffffffffffff9, 0x429, 0x3, 0x0, 0x9, 0xffffffffffffff05, 0x1000}) clock_adjtime(0x3, &(0x7f0000000300)={0x0, 0x8, 0x9, 0x9, 0x9, 0x9, 0x6, 0x9, 0x8, 0x1, 0xd0fc, 0x55, 0x2, 0x0, 0x1, 0x1f, 0x100000001, 0x8f44, 0x53, 0x0, 0x3, 0x140000000000, 0x9, 0x8000, 0x0, 0x10001}) r0 = syz_mount_image$iso9660(&(0x7f0000000400), &(0x7f0000000440)='./file0\x00', 0x4, 0x1, &(0x7f0000000480)=[{0xfffffffffffffffe, 0x0, 0x3}], 0x2014400, &(0x7f00000004c0)={[{@check_relaxed}, {@dmode}, {@check_relaxed}], [{@euid_lt={'euid<', 0xee01}}, {@euid_eq}, {@rootcontext={'rootcontext', 0x3d, 'staff_u'}}, {@obj_user={'obj_user', 0x3d, '#-_'}}, {@rootcontext={'rootcontext', 0x3d, 'staff_u'}}]}) faccessat(r0, &(0x7f0000000580)='./file0\x00', 0x88) clock_adjtime(0x4, &(0x7f00000005c0)={0x80000000, 0x100000000, 0xba, 0x80000000, 0x4, 0x20d4e190, 0x7, 0x400, 0x33, 0x7a, 0x1, 0x465d, 0x7f, 0x5, 0x3, 0x1, 0x0, 0x8, 0x7, 0x7ff, 0x1, 0x4, 0x3f, 0x7fff, 0x700b, 0x96}) r1 = accept$unix(0xffffffffffffffff, 0x0, &(0x7f00000006c0)) getsockname$unix(r1, &(0x7f0000000700), &(0x7f0000000780)=0x6e) clock_adjtime(0x3, &(0x7f00000007c0)={0x6, 0x6, 0x7, 0x8000, 0x7ff, 0x5c, 0x401, 0x2, 0x9, 0x4, 0x0, 0x61, 0x2, 0x9b71, 0x100000000, 0x7fffffff, 0x322, 0xc70d, 0x9, 0xd, 0x9, 0x0, 0x9, 0x1a1f00000000, 0xffffffffffffffff, 0x9}) clock_adjtime(0x6, &(0x7f00000008c0)={0x4, 0x9, 0x3, 0xfffffffffffffff7, 0xb31, 0x1, 0x1, 0x2, 0x538, 0x0, 0x401, 0x1, 0xdd, 0xfffffffffffffff7, 0xec54, 0x4, 0x100000001, 0x0, 0xa, 0x1, 0x7ff, 0xcd, 0xf2, 0x80, 0x7, 0x8000}) clock_adjtime(0x0, &(0x7f00000009c0)={0x8, 0xff, 0x81, 0x2, 0x100000001, 0x11, 0x5, 0x1, 0x1, 0x9, 0x1000, 0x8, 0xdf6c, 0x9, 0x8, 0x1004000000000000, 0x1ff, 0x3, 0x6, 0xf5, 0x80000, 0x1, 0xfffffffffffffd6d, 0x2, 0x6, 0xfa}) r2 = socket$unix(0x1, 0x5, 0x0) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f0000000ac0)={'wlan0\x00'}) mq_timedreceive(0xffffffffffffffff, &(0x7f0000000b00)=""/4096, 0x1000, 0x80, &(0x7f0000001b00)={0x0, 0x989680}) r3 = creat(&(0x7f0000001b40)='./file0\x00', 0x1) mknodat(r3, &(0x7f0000001b80)='./file1\x00', 0x4, 0x0) clock_adjtime(0x0, &(0x7f0000001bc0)={0xfff, 0x7fff, 0x300, 0x2, 0xfdc, 0x54, 0x8fa, 0x3f41, 0x0, 0x4, 0x4, 0x5, 0x101, 0x5, 0x4, 0x9, 0x9, 0x30e, 0x3f, 0x2, 0x7f, 0x7, 0x6, 0x4, 0x3ff, 0x100000000}) clock_adjtime(0x2, &(0x7f0000001cc0)={0x0, 0x6, 0x7, 0xe5, 0x5, 0x6, 0x10, 0x7, 0x281, 0x40, 0x1, 0x0, 0x1, 0x10001, 0x5, 0x100, 0x0, 0x4, 0xffffffffffffe001, 0xdf, 0x7f, 0x8000, 0x9, 0x400, 0xfffffffffffffe00, 0x3f}) 17:08:16 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc01000a, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="202200008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000003980)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d9", 0x4, 0x6800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d0f465001000005fd0f4655f00000000000001000c00000010000800000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}], 0x0, &(0x7f00000000c0)) 17:08:16 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc01000a, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000003980)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d0f465001000005fd0f4655f00000000000001000c00000010000800000000000af3010004", 0x2d, 0x11100}], 0x0, &(0x7f00000000c0)) (fail_nth: 33) [ 340.460294][T19749] EXT4-fs warning (device loop1): ext4_enable_quotas:6363: Failed to enable quota tracking (type=0, err=-116). Please run e2fsck to fix. [ 340.473638][T19739] EXT4-fs error (device loop5): ext4_quota_enable:6323: comm syz-executor.5: Bad quota inode # 3 [ 340.485121][T19749] EXT4-fs (loop1): mount failed [ 340.492522][T19758] loop3: detected capacity change from 0 to 264192 17:08:16 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc01000a, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000003980)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d0f465001000005fd0f4655f00000000000001", 0x1b, 0x11100}], 0x0, &(0x7f00000000c0)) [ 340.526411][T19763] FAULT_INJECTION: forcing a failure. [ 340.526411][T19763] name failslab, interval 1, probability 0, space 0, times 0 [ 340.539118][T19763] CPU: 1 PID: 19763 Comm: syz-executor.4 Not tainted 5.16.0-syzkaller #0 [ 340.547638][T19763] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 340.548946][T19739] EXT4-fs warning (device loop5): ext4_enable_quotas:6363: Failed to enable quota tracking (type=0, err=-116). Please run e2fsck to fix. [ 340.557703][T19763] Call Trace: 17:08:16 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc01000a, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000", 0x5a, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000003980)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d0f465001000005fd0f4655f00000000000001000c000000100008", 0x23, 0x11100}], 0x0, &(0x7f00000000c0)) [ 340.557711][T19763] [ 340.557719][T19763] dump_stack_lvl+0xd6/0x122 [ 340.574690][T19758] EXT4-fs (loop3): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: none. [ 340.575080][T19763] dump_stack+0x11/0x1b [ 340.578164][T19758] ext4 filesystem being mounted at /root/syzkaller-testdir350550748/syzkaller.ONiyFI/918/file0 supports timestamps until 2038 (0x7fffffff) [ 340.582576][T19763] should_fail+0x23c/0x250 [ 340.582601][T19763] ? skb_clone+0x12c/0x1f0 [ 340.595427][T19739] EXT4-fs (loop5): mount failed [ 340.597209][T19763] __should_failslab+0x81/0x90 [ 340.629718][T19763] should_failslab+0x5/0x20 [ 340.634370][T19763] kmem_cache_alloc+0x4f/0x320 [ 340.639138][T19763] skb_clone+0x12c/0x1f0 [ 340.643429][T19763] netlink_broadcast+0x4e9/0xad0 [ 340.648370][T19763] kobject_uevent_env+0x8c9/0xc40 [ 340.653397][T19763] ? preempt_count_add+0x4e/0x90 [ 340.658527][T19763] ? _raw_spin_unlock+0x2e/0x50 [ 340.663542][T19763] ? bd_prepare_to_claim+0x1ac/0x200 [ 340.668815][T19763] disk_force_media_change+0xe3/0x170 [ 340.674255][T19763] loop_configure+0x74d/0xf30 [ 340.679446][T19763] lo_ioctl+0x583/0x1270 [ 340.683746][T19763] ? folio_mark_dirty+0x84/0xe0 [ 340.688582][T19763] ? unlock_page+0x37/0x50 [ 340.693500][T19763] ? __rcu_read_unlock+0x5c/0x290 [ 340.698628][T19763] ? blkdev_common_ioctl+0x438/0x1180 [ 340.703989][T19763] ? selinux_file_ioctl+0x522/0x590 [ 340.709213][T19763] ? do_vfs_ioctl+0x819/0x14a0 [ 340.714000][T19763] ? lo_release+0x120/0x120 [ 340.718507][T19763] blkdev_ioctl+0x20e/0x440 [ 340.723027][T19763] ? blkdev_compat_ptr_ioctl+0x80/0x80 [ 340.728467][T19763] __se_sys_ioctl+0xcb/0x140 [ 340.733119][T19763] __x64_sys_ioctl+0x3f/0x50 [ 340.737706][T19763] do_syscall_64+0x44/0xd0 [ 340.742290][T19763] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 340.748235][T19763] RIP: 0033:0x7f6f94c22c57 [ 340.752654][T19763] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 04 54 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 340.772418][T19763] RSP: 002b:00007f6f93d98f28 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 340.780812][T19763] RAX: ffffffffffffffda RBX: 00007f6f94c6c9c8 RCX: 00007f6f94c22c57 [ 340.788886][T19763] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 340.796935][T19763] RBP: 0000000000000005 R08: 0000000000000000 R09: 00007f6f93d991d0 [ 340.804890][T19763] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 340.812840][T19763] R13: 0000000000000004 R14: 00000000200002a8 R15: 0000000000000007 [ 340.820800][T19763] 17:08:21 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc01000a, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000", 0x5a, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000003980)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d0f465001000005fd0f4655f00000000000001000c000000100008", 0x23, 0x11100}], 0x0, &(0x7f00000000c0)) [ 340.825930][T19761] SELinux: duplicate or incompatible mount options [ 340.826056][T19763] loop4: detected capacity change from 0 to 264192 [ 340.833299][T19760] loop0: detected capacity change from 0 to 264192 [ 340.857072][T19769] loop1: detected capacity change from 0 to 264192 [ 340.867774][T19760] EXT4-fs (loop0): inodes count not valid: 8736 vs 32 17:08:21 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc01000a, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="202e00008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000003980)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d9", 0x4, 0x6800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d0f465001000005fd0f4655f00000000000001000c00000010000800000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}], 0x0, &(0x7f00000000c0)) 17:08:21 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc01000a, 0x13, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000003980)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="80", 0x1, 0x11100}], 0x0, &(0x7f00000000c0)) 17:08:21 executing program 2: clock_adjtime(0x7, &(0x7f0000000000)={0x8000, 0x62, 0xff, 0x1, 0x3, 0x1ff, 0x3ff, 0x4, 0xff, 0x20, 0x6, 0x401, 0x20, 0x0, 0x1ff, 0x8000, 0xfffffffffffffffd, 0x400, 0x8, 0x100000000, 0x2, 0x8, 0xf32, 0x4, 0x6, 0x80}) clock_adjtime(0x2, &(0x7f0000000100)={0xd9, 0x9, 0x1, 0x2, 0x1f, 0x78, 0x4b1, 0x0, 0x401, 0x5, 0x8, 0x1, 0x101, 0x100000001, 0x7, 0x1fc, 0x9, 0x9, 0x0, 0x9, 0x8, 0x3, 0xff, 0x7, 0x73, 0x946c}) clock_adjtime(0x6, &(0x7f0000000200)={0x4, 0x1, 0x100, 0x6, 0x2, 0x6, 0x1, 0x1dd, 0x9, 0x1000000000000000, 0x0, 0x6, 0x1, 0x1, 0x9, 0x5, 0x3023, 0x2, 0x4, 0xfffffffffffffff9, 0x429, 0x3, 0x0, 0x9, 0xffffffffffffff05, 0x1000}) clock_adjtime(0x3, &(0x7f0000000300)={0x0, 0x8, 0x9, 0x9, 0x9, 0x9, 0x6, 0x9, 0x8, 0x1, 0xd0fc, 0x55, 0x2, 0x0, 0x1, 0x1f, 0x100000001, 0x8f44, 0x53, 0x0, 0x3, 0x140000000000, 0x9, 0x8000, 0x0, 0x10001}) r0 = syz_mount_image$iso9660(&(0x7f0000000400), &(0x7f0000000440)='./file0\x00', 0x4, 0x1, &(0x7f0000000480)=[{0xfffffffffffffffe, 0x0, 0x3}], 0x2014400, &(0x7f00000004c0)={[{@check_relaxed}, {@dmode}, {@check_relaxed}], [{@euid_lt={'euid<', 0xee01}}, {@euid_eq}, {@rootcontext={'rootcontext', 0x3d, 'staff_u'}}, {@obj_user={'obj_user', 0x3d, '#-_'}}, {@rootcontext={'rootcontext', 0x3d, 'staff_u'}}]}) faccessat(r0, &(0x7f0000000580)='./file0\x00', 0x88) clock_adjtime(0x4, &(0x7f00000005c0)={0x80000000, 0x100000000, 0xba, 0x80000000, 0x4, 0x20d4e190, 0x7, 0x400, 0x33, 0x7a, 0x1, 0x465d, 0x7f, 0x5, 0x3, 0x1, 0x0, 0x8, 0x7, 0x7ff, 0x1, 0x4, 0x3f, 0x7fff, 0x700b, 0x96}) r1 = accept$unix(0xffffffffffffffff, 0x0, &(0x7f00000006c0)) getsockname$unix(r1, &(0x7f0000000700), &(0x7f0000000780)=0x6e) clock_adjtime(0x3, &(0x7f00000007c0)={0x6, 0x6, 0x7, 0x8000, 0x7ff, 0x5c, 0x401, 0x2, 0x9, 0x4, 0x0, 0x61, 0x2, 0x9b71, 0x100000000, 0x7fffffff, 0x322, 0xc70d, 0x9, 0xd, 0x9, 0x0, 0x9, 0x1a1f00000000, 0xffffffffffffffff, 0x9}) clock_adjtime(0x6, &(0x7f00000008c0)={0x4, 0x9, 0x3, 0xfffffffffffffff7, 0xb31, 0x1, 0x1, 0x2, 0x538, 0x0, 0x401, 0x1, 0xdd, 0xfffffffffffffff7, 0xec54, 0x4, 0x100000001, 0x0, 0xa, 0x1, 0x7ff, 0xcd, 0xf2, 0x80, 0x7, 0x8000}) clock_adjtime(0x0, &(0x7f00000009c0)={0x8, 0xff, 0x81, 0x2, 0x100000001, 0x11, 0x5, 0x1, 0x1, 0x9, 0x1000, 0x8, 0xdf6c, 0x9, 0x8, 0x1004000000000000, 0x1ff, 0x3, 0x6, 0xf5, 0x80000, 0x1, 0xfffffffffffffd6d, 0x2, 0x6, 0xfa}) r2 = socket$unix(0x1, 0x5, 0x0) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f0000000ac0)={'wlan0\x00'}) mq_timedreceive(0xffffffffffffffff, &(0x7f0000000b00)=""/4096, 0x1000, 0x80, &(0x7f0000001b00)={0x0, 0x989680}) r3 = creat(&(0x7f0000001b40)='./file0\x00', 0x1) mknodat(r3, &(0x7f0000001b80)='./file1\x00', 0x4, 0x0) clock_adjtime(0x0, &(0x7f0000001bc0)={0xfff, 0x7fff, 0x700, 0x2, 0xfdc, 0x54, 0x8fa, 0x3f41, 0x0, 0x4, 0x4, 0x5, 0x101, 0x5, 0x4, 0x9, 0x9, 0x30e, 0x3f, 0x2, 0x7f, 0x7, 0x6, 0x4, 0x3ff, 0x100000000}) clock_adjtime(0x2, &(0x7f0000001cc0)={0x0, 0x6, 0x7, 0xe5, 0x5, 0x6, 0x10, 0x7, 0x281, 0x40, 0x1, 0x0, 0x1, 0x10001, 0x5, 0x100, 0x0, 0x4, 0xffffffffffffe001, 0xdf, 0x7f, 0x8000, 0x9, 0x400, 0xfffffffffffffe00, 0x3f}) [ 340.939327][T19763] EXT4-fs error (device loop4): ext4_ext_check_inode:497: inode #3: comm syz-executor.4: pblk 0 bad header/extent: invalid extent entries - magic f30a, entries 1, max 4(4), depth 0(0) [ 340.975278][T19778] loop5: detected capacity change from 0 to 264192 [ 340.987641][T19763] EXT4-fs error (device loop4): ext4_quota_enable:6323: comm syz-executor.4: Bad quota inode # 3 [ 340.990181][T19779] loop3: detected capacity change from 0 to 264192 [ 341.000231][T19781] SELinux: duplicate or incompatible mount options [ 341.023412][T19769] EXT4-fs warning (device loop1): ext4_enable_quotas:6363: Failed to enable quota tracking (type=0, err=-22). Please run e2fsck to fix. [ 341.024150][T19763] EXT4-fs warning (device loop4): ext4_enable_quotas:6363: Failed to enable quota tracking (type=0, err=-117). Please run e2fsck to fix. [ 341.054064][T19783] loop0: detected capacity change from 0 to 264192 17:08:25 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc01000a, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000003980)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d0f465001000005fd0f4655f00000000000001", 0x1b, 0x11100}], 0x0, &(0x7f00000000c0)) [ 341.088511][T19769] EXT4-fs (loop1): mount failed [ 341.097617][T19778] EXT4-fs error (device loop5): ext4_quota_enable:6323: comm syz-executor.5: Bad quota inode # 3 [ 341.121802][T19783] EXT4-fs (loop0): inodes count not valid: 11808 vs 32 [ 341.129643][T19763] EXT4-fs (loop4): mount failed 17:08:25 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc01000a, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="206000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000003980)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d9", 0x4, 0x6800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d0f465001000005fd0f4655f00000000000001000c00000010000800000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}], 0x0, &(0x7f00000000c0)) 17:08:25 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc01000a, 0x14, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000003980)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="80", 0x1, 0x11100}], 0x0, &(0x7f00000000c0)) 17:08:25 executing program 2: clock_adjtime(0x7, &(0x7f0000000000)={0x8000, 0x62, 0xff, 0x1, 0x3, 0x1ff, 0x3ff, 0x4, 0xff, 0x20, 0x6, 0x401, 0x20, 0x0, 0x1ff, 0x8000, 0xfffffffffffffffd, 0x400, 0x8, 0x100000000, 0x2, 0x8, 0xf32, 0x4, 0x6, 0x80}) clock_adjtime(0x2, &(0x7f0000000100)={0xd9, 0x9, 0x1, 0x2, 0x1f, 0x78, 0x4b1, 0x0, 0x401, 0x5, 0x8, 0x1, 0x101, 0x100000001, 0x7, 0x1fc, 0x9, 0x9, 0x0, 0x9, 0x8, 0x3, 0xff, 0x7, 0x73, 0x946c}) clock_adjtime(0x6, &(0x7f0000000200)={0x4, 0x1, 0x100, 0x6, 0x2, 0x6, 0x1, 0x1dd, 0x9, 0x1000000000000000, 0x0, 0x6, 0x1, 0x1, 0x9, 0x5, 0x3023, 0x2, 0x4, 0xfffffffffffffff9, 0x429, 0x3, 0x0, 0x9, 0xffffffffffffff05, 0x1000}) clock_adjtime(0x3, &(0x7f0000000300)={0x0, 0x8, 0x9, 0x9, 0x9, 0x9, 0x6, 0x9, 0x8, 0x1, 0xd0fc, 0x55, 0x2, 0x0, 0x1, 0x1f, 0x100000001, 0x8f44, 0x53, 0x0, 0x3, 0x140000000000, 0x9, 0x8000, 0x0, 0x10001}) r0 = syz_mount_image$iso9660(&(0x7f0000000400), &(0x7f0000000440)='./file0\x00', 0x4, 0x1, &(0x7f0000000480)=[{0xfffffffffffffffe, 0x0, 0x3}], 0x2014400, &(0x7f00000004c0)={[{@check_relaxed}, {@dmode}, {@check_relaxed}], [{@euid_lt={'euid<', 0xee01}}, {@euid_eq}, {@rootcontext={'rootcontext', 0x3d, 'staff_u'}}, {@obj_user={'obj_user', 0x3d, '#-_'}}, {@rootcontext={'rootcontext', 0x3d, 'staff_u'}}]}) faccessat(r0, &(0x7f0000000580)='./file0\x00', 0x88) clock_adjtime(0x4, &(0x7f00000005c0)={0x80000000, 0x100000000, 0xba, 0x80000000, 0x4, 0x20d4e190, 0x7, 0x400, 0x33, 0x7a, 0x1, 0x465d, 0x7f, 0x5, 0x3, 0x1, 0x0, 0x8, 0x7, 0x7ff, 0x1, 0x4, 0x3f, 0x7fff, 0x700b, 0x96}) r1 = accept$unix(0xffffffffffffffff, 0x0, &(0x7f00000006c0)) getsockname$unix(r1, &(0x7f0000000700), &(0x7f0000000780)=0x6e) clock_adjtime(0x3, &(0x7f00000007c0)={0x6, 0x6, 0x7, 0x8000, 0x7ff, 0x5c, 0x401, 0x2, 0x9, 0x4, 0x0, 0x61, 0x2, 0x9b71, 0x100000000, 0x7fffffff, 0x322, 0xc70d, 0x9, 0xd, 0x9, 0x0, 0x9, 0x1a1f00000000, 0xffffffffffffffff, 0x9}) clock_adjtime(0x6, &(0x7f00000008c0)={0x4, 0x9, 0x3, 0xfffffffffffffff7, 0xb31, 0x1, 0x1, 0x2, 0x538, 0x0, 0x401, 0x1, 0xdd, 0xfffffffffffffff7, 0xec54, 0x4, 0x100000001, 0x0, 0xa, 0x1, 0x7ff, 0xcd, 0xf2, 0x80, 0x7, 0x8000}) clock_adjtime(0x0, &(0x7f00000009c0)={0x8, 0xff, 0x81, 0x2, 0x100000001, 0x11, 0x5, 0x1, 0x1, 0x9, 0x1000, 0x8, 0xdf6c, 0x9, 0x8, 0x1004000000000000, 0x1ff, 0x3, 0x6, 0xf5, 0x80000, 0x1, 0xfffffffffffffd6d, 0x2, 0x6, 0xfa}) r2 = socket$unix(0x1, 0x5, 0x0) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f0000000ac0)={'wlan0\x00'}) mq_timedreceive(0xffffffffffffffff, &(0x7f0000000b00)=""/4096, 0x1000, 0x80, &(0x7f0000001b00)={0x0, 0x989680}) r3 = creat(&(0x7f0000001b40)='./file0\x00', 0x1) mknodat(r3, &(0x7f0000001b80)='./file1\x00', 0x4, 0x0) clock_adjtime(0x0, &(0x7f0000001bc0)={0xfff, 0x7fff, 0xa00, 0x2, 0xfdc, 0x54, 0x8fa, 0x3f41, 0x0, 0x4, 0x4, 0x5, 0x101, 0x5, 0x4, 0x9, 0x9, 0x30e, 0x3f, 0x2, 0x7f, 0x7, 0x6, 0x4, 0x3ff, 0x100000000}) clock_adjtime(0x2, &(0x7f0000001cc0)={0x0, 0x6, 0x7, 0xe5, 0x5, 0x6, 0x10, 0x7, 0x281, 0x40, 0x1, 0x0, 0x1, 0x10001, 0x5, 0x100, 0x0, 0x4, 0xffffffffffffe001, 0xdf, 0x7f, 0x8000, 0x9, 0x400, 0xfffffffffffffe00, 0x3f}) 17:08:25 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc01000a, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000003980)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d0f465001000005fd0f4655f00000000000001000c00000010000800000000000af3010004", 0x2d, 0x11100}], 0x0, &(0x7f00000000c0)) (fail_nth: 34) 17:08:25 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc01000a, 0x15, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000003980)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="80", 0x1, 0x11100}], 0x0, &(0x7f00000000c0)) [ 341.151333][T19778] EXT4-fs warning (device loop5): ext4_enable_quotas:6363: Failed to enable quota tracking (type=0, err=-116). Please run e2fsck to fix. [ 341.178731][T19778] EXT4-fs (loop5): mount failed [ 341.190469][T19792] loop1: detected capacity change from 0 to 264192 17:08:25 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc01000a, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000", 0x60, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000003980)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d0f465001000005fd0f4655f00000000000001000c000000100008", 0x23, 0x11100}], 0x0, &(0x7f00000000c0)) [ 341.230502][T19779] EXT4-fs (loop3): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: none. [ 341.241338][T19779] ext4 filesystem being mounted at /root/syzkaller-testdir350550748/syzkaller.ONiyFI/920/file0 supports timestamps until 2038 (0x7fffffff) [ 341.247750][T19793] loop0: detected capacity change from 0 to 264192 [ 341.271720][T19799] FAULT_INJECTION: forcing a failure. [ 341.271720][T19799] name failslab, interval 1, probability 0, space 0, times 0 [ 341.281727][T19801] SELinux: duplicate or incompatible mount options [ 341.284383][T19799] CPU: 1 PID: 19799 Comm: syz-executor.4 Not tainted 5.16.0-syzkaller #0 [ 341.299405][T19799] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 341.309463][T19799] Call Trace: [ 341.312742][T19799] [ 341.315669][T19799] dump_stack_lvl+0xd6/0x122 [ 341.319320][T19800] loop5: detected capacity change from 0 to 264192 [ 341.320263][T19799] dump_stack+0x11/0x1b [ 341.330881][T19799] should_fail+0x23c/0x250 [ 341.335301][T19799] ? __kernfs_new_node+0x6a/0x340 [ 341.340321][T19799] __should_failslab+0x81/0x90 [ 341.345073][T19799] should_failslab+0x5/0x20 [ 341.349723][T19799] kmem_cache_alloc+0x4f/0x320 [ 341.354476][T19799] __kernfs_new_node+0x6a/0x340 [ 341.359315][T19799] ? ___cache_free+0x46/0x310 [ 341.363978][T19799] ? kmem_cache_free+0x65/0x110 [ 341.368819][T19799] kernfs_create_dir_ns+0x5e/0x140 [ 341.374002][T19799] internal_create_group+0x13e/0x840 [ 341.379343][T19799] sysfs_create_group+0x1b/0x20 [ 341.384181][T19799] loop_configure+0xc58/0xf30 [ 341.388869][T19799] lo_ioctl+0x583/0x1270 [ 341.393122][T19799] ? folio_mark_dirty+0x84/0xe0 [ 341.397978][T19799] ? unlock_page+0x37/0x50 [ 341.402389][T19799] ? __rcu_read_unlock+0x5c/0x290 [ 341.407432][T19799] ? blkdev_common_ioctl+0x438/0x1180 [ 341.412883][T19799] ? selinux_file_ioctl+0x522/0x590 [ 341.418136][T19799] ? do_vfs_ioctl+0x819/0x14a0 [ 341.422890][T19799] ? lo_release+0x120/0x120 [ 341.427398][T19799] blkdev_ioctl+0x20e/0x440 [ 341.431890][T19799] ? blkdev_compat_ptr_ioctl+0x80/0x80 [ 341.437339][T19799] __se_sys_ioctl+0xcb/0x140 [ 341.441917][T19799] __x64_sys_ioctl+0x3f/0x50 [ 341.446497][T19799] do_syscall_64+0x44/0xd0 [ 341.450950][T19799] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 341.456961][T19799] RIP: 0033:0x7f6f94c22c57 [ 341.461373][T19799] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 04 54 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 341.480973][T19799] RSP: 002b:00007f6f93d98f28 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 341.489460][T19799] RAX: ffffffffffffffda RBX: 00007f6f94c6c9c8 RCX: 00007f6f94c22c57 [ 341.497419][T19799] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 341.505376][T19799] RBP: 0000000000000005 R08: 0000000000000000 R09: 00007f6f93d991d0 [ 341.513368][T19799] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 341.521758][T19799] R13: 0000000000000004 R14: 00000000200002a8 R15: 0000000000000007 17:08:25 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc01000a, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000", 0x60, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000003980)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d0f465001000005fd0f4655f00000000000001000c000000100008", 0x23, 0x11100}], 0x0, &(0x7f00000000c0)) 17:08:25 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc01000a, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="20fe00008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000003980)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d9", 0x4, 0x6800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d0f465001000005fd0f4655f00000000000001000c00000010000800000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}], 0x0, &(0x7f00000000c0)) [ 341.529816][T19799] [ 341.533646][T19799] loop4: detected capacity change from 0 to 264192 [ 341.566394][T19793] EXT4-fs (loop0): inodes count not valid: 24608 vs 32 17:08:29 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc01000a, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="200402008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000003980)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d9", 0x4, 0x6800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d0f465001000005fd0f4655f00000000000001000c00000010000800000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}], 0x0, &(0x7f00000000c0)) 17:08:29 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc01000a, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000", 0x60, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000003980)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d0f465001000005fd0f4655f00000000000001000c000000100008", 0x23, 0x11100}], 0x0, &(0x7f00000000c0)) [ 341.600856][T19799] EXT4-fs error (device loop4): ext4_ext_check_inode:497: inode #3: comm syz-executor.4: pblk 0 bad header/extent: invalid extent entries - magic f30a, entries 1, max 4(4), depth 0(0) [ 341.629486][T19799] EXT4-fs error (device loop4): ext4_quota_enable:6323: comm syz-executor.4: Bad quota inode # 3 [ 341.641256][T19800] EXT4-fs error (device loop5): ext4_quota_enable:6323: comm syz-executor.5: Bad quota inode # 3 [ 341.647168][T19799] EXT4-fs warning (device loop4): ext4_enable_quotas:6363: Failed to enable quota tracking (type=0, err=-117). Please run e2fsck to fix. [ 341.654393][T19792] EXT4-fs warning (device loop1): ext4_enable_quotas:6363: Failed to enable quota tracking (type=0, err=-22). Please run e2fsck to fix. [ 341.667380][T19799] EXT4-fs (loop4): mount failed 17:08:30 executing program 2: clock_adjtime(0x7, &(0x7f0000000000)={0x8000, 0x62, 0xff, 0x1, 0x3, 0x1ff, 0x3ff, 0x4, 0xff, 0x20, 0x6, 0x401, 0x20, 0x0, 0x1ff, 0x8000, 0xfffffffffffffffd, 0x400, 0x8, 0x100000000, 0x2, 0x8, 0xf32, 0x4, 0x6, 0x80}) clock_adjtime(0x2, &(0x7f0000000100)={0xd9, 0x9, 0x1, 0x2, 0x1f, 0x78, 0x4b1, 0x0, 0x401, 0x5, 0x8, 0x1, 0x101, 0x100000001, 0x7, 0x1fc, 0x9, 0x9, 0x0, 0x9, 0x8, 0x3, 0xff, 0x7, 0x73, 0x946c}) clock_adjtime(0x6, &(0x7f0000000200)={0x4, 0x1, 0x100, 0x6, 0x2, 0x6, 0x1, 0x1dd, 0x9, 0x1000000000000000, 0x0, 0x6, 0x1, 0x1, 0x9, 0x5, 0x3023, 0x2, 0x4, 0xfffffffffffffff9, 0x429, 0x3, 0x0, 0x9, 0xffffffffffffff05, 0x1000}) clock_adjtime(0x3, &(0x7f0000000300)={0x0, 0x8, 0x9, 0x9, 0x9, 0x9, 0x6, 0x9, 0x8, 0x1, 0xd0fc, 0x55, 0x2, 0x0, 0x1, 0x1f, 0x100000001, 0x8f44, 0x53, 0x0, 0x3, 0x140000000000, 0x9, 0x8000, 0x0, 0x10001}) r0 = syz_mount_image$iso9660(&(0x7f0000000400), &(0x7f0000000440)='./file0\x00', 0x4, 0x1, &(0x7f0000000480)=[{0xfffffffffffffffe, 0x0, 0x3}], 0x2014400, &(0x7f00000004c0)={[{@check_relaxed}, {@dmode}, {@check_relaxed}], [{@euid_lt={'euid<', 0xee01}}, {@euid_eq}, {@rootcontext={'rootcontext', 0x3d, 'staff_u'}}, {@obj_user={'obj_user', 0x3d, '#-_'}}, {@rootcontext={'rootcontext', 0x3d, 'staff_u'}}]}) faccessat(r0, &(0x7f0000000580)='./file0\x00', 0x88) clock_adjtime(0x4, &(0x7f00000005c0)={0x80000000, 0x100000000, 0xba, 0x80000000, 0x4, 0x20d4e190, 0x7, 0x400, 0x33, 0x7a, 0x1, 0x465d, 0x7f, 0x5, 0x3, 0x1, 0x0, 0x8, 0x7, 0x7ff, 0x1, 0x4, 0x3f, 0x7fff, 0x700b, 0x96}) r1 = accept$unix(0xffffffffffffffff, 0x0, &(0x7f00000006c0)) getsockname$unix(r1, &(0x7f0000000700), &(0x7f0000000780)=0x6e) clock_adjtime(0x3, &(0x7f00000007c0)={0x6, 0x6, 0x7, 0x8000, 0x7ff, 0x5c, 0x401, 0x2, 0x9, 0x4, 0x0, 0x61, 0x2, 0x9b71, 0x100000000, 0x7fffffff, 0x322, 0xc70d, 0x9, 0xd, 0x9, 0x0, 0x9, 0x1a1f00000000, 0xffffffffffffffff, 0x9}) clock_adjtime(0x6, &(0x7f00000008c0)={0x4, 0x9, 0x3, 0xfffffffffffffff7, 0xb31, 0x1, 0x1, 0x2, 0x538, 0x0, 0x401, 0x1, 0xdd, 0xfffffffffffffff7, 0xec54, 0x4, 0x100000001, 0x0, 0xa, 0x1, 0x7ff, 0xcd, 0xf2, 0x80, 0x7, 0x8000}) clock_adjtime(0x0, &(0x7f00000009c0)={0x8, 0xff, 0x81, 0x2, 0x100000001, 0x11, 0x5, 0x1, 0x1, 0x9, 0x1000, 0x8, 0xdf6c, 0x9, 0x8, 0x1004000000000000, 0x1ff, 0x3, 0x6, 0xf5, 0x80000, 0x1, 0xfffffffffffffd6d, 0x2, 0x6, 0xfa}) r2 = socket$unix(0x1, 0x5, 0x0) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f0000000ac0)={'wlan0\x00'}) mq_timedreceive(0xffffffffffffffff, &(0x7f0000000b00)=""/4096, 0x1000, 0x80, &(0x7f0000001b00)={0x0, 0x989680}) r3 = creat(&(0x7f0000001b40)='./file0\x00', 0x1) mknodat(r3, &(0x7f0000001b80)='./file1\x00', 0x4, 0x0) clock_adjtime(0x0, &(0x7f0000001bc0)={0xfff, 0x7fff, 0xb00, 0x2, 0xfdc, 0x54, 0x8fa, 0x3f41, 0x0, 0x4, 0x4, 0x5, 0x101, 0x5, 0x4, 0x9, 0x9, 0x30e, 0x3f, 0x2, 0x7f, 0x7, 0x6, 0x4, 0x3ff, 0x100000000}) clock_adjtime(0x2, &(0x7f0000001cc0)={0x0, 0x6, 0x7, 0xe5, 0x5, 0x6, 0x10, 0x7, 0x281, 0x40, 0x1, 0x0, 0x1, 0x10001, 0x5, 0x100, 0x0, 0x4, 0xffffffffffffe001, 0xdf, 0x7f, 0x8000, 0x9, 0x400, 0xfffffffffffffe00, 0x3f}) 17:08:30 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc01000a, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000003980)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d0f465001000005fd0f4655f00000000000001", 0x1b, 0x11100}], 0x0, &(0x7f00000000c0)) 17:08:30 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc01000a, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700", 0x63, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000003980)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d0f465001000005fd0f4655f00000000000001000c000000100008", 0x23, 0x11100}], 0x0, &(0x7f00000000c0)) [ 341.703969][T19800] EXT4-fs warning (device loop5): ext4_enable_quotas:6363: Failed to enable quota tracking (type=0, err=-116). Please run e2fsck to fix. [ 341.720696][T19792] EXT4-fs (loop1): mount failed [ 341.729123][T19820] loop0: detected capacity change from 0 to 264192 17:08:30 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc01000a, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000003980)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d0f465001000005fd0f4655f00000000000001000c00000010000800000000000af3010004", 0x2d, 0x11100}], 0x0, &(0x7f00000000c0)) (fail_nth: 35) 17:08:30 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc01000a, 0x16, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000003980)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="80", 0x1, 0x11100}], 0x0, &(0x7f00000000c0)) 17:08:34 executing program 2: clock_adjtime(0x7, &(0x7f0000000000)={0x8000, 0x62, 0xff, 0x1, 0x3, 0x1ff, 0x3ff, 0x4, 0xff, 0x20, 0x6, 0x401, 0x20, 0x0, 0x1ff, 0x8000, 0xfffffffffffffffd, 0x400, 0x8, 0x100000000, 0x2, 0x8, 0xf32, 0x4, 0x6, 0x80}) clock_adjtime(0x2, &(0x7f0000000100)={0xd9, 0x9, 0x1, 0x2, 0x1f, 0x78, 0x4b1, 0x0, 0x401, 0x5, 0x8, 0x1, 0x101, 0x100000001, 0x7, 0x1fc, 0x9, 0x9, 0x0, 0x9, 0x8, 0x3, 0xff, 0x7, 0x73, 0x946c}) clock_adjtime(0x6, &(0x7f0000000200)={0x4, 0x1, 0x100, 0x6, 0x2, 0x6, 0x1, 0x1dd, 0x9, 0x1000000000000000, 0x0, 0x6, 0x1, 0x1, 0x9, 0x5, 0x3023, 0x2, 0x4, 0xfffffffffffffff9, 0x429, 0x3, 0x0, 0x9, 0xffffffffffffff05, 0x1000}) clock_adjtime(0x3, &(0x7f0000000300)={0x0, 0x8, 0x9, 0x9, 0x9, 0x9, 0x6, 0x9, 0x8, 0x1, 0xd0fc, 0x55, 0x2, 0x0, 0x1, 0x1f, 0x100000001, 0x8f44, 0x53, 0x0, 0x3, 0x140000000000, 0x9, 0x8000, 0x0, 0x10001}) r0 = syz_mount_image$iso9660(&(0x7f0000000400), &(0x7f0000000440)='./file0\x00', 0x4, 0x1, &(0x7f0000000480)=[{0xfffffffffffffffe, 0x0, 0x3}], 0x2014400, &(0x7f00000004c0)={[{@check_relaxed}, {@dmode}, {@check_relaxed}], [{@euid_lt={'euid<', 0xee01}}, {@euid_eq}, {@rootcontext={'rootcontext', 0x3d, 'staff_u'}}, {@obj_user={'obj_user', 0x3d, '#-_'}}, {@rootcontext={'rootcontext', 0x3d, 'staff_u'}}]}) faccessat(r0, &(0x7f0000000580)='./file0\x00', 0x88) clock_adjtime(0x4, &(0x7f00000005c0)={0x80000000, 0x100000000, 0xba, 0x80000000, 0x4, 0x20d4e190, 0x7, 0x400, 0x33, 0x7a, 0x1, 0x465d, 0x7f, 0x5, 0x3, 0x1, 0x0, 0x8, 0x7, 0x7ff, 0x1, 0x4, 0x3f, 0x7fff, 0x700b, 0x96}) r1 = accept$unix(0xffffffffffffffff, 0x0, &(0x7f00000006c0)) getsockname$unix(r1, &(0x7f0000000700), &(0x7f0000000780)=0x6e) clock_adjtime(0x3, &(0x7f00000007c0)={0x6, 0x6, 0x7, 0x8000, 0x7ff, 0x5c, 0x401, 0x2, 0x9, 0x4, 0x0, 0x61, 0x2, 0x9b71, 0x100000000, 0x7fffffff, 0x322, 0xc70d, 0x9, 0xd, 0x9, 0x0, 0x9, 0x1a1f00000000, 0xffffffffffffffff, 0x9}) clock_adjtime(0x6, &(0x7f00000008c0)={0x4, 0x9, 0x3, 0xfffffffffffffff7, 0xb31, 0x1, 0x1, 0x2, 0x538, 0x0, 0x401, 0x1, 0xdd, 0xfffffffffffffff7, 0xec54, 0x4, 0x100000001, 0x0, 0xa, 0x1, 0x7ff, 0xcd, 0xf2, 0x80, 0x7, 0x8000}) clock_adjtime(0x0, &(0x7f00000009c0)={0x8, 0xff, 0x81, 0x2, 0x100000001, 0x11, 0x5, 0x1, 0x1, 0x9, 0x1000, 0x8, 0xdf6c, 0x9, 0x8, 0x1004000000000000, 0x1ff, 0x3, 0x6, 0xf5, 0x80000, 0x1, 0xfffffffffffffd6d, 0x2, 0x6, 0xfa}) r2 = socket$unix(0x1, 0x5, 0x0) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f0000000ac0)={'wlan0\x00'}) mq_timedreceive(0xffffffffffffffff, &(0x7f0000000b00)=""/4096, 0x1000, 0x80, &(0x7f0000001b00)={0x0, 0x989680}) r3 = creat(&(0x7f0000001b40)='./file0\x00', 0x1) mknodat(r3, &(0x7f0000001b80)='./file1\x00', 0x4, 0x0) clock_adjtime(0x0, &(0x7f0000001bc0)={0xfff, 0x7fff, 0xccc8b, 0x2, 0xfdc, 0x54, 0x8fa, 0x3f41, 0x0, 0x4, 0x4, 0x5, 0x101, 0x5, 0x4, 0x9, 0x9, 0x30e, 0x3f, 0x2, 0x7f, 0x7, 0x6, 0x4, 0x3ff, 0x100000000}) clock_adjtime(0x2, &(0x7f0000001cc0)={0x0, 0x6, 0x7, 0xe5, 0x5, 0x6, 0x10, 0x7, 0x281, 0x40, 0x1, 0x0, 0x1, 0x10001, 0x5, 0x100, 0x0, 0x4, 0xffffffffffffe001, 0xdf, 0x7f, 0x8000, 0x9, 0x400, 0xfffffffffffffe00, 0x3f}) [ 341.768916][T19800] EXT4-fs (loop5): mount failed [ 341.785516][T19825] SELinux: duplicate or incompatible mount options [ 341.799727][T19823] loop1: detected capacity change from 0 to 264192 [ 341.803673][T19820] EXT4-fs (loop0): inodes count not valid: 132128 vs 32 17:08:34 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc01000a, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="200003008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000003980)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d9", 0x4, 0x6800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d0f465001000005fd0f4655f00000000000001000c00000010000800000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}], 0x0, &(0x7f00000000c0)) [ 341.836376][T19834] loop5: detected capacity change from 0 to 264192 [ 341.845025][T19827] FAULT_INJECTION: forcing a failure. [ 341.845025][T19827] name failslab, interval 1, probability 0, space 0, times 0 [ 341.857725][T19827] CPU: 0 PID: 19827 Comm: syz-executor.4 Not tainted 5.16.0-syzkaller #0 [ 341.866143][T19827] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 341.876195][T19827] Call Trace: [ 341.879464][T19827] [ 341.882437][T19827] dump_stack_lvl+0xd6/0x122 [ 341.887406][T19827] dump_stack+0x11/0x1b [ 341.891595][T19827] should_fail+0x23c/0x250 [ 341.895999][T19827] ? __kernfs_new_node+0x6a/0x340 [ 341.901013][T19827] __should_failslab+0x81/0x90 [ 341.905774][T19827] should_failslab+0x5/0x20 [ 341.910269][T19827] kmem_cache_alloc+0x4f/0x320 [ 341.915027][T19827] __kernfs_new_node+0x6a/0x340 [ 341.919912][T19827] ? __down_write_common+0x42/0x7b0 [ 341.925101][T19827] ? idr_alloc_cyclic+0x26b/0x2f0 [ 341.930131][T19827] ? __down_write_common+0x42/0x7b0 [ 341.935326][T19827] ? rb_insert_color+0x7e/0x310 [ 341.940321][T19827] kernfs_new_node+0x5b/0xd0 [ 341.944940][T19827] __kernfs_create_file+0x45/0x1a0 [ 341.950043][T19827] ? dev_attr_show+0x90/0x90 [ 341.954677][T19827] sysfs_add_file_mode_ns+0x10b/0x1d0 [ 341.960038][T19827] internal_create_group+0x2dd/0x840 [ 341.965326][T19827] sysfs_create_group+0x1b/0x20 [ 341.970163][T19827] loop_configure+0xc58/0xf30 [ 341.974895][T19827] lo_ioctl+0x583/0x1270 [ 341.979128][T19827] ? folio_mark_dirty+0x84/0xe0 [ 341.984014][T19827] ? unlock_page+0x37/0x50 [ 341.988419][T19827] ? __rcu_read_unlock+0x5c/0x290 [ 341.993494][T19827] ? blkdev_common_ioctl+0x438/0x1180 [ 341.998956][T19827] ? selinux_file_ioctl+0x522/0x590 [ 342.004212][T19827] ? do_vfs_ioctl+0x819/0x14a0 [ 342.009076][T19827] ? lo_release+0x120/0x120 [ 342.013576][T19827] blkdev_ioctl+0x20e/0x440 [ 342.018070][T19827] ? blkdev_compat_ptr_ioctl+0x80/0x80 [ 342.023521][T19827] __se_sys_ioctl+0xcb/0x140 [ 342.028099][T19827] __x64_sys_ioctl+0x3f/0x50 [ 342.032720][T19827] do_syscall_64+0x44/0xd0 [ 342.037151][T19827] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 342.043036][T19827] RIP: 0033:0x7f6f94c22c57 [ 342.047449][T19827] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 04 54 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 342.067063][T19827] RSP: 002b:00007f6f93d98f28 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 342.075522][T19827] RAX: ffffffffffffffda RBX: 00007f6f94c6c9c8 RCX: 00007f6f94c22c57 [ 342.083481][T19827] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 342.091472][T19827] RBP: 0000000000000005 R08: 0000000000000000 R09: 00007f6f93d991d0 [ 342.099523][T19827] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 342.107634][T19827] R13: 0000000000000004 R14: 00000000200002a8 R15: 0000000000000007 [ 342.115593][T19827] [ 342.122310][T19827] loop4: detected capacity change from 0 to 264192 [ 342.127562][T19836] SELinux: duplicate or incompatible mount options [ 342.136944][T19832] loop3: detected capacity change from 0 to 264192 [ 342.144020][T19823] EXT4-fs warning (device loop1): ext4_enable_quotas:6363: Failed to enable quota tracking (type=0, err=-22). Please run e2fsck to fix. [ 342.175259][T19823] EXT4-fs (loop1): mount failed 17:08:38 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc01000a, 0xb, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000003980)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d0f465001000005fd0f4655f00000000000001", 0x1b, 0x11100}], 0x0, &(0x7f00000000c0)) 17:08:38 executing program 2: clock_adjtime(0x7, &(0x7f0000000000)={0x8000, 0x62, 0xff, 0x1, 0x3, 0x1ff, 0x3ff, 0x4, 0xff, 0x20, 0x6, 0x401, 0x20, 0x0, 0x1ff, 0x8000, 0xfffffffffffffffd, 0x400, 0x8, 0x100000000, 0x2, 0x8, 0xf32, 0x4, 0x6, 0x80}) clock_adjtime(0x2, &(0x7f0000000100)={0xd9, 0x9, 0x1, 0x2, 0x1f, 0x78, 0x4b1, 0x0, 0x401, 0x5, 0x8, 0x1, 0x101, 0x100000001, 0x7, 0x1fc, 0x9, 0x9, 0x0, 0x9, 0x8, 0x3, 0xff, 0x7, 0x73, 0x946c}) clock_adjtime(0x6, &(0x7f0000000200)={0x4, 0x1, 0x100, 0x6, 0x2, 0x6, 0x1, 0x1dd, 0x9, 0x1000000000000000, 0x0, 0x6, 0x1, 0x1, 0x9, 0x5, 0x3023, 0x2, 0x4, 0xfffffffffffffff9, 0x429, 0x3, 0x0, 0x9, 0xffffffffffffff05, 0x1000}) clock_adjtime(0x3, &(0x7f0000000300)={0x0, 0x8, 0x9, 0x9, 0x9, 0x9, 0x6, 0x9, 0x8, 0x1, 0xd0fc, 0x55, 0x2, 0x0, 0x1, 0x1f, 0x100000001, 0x8f44, 0x53, 0x0, 0x3, 0x140000000000, 0x9, 0x8000, 0x0, 0x10001}) r0 = syz_mount_image$iso9660(&(0x7f0000000400), &(0x7f0000000440)='./file0\x00', 0x4, 0x1, &(0x7f0000000480)=[{0xfffffffffffffffe, 0x0, 0x3}], 0x2014400, &(0x7f00000004c0)={[{@check_relaxed}, {@dmode}, {@check_relaxed}], [{@euid_lt={'euid<', 0xee01}}, {@euid_eq}, {@rootcontext={'rootcontext', 0x3d, 'staff_u'}}, {@obj_user={'obj_user', 0x3d, '#-_'}}, {@rootcontext={'rootcontext', 0x3d, 'staff_u'}}]}) faccessat(r0, &(0x7f0000000580)='./file0\x00', 0x88) clock_adjtime(0x4, &(0x7f00000005c0)={0x80000000, 0x100000000, 0xba, 0x80000000, 0x4, 0x20d4e190, 0x7, 0x400, 0x33, 0x7a, 0x1, 0x465d, 0x7f, 0x5, 0x3, 0x1, 0x0, 0x8, 0x7, 0x7ff, 0x1, 0x4, 0x3f, 0x7fff, 0x700b, 0x96}) r1 = accept$unix(0xffffffffffffffff, 0x0, &(0x7f00000006c0)) getsockname$unix(r1, &(0x7f0000000700), &(0x7f0000000780)=0x6e) clock_adjtime(0x3, &(0x7f00000007c0)={0x6, 0x6, 0x7, 0x8000, 0x7ff, 0x5c, 0x401, 0x2, 0x9, 0x4, 0x0, 0x61, 0x2, 0x9b71, 0x100000000, 0x7fffffff, 0x322, 0xc70d, 0x9, 0xd, 0x9, 0x0, 0x9, 0x1a1f00000000, 0xffffffffffffffff, 0x9}) clock_adjtime(0x6, &(0x7f00000008c0)={0x4, 0x9, 0x3, 0xfffffffffffffff7, 0xb31, 0x1, 0x1, 0x2, 0x538, 0x0, 0x401, 0x1, 0xdd, 0xfffffffffffffff7, 0xec54, 0x4, 0x100000001, 0x0, 0xa, 0x1, 0x7ff, 0xcd, 0xf2, 0x80, 0x7, 0x8000}) clock_adjtime(0x0, &(0x7f00000009c0)={0x8, 0xff, 0x81, 0x2, 0x100000001, 0x11, 0x5, 0x1, 0x1, 0x9, 0x1000, 0x8, 0xdf6c, 0x9, 0x8, 0x1004000000000000, 0x1ff, 0x3, 0x6, 0xf5, 0x80000, 0x1, 0xfffffffffffffd6d, 0x2, 0x6, 0xfa}) r2 = socket$unix(0x1, 0x5, 0x0) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f0000000ac0)={'wlan0\x00'}) mq_timedreceive(0xffffffffffffffff, &(0x7f0000000b00)=""/4096, 0x1000, 0x80, &(0x7f0000001b00)={0x0, 0x989680}) r3 = creat(&(0x7f0000001b40)='./file0\x00', 0x1) mknodat(r3, &(0x7f0000001b80)='./file1\x00', 0x4, 0x0) clock_adjtime(0x0, &(0x7f0000001bc0)={0xfff, 0x7fff, 0x1000000, 0x2, 0xfdc, 0x54, 0x8fa, 0x3f41, 0x0, 0x4, 0x4, 0x5, 0x101, 0x5, 0x4, 0x9, 0x9, 0x30e, 0x3f, 0x2, 0x7f, 0x7, 0x6, 0x4, 0x3ff, 0x100000000}) clock_adjtime(0x2, &(0x7f0000001cc0)={0x0, 0x6, 0x7, 0xe5, 0x5, 0x6, 0x10, 0x7, 0x281, 0x40, 0x1, 0x0, 0x1, 0x10001, 0x5, 0x100, 0x0, 0x4, 0xffffffffffffe001, 0xdf, 0x7f, 0x8000, 0x9, 0x400, 0xfffffffffffffe00, 0x3f}) 17:08:38 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc01000a, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700", 0x63, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000003980)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d0f465001000005fd0f4655f00000000000001000c000000100008", 0x23, 0x11100}], 0x0, &(0x7f00000000c0)) [ 342.182008][T19832] EXT4-fs (loop3): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: none. [ 342.203170][T19832] ext4 filesystem being mounted at /root/syzkaller-testdir350550748/syzkaller.ONiyFI/924/file0 supports timestamps until 2038 (0x7fffffff) [ 342.213905][T19834] EXT4-fs error (device loop5): ext4_quota_enable:6323: comm syz-executor.5: Bad quota inode # 3 [ 342.232121][T19827] EXT4-fs error (device loop4): ext4_ext_check_inode:497: inode #3: comm syz-executor.4: pblk 0 bad header/extent: invalid extent entries - magic f30a, entries 1, max 4(4), depth 0(0) [ 342.254943][T19827] EXT4-fs error (device loop4): ext4_quota_enable:6323: comm syz-executor.4: Bad quota inode # 3 [ 342.263488][T19851] SELinux: duplicate or incompatible mount options [ 342.265678][T19846] loop0: detected capacity change from 0 to 264192 17:08:38 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc01000a, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="200204008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000003980)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d9", 0x4, 0x6800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d0f465001000005fd0f4655f00000000000001000c00000010000800000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}], 0x0, &(0x7f00000000c0)) [ 342.275652][T19834] EXT4-fs warning (device loop5): ext4_enable_quotas:6363: Failed to enable quota tracking (type=0, err=-116). Please run e2fsck to fix. [ 342.280488][T19849] loop1: detected capacity change from 0 to 264192 [ 342.294955][T19827] EXT4-fs warning (device loop4): ext4_enable_quotas:6363: Failed to enable quota tracking (type=0, err=-117). Please run e2fsck to fix. [ 342.300207][T19834] EXT4-fs (loop5): mount failed [ 342.318980][T19827] EXT4-fs (loop4): mount failed [ 342.325344][T19846] EXT4-fs (loop0): inodes count not valid: 196640 vs 32 17:08:38 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc01000a, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="200604008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000003980)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d9", 0x4, 0x6800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d0f465001000005fd0f4655f00000000000001000c00000010000800000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}], 0x0, &(0x7f00000000c0)) [ 342.391962][T19849] EXT4-fs warning (device loop1): ext4_enable_quotas:6363: Failed to enable quota tracking (type=0, err=-22). Please run e2fsck to fix. [ 342.423072][T19849] EXT4-fs (loop1): mount failed 17:08:38 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc01000a, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000003980)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d0f465001000005fd0f4655f00000000000001000c00000010000800000000000af3010004", 0x2d, 0x11100}], 0x0, &(0x7f00000000c0)) (fail_nth: 36) [ 342.460904][T19857] loop3: detected capacity change from 0 to 264192 [ 342.470979][T19860] loop0: detected capacity change from 0 to 264192 [ 342.482397][T19863] FAULT_INJECTION: forcing a failure. [ 342.482397][T19863] name failslab, interval 1, probability 0, space 0, times 0 [ 342.495105][T19863] CPU: 0 PID: 19863 Comm: syz-executor.4 Not tainted 5.16.0-syzkaller #0 [ 342.503532][T19863] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 342.513680][T19863] Call Trace: [ 342.516965][T19863] [ 342.519981][T19863] dump_stack_lvl+0xd6/0x122 [ 342.524578][T19863] dump_stack+0x11/0x1b [ 342.528810][T19863] should_fail+0x23c/0x250 [ 342.533273][T19863] ? __kernfs_new_node+0x6a/0x340 [ 342.538291][T19863] __should_failslab+0x81/0x90 [ 342.543046][T19863] should_failslab+0x5/0x20 [ 342.547540][T19863] kmem_cache_alloc+0x4f/0x320 [ 342.552328][T19863] ? __down_write_common+0x42/0x7b0 [ 342.557568][T19863] __kernfs_new_node+0x6a/0x340 [ 342.562413][T19863] ? up_write+0x25/0xc0 [ 342.566693][T19863] kernfs_new_node+0x5b/0xd0 [ 342.571270][T19863] __kernfs_create_file+0x45/0x1a0 [ 342.576475][T19863] ? dev_attr_show+0x90/0x90 [ 342.581052][T19863] sysfs_add_file_mode_ns+0x10b/0x1d0 [ 342.586413][T19863] internal_create_group+0x2dd/0x840 [ 342.591690][T19863] sysfs_create_group+0x1b/0x20 [ 342.596525][T19863] loop_configure+0xc58/0xf30 [ 342.601234][T19863] lo_ioctl+0x583/0x1270 [ 342.605541][T19863] ? folio_mark_dirty+0x84/0xe0 [ 342.610388][T19863] ? unlock_page+0x37/0x50 [ 342.614809][T19863] ? __rcu_read_unlock+0x5c/0x290 [ 342.619844][T19863] ? blkdev_common_ioctl+0x438/0x1180 [ 342.625217][T19863] ? selinux_file_ioctl+0x522/0x590 [ 342.630471][T19863] ? do_vfs_ioctl+0x819/0x14a0 [ 342.635227][T19863] ? lo_release+0x120/0x120 [ 342.639719][T19863] blkdev_ioctl+0x20e/0x440 [ 342.644210][T19863] ? blkdev_compat_ptr_ioctl+0x80/0x80 [ 342.649698][T19863] __se_sys_ioctl+0xcb/0x140 [ 342.654296][T19863] __x64_sys_ioctl+0x3f/0x50 [ 342.658992][T19863] do_syscall_64+0x44/0xd0 [ 342.663397][T19863] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 342.669279][T19863] RIP: 0033:0x7f6f94c22c57 [ 342.673695][T19863] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 04 54 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 342.693337][T19863] RSP: 002b:00007f6f93d98f28 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 342.701739][T19863] RAX: ffffffffffffffda RBX: 00007f6f94c6c9c8 RCX: 00007f6f94c22c57 17:08:43 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc01000a, 0x17, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000003980)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="80", 0x1, 0x11100}], 0x0, &(0x7f00000000c0)) 17:08:43 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc01000a, 0xc, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000003980)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d0f465001000005fd0f4655f00000000000001", 0x1b, 0x11100}], 0x0, &(0x7f00000000c0)) [ 342.709767][T19863] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 342.717722][T19863] RBP: 0000000000000005 R08: 0000000000000000 R09: 00007f6f93d991d0 [ 342.725677][T19863] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 342.733630][T19863] R13: 0000000000000004 R14: 00000000200002a8 R15: 0000000000000007 [ 342.741644][T19863] 17:08:43 executing program 2: clock_adjtime(0x7, &(0x7f0000000000)={0x8000, 0x62, 0xff, 0x1, 0x3, 0x1ff, 0x3ff, 0x4, 0xff, 0x20, 0x6, 0x401, 0x20, 0x0, 0x1ff, 0x8000, 0xfffffffffffffffd, 0x400, 0x8, 0x100000000, 0x2, 0x8, 0xf32, 0x4, 0x6, 0x80}) clock_adjtime(0x2, &(0x7f0000000100)={0xd9, 0x9, 0x1, 0x2, 0x1f, 0x78, 0x4b1, 0x0, 0x401, 0x5, 0x8, 0x1, 0x101, 0x100000001, 0x7, 0x1fc, 0x9, 0x9, 0x0, 0x9, 0x8, 0x3, 0xff, 0x7, 0x73, 0x946c}) clock_adjtime(0x6, &(0x7f0000000200)={0x4, 0x1, 0x100, 0x6, 0x2, 0x6, 0x1, 0x1dd, 0x9, 0x1000000000000000, 0x0, 0x6, 0x1, 0x1, 0x9, 0x5, 0x3023, 0x2, 0x4, 0xfffffffffffffff9, 0x429, 0x3, 0x0, 0x9, 0xffffffffffffff05, 0x1000}) clock_adjtime(0x3, &(0x7f0000000300)={0x0, 0x8, 0x9, 0x9, 0x9, 0x9, 0x6, 0x9, 0x8, 0x1, 0xd0fc, 0x55, 0x2, 0x0, 0x1, 0x1f, 0x100000001, 0x8f44, 0x53, 0x0, 0x3, 0x140000000000, 0x9, 0x8000, 0x0, 0x10001}) r0 = syz_mount_image$iso9660(&(0x7f0000000400), &(0x7f0000000440)='./file0\x00', 0x4, 0x1, &(0x7f0000000480)=[{0xfffffffffffffffe, 0x0, 0x3}], 0x2014400, &(0x7f00000004c0)={[{@check_relaxed}, {@dmode}, {@check_relaxed}], [{@euid_lt={'euid<', 0xee01}}, {@euid_eq}, {@rootcontext={'rootcontext', 0x3d, 'staff_u'}}, {@obj_user={'obj_user', 0x3d, '#-_'}}, {@rootcontext={'rootcontext', 0x3d, 'staff_u'}}]}) faccessat(r0, &(0x7f0000000580)='./file0\x00', 0x88) clock_adjtime(0x4, &(0x7f00000005c0)={0x80000000, 0x100000000, 0xba, 0x80000000, 0x4, 0x20d4e190, 0x7, 0x400, 0x33, 0x7a, 0x1, 0x465d, 0x7f, 0x5, 0x3, 0x1, 0x0, 0x8, 0x7, 0x7ff, 0x1, 0x4, 0x3f, 0x7fff, 0x700b, 0x96}) r1 = accept$unix(0xffffffffffffffff, 0x0, &(0x7f00000006c0)) getsockname$unix(r1, &(0x7f0000000700), &(0x7f0000000780)=0x6e) clock_adjtime(0x3, &(0x7f00000007c0)={0x6, 0x6, 0x7, 0x8000, 0x7ff, 0x5c, 0x401, 0x2, 0x9, 0x4, 0x0, 0x61, 0x2, 0x9b71, 0x100000000, 0x7fffffff, 0x322, 0xc70d, 0x9, 0xd, 0x9, 0x0, 0x9, 0x1a1f00000000, 0xffffffffffffffff, 0x9}) clock_adjtime(0x6, &(0x7f00000008c0)={0x4, 0x9, 0x3, 0xfffffffffffffff7, 0xb31, 0x1, 0x1, 0x2, 0x538, 0x0, 0x401, 0x1, 0xdd, 0xfffffffffffffff7, 0xec54, 0x4, 0x100000001, 0x0, 0xa, 0x1, 0x7ff, 0xcd, 0xf2, 0x80, 0x7, 0x8000}) clock_adjtime(0x0, &(0x7f00000009c0)={0x8, 0xff, 0x81, 0x2, 0x100000001, 0x11, 0x5, 0x1, 0x1, 0x9, 0x1000, 0x8, 0xdf6c, 0x9, 0x8, 0x1004000000000000, 0x1ff, 0x3, 0x6, 0xf5, 0x80000, 0x1, 0xfffffffffffffd6d, 0x2, 0x6, 0xfa}) r2 = socket$unix(0x1, 0x5, 0x0) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f0000000ac0)={'wlan0\x00'}) mq_timedreceive(0xffffffffffffffff, &(0x7f0000000b00)=""/4096, 0x1000, 0x80, &(0x7f0000001b00)={0x0, 0x989680}) r3 = creat(&(0x7f0000001b40)='./file0\x00', 0x1) mknodat(r3, &(0x7f0000001b80)='./file1\x00', 0x4, 0x0) clock_adjtime(0x0, &(0x7f0000001bc0)={0xfff, 0x7fff, 0x2000000, 0x2, 0xfdc, 0x54, 0x8fa, 0x3f41, 0x0, 0x4, 0x4, 0x5, 0x101, 0x5, 0x4, 0x9, 0x9, 0x30e, 0x3f, 0x2, 0x7f, 0x7, 0x6, 0x4, 0x3ff, 0x100000000}) clock_adjtime(0x2, &(0x7f0000001cc0)={0x0, 0x6, 0x7, 0xe5, 0x5, 0x6, 0x10, 0x7, 0x281, 0x40, 0x1, 0x0, 0x1, 0x10001, 0x5, 0x100, 0x0, 0x4, 0xffffffffffffe001, 0xdf, 0x7f, 0x8000, 0x9, 0x400, 0xfffffffffffffe00, 0x3f}) 17:08:43 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc01000a, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="201004008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000003980)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d9", 0x4, 0x6800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d0f465001000005fd0f4655f00000000000001000c00000010000800000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}], 0x0, &(0x7f00000000c0)) [ 342.756405][T19860] EXT4-fs (loop0): inodes count not valid: 263712 vs 32 [ 342.759407][T19866] loop5: detected capacity change from 0 to 264192 [ 342.777013][T19869] loop1: detected capacity change from 0 to 264192 [ 342.782119][T19870] SELinux: duplicate or incompatible mount options [ 342.805890][T19863] loop4: detected capacity change from 0 to 264192 [ 342.825399][T19869] EXT4-fs warning (device loop1): ext4_enable_quotas:6363: Failed to enable quota tracking (type=0, err=-22). Please run e2fsck to fix. [ 342.842735][T19866] EXT4-fs error (device loop5): ext4_quota_enable:6323: comm syz-executor.5: Bad quota inode # 3 [ 342.854327][T19857] EXT4-fs (loop3): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: none. [ 342.871592][T19879] loop0: detected capacity change from 0 to 264192 [ 342.873635][T19869] EXT4-fs (loop1): mount failed [ 342.900072][T19866] EXT4-fs warning (device loop5): ext4_enable_quotas:6363: Failed to enable quota tracking (type=0, err=-116). Please run e2fsck to fix. [ 342.914569][T19866] EXT4-fs (loop5): mount failed 17:08:47 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc01000a, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700", 0x63, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000003980)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d0f465001000005fd0f4655f00000000000001000c000000100008", 0x23, 0x11100}], 0x0, &(0x7f00000000c0)) 17:08:47 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc01000a, 0x18, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000003980)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="80", 0x1, 0x11100}], 0x0, &(0x7f00000000c0)) 17:08:47 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc01000a, 0x19, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000003980)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="80", 0x1, 0x11100}], 0x0, &(0x7f00000000c0)) [ 342.919990][T19857] ext4 filesystem being mounted at /root/syzkaller-testdir350550748/syzkaller.ONiyFI/925/file0 supports timestamps until 2038 (0x7fffffff) [ 342.934553][T19863] EXT4-fs error (device loop4): ext4_ext_check_inode:497: inode #3: comm syz-executor.4: pblk 0 bad header/extent: invalid extent entries - magic f30a, entries 1, max 4(4), depth 0(0) 17:08:47 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc01000a, 0xe, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000003980)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d0f465001000005fd0f4655f00000000000001", 0x1b, 0x11100}], 0x0, &(0x7f00000000c0)) [ 342.994747][T19863] EXT4-fs error (device loop4): ext4_quota_enable:6323: comm syz-executor.4: Bad quota inode # 3 [ 343.007290][T19863] EXT4-fs warning (device loop4): ext4_enable_quotas:6363: Failed to enable quota tracking (type=0, err=-117). Please run e2fsck to fix. [ 343.007633][T19879] EXT4-fs (loop0): inodes count not valid: 266272 vs 32 17:08:47 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc01000a, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b00000080000000080000005247000062", 0x65, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000003980)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d0f465001000005fd0f4655f00000000000001000c000000100008", 0x23, 0x11100}], 0x0, &(0x7f00000000c0)) 17:08:47 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc01000a, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="200005008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000003980)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d9", 0x4, 0x6800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d0f465001000005fd0f4655f00000000000001000c00000010000800000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}], 0x0, &(0x7f00000000c0)) 17:08:47 executing program 2: clock_adjtime(0x7, &(0x7f0000000000)={0x8000, 0x62, 0xff, 0x1, 0x3, 0x1ff, 0x3ff, 0x4, 0xff, 0x20, 0x6, 0x401, 0x20, 0x0, 0x1ff, 0x8000, 0xfffffffffffffffd, 0x400, 0x8, 0x100000000, 0x2, 0x8, 0xf32, 0x4, 0x6, 0x80}) clock_adjtime(0x2, &(0x7f0000000100)={0xd9, 0x9, 0x1, 0x2, 0x1f, 0x78, 0x4b1, 0x0, 0x401, 0x5, 0x8, 0x1, 0x101, 0x100000001, 0x7, 0x1fc, 0x9, 0x9, 0x0, 0x9, 0x8, 0x3, 0xff, 0x7, 0x73, 0x946c}) clock_adjtime(0x6, &(0x7f0000000200)={0x4, 0x1, 0x100, 0x6, 0x2, 0x6, 0x1, 0x1dd, 0x9, 0x1000000000000000, 0x0, 0x6, 0x1, 0x1, 0x9, 0x5, 0x3023, 0x2, 0x4, 0xfffffffffffffff9, 0x429, 0x3, 0x0, 0x9, 0xffffffffffffff05, 0x1000}) clock_adjtime(0x3, &(0x7f0000000300)={0x0, 0x8, 0x9, 0x9, 0x9, 0x9, 0x6, 0x9, 0x8, 0x1, 0xd0fc, 0x55, 0x2, 0x0, 0x1, 0x1f, 0x100000001, 0x8f44, 0x53, 0x0, 0x3, 0x140000000000, 0x9, 0x8000, 0x0, 0x10001}) r0 = syz_mount_image$iso9660(&(0x7f0000000400), &(0x7f0000000440)='./file0\x00', 0x4, 0x1, &(0x7f0000000480)=[{0xfffffffffffffffe, 0x0, 0x3}], 0x2014400, &(0x7f00000004c0)={[{@check_relaxed}, {@dmode}, {@check_relaxed}], [{@euid_lt={'euid<', 0xee01}}, {@euid_eq}, {@rootcontext={'rootcontext', 0x3d, 'staff_u'}}, {@obj_user={'obj_user', 0x3d, '#-_'}}, {@rootcontext={'rootcontext', 0x3d, 'staff_u'}}]}) faccessat(r0, &(0x7f0000000580)='./file0\x00', 0x88) clock_adjtime(0x4, &(0x7f00000005c0)={0x80000000, 0x100000000, 0xba, 0x80000000, 0x4, 0x20d4e190, 0x7, 0x400, 0x33, 0x7a, 0x1, 0x465d, 0x7f, 0x5, 0x3, 0x1, 0x0, 0x8, 0x7, 0x7ff, 0x1, 0x4, 0x3f, 0x7fff, 0x700b, 0x96}) r1 = accept$unix(0xffffffffffffffff, 0x0, &(0x7f00000006c0)) getsockname$unix(r1, &(0x7f0000000700), &(0x7f0000000780)=0x6e) clock_adjtime(0x3, &(0x7f00000007c0)={0x6, 0x6, 0x7, 0x8000, 0x7ff, 0x5c, 0x401, 0x2, 0x9, 0x4, 0x0, 0x61, 0x2, 0x9b71, 0x100000000, 0x7fffffff, 0x322, 0xc70d, 0x9, 0xd, 0x9, 0x0, 0x9, 0x1a1f00000000, 0xffffffffffffffff, 0x9}) clock_adjtime(0x6, &(0x7f00000008c0)={0x4, 0x9, 0x3, 0xfffffffffffffff7, 0xb31, 0x1, 0x1, 0x2, 0x538, 0x0, 0x401, 0x1, 0xdd, 0xfffffffffffffff7, 0xec54, 0x4, 0x100000001, 0x0, 0xa, 0x1, 0x7ff, 0xcd, 0xf2, 0x80, 0x7, 0x8000}) clock_adjtime(0x0, &(0x7f00000009c0)={0x8, 0xff, 0x81, 0x2, 0x100000001, 0x11, 0x5, 0x1, 0x1, 0x9, 0x1000, 0x8, 0xdf6c, 0x9, 0x8, 0x1004000000000000, 0x1ff, 0x3, 0x6, 0xf5, 0x80000, 0x1, 0xfffffffffffffd6d, 0x2, 0x6, 0xfa}) r2 = socket$unix(0x1, 0x5, 0x0) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f0000000ac0)={'wlan0\x00'}) mq_timedreceive(0xffffffffffffffff, &(0x7f0000000b00)=""/4096, 0x1000, 0x80, &(0x7f0000001b00)={0x0, 0x989680}) r3 = creat(&(0x7f0000001b40)='./file0\x00', 0x1) mknodat(r3, &(0x7f0000001b80)='./file1\x00', 0x4, 0x0) clock_adjtime(0x0, &(0x7f0000001bc0)={0xfff, 0x7fff, 0x3000000, 0x2, 0xfdc, 0x54, 0x8fa, 0x3f41, 0x0, 0x4, 0x4, 0x5, 0x101, 0x5, 0x4, 0x9, 0x9, 0x30e, 0x3f, 0x2, 0x7f, 0x7, 0x6, 0x4, 0x3ff, 0x100000000}) clock_adjtime(0x2, &(0x7f0000001cc0)={0x0, 0x6, 0x7, 0xe5, 0x5, 0x6, 0x10, 0x7, 0x281, 0x40, 0x1, 0x0, 0x1, 0x10001, 0x5, 0x100, 0x0, 0x4, 0xffffffffffffe001, 0xdf, 0x7f, 0x8000, 0x9, 0x400, 0xfffffffffffffe00, 0x3f}) [ 343.041031][T19863] EXT4-fs (loop4): mount failed [ 343.063168][T19891] loop5: detected capacity change from 0 to 264192 17:08:47 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc01000a, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000003980)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d0f465001000005fd0f4655f00000000000001000c00000010000800000000000af3010004", 0x2d, 0x11100}], 0x0, &(0x7f00000000c0)) (fail_nth: 37) [ 343.087810][T19892] loop1: detected capacity change from 0 to 264192 [ 343.104698][T19893] loop3: detected capacity change from 0 to 264192 [ 343.129335][T19891] EXT4-fs error (device loop5): ext4_quota_enable:6323: comm syz-executor.5: Bad quota inode # 3 [ 343.142368][T19891] EXT4-fs warning (device loop5): ext4_enable_quotas:6363: Failed to enable quota tracking (type=0, err=-116). Please run e2fsck to fix. [ 343.159504][T19895] loop0: detected capacity change from 0 to 264192 [ 343.167023][T19895] EXT4-fs (loop0): inodes count not valid: 327712 vs 32 17:08:47 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc01000a, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="200406008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000003980)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d9", 0x4, 0x6800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d0f465001000005fd0f4655f00000000000001000c00000010000800000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}], 0x0, &(0x7f00000000c0)) [ 343.180954][T19891] EXT4-fs (loop5): mount failed [ 343.187618][T19900] SELinux: duplicate or incompatible mount options [ 343.193283][T19903] FAULT_INJECTION: forcing a failure. [ 343.193283][T19903] name failslab, interval 1, probability 0, space 0, times 0 [ 343.207101][T19903] CPU: 0 PID: 19903 Comm: syz-executor.4 Not tainted 5.16.0-syzkaller #0 [ 343.215513][T19903] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 343.225663][T19903] Call Trace: [ 343.228927][T19903] [ 343.231843][T19903] dump_stack_lvl+0xd6/0x122 [ 343.236445][T19903] dump_stack+0x11/0x1b [ 343.240587][T19903] should_fail+0x23c/0x250 [ 343.244983][T19903] ? __kernfs_new_node+0x6a/0x340 [ 343.249993][T19903] __should_failslab+0x81/0x90 [ 343.254806][T19903] should_failslab+0x5/0x20 [ 343.259303][T19903] kmem_cache_alloc+0x4f/0x320 [ 343.264055][T19903] ? __down_write_common+0x42/0x7b0 [ 343.269279][T19903] __kernfs_new_node+0x6a/0x340 [ 343.274117][T19903] ? up_write+0x25/0xc0 [ 343.278314][T19903] kernfs_new_node+0x5b/0xd0 [ 343.282958][T19903] __kernfs_create_file+0x45/0x1a0 [ 343.288134][T19903] ? dev_attr_show+0x90/0x90 [ 343.292746][T19903] sysfs_add_file_mode_ns+0x10b/0x1d0 [ 343.298114][T19903] internal_create_group+0x2dd/0x840 [ 343.303460][T19903] sysfs_create_group+0x1b/0x20 [ 343.308364][T19903] loop_configure+0xc58/0xf30 [ 343.313092][T19903] lo_ioctl+0x583/0x1270 [ 343.317398][T19903] ? folio_mark_dirty+0x84/0xe0 [ 343.322345][T19903] ? unlock_page+0x37/0x50 [ 343.326745][T19903] ? __rcu_read_unlock+0x5c/0x290 [ 343.331759][T19903] ? debug_smp_processor_id+0x18/0x20 [ 343.337213][T19903] ? blkdev_common_ioctl+0x438/0x1180 [ 343.342730][T19903] ? blkdev_ioctl+0x65/0x440 [ 343.347402][T19903] ? lo_release+0x120/0x120 [ 343.351961][T19903] blkdev_ioctl+0x20e/0x440 [ 343.356502][T19903] ? blkdev_compat_ptr_ioctl+0x80/0x80 [ 343.362020][T19903] __se_sys_ioctl+0xcb/0x140 [ 343.366668][T19903] __x64_sys_ioctl+0x3f/0x50 [ 343.371294][T19903] do_syscall_64+0x44/0xd0 [ 343.375722][T19903] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 343.381740][T19903] RIP: 0033:0x7f6f94c22c57 [ 343.386155][T19903] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 04 54 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 343.405776][T19903] RSP: 002b:00007f6f93d98f28 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 343.414169][T19903] RAX: ffffffffffffffda RBX: 00007f6f94c6c9c8 RCX: 00007f6f94c22c57 [ 343.422122][T19903] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 343.430143][T19903] RBP: 0000000000000005 R08: 0000000000000000 R09: 00007f6f93d991d0 [ 343.438122][T19903] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 343.446095][T19903] R13: 0000000000000004 R14: 00000000200002a8 R15: 0000000000000007 [ 343.454061][T19903] [ 343.463209][T19892] EXT4-fs warning (device loop1): ext4_enable_quotas:6363: Failed to enable quota tracking (type=0, err=-22). Please run e2fsck to fix. 17:08:47 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc01000a, 0x1a, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000003980)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="80", 0x1, 0x11100}], 0x0, &(0x7f00000000c0)) 17:08:51 executing program 2: clock_adjtime(0x7, &(0x7f0000000000)={0x8000, 0x62, 0xff, 0x1, 0x3, 0x1ff, 0x3ff, 0x4, 0xff, 0x20, 0x6, 0x401, 0x20, 0x0, 0x1ff, 0x8000, 0xfffffffffffffffd, 0x400, 0x8, 0x100000000, 0x2, 0x8, 0xf32, 0x4, 0x6, 0x80}) clock_adjtime(0x2, &(0x7f0000000100)={0xd9, 0x9, 0x1, 0x2, 0x1f, 0x78, 0x4b1, 0x0, 0x401, 0x5, 0x8, 0x1, 0x101, 0x100000001, 0x7, 0x1fc, 0x9, 0x9, 0x0, 0x9, 0x8, 0x3, 0xff, 0x7, 0x73, 0x946c}) clock_adjtime(0x6, &(0x7f0000000200)={0x4, 0x1, 0x100, 0x6, 0x2, 0x6, 0x1, 0x1dd, 0x9, 0x1000000000000000, 0x0, 0x6, 0x1, 0x1, 0x9, 0x5, 0x3023, 0x2, 0x4, 0xfffffffffffffff9, 0x429, 0x3, 0x0, 0x9, 0xffffffffffffff05, 0x1000}) clock_adjtime(0x3, &(0x7f0000000300)={0x0, 0x8, 0x9, 0x9, 0x9, 0x9, 0x6, 0x9, 0x8, 0x1, 0xd0fc, 0x55, 0x2, 0x0, 0x1, 0x1f, 0x100000001, 0x8f44, 0x53, 0x0, 0x3, 0x140000000000, 0x9, 0x8000, 0x0, 0x10001}) r0 = syz_mount_image$iso9660(&(0x7f0000000400), &(0x7f0000000440)='./file0\x00', 0x4, 0x1, &(0x7f0000000480)=[{0xfffffffffffffffe, 0x0, 0x3}], 0x2014400, &(0x7f00000004c0)={[{@check_relaxed}, {@dmode}, {@check_relaxed}], [{@euid_lt={'euid<', 0xee01}}, {@euid_eq}, {@rootcontext={'rootcontext', 0x3d, 'staff_u'}}, {@obj_user={'obj_user', 0x3d, '#-_'}}, {@rootcontext={'rootcontext', 0x3d, 'staff_u'}}]}) faccessat(r0, &(0x7f0000000580)='./file0\x00', 0x88) clock_adjtime(0x4, &(0x7f00000005c0)={0x80000000, 0x100000000, 0xba, 0x80000000, 0x4, 0x20d4e190, 0x7, 0x400, 0x33, 0x7a, 0x1, 0x465d, 0x7f, 0x5, 0x3, 0x1, 0x0, 0x8, 0x7, 0x7ff, 0x1, 0x4, 0x3f, 0x7fff, 0x700b, 0x96}) r1 = accept$unix(0xffffffffffffffff, 0x0, &(0x7f00000006c0)) getsockname$unix(r1, &(0x7f0000000700), &(0x7f0000000780)=0x6e) clock_adjtime(0x3, &(0x7f00000007c0)={0x6, 0x6, 0x7, 0x8000, 0x7ff, 0x5c, 0x401, 0x2, 0x9, 0x4, 0x0, 0x61, 0x2, 0x9b71, 0x100000000, 0x7fffffff, 0x322, 0xc70d, 0x9, 0xd, 0x9, 0x0, 0x9, 0x1a1f00000000, 0xffffffffffffffff, 0x9}) clock_adjtime(0x6, &(0x7f00000008c0)={0x4, 0x9, 0x3, 0xfffffffffffffff7, 0xb31, 0x1, 0x1, 0x2, 0x538, 0x0, 0x401, 0x1, 0xdd, 0xfffffffffffffff7, 0xec54, 0x4, 0x100000001, 0x0, 0xa, 0x1, 0x7ff, 0xcd, 0xf2, 0x80, 0x7, 0x8000}) clock_adjtime(0x0, &(0x7f00000009c0)={0x8, 0xff, 0x81, 0x2, 0x100000001, 0x11, 0x5, 0x1, 0x1, 0x9, 0x1000, 0x8, 0xdf6c, 0x9, 0x8, 0x1004000000000000, 0x1ff, 0x3, 0x6, 0xf5, 0x80000, 0x1, 0xfffffffffffffd6d, 0x2, 0x6, 0xfa}) r2 = socket$unix(0x1, 0x5, 0x0) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f0000000ac0)={'wlan0\x00'}) mq_timedreceive(0xffffffffffffffff, &(0x7f0000000b00)=""/4096, 0x1000, 0x80, &(0x7f0000001b00)={0x0, 0x989680}) r3 = creat(&(0x7f0000001b40)='./file0\x00', 0x1) mknodat(r3, &(0x7f0000001b80)='./file1\x00', 0x4, 0x0) clock_adjtime(0x0, &(0x7f0000001bc0)={0xfff, 0x7fff, 0x7000000, 0x2, 0xfdc, 0x54, 0x8fa, 0x3f41, 0x0, 0x4, 0x4, 0x5, 0x101, 0x5, 0x4, 0x9, 0x9, 0x30e, 0x3f, 0x2, 0x7f, 0x7, 0x6, 0x4, 0x3ff, 0x100000000}) clock_adjtime(0x2, &(0x7f0000001cc0)={0x0, 0x6, 0x7, 0xe5, 0x5, 0x6, 0x10, 0x7, 0x281, 0x40, 0x1, 0x0, 0x1, 0x10001, 0x5, 0x100, 0x0, 0x4, 0xffffffffffffe001, 0xdf, 0x7f, 0x8000, 0x9, 0x400, 0xfffffffffffffe00, 0x3f}) 17:08:51 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc01000a, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="200007008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000003980)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d9", 0x4, 0x6800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d0f465001000005fd0f4655f00000000000001000c00000010000800000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}], 0x0, &(0x7f00000000c0)) [ 343.501445][T19892] EXT4-fs (loop1): mount failed [ 343.513634][T19903] loop4: detected capacity change from 0 to 264192 [ 343.524522][T19893] EXT4-fs (loop3): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: none. 17:08:51 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc01000a, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b00000080000000080000005247000062", 0x65, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000003980)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d0f465001000005fd0f4655f00000000000001000c000000100008", 0x23, 0x11100}], 0x0, &(0x7f00000000c0)) 17:08:51 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc01000a, 0xf, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000003980)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d0f465001000005fd0f4655f00000000000001", 0x1b, 0x11100}], 0x0, &(0x7f00000000c0)) [ 343.540362][T19893] ext4 filesystem being mounted at /root/syzkaller-testdir350550748/syzkaller.ONiyFI/927/file0 supports timestamps until 2038 (0x7fffffff) [ 343.570026][T19912] SELinux: duplicate or incompatible mount options [ 343.585140][T19917] loop5: detected capacity change from 0 to 264192 [ 343.594904][T19918] loop0: detected capacity change from 0 to 264192 [ 343.604320][T19903] EXT4-fs error (device loop4): ext4_ext_check_inode:497: inode #3: comm syz-executor.4: pblk 0 bad header/extent: invalid extent entries - magic f30a, entries 1, max 4(4), depth 0(0) [ 343.636357][T19920] loop1: detected capacity change from 0 to 264192 [ 343.646162][T19903] EXT4-fs error (device loop4): ext4_quota_enable:6323: comm syz-executor.4: Bad quota inode # 3 [ 343.663410][T19918] EXT4-fs (loop0): inodes count not valid: 458784 vs 32 [ 343.688289][T19924] loop3: detected capacity change from 0 to 264192 17:08:56 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc01000a, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="200009008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000003980)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d9", 0x4, 0x6800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d0f465001000005fd0f4655f00000000000001000c00000010000800000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}], 0x0, &(0x7f00000000c0)) 17:08:56 executing program 2: clock_adjtime(0x7, &(0x7f0000000000)={0x8000, 0x62, 0xff, 0x1, 0x3, 0x1ff, 0x3ff, 0x4, 0xff, 0x20, 0x6, 0x401, 0x20, 0x0, 0x1ff, 0x8000, 0xfffffffffffffffd, 0x400, 0x8, 0x100000000, 0x2, 0x8, 0xf32, 0x4, 0x6, 0x80}) clock_adjtime(0x2, &(0x7f0000000100)={0xd9, 0x9, 0x1, 0x2, 0x1f, 0x78, 0x4b1, 0x0, 0x401, 0x5, 0x8, 0x1, 0x101, 0x100000001, 0x7, 0x1fc, 0x9, 0x9, 0x0, 0x9, 0x8, 0x3, 0xff, 0x7, 0x73, 0x946c}) clock_adjtime(0x6, &(0x7f0000000200)={0x4, 0x1, 0x100, 0x6, 0x2, 0x6, 0x1, 0x1dd, 0x9, 0x1000000000000000, 0x0, 0x6, 0x1, 0x1, 0x9, 0x5, 0x3023, 0x2, 0x4, 0xfffffffffffffff9, 0x429, 0x3, 0x0, 0x9, 0xffffffffffffff05, 0x1000}) clock_adjtime(0x3, &(0x7f0000000300)={0x0, 0x8, 0x9, 0x9, 0x9, 0x9, 0x6, 0x9, 0x8, 0x1, 0xd0fc, 0x55, 0x2, 0x0, 0x1, 0x1f, 0x100000001, 0x8f44, 0x53, 0x0, 0x3, 0x140000000000, 0x9, 0x8000, 0x0, 0x10001}) r0 = syz_mount_image$iso9660(&(0x7f0000000400), &(0x7f0000000440)='./file0\x00', 0x4, 0x1, &(0x7f0000000480)=[{0xfffffffffffffffe, 0x0, 0x3}], 0x2014400, &(0x7f00000004c0)={[{@check_relaxed}, {@dmode}, {@check_relaxed}], [{@euid_lt={'euid<', 0xee01}}, {@euid_eq}, {@rootcontext={'rootcontext', 0x3d, 'staff_u'}}, {@obj_user={'obj_user', 0x3d, '#-_'}}, {@rootcontext={'rootcontext', 0x3d, 'staff_u'}}]}) faccessat(r0, &(0x7f0000000580)='./file0\x00', 0x88) clock_adjtime(0x4, &(0x7f00000005c0)={0x80000000, 0x100000000, 0xba, 0x80000000, 0x4, 0x20d4e190, 0x7, 0x400, 0x33, 0x7a, 0x1, 0x465d, 0x7f, 0x5, 0x3, 0x1, 0x0, 0x8, 0x7, 0x7ff, 0x1, 0x4, 0x3f, 0x7fff, 0x700b, 0x96}) r1 = accept$unix(0xffffffffffffffff, 0x0, &(0x7f00000006c0)) getsockname$unix(r1, &(0x7f0000000700), &(0x7f0000000780)=0x6e) clock_adjtime(0x3, &(0x7f00000007c0)={0x6, 0x6, 0x7, 0x8000, 0x7ff, 0x5c, 0x401, 0x2, 0x9, 0x4, 0x0, 0x61, 0x2, 0x9b71, 0x100000000, 0x7fffffff, 0x322, 0xc70d, 0x9, 0xd, 0x9, 0x0, 0x9, 0x1a1f00000000, 0xffffffffffffffff, 0x9}) clock_adjtime(0x6, &(0x7f00000008c0)={0x4, 0x9, 0x3, 0xfffffffffffffff7, 0xb31, 0x1, 0x1, 0x2, 0x538, 0x0, 0x401, 0x1, 0xdd, 0xfffffffffffffff7, 0xec54, 0x4, 0x100000001, 0x0, 0xa, 0x1, 0x7ff, 0xcd, 0xf2, 0x80, 0x7, 0x8000}) clock_adjtime(0x0, &(0x7f00000009c0)={0x8, 0xff, 0x81, 0x2, 0x100000001, 0x11, 0x5, 0x1, 0x1, 0x9, 0x1000, 0x8, 0xdf6c, 0x9, 0x8, 0x1004000000000000, 0x1ff, 0x3, 0x6, 0xf5, 0x80000, 0x1, 0xfffffffffffffd6d, 0x2, 0x6, 0xfa}) r2 = socket$unix(0x1, 0x5, 0x0) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f0000000ac0)={'wlan0\x00'}) mq_timedreceive(0xffffffffffffffff, &(0x7f0000000b00)=""/4096, 0x1000, 0x80, &(0x7f0000001b00)={0x0, 0x989680}) r3 = creat(&(0x7f0000001b40)='./file0\x00', 0x1) mknodat(r3, &(0x7f0000001b80)='./file1\x00', 0x4, 0x0) clock_adjtime(0x0, &(0x7f0000001bc0)={0xfff, 0x7fff, 0x8000000, 0x2, 0xfdc, 0x54, 0x8fa, 0x3f41, 0x0, 0x4, 0x4, 0x5, 0x101, 0x5, 0x4, 0x9, 0x9, 0x30e, 0x3f, 0x2, 0x7f, 0x7, 0x6, 0x4, 0x3ff, 0x100000000}) clock_adjtime(0x2, &(0x7f0000001cc0)={0x0, 0x6, 0x7, 0xe5, 0x5, 0x6, 0x10, 0x7, 0x281, 0x40, 0x1, 0x0, 0x1, 0x10001, 0x5, 0x100, 0x0, 0x4, 0xffffffffffffe001, 0xdf, 0x7f, 0x8000, 0x9, 0x400, 0xfffffffffffffe00, 0x3f}) [ 343.691762][T19903] EXT4-fs warning (device loop4): ext4_enable_quotas:6363: Failed to enable quota tracking (type=0, err=-117). Please run e2fsck to fix. [ 343.712075][T19903] EXT4-fs (loop4): mount failed [ 343.724667][T19917] EXT4-fs error (device loop5): ext4_quota_enable:6323: comm syz-executor.5: Bad quota inode # 3 [ 343.742494][T19917] EXT4-fs warning (device loop5): ext4_enable_quotas:6363: Failed to enable quota tracking (type=0, err=-116). Please run e2fsck to fix. [ 343.756960][T19917] EXT4-fs (loop5): mount failed [ 343.767083][T19931] SELinux: duplicate or incompatible mount options [ 343.774053][T19920] EXT4-fs warning (device loop1): ext4_enable_quotas:6363: Failed to enable quota tracking (type=0, err=-22). Please run e2fsck to fix. [ 343.788441][T19933] loop0: detected capacity change from 0 to 264192 17:08:56 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc01000a, 0x1b, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000003980)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="80", 0x1, 0x11100}], 0x0, &(0x7f00000000c0)) 17:08:56 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc01000a, 0x10, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000003980)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d0f465001000005fd0f4655f00000000000001", 0x1b, 0x11100}], 0x0, &(0x7f00000000c0)) [ 343.808692][T19920] EXT4-fs (loop1): mount failed 17:08:56 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc01000a, 0x12, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000003980)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d0f465001000005fd0f4655f00000000000001", 0x1b, 0x11100}], 0x0, &(0x7f00000000c0)) [ 343.832172][T19924] EXT4-fs (loop3): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: none. [ 343.833956][T19933] EXT4-fs (loop0): inodes count not valid: 589856 vs 32 [ 343.852875][T19924] ext4 filesystem being mounted at /root/syzkaller-testdir350550748/syzkaller.ONiyFI/928/file0 supports timestamps until 2038 (0x7fffffff) 17:08:56 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc01000a, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000003980)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d0f465001000005fd0f4655f00000000000001000c00000010000800000000000af3010004", 0x2d, 0x11100}], 0x0, &(0x7f00000000c0)) (fail_nth: 38) 17:08:56 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc01000a, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="20000a008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000003980)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d9", 0x4, 0x6800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d0f465001000005fd0f4655f00000000000001000c00000010000800000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}], 0x0, &(0x7f00000000c0)) 17:08:56 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc01000a, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b00000080000000080000005247000062", 0x65, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000003980)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d0f465001000005fd0f4655f00000000000001000c000000100008", 0x23, 0x11100}], 0x0, &(0x7f00000000c0)) [ 343.885067][T19939] loop5: detected capacity change from 0 to 264192 [ 343.926168][T19939] EXT4-fs error (device loop5): ext4_quota_enable:6323: comm syz-executor.5: Bad quota inode # 3 [ 343.937722][T19939] EXT4-fs warning (device loop5): ext4_enable_quotas:6363: Failed to enable quota tracking (type=0, err=-116). Please run e2fsck to fix. [ 343.955407][T19944] loop1: detected capacity change from 0 to 264192 [ 343.962245][T19948] loop0: detected capacity change from 0 to 264192 [ 343.968698][T19939] EXT4-fs (loop5): mount failed [ 343.972143][T19952] FAULT_INJECTION: forcing a failure. [ 343.972143][T19952] name failslab, interval 1, probability 0, space 0, times 0 [ 343.986413][T19952] CPU: 0 PID: 19952 Comm: syz-executor.4 Not tainted 5.16.0-syzkaller #0 [ 343.994924][T19952] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 344.005154][T19952] Call Trace: [ 344.008431][T19952] [ 344.011367][T19952] dump_stack_lvl+0xd6/0x122 [ 344.015964][T19952] dump_stack+0x11/0x1b [ 344.016845][T19954] SELinux: duplicate or incompatible mount options [ 344.020139][T19952] should_fail+0x23c/0x250 [ 344.020162][T19952] ? __kernfs_new_node+0x6a/0x340 [ 344.036134][T19952] __should_failslab+0x81/0x90 [ 344.040903][T19952] should_failslab+0x5/0x20 [ 344.045414][T19952] kmem_cache_alloc+0x4f/0x320 [ 344.050253][T19952] ? __down_write_common+0x42/0x7b0 [ 344.055467][T19952] __kernfs_new_node+0x6a/0x340 [ 344.060319][T19952] ? up_write+0x25/0xc0 [ 344.064499][T19952] kernfs_new_node+0x5b/0xd0 [ 344.069091][T19952] __kernfs_create_file+0x45/0x1a0 [ 344.074208][T19952] ? dev_attr_show+0x90/0x90 [ 344.078975][T19952] sysfs_add_file_mode_ns+0x10b/0x1d0 [ 344.084338][T19952] internal_create_group+0x2dd/0x840 [ 344.089710][T19952] sysfs_create_group+0x1b/0x20 [ 344.094617][T19952] loop_configure+0xc58/0xf30 [ 344.099385][T19952] lo_ioctl+0x583/0x1270 [ 344.103666][T19952] ? folio_mark_dirty+0x84/0xe0 [ 344.108548][T19952] ? unlock_page+0x37/0x50 [ 344.112994][T19952] ? __rcu_read_unlock+0x5c/0x290 [ 344.118087][T19952] ? blkdev_common_ioctl+0x438/0x1180 [ 344.123689][T19952] ? selinux_file_ioctl+0x522/0x590 [ 344.128884][T19952] ? do_vfs_ioctl+0x819/0x14a0 [ 344.133640][T19952] ? lo_release+0x120/0x120 [ 344.138171][T19952] blkdev_ioctl+0x20e/0x440 [ 344.142663][T19952] ? blkdev_compat_ptr_ioctl+0x80/0x80 [ 344.148159][T19952] __se_sys_ioctl+0xcb/0x140 [ 344.152736][T19952] __x64_sys_ioctl+0x3f/0x50 [ 344.157337][T19952] do_syscall_64+0x44/0xd0 [ 344.161745][T19952] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 344.167625][T19952] RIP: 0033:0x7f6f94c22c57 [ 344.172026][T19952] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 04 54 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 344.191709][T19952] RSP: 002b:00007f6f93d98f28 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 344.200154][T19952] RAX: ffffffffffffffda RBX: 00007f6f94c6c9c8 RCX: 00007f6f94c22c57 [ 344.208510][T19952] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 344.216466][T19952] RBP: 0000000000000005 R08: 0000000000000000 R09: 00007f6f93d991d0 17:09:00 executing program 2: clock_adjtime(0x7, &(0x7f0000000000)={0x8000, 0x62, 0xff, 0x1, 0x3, 0x1ff, 0x3ff, 0x4, 0xff, 0x20, 0x6, 0x401, 0x20, 0x0, 0x1ff, 0x8000, 0xfffffffffffffffd, 0x400, 0x8, 0x100000000, 0x2, 0x8, 0xf32, 0x4, 0x6, 0x80}) clock_adjtime(0x2, &(0x7f0000000100)={0xd9, 0x9, 0x1, 0x2, 0x1f, 0x78, 0x4b1, 0x0, 0x401, 0x5, 0x8, 0x1, 0x101, 0x100000001, 0x7, 0x1fc, 0x9, 0x9, 0x0, 0x9, 0x8, 0x3, 0xff, 0x7, 0x73, 0x946c}) clock_adjtime(0x6, &(0x7f0000000200)={0x4, 0x1, 0x100, 0x6, 0x2, 0x6, 0x1, 0x1dd, 0x9, 0x1000000000000000, 0x0, 0x6, 0x1, 0x1, 0x9, 0x5, 0x3023, 0x2, 0x4, 0xfffffffffffffff9, 0x429, 0x3, 0x0, 0x9, 0xffffffffffffff05, 0x1000}) clock_adjtime(0x3, &(0x7f0000000300)={0x0, 0x8, 0x9, 0x9, 0x9, 0x9, 0x6, 0x9, 0x8, 0x1, 0xd0fc, 0x55, 0x2, 0x0, 0x1, 0x1f, 0x100000001, 0x8f44, 0x53, 0x0, 0x3, 0x140000000000, 0x9, 0x8000, 0x0, 0x10001}) r0 = syz_mount_image$iso9660(&(0x7f0000000400), &(0x7f0000000440)='./file0\x00', 0x4, 0x1, &(0x7f0000000480)=[{0xfffffffffffffffe, 0x0, 0x3}], 0x2014400, &(0x7f00000004c0)={[{@check_relaxed}, {@dmode}, {@check_relaxed}], [{@euid_lt={'euid<', 0xee01}}, {@euid_eq}, {@rootcontext={'rootcontext', 0x3d, 'staff_u'}}, {@obj_user={'obj_user', 0x3d, '#-_'}}, {@rootcontext={'rootcontext', 0x3d, 'staff_u'}}]}) faccessat(r0, &(0x7f0000000580)='./file0\x00', 0x88) clock_adjtime(0x4, &(0x7f00000005c0)={0x80000000, 0x100000000, 0xba, 0x80000000, 0x4, 0x20d4e190, 0x7, 0x400, 0x33, 0x7a, 0x1, 0x465d, 0x7f, 0x5, 0x3, 0x1, 0x0, 0x8, 0x7, 0x7ff, 0x1, 0x4, 0x3f, 0x7fff, 0x700b, 0x96}) r1 = accept$unix(0xffffffffffffffff, 0x0, &(0x7f00000006c0)) getsockname$unix(r1, &(0x7f0000000700), &(0x7f0000000780)=0x6e) clock_adjtime(0x3, &(0x7f00000007c0)={0x6, 0x6, 0x7, 0x8000, 0x7ff, 0x5c, 0x401, 0x2, 0x9, 0x4, 0x0, 0x61, 0x2, 0x9b71, 0x100000000, 0x7fffffff, 0x322, 0xc70d, 0x9, 0xd, 0x9, 0x0, 0x9, 0x1a1f00000000, 0xffffffffffffffff, 0x9}) clock_adjtime(0x6, &(0x7f00000008c0)={0x4, 0x9, 0x3, 0xfffffffffffffff7, 0xb31, 0x1, 0x1, 0x2, 0x538, 0x0, 0x401, 0x1, 0xdd, 0xfffffffffffffff7, 0xec54, 0x4, 0x100000001, 0x0, 0xa, 0x1, 0x7ff, 0xcd, 0xf2, 0x80, 0x7, 0x8000}) clock_adjtime(0x0, &(0x7f00000009c0)={0x8, 0xff, 0x81, 0x2, 0x100000001, 0x11, 0x5, 0x1, 0x1, 0x9, 0x1000, 0x8, 0xdf6c, 0x9, 0x8, 0x1004000000000000, 0x1ff, 0x3, 0x6, 0xf5, 0x80000, 0x1, 0xfffffffffffffd6d, 0x2, 0x6, 0xfa}) r2 = socket$unix(0x1, 0x5, 0x0) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f0000000ac0)={'wlan0\x00'}) mq_timedreceive(0xffffffffffffffff, &(0x7f0000000b00)=""/4096, 0x1000, 0x80, &(0x7f0000001b00)={0x0, 0x989680}) r3 = creat(&(0x7f0000001b40)='./file0\x00', 0x1) mknodat(r3, &(0x7f0000001b80)='./file1\x00', 0x4, 0x0) clock_adjtime(0x0, &(0x7f0000001bc0)={0xfff, 0x7fff, 0xa000000, 0x2, 0xfdc, 0x54, 0x8fa, 0x3f41, 0x0, 0x4, 0x4, 0x5, 0x101, 0x5, 0x4, 0x9, 0x9, 0x30e, 0x3f, 0x2, 0x7f, 0x7, 0x6, 0x4, 0x3ff, 0x100000000}) clock_adjtime(0x2, &(0x7f0000001cc0)={0x0, 0x6, 0x7, 0xe5, 0x5, 0x6, 0x10, 0x7, 0x281, 0x40, 0x1, 0x0, 0x1, 0x10001, 0x5, 0x100, 0x0, 0x4, 0xffffffffffffe001, 0xdf, 0x7f, 0x8000, 0x9, 0x400, 0xfffffffffffffe00, 0x3f}) 17:09:04 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc01000a, 0x21, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000003980)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="80", 0x1, 0x11100}], 0x0, &(0x7f00000000c0)) [ 344.224421][T19952] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 344.232474][T19952] R13: 0000000000000004 R14: 00000000200002a8 R15: 0000000000000007 [ 344.240434][T19952] [ 344.246974][T19952] loop4: detected capacity change from 0 to 264192 [ 344.262223][T19949] loop3: detected capacity change from 0 to 264192 17:09:04 executing program 2: clock_adjtime(0x7, &(0x7f0000000000)={0x8000, 0x62, 0xff, 0x1, 0x3, 0x1ff, 0x3ff, 0x4, 0xff, 0x20, 0x6, 0x401, 0x20, 0x0, 0x1ff, 0x8000, 0xfffffffffffffffd, 0x400, 0x8, 0x100000000, 0x2, 0x8, 0xf32, 0x4, 0x6, 0x80}) clock_adjtime(0x2, &(0x7f0000000100)={0xd9, 0x9, 0x1, 0x2, 0x1f, 0x78, 0x4b1, 0x0, 0x401, 0x5, 0x8, 0x1, 0x101, 0x100000001, 0x7, 0x1fc, 0x9, 0x9, 0x0, 0x9, 0x8, 0x3, 0xff, 0x7, 0x73, 0x946c}) clock_adjtime(0x6, &(0x7f0000000200)={0x4, 0x1, 0x100, 0x6, 0x2, 0x6, 0x1, 0x1dd, 0x9, 0x1000000000000000, 0x0, 0x6, 0x1, 0x1, 0x9, 0x5, 0x3023, 0x2, 0x4, 0xfffffffffffffff9, 0x429, 0x3, 0x0, 0x9, 0xffffffffffffff05, 0x1000}) clock_adjtime(0x3, &(0x7f0000000300)={0x0, 0x8, 0x9, 0x9, 0x9, 0x9, 0x6, 0x9, 0x8, 0x1, 0xd0fc, 0x55, 0x2, 0x0, 0x1, 0x1f, 0x100000001, 0x8f44, 0x53, 0x0, 0x3, 0x140000000000, 0x9, 0x8000, 0x0, 0x10001}) r0 = syz_mount_image$iso9660(&(0x7f0000000400), &(0x7f0000000440)='./file0\x00', 0x4, 0x1, &(0x7f0000000480)=[{0xfffffffffffffffe, 0x0, 0x3}], 0x2014400, &(0x7f00000004c0)={[{@check_relaxed}, {@dmode}, {@check_relaxed}], [{@euid_lt={'euid<', 0xee01}}, {@euid_eq}, {@rootcontext={'rootcontext', 0x3d, 'staff_u'}}, {@obj_user={'obj_user', 0x3d, '#-_'}}, {@rootcontext={'rootcontext', 0x3d, 'staff_u'}}]}) faccessat(r0, &(0x7f0000000580)='./file0\x00', 0x88) clock_adjtime(0x4, &(0x7f00000005c0)={0x80000000, 0x100000000, 0xba, 0x80000000, 0x4, 0x20d4e190, 0x7, 0x400, 0x33, 0x7a, 0x1, 0x465d, 0x7f, 0x5, 0x3, 0x1, 0x0, 0x8, 0x7, 0x7ff, 0x1, 0x4, 0x3f, 0x7fff, 0x700b, 0x96}) r1 = accept$unix(0xffffffffffffffff, 0x0, &(0x7f00000006c0)) getsockname$unix(r1, &(0x7f0000000700), &(0x7f0000000780)=0x6e) clock_adjtime(0x3, &(0x7f00000007c0)={0x6, 0x6, 0x7, 0x8000, 0x7ff, 0x5c, 0x401, 0x2, 0x9, 0x4, 0x0, 0x61, 0x2, 0x9b71, 0x100000000, 0x7fffffff, 0x322, 0xc70d, 0x9, 0xd, 0x9, 0x0, 0x9, 0x1a1f00000000, 0xffffffffffffffff, 0x9}) clock_adjtime(0x6, &(0x7f00000008c0)={0x4, 0x9, 0x3, 0xfffffffffffffff7, 0xb31, 0x1, 0x1, 0x2, 0x538, 0x0, 0x401, 0x1, 0xdd, 0xfffffffffffffff7, 0xec54, 0x4, 0x100000001, 0x0, 0xa, 0x1, 0x7ff, 0xcd, 0xf2, 0x80, 0x7, 0x8000}) clock_adjtime(0x0, &(0x7f00000009c0)={0x8, 0xff, 0x81, 0x2, 0x100000001, 0x11, 0x5, 0x1, 0x1, 0x9, 0x1000, 0x8, 0xdf6c, 0x9, 0x8, 0x1004000000000000, 0x1ff, 0x3, 0x6, 0xf5, 0x80000, 0x1, 0xfffffffffffffd6d, 0x2, 0x6, 0xfa}) r2 = socket$unix(0x1, 0x5, 0x0) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f0000000ac0)={'wlan0\x00'}) mq_timedreceive(0xffffffffffffffff, &(0x7f0000000b00)=""/4096, 0x1000, 0x80, &(0x7f0000001b00)={0x0, 0x989680}) r3 = creat(&(0x7f0000001b40)='./file0\x00', 0x1) mknodat(r3, &(0x7f0000001b80)='./file1\x00', 0x4, 0x0) clock_adjtime(0x0, &(0x7f0000001bc0)={0xfff, 0x7fff, 0xb000000, 0x2, 0xfdc, 0x54, 0x8fa, 0x3f41, 0x0, 0x4, 0x4, 0x5, 0x101, 0x5, 0x4, 0x9, 0x9, 0x30e, 0x3f, 0x2, 0x7f, 0x7, 0x6, 0x4, 0x3ff, 0x100000000}) clock_adjtime(0x2, &(0x7f0000001cc0)={0x0, 0x6, 0x7, 0xe5, 0x5, 0x6, 0x10, 0x7, 0x281, 0x40, 0x1, 0x0, 0x1, 0x10001, 0x5, 0x100, 0x0, 0x4, 0xffffffffffffe001, 0xdf, 0x7f, 0x8000, 0x9, 0x400, 0xfffffffffffffe00, 0x3f}) [ 344.298449][T19952] EXT4-fs error (device loop4): ext4_ext_check_inode:497: inode #3: comm syz-executor.4: pblk 0 bad header/extent: invalid extent entries - magic f30a, entries 1, max 4(4), depth 0(0) [ 344.329772][T19952] EXT4-fs error (device loop4): ext4_quota_enable:6323: comm syz-executor.4: Bad quota inode # 3 [ 344.341913][T19952] EXT4-fs warning (device loop4): ext4_enable_quotas:6363: Failed to enable quota tracking (type=0, err=-117). Please run e2fsck to fix. [ 344.359937][T19961] loop5: detected capacity change from 0 to 264192 [ 344.373526][T19952] EXT4-fs (loop4): mount failed [ 344.381365][T19963] SELinux: duplicate or incompatible mount options 17:09:04 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc01000a, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="20000b008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000003980)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d9", 0x4, 0x6800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d0f465001000005fd0f4655f00000000000001000c00000010000800000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}], 0x0, &(0x7f00000000c0)) [ 344.389983][T19944] EXT4-fs warning (device loop1): ext4_enable_quotas:6363: Failed to enable quota tracking (type=0, err=-22). Please run e2fsck to fix. [ 344.401918][T19948] EXT4-fs (loop0): inodes count not valid: 655392 vs 32 [ 344.404380][T19944] EXT4-fs (loop1): mount failed [ 344.425065][T19961] EXT4-fs error (device loop5): ext4_quota_enable:6323: comm syz-executor.5: Bad quota inode # 3 17:09:04 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc01000a, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000003980)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d0f465001000005fd0f4655f00000000000001000c00000010000800000000000af3010004", 0x2d, 0x11100}], 0x0, &(0x7f00000000c0)) (fail_nth: 39) [ 344.443777][T19961] EXT4-fs warning (device loop5): ext4_enable_quotas:6363: Failed to enable quota tracking (type=0, err=-116). Please run e2fsck to fix. [ 344.458761][T19961] EXT4-fs (loop5): mount failed [ 344.480549][T19949] EXT4-fs (loop3): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: none. 17:09:08 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc01000a, 0x22, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000003980)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="80", 0x1, 0x11100}], 0x0, &(0x7f00000000c0)) 17:09:08 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc01000a, 0x13, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000003980)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d0f465001000005fd0f4655f00000000000001", 0x1b, 0x11100}], 0x0, &(0x7f00000000c0)) [ 344.496878][T19973] loop0: detected capacity change from 0 to 264192 [ 344.507278][T19949] ext4 filesystem being mounted at /root/syzkaller-testdir350550748/syzkaller.ONiyFI/929/file0 supports timestamps until 2038 (0x7fffffff) [ 344.522033][T19976] FAULT_INJECTION: forcing a failure. [ 344.522033][T19976] name failslab, interval 1, probability 0, space 0, times 0 [ 344.534663][T19976] CPU: 1 PID: 19976 Comm: syz-executor.4 Not tainted 5.16.0-syzkaller #0 [ 344.543133][T19976] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 344.553320][T19976] Call Trace: [ 344.556599][T19976] [ 344.559529][T19976] dump_stack_lvl+0xd6/0x122 [ 344.564176][T19976] dump_stack+0x11/0x1b [ 344.568331][T19976] should_fail+0x23c/0x250 [ 344.572740][T19976] ? __kernfs_new_node+0x6a/0x340 [ 344.577789][T19976] __should_failslab+0x81/0x90 [ 344.582552][T19976] should_failslab+0x5/0x20 [ 344.587054][T19976] kmem_cache_alloc+0x4f/0x320 [ 344.591981][T19976] ? __down_write_common+0x42/0x7b0 [ 344.597168][T19976] __kernfs_new_node+0x6a/0x340 [ 344.602061][T19976] ? up_write+0x25/0xc0 [ 344.606229][T19976] kernfs_new_node+0x5b/0xd0 [ 344.610818][T19976] __kernfs_create_file+0x45/0x1a0 [ 344.615994][T19976] ? dev_attr_show+0x90/0x90 [ 344.620574][T19976] sysfs_add_file_mode_ns+0x10b/0x1d0 [ 344.625994][T19976] internal_create_group+0x2dd/0x840 [ 344.631347][T19976] sysfs_create_group+0x1b/0x20 [ 344.636180][T19976] loop_configure+0xc58/0xf30 [ 344.640890][T19976] lo_ioctl+0x583/0x1270 [ 344.645202][T19976] ? folio_mark_dirty+0x84/0xe0 [ 344.650136][T19976] ? unlock_page+0x37/0x50 [ 344.654570][T19976] ? __rcu_read_unlock+0x5c/0x290 [ 344.659614][T19976] ? blkdev_common_ioctl+0x438/0x1180 [ 344.665039][T19976] ? selinux_file_ioctl+0x522/0x590 [ 344.670304][T19976] ? do_vfs_ioctl+0x819/0x14a0 [ 344.675055][T19976] ? lo_release+0x120/0x120 [ 344.679543][T19976] blkdev_ioctl+0x20e/0x440 [ 344.684038][T19976] ? blkdev_compat_ptr_ioctl+0x80/0x80 [ 344.689578][T19976] __se_sys_ioctl+0xcb/0x140 [ 344.694157][T19976] __x64_sys_ioctl+0x3f/0x50 [ 344.698924][T19976] do_syscall_64+0x44/0xd0 [ 344.703351][T19976] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 344.709245][T19976] RIP: 0033:0x7f6f94c22c57 [ 344.713669][T19976] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 04 54 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 344.733260][T19976] RSP: 002b:00007f6f93d98f28 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 344.741658][T19976] RAX: ffffffffffffffda RBX: 00007f6f94c6c9c8 RCX: 00007f6f94c22c57 [ 344.749698][T19976] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 344.757722][T19976] RBP: 0000000000000005 R08: 0000000000000000 R09: 00007f6f93d991d0 [ 344.765675][T19976] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 344.773687][T19976] R13: 0000000000000004 R14: 00000000200002a8 R15: 0000000000000007 [ 344.781685][T19976] [ 344.792603][T19973] EXT4-fs (loop0): inodes count not valid: 720928 vs 32 17:09:09 executing program 2: clock_adjtime(0x7, &(0x7f0000000000)={0x8000, 0x62, 0xff, 0x1, 0x3, 0x1ff, 0x3ff, 0x4, 0xff, 0x20, 0x6, 0x401, 0x20, 0x0, 0x1ff, 0x8000, 0xfffffffffffffffd, 0x400, 0x8, 0x100000000, 0x2, 0x8, 0xf32, 0x4, 0x6, 0x80}) clock_adjtime(0x2, &(0x7f0000000100)={0xd9, 0x9, 0x1, 0x2, 0x1f, 0x78, 0x4b1, 0x0, 0x401, 0x5, 0x8, 0x1, 0x101, 0x100000001, 0x7, 0x1fc, 0x9, 0x9, 0x0, 0x9, 0x8, 0x3, 0xff, 0x7, 0x73, 0x946c}) clock_adjtime(0x6, &(0x7f0000000200)={0x4, 0x1, 0x100, 0x6, 0x2, 0x6, 0x1, 0x1dd, 0x9, 0x1000000000000000, 0x0, 0x6, 0x1, 0x1, 0x9, 0x5, 0x3023, 0x2, 0x4, 0xfffffffffffffff9, 0x429, 0x3, 0x0, 0x9, 0xffffffffffffff05, 0x1000}) clock_adjtime(0x3, &(0x7f0000000300)={0x0, 0x8, 0x9, 0x9, 0x9, 0x9, 0x6, 0x9, 0x8, 0x1, 0xd0fc, 0x55, 0x2, 0x0, 0x1, 0x1f, 0x100000001, 0x8f44, 0x53, 0x0, 0x3, 0x140000000000, 0x9, 0x8000, 0x0, 0x10001}) r0 = syz_mount_image$iso9660(&(0x7f0000000400), &(0x7f0000000440)='./file0\x00', 0x4, 0x1, &(0x7f0000000480)=[{0xfffffffffffffffe, 0x0, 0x3}], 0x2014400, &(0x7f00000004c0)={[{@check_relaxed}, {@dmode}, {@check_relaxed}], [{@euid_lt={'euid<', 0xee01}}, {@euid_eq}, {@rootcontext={'rootcontext', 0x3d, 'staff_u'}}, {@obj_user={'obj_user', 0x3d, '#-_'}}, {@rootcontext={'rootcontext', 0x3d, 'staff_u'}}]}) faccessat(r0, &(0x7f0000000580)='./file0\x00', 0x88) clock_adjtime(0x4, &(0x7f00000005c0)={0x80000000, 0x100000000, 0xba, 0x80000000, 0x4, 0x20d4e190, 0x7, 0x400, 0x33, 0x7a, 0x1, 0x465d, 0x7f, 0x5, 0x3, 0x1, 0x0, 0x8, 0x7, 0x7ff, 0x1, 0x4, 0x3f, 0x7fff, 0x700b, 0x96}) r1 = accept$unix(0xffffffffffffffff, 0x0, &(0x7f00000006c0)) getsockname$unix(r1, &(0x7f0000000700), &(0x7f0000000780)=0x6e) clock_adjtime(0x3, &(0x7f00000007c0)={0x6, 0x6, 0x7, 0x8000, 0x7ff, 0x5c, 0x401, 0x2, 0x9, 0x4, 0x0, 0x61, 0x2, 0x9b71, 0x100000000, 0x7fffffff, 0x322, 0xc70d, 0x9, 0xd, 0x9, 0x0, 0x9, 0x1a1f00000000, 0xffffffffffffffff, 0x9}) clock_adjtime(0x6, &(0x7f00000008c0)={0x4, 0x9, 0x3, 0xfffffffffffffff7, 0xb31, 0x1, 0x1, 0x2, 0x538, 0x0, 0x401, 0x1, 0xdd, 0xfffffffffffffff7, 0xec54, 0x4, 0x100000001, 0x0, 0xa, 0x1, 0x7ff, 0xcd, 0xf2, 0x80, 0x7, 0x8000}) clock_adjtime(0x0, &(0x7f00000009c0)={0x8, 0xff, 0x81, 0x2, 0x100000001, 0x11, 0x5, 0x1, 0x1, 0x9, 0x1000, 0x8, 0xdf6c, 0x9, 0x8, 0x1004000000000000, 0x1ff, 0x3, 0x6, 0xf5, 0x80000, 0x1, 0xfffffffffffffd6d, 0x2, 0x6, 0xfa}) r2 = socket$unix(0x1, 0x5, 0x0) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f0000000ac0)={'wlan0\x00'}) mq_timedreceive(0xffffffffffffffff, &(0x7f0000000b00)=""/4096, 0x1000, 0x80, &(0x7f0000001b00)={0x0, 0x989680}) r3 = creat(&(0x7f0000001b40)='./file0\x00', 0x1) mknodat(r3, &(0x7f0000001b80)='./file1\x00', 0x4, 0x0) clock_adjtime(0x0, &(0x7f0000001bc0)={0xfff, 0x7fff, 0x20a10700, 0x2, 0xfdc, 0x54, 0x8fa, 0x3f41, 0x0, 0x4, 0x4, 0x5, 0x101, 0x5, 0x4, 0x9, 0x9, 0x30e, 0x3f, 0x2, 0x7f, 0x7, 0x6, 0x4, 0x3ff, 0x100000000}) clock_adjtime(0x2, &(0x7f0000001cc0)={0x0, 0x6, 0x7, 0xe5, 0x5, 0x6, 0x10, 0x7, 0x281, 0x40, 0x1, 0x0, 0x1, 0x10001, 0x5, 0x100, 0x0, 0x4, 0xffffffffffffe001, 0xdf, 0x7f, 0x8000, 0x9, 0x400, 0xfffffffffffffe00, 0x3f}) 17:09:09 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc01000a, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000003980)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d0f465001000005fd0f4655f00000000000001000c000000100008", 0x23, 0x11100}], 0x0, &(0x7f00000000c0)) [ 344.795497][T19978] loop1: detected capacity change from 0 to 264192 [ 344.806958][T19976] loop4: detected capacity change from 0 to 264192 [ 344.818374][T19980] loop5: detected capacity change from 0 to 264192 17:09:09 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc01000a, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="20000c008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000003980)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d9", 0x4, 0x6800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d0f465001000005fd0f4655f00000000000001000c00000010000800000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}], 0x0, &(0x7f00000000c0)) [ 344.852324][T19982] SELinux: duplicate or incompatible mount options [ 344.874846][T19978] EXT4-fs warning (device loop1): ext4_enable_quotas:6363: Failed to enable quota tracking (type=0, err=-22). Please run e2fsck to fix. [ 344.897828][T19978] EXT4-fs (loop1): mount failed 17:09:13 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc01000a, 0x14, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000003980)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d0f465001000005fd0f4655f00000000000001", 0x1b, 0x11100}], 0x0, &(0x7f00000000c0)) 17:09:13 executing program 2: clock_adjtime(0x7, &(0x7f0000000000)={0x8000, 0x62, 0xff, 0x1, 0x3, 0x1ff, 0x3ff, 0x4, 0xff, 0x20, 0x6, 0x401, 0x20, 0x0, 0x1ff, 0x8000, 0xfffffffffffffffd, 0x400, 0x8, 0x100000000, 0x2, 0x8, 0xf32, 0x4, 0x6, 0x80}) clock_adjtime(0x2, &(0x7f0000000100)={0xd9, 0x9, 0x1, 0x2, 0x1f, 0x78, 0x4b1, 0x0, 0x401, 0x5, 0x8, 0x1, 0x101, 0x100000001, 0x7, 0x1fc, 0x9, 0x9, 0x0, 0x9, 0x8, 0x3, 0xff, 0x7, 0x73, 0x946c}) clock_adjtime(0x6, &(0x7f0000000200)={0x4, 0x1, 0x100, 0x6, 0x2, 0x6, 0x1, 0x1dd, 0x9, 0x1000000000000000, 0x0, 0x6, 0x1, 0x1, 0x9, 0x5, 0x3023, 0x2, 0x4, 0xfffffffffffffff9, 0x429, 0x3, 0x0, 0x9, 0xffffffffffffff05, 0x1000}) clock_adjtime(0x3, &(0x7f0000000300)={0x0, 0x8, 0x9, 0x9, 0x9, 0x9, 0x6, 0x9, 0x8, 0x1, 0xd0fc, 0x55, 0x2, 0x0, 0x1, 0x1f, 0x100000001, 0x8f44, 0x53, 0x0, 0x3, 0x140000000000, 0x9, 0x8000, 0x0, 0x10001}) r0 = syz_mount_image$iso9660(&(0x7f0000000400), &(0x7f0000000440)='./file0\x00', 0x4, 0x1, &(0x7f0000000480)=[{0xfffffffffffffffe, 0x0, 0x3}], 0x2014400, &(0x7f00000004c0)={[{@check_relaxed}, {@dmode}, {@check_relaxed}], [{@euid_lt={'euid<', 0xee01}}, {@euid_eq}, {@rootcontext={'rootcontext', 0x3d, 'staff_u'}}, {@obj_user={'obj_user', 0x3d, '#-_'}}, {@rootcontext={'rootcontext', 0x3d, 'staff_u'}}]}) faccessat(r0, &(0x7f0000000580)='./file0\x00', 0x88) clock_adjtime(0x4, &(0x7f00000005c0)={0x80000000, 0x100000000, 0xba, 0x80000000, 0x4, 0x20d4e190, 0x7, 0x400, 0x33, 0x7a, 0x1, 0x465d, 0x7f, 0x5, 0x3, 0x1, 0x0, 0x8, 0x7, 0x7ff, 0x1, 0x4, 0x3f, 0x7fff, 0x700b, 0x96}) r1 = accept$unix(0xffffffffffffffff, 0x0, &(0x7f00000006c0)) getsockname$unix(r1, &(0x7f0000000700), &(0x7f0000000780)=0x6e) clock_adjtime(0x3, &(0x7f00000007c0)={0x6, 0x6, 0x7, 0x8000, 0x7ff, 0x5c, 0x401, 0x2, 0x9, 0x4, 0x0, 0x61, 0x2, 0x9b71, 0x100000000, 0x7fffffff, 0x322, 0xc70d, 0x9, 0xd, 0x9, 0x0, 0x9, 0x1a1f00000000, 0xffffffffffffffff, 0x9}) clock_adjtime(0x6, &(0x7f00000008c0)={0x4, 0x9, 0x3, 0xfffffffffffffff7, 0xb31, 0x1, 0x1, 0x2, 0x538, 0x0, 0x401, 0x1, 0xdd, 0xfffffffffffffff7, 0xec54, 0x4, 0x100000001, 0x0, 0xa, 0x1, 0x7ff, 0xcd, 0xf2, 0x80, 0x7, 0x8000}) clock_adjtime(0x0, &(0x7f00000009c0)={0x8, 0xff, 0x81, 0x2, 0x100000001, 0x11, 0x5, 0x1, 0x1, 0x9, 0x1000, 0x8, 0xdf6c, 0x9, 0x8, 0x1004000000000000, 0x1ff, 0x3, 0x6, 0xf5, 0x80000, 0x1, 0xfffffffffffffd6d, 0x2, 0x6, 0xfa}) r2 = socket$unix(0x1, 0x5, 0x0) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f0000000ac0)={'wlan0\x00'}) mq_timedreceive(0xffffffffffffffff, &(0x7f0000000b00)=""/4096, 0x1000, 0x80, &(0x7f0000001b00)={0x0, 0x989680}) r3 = creat(&(0x7f0000001b40)='./file0\x00', 0x1) mknodat(r3, &(0x7f0000001b80)='./file1\x00', 0x4, 0x0) clock_adjtime(0x0, &(0x7f0000001bc0)={0xfff, 0x7fff, 0x8bcc0c00, 0x2, 0xfdc, 0x54, 0x8fa, 0x3f41, 0x0, 0x4, 0x4, 0x5, 0x101, 0x5, 0x4, 0x9, 0x9, 0x30e, 0x3f, 0x2, 0x7f, 0x7, 0x6, 0x4, 0x3ff, 0x100000000}) clock_adjtime(0x2, &(0x7f0000001cc0)={0x0, 0x6, 0x7, 0xe5, 0x5, 0x6, 0x10, 0x7, 0x281, 0x40, 0x1, 0x0, 0x1, 0x10001, 0x5, 0x100, 0x0, 0x4, 0xffffffffffffe001, 0xdf, 0x7f, 0x8000, 0x9, 0x400, 0xfffffffffffffe00, 0x3f}) [ 344.915214][T19988] loop3: detected capacity change from 0 to 264192 [ 344.932308][T19991] loop0: detected capacity change from 0 to 264192 [ 344.945284][T19976] EXT4-fs error (device loop4): ext4_ext_check_inode:497: inode #3: comm syz-executor.4: pblk 0 bad header/extent: invalid extent entries - magic f30a, entries 1, max 4(4), depth 0(0) [ 344.988133][T19988] EXT4-fs (loop3): VFS: Can't find ext4 filesystem [ 344.996684][T19991] EXT4-fs (loop0): inodes count not valid: 786464 vs 32 [ 345.014843][T19980] EXT4-fs error (device loop5): ext4_quota_enable:6323: comm syz-executor.5: Bad quota inode # 3 [ 345.030372][T19976] EXT4-fs error (device loop4): ext4_quota_enable:6323: comm syz-executor.4: Bad quota inode # 3 [ 345.030844][T19998] loop1: detected capacity change from 0 to 264192 [ 345.047806][T19976] EXT4-fs warning (device loop4): ext4_enable_quotas:6363: Failed to enable quota tracking (type=0, err=-117). Please run e2fsck to fix. [ 345.054903][T19996] SELinux: duplicate or incompatible mount options [ 345.063717][T19976] EXT4-fs (loop4): mount failed 17:09:13 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc01000a, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000003980)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d0f465001000005fd0f4655f00000000000001000c000000100008", 0x23, 0x11100}], 0x0, &(0x7f00000000c0)) 17:09:13 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc01000a, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="20000d008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000003980)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d9", 0x4, 0x6800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d0f465001000005fd0f4655f00000000000001000c00000010000800000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}], 0x0, &(0x7f00000000c0)) [ 345.076752][T19980] EXT4-fs warning (device loop5): ext4_enable_quotas:6363: Failed to enable quota tracking (type=0, err=-116). Please run e2fsck to fix. [ 345.091896][T19980] EXT4-fs (loop5): mount failed [ 345.107115][T19998] EXT4-fs warning (device loop1): ext4_enable_quotas:6363: Failed to enable quota tracking (type=0, err=-22). Please run e2fsck to fix. [ 345.122525][T19998] EXT4-fs (loop1): mount failed 17:09:13 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc01000a, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000003980)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d0f465001000005fd0f4655f00000000000001000c00000010000800000000000af3010004", 0x2d, 0x11100}], 0x0, &(0x7f00000000c0)) (fail_nth: 40) 17:09:17 executing program 2: clock_adjtime(0x7, &(0x7f0000000000)={0x8000, 0x62, 0xff, 0x1, 0x3, 0x1ff, 0x3ff, 0x4, 0xff, 0x20, 0x6, 0x401, 0x20, 0x0, 0x1ff, 0x8000, 0xfffffffffffffffd, 0x400, 0x8, 0x100000000, 0x2, 0x8, 0xf32, 0x4, 0x6, 0x80}) clock_adjtime(0x2, &(0x7f0000000100)={0xd9, 0x9, 0x1, 0x2, 0x1f, 0x78, 0x4b1, 0x0, 0x401, 0x5, 0x8, 0x1, 0x101, 0x100000001, 0x7, 0x1fc, 0x9, 0x9, 0x0, 0x9, 0x8, 0x3, 0xff, 0x7, 0x73, 0x946c}) clock_adjtime(0x6, &(0x7f0000000200)={0x4, 0x1, 0x100, 0x6, 0x2, 0x6, 0x1, 0x1dd, 0x9, 0x1000000000000000, 0x0, 0x6, 0x1, 0x1, 0x9, 0x5, 0x3023, 0x2, 0x4, 0xfffffffffffffff9, 0x429, 0x3, 0x0, 0x9, 0xffffffffffffff05, 0x1000}) clock_adjtime(0x3, &(0x7f0000000300)={0x0, 0x8, 0x9, 0x9, 0x9, 0x9, 0x6, 0x9, 0x8, 0x1, 0xd0fc, 0x55, 0x2, 0x0, 0x1, 0x1f, 0x100000001, 0x8f44, 0x53, 0x0, 0x3, 0x140000000000, 0x9, 0x8000, 0x0, 0x10001}) r0 = syz_mount_image$iso9660(&(0x7f0000000400), &(0x7f0000000440)='./file0\x00', 0x4, 0x1, &(0x7f0000000480)=[{0xfffffffffffffffe, 0x0, 0x3}], 0x2014400, &(0x7f00000004c0)={[{@check_relaxed}, {@dmode}, {@check_relaxed}], [{@euid_lt={'euid<', 0xee01}}, {@euid_eq}, {@rootcontext={'rootcontext', 0x3d, 'staff_u'}}, {@obj_user={'obj_user', 0x3d, '#-_'}}, {@rootcontext={'rootcontext', 0x3d, 'staff_u'}}]}) faccessat(r0, &(0x7f0000000580)='./file0\x00', 0x88) clock_adjtime(0x4, &(0x7f00000005c0)={0x80000000, 0x100000000, 0xba, 0x80000000, 0x4, 0x20d4e190, 0x7, 0x400, 0x33, 0x7a, 0x1, 0x465d, 0x7f, 0x5, 0x3, 0x1, 0x0, 0x8, 0x7, 0x7ff, 0x1, 0x4, 0x3f, 0x7fff, 0x700b, 0x96}) r1 = accept$unix(0xffffffffffffffff, 0x0, &(0x7f00000006c0)) getsockname$unix(r1, &(0x7f0000000700), &(0x7f0000000780)=0x6e) clock_adjtime(0x3, &(0x7f00000007c0)={0x6, 0x6, 0x7, 0x8000, 0x7ff, 0x5c, 0x401, 0x2, 0x9, 0x4, 0x0, 0x61, 0x2, 0x9b71, 0x100000000, 0x7fffffff, 0x322, 0xc70d, 0x9, 0xd, 0x9, 0x0, 0x9, 0x1a1f00000000, 0xffffffffffffffff, 0x9}) clock_adjtime(0x6, &(0x7f00000008c0)={0x4, 0x9, 0x3, 0xfffffffffffffff7, 0xb31, 0x1, 0x1, 0x2, 0x538, 0x0, 0x401, 0x1, 0xdd, 0xfffffffffffffff7, 0xec54, 0x4, 0x100000001, 0x0, 0xa, 0x1, 0x7ff, 0xcd, 0xf2, 0x80, 0x7, 0x8000}) clock_adjtime(0x0, &(0x7f00000009c0)={0x8, 0xff, 0x81, 0x2, 0x100000001, 0x11, 0x5, 0x1, 0x1, 0x9, 0x1000, 0x8, 0xdf6c, 0x9, 0x8, 0x1004000000000000, 0x1ff, 0x3, 0x6, 0xf5, 0x80000, 0x1, 0xfffffffffffffd6d, 0x2, 0x6, 0xfa}) r2 = socket$unix(0x1, 0x5, 0x0) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f0000000ac0)={'wlan0\x00'}) mq_timedreceive(0xffffffffffffffff, &(0x7f0000000b00)=""/4096, 0x1000, 0x80, &(0x7f0000001b00)={0x0, 0x989680}) r3 = creat(&(0x7f0000001b40)='./file0\x00', 0x1) mknodat(r3, &(0x7f0000001b80)='./file1\x00', 0x4, 0x0) clock_adjtime(0x0, &(0x7f0000001bc0)={0xfff, 0x7fff, 0xe05ef8ff, 0x2, 0xfdc, 0x54, 0x8fa, 0x3f41, 0x0, 0x4, 0x4, 0x5, 0x101, 0x5, 0x4, 0x9, 0x9, 0x30e, 0x3f, 0x2, 0x7f, 0x7, 0x6, 0x4, 0x3ff, 0x100000000}) clock_adjtime(0x2, &(0x7f0000001cc0)={0x0, 0x6, 0x7, 0xe5, 0x5, 0x6, 0x10, 0x7, 0x281, 0x40, 0x1, 0x0, 0x1, 0x10001, 0x5, 0x100, 0x0, 0x4, 0xffffffffffffe001, 0xdf, 0x7f, 0x8000, 0x9, 0x400, 0xfffffffffffffe00, 0x3f}) 17:09:17 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc01000a, 0x23, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000003980)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="80", 0x1, 0x11100}], 0x0, &(0x7f00000000c0)) [ 345.136723][T20003] loop3: detected capacity change from 0 to 264192 [ 345.151989][T20005] loop0: detected capacity change from 0 to 264192 [ 345.170041][T20003] EXT4-fs (loop3): VFS: Can't find ext4 filesystem [ 345.177695][T20005] EXT4-fs (loop0): inodes count not valid: 852000 vs 32 17:09:17 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc01000a, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="20000f008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000003980)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d9", 0x4, 0x6800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d0f465001000005fd0f4655f00000000000001000c00000010000800000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}], 0x0, &(0x7f00000000c0)) 17:09:17 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc01000a, 0x15, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000003980)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d0f465001000005fd0f4655f00000000000001", 0x1b, 0x11100}], 0x0, &(0x7f00000000c0)) 17:09:17 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc01000a, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000003980)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d0f465001000005fd0f4655f00000000000001000c000000100008", 0x23, 0x11100}], 0x0, &(0x7f00000000c0)) [ 345.216557][T20009] SELinux: duplicate or incompatible mount options [ 345.239464][T20011] FAULT_INJECTION: forcing a failure. [ 345.239464][T20011] name failslab, interval 1, probability 0, space 0, times 0 [ 345.252206][T20011] CPU: 1 PID: 20011 Comm: syz-executor.4 Not tainted 5.16.0-syzkaller #0 [ 345.252779][T20015] loop1: detected capacity change from 0 to 264192 [ 345.260682][T20011] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 345.260735][T20011] Call Trace: [ 345.260742][T20011] [ 345.260748][T20011] dump_stack_lvl+0xd6/0x122 [ 345.268690][T20012] loop5: detected capacity change from 0 to 264192 [ 345.277279][T20011] dump_stack+0x11/0x1b [ 345.298651][T20011] should_fail+0x23c/0x250 [ 345.303156][T20011] ? __kernfs_new_node+0x6a/0x340 17:09:21 executing program 2: clock_adjtime(0x7, &(0x7f0000000000)={0x8000, 0x62, 0xff, 0x1, 0x3, 0x1ff, 0x3ff, 0x4, 0xff, 0x20, 0x6, 0x401, 0x20, 0x0, 0x1ff, 0x8000, 0xfffffffffffffffd, 0x400, 0x8, 0x100000000, 0x2, 0x8, 0xf32, 0x4, 0x6, 0x80}) clock_adjtime(0x2, &(0x7f0000000100)={0xd9, 0x9, 0x1, 0x2, 0x1f, 0x78, 0x4b1, 0x0, 0x401, 0x5, 0x8, 0x1, 0x101, 0x100000001, 0x7, 0x1fc, 0x9, 0x9, 0x0, 0x9, 0x8, 0x3, 0xff, 0x7, 0x73, 0x946c}) clock_adjtime(0x6, &(0x7f0000000200)={0x4, 0x1, 0x100, 0x6, 0x2, 0x6, 0x1, 0x1dd, 0x9, 0x1000000000000000, 0x0, 0x6, 0x1, 0x1, 0x9, 0x5, 0x3023, 0x2, 0x4, 0xfffffffffffffff9, 0x429, 0x3, 0x0, 0x9, 0xffffffffffffff05, 0x1000}) clock_adjtime(0x3, &(0x7f0000000300)={0x0, 0x8, 0x9, 0x9, 0x9, 0x9, 0x6, 0x9, 0x8, 0x1, 0xd0fc, 0x55, 0x2, 0x0, 0x1, 0x1f, 0x100000001, 0x8f44, 0x53, 0x0, 0x3, 0x140000000000, 0x9, 0x8000, 0x0, 0x10001}) r0 = syz_mount_image$iso9660(&(0x7f0000000400), &(0x7f0000000440)='./file0\x00', 0x4, 0x1, &(0x7f0000000480)=[{0xfffffffffffffffe, 0x0, 0x3}], 0x2014400, &(0x7f00000004c0)={[{@check_relaxed}, {@dmode}, {@check_relaxed}], [{@euid_lt={'euid<', 0xee01}}, {@euid_eq}, {@rootcontext={'rootcontext', 0x3d, 'staff_u'}}, {@obj_user={'obj_user', 0x3d, '#-_'}}, {@rootcontext={'rootcontext', 0x3d, 'staff_u'}}]}) faccessat(r0, &(0x7f0000000580)='./file0\x00', 0x88) clock_adjtime(0x4, &(0x7f00000005c0)={0x80000000, 0x100000000, 0xba, 0x80000000, 0x4, 0x20d4e190, 0x7, 0x400, 0x33, 0x7a, 0x1, 0x465d, 0x7f, 0x5, 0x3, 0x1, 0x0, 0x8, 0x7, 0x7ff, 0x1, 0x4, 0x3f, 0x7fff, 0x700b, 0x96}) r1 = accept$unix(0xffffffffffffffff, 0x0, &(0x7f00000006c0)) getsockname$unix(r1, &(0x7f0000000700), &(0x7f0000000780)=0x6e) clock_adjtime(0x3, &(0x7f00000007c0)={0x6, 0x6, 0x7, 0x8000, 0x7ff, 0x5c, 0x401, 0x2, 0x9, 0x4, 0x0, 0x61, 0x2, 0x9b71, 0x100000000, 0x7fffffff, 0x322, 0xc70d, 0x9, 0xd, 0x9, 0x0, 0x9, 0x1a1f00000000, 0xffffffffffffffff, 0x9}) clock_adjtime(0x6, &(0x7f00000008c0)={0x4, 0x9, 0x3, 0xfffffffffffffff7, 0xb31, 0x1, 0x1, 0x2, 0x538, 0x0, 0x401, 0x1, 0xdd, 0xfffffffffffffff7, 0xec54, 0x4, 0x100000001, 0x0, 0xa, 0x1, 0x7ff, 0xcd, 0xf2, 0x80, 0x7, 0x8000}) clock_adjtime(0x0, &(0x7f00000009c0)={0x8, 0xff, 0x81, 0x2, 0x100000001, 0x11, 0x5, 0x1, 0x1, 0x9, 0x1000, 0x8, 0xdf6c, 0x9, 0x8, 0x1004000000000000, 0x1ff, 0x3, 0x6, 0xf5, 0x80000, 0x1, 0xfffffffffffffd6d, 0x2, 0x6, 0xfa}) r2 = socket$unix(0x1, 0x5, 0x0) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f0000000ac0)={'wlan0\x00'}) mq_timedreceive(0xffffffffffffffff, &(0x7f0000000b00)=""/4096, 0x1000, 0x80, &(0x7f0000001b00)={0x0, 0x989680}) r3 = creat(&(0x7f0000001b40)='./file0\x00', 0x1) mknodat(r3, &(0x7f0000001b80)='./file1\x00', 0x4, 0x0) clock_adjtime(0x0, &(0x7f0000001bc0)={0xfff, 0x7fff, 0x7a12000000000, 0x2, 0xfdc, 0x54, 0x8fa, 0x3f41, 0x0, 0x4, 0x4, 0x5, 0x101, 0x5, 0x4, 0x9, 0x9, 0x30e, 0x3f, 0x2, 0x7f, 0x7, 0x6, 0x4, 0x3ff, 0x100000000}) clock_adjtime(0x2, &(0x7f0000001cc0)={0x0, 0x6, 0x7, 0xe5, 0x5, 0x6, 0x10, 0x7, 0x281, 0x40, 0x1, 0x0, 0x1, 0x10001, 0x5, 0x100, 0x0, 0x4, 0xffffffffffffe001, 0xdf, 0x7f, 0x8000, 0x9, 0x400, 0xfffffffffffffe00, 0x3f}) [ 345.305581][T20012] EXT4-fs error (device loop5): ext4_quota_enable:6323: comm syz-executor.5: Bad quota inode # 3 [ 345.308242][T20011] __should_failslab+0x81/0x90 [ 345.319000][T20012] EXT4-fs warning (device loop5): ext4_enable_quotas:6363: Failed to enable quota tracking (type=0, err=-116). Please run e2fsck to fix. [ 345.323498][T20011] should_failslab+0x5/0x20 [ 345.323525][T20011] kmem_cache_alloc+0x4f/0x320 [ 345.323546][T20011] ? __down_write_common+0x42/0x7b0 [ 345.338943][T20012] EXT4-fs (loop5): mount failed [ 345.341999][T20011] __kernfs_new_node+0x6a/0x340 [ 345.360307][T20015] EXT4-fs warning (device loop1): ext4_enable_quotas:6363: Failed to enable quota tracking (type=0, err=-22). Please run e2fsck to fix. [ 345.361657][T20011] ? up_write+0x25/0xc0 [ 345.361681][T20011] kernfs_new_node+0x5b/0xd0 [ 345.376693][T20015] EXT4-fs (loop1): mount failed [ 345.379765][T20011] __kernfs_create_file+0x45/0x1a0 [ 345.379809][T20011] ? dev_attr_show+0x90/0x90 [ 345.379828][T20011] sysfs_add_file_mode_ns+0x10b/0x1d0 [ 345.404417][T20011] internal_create_group+0x2dd/0x840 [ 345.409712][T20011] sysfs_create_group+0x1b/0x20 [ 345.414581][T20011] loop_configure+0xc58/0xf30 [ 345.419275][T20011] lo_ioctl+0x583/0x1270 [ 345.423542][T20011] ? folio_mark_dirty+0x84/0xe0 [ 345.428458][T20011] ? unlock_page+0x37/0x50 [ 345.432859][T20011] ? __rcu_read_unlock+0x5c/0x290 [ 345.437936][T20011] ? blkdev_common_ioctl+0x438/0x1180 [ 345.443323][T20011] ? selinux_file_ioctl+0x522/0x590 [ 345.448532][T20011] ? do_vfs_ioctl+0x819/0x14a0 [ 345.453343][T20011] ? lo_release+0x120/0x120 [ 345.457877][T20011] blkdev_ioctl+0x20e/0x440 [ 345.462448][T20011] ? blkdev_compat_ptr_ioctl+0x80/0x80 [ 345.467892][T20011] __se_sys_ioctl+0xcb/0x140 [ 345.472465][T20011] __x64_sys_ioctl+0x3f/0x50 [ 345.477035][T20011] do_syscall_64+0x44/0xd0 [ 345.481503][T20011] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 345.487543][T20011] RIP: 0033:0x7f6f94c22c57 [ 345.491939][T20011] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 04 54 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 345.511593][T20011] RSP: 002b:00007f6f93d98f28 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 345.519989][T20011] RAX: ffffffffffffffda RBX: 00007f6f94c6c9c8 RCX: 00007f6f94c22c57 [ 345.528003][T20011] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 345.536023][T20011] RBP: 0000000000000005 R08: 0000000000000000 R09: 00007f6f93d991d0 [ 345.543985][T20011] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 345.551937][T20011] R13: 0000000000000004 R14: 00000000200002a8 R15: 0000000000000007 [ 345.560027][T20011] 17:09:21 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc01000a, 0x24, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000003980)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="80", 0x1, 0x11100}], 0x0, &(0x7f00000000c0)) 17:09:21 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc01000a, 0x16, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000003980)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d0f465001000005fd0f4655f00000000000001", 0x1b, 0x11100}], 0x0, &(0x7f00000000c0)) [ 345.565710][T20011] loop4: detected capacity change from 0 to 264192 [ 345.568212][T20025] SELinux: duplicate or incompatible mount options [ 345.585077][T20017] loop0: detected capacity change from 0 to 264192 [ 345.585092][T20027] loop3: detected capacity change from 0 to 264192 [ 345.609253][T20027] EXT4-fs (loop3): VFS: Can't find ext4 filesystem [ 345.617277][T20017] EXT4-fs (loop0): inodes count not valid: 983072 vs 32 [ 345.617580][T20011] EXT4-fs error (device loop4): ext4_ext_check_inode:497: inode #3: comm syz-executor.4: pblk 0 bad header/extent: invalid extent entries - magic f30a, entries 1, max 4(4), depth 0(0) [ 345.629864][T20033] loop5: detected capacity change from 0 to 264192 [ 345.643151][T20032] loop1: detected capacity change from 0 to 264192 [ 345.655455][T20011] EXT4-fs error (device loop4): ext4_quota_enable:6323: comm syz-executor.4: Bad quota inode # 3 17:09:21 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc01000a, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="200410008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000003980)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d9", 0x4, 0x6800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d0f465001000005fd0f4655f00000000000001000c00000010000800000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}], 0x0, &(0x7f00000000c0)) 17:09:21 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc01000a, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000003980)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d0f465001000005fd0f4655f00000000000001000c000000100008", 0x23, 0x11100}], 0x0, 0x0) [ 345.671155][T20011] EXT4-fs warning (device loop4): ext4_enable_quotas:6363: Failed to enable quota tracking (type=0, err=-117). Please run e2fsck to fix. [ 345.707616][T20011] EXT4-fs (loop4): mount failed 17:09:22 executing program 2: clock_adjtime(0x7, &(0x7f0000000000)={0x8000, 0x62, 0xff, 0x1, 0x3, 0x1ff, 0x3ff, 0x4, 0xff, 0x20, 0x6, 0x401, 0x20, 0x0, 0x1ff, 0x8000, 0xfffffffffffffffd, 0x400, 0x8, 0x100000000, 0x2, 0x8, 0xf32, 0x4, 0x6, 0x80}) clock_adjtime(0x2, &(0x7f0000000100)={0xd9, 0x9, 0x1, 0x2, 0x1f, 0x78, 0x4b1, 0x0, 0x401, 0x5, 0x8, 0x1, 0x101, 0x100000001, 0x7, 0x1fc, 0x9, 0x9, 0x0, 0x9, 0x8, 0x3, 0xff, 0x7, 0x73, 0x946c}) clock_adjtime(0x6, &(0x7f0000000200)={0x4, 0x1, 0x100, 0x6, 0x2, 0x6, 0x1, 0x1dd, 0x9, 0x1000000000000000, 0x0, 0x6, 0x1, 0x1, 0x9, 0x5, 0x3023, 0x2, 0x4, 0xfffffffffffffff9, 0x429, 0x3, 0x0, 0x9, 0xffffffffffffff05, 0x1000}) clock_adjtime(0x3, &(0x7f0000000300)={0x0, 0x8, 0x9, 0x9, 0x9, 0x9, 0x6, 0x9, 0x8, 0x1, 0xd0fc, 0x55, 0x2, 0x0, 0x1, 0x1f, 0x100000001, 0x8f44, 0x53, 0x0, 0x3, 0x140000000000, 0x9, 0x8000, 0x0, 0x10001}) r0 = syz_mount_image$iso9660(&(0x7f0000000400), &(0x7f0000000440)='./file0\x00', 0x4, 0x1, &(0x7f0000000480)=[{0xfffffffffffffffe, 0x0, 0x3}], 0x2014400, &(0x7f00000004c0)={[{@check_relaxed}, {@dmode}, {@check_relaxed}], [{@euid_lt={'euid<', 0xee01}}, {@euid_eq}, {@rootcontext={'rootcontext', 0x3d, 'staff_u'}}, {@obj_user={'obj_user', 0x3d, '#-_'}}, {@rootcontext={'rootcontext', 0x3d, 'staff_u'}}]}) faccessat(r0, &(0x7f0000000580)='./file0\x00', 0x88) clock_adjtime(0x4, &(0x7f00000005c0)={0x80000000, 0x100000000, 0xba, 0x80000000, 0x4, 0x20d4e190, 0x7, 0x400, 0x33, 0x7a, 0x1, 0x465d, 0x7f, 0x5, 0x3, 0x1, 0x0, 0x8, 0x7, 0x7ff, 0x1, 0x4, 0x3f, 0x7fff, 0x700b, 0x96}) r1 = accept$unix(0xffffffffffffffff, 0x0, &(0x7f00000006c0)) getsockname$unix(r1, &(0x7f0000000700), &(0x7f0000000780)=0x6e) clock_adjtime(0x3, &(0x7f00000007c0)={0x6, 0x6, 0x7, 0x8000, 0x7ff, 0x5c, 0x401, 0x2, 0x9, 0x4, 0x0, 0x61, 0x2, 0x9b71, 0x100000000, 0x7fffffff, 0x322, 0xc70d, 0x9, 0xd, 0x9, 0x0, 0x9, 0x1a1f00000000, 0xffffffffffffffff, 0x9}) clock_adjtime(0x6, &(0x7f00000008c0)={0x4, 0x9, 0x3, 0xfffffffffffffff7, 0xb31, 0x1, 0x1, 0x2, 0x538, 0x0, 0x401, 0x1, 0xdd, 0xfffffffffffffff7, 0xec54, 0x4, 0x100000001, 0x0, 0xa, 0x1, 0x7ff, 0xcd, 0xf2, 0x80, 0x7, 0x8000}) clock_adjtime(0x0, &(0x7f00000009c0)={0x8, 0xff, 0x81, 0x2, 0x100000001, 0x11, 0x5, 0x1, 0x1, 0x9, 0x1000, 0x8, 0xdf6c, 0x9, 0x8, 0x1004000000000000, 0x1ff, 0x3, 0x6, 0xf5, 0x80000, 0x1, 0xfffffffffffffd6d, 0x2, 0x6, 0xfa}) r2 = socket$unix(0x1, 0x5, 0x0) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f0000000ac0)={'wlan0\x00'}) mq_timedreceive(0xffffffffffffffff, &(0x7f0000000b00)=""/4096, 0x1000, 0x80, &(0x7f0000001b00)={0x0, 0x989680}) r3 = creat(&(0x7f0000001b40)='./file0\x00', 0x1) mknodat(r3, &(0x7f0000001b80)='./file1\x00', 0x4, 0x0) clock_adjtime(0x0, &(0x7f0000001bc0)={0xfff, 0x7fff, 0x100000000000000, 0x2, 0xfdc, 0x54, 0x8fa, 0x3f41, 0x0, 0x4, 0x4, 0x5, 0x101, 0x5, 0x4, 0x9, 0x9, 0x30e, 0x3f, 0x2, 0x7f, 0x7, 0x6, 0x4, 0x3ff, 0x100000000}) clock_adjtime(0x2, &(0x7f0000001cc0)={0x0, 0x6, 0x7, 0xe5, 0x5, 0x6, 0x10, 0x7, 0x281, 0x40, 0x1, 0x0, 0x1, 0x10001, 0x5, 0x100, 0x0, 0x4, 0xffffffffffffe001, 0xdf, 0x7f, 0x8000, 0x9, 0x400, 0xfffffffffffffe00, 0x3f}) [ 345.713841][T20032] EXT4-fs warning (device loop1): ext4_enable_quotas:6363: Failed to enable quota tracking (type=0, err=-22). Please run e2fsck to fix. [ 345.714114][T20033] EXT4-fs error (device loop5): ext4_quota_enable:6323: comm syz-executor.5: Bad quota inode # 3 [ 345.730507][T20032] EXT4-fs (loop1): mount failed [ 345.743942][T20033] EXT4-fs warning (device loop5): ext4_enable_quotas:6363: Failed to enable quota tracking (type=0, err=-116). Please run e2fsck to fix. [ 345.759204][T20033] EXT4-fs (loop5): mount failed [ 345.764214][T20040] loop0: detected capacity change from 0 to 264192 17:09:22 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc01000a, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000003980)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d0f465001000005fd0f4655f00000000000001000c00000010000800000000000af3010004", 0x2d, 0x11100}], 0x0, &(0x7f00000000c0)) (fail_nth: 41) 17:09:22 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc01000a, 0x17, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000003980)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d0f465001000005fd0f4655f00000000000001", 0x1b, 0x11100}], 0x0, &(0x7f00000000c0)) 17:09:22 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc01000a, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="202010008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000003980)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d9", 0x4, 0x6800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d0f465001000005fd0f4655f00000000000001000c00000010000800000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}], 0x0, &(0x7f00000000c0)) 17:09:22 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc01000a, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000003980)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d0f465001000005fd0f4655f00000000000001000c000000100008", 0x23, 0x11100}], 0x0, 0x0) [ 345.782856][T20046] SELinux: duplicate or incompatible mount options [ 345.789853][T20040] EXT4-fs (loop0): inodes count not valid: 1049632 vs 32 [ 345.813965][T20048] loop4: detected capacity change from 0 to 264192 [ 345.821121][T20048] FAULT_INJECTION: forcing a failure. [ 345.821121][T20048] name failslab, interval 1, probability 0, space 0, times 0 [ 345.833769][T20048] CPU: 1 PID: 20048 Comm: syz-executor.4 Not tainted 5.16.0-syzkaller #0 [ 345.836207][T20052] loop1: detected capacity change from 0 to 264192 [ 345.842191][T20048] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 345.842204][T20048] Call Trace: [ 345.842210][T20048] [ 345.842217][T20048] dump_stack_lvl+0xd6/0x122 [ 345.869529][T20048] dump_stack+0x11/0x1b [ 345.873675][T20048] should_fail+0x23c/0x250 [ 345.878072][T20048] ? kobject_uevent_env+0x1a7/0xc40 [ 345.883259][T20048] __should_failslab+0x81/0x90 [ 345.888089][T20048] should_failslab+0x5/0x20 [ 345.892604][T20048] kmem_cache_alloc_trace+0x52/0x350 [ 345.897887][T20048] ? _printk+0x76/0x97 [ 345.902002][T20048] ? dev_uevent_filter+0x70/0x70 [ 345.907021][T20048] kobject_uevent_env+0x1a7/0xc40 [ 345.912063][T20048] kobject_uevent+0x18/0x20 [ 345.916555][T20048] loop_configure+0xd70/0xf30 [ 345.921245][T20048] lo_ioctl+0x583/0x1270 [ 345.925476][T20048] ? folio_mark_dirty+0x84/0xe0 [ 345.930313][T20048] ? unlock_page+0x37/0x50 [ 345.934745][T20048] ? __rcu_read_unlock+0x5c/0x290 [ 345.939755][T20048] ? blkdev_common_ioctl+0x438/0x1180 [ 345.945146][T20048] ? selinux_file_ioctl+0x522/0x590 [ 345.950345][T20048] ? do_vfs_ioctl+0x819/0x14a0 [ 345.955164][T20048] ? lo_release+0x120/0x120 [ 345.959651][T20048] blkdev_ioctl+0x20e/0x440 [ 345.964137][T20048] ? blkdev_compat_ptr_ioctl+0x80/0x80 [ 345.969752][T20048] __se_sys_ioctl+0xcb/0x140 [ 345.974606][T20048] __x64_sys_ioctl+0x3f/0x50 [ 345.979210][T20048] do_syscall_64+0x44/0xd0 [ 345.983612][T20048] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 345.989513][T20048] RIP: 0033:0x7f6f94c22c57 [ 345.993940][T20048] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 04 54 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 346.013708][T20048] RSP: 002b:00007f6f93d98f28 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 346.022102][T20048] RAX: ffffffffffffffda RBX: 00007f6f94c6c9c8 RCX: 00007f6f94c22c57 17:09:22 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc01000a, 0x25, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000003980)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="80", 0x1, 0x11100}], 0x0, &(0x7f00000000c0)) [ 346.030056][T20048] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 346.038014][T20048] RBP: 0000000000000005 R08: 0000000000000000 R09: 00007f6f93d991d0 [ 346.045968][T20048] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 346.053920][T20048] R13: 0000000000000004 R14: 00000000200002a8 R15: 0000000000000007 [ 346.061876][T20048] [ 346.074506][T20056] loop3: detected capacity change from 0 to 264192 17:09:22 executing program 2: clock_adjtime(0x7, &(0x7f0000000000)={0x8000, 0x62, 0xff, 0x1, 0x3, 0x1ff, 0x3ff, 0x4, 0xff, 0x20, 0x6, 0x401, 0x20, 0x0, 0x1ff, 0x8000, 0xfffffffffffffffd, 0x400, 0x8, 0x100000000, 0x2, 0x8, 0xf32, 0x4, 0x6, 0x80}) clock_adjtime(0x2, &(0x7f0000000100)={0xd9, 0x9, 0x1, 0x2, 0x1f, 0x78, 0x4b1, 0x0, 0x401, 0x5, 0x8, 0x1, 0x101, 0x100000001, 0x7, 0x1fc, 0x9, 0x9, 0x0, 0x9, 0x8, 0x3, 0xff, 0x7, 0x73, 0x946c}) clock_adjtime(0x6, &(0x7f0000000200)={0x4, 0x1, 0x100, 0x6, 0x2, 0x6, 0x1, 0x1dd, 0x9, 0x1000000000000000, 0x0, 0x6, 0x1, 0x1, 0x9, 0x5, 0x3023, 0x2, 0x4, 0xfffffffffffffff9, 0x429, 0x3, 0x0, 0x9, 0xffffffffffffff05, 0x1000}) clock_adjtime(0x3, &(0x7f0000000300)={0x0, 0x8, 0x9, 0x9, 0x9, 0x9, 0x6, 0x9, 0x8, 0x1, 0xd0fc, 0x55, 0x2, 0x0, 0x1, 0x1f, 0x100000001, 0x8f44, 0x53, 0x0, 0x3, 0x140000000000, 0x9, 0x8000, 0x0, 0x10001}) r0 = syz_mount_image$iso9660(&(0x7f0000000400), &(0x7f0000000440)='./file0\x00', 0x4, 0x1, &(0x7f0000000480)=[{0xfffffffffffffffe, 0x0, 0x3}], 0x2014400, &(0x7f00000004c0)={[{@check_relaxed}, {@dmode}, {@check_relaxed}], [{@euid_lt={'euid<', 0xee01}}, {@euid_eq}, {@rootcontext={'rootcontext', 0x3d, 'staff_u'}}, {@obj_user={'obj_user', 0x3d, '#-_'}}, {@rootcontext={'rootcontext', 0x3d, 'staff_u'}}]}) faccessat(r0, &(0x7f0000000580)='./file0\x00', 0x88) clock_adjtime(0x4, &(0x7f00000005c0)={0x80000000, 0x100000000, 0xba, 0x80000000, 0x4, 0x20d4e190, 0x7, 0x400, 0x33, 0x7a, 0x1, 0x465d, 0x7f, 0x5, 0x3, 0x1, 0x0, 0x8, 0x7, 0x7ff, 0x1, 0x4, 0x3f, 0x7fff, 0x700b, 0x96}) r1 = accept$unix(0xffffffffffffffff, 0x0, &(0x7f00000006c0)) getsockname$unix(r1, &(0x7f0000000700), &(0x7f0000000780)=0x6e) clock_adjtime(0x3, &(0x7f00000007c0)={0x6, 0x6, 0x7, 0x8000, 0x7ff, 0x5c, 0x401, 0x2, 0x9, 0x4, 0x0, 0x61, 0x2, 0x9b71, 0x100000000, 0x7fffffff, 0x322, 0xc70d, 0x9, 0xd, 0x9, 0x0, 0x9, 0x1a1f00000000, 0xffffffffffffffff, 0x9}) clock_adjtime(0x6, &(0x7f00000008c0)={0x4, 0x9, 0x3, 0xfffffffffffffff7, 0xb31, 0x1, 0x1, 0x2, 0x538, 0x0, 0x401, 0x1, 0xdd, 0xfffffffffffffff7, 0xec54, 0x4, 0x100000001, 0x0, 0xa, 0x1, 0x7ff, 0xcd, 0xf2, 0x80, 0x7, 0x8000}) clock_adjtime(0x0, &(0x7f00000009c0)={0x8, 0xff, 0x81, 0x2, 0x100000001, 0x11, 0x5, 0x1, 0x1, 0x9, 0x1000, 0x8, 0xdf6c, 0x9, 0x8, 0x1004000000000000, 0x1ff, 0x3, 0x6, 0xf5, 0x80000, 0x1, 0xfffffffffffffd6d, 0x2, 0x6, 0xfa}) r2 = socket$unix(0x1, 0x5, 0x0) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f0000000ac0)={'wlan0\x00'}) mq_timedreceive(0xffffffffffffffff, &(0x7f0000000b00)=""/4096, 0x1000, 0x80, &(0x7f0000001b00)={0x0, 0x989680}) r3 = creat(&(0x7f0000001b40)='./file0\x00', 0x1) mknodat(r3, &(0x7f0000001b80)='./file1\x00', 0x4, 0x0) clock_adjtime(0x0, &(0x7f0000001bc0)={0xfff, 0x7fff, 0x200000000000000, 0x2, 0xfdc, 0x54, 0x8fa, 0x3f41, 0x0, 0x4, 0x4, 0x5, 0x101, 0x5, 0x4, 0x9, 0x9, 0x30e, 0x3f, 0x2, 0x7f, 0x7, 0x6, 0x4, 0x3ff, 0x100000000}) clock_adjtime(0x2, &(0x7f0000001cc0)={0x0, 0x6, 0x7, 0xe5, 0x5, 0x6, 0x10, 0x7, 0x281, 0x40, 0x1, 0x0, 0x1, 0x10001, 0x5, 0x100, 0x0, 0x4, 0xffffffffffffe001, 0xdf, 0x7f, 0x8000, 0x9, 0x400, 0xfffffffffffffe00, 0x3f}) [ 346.102984][T20060] loop5: detected capacity change from 0 to 264192 [ 346.115639][T20052] EXT4-fs warning (device loop1): ext4_enable_quotas:6363: Failed to enable quota tracking (type=0, err=-22). Please run e2fsck to fix. [ 346.132024][T20054] loop0: detected capacity change from 0 to 264192 [ 346.139695][T20052] EXT4-fs (loop1): mount failed 17:09:22 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc01000a, 0x18, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000003980)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d0f465001000005fd0f4655f00000000000001", 0x1b, 0x11100}], 0x0, &(0x7f00000000c0)) [ 346.146192][T20048] EXT4-fs error (device loop4): ext4_ext_check_inode:497: inode #3: comm syz-executor.4: pblk 0 bad header/extent: invalid extent entries - magic f30a, entries 1, max 4(4), depth 0(0) [ 346.169203][T20054] EXT4-fs (loop0): inodes count not valid: 1056800 vs 32 17:09:22 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc01000a, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000003980)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d0f465001000005fd0f4655f00000000000001000c000000100008", 0x23, 0x11100}], 0x0, 0x0) 17:09:22 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc01000a, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="200011008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000003980)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d9", 0x4, 0x6800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d0f465001000005fd0f4655f00000000000001000c00000010000800000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}], 0x0, &(0x7f00000000c0)) [ 346.204012][T20048] EXT4-fs error (device loop4): ext4_quota_enable:6323: comm syz-executor.4: Bad quota inode # 3 [ 346.227222][T20048] EXT4-fs warning (device loop4): ext4_enable_quotas:6363: Failed to enable quota tracking (type=0, err=-117). Please run e2fsck to fix. [ 346.241844][T20048] EXT4-fs (loop4): mount failed [ 346.251848][T20068] loop1: detected capacity change from 0 to 264192 [ 346.253644][T20060] EXT4-fs error (device loop5): ext4_quota_enable:6323: comm syz-executor.5: Bad quota inode # 3 [ 346.260319][T20070] SELinux: duplicate or incompatible mount options [ 346.279502][T19543] ================================================================== [ 346.287576][T19543] BUG: KCSAN: data-race in delete_from_page_cache_batch / folio_mapping [ 346.295882][T19543] [ 346.298184][T19543] write to 0xffffea000423ae58 of 8 bytes by task 20068 on cpu 0: [ 346.305872][T19543] delete_from_page_cache_batch+0x35c/0x780 [ 346.311745][T19543] truncate_inode_pages_range+0x1d5/0xa00 [ 346.317443][T19543] truncate_inode_pages+0x20/0x30 [ 346.322489][T19543] set_blocksize+0x24e/0x270 [ 346.327073][T19543] sb_min_blocksize+0x92/0x110 [ 346.331816][T19543] ext4_fill_super+0x295/0x5870 [ 346.336640][T19543] mount_bdev+0x1e8/0x290 [ 346.340950][T19543] legacy_get_tree+0x70/0xc0 [ 346.345519][T19543] vfs_get_tree+0x4a/0x1a0 [ 346.349909][T19543] path_mount+0x11cf/0x1c40 [ 346.354390][T19543] __se_sys_mount+0x24b/0x2f0 [ 346.359087][T19543] __x64_sys_mount+0x63/0x70 [ 346.363653][T19543] do_syscall_64+0x44/0xd0 [ 346.368043][T19543] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 346.373913][T19543] [ 346.376291][T19543] read to 0xffffea000423ae58 of 8 bytes by task 19543 on cpu 1: [ 346.383893][T19543] folio_mapping+0x92/0x120 [ 346.388490][T19543] __pagevec_lru_add_fn+0x81/0x380 [ 346.393676][T19543] __pagevec_lru_add+0x1c3/0x270 [ 346.398600][T19543] folio_add_lru+0x11a/0x160 [ 346.403182][T19543] lru_cache_add+0x37/0x50 [ 346.407581][T19543] lru_cache_add_inactive_or_unevictable+0x46/0x140 [ 346.414158][T19543] do_anonymous_page+0x6fe/0x8d0 [ 346.419076][T19543] handle_mm_fault+0x814/0x1590 [ 346.423905][T19543] do_user_addr_fault+0x609/0xbe0 [ 346.428906][T19543] exc_page_fault+0x91/0x290 [ 346.433472][T19543] asm_exc_page_fault+0x1e/0x30 [ 346.438300][T19543] [ 346.440598][T19543] value changed: 0xffff888101320580 -> 0x0000000000000000 [ 346.447678][T19543] [ 346.449977][T19543] Reported by Kernel Concurrency Sanitizer on: [ 346.456097][T19543] CPU: 1 PID: 19543 Comm: udevd Not tainted 5.16.0-syzkaller #0 [ 346.463704][T19543] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 346.473732][T19543] ================================================================== [ 346.485243][T20060] EXT4-fs warning (device loop5): ext4_enable_quotas:6363: Failed to enable quota tracking (type=0, err=-116). Please run e2fsck to fix. 17:09:22 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc01000a, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000003980)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d0f465001000005fd0f4655f00000000000001000c000000100008", 0x23, 0x11100}], 0x0, &(0x7f00000000c0)) (fail_nth: 1) [ 346.501003][T20073] loop3: detected capacity change from 0 to 264192 [ 346.502116][T20060] EXT4-fs (loop5): mount failed [ 346.517495][T20071] loop0: detected capacity change from 0 to 264192 17:09:22 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc01000a, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000003980)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d0f465001000005fd0f4655f00000000000001000c00000010000800000000000af3010004", 0x2d, 0x11100}], 0x0, &(0x7f00000000c0)) (fail_nth: 42) [ 346.577361][T20071] EXT4-fs (loop0): inodes count not valid: 1114144 vs 32 [ 346.591290][T20079] FAULT_INJECTION: forcing a failure. [ 346.591290][T20079] name failslab, interval 1, probability 0, space 0, times 0 [ 346.603984][T20079] CPU: 1 PID: 20079 Comm: syz-executor.3 Not tainted 5.16.0-syzkaller #0 [ 346.604472][T20068] EXT4-fs warning (device loop1): ext4_enable_quotas:6363: Failed to enable quota tracking (type=0, err=-22). Please run e2fsck to fix. [ 346.612493][T20079] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 346.612507][T20079] Call Trace: [ 346.612514][T20079] [ 346.612521][T20079] dump_stack_lvl+0xd6/0x122 [ 346.612547][T20079] dump_stack+0x11/0x1b [ 346.628193][T20068] EXT4-fs (loop1): mount failed [ 346.636892][T20079] should_fail+0x23c/0x250 [ 346.636918][T20079] ? __se_sys_memfd_create+0xe9/0x350 [ 346.644239][T20081] loop4: detected capacity change from 0 to 264192 [ 346.648459][T20079] __should_failslab+0x81/0x90 [ 346.648488][T20079] should_failslab+0x5/0x20 [ 346.648510][T20079] __kmalloc+0x6f/0x370 [ 346.653958][T20081] FAULT_INJECTION: forcing a failure. [ 346.653958][T20081] name failslab, interval 1, probability 0, space 0, times 0 [ 346.657533][T20079] ? strnlen_user+0x137/0x1c0 [ 346.657562][T20079] __se_sys_memfd_create+0xe9/0x350 [ 346.657585][T20079] __x64_sys_memfd_create+0x2d/0x40 [ 346.714980][T20079] do_syscall_64+0x44/0xd0 [ 346.719409][T20079] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 346.725295][T20079] RIP: 0033:0x7f984e711e99 [ 346.729693][T20079] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 346.749287][T20079] RSP: 002b:00007f984d887f28 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 346.757684][T20079] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007f984e711e99 [ 346.765646][T20079] RDX: 0000000000022200 RSI: 0000000000000000 RDI: 00007f984e76b168 [ 346.773608][T20079] RBP: 0000000000000007 R08: 0000000000011100 R09: 00007f984d8881d0 [ 346.781562][T20079] R10: 0000000000000007 R11: 0000000000000246 R12: 0000000008100000 [ 346.789517][T20079] R13: 0000000020000100 R14: 0000000008100000 R15: 00000000200000c0 [ 346.797490][T20079] [ 346.800492][T20081] CPU: 0 PID: 20081 Comm: syz-executor.4 Not tainted 5.16.0-syzkaller #0 [ 346.808994][T20081] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 346.819049][T20081] Call Trace: [ 346.822330][T20081] [ 346.825387][T20081] dump_stack_lvl+0xd6/0x122 [ 346.830052][T20081] dump_stack+0x11/0x1b [ 346.834216][T20081] should_fail+0x23c/0x250 [ 346.838633][T20081] ? kobject_uevent_env+0x1a7/0xc40 [ 346.843976][T20081] __should_failslab+0x81/0x90 [ 346.849728][T20081] should_failslab+0x5/0x20 [ 346.854242][T20081] kmem_cache_alloc_trace+0x52/0x350 [ 346.859535][T20081] ? _printk+0x76/0x97 [ 346.863632][T20081] ? dev_uevent_filter+0x70/0x70 [ 346.868732][T20081] kobject_uevent_env+0x1a7/0xc40 [ 346.873776][T20081] kobject_uevent+0x18/0x20 17:09:23 executing program 2: clock_adjtime(0x7, &(0x7f0000000000)={0x8000, 0x62, 0xff, 0x1, 0x3, 0x1ff, 0x3ff, 0x4, 0xff, 0x20, 0x6, 0x401, 0x20, 0x0, 0x1ff, 0x8000, 0xfffffffffffffffd, 0x400, 0x8, 0x100000000, 0x2, 0x8, 0xf32, 0x4, 0x6, 0x80}) clock_adjtime(0x2, &(0x7f0000000100)={0xd9, 0x9, 0x1, 0x2, 0x1f, 0x78, 0x4b1, 0x0, 0x401, 0x5, 0x8, 0x1, 0x101, 0x100000001, 0x7, 0x1fc, 0x9, 0x9, 0x0, 0x9, 0x8, 0x3, 0xff, 0x7, 0x73, 0x946c}) clock_adjtime(0x6, &(0x7f0000000200)={0x4, 0x1, 0x100, 0x6, 0x2, 0x6, 0x1, 0x1dd, 0x9, 0x1000000000000000, 0x0, 0x6, 0x1, 0x1, 0x9, 0x5, 0x3023, 0x2, 0x4, 0xfffffffffffffff9, 0x429, 0x3, 0x0, 0x9, 0xffffffffffffff05, 0x1000}) clock_adjtime(0x3, &(0x7f0000000300)={0x0, 0x8, 0x9, 0x9, 0x9, 0x9, 0x6, 0x9, 0x8, 0x1, 0xd0fc, 0x55, 0x2, 0x0, 0x1, 0x1f, 0x100000001, 0x8f44, 0x53, 0x0, 0x3, 0x140000000000, 0x9, 0x8000, 0x0, 0x10001}) r0 = syz_mount_image$iso9660(&(0x7f0000000400), &(0x7f0000000440)='./file0\x00', 0x4, 0x1, &(0x7f0000000480)=[{0xfffffffffffffffe, 0x0, 0x3}], 0x2014400, &(0x7f00000004c0)={[{@check_relaxed}, {@dmode}, {@check_relaxed}], [{@euid_lt={'euid<', 0xee01}}, {@euid_eq}, {@rootcontext={'rootcontext', 0x3d, 'staff_u'}}, {@obj_user={'obj_user', 0x3d, '#-_'}}, {@rootcontext={'rootcontext', 0x3d, 'staff_u'}}]}) faccessat(r0, &(0x7f0000000580)='./file0\x00', 0x88) clock_adjtime(0x4, &(0x7f00000005c0)={0x80000000, 0x100000000, 0xba, 0x80000000, 0x4, 0x20d4e190, 0x7, 0x400, 0x33, 0x7a, 0x1, 0x465d, 0x7f, 0x5, 0x3, 0x1, 0x0, 0x8, 0x7, 0x7ff, 0x1, 0x4, 0x3f, 0x7fff, 0x700b, 0x96}) r1 = accept$unix(0xffffffffffffffff, 0x0, &(0x7f00000006c0)) getsockname$unix(r1, &(0x7f0000000700), &(0x7f0000000780)=0x6e) clock_adjtime(0x3, &(0x7f00000007c0)={0x6, 0x6, 0x7, 0x8000, 0x7ff, 0x5c, 0x401, 0x2, 0x9, 0x4, 0x0, 0x61, 0x2, 0x9b71, 0x100000000, 0x7fffffff, 0x322, 0xc70d, 0x9, 0xd, 0x9, 0x0, 0x9, 0x1a1f00000000, 0xffffffffffffffff, 0x9}) clock_adjtime(0x6, &(0x7f00000008c0)={0x4, 0x9, 0x3, 0xfffffffffffffff7, 0xb31, 0x1, 0x1, 0x2, 0x538, 0x0, 0x401, 0x1, 0xdd, 0xfffffffffffffff7, 0xec54, 0x4, 0x100000001, 0x0, 0xa, 0x1, 0x7ff, 0xcd, 0xf2, 0x80, 0x7, 0x8000}) clock_adjtime(0x0, &(0x7f00000009c0)={0x8, 0xff, 0x81, 0x2, 0x100000001, 0x11, 0x5, 0x1, 0x1, 0x9, 0x1000, 0x8, 0xdf6c, 0x9, 0x8, 0x1004000000000000, 0x1ff, 0x3, 0x6, 0xf5, 0x80000, 0x1, 0xfffffffffffffd6d, 0x2, 0x6, 0xfa}) r2 = socket$unix(0x1, 0x5, 0x0) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f0000000ac0)={'wlan0\x00'}) mq_timedreceive(0xffffffffffffffff, &(0x7f0000000b00)=""/4096, 0x1000, 0x80, &(0x7f0000001b00)={0x0, 0x989680}) r3 = creat(&(0x7f0000001b40)='./file0\x00', 0x1) mknodat(r3, &(0x7f0000001b80)='./file1\x00', 0x4, 0x0) clock_adjtime(0x0, &(0x7f0000001bc0)={0xfff, 0x7fff, 0x300000000000000, 0x2, 0xfdc, 0x54, 0x8fa, 0x3f41, 0x0, 0x4, 0x4, 0x5, 0x101, 0x5, 0x4, 0x9, 0x9, 0x30e, 0x3f, 0x2, 0x7f, 0x7, 0x6, 0x4, 0x3ff, 0x100000000}) clock_adjtime(0x2, &(0x7f0000001cc0)={0x0, 0x6, 0x7, 0xe5, 0x5, 0x6, 0x10, 0x7, 0x281, 0x40, 0x1, 0x0, 0x1, 0x10001, 0x5, 0x100, 0x0, 0x4, 0xffffffffffffe001, 0xdf, 0x7f, 0x8000, 0x9, 0x400, 0xfffffffffffffe00, 0x3f}) 17:09:23 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc01000a, 0x26, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000003980)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="80", 0x1, 0x11100}], 0x0, &(0x7f00000000c0)) 17:09:23 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc01000a, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000003980)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d0f465001000005fd0f4655f00000000000001000c000000100008", 0x23, 0x11100}], 0x0, &(0x7f00000000c0)) (fail_nth: 2) [ 346.878288][T20081] loop_configure+0xd70/0xf30 [ 346.883009][T20081] lo_ioctl+0x583/0x1270 [ 346.887272][T20081] ? folio_mark_dirty+0x84/0xe0 [ 346.892170][T20081] ? unlock_page+0x37/0x50 [ 346.896604][T20081] ? __rcu_read_unlock+0x5c/0x290 [ 346.901775][T20081] ? blkdev_common_ioctl+0x438/0x1180 [ 346.907273][T20081] ? selinux_file_ioctl+0x522/0x590 [ 346.912482][T20081] ? do_vfs_ioctl+0x819/0x14a0 [ 346.917288][T20081] ? lo_release+0x120/0x120 [ 346.921796][T20081] blkdev_ioctl+0x20e/0x440 [ 346.926293][T20081] ? blkdev_compat_ptr_ioctl+0x80/0x80 [ 346.931340][T20084] SELinux: duplicate or incompatible mount options [ 346.931829][T20081] __se_sys_ioctl+0xcb/0x140 [ 346.943050][T20081] __x64_sys_ioctl+0x3f/0x50 [ 346.947627][T20081] do_syscall_64+0x44/0xd0 [ 346.952054][T20081] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 346.957929][T20081] RIP: 0033:0x7f6f94c22c57 [ 346.962320][T20081] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 04 54 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 346.981912][T20081] RSP: 002b:00007f6f93d98f28 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 346.990335][T20081] RAX: ffffffffffffffda RBX: 00007f6f94c6c9c8 RCX: 00007f6f94c22c57 [ 346.998288][T20081] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 347.006238][T20081] RBP: 0000000000000005 R08: 0000000000000000 R09: 00007f6f93d991d0 [ 347.014262][T20081] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 347.022211][T20081] R13: 0000000000000004 R14: 00000000200002a8 R15: 0000000000000007 [ 347.030170][T20081] [ 347.040854][T20088] loop5: detected capacity change from 0 to 264192 [ 347.090246][T20092] FAULT_INJECTION: forcing a failure. [ 347.090246][T20092] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 347.103380][T20092] CPU: 1 PID: 20092 Comm: syz-executor.3 Not tainted 5.16.0-syzkaller #0 [ 347.111866][T20092] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 347.121955][T20092] Call Trace: [ 347.125290][T20092] [ 347.128224][T20092] dump_stack_lvl+0xd6/0x122 [ 347.132821][T20092] dump_stack+0x11/0x1b [ 347.136985][T20092] should_fail+0x23c/0x250 [ 347.141398][T20092] should_fail_usercopy+0x16/0x20 [ 347.146423][T20092] _copy_from_user+0x1c/0xd0 [ 347.151134][T20092] __se_sys_memfd_create+0x125/0x350 [ 347.156472][T20092] __x64_sys_memfd_create+0x2d/0x40 [ 347.161685][T20092] do_syscall_64+0x44/0xd0 [ 347.166157][T20092] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 347.172118][T20092] RIP: 0033:0x7f984e711e99 [ 347.176568][T20092] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 347.196180][T20092] RSP: 002b:00007f984d887f28 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 347.204607][T20092] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007f984e711e99 [ 347.212579][T20092] RDX: 0000000000022200 RSI: 0000000000000000 RDI: 00007f984e76b168 [ 347.220550][T20092] RBP: 0000000000000007 R08: 0000000000011100 R09: 00007f984d8881d0 [ 347.228521][T20092] R10: 0000000000000007 R11: 0000000000000246 R12: 0000000008100000 17:09:23 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc01000a, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="200020008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000003980)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d9", 0x4, 0x6800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d0f465001000005fd0f4655f00000000000001000c00000010000800000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}], 0x0, &(0x7f00000000c0)) 17:09:23 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc01000a, 0x19, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000003980)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d0f465001000005fd0f4655f00000000000001", 0x1b, 0x11100}], 0x0, &(0x7f00000000c0)) 17:09:23 executing program 2: clock_adjtime(0x7, &(0x7f0000000000)={0x8000, 0x62, 0xff, 0x1, 0x3, 0x1ff, 0x3ff, 0x4, 0xff, 0x20, 0x6, 0x401, 0x20, 0x0, 0x1ff, 0x8000, 0xfffffffffffffffd, 0x400, 0x8, 0x100000000, 0x2, 0x8, 0xf32, 0x4, 0x6, 0x80}) clock_adjtime(0x2, &(0x7f0000000100)={0xd9, 0x9, 0x1, 0x2, 0x1f, 0x78, 0x4b1, 0x0, 0x401, 0x5, 0x8, 0x1, 0x101, 0x100000001, 0x7, 0x1fc, 0x9, 0x9, 0x0, 0x9, 0x8, 0x3, 0xff, 0x7, 0x73, 0x946c}) clock_adjtime(0x6, &(0x7f0000000200)={0x4, 0x1, 0x100, 0x6, 0x2, 0x6, 0x1, 0x1dd, 0x9, 0x1000000000000000, 0x0, 0x6, 0x1, 0x1, 0x9, 0x5, 0x3023, 0x2, 0x4, 0xfffffffffffffff9, 0x429, 0x3, 0x0, 0x9, 0xffffffffffffff05, 0x1000}) clock_adjtime(0x3, &(0x7f0000000300)={0x0, 0x8, 0x9, 0x9, 0x9, 0x9, 0x6, 0x9, 0x8, 0x1, 0xd0fc, 0x55, 0x2, 0x0, 0x1, 0x1f, 0x100000001, 0x8f44, 0x53, 0x0, 0x3, 0x140000000000, 0x9, 0x8000, 0x0, 0x10001}) r0 = syz_mount_image$iso9660(&(0x7f0000000400), &(0x7f0000000440)='./file0\x00', 0x4, 0x1, &(0x7f0000000480)=[{0xfffffffffffffffe, 0x0, 0x3}], 0x2014400, &(0x7f00000004c0)={[{@check_relaxed}, {@dmode}, {@check_relaxed}], [{@euid_lt={'euid<', 0xee01}}, {@euid_eq}, {@rootcontext={'rootcontext', 0x3d, 'staff_u'}}, {@obj_user={'obj_user', 0x3d, '#-_'}}, {@rootcontext={'rootcontext', 0x3d, 'staff_u'}}]}) faccessat(r0, &(0x7f0000000580)='./file0\x00', 0x88) clock_adjtime(0x4, &(0x7f00000005c0)={0x80000000, 0x100000000, 0xba, 0x80000000, 0x4, 0x20d4e190, 0x7, 0x400, 0x33, 0x7a, 0x1, 0x465d, 0x7f, 0x5, 0x3, 0x1, 0x0, 0x8, 0x7, 0x7ff, 0x1, 0x4, 0x3f, 0x7fff, 0x700b, 0x96}) r1 = accept$unix(0xffffffffffffffff, 0x0, &(0x7f00000006c0)) getsockname$unix(r1, &(0x7f0000000700), &(0x7f0000000780)=0x6e) clock_adjtime(0x3, &(0x7f00000007c0)={0x6, 0x6, 0x7, 0x8000, 0x7ff, 0x5c, 0x401, 0x2, 0x9, 0x4, 0x0, 0x61, 0x2, 0x9b71, 0x100000000, 0x7fffffff, 0x322, 0xc70d, 0x9, 0xd, 0x9, 0x0, 0x9, 0x1a1f00000000, 0xffffffffffffffff, 0x9}) clock_adjtime(0x6, &(0x7f00000008c0)={0x4, 0x9, 0x3, 0xfffffffffffffff7, 0xb31, 0x1, 0x1, 0x2, 0x538, 0x0, 0x401, 0x1, 0xdd, 0xfffffffffffffff7, 0xec54, 0x4, 0x100000001, 0x0, 0xa, 0x1, 0x7ff, 0xcd, 0xf2, 0x80, 0x7, 0x8000}) clock_adjtime(0x0, &(0x7f00000009c0)={0x8, 0xff, 0x81, 0x2, 0x100000001, 0x11, 0x5, 0x1, 0x1, 0x9, 0x1000, 0x8, 0xdf6c, 0x9, 0x8, 0x1004000000000000, 0x1ff, 0x3, 0x6, 0xf5, 0x80000, 0x1, 0xfffffffffffffd6d, 0x2, 0x6, 0xfa}) r2 = socket$unix(0x1, 0x5, 0x0) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f0000000ac0)={'wlan0\x00'}) mq_timedreceive(0xffffffffffffffff, &(0x7f0000000b00)=""/4096, 0x1000, 0x80, &(0x7f0000001b00)={0x0, 0x989680}) r3 = creat(&(0x7f0000001b40)='./file0\x00', 0x1) mknodat(r3, &(0x7f0000001b80)='./file1\x00', 0x4, 0x0) clock_adjtime(0x0, &(0x7f0000001bc0)={0xfff, 0x7fff, 0x700000000000000, 0x2, 0xfdc, 0x54, 0x8fa, 0x3f41, 0x0, 0x4, 0x4, 0x5, 0x101, 0x5, 0x4, 0x9, 0x9, 0x30e, 0x3f, 0x2, 0x7f, 0x7, 0x6, 0x4, 0x3ff, 0x100000000}) clock_adjtime(0x2, &(0x7f0000001cc0)={0x0, 0x6, 0x7, 0xe5, 0x5, 0x6, 0x10, 0x7, 0x281, 0x40, 0x1, 0x0, 0x1, 0x10001, 0x5, 0x100, 0x0, 0x4, 0xffffffffffffe001, 0xdf, 0x7f, 0x8000, 0x9, 0x400, 0xfffffffffffffe00, 0x3f}) [ 347.236497][T20092] R13: 0000000020000100 R14: 0000000008100000 R15: 00000000200000c0 [ 347.244763][T20092] [ 347.263646][T20097] loop0: detected capacity change from 0 to 264192 [ 347.274075][T20088] EXT4-fs error (device loop5): ext4_quota_enable:6323: comm syz-executor.5: Bad quota inode # 3 [ 347.281393][T20100] SELinux: duplicate or incompatible mount options 17:09:23 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc01000a, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="201020008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000003980)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d9", 0x4, 0x6800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d0f465001000005fd0f4655f00000000000001000c00000010000800000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}], 0x0, &(0x7f00000000c0)) 17:09:23 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc01000a, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000003980)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d0f465001000005fd0f4655f00000000000001000c000000100008", 0x23, 0x11100}], 0x0, &(0x7f00000000c0)) (fail_nth: 3) [ 347.289741][T20102] loop1: detected capacity change from 0 to 264192 [ 347.298915][T20081] EXT4-fs error (device loop4): ext4_ext_check_inode:497: inode #3: comm syz-executor.4: pblk 0 bad header/extent: invalid extent entries - magic f30a, entries 1, max 4(4), depth 0(0) [ 347.299124][T20097] EXT4-fs (loop0): inodes count not valid: 2097184 vs 32 [ 347.320233][T20088] EXT4-fs warning (device loop5): ext4_enable_quotas:6363: Failed to enable quota tracking (type=0, err=-116). Please run e2fsck to fix. 17:09:23 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc01000a, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="200022008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000003980)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d9", 0x4, 0x6800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d0f465001000005fd0f4655f00000000000001000c00000010000800000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}], 0x0, &(0x7f00000000c0)) [ 347.359029][T20088] EXT4-fs (loop5): mount failed [ 347.363963][T20081] EXT4-fs error (device loop4): ext4_quota_enable:6323: comm syz-executor.4: Bad quota inode # 3 [ 347.373853][T20109] FAULT_INJECTION: forcing a failure. [ 347.373853][T20109] name failslab, interval 1, probability 0, space 0, times 0 [ 347.387260][T20109] CPU: 0 PID: 20109 Comm: syz-executor.3 Not tainted 5.16.0-syzkaller #0 [ 347.395681][T20109] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 347.405801][T20109] Call Trace: [ 347.409070][T20109] [ 347.411994][T20109] dump_stack_lvl+0xd6/0x122 [ 347.416597][T20109] dump_stack+0x11/0x1b [ 347.420753][T20109] should_fail+0x23c/0x250 [ 347.425160][T20109] ? shmem_alloc_inode+0x22/0x30 [ 347.430098][T20109] __should_failslab+0x81/0x90 [ 347.434937][T20109] ? shmem_match+0xa0/0xa0 [ 347.439414][T20109] should_failslab+0x5/0x20 [ 347.443936][T20109] kmem_cache_alloc+0x4f/0x320 [ 347.448748][T20109] ? shmem_match+0xa0/0xa0 [ 347.453152][T20109] shmem_alloc_inode+0x22/0x30 [ 347.457906][T20109] new_inode_pseudo+0x38/0x190 [ 347.462659][T20109] new_inode+0x21/0x100 [ 347.466801][T20109] shmem_get_inode+0xb7/0x490 [ 347.471496][T20109] __shmem_file_setup+0xf1/0x1d0 [ 347.476508][T20109] shmem_file_setup+0x37/0x40 [ 347.481194][T20109] __se_sys_memfd_create+0x1c1/0x350 [ 347.486506][T20109] __x64_sys_memfd_create+0x2d/0x40 [ 347.491717][T20109] do_syscall_64+0x44/0xd0 [ 347.496142][T20109] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 347.502056][T20109] RIP: 0033:0x7f984e711e99 [ 347.506457][T20109] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 347.526070][T20109] RSP: 002b:00007f984d887f28 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 347.534469][T20109] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007f984e711e99 [ 347.542427][T20109] RDX: 0000000000022200 RSI: 0000000000000000 RDI: 00007f984e76b168 [ 347.550388][T20109] RBP: 0000000000000007 R08: 0000000000011100 R09: 00007f984d8881d0 [ 347.558344][T20109] R10: 0000000000000007 R11: 0000000000000246 R12: 0000000008100000 [ 347.566349][T20109] R13: 0000000020000100 R14: 0000000008100000 R15: 00000000200000c0 [ 347.574324][T20109] [ 347.592664][T20081] EXT4-fs warning (device loop4): ext4_enable_quotas:6363: Failed to enable quota tracking (type=0, err=-117). Please run e2fsck to fix. 17:09:23 executing program 2: clock_adjtime(0x7, &(0x7f0000000000)={0x8000, 0x62, 0xff, 0x1, 0x3, 0x1ff, 0x3ff, 0x4, 0xff, 0x20, 0x6, 0x401, 0x20, 0x0, 0x1ff, 0x8000, 0xfffffffffffffffd, 0x400, 0x8, 0x100000000, 0x2, 0x8, 0xf32, 0x4, 0x6, 0x80}) clock_adjtime(0x2, &(0x7f0000000100)={0xd9, 0x9, 0x1, 0x2, 0x1f, 0x78, 0x4b1, 0x0, 0x401, 0x5, 0x8, 0x1, 0x101, 0x100000001, 0x7, 0x1fc, 0x9, 0x9, 0x0, 0x9, 0x8, 0x3, 0xff, 0x7, 0x73, 0x946c}) clock_adjtime(0x6, &(0x7f0000000200)={0x4, 0x1, 0x100, 0x6, 0x2, 0x6, 0x1, 0x1dd, 0x9, 0x1000000000000000, 0x0, 0x6, 0x1, 0x1, 0x9, 0x5, 0x3023, 0x2, 0x4, 0xfffffffffffffff9, 0x429, 0x3, 0x0, 0x9, 0xffffffffffffff05, 0x1000}) clock_adjtime(0x3, &(0x7f0000000300)={0x0, 0x8, 0x9, 0x9, 0x9, 0x9, 0x6, 0x9, 0x8, 0x1, 0xd0fc, 0x55, 0x2, 0x0, 0x1, 0x1f, 0x100000001, 0x8f44, 0x53, 0x0, 0x3, 0x140000000000, 0x9, 0x8000, 0x0, 0x10001}) r0 = syz_mount_image$iso9660(&(0x7f0000000400), &(0x7f0000000440)='./file0\x00', 0x4, 0x1, &(0x7f0000000480)=[{0xfffffffffffffffe, 0x0, 0x3}], 0x2014400, &(0x7f00000004c0)={[{@check_relaxed}, {@dmode}, {@check_relaxed}], [{@euid_lt={'euid<', 0xee01}}, {@euid_eq}, {@rootcontext={'rootcontext', 0x3d, 'staff_u'}}, {@obj_user={'obj_user', 0x3d, '#-_'}}, {@rootcontext={'rootcontext', 0x3d, 'staff_u'}}]}) faccessat(r0, &(0x7f0000000580)='./file0\x00', 0x88) clock_adjtime(0x4, &(0x7f00000005c0)={0x80000000, 0x100000000, 0xba, 0x80000000, 0x4, 0x20d4e190, 0x7, 0x400, 0x33, 0x7a, 0x1, 0x465d, 0x7f, 0x5, 0x3, 0x1, 0x0, 0x8, 0x7, 0x7ff, 0x1, 0x4, 0x3f, 0x7fff, 0x700b, 0x96}) r1 = accept$unix(0xffffffffffffffff, 0x0, &(0x7f00000006c0)) getsockname$unix(r1, &(0x7f0000000700), &(0x7f0000000780)=0x6e) clock_adjtime(0x3, &(0x7f00000007c0)={0x6, 0x6, 0x7, 0x8000, 0x7ff, 0x5c, 0x401, 0x2, 0x9, 0x4, 0x0, 0x61, 0x2, 0x9b71, 0x100000000, 0x7fffffff, 0x322, 0xc70d, 0x9, 0xd, 0x9, 0x0, 0x9, 0x1a1f00000000, 0xffffffffffffffff, 0x9}) clock_adjtime(0x6, &(0x7f00000008c0)={0x4, 0x9, 0x3, 0xfffffffffffffff7, 0xb31, 0x1, 0x1, 0x2, 0x538, 0x0, 0x401, 0x1, 0xdd, 0xfffffffffffffff7, 0xec54, 0x4, 0x100000001, 0x0, 0xa, 0x1, 0x7ff, 0xcd, 0xf2, 0x80, 0x7, 0x8000}) clock_adjtime(0x0, &(0x7f00000009c0)={0x8, 0xff, 0x81, 0x2, 0x100000001, 0x11, 0x5, 0x1, 0x1, 0x9, 0x1000, 0x8, 0xdf6c, 0x9, 0x8, 0x1004000000000000, 0x1ff, 0x3, 0x6, 0xf5, 0x80000, 0x1, 0xfffffffffffffd6d, 0x2, 0x6, 0xfa}) r2 = socket$unix(0x1, 0x5, 0x0) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f0000000ac0)={'wlan0\x00'}) mq_timedreceive(0xffffffffffffffff, &(0x7f0000000b00)=""/4096, 0x1000, 0x80, &(0x7f0000001b00)={0x0, 0x989680}) r3 = creat(&(0x7f0000001b40)='./file0\x00', 0x1) mknodat(r3, &(0x7f0000001b80)='./file1\x00', 0x4, 0x0) clock_adjtime(0x0, &(0x7f0000001bc0)={0xfff, 0x7fff, 0x800000000000000, 0x2, 0xfdc, 0x54, 0x8fa, 0x3f41, 0x0, 0x4, 0x4, 0x5, 0x101, 0x5, 0x4, 0x9, 0x9, 0x30e, 0x3f, 0x2, 0x7f, 0x7, 0x6, 0x4, 0x3ff, 0x100000000}) clock_adjtime(0x2, &(0x7f0000001cc0)={0x0, 0x6, 0x7, 0xe5, 0x5, 0x6, 0x10, 0x7, 0x281, 0x40, 0x1, 0x0, 0x1, 0x10001, 0x5, 0x100, 0x0, 0x4, 0xffffffffffffe001, 0xdf, 0x7f, 0x8000, 0x9, 0x400, 0xfffffffffffffe00, 0x3f}) 17:09:23 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc01000a, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000003980)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d0f465001000005fd0f4655f00000000000001000c000000100008", 0x23, 0x11100}], 0x0, &(0x7f00000000c0)) (fail_nth: 4) [ 347.608034][T20102] EXT4-fs warning (device loop1): ext4_enable_quotas:6363: Failed to enable quota tracking (type=0, err=-22). Please run e2fsck to fix. [ 347.629400][T20102] EXT4-fs (loop1): mount failed [ 347.633672][T20115] FAULT_INJECTION: forcing a failure. [ 347.633672][T20115] name failslab, interval 1, probability 0, space 0, times 0 [ 347.634615][T20081] EXT4-fs (loop4): mount failed [ 347.646913][T20115] CPU: 0 PID: 20115 Comm: syz-executor.3 Not tainted 5.16.0-syzkaller #0 [ 347.660328][T20115] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 347.670382][T20115] Call Trace: [ 347.673673][T20115] [ 347.676614][T20115] dump_stack_lvl+0xd6/0x122 [ 347.676764][T20117] SELinux: duplicate or incompatible mount options [ 347.681209][T20115] dump_stack+0x11/0x1b [ 347.681233][T20115] should_fail+0x23c/0x250 [ 347.696353][T20115] ? security_inode_alloc+0x30/0x180 [ 347.701689][T20115] __should_failslab+0x81/0x90 [ 347.706523][T20115] should_failslab+0x5/0x20 [ 347.711033][T20115] kmem_cache_alloc+0x4f/0x320 [ 347.715806][T20115] security_inode_alloc+0x30/0x180 [ 347.720924][T20115] inode_init_always+0x214/0x3e0 [ 347.725917][T20115] ? shmem_match+0xa0/0xa0 [ 347.730342][T20115] new_inode_pseudo+0x6f/0x190 [ 347.735126][T20115] new_inode+0x21/0x100 [ 347.739289][T20115] shmem_get_inode+0xb7/0x490 [ 347.743973][T20115] __shmem_file_setup+0xf1/0x1d0 [ 347.748998][T20115] shmem_file_setup+0x37/0x40 [ 347.753680][T20115] __se_sys_memfd_create+0x1c1/0x350 [ 347.758985][T20115] __x64_sys_memfd_create+0x2d/0x40 [ 347.764191][T20115] do_syscall_64+0x44/0xd0 [ 347.768615][T20115] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 347.770958][T20113] loop0: detected capacity change from 0 to 264192 [ 347.774550][T20115] RIP: 0033:0x7f984e711e99 [ 347.774569][T20115] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 347.805042][T20115] RSP: 002b:00007f984d887f28 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 347.813510][T20115] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007f984e711e99 [ 347.821464][T20115] RDX: 0000000000022200 RSI: 0000000000000000 RDI: 00007f984e76b168 [ 347.829441][T20115] RBP: 0000000000000007 R08: 0000000000011100 R09: 00007f984d8881d0 [ 347.837396][T20115] R10: 0000000000000007 R11: 0000000000000246 R12: 0000000008100000 [ 347.845429][T20115] R13: 0000000020000100 R14: 0000000008100000 R15: 00000000200000c0 [ 347.853471][T20115] 17:09:24 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc01000a, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000003980)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d0f465001000005fd0f4655f00000000000001000c00000010000800000000000af3010004", 0x2d, 0x11100}], 0x0, &(0x7f00000000c0)) 17:09:24 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc01000a, 0x2b, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000003980)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="80", 0x1, 0x11100}], 0x0, &(0x7f00000000c0)) 17:09:24 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc01000a, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000003980)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d0f465001000005fd0f4655f00000000000001000c000000100008", 0x23, 0x11100}], 0x0, &(0x7f00000000c0)) (fail_nth: 5) [ 347.891132][T20113] EXT4-fs (loop0): inodes count not valid: 2228256 vs 32 [ 347.917086][T20124] FAULT_INJECTION: forcing a failure. [ 347.917086][T20124] name failslab, interval 1, probability 0, space 0, times 0 [ 347.921947][T20125] loop5: detected capacity change from 0 to 264192 [ 347.929836][T20124] CPU: 0 PID: 20124 Comm: syz-executor.3 Not tainted 5.16.0-syzkaller #0 [ 347.944810][T20124] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 347.954863][T20124] Call Trace: [ 347.958140][T20124] [ 347.961093][T20124] dump_stack_lvl+0xd6/0x122 [ 347.965837][T20124] dump_stack+0x11/0x1b [ 347.969983][T20124] should_fail+0x23c/0x250 [ 347.974385][T20124] ? __d_alloc+0x36/0x370 [ 347.978733][T20124] __should_failslab+0x81/0x90 [ 347.983485][T20124] should_failslab+0x5/0x20 [ 347.988028][T20124] kmem_cache_alloc+0x4f/0x320 [ 347.992778][T20124] ? security_inode_alloc+0x138/0x180 [ 347.998175][T20124] ? __init_rwsem+0x59/0x70 [ 348.002662][T20124] __d_alloc+0x36/0x370 [ 348.006810][T20124] ? debug_smp_processor_id+0x18/0x20 [ 348.012171][T20124] d_alloc_pseudo+0x1a/0x50 [ 348.016725][T20124] alloc_file_pseudo+0x77/0x150 [ 348.021611][T20124] __shmem_file_setup+0x14c/0x1d0 [ 348.026668][T20124] shmem_file_setup+0x37/0x40 [ 348.031328][T20124] __se_sys_memfd_create+0x1c1/0x350 [ 348.036676][T20124] __x64_sys_memfd_create+0x2d/0x40 [ 348.041858][T20124] do_syscall_64+0x44/0xd0 [ 348.046261][T20124] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 348.052144][T20124] RIP: 0033:0x7f984e711e99 [ 348.056540][T20124] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 348.076304][T20124] RSP: 002b:00007f984d887f28 EFLAGS: 00000246 ORIG_RAX: 000000000000013f 17:09:24 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc01000a, 0x1a, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000003980)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d0f465001000005fd0f4655f00000000000001", 0x1b, 0x11100}], 0x0, &(0x7f00000000c0)) 17:09:24 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc01000a, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="20002e008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000003980)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d9", 0x4, 0x6800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d0f465001000005fd0f4655f00000000000001000c00000010000800000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}], 0x0, &(0x7f00000000c0)) 17:09:24 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc01000a, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000003980)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d0f465001000005fd0f4655f00000000000001000c000000100008", 0x23, 0x11100}], 0x0, &(0x7f00000000c0)) (fail_nth: 6) [ 348.084743][T20124] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007f984e711e99 [ 348.092708][T20124] RDX: 0000000000022200 RSI: 0000000000000000 RDI: 00007f984e76b168 [ 348.100711][T20124] RBP: 0000000000000007 R08: 0000000000011100 R09: 00007f984d8881d0 [ 348.108836][T20124] R10: 0000000000000007 R11: 0000000000000246 R12: 0000000008100000 [ 348.116789][T20124] R13: 0000000020000100 R14: 0000000008100000 R15: 00000000200000c0 [ 348.124747][T20124] [ 348.134006][T20127] loop1: detected capacity change from 0 to 264192 17:09:24 executing program 2: clock_adjtime(0x7, &(0x7f0000000000)={0x8000, 0x62, 0xff, 0x1, 0x3, 0x1ff, 0x3ff, 0x4, 0xff, 0x20, 0x6, 0x401, 0x20, 0x0, 0x1ff, 0x8000, 0xfffffffffffffffd, 0x400, 0x8, 0x100000000, 0x2, 0x8, 0xf32, 0x4, 0x6, 0x80}) clock_adjtime(0x2, &(0x7f0000000100)={0xd9, 0x9, 0x1, 0x2, 0x1f, 0x78, 0x4b1, 0x0, 0x401, 0x5, 0x8, 0x1, 0x101, 0x100000001, 0x7, 0x1fc, 0x9, 0x9, 0x0, 0x9, 0x8, 0x3, 0xff, 0x7, 0x73, 0x946c}) clock_adjtime(0x6, &(0x7f0000000200)={0x4, 0x1, 0x100, 0x6, 0x2, 0x6, 0x1, 0x1dd, 0x9, 0x1000000000000000, 0x0, 0x6, 0x1, 0x1, 0x9, 0x5, 0x3023, 0x2, 0x4, 0xfffffffffffffff9, 0x429, 0x3, 0x0, 0x9, 0xffffffffffffff05, 0x1000}) clock_adjtime(0x3, &(0x7f0000000300)={0x0, 0x8, 0x9, 0x9, 0x9, 0x9, 0x6, 0x9, 0x8, 0x1, 0xd0fc, 0x55, 0x2, 0x0, 0x1, 0x1f, 0x100000001, 0x8f44, 0x53, 0x0, 0x3, 0x140000000000, 0x9, 0x8000, 0x0, 0x10001}) r0 = syz_mount_image$iso9660(&(0x7f0000000400), &(0x7f0000000440)='./file0\x00', 0x4, 0x1, &(0x7f0000000480)=[{0xfffffffffffffffe, 0x0, 0x3}], 0x2014400, &(0x7f00000004c0)={[{@check_relaxed}, {@dmode}, {@check_relaxed}], [{@euid_lt={'euid<', 0xee01}}, {@euid_eq}, {@rootcontext={'rootcontext', 0x3d, 'staff_u'}}, {@obj_user={'obj_user', 0x3d, '#-_'}}, {@rootcontext={'rootcontext', 0x3d, 'staff_u'}}]}) faccessat(r0, &(0x7f0000000580)='./file0\x00', 0x88) clock_adjtime(0x4, &(0x7f00000005c0)={0x80000000, 0x100000000, 0xba, 0x80000000, 0x4, 0x20d4e190, 0x7, 0x400, 0x33, 0x7a, 0x1, 0x465d, 0x7f, 0x5, 0x3, 0x1, 0x0, 0x8, 0x7, 0x7ff, 0x1, 0x4, 0x3f, 0x7fff, 0x700b, 0x96}) r1 = accept$unix(0xffffffffffffffff, 0x0, &(0x7f00000006c0)) getsockname$unix(r1, &(0x7f0000000700), &(0x7f0000000780)=0x6e) clock_adjtime(0x3, &(0x7f00000007c0)={0x6, 0x6, 0x7, 0x8000, 0x7ff, 0x5c, 0x401, 0x2, 0x9, 0x4, 0x0, 0x61, 0x2, 0x9b71, 0x100000000, 0x7fffffff, 0x322, 0xc70d, 0x9, 0xd, 0x9, 0x0, 0x9, 0x1a1f00000000, 0xffffffffffffffff, 0x9}) clock_adjtime(0x6, &(0x7f00000008c0)={0x4, 0x9, 0x3, 0xfffffffffffffff7, 0xb31, 0x1, 0x1, 0x2, 0x538, 0x0, 0x401, 0x1, 0xdd, 0xfffffffffffffff7, 0xec54, 0x4, 0x100000001, 0x0, 0xa, 0x1, 0x7ff, 0xcd, 0xf2, 0x80, 0x7, 0x8000}) clock_adjtime(0x0, &(0x7f00000009c0)={0x8, 0xff, 0x81, 0x2, 0x100000001, 0x11, 0x5, 0x1, 0x1, 0x9, 0x1000, 0x8, 0xdf6c, 0x9, 0x8, 0x1004000000000000, 0x1ff, 0x3, 0x6, 0xf5, 0x80000, 0x1, 0xfffffffffffffd6d, 0x2, 0x6, 0xfa}) r2 = socket$unix(0x1, 0x5, 0x0) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f0000000ac0)={'wlan0\x00'}) mq_timedreceive(0xffffffffffffffff, &(0x7f0000000b00)=""/4096, 0x1000, 0x80, &(0x7f0000001b00)={0x0, 0x989680}) r3 = creat(&(0x7f0000001b40)='./file0\x00', 0x1) mknodat(r3, &(0x7f0000001b80)='./file1\x00', 0x4, 0x0) clock_adjtime(0x0, &(0x7f0000001bc0)={0xfff, 0x7fff, 0xa00000000000000, 0x2, 0xfdc, 0x54, 0x8fa, 0x3f41, 0x0, 0x4, 0x4, 0x5, 0x101, 0x5, 0x4, 0x9, 0x9, 0x30e, 0x3f, 0x2, 0x7f, 0x7, 0x6, 0x4, 0x3ff, 0x100000000}) clock_adjtime(0x2, &(0x7f0000001cc0)={0x0, 0x6, 0x7, 0xe5, 0x5, 0x6, 0x10, 0x7, 0x281, 0x40, 0x1, 0x0, 0x1, 0x10001, 0x5, 0x100, 0x0, 0x4, 0xffffffffffffe001, 0xdf, 0x7f, 0x8000, 0x9, 0x400, 0xfffffffffffffe00, 0x3f}) [ 348.169893][T20130] FAULT_INJECTION: forcing a failure. [ 348.169893][T20130] name failslab, interval 1, probability 0, space 0, times 0 [ 348.182707][T20130] CPU: 0 PID: 20130 Comm: syz-executor.3 Not tainted 5.16.0-syzkaller #0 [ 348.191219][T20130] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 348.201288][T20130] Call Trace: [ 348.204568][T20130] [ 348.207497][T20130] dump_stack_lvl+0xd6/0x122 [ 348.212095][T20130] dump_stack+0x11/0x1b [ 348.216340][T20130] should_fail+0x23c/0x250 [ 348.220758][T20130] ? __alloc_file+0x2e/0x1a0 [ 348.225452][T20130] __should_failslab+0x81/0x90 [ 348.230265][T20130] should_failslab+0x5/0x20 [ 348.234757][T20130] kmem_cache_alloc+0x4f/0x320 [ 348.239582][T20130] __alloc_file+0x2e/0x1a0 [ 348.244000][T20130] alloc_empty_file+0xcd/0x1c0 [ 348.248758][T20130] alloc_file+0x3a/0x280 [ 348.252990][T20130] alloc_file_pseudo+0xfa/0x150 [ 348.257833][T20130] __shmem_file_setup+0x14c/0x1d0 [ 348.262877][T20130] shmem_file_setup+0x37/0x40 [ 348.267854][T20130] __se_sys_memfd_create+0x1c1/0x350 [ 348.273187][T20130] __x64_sys_memfd_create+0x2d/0x40 [ 348.278445][T20130] do_syscall_64+0x44/0xd0 [ 348.282868][T20130] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 348.288843][T20130] RIP: 0033:0x7f984e711e99 [ 348.293251][T20130] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 348.312842][T20130] RSP: 002b:00007f984d887f28 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 348.321239][T20130] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007f984e711e99 [ 348.329306][T20130] RDX: 0000000000022200 RSI: 0000000000000000 RDI: 00007f984e76b168 [ 348.337260][T20130] RBP: 0000000000000007 R08: 0000000000011100 R09: 00007f984d8881d0 [ 348.345219][T20130] R10: 0000000000000007 R11: 0000000000000246 R12: 0000000008100000 [ 348.353214][T20130] R13: 0000000020000100 R14: 0000000008100000 R15: 00000000200000c0 [ 348.361236][T20130] 17:09:24 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc01000a, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000003980)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d0f465001000005fd0f4655f00000000000001000c000000100008", 0x23, 0x11100}], 0x0, &(0x7f00000000c0)) (fail_nth: 7) [ 348.364851][T20131] loop4: detected capacity change from 0 to 264192 [ 348.372475][T20133] SELinux: duplicate or incompatible mount options [ 348.390471][T20141] FAULT_INJECTION: forcing a failure. [ 348.390471][T20141] name failslab, interval 1, probability 0, space 0, times 0 [ 348.395014][T20139] loop0: detected capacity change from 0 to 264192 [ 348.403268][T20141] CPU: 1 PID: 20141 Comm: syz-executor.3 Not tainted 5.16.0-syzkaller #0 [ 348.418120][T20141] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 348.428235][T20141] Call Trace: [ 348.431503][T20141] [ 348.434525][T20141] dump_stack_lvl+0xd6/0x122 [ 348.439203][T20141] dump_stack+0x11/0x1b [ 348.443344][T20141] should_fail+0x23c/0x250 [ 348.447751][T20141] ? security_file_alloc+0x30/0x190 [ 348.453115][T20141] __should_failslab+0x81/0x90 [ 348.457881][T20141] should_failslab+0x5/0x20 [ 348.462370][T20141] kmem_cache_alloc+0x4f/0x320 [ 348.467180][T20141] security_file_alloc+0x30/0x190 [ 348.472252][T20141] __alloc_file+0x83/0x1a0 [ 348.476746][T20141] alloc_empty_file+0xcd/0x1c0 [ 348.481533][T20141] alloc_file+0x3a/0x280 [ 348.485761][T20141] alloc_file_pseudo+0xfa/0x150 [ 348.490597][T20141] __shmem_file_setup+0x14c/0x1d0 [ 348.495607][T20141] shmem_file_setup+0x37/0x40 [ 348.500347][T20141] __se_sys_memfd_create+0x1c1/0x350 [ 348.505699][T20141] __x64_sys_memfd_create+0x2d/0x40 [ 348.510893][T20141] do_syscall_64+0x44/0xd0 [ 348.515363][T20141] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 348.521244][T20141] RIP: 0033:0x7f984e711e99 [ 348.525638][T20141] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 348.545226][T20141] RSP: 002b:00007f984d887f28 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 348.553638][T20141] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007f984e711e99 [ 348.561641][T20141] RDX: 0000000000022200 RSI: 0000000000000000 RDI: 00007f984e76b168 17:09:24 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc01000a, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000003980)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d0f465001000005fd0f4655f00000000000001000c000000100008", 0x23, 0x11100}], 0x0, &(0x7f00000000c0)) (fail_nth: 8) 17:09:24 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc01000a, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="20003f008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000003980)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d9", 0x4, 0x6800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d0f465001000005fd0f4655f00000000000001000c00000010000800000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}], 0x0, &(0x7f00000000c0)) [ 348.569594][T20141] RBP: 0000000000000007 R08: 0000000000011100 R09: 00007f984d8881d0 [ 348.577546][T20141] R10: 0000000000000007 R11: 0000000000000246 R12: 0000000008100000 [ 348.585501][T20141] R13: 0000000020000100 R14: 0000000008100000 R15: 00000000200000c0 [ 348.593481][T20141] [ 348.601533][T20139] EXT4-fs (loop0): inodes count not valid: 3014688 vs 32 [ 348.646305][T20127] EXT4-fs warning (device loop1): ext4_enable_quotas:6363: Failed to enable quota tracking (type=0, err=-22). Please run e2fsck to fix. [ 348.646328][T20125] EXT4-fs error (device loop5): ext4_quota_enable:6323: comm syz-executor.5: Bad quota inode # 3 [ 348.648709][T20125] EXT4-fs warning (device loop5): ext4_enable_quotas:6363: Failed to enable quota tracking (type=0, err=-116). Please run e2fsck to fix. [ 348.662314][T20149] FAULT_INJECTION: forcing a failure. [ 348.662314][T20149] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 348.671730][T20127] EXT4-fs (loop1): mount failed [ 348.685184][T20149] CPU: 1 PID: 20149 Comm: syz-executor.3 Not tainted 5.16.0-syzkaller #0 [ 348.685208][T20149] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 348.707787][T20125] EXT4-fs (loop5): mount failed [ 348.711624][T20149] Call Trace: [ 348.711633][T20149] [ 348.711640][T20149] dump_stack_lvl+0xd6/0x122 [ 348.730439][T20131] EXT4-fs error (device loop4): ext4_ext_check_inode:497: inode #3: comm syz-executor.4: pblk 0 bad header/extent: invalid extent entries - magic f30a, entries 1, max 4(4), depth 0(0) [ 348.732735][T20149] dump_stack+0x11/0x1b [ 348.732759][T20149] should_fail+0x23c/0x250 [ 348.732776][T20149] __alloc_pages+0x102/0x330 [ 348.743945][T20131] EXT4-fs error (device loop4): ext4_quota_enable:6323: comm syz-executor.4: Bad quota inode # 3 [ 348.755375][T20149] alloc_pages_vma+0x5ee/0x770 [ 348.755402][T20149] shmem_getpage_gfp+0x8bc/0x12c0 [ 348.755429][T20149] shmem_write_begin+0x7e/0x100 [ 348.755449][T20149] generic_perform_write+0x1c8/0x400 [ 348.766487][T20131] EXT4-fs warning (device loop4): ext4_enable_quotas:6363: Failed to enable quota tracking (type=0, err=-117). Please run e2fsck to fix. [ 348.768547][T20149] ? current_time+0xed/0x1a0 [ 348.780454][T20131] EXT4-fs (loop4): mount failed [ 348.783802][T20149] __generic_file_write_iter+0xf7/0x2b0 [ 348.828058][T20149] ? generic_write_checks+0x250/0x290 [ 348.833546][T20149] generic_file_write_iter+0x75/0x130 [ 348.838953][T20149] vfs_write+0x7f5/0x950 [ 348.843229][T20149] __x64_sys_pwrite64+0xf5/0x150 [ 348.848159][T20149] do_syscall_64+0x44/0xd0 [ 348.852620][T20149] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 348.858553][T20149] RIP: 0033:0x7f984e6c4e67 [ 348.863026][T20149] Code: 08 89 3c 24 48 89 4c 24 18 e8 e5 f8 ff ff 4c 8b 54 24 18 48 8b 54 24 10 41 89 c0 48 8b 74 24 08 8b 3c 24 b8 12 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 31 44 89 c7 48 89 04 24 e8 15 f9 ff ff 48 8b [ 348.882711][T20149] RSP: 002b:00007f984d887f00 EFLAGS: 00000293 ORIG_RAX: 0000000000000012 17:09:25 executing program 2: clock_adjtime(0x7, &(0x7f0000000000)={0x8000, 0x62, 0xff, 0x1, 0x3, 0x1ff, 0x3ff, 0x4, 0xff, 0x20, 0x6, 0x401, 0x20, 0x0, 0x1ff, 0x8000, 0xfffffffffffffffd, 0x400, 0x8, 0x100000000, 0x2, 0x8, 0xf32, 0x4, 0x6, 0x80}) clock_adjtime(0x2, &(0x7f0000000100)={0xd9, 0x9, 0x1, 0x2, 0x1f, 0x78, 0x4b1, 0x0, 0x401, 0x5, 0x8, 0x1, 0x101, 0x100000001, 0x7, 0x1fc, 0x9, 0x9, 0x0, 0x9, 0x8, 0x3, 0xff, 0x7, 0x73, 0x946c}) clock_adjtime(0x6, &(0x7f0000000200)={0x4, 0x1, 0x100, 0x6, 0x2, 0x6, 0x1, 0x1dd, 0x9, 0x1000000000000000, 0x0, 0x6, 0x1, 0x1, 0x9, 0x5, 0x3023, 0x2, 0x4, 0xfffffffffffffff9, 0x429, 0x3, 0x0, 0x9, 0xffffffffffffff05, 0x1000}) clock_adjtime(0x3, &(0x7f0000000300)={0x0, 0x8, 0x9, 0x9, 0x9, 0x9, 0x6, 0x9, 0x8, 0x1, 0xd0fc, 0x55, 0x2, 0x0, 0x1, 0x1f, 0x100000001, 0x8f44, 0x53, 0x0, 0x3, 0x140000000000, 0x9, 0x8000, 0x0, 0x10001}) r0 = syz_mount_image$iso9660(&(0x7f0000000400), &(0x7f0000000440)='./file0\x00', 0x4, 0x1, &(0x7f0000000480)=[{0xfffffffffffffffe, 0x0, 0x3}], 0x2014400, &(0x7f00000004c0)={[{@check_relaxed}, {@dmode}, {@check_relaxed}], [{@euid_lt={'euid<', 0xee01}}, {@euid_eq}, {@rootcontext={'rootcontext', 0x3d, 'staff_u'}}, {@obj_user={'obj_user', 0x3d, '#-_'}}, {@rootcontext={'rootcontext', 0x3d, 'staff_u'}}]}) faccessat(r0, &(0x7f0000000580)='./file0\x00', 0x88) clock_adjtime(0x4, &(0x7f00000005c0)={0x80000000, 0x100000000, 0xba, 0x80000000, 0x4, 0x20d4e190, 0x7, 0x400, 0x33, 0x7a, 0x1, 0x465d, 0x7f, 0x5, 0x3, 0x1, 0x0, 0x8, 0x7, 0x7ff, 0x1, 0x4, 0x3f, 0x7fff, 0x700b, 0x96}) r1 = accept$unix(0xffffffffffffffff, 0x0, &(0x7f00000006c0)) getsockname$unix(r1, &(0x7f0000000700), &(0x7f0000000780)=0x6e) clock_adjtime(0x3, &(0x7f00000007c0)={0x6, 0x6, 0x7, 0x8000, 0x7ff, 0x5c, 0x401, 0x2, 0x9, 0x4, 0x0, 0x61, 0x2, 0x9b71, 0x100000000, 0x7fffffff, 0x322, 0xc70d, 0x9, 0xd, 0x9, 0x0, 0x9, 0x1a1f00000000, 0xffffffffffffffff, 0x9}) clock_adjtime(0x6, &(0x7f00000008c0)={0x4, 0x9, 0x3, 0xfffffffffffffff7, 0xb31, 0x1, 0x1, 0x2, 0x538, 0x0, 0x401, 0x1, 0xdd, 0xfffffffffffffff7, 0xec54, 0x4, 0x100000001, 0x0, 0xa, 0x1, 0x7ff, 0xcd, 0xf2, 0x80, 0x7, 0x8000}) clock_adjtime(0x0, &(0x7f00000009c0)={0x8, 0xff, 0x81, 0x2, 0x100000001, 0x11, 0x5, 0x1, 0x1, 0x9, 0x1000, 0x8, 0xdf6c, 0x9, 0x8, 0x1004000000000000, 0x1ff, 0x3, 0x6, 0xf5, 0x80000, 0x1, 0xfffffffffffffd6d, 0x2, 0x6, 0xfa}) r2 = socket$unix(0x1, 0x5, 0x0) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f0000000ac0)={'wlan0\x00'}) mq_timedreceive(0xffffffffffffffff, &(0x7f0000000b00)=""/4096, 0x1000, 0x80, &(0x7f0000001b00)={0x0, 0x989680}) r3 = creat(&(0x7f0000001b40)='./file0\x00', 0x1) mknodat(r3, &(0x7f0000001b80)='./file1\x00', 0x4, 0x0) clock_adjtime(0x0, &(0x7f0000001bc0)={0xfff, 0x7fff, 0xb00000000000000, 0x2, 0xfdc, 0x54, 0x8fa, 0x3f41, 0x0, 0x4, 0x4, 0x5, 0x101, 0x5, 0x4, 0x9, 0x9, 0x30e, 0x3f, 0x2, 0x7f, 0x7, 0x6, 0x4, 0x3ff, 0x100000000}) clock_adjtime(0x2, &(0x7f0000001cc0)={0x0, 0x6, 0x7, 0xe5, 0x5, 0x6, 0x10, 0x7, 0x281, 0x40, 0x1, 0x0, 0x1, 0x10001, 0x5, 0x100, 0x0, 0x4, 0xffffffffffffe001, 0xdf, 0x7f, 0x8000, 0x9, 0x400, 0xfffffffffffffe00, 0x3f}) [ 348.891731][T20149] RAX: ffffffffffffffda RBX: 00007f984e75b9c8 RCX: 00007f984e6c4e67 [ 348.899692][T20149] RDX: 0000000000000066 RSI: 0000000020010000 RDI: 0000000000000004 [ 348.907681][T20149] RBP: 0000000000000007 R08: 0000000000000000 R09: 00007f984d8881d0 [ 348.915633][T20149] R10: 0000000000000400 R11: 0000000000000293 R12: 0000000000000004 [ 348.923584][T20149] R13: 0000000000000004 R14: 0000000020000200 R15: 0000000000000000 [ 348.931594][T20149] [ 348.936631][T20149] loop3: detected capacity change from 0 to 264192 17:09:25 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc01000a, 0x2e, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000003980)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="80", 0x1, 0x11100}], 0x0, &(0x7f00000000c0)) 17:09:25 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc01000a, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="200040008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000003980)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d9", 0x4, 0x6800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d0f465001000005fd0f4655f00000000000001000c00000010000800000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}], 0x0, &(0x7f00000000c0)) 17:09:25 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc01000a, 0x1b, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000003980)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d0f465001000005fd0f4655f00000000000001", 0x1b, 0x11100}], 0x0, &(0x7f00000000c0)) 17:09:25 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc010003, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000003980)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d0f465001000005fd0f4655f00000000000001000c00000010000800000000000af3010004", 0x2d, 0x11100}], 0x0, &(0x7f00000000c0)) [ 348.941466][T20153] SELinux: duplicate or incompatible mount options [ 348.943930][T20149] EXT4-fs (loop3): VFS: Can't find ext4 filesystem 17:09:25 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc01000a, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000003980)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d0f465001000005fd0f4655f00000000000001000c000000100008", 0x23, 0x11100}], 0x0, &(0x7f00000000c0)) (fail_nth: 9) 17:09:25 executing program 2: clock_adjtime(0x7, &(0x7f0000000000)={0x8000, 0x62, 0xff, 0x1, 0x3, 0x1ff, 0x3ff, 0x4, 0xff, 0x20, 0x6, 0x401, 0x20, 0x0, 0x1ff, 0x8000, 0xfffffffffffffffd, 0x400, 0x8, 0x100000000, 0x2, 0x8, 0xf32, 0x4, 0x6, 0x80}) clock_adjtime(0x2, &(0x7f0000000100)={0xd9, 0x9, 0x1, 0x2, 0x1f, 0x78, 0x4b1, 0x0, 0x401, 0x5, 0x8, 0x1, 0x101, 0x100000001, 0x7, 0x1fc, 0x9, 0x9, 0x0, 0x9, 0x8, 0x3, 0xff, 0x7, 0x73, 0x946c}) clock_adjtime(0x6, &(0x7f0000000200)={0x4, 0x1, 0x100, 0x6, 0x2, 0x6, 0x1, 0x1dd, 0x9, 0x1000000000000000, 0x0, 0x6, 0x1, 0x1, 0x9, 0x5, 0x3023, 0x2, 0x4, 0xfffffffffffffff9, 0x429, 0x3, 0x0, 0x9, 0xffffffffffffff05, 0x1000}) clock_adjtime(0x3, &(0x7f0000000300)={0x0, 0x8, 0x9, 0x9, 0x9, 0x9, 0x6, 0x9, 0x8, 0x1, 0xd0fc, 0x55, 0x2, 0x0, 0x1, 0x1f, 0x100000001, 0x8f44, 0x53, 0x0, 0x3, 0x140000000000, 0x9, 0x8000, 0x0, 0x10001}) r0 = syz_mount_image$iso9660(&(0x7f0000000400), &(0x7f0000000440)='./file0\x00', 0x4, 0x1, &(0x7f0000000480)=[{0xfffffffffffffffe, 0x0, 0x3}], 0x2014400, &(0x7f00000004c0)={[{@check_relaxed}, {@dmode}, {@check_relaxed}], [{@euid_lt={'euid<', 0xee01}}, {@euid_eq}, {@rootcontext={'rootcontext', 0x3d, 'staff_u'}}, {@obj_user={'obj_user', 0x3d, '#-_'}}, {@rootcontext={'rootcontext', 0x3d, 'staff_u'}}]}) faccessat(r0, &(0x7f0000000580)='./file0\x00', 0x88) clock_adjtime(0x4, &(0x7f00000005c0)={0x80000000, 0x100000000, 0xba, 0x80000000, 0x4, 0x20d4e190, 0x7, 0x400, 0x33, 0x7a, 0x1, 0x465d, 0x7f, 0x5, 0x3, 0x1, 0x0, 0x8, 0x7, 0x7ff, 0x1, 0x4, 0x3f, 0x7fff, 0x700b, 0x96}) r1 = accept$unix(0xffffffffffffffff, 0x0, &(0x7f00000006c0)) getsockname$unix(r1, &(0x7f0000000700), &(0x7f0000000780)=0x6e) clock_adjtime(0x3, &(0x7f00000007c0)={0x6, 0x6, 0x7, 0x8000, 0x7ff, 0x5c, 0x401, 0x2, 0x9, 0x4, 0x0, 0x61, 0x2, 0x9b71, 0x100000000, 0x7fffffff, 0x322, 0xc70d, 0x9, 0xd, 0x9, 0x0, 0x9, 0x1a1f00000000, 0xffffffffffffffff, 0x9}) clock_adjtime(0x6, &(0x7f00000008c0)={0x4, 0x9, 0x3, 0xfffffffffffffff7, 0xb31, 0x1, 0x1, 0x2, 0x538, 0x0, 0x401, 0x1, 0xdd, 0xfffffffffffffff7, 0xec54, 0x4, 0x100000001, 0x0, 0xa, 0x1, 0x7ff, 0xcd, 0xf2, 0x80, 0x7, 0x8000}) clock_adjtime(0x0, &(0x7f00000009c0)={0x8, 0xff, 0x81, 0x2, 0x100000001, 0x11, 0x5, 0x1, 0x1, 0x9, 0x1000, 0x8, 0xdf6c, 0x9, 0x8, 0x1004000000000000, 0x1ff, 0x3, 0x6, 0xf5, 0x80000, 0x1, 0xfffffffffffffd6d, 0x2, 0x6, 0xfa}) r2 = socket$unix(0x1, 0x5, 0x0) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f0000000ac0)={'wlan0\x00'}) mq_timedreceive(0xffffffffffffffff, &(0x7f0000000b00)=""/4096, 0x1000, 0x80, &(0x7f0000001b00)={0x0, 0x989680}) r3 = creat(&(0x7f0000001b40)='./file0\x00', 0x1) mknodat(r3, &(0x7f0000001b80)='./file1\x00', 0x4, 0x0) clock_adjtime(0x0, &(0x7f0000001bc0)={0xfff, 0x7fff, 0x8bcc0c0000000000, 0x2, 0xfdc, 0x54, 0x8fa, 0x3f41, 0x0, 0x4, 0x4, 0x5, 0x101, 0x5, 0x4, 0x9, 0x9, 0x30e, 0x3f, 0x2, 0x7f, 0x7, 0x6, 0x4, 0x3ff, 0x100000000}) clock_adjtime(0x2, &(0x7f0000001cc0)={0x0, 0x6, 0x7, 0xe5, 0x5, 0x6, 0x10, 0x7, 0x281, 0x40, 0x1, 0x0, 0x1, 0x10001, 0x5, 0x100, 0x0, 0x4, 0xffffffffffffe001, 0xdf, 0x7f, 0x8000, 0x9, 0x400, 0xfffffffffffffe00, 0x3f}) [ 349.004747][T20156] loop1: detected capacity change from 0 to 264192 [ 349.017622][T20160] loop4: detected capacity change from 0 to 264192 [ 349.032624][T20163] loop5: detected capacity change from 0 to 264192 [ 349.036494][T20166] FAULT_INJECTION: forcing a failure. [ 349.036494][T20166] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 349.040473][T20167] loop0: detected capacity change from 0 to 264192 [ 349.052344][T20166] CPU: 0 PID: 20166 Comm: syz-executor.3 Not tainted 5.16.0-syzkaller #0 [ 349.052368][T20166] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 349.052379][T20166] Call Trace: [ 349.052386][T20166] [ 349.052392][T20166] dump_stack_lvl+0xd6/0x122 [ 349.088133][T20166] dump_stack+0x11/0x1b [ 349.092341][T20166] should_fail+0x23c/0x250 [ 349.096740][T20166] should_fail_usercopy+0x16/0x20 [ 349.101744][T20166] copy_page_from_iter_atomic+0x2f1/0xc60 [ 349.107446][T20166] ? shmem_write_begin+0x7e/0x100 [ 349.112491][T20166] generic_perform_write+0x211/0x400 [ 349.117815][T20166] ? current_time+0xed/0x1a0 [ 349.122423][T20166] __generic_file_write_iter+0xf7/0x2b0 [ 349.128041][T20166] ? generic_write_checks+0x250/0x290 [ 349.133464][T20166] generic_file_write_iter+0x75/0x130 [ 349.138875][T20166] vfs_write+0x7f5/0x950 [ 349.143100][T20166] __x64_sys_pwrite64+0xf5/0x150 [ 349.148020][T20166] do_syscall_64+0x44/0xd0 [ 349.152431][T20166] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 349.158379][T20166] RIP: 0033:0x7f984e6c4e67 [ 349.162775][T20166] Code: 08 89 3c 24 48 89 4c 24 18 e8 e5 f8 ff ff 4c 8b 54 24 18 48 8b 54 24 10 41 89 c0 48 8b 74 24 08 8b 3c 24 b8 12 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 31 44 89 c7 48 89 04 24 e8 15 f9 ff ff 48 8b [ 349.182697][T20166] RSP: 002b:00007f984d887f00 EFLAGS: 00000293 ORIG_RAX: 0000000000000012 [ 349.191105][T20166] RAX: ffffffffffffffda RBX: 00007f984e75b9c8 RCX: 00007f984e6c4e67 [ 349.199063][T20166] RDX: 0000000000000066 RSI: 0000000020010000 RDI: 0000000000000004 [ 349.207053][T20166] RBP: 0000000000000007 R08: 0000000000000000 R09: 00007f984d8881d0 [ 349.215008][T20166] R10: 0000000000000400 R11: 0000000000000293 R12: 0000000000000004 [ 349.222998][T20166] R13: 0000000000000004 R14: 0000000020000200 R15: 0000000000000000 [ 349.230955][T20166] [ 349.235330][T20166] loop3: detected capacity change from 0 to 264192 [ 349.236019][T20165] SELinux: duplicate or incompatible mount options 17:09:25 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc01000a, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="200060008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000003980)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d9", 0x4, 0x6800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d0f465001000005fd0f4655f00000000000001000c00000010000800000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}], 0x0, &(0x7f00000000c0)) [ 349.255180][T20167] EXT4-fs (loop0): inodes count not valid: 4194336 vs 32 [ 349.282413][T20160] EXT4-fs error (device loop4): ext4_ext_check_inode:497: inode #3: comm syz-executor.4: pblk 0 bad header/extent: invalid extent entries - magic f30a, entries 1, max 4(4), depth 0(0) [ 349.323206][T20156] EXT4-fs warning (device loop1): ext4_enable_quotas:6363: Failed to enable quota tracking (type=0, err=-22). Please run e2fsck to fix. [ 349.343965][T20177] loop0: detected capacity change from 0 to 264192 [ 349.351029][T20156] EXT4-fs (loop1): mount failed [ 349.356149][T20160] EXT4-fs error (device loop4): ext4_quota_enable:6323: comm syz-executor.4: Bad quota inode # 3 [ 349.376068][T20160] EXT4-fs warning (device loop4): ext4_enable_quotas:6363: Failed to enable quota tracking (type=0, err=-117). Please run e2fsck to fix. [ 349.392881][T20163] EXT4-fs error (device loop5): ext4_quota_enable:6323: comm syz-executor.5: Bad quota inode # 3 [ 349.419046][T20160] EXT4-fs (loop4): mount failed [ 349.426165][T20166] EXT4-fs error (device loop3): ext4_ext_check_inode:497: inode #3: comm syz-executor.3: pblk 0 bad header/extent: invalid magic - magic 0, entries 0, max 0(0), depth 0(0) [ 349.451054][T20163] EXT4-fs warning (device loop5): ext4_enable_quotas:6363: Failed to enable quota tracking (type=0, err=-116). Please run e2fsck to fix. [ 349.451033][T20166] EXT4-fs error (device loop3): ext4_quota_enable:6323: comm syz-executor.3: Bad quota inode # 3 17:09:25 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc01000a, 0x21, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000003980)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d0f465001000005fd0f4655f00000000000001", 0x1b, 0x11100}], 0x0, &(0x7f00000000c0)) [ 349.465666][T20163] EXT4-fs (loop5): mount failed 17:09:25 executing program 2: clock_adjtime(0x7, &(0x7f0000000000)={0x8000, 0x62, 0xff, 0x1, 0x3, 0x1ff, 0x3ff, 0x4, 0xff, 0x20, 0x6, 0x401, 0x20, 0x0, 0x1ff, 0x8000, 0xfffffffffffffffd, 0x400, 0x8, 0x100000000, 0x2, 0x8, 0xf32, 0x4, 0x6, 0x80}) clock_adjtime(0x2, &(0x7f0000000100)={0xd9, 0x9, 0x1, 0x2, 0x1f, 0x78, 0x4b1, 0x0, 0x401, 0x5, 0x8, 0x1, 0x101, 0x100000001, 0x7, 0x1fc, 0x9, 0x9, 0x0, 0x9, 0x8, 0x3, 0xff, 0x7, 0x73, 0x946c}) clock_adjtime(0x6, &(0x7f0000000200)={0x4, 0x1, 0x100, 0x6, 0x2, 0x6, 0x1, 0x1dd, 0x9, 0x1000000000000000, 0x0, 0x6, 0x1, 0x1, 0x9, 0x5, 0x3023, 0x2, 0x4, 0xfffffffffffffff9, 0x429, 0x3, 0x0, 0x9, 0xffffffffffffff05, 0x1000}) clock_adjtime(0x3, &(0x7f0000000300)={0x0, 0x8, 0x9, 0x9, 0x9, 0x9, 0x6, 0x9, 0x8, 0x1, 0xd0fc, 0x55, 0x2, 0x0, 0x1, 0x1f, 0x100000001, 0x8f44, 0x53, 0x0, 0x3, 0x140000000000, 0x9, 0x8000, 0x0, 0x10001}) r0 = syz_mount_image$iso9660(&(0x7f0000000400), &(0x7f0000000440)='./file0\x00', 0x4, 0x1, &(0x7f0000000480)=[{0xfffffffffffffffe, 0x0, 0x3}], 0x2014400, &(0x7f00000004c0)={[{@check_relaxed}, {@dmode}, {@check_relaxed}], [{@euid_lt={'euid<', 0xee01}}, {@euid_eq}, {@rootcontext={'rootcontext', 0x3d, 'staff_u'}}, {@obj_user={'obj_user', 0x3d, '#-_'}}, {@rootcontext={'rootcontext', 0x3d, 'staff_u'}}]}) faccessat(r0, &(0x7f0000000580)='./file0\x00', 0x88) clock_adjtime(0x4, &(0x7f00000005c0)={0x80000000, 0x100000000, 0xba, 0x80000000, 0x4, 0x20d4e190, 0x7, 0x400, 0x33, 0x7a, 0x1, 0x465d, 0x7f, 0x5, 0x3, 0x1, 0x0, 0x8, 0x7, 0x7ff, 0x1, 0x4, 0x3f, 0x7fff, 0x700b, 0x96}) r1 = accept$unix(0xffffffffffffffff, 0x0, &(0x7f00000006c0)) getsockname$unix(r1, &(0x7f0000000700), &(0x7f0000000780)=0x6e) clock_adjtime(0x3, &(0x7f00000007c0)={0x6, 0x6, 0x7, 0x8000, 0x7ff, 0x5c, 0x401, 0x2, 0x9, 0x4, 0x0, 0x61, 0x2, 0x9b71, 0x100000000, 0x7fffffff, 0x322, 0xc70d, 0x9, 0xd, 0x9, 0x0, 0x9, 0x1a1f00000000, 0xffffffffffffffff, 0x9}) clock_adjtime(0x6, &(0x7f00000008c0)={0x4, 0x9, 0x3, 0xfffffffffffffff7, 0xb31, 0x1, 0x1, 0x2, 0x538, 0x0, 0x401, 0x1, 0xdd, 0xfffffffffffffff7, 0xec54, 0x4, 0x100000001, 0x0, 0xa, 0x1, 0x7ff, 0xcd, 0xf2, 0x80, 0x7, 0x8000}) clock_adjtime(0x0, &(0x7f00000009c0)={0x8, 0xff, 0x81, 0x2, 0x100000001, 0x11, 0x5, 0x1, 0x1, 0x9, 0x1000, 0x8, 0xdf6c, 0x9, 0x8, 0x1004000000000000, 0x1ff, 0x3, 0x6, 0xf5, 0x80000, 0x1, 0xfffffffffffffd6d, 0x2, 0x6, 0xfa}) r2 = socket$unix(0x1, 0x5, 0x0) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f0000000ac0)={'wlan0\x00'}) mq_timedreceive(0xffffffffffffffff, &(0x7f0000000b00)=""/4096, 0x1000, 0x80, &(0x7f0000001b00)={0x0, 0x989680}) r3 = creat(&(0x7f0000001b40)='./file0\x00', 0x1) mknodat(r3, &(0x7f0000001b80)='./file1\x00', 0x4, 0x0) clock_adjtime(0x0, &(0x7f0000001bc0)={0xfff, 0x7fff, 0xfff85ee000000000, 0x2, 0xfdc, 0x54, 0x8fa, 0x3f41, 0x0, 0x4, 0x4, 0x5, 0x101, 0x5, 0x4, 0x9, 0x9, 0x30e, 0x3f, 0x2, 0x7f, 0x7, 0x6, 0x4, 0x3ff, 0x100000000}) clock_adjtime(0x2, &(0x7f0000001cc0)={0x0, 0x6, 0x7, 0xe5, 0x5, 0x6, 0x10, 0x7, 0x281, 0x40, 0x1, 0x0, 0x1, 0x10001, 0x5, 0x100, 0x0, 0x4, 0xffffffffffffe001, 0xdf, 0x7f, 0x8000, 0x9, 0x400, 0xfffffffffffffe00, 0x3f}) 17:09:25 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc01000a, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="20fffe008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000003980)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d9", 0x4, 0x6800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d0f465001000005fd0f4655f00000000000001000c00000010000800000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}], 0x0, &(0x7f00000000c0)) 17:09:25 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc01000a, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="200fff008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000003980)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d9", 0x4, 0x6800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d0f465001000005fd0f4655f00000000000001000c00000010000800000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}], 0x0, &(0x7f00000000c0)) 17:09:25 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc010004, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000003980)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d0f465001000005fd0f4655f00000000000001000c00000010000800000000000af3010004", 0x2d, 0x11100}], 0x0, &(0x7f00000000c0)) [ 349.502251][T20182] loop1: detected capacity change from 0 to 264192 [ 349.509273][T20177] EXT4-fs (loop0): inodes count not valid: 6291488 vs 32 [ 349.552807][T20184] SELinux: duplicate or incompatible mount options [ 349.554822][T20190] loop4: detected capacity change from 0 to 264192 [ 349.567019][T20166] EXT4-fs warning (device loop3): ext4_enable_quotas:6363: Failed to enable quota tracking (type=0, err=-117). Please run e2fsck to fix. [ 349.584202][T20166] EXT4-fs (loop3): mount failed [ 349.589743][T20192] loop0: detected capacity change from 0 to 264192 17:09:25 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc01000a, 0x32, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000003980)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="80", 0x1, 0x11100}], 0x0, &(0x7f00000000c0)) [ 349.598569][T20182] EXT4-fs warning (device loop1): ext4_enable_quotas:6363: Failed to enable quota tracking (type=0, err=-22). Please run e2fsck to fix. [ 349.613798][T20192] EXT4-fs (loop0): inodes count not valid: 16715552 vs 32 [ 349.620353][T20182] EXT4-fs (loop1): mount failed 17:09:25 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc01000a, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="20feff008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000003980)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d9", 0x4, 0x6800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d0f465001000005fd0f4655f00000000000001000c00000010000800000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}], 0x0, &(0x7f00000000c0)) 17:09:25 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc01000a, 0x22, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000003980)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d0f465001000005fd0f4655f00000000000001", 0x1b, 0x11100}], 0x0, &(0x7f00000000c0)) 17:09:26 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc01000a, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000003980)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d0f465001000005fd0f4655f00000000000001000c000000100008", 0x23, 0x11100}], 0x0, &(0x7f00000000c0)) (fail_nth: 10) [ 349.668445][T20196] loop5: detected capacity change from 0 to 264192 [ 349.698190][T20190] EXT4-fs error (device loop4): ext4_ext_check_inode:497: inode #3: comm syz-executor.4: pblk 0 bad header/extent: invalid extent entries - magic f30a, entries 1, max 4(4), depth 0(0) [ 349.726354][T20190] EXT4-fs error (device loop4): ext4_quota_enable:6323: comm syz-executor.4: Bad quota inode # 3 [ 349.738768][T20190] EXT4-fs warning (device loop4): ext4_enable_quotas:6363: Failed to enable quota tracking (type=0, err=-117). Please run e2fsck to fix. [ 349.760490][T20205] FAULT_INJECTION: forcing a failure. [ 349.760490][T20205] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 349.762861][T20190] EXT4-fs (loop4): mount failed [ 349.773654][T20205] CPU: 0 PID: 20205 Comm: syz-executor.3 Not tainted 5.16.0-syzkaller #0 [ 349.786043][T20207] loop0: detected capacity change from 0 to 264192 [ 349.786843][T20205] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 349.793461][T20206] loop1: detected capacity change from 0 to 264192 [ 349.803445][T20205] Call Trace: [ 349.803454][T20205] [ 349.803460][T20205] dump_stack_lvl+0xd6/0x122 [ 349.810828][T20196] EXT4-fs error (device loop5): ext4_quota_enable:6323: comm syz-executor.5: Bad quota inode # 3 [ 349.813273][T20205] dump_stack+0x11/0x1b [ 349.813295][T20205] should_fail+0x23c/0x250 [ 349.816480][T20196] EXT4-fs warning (device loop5): ext4_enable_quotas:6363: Failed to enable quota tracking (type=0, err=-116). Please run e2fsck to fix. [ 349.820765][T20205] should_fail_usercopy+0x16/0x20 [ 349.858701][T20205] copy_page_from_iter_atomic+0x2f1/0xc60 [ 349.864414][T20205] ? shmem_write_begin+0x7e/0x100 [ 349.869426][T20205] generic_perform_write+0x211/0x400 [ 349.874740][T20205] ? current_time+0xed/0x1a0 [ 349.879316][T20205] __generic_file_write_iter+0xf7/0x2b0 [ 349.884850][T20205] ? generic_write_checks+0x250/0x290 [ 349.890208][T20205] generic_file_write_iter+0x75/0x130 [ 349.895573][T20205] vfs_write+0x7f5/0x950 [ 349.899808][T20205] __x64_sys_pwrite64+0xf5/0x150 [ 349.904878][T20205] do_syscall_64+0x44/0xd0 [ 349.909287][T20205] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 349.915235][T20205] RIP: 0033:0x7f984e6c4e67 [ 349.919679][T20205] Code: 08 89 3c 24 48 89 4c 24 18 e8 e5 f8 ff ff 4c 8b 54 24 18 48 8b 54 24 10 41 89 c0 48 8b 74 24 08 8b 3c 24 b8 12 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 31 44 89 c7 48 89 04 24 e8 15 f9 ff ff 48 8b [ 349.939319][T20205] RSP: 002b:00007f984d887f00 EFLAGS: 00000293 ORIG_RAX: 0000000000000012 [ 349.947797][T20205] RAX: ffffffffffffffda RBX: 00007f984e75b9c8 RCX: 00007f984e6c4e67 [ 349.955784][T20205] RDX: 0000000000000009 RSI: 0000000020010200 RDI: 0000000000000004 [ 349.963736][T20205] RBP: 0000000000000007 R08: 0000000000000000 R09: 00007f984d8881d0 17:09:26 executing program 2: clock_adjtime(0x7, &(0x7f0000000000)={0x8000, 0x62, 0xff, 0x1, 0x3, 0x1ff, 0x3ff, 0x4, 0xff, 0x20, 0x6, 0x401, 0x20, 0x0, 0x1ff, 0x8000, 0xfffffffffffffffd, 0x400, 0x8, 0x100000000, 0x2, 0x8, 0xf32, 0x4, 0x6, 0x80}) clock_adjtime(0x2, &(0x7f0000000100)={0xd9, 0x9, 0x1, 0x2, 0x1f, 0x78, 0x4b1, 0x0, 0x401, 0x5, 0x8, 0x1, 0x101, 0x100000001, 0x7, 0x1fc, 0x9, 0x9, 0x0, 0x9, 0x8, 0x3, 0xff, 0x7, 0x73, 0x946c}) clock_adjtime(0x6, &(0x7f0000000200)={0x4, 0x1, 0x100, 0x6, 0x2, 0x6, 0x1, 0x1dd, 0x9, 0x1000000000000000, 0x0, 0x6, 0x1, 0x1, 0x9, 0x5, 0x3023, 0x2, 0x4, 0xfffffffffffffff9, 0x429, 0x3, 0x0, 0x9, 0xffffffffffffff05, 0x1000}) clock_adjtime(0x3, &(0x7f0000000300)={0x0, 0x8, 0x9, 0x9, 0x9, 0x9, 0x6, 0x9, 0x8, 0x1, 0xd0fc, 0x55, 0x2, 0x0, 0x1, 0x1f, 0x100000001, 0x8f44, 0x53, 0x0, 0x3, 0x140000000000, 0x9, 0x8000, 0x0, 0x10001}) r0 = syz_mount_image$iso9660(&(0x7f0000000400), &(0x7f0000000440)='./file0\x00', 0x4, 0x1, &(0x7f0000000480)=[{0xfffffffffffffffe, 0x0, 0x3}], 0x2014400, &(0x7f00000004c0)={[{@check_relaxed}, {@dmode}, {@check_relaxed}], [{@euid_lt={'euid<', 0xee01}}, {@euid_eq}, {@rootcontext={'rootcontext', 0x3d, 'staff_u'}}, {@obj_user={'obj_user', 0x3d, '#-_'}}, {@rootcontext={'rootcontext', 0x3d, 'staff_u'}}]}) faccessat(r0, &(0x7f0000000580)='./file0\x00', 0x88) clock_adjtime(0x4, &(0x7f00000005c0)={0x80000000, 0x100000000, 0xba, 0x80000000, 0x4, 0x20d4e190, 0x7, 0x400, 0x33, 0x7a, 0x1, 0x465d, 0x7f, 0x5, 0x3, 0x1, 0x0, 0x8, 0x7, 0x7ff, 0x1, 0x4, 0x3f, 0x7fff, 0x700b, 0x96}) r1 = accept$unix(0xffffffffffffffff, 0x0, &(0x7f00000006c0)) getsockname$unix(r1, &(0x7f0000000700), &(0x7f0000000780)=0x6e) clock_adjtime(0x3, &(0x7f00000007c0)={0x6, 0x6, 0x7, 0x8000, 0x7ff, 0x5c, 0x401, 0x2, 0x9, 0x4, 0x0, 0x61, 0x2, 0x9b71, 0x100000000, 0x7fffffff, 0x322, 0xc70d, 0x9, 0xd, 0x9, 0x0, 0x9, 0x1a1f00000000, 0xffffffffffffffff, 0x9}) clock_adjtime(0x6, &(0x7f00000008c0)={0x4, 0x9, 0x3, 0xfffffffffffffff7, 0xb31, 0x1, 0x1, 0x2, 0x538, 0x0, 0x401, 0x1, 0xdd, 0xfffffffffffffff7, 0xec54, 0x4, 0x100000001, 0x0, 0xa, 0x1, 0x7ff, 0xcd, 0xf2, 0x80, 0x7, 0x8000}) clock_adjtime(0x0, &(0x7f00000009c0)={0x8, 0xff, 0x81, 0x2, 0x100000001, 0x11, 0x5, 0x1, 0x1, 0x9, 0x1000, 0x8, 0xdf6c, 0x9, 0x8, 0x1004000000000000, 0x1ff, 0x3, 0x6, 0xf5, 0x80000, 0x1, 0xfffffffffffffd6d, 0x2, 0x6, 0xfa}) r2 = socket$unix(0x1, 0x5, 0x0) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f0000000ac0)={'wlan0\x00'}) mq_timedreceive(0xffffffffffffffff, &(0x7f0000000b00)=""/4096, 0x1000, 0x80, &(0x7f0000001b00)={0x0, 0x989680}) r3 = creat(&(0x7f0000001b40)='./file0\x00', 0x1) mknodat(r3, &(0x7f0000001b80)='./file1\x00', 0x4, 0x0) clock_adjtime(0x0, &(0x7f0000001bc0)={0xfff, 0x7fff, 0xffffffff00000000, 0x2, 0xfdc, 0x54, 0x8fa, 0x3f41, 0x0, 0x4, 0x4, 0x5, 0x101, 0x5, 0x4, 0x9, 0x9, 0x30e, 0x3f, 0x2, 0x7f, 0x7, 0x6, 0x4, 0x3ff, 0x100000000}) clock_adjtime(0x2, &(0x7f0000001cc0)={0x0, 0x6, 0x7, 0xe5, 0x5, 0x6, 0x10, 0x7, 0x281, 0x40, 0x1, 0x0, 0x1, 0x10001, 0x5, 0x100, 0x0, 0x4, 0xffffffffffffe001, 0xdf, 0x7f, 0x8000, 0x9, 0x400, 0xfffffffffffffe00, 0x3f}) [ 349.971761][T20205] R10: 0000000000000560 R11: 0000000000000293 R12: 0000000000000004 [ 349.979713][T20205] R13: 0000000000000004 R14: 0000000020000218 R15: 0000000000000001 [ 349.987668][T20205] [ 349.992023][T20196] EXT4-fs (loop5): mount failed 17:09:26 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc01000a, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008f00000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000003980)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d9", 0x4, 0x6800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d0f465001000005fd0f4655f00000000000001000c00000010000800000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}], 0x0, &(0x7f00000000c0)) 17:09:26 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc010009, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000003980)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d0f465001000005fd0f4655f00000000000001000c00000010000800000000000af3010004", 0x2d, 0x11100}], 0x0, &(0x7f00000000c0)) [ 350.019914][T20205] loop3: detected capacity change from 0 to 264192 [ 350.029416][T20206] EXT4-fs warning (device loop1): ext4_enable_quotas:6363: Failed to enable quota tracking (type=0, err=-22). Please run e2fsck to fix. [ 350.045679][T20210] SELinux: duplicate or incompatible mount options [ 350.052902][T20206] EXT4-fs (loop1): mount failed [ 350.058350][T20207] EXT4-fs (loop0): inodes count not valid: 16776736 vs 32 17:09:26 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc01000a, 0x37, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000003980)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="80", 0x1, 0x11100}], 0x0, &(0x7f00000000c0)) [ 350.100700][T20215] loop4: detected capacity change from 0 to 264192 [ 350.109412][T20205] EXT4-fs error (device loop3): ext4_ext_check_inode:497: inode #3: comm syz-executor.3: pblk 0 bad header/extent: invalid magic - magic 0, entries 0, max 0(0), depth 0(0) 17:09:30 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc01000a, 0x23, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000003980)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d0f465001000005fd0f4655f00000000000001", 0x1b, 0x11100}], 0x0, &(0x7f00000000c0)) 17:09:30 executing program 2: clock_adjtime(0x7, &(0x7f0000000000)={0x8000, 0x62, 0xff, 0x1, 0x3, 0x1ff, 0x3ff, 0x4, 0xff, 0x20, 0x6, 0x401, 0x20, 0x0, 0x1ff, 0x8000, 0xfffffffffffffffd, 0x400, 0x8, 0x100000000, 0x2, 0x8, 0xf32, 0x4, 0x6, 0x80}) clock_adjtime(0x2, &(0x7f0000000100)={0xd9, 0x9, 0x1, 0x2, 0x1f, 0x78, 0x4b1, 0x0, 0x401, 0x5, 0x8, 0x1, 0x101, 0x100000001, 0x7, 0x1fc, 0x9, 0x9, 0x0, 0x9, 0x8, 0x3, 0xff, 0x7, 0x73, 0x946c}) clock_adjtime(0x6, &(0x7f0000000200)={0x4, 0x1, 0x100, 0x6, 0x2, 0x6, 0x1, 0x1dd, 0x9, 0x1000000000000000, 0x0, 0x6, 0x1, 0x1, 0x9, 0x5, 0x3023, 0x2, 0x4, 0xfffffffffffffff9, 0x429, 0x3, 0x0, 0x9, 0xffffffffffffff05, 0x1000}) clock_adjtime(0x3, &(0x7f0000000300)={0x0, 0x8, 0x9, 0x9, 0x9, 0x9, 0x6, 0x9, 0x8, 0x1, 0xd0fc, 0x55, 0x2, 0x0, 0x1, 0x1f, 0x100000001, 0x8f44, 0x53, 0x0, 0x3, 0x140000000000, 0x9, 0x8000, 0x0, 0x10001}) r0 = syz_mount_image$iso9660(&(0x7f0000000400), &(0x7f0000000440)='./file0\x00', 0x4, 0x1, &(0x7f0000000480)=[{0xfffffffffffffffe, 0x0, 0x3}], 0x2014400, &(0x7f00000004c0)={[{@check_relaxed}, {@dmode}, {@check_relaxed}], [{@euid_lt={'euid<', 0xee01}}, {@euid_eq}, {@rootcontext={'rootcontext', 0x3d, 'staff_u'}}, {@obj_user={'obj_user', 0x3d, '#-_'}}, {@rootcontext={'rootcontext', 0x3d, 'staff_u'}}]}) faccessat(r0, &(0x7f0000000580)='./file0\x00', 0x88) clock_adjtime(0x4, &(0x7f00000005c0)={0x80000000, 0x100000000, 0xba, 0x80000000, 0x4, 0x20d4e190, 0x7, 0x400, 0x33, 0x7a, 0x1, 0x465d, 0x7f, 0x5, 0x3, 0x1, 0x0, 0x8, 0x7, 0x7ff, 0x1, 0x4, 0x3f, 0x7fff, 0x700b, 0x96}) r1 = accept$unix(0xffffffffffffffff, 0x0, &(0x7f00000006c0)) getsockname$unix(r1, &(0x7f0000000700), &(0x7f0000000780)=0x6e) clock_adjtime(0x3, &(0x7f00000007c0)={0x6, 0x6, 0x7, 0x8000, 0x7ff, 0x5c, 0x401, 0x2, 0x9, 0x4, 0x0, 0x61, 0x2, 0x9b71, 0x100000000, 0x7fffffff, 0x322, 0xc70d, 0x9, 0xd, 0x9, 0x0, 0x9, 0x1a1f00000000, 0xffffffffffffffff, 0x9}) clock_adjtime(0x6, &(0x7f00000008c0)={0x4, 0x9, 0x3, 0xfffffffffffffff7, 0xb31, 0x1, 0x1, 0x2, 0x538, 0x0, 0x401, 0x1, 0xdd, 0xfffffffffffffff7, 0xec54, 0x4, 0x100000001, 0x0, 0xa, 0x1, 0x7ff, 0xcd, 0xf2, 0x80, 0x7, 0x8000}) clock_adjtime(0x0, &(0x7f00000009c0)={0x8, 0xff, 0x81, 0x2, 0x100000001, 0x11, 0x5, 0x1, 0x1, 0x9, 0x1000, 0x8, 0xdf6c, 0x9, 0x8, 0x1004000000000000, 0x1ff, 0x3, 0x6, 0xf5, 0x80000, 0x1, 0xfffffffffffffd6d, 0x2, 0x6, 0xfa}) r2 = socket$unix(0x1, 0x5, 0x0) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f0000000ac0)={'wlan0\x00'}) mq_timedreceive(0xffffffffffffffff, &(0x7f0000000b00)=""/4096, 0x1000, 0x80, &(0x7f0000001b00)={0x0, 0x989680}) r3 = creat(&(0x7f0000001b40)='./file0\x00', 0x1) mknodat(r3, &(0x7f0000001b80)='./file1\x00', 0x4, 0x0) clock_adjtime(0x0, &(0x7f0000001bc0)={0xfff, 0x7fff, 0x0, 0x7, 0xfdc, 0x54, 0x8fa, 0x3f41, 0x0, 0x4, 0x4, 0x5, 0x101, 0x5, 0x4, 0x9, 0x9, 0x30e, 0x3f, 0x2, 0x7f, 0x7, 0x6, 0x4, 0x3ff, 0x100000000}) clock_adjtime(0x2, &(0x7f0000001cc0)={0x0, 0x6, 0x7, 0xe5, 0x5, 0x6, 0x10, 0x7, 0x281, 0x40, 0x1, 0x0, 0x1, 0x10001, 0x5, 0x100, 0x0, 0x4, 0xffffffffffffe001, 0xdf, 0x7f, 0x8000, 0x9, 0x400, 0xfffffffffffffe00, 0x3f}) [ 350.158672][T20222] loop5: detected capacity change from 0 to 264192 [ 350.176531][T20205] EXT4-fs error (device loop3): ext4_quota_enable:6323: comm syz-executor.3: Bad quota inode # 3 [ 350.187687][T20225] loop1: detected capacity change from 0 to 264192 [ 350.188245][T20228] SELinux: duplicate or incompatible mount options [ 350.194313][T20205] EXT4-fs warning (device loop3): ext4_enable_quotas:6363: Failed to enable quota tracking (type=0, err=-117). Please run e2fsck to fix. [ 350.215504][T20205] EXT4-fs (loop3): mount failed [ 350.225740][T20223] loop0: detected capacity change from 0 to 264192 [ 350.226579][T20215] EXT4-fs error (device loop4): ext4_ext_check_inode:497: inode #3: comm syz-executor.4: pblk 0 bad header/extent: invalid extent entries - magic f30a, entries 1, max 4(4), depth 0(0) [ 350.255578][T20215] EXT4-fs error (device loop4): ext4_quota_enable:6323: comm syz-executor.4: Bad quota inode # 3 [ 350.282927][T20225] EXT4-fs warning (device loop1): ext4_enable_quotas:6363: Failed to enable quota tracking (type=0, err=-22). Please run e2fsck to fix. 17:09:34 executing program 2: clock_adjtime(0x7, &(0x7f0000000000)={0x8000, 0x62, 0xff, 0x1, 0x3, 0x1ff, 0x3ff, 0x4, 0xff, 0x20, 0x6, 0x401, 0x20, 0x0, 0x1ff, 0x8000, 0xfffffffffffffffd, 0x400, 0x8, 0x100000000, 0x2, 0x8, 0xf32, 0x4, 0x6, 0x80}) clock_adjtime(0x2, &(0x7f0000000100)={0xd9, 0x9, 0x1, 0x2, 0x1f, 0x78, 0x4b1, 0x0, 0x401, 0x5, 0x8, 0x1, 0x101, 0x100000001, 0x7, 0x1fc, 0x9, 0x9, 0x0, 0x9, 0x8, 0x3, 0xff, 0x7, 0x73, 0x946c}) clock_adjtime(0x6, &(0x7f0000000200)={0x4, 0x1, 0x100, 0x6, 0x2, 0x6, 0x1, 0x1dd, 0x9, 0x1000000000000000, 0x0, 0x6, 0x1, 0x1, 0x9, 0x5, 0x3023, 0x2, 0x4, 0xfffffffffffffff9, 0x429, 0x3, 0x0, 0x9, 0xffffffffffffff05, 0x1000}) clock_adjtime(0x3, &(0x7f0000000300)={0x0, 0x8, 0x9, 0x9, 0x9, 0x9, 0x6, 0x9, 0x8, 0x1, 0xd0fc, 0x55, 0x2, 0x0, 0x1, 0x1f, 0x100000001, 0x8f44, 0x53, 0x0, 0x3, 0x140000000000, 0x9, 0x8000, 0x0, 0x10001}) r0 = syz_mount_image$iso9660(&(0x7f0000000400), &(0x7f0000000440)='./file0\x00', 0x4, 0x1, &(0x7f0000000480)=[{0xfffffffffffffffe, 0x0, 0x3}], 0x2014400, &(0x7f00000004c0)={[{@check_relaxed}, {@dmode}, {@check_relaxed}], [{@euid_lt={'euid<', 0xee01}}, {@euid_eq}, {@rootcontext={'rootcontext', 0x3d, 'staff_u'}}, {@obj_user={'obj_user', 0x3d, '#-_'}}, {@rootcontext={'rootcontext', 0x3d, 'staff_u'}}]}) faccessat(r0, &(0x7f0000000580)='./file0\x00', 0x88) clock_adjtime(0x4, &(0x7f00000005c0)={0x80000000, 0x100000000, 0xba, 0x80000000, 0x4, 0x20d4e190, 0x7, 0x400, 0x33, 0x7a, 0x1, 0x465d, 0x7f, 0x5, 0x3, 0x1, 0x0, 0x8, 0x7, 0x7ff, 0x1, 0x4, 0x3f, 0x7fff, 0x700b, 0x96}) r1 = accept$unix(0xffffffffffffffff, 0x0, &(0x7f00000006c0)) getsockname$unix(r1, &(0x7f0000000700), &(0x7f0000000780)=0x6e) clock_adjtime(0x3, &(0x7f00000007c0)={0x6, 0x6, 0x7, 0x8000, 0x7ff, 0x5c, 0x401, 0x2, 0x9, 0x4, 0x0, 0x61, 0x2, 0x9b71, 0x100000000, 0x7fffffff, 0x322, 0xc70d, 0x9, 0xd, 0x9, 0x0, 0x9, 0x1a1f00000000, 0xffffffffffffffff, 0x9}) clock_adjtime(0x6, &(0x7f00000008c0)={0x4, 0x9, 0x3, 0xfffffffffffffff7, 0xb31, 0x1, 0x1, 0x2, 0x538, 0x0, 0x401, 0x1, 0xdd, 0xfffffffffffffff7, 0xec54, 0x4, 0x100000001, 0x0, 0xa, 0x1, 0x7ff, 0xcd, 0xf2, 0x80, 0x7, 0x8000}) clock_adjtime(0x0, &(0x7f00000009c0)={0x8, 0xff, 0x81, 0x2, 0x100000001, 0x11, 0x5, 0x1, 0x1, 0x9, 0x1000, 0x8, 0xdf6c, 0x9, 0x8, 0x1004000000000000, 0x1ff, 0x3, 0x6, 0xf5, 0x80000, 0x1, 0xfffffffffffffd6d, 0x2, 0x6, 0xfa}) r2 = socket$unix(0x1, 0x5, 0x0) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f0000000ac0)={'wlan0\x00'}) mq_timedreceive(0xffffffffffffffff, &(0x7f0000000b00)=""/4096, 0x1000, 0x80, &(0x7f0000001b00)={0x0, 0x989680}) r3 = creat(&(0x7f0000001b40)='./file0\x00', 0x1) mknodat(r3, &(0x7f0000001b80)='./file1\x00', 0x4, 0x0) clock_adjtime(0x0, &(0x7f0000001bc0)={0xfff, 0x7fff, 0x0, 0x8, 0xfdc, 0x54, 0x8fa, 0x3f41, 0x0, 0x4, 0x4, 0x5, 0x101, 0x5, 0x4, 0x9, 0x9, 0x30e, 0x3f, 0x2, 0x7f, 0x7, 0x6, 0x4, 0x3ff, 0x100000000}) clock_adjtime(0x2, &(0x7f0000001cc0)={0x0, 0x6, 0x7, 0xe5, 0x5, 0x6, 0x10, 0x7, 0x281, 0x40, 0x1, 0x0, 0x1, 0x10001, 0x5, 0x100, 0x0, 0x4, 0xffffffffffffe001, 0xdf, 0x7f, 0x8000, 0x9, 0x400, 0xfffffffffffffe00, 0x3f}) [ 350.287569][T20215] EXT4-fs warning (device loop4): ext4_enable_quotas:6363: Failed to enable quota tracking (type=0, err=-117). Please run e2fsck to fix. [ 350.323487][T20222] EXT4-fs error (device loop5): ext4_quota_enable:6323: comm syz-executor.5: Bad quota inode # 3 [ 350.326283][T20215] EXT4-fs (loop4): mount failed [ 350.347004][T20225] EXT4-fs (loop1): mount failed 17:09:34 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc01000a, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000003980)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d0f465001000005fd0f4655f00000000000001000c000000100008", 0x23, 0x11100}], 0x0, &(0x7f00000000c0)) (fail_nth: 11) [ 350.363195][T20222] EXT4-fs warning (device loop5): ext4_enable_quotas:6363: Failed to enable quota tracking (type=0, err=-116). Please run e2fsck to fix. [ 350.392883][T20236] SELinux: duplicate or incompatible mount options [ 350.393774][T20238] FAULT_INJECTION: forcing a failure. [ 350.393774][T20238] name fail_usercopy, interval 1, probability 0, space 0, times 0 17:09:34 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc01000a, 0x24, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000003980)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d0f465001000005fd0f4655f00000000000001", 0x1b, 0x11100}], 0x0, &(0x7f00000000c0)) [ 350.412798][T20238] CPU: 0 PID: 20238 Comm: syz-executor.3 Not tainted 5.16.0-syzkaller #0 [ 350.421219][T20238] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 350.431350][T20238] Call Trace: [ 350.434654][T20238] [ 350.437591][T20238] dump_stack_lvl+0xd6/0x122 [ 350.442202][T20238] dump_stack+0x11/0x1b [ 350.446362][T20238] should_fail+0x23c/0x250 [ 350.450782][T20238] should_fail_usercopy+0x16/0x20 [ 350.455806][T20238] copy_page_from_iter_atomic+0x2f1/0xc60 17:09:34 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc01000b, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000003980)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d0f465001000005fd0f4655f00000000000001000c00000010000800000000000af3010004", 0x2d, 0x11100}], 0x0, &(0x7f00000000c0)) [ 350.461741][T20238] ? shmem_write_begin+0x7e/0x100 [ 350.466781][T20238] generic_perform_write+0x211/0x400 [ 350.472157][T20238] ? current_time+0xed/0x1a0 [ 350.476798][T20238] __generic_file_write_iter+0xf7/0x2b0 [ 350.482358][T20238] ? generic_write_checks+0x250/0x290 [ 350.482543][T20240] loop1: detected capacity change from 0 to 264192 [ 350.487781][T20238] generic_file_write_iter+0x75/0x130 [ 350.487813][T20238] vfs_write+0x7f5/0x950 [ 350.498411][T20244] loop4: detected capacity change from 0 to 264192 [ 350.499748][T20238] __x64_sys_pwrite64+0xf5/0x150 [ 350.499772][T20238] do_syscall_64+0x44/0xd0 [ 350.499815][T20238] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 350.525728][T20238] RIP: 0033:0x7f984e6c4e67 [ 350.530138][T20238] Code: 08 89 3c 24 48 89 4c 24 18 e8 e5 f8 ff ff 4c 8b 54 24 18 48 8b 54 24 10 41 89 c0 48 8b 74 24 08 8b 3c 24 b8 12 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 31 44 89 c7 48 89 04 24 e8 15 f9 ff ff 48 8b [ 350.549782][T20238] RSP: 002b:00007f984d887f00 EFLAGS: 00000293 ORIG_RAX: 0000000000000012 [ 350.558287][T20238] RAX: ffffffffffffffda RBX: 00007f984e75b9c8 RCX: 00007f984e6c4e67 [ 350.566243][T20238] RDX: 0000000000000001 RSI: 0000000020010300 RDI: 0000000000000004 [ 350.574234][T20238] RBP: 0000000000000007 R08: 0000000000000000 R09: 00007f984d8881d0 [ 350.582254][T20238] R10: 0000000000000640 R11: 0000000000000293 R12: 0000000000000004 [ 350.590290][T20238] R13: 0000000000000004 R14: 0000000020000230 R15: 0000000000000002 [ 350.598348][T20238] [ 350.602498][T20238] loop3: detected capacity change from 0 to 264192 [ 350.620239][T20222] EXT4-fs (loop5): mount failed 17:09:38 executing program 2: clock_adjtime(0x7, &(0x7f0000000000)={0x8000, 0x62, 0xff, 0x1, 0x3, 0x1ff, 0x3ff, 0x4, 0xff, 0x20, 0x6, 0x401, 0x20, 0x0, 0x1ff, 0x8000, 0xfffffffffffffffd, 0x400, 0x8, 0x100000000, 0x2, 0x8, 0xf32, 0x4, 0x6, 0x80}) clock_adjtime(0x2, &(0x7f0000000100)={0xd9, 0x9, 0x1, 0x2, 0x1f, 0x78, 0x4b1, 0x0, 0x401, 0x5, 0x8, 0x1, 0x101, 0x100000001, 0x7, 0x1fc, 0x9, 0x9, 0x0, 0x9, 0x8, 0x3, 0xff, 0x7, 0x73, 0x946c}) clock_adjtime(0x6, &(0x7f0000000200)={0x4, 0x1, 0x100, 0x6, 0x2, 0x6, 0x1, 0x1dd, 0x9, 0x1000000000000000, 0x0, 0x6, 0x1, 0x1, 0x9, 0x5, 0x3023, 0x2, 0x4, 0xfffffffffffffff9, 0x429, 0x3, 0x0, 0x9, 0xffffffffffffff05, 0x1000}) clock_adjtime(0x3, &(0x7f0000000300)={0x0, 0x8, 0x9, 0x9, 0x9, 0x9, 0x6, 0x9, 0x8, 0x1, 0xd0fc, 0x55, 0x2, 0x0, 0x1, 0x1f, 0x100000001, 0x8f44, 0x53, 0x0, 0x3, 0x140000000000, 0x9, 0x8000, 0x0, 0x10001}) r0 = syz_mount_image$iso9660(&(0x7f0000000400), &(0x7f0000000440)='./file0\x00', 0x4, 0x1, &(0x7f0000000480)=[{0xfffffffffffffffe, 0x0, 0x3}], 0x2014400, &(0x7f00000004c0)={[{@check_relaxed}, {@dmode}, {@check_relaxed}], [{@euid_lt={'euid<', 0xee01}}, {@euid_eq}, {@rootcontext={'rootcontext', 0x3d, 'staff_u'}}, {@obj_user={'obj_user', 0x3d, '#-_'}}, {@rootcontext={'rootcontext', 0x3d, 'staff_u'}}]}) faccessat(r0, &(0x7f0000000580)='./file0\x00', 0x88) clock_adjtime(0x4, &(0x7f00000005c0)={0x80000000, 0x100000000, 0xba, 0x80000000, 0x4, 0x20d4e190, 0x7, 0x400, 0x33, 0x7a, 0x1, 0x465d, 0x7f, 0x5, 0x3, 0x1, 0x0, 0x8, 0x7, 0x7ff, 0x1, 0x4, 0x3f, 0x7fff, 0x700b, 0x96}) r1 = accept$unix(0xffffffffffffffff, 0x0, &(0x7f00000006c0)) getsockname$unix(r1, &(0x7f0000000700), &(0x7f0000000780)=0x6e) clock_adjtime(0x3, &(0x7f00000007c0)={0x6, 0x6, 0x7, 0x8000, 0x7ff, 0x5c, 0x401, 0x2, 0x9, 0x4, 0x0, 0x61, 0x2, 0x9b71, 0x100000000, 0x7fffffff, 0x322, 0xc70d, 0x9, 0xd, 0x9, 0x0, 0x9, 0x1a1f00000000, 0xffffffffffffffff, 0x9}) clock_adjtime(0x6, &(0x7f00000008c0)={0x4, 0x9, 0x3, 0xfffffffffffffff7, 0xb31, 0x1, 0x1, 0x2, 0x538, 0x0, 0x401, 0x1, 0xdd, 0xfffffffffffffff7, 0xec54, 0x4, 0x100000001, 0x0, 0xa, 0x1, 0x7ff, 0xcd, 0xf2, 0x80, 0x7, 0x8000}) clock_adjtime(0x0, &(0x7f00000009c0)={0x8, 0xff, 0x81, 0x2, 0x100000001, 0x11, 0x5, 0x1, 0x1, 0x9, 0x1000, 0x8, 0xdf6c, 0x9, 0x8, 0x1004000000000000, 0x1ff, 0x3, 0x6, 0xf5, 0x80000, 0x1, 0xfffffffffffffd6d, 0x2, 0x6, 0xfa}) r2 = socket$unix(0x1, 0x5, 0x0) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f0000000ac0)={'wlan0\x00'}) mq_timedreceive(0xffffffffffffffff, &(0x7f0000000b00)=""/4096, 0x1000, 0x80, &(0x7f0000001b00)={0x0, 0x989680}) r3 = creat(&(0x7f0000001b40)='./file0\x00', 0x1) mknodat(r3, &(0x7f0000001b80)='./file1\x00', 0x4, 0x0) clock_adjtime(0x0, &(0x7f0000001bc0)={0xfff, 0x7fff, 0x0, 0x2, 0xfdc, 0x54, 0x186a1, 0x3f41, 0x0, 0x4, 0x4, 0x5, 0x101, 0x5, 0x4, 0x9, 0x9, 0x30e, 0x3f, 0x2, 0x7f, 0x7, 0x6, 0x4, 0x3ff, 0x100000000}) clock_adjtime(0x2, &(0x7f0000001cc0)={0x0, 0x6, 0x7, 0xe5, 0x5, 0x6, 0x10, 0x7, 0x281, 0x40, 0x1, 0x0, 0x1, 0x10001, 0x5, 0x100, 0x0, 0x4, 0xffffffffffffe001, 0xdf, 0x7f, 0x8000, 0x9, 0x400, 0xfffffffffffffe00, 0x3f}) [ 350.653531][T20223] EXT4-fs warning (device loop0): ext4_enable_quotas:6363: Failed to enable quota tracking (type=0, err=-22). Please run e2fsck to fix. [ 350.663883][T20238] EXT4-fs error (device loop3): ext4_ext_check_inode:497: inode #3: comm syz-executor.3: pblk 0 bad header/extent: invalid magic - magic 0, entries 0, max 0(0), depth 0(0) [ 350.694641][T20223] EXT4-fs (loop0): mount failed [ 350.696070][T20238] EXT4-fs error (device loop3): ext4_quota_enable:6323: comm syz-executor.3: Bad quota inode # 3 [ 350.712195][T20254] SELinux: duplicate or incompatible mount options [ 350.719048][T20240] EXT4-fs warning (device loop1): ext4_enable_quotas:6363: Failed to enable quota tracking (type=0, err=-22). Please run e2fsck to fix. [ 350.734689][T20244] EXT4-fs error (device loop4): ext4_ext_check_inode:497: inode #3: comm syz-executor.4: pblk 0 bad header/extent: invalid extent entries - magic f30a, entries 1, max 4(4), depth 0(0) 17:09:39 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc01000a, 0x38, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000003980)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="80", 0x1, 0x11100}], 0x0, &(0x7f00000000c0)) [ 350.739145][T20238] EXT4-fs warning (device loop3): ext4_enable_quotas:6363: Failed to enable quota tracking (type=0, err=-117). Please run e2fsck to fix. [ 350.761700][T20240] EXT4-fs (loop1): mount failed [ 350.768221][T20238] EXT4-fs (loop3): mount failed [ 350.780805][T20258] loop5: detected capacity change from 0 to 264192 [ 350.781604][T20244] EXT4-fs error (device loop4): ext4_quota_enable:6323: comm syz-executor.4: Bad quota inode # 3 [ 350.798983][T20244] EXT4-fs warning (device loop4): ext4_enable_quotas:6363: Failed to enable quota tracking (type=0, err=-117). Please run e2fsck to fix. [ 350.813496][T20244] EXT4-fs (loop4): mount failed [ 350.836325][T20258] EXT4-fs error (device loop5): ext4_quota_enable:6323: comm syz-executor.5: Bad quota inode # 3 17:09:43 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc01000a, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="200002008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000003980)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d9", 0x4, 0x6800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d0f465001000005fd0f4655f00000000000001000c00000010000800000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}], 0x0, &(0x7f00000000c0)) 17:09:43 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc01000c, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000003980)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d0f465001000005fd0f4655f00000000000001000c00000010000800000000000af3010004", 0x2d, 0x11100}], 0x0, &(0x7f00000000c0)) 17:09:43 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc01000a, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000003980)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d0f465001000005fd0f4655f00000000000001000c000000100008", 0x23, 0x11100}], 0x0, &(0x7f00000000c0)) (fail_nth: 12) [ 350.871914][T20258] EXT4-fs warning (device loop5): ext4_enable_quotas:6363: Failed to enable quota tracking (type=0, err=-116). Please run e2fsck to fix. [ 350.887074][T20258] EXT4-fs (loop5): mount failed [ 350.900748][T20265] FAULT_INJECTION: forcing a failure. [ 350.900748][T20265] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 350.914004][T20265] CPU: 0 PID: 20265 Comm: syz-executor.3 Not tainted 5.16.0-syzkaller #0 [ 350.915505][T20268] loop4: detected capacity change from 0 to 264192 [ 350.922441][T20265] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 350.938999][T20265] Call Trace: [ 350.942337][T20265] [ 350.945312][T20265] dump_stack_lvl+0xd6/0x122 [ 350.949922][T20265] dump_stack+0x11/0x1b [ 350.954070][T20265] should_fail+0x23c/0x250 [ 350.958538][T20265] should_fail_usercopy+0x16/0x20 [ 350.963545][T20265] copy_page_from_iter_atomic+0x2f1/0xc60 [ 350.969435][T20265] ? shmem_write_begin+0x7e/0x100 [ 350.974505][T20265] generic_perform_write+0x211/0x400 [ 350.979808][T20265] ? current_time+0xed/0x1a0 [ 350.984476][T20265] __generic_file_write_iter+0xf7/0x2b0 [ 350.990100][T20265] ? generic_write_checks+0x250/0x290 [ 350.995456][T20265] generic_file_write_iter+0x75/0x130 [ 351.000837][T20265] vfs_write+0x7f5/0x950 [ 351.005068][T20265] __x64_sys_pwrite64+0xf5/0x150 [ 351.010046][T20265] do_syscall_64+0x44/0xd0 [ 351.014487][T20265] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 351.020369][T20265] RIP: 0033:0x7f984e6c4e67 [ 351.024765][T20265] Code: 08 89 3c 24 48 89 4c 24 18 e8 e5 f8 ff ff 4c 8b 54 24 18 48 8b 54 24 10 41 89 c0 48 8b 74 24 08 8b 3c 24 b8 12 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 31 44 89 c7 48 89 04 24 e8 15 f9 ff ff 48 8b [ 351.044358][T20265] RSP: 002b:00007f984d887f00 EFLAGS: 00000293 ORIG_RAX: 0000000000000012 [ 351.052840][T20265] RAX: ffffffffffffffda RBX: 00007f984e75b9c8 RCX: 00007f984e6c4e67 [ 351.060888][T20265] RDX: 0000000000000009 RSI: 0000000020010400 RDI: 0000000000000004 17:09:43 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc01000a, 0x25, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000003980)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d0f465001000005fd0f4655f00000000000001", 0x1b, 0x11100}], 0x0, &(0x7f00000000c0)) 17:09:43 executing program 2: clock_adjtime(0x7, &(0x7f0000000000)={0x8000, 0x62, 0xff, 0x1, 0x3, 0x1ff, 0x3ff, 0x4, 0xff, 0x20, 0x6, 0x401, 0x20, 0x0, 0x1ff, 0x8000, 0xfffffffffffffffd, 0x400, 0x8, 0x100000000, 0x2, 0x8, 0xf32, 0x4, 0x6, 0x80}) clock_adjtime(0x2, &(0x7f0000000100)={0xd9, 0x9, 0x1, 0x2, 0x1f, 0x78, 0x4b1, 0x0, 0x401, 0x5, 0x8, 0x1, 0x101, 0x100000001, 0x7, 0x1fc, 0x9, 0x9, 0x0, 0x9, 0x8, 0x3, 0xff, 0x7, 0x73, 0x946c}) clock_adjtime(0x6, &(0x7f0000000200)={0x4, 0x1, 0x100, 0x6, 0x2, 0x6, 0x1, 0x1dd, 0x9, 0x1000000000000000, 0x0, 0x6, 0x1, 0x1, 0x9, 0x5, 0x3023, 0x2, 0x4, 0xfffffffffffffff9, 0x429, 0x3, 0x0, 0x9, 0xffffffffffffff05, 0x1000}) clock_adjtime(0x3, &(0x7f0000000300)={0x0, 0x8, 0x9, 0x9, 0x9, 0x9, 0x6, 0x9, 0x8, 0x1, 0xd0fc, 0x55, 0x2, 0x0, 0x1, 0x1f, 0x100000001, 0x8f44, 0x53, 0x0, 0x3, 0x140000000000, 0x9, 0x8000, 0x0, 0x10001}) r0 = syz_mount_image$iso9660(&(0x7f0000000400), &(0x7f0000000440)='./file0\x00', 0x4, 0x1, &(0x7f0000000480)=[{0xfffffffffffffffe, 0x0, 0x3}], 0x2014400, &(0x7f00000004c0)={[{@check_relaxed}, {@dmode}, {@check_relaxed}], [{@euid_lt={'euid<', 0xee01}}, {@euid_eq}, {@rootcontext={'rootcontext', 0x3d, 'staff_u'}}, {@obj_user={'obj_user', 0x3d, '#-_'}}, {@rootcontext={'rootcontext', 0x3d, 'staff_u'}}]}) faccessat(r0, &(0x7f0000000580)='./file0\x00', 0x88) clock_adjtime(0x4, &(0x7f00000005c0)={0x80000000, 0x100000000, 0xba, 0x80000000, 0x4, 0x20d4e190, 0x7, 0x400, 0x33, 0x7a, 0x1, 0x465d, 0x7f, 0x5, 0x3, 0x1, 0x0, 0x8, 0x7, 0x7ff, 0x1, 0x4, 0x3f, 0x7fff, 0x700b, 0x96}) r1 = accept$unix(0xffffffffffffffff, 0x0, &(0x7f00000006c0)) getsockname$unix(r1, &(0x7f0000000700), &(0x7f0000000780)=0x6e) clock_adjtime(0x3, &(0x7f00000007c0)={0x6, 0x6, 0x7, 0x8000, 0x7ff, 0x5c, 0x401, 0x2, 0x9, 0x4, 0x0, 0x61, 0x2, 0x9b71, 0x100000000, 0x7fffffff, 0x322, 0xc70d, 0x9, 0xd, 0x9, 0x0, 0x9, 0x1a1f00000000, 0xffffffffffffffff, 0x9}) clock_adjtime(0x6, &(0x7f00000008c0)={0x4, 0x9, 0x3, 0xfffffffffffffff7, 0xb31, 0x1, 0x1, 0x2, 0x538, 0x0, 0x401, 0x1, 0xdd, 0xfffffffffffffff7, 0xec54, 0x4, 0x100000001, 0x0, 0xa, 0x1, 0x7ff, 0xcd, 0xf2, 0x80, 0x7, 0x8000}) clock_adjtime(0x0, &(0x7f00000009c0)={0x8, 0xff, 0x81, 0x2, 0x100000001, 0x11, 0x5, 0x1, 0x1, 0x9, 0x1000, 0x8, 0xdf6c, 0x9, 0x8, 0x1004000000000000, 0x1ff, 0x3, 0x6, 0xf5, 0x80000, 0x1, 0xfffffffffffffd6d, 0x2, 0x6, 0xfa}) r2 = socket$unix(0x1, 0x5, 0x0) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f0000000ac0)={'wlan0\x00'}) mq_timedreceive(0xffffffffffffffff, &(0x7f0000000b00)=""/4096, 0x1000, 0x80, &(0x7f0000001b00)={0x0, 0x989680}) r3 = creat(&(0x7f0000001b40)='./file0\x00', 0x1) mknodat(r3, &(0x7f0000001b80)='./file1\x00', 0x4, 0x0) clock_adjtime(0x0, &(0x7f0000001bc0)={0xfff, 0x7fff, 0x0, 0x2, 0xfdc, 0x54, 0x8fa, 0x3f41, 0x2, 0x4, 0x4, 0x5, 0x101, 0x5, 0x4, 0x9, 0x9, 0x30e, 0x3f, 0x2, 0x7f, 0x7, 0x6, 0x4, 0x3ff, 0x100000000}) clock_adjtime(0x2, &(0x7f0000001cc0)={0x0, 0x6, 0x7, 0xe5, 0x5, 0x6, 0x10, 0x7, 0x281, 0x40, 0x1, 0x0, 0x1, 0x10001, 0x5, 0x100, 0x0, 0x4, 0xffffffffffffe001, 0xdf, 0x7f, 0x8000, 0x9, 0x400, 0xfffffffffffffe00, 0x3f}) [ 351.069079][T20265] RBP: 0000000000000007 R08: 0000000000000000 R09: 00007f984d8881d0 [ 351.077130][T20265] R10: 0000000000000800 R11: 0000000000000293 R12: 0000000000000004 [ 351.085127][T20265] R13: 0000000000000004 R14: 0000000020000248 R15: 0000000000000003 [ 351.093104][T20265] [ 351.098385][T20269] loop0: detected capacity change from 0 to 264192 [ 351.115568][T20271] loop1: detected capacity change from 0 to 264192 [ 351.124468][T20265] loop3: detected capacity change from 0 to 264192 [ 351.153080][T20269] EXT4-fs (loop0): inodes count not valid: 131104 vs 32 [ 351.161276][T20274] SELinux: duplicate or incompatible mount options 17:09:43 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc01000a, 0x39, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000003980)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="80", 0x1, 0x11100}], 0x0, &(0x7f00000000c0)) [ 351.173806][T20268] EXT4-fs error (device loop4): ext4_ext_check_inode:497: inode #3: comm syz-executor.4: pblk 0 bad header/extent: invalid extent entries - magic f30a, entries 1, max 4(4), depth 0(0) [ 351.211355][T20271] EXT4-fs warning (device loop1): ext4_enable_quotas:6363: Failed to enable quota tracking (type=0, err=-22). Please run e2fsck to fix. 17:09:47 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc01000a, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="200003008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000003980)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d9", 0x4, 0x6800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d0f465001000005fd0f4655f00000000000001000c00000010000800000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}], 0x0, &(0x7f00000000c0)) [ 351.236721][T20280] loop5: detected capacity change from 0 to 264192 [ 351.246725][T20268] EXT4-fs error (device loop4): ext4_quota_enable:6323: comm syz-executor.4: Bad quota inode # 3 [ 351.254021][T20265] EXT4-fs error (device loop3): ext4_ext_check_inode:497: inode #3: comm syz-executor.3: pblk 0 bad header/extent: invalid magic - magic 0, entries 0, max 0(0), depth 0(0) [ 351.271620][T20271] EXT4-fs (loop1): mount failed [ 351.278965][T20265] EXT4-fs error (device loop3): ext4_quota_enable:6323: comm syz-executor.3: Bad quota inode # 3 [ 351.290066][T20268] EXT4-fs warning (device loop4): ext4_enable_quotas:6363: Failed to enable quota tracking (type=0, err=-117). Please run e2fsck to fix. [ 351.304957][T20286] loop0: detected capacity change from 0 to 264192 [ 351.312394][T20265] EXT4-fs warning (device loop3): ext4_enable_quotas:6363: Failed to enable quota tracking (type=0, err=-117). Please run e2fsck to fix. [ 351.321139][T20268] EXT4-fs (loop4): mount failed 17:09:47 executing program 2: clock_adjtime(0x7, &(0x7f0000000000)={0x8000, 0x62, 0xff, 0x1, 0x3, 0x1ff, 0x3ff, 0x4, 0xff, 0x20, 0x6, 0x401, 0x20, 0x0, 0x1ff, 0x8000, 0xfffffffffffffffd, 0x400, 0x8, 0x100000000, 0x2, 0x8, 0xf32, 0x4, 0x6, 0x80}) clock_adjtime(0x2, &(0x7f0000000100)={0xd9, 0x9, 0x1, 0x2, 0x1f, 0x78, 0x4b1, 0x0, 0x401, 0x5, 0x8, 0x1, 0x101, 0x100000001, 0x7, 0x1fc, 0x9, 0x9, 0x0, 0x9, 0x8, 0x3, 0xff, 0x7, 0x73, 0x946c}) clock_adjtime(0x6, &(0x7f0000000200)={0x4, 0x1, 0x100, 0x6, 0x2, 0x6, 0x1, 0x1dd, 0x9, 0x1000000000000000, 0x0, 0x6, 0x1, 0x1, 0x9, 0x5, 0x3023, 0x2, 0x4, 0xfffffffffffffff9, 0x429, 0x3, 0x0, 0x9, 0xffffffffffffff05, 0x1000}) clock_adjtime(0x3, &(0x7f0000000300)={0x0, 0x8, 0x9, 0x9, 0x9, 0x9, 0x6, 0x9, 0x8, 0x1, 0xd0fc, 0x55, 0x2, 0x0, 0x1, 0x1f, 0x100000001, 0x8f44, 0x53, 0x0, 0x3, 0x140000000000, 0x9, 0x8000, 0x0, 0x10001}) r0 = syz_mount_image$iso9660(&(0x7f0000000400), &(0x7f0000000440)='./file0\x00', 0x4, 0x1, &(0x7f0000000480)=[{0xfffffffffffffffe, 0x0, 0x3}], 0x2014400, &(0x7f00000004c0)={[{@check_relaxed}, {@dmode}, {@check_relaxed}], [{@euid_lt={'euid<', 0xee01}}, {@euid_eq}, {@rootcontext={'rootcontext', 0x3d, 'staff_u'}}, {@obj_user={'obj_user', 0x3d, '#-_'}}, {@rootcontext={'rootcontext', 0x3d, 'staff_u'}}]}) faccessat(r0, &(0x7f0000000580)='./file0\x00', 0x88) clock_adjtime(0x4, &(0x7f00000005c0)={0x80000000, 0x100000000, 0xba, 0x80000000, 0x4, 0x20d4e190, 0x7, 0x400, 0x33, 0x7a, 0x1, 0x465d, 0x7f, 0x5, 0x3, 0x1, 0x0, 0x8, 0x7, 0x7ff, 0x1, 0x4, 0x3f, 0x7fff, 0x700b, 0x96}) r1 = accept$unix(0xffffffffffffffff, 0x0, &(0x7f00000006c0)) getsockname$unix(r1, &(0x7f0000000700), &(0x7f0000000780)=0x6e) clock_adjtime(0x3, &(0x7f00000007c0)={0x6, 0x6, 0x7, 0x8000, 0x7ff, 0x5c, 0x401, 0x2, 0x9, 0x4, 0x0, 0x61, 0x2, 0x9b71, 0x100000000, 0x7fffffff, 0x322, 0xc70d, 0x9, 0xd, 0x9, 0x0, 0x9, 0x1a1f00000000, 0xffffffffffffffff, 0x9}) clock_adjtime(0x6, &(0x7f00000008c0)={0x4, 0x9, 0x3, 0xfffffffffffffff7, 0xb31, 0x1, 0x1, 0x2, 0x538, 0x0, 0x401, 0x1, 0xdd, 0xfffffffffffffff7, 0xec54, 0x4, 0x100000001, 0x0, 0xa, 0x1, 0x7ff, 0xcd, 0xf2, 0x80, 0x7, 0x8000}) clock_adjtime(0x0, &(0x7f00000009c0)={0x8, 0xff, 0x81, 0x2, 0x100000001, 0x11, 0x5, 0x1, 0x1, 0x9, 0x1000, 0x8, 0xdf6c, 0x9, 0x8, 0x1004000000000000, 0x1ff, 0x3, 0x6, 0xf5, 0x80000, 0x1, 0xfffffffffffffd6d, 0x2, 0x6, 0xfa}) r2 = socket$unix(0x1, 0x5, 0x0) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f0000000ac0)={'wlan0\x00'}) mq_timedreceive(0xffffffffffffffff, &(0x7f0000000b00)=""/4096, 0x1000, 0x80, &(0x7f0000001b00)={0x0, 0x989680}) r3 = creat(&(0x7f0000001b40)='./file0\x00', 0x1) mknodat(r3, &(0x7f0000001b80)='./file1\x00', 0x4, 0x0) clock_adjtime(0x0, &(0x7f0000001bc0)={0xfff, 0x7fff, 0x0, 0x2, 0xfdc, 0x54, 0x8fa, 0x3f41, 0x3, 0x4, 0x4, 0x5, 0x101, 0x5, 0x4, 0x9, 0x9, 0x30e, 0x3f, 0x2, 0x7f, 0x7, 0x6, 0x4, 0x3ff, 0x100000000}) clock_adjtime(0x2, &(0x7f0000001cc0)={0x0, 0x6, 0x7, 0xe5, 0x5, 0x6, 0x10, 0x7, 0x281, 0x40, 0x1, 0x0, 0x1, 0x10001, 0x5, 0x100, 0x0, 0x4, 0xffffffffffffe001, 0xdf, 0x7f, 0x8000, 0x9, 0x400, 0xfffffffffffffe00, 0x3f}) [ 351.333765][T20265] EXT4-fs (loop3): mount failed 17:09:47 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc01000a, 0x26, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000003980)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d0f465001000005fd0f4655f00000000000001", 0x1b, 0x11100}], 0x0, &(0x7f00000000c0)) 17:09:47 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc01000a, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="200004008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000003980)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d9", 0x4, 0x6800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d0f465001000005fd0f4655f00000000000001000c00000010000800000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}], 0x0, &(0x7f00000000c0)) [ 351.358592][T20286] EXT4-fs (loop0): inodes count not valid: 196640 vs 32 [ 351.375173][T20290] SELinux: duplicate or incompatible mount options [ 351.380716][T20292] loop1: detected capacity change from 0 to 264192 17:09:47 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc01000f, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000003980)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d0f465001000005fd0f4655f00000000000001000c00000010000800000000000af3010004", 0x2d, 0x11100}], 0x0, &(0x7f00000000c0)) 17:09:47 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc01000a, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000003980)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d0f465001000005fd0f4655f00000000000001000c000000100008", 0x23, 0x11100}], 0x0, &(0x7f00000000c0)) (fail_nth: 13) [ 351.401893][T20280] EXT4-fs error (device loop5): ext4_quota_enable:6323: comm syz-executor.5: Bad quota inode # 3 [ 351.421233][T20280] EXT4-fs warning (device loop5): ext4_enable_quotas:6363: Failed to enable quota tracking (type=0, err=-116). Please run e2fsck to fix. [ 351.442190][T20280] EXT4-fs (loop5): mount failed [ 351.447810][T20296] loop0: detected capacity change from 0 to 264192 [ 351.462294][T20292] EXT4-fs warning (device loop1): ext4_enable_quotas:6363: Failed to enable quota tracking (type=0, err=-22). Please run e2fsck to fix. [ 351.477279][T20292] EXT4-fs (loop1): mount failed [ 351.478612][T20300] loop4: detected capacity change from 0 to 264192 [ 351.491283][T20301] FAULT_INJECTION: forcing a failure. [ 351.491283][T20301] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 351.504551][T20301] CPU: 1 PID: 20301 Comm: syz-executor.3 Not tainted 5.16.0-syzkaller #0 [ 351.504901][T20296] EXT4-fs (loop0): inodes count not valid: 262176 vs 32 [ 351.512984][T20301] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 351.529983][T20301] Call Trace: [ 351.533259][T20301] [ 351.536181][T20301] dump_stack_lvl+0xd6/0x122 [ 351.540776][T20301] dump_stack+0x11/0x1b [ 351.544941][T20301] should_fail+0x23c/0x250 [ 351.549358][T20301] __alloc_pages+0x102/0x330 [ 351.553958][T20301] alloc_pages_vma+0x5ee/0x770 [ 351.558729][T20301] shmem_getpage_gfp+0x8bc/0x12c0 [ 351.563770][T20301] shmem_write_begin+0x7e/0x100 [ 351.568736][T20301] generic_perform_write+0x1c8/0x400 [ 351.570165][T20300] EXT4-fs error (device loop4): ext4_ext_check_inode:497: inode #3: comm syz-executor.4: pblk 0 bad header/extent: invalid extent entries - magic f30a, entries 1, max 4(4), depth 0(0) [ 351.574030][T20301] ? current_time+0xed/0x1a0 [ 351.594372][T20300] EXT4-fs error (device loop4): ext4_quota_enable:6323: comm syz-executor.4: Bad quota inode # 3 [ 351.596724][T20301] __generic_file_write_iter+0xf7/0x2b0 17:09:51 executing program 2: clock_adjtime(0x7, &(0x7f0000000000)={0x8000, 0x62, 0xff, 0x1, 0x3, 0x1ff, 0x3ff, 0x4, 0xff, 0x20, 0x6, 0x401, 0x20, 0x0, 0x1ff, 0x8000, 0xfffffffffffffffd, 0x400, 0x8, 0x100000000, 0x2, 0x8, 0xf32, 0x4, 0x6, 0x80}) clock_adjtime(0x2, &(0x7f0000000100)={0xd9, 0x9, 0x1, 0x2, 0x1f, 0x78, 0x4b1, 0x0, 0x401, 0x5, 0x8, 0x1, 0x101, 0x100000001, 0x7, 0x1fc, 0x9, 0x9, 0x0, 0x9, 0x8, 0x3, 0xff, 0x7, 0x73, 0x946c}) clock_adjtime(0x6, &(0x7f0000000200)={0x4, 0x1, 0x100, 0x6, 0x2, 0x6, 0x1, 0x1dd, 0x9, 0x1000000000000000, 0x0, 0x6, 0x1, 0x1, 0x9, 0x5, 0x3023, 0x2, 0x4, 0xfffffffffffffff9, 0x429, 0x3, 0x0, 0x9, 0xffffffffffffff05, 0x1000}) clock_adjtime(0x3, &(0x7f0000000300)={0x0, 0x8, 0x9, 0x9, 0x9, 0x9, 0x6, 0x9, 0x8, 0x1, 0xd0fc, 0x55, 0x2, 0x0, 0x1, 0x1f, 0x100000001, 0x8f44, 0x53, 0x0, 0x3, 0x140000000000, 0x9, 0x8000, 0x0, 0x10001}) r0 = syz_mount_image$iso9660(&(0x7f0000000400), &(0x7f0000000440)='./file0\x00', 0x4, 0x1, &(0x7f0000000480)=[{0xfffffffffffffffe, 0x0, 0x3}], 0x2014400, &(0x7f00000004c0)={[{@check_relaxed}, {@dmode}, {@check_relaxed}], [{@euid_lt={'euid<', 0xee01}}, {@euid_eq}, {@rootcontext={'rootcontext', 0x3d, 'staff_u'}}, {@obj_user={'obj_user', 0x3d, '#-_'}}, {@rootcontext={'rootcontext', 0x3d, 'staff_u'}}]}) faccessat(r0, &(0x7f0000000580)='./file0\x00', 0