0x0, 0x5, 0x0, 0x0, 0x3], 0x0, 0x128, 0x150, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'dummy0\x00', {0x0, 0x0, 0x3, 0x0, 0x0, 0xfffd, 0x7}}}, @common=@ipv6header={{0x28, 'ipv6header\x00'}, {0x0, 0x81}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}, {{@uncond, 0x0, 0xa8, 0xe8}, @common=@inet=@LOG={0x40, 'LOG\x00', 0x0, {0x0, 0x0, "59e2b655a7928de9d18f6f4ce2fcb46e2fbbb084e62170a6b5ab23bc6a36"}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x368) 03:49:48 executing program 4: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0xff0f000000000000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="02000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000040)) [ 740.938030] erofs: unmounted for /dev/loop4 03:49:48 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000c80)=@raw={'raw\x00', 0x3c1, 0x3, 0x308, 0x0, 0x150, 0x150, 0x8c010000, 0x3, 0x238, 0x238, 0x238, 0x238, 0x238, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x3], 0x0, 0x128, 0x150, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'dummy0\x00', {0x0, 0x0, 0x3, 0x0, 0x0, 0xfffd, 0x7}}}, @common=@ipv6header={{0x28, 'ipv6header\x00'}, {0x0, 0x81}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}, {{@uncond, 0x0, 0xa8, 0xe8}, @common=@inet=@LOG={0x40, 'LOG\x00', 0x0, {0x0, 0x0, "59e2b655a7928de9d18f6f4ce2fcb46e2fbbb084e62170a6b5ab23bc6a36"}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x368) [ 740.982022] erofs: read_super, device -> /dev/loop2 [ 740.990770] erofs: options -> fault_injection=0x0000000000000000,noacl, [ 741.006008] erofs: read_super, device -> /dev/loop3 [ 741.044957] erofs: cannot find valid erofs superblock [ 741.050856] erofs: options -> fault_injection=0x0000000000000000,noacl, [ 741.084927] erofs: FAULT_INJECTION was not selected 03:49:48 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000c80)=@raw={'raw\x00', 0x3c1, 0x3, 0x308, 0x0, 0x150, 0x150, 0x9e000000, 0x3, 0x238, 0x238, 0x238, 0x238, 0x238, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x3], 0x0, 0x128, 0x150, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'dummy0\x00', {0x0, 0x0, 0x3, 0x0, 0x0, 0xfffd, 0x7}}}, @common=@ipv6header={{0x28, 'ipv6header\x00'}, {0x0, 0x81}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}, {{@uncond, 0x0, 0xa8, 0xe8}, @common=@inet=@LOG={0x40, 'LOG\x00', 0x0, {0x0, 0x0, "59e2b655a7928de9d18f6f4ce2fcb46e2fbbb084e62170a6b5ab23bc6a36"}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x368) 03:49:48 executing program 2: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000), 0x0, 0x400}, {&(0x7f0000010100)="05000000c025", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000040)={[{@fault_injection={'fault_injection'}}, {@noacl='noacl'}]}) [ 741.101363] erofs: root inode @ nid 36 [ 741.110615] erofs: mounted on /dev/loop3 with opts: fault_injection=0x0000000000000000. 03:49:48 executing program 5: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f00000000c0)=[{&(0x7f0000000180)="77690addcfbe1fbb66ec", 0xff3b}], 0x1, 0x1) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000180)={0x54, 0x2, 0x6, 0x801, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0xd, 0x3, 'list:set\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_TIMEOUT={0x8, 0x6, 0x1, 0x0, 0x8241}]}]}, 0x54}}, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) splice(r0, 0x0, r2, 0x0, 0x100000000, 0x0) r5 = open(&(0x7f0000000040)='./file0\x00', 0x40, 0x126) ioctl$KVM_GET_CLOCK(r5, 0x8030ae7c, &(0x7f0000000100)) [ 741.171295] erofs: read_super, device -> /dev/loop4 [ 741.182731] erofs: options -> [ 741.191008] erofs: root inode @ nid 36 [ 741.203283] erofs: read_super, device -> /dev/loop0 [ 741.208318] erofs: options -> 03:49:48 executing program 3: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x26e9, 0x1000}], 0x0, &(0x7f0000000040)={[{@fault_injection={'fault_injection'}}, {@noacl='noacl'}]}) 03:49:48 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000c80)=@raw={'raw\x00', 0x3c1, 0x3, 0x308, 0x0, 0x150, 0x150, 0xa6000000, 0x3, 0x238, 0x238, 0x238, 0x238, 0x238, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x3], 0x0, 0x128, 0x150, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'dummy0\x00', {0x0, 0x0, 0x3, 0x0, 0x0, 0xfffd, 0x7}}}, @common=@ipv6header={{0x28, 'ipv6header\x00'}, {0x0, 0x81}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}, {{@uncond, 0x0, 0xa8, 0xe8}, @common=@inet=@LOG={0x40, 'LOG\x00', 0x0, {0x0, 0x0, "59e2b655a7928de9d18f6f4ce2fcb46e2fbbb084e62170a6b5ab23bc6a36"}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x368) [ 741.223269] erofs: mounted on /dev/loop4 with opts: . 03:49:48 executing program 4: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0xffff1f0000000000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="02000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000040)) [ 741.252618] erofs: unmounted for /dev/loop3 [ 741.253025] erofs: root inode @ nid 36 [ 741.272146] erofs: mounted on /dev/loop0 with opts: . [ 741.287449] erofs: unmounted for /dev/loop4 03:49:48 executing program 0: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="10020000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000040)) [ 741.352675] erofs: unmounted for /dev/loop0 03:49:48 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000c80)=@raw={'raw\x00', 0x3c1, 0x3, 0x308, 0x0, 0x150, 0x150, 0xa9020000, 0x3, 0x238, 0x238, 0x238, 0x238, 0x238, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x3], 0x0, 0x128, 0x150, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'dummy0\x00', {0x0, 0x0, 0x3, 0x0, 0x0, 0xfffd, 0x7}}}, @common=@ipv6header={{0x28, 'ipv6header\x00'}, {0x0, 0x81}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}, {{@uncond, 0x0, 0xa8, 0xe8}, @common=@inet=@LOG={0x40, 'LOG\x00', 0x0, {0x0, 0x0, "59e2b655a7928de9d18f6f4ce2fcb46e2fbbb084e62170a6b5ab23bc6a36"}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x368) [ 741.415486] erofs: read_super, device -> /dev/loop2 [ 741.427224] erofs: options -> fault_injection=0x0000000000000000,noacl, [ 741.438715] erofs: read_super, device -> /dev/loop3 [ 741.447203] erofs: options -> fault_injection=0x0000000000000000,noacl, [ 741.454927] erofs: cannot find valid erofs superblock [ 741.458937] erofs: read_super, device -> /dev/loop4 [ 741.465431] erofs: FAULT_INJECTION was not selected [ 741.473521] erofs: root inode @ nid 36 [ 741.476066] erofs: options -> [ 741.484434] erofs: mounted on /dev/loop3 with opts: fault_injection=0x0000000000000000. [ 741.490422] erofs: root inode @ nid 36 [ 741.508099] erofs: mounted on /dev/loop4 with opts: . 03:49:49 executing program 3: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x3f00, 0x1000}], 0x0, &(0x7f0000000040)={[{@fault_injection={'fault_injection'}}, {@noacl='noacl'}]}) 03:49:49 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000c80)=@raw={'raw\x00', 0x3c1, 0x3, 0x308, 0x0, 0x150, 0x150, 0xaa020000, 0x3, 0x238, 0x238, 0x238, 0x238, 0x238, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x3], 0x0, 0x128, 0x150, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'dummy0\x00', {0x0, 0x0, 0x3, 0x0, 0x0, 0xfffd, 0x7}}}, @common=@ipv6header={{0x28, 'ipv6header\x00'}, {0x0, 0x81}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}, {{@uncond, 0x0, 0xa8, 0xe8}, @common=@inet=@LOG={0x40, 'LOG\x00', 0x0, {0x0, 0x0, "59e2b655a7928de9d18f6f4ce2fcb46e2fbbb084e62170a6b5ab23bc6a36"}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x368) 03:49:49 executing program 4: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0xffffff7f00000000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="02000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000040)) [ 741.565061] erofs: unmounted for /dev/loop3 03:49:49 executing program 2: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf", 0x8, 0x400}, {&(0x7f0000010100)="05000000c025", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000040)={[{@fault_injection={'fault_injection'}}, {@noacl='noacl'}]}) [ 741.606828] erofs: unmounted for /dev/loop4 03:49:49 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000c80)=@raw={'raw\x00', 0x3c1, 0x3, 0x308, 0x0, 0x150, 0x150, 0xb0000000, 0x3, 0x238, 0x238, 0x238, 0x238, 0x238, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x3], 0x0, 0x128, 0x150, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'dummy0\x00', {0x0, 0x0, 0x3, 0x0, 0x0, 0xfffd, 0x7}}}, @common=@ipv6header={{0x28, 'ipv6header\x00'}, {0x0, 0x81}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}, {{@uncond, 0x0, 0xa8, 0xe8}, @common=@inet=@LOG={0x40, 'LOG\x00', 0x0, {0x0, 0x0, "59e2b655a7928de9d18f6f4ce2fcb46e2fbbb084e62170a6b5ab23bc6a36"}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x368) [ 741.692986] erofs: read_super, device -> /dev/loop3 [ 741.698040] erofs: options -> fault_injection=0x0000000000000000,noacl, [ 741.706250] erofs: read_super, device -> /dev/loop4 [ 741.711517] erofs: read_super, device -> /dev/loop0 [ 741.716556] erofs: options -> [ 741.724931] erofs: options -> [ 741.734128] erofs: read_super, device -> /dev/loop2 [ 741.739284] erofs: root inode @ nid 36 03:49:49 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000c80)=@raw={'raw\x00', 0x3c1, 0x3, 0x308, 0x0, 0x150, 0x150, 0xb0030000, 0x3, 0x238, 0x238, 0x238, 0x238, 0x238, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x3], 0x0, 0x128, 0x150, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'dummy0\x00', {0x0, 0x0, 0x3, 0x0, 0x0, 0xfffd, 0x7}}}, @common=@ipv6header={{0x28, 'ipv6header\x00'}, {0x0, 0x81}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}, {{@uncond, 0x0, 0xa8, 0xe8}, @common=@inet=@LOG={0x40, 'LOG\x00', 0x0, {0x0, 0x0, "59e2b655a7928de9d18f6f4ce2fcb46e2fbbb084e62170a6b5ab23bc6a36"}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x368) [ 741.743724] erofs: root inode @ nid 36 [ 741.747727] erofs: options -> fault_injection=0x0000000000000000,noacl, [ 741.754867] erofs: mounted on /dev/loop0 with opts: . [ 741.760404] erofs: mounted on /dev/loop4 with opts: . [ 741.765552] erofs: FAULT_INJECTION was not selected [ 741.766072] erofs: blksize 1 isn't supported on this platform [ 741.839389] erofs: root inode @ nid 36 [ 741.853796] erofs: unmounted for /dev/loop4 [ 741.856445] erofs: mounted on /dev/loop3 with opts: fault_injection=0x0000000000000000. 03:49:49 executing program 5: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f00000000c0)=[{&(0x7f0000000180)="77690addcfbe1fbb66ec", 0xff3b}], 0x1, 0x1) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000180)={0x50, 0x2, 0x6, 0x801, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0xd, 0x3, 'list:set\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x8}]}, 0x50}}, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) write$P9_RREADLINK(0xffffffffffffffff, &(0x7f0000000280)=ANY=[@ANYBLOB="1000000017020007002e2f66696c0130"], 0x10) splice(r0, 0x0, r2, 0x0, 0x100000000, 0x0) r5 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000100)='IPVS\x00') sendmsg$IPVS_CMD_SET_INFO(r4, &(0x7f0000000240)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000200)={&(0x7f0000000140)={0x38, r5, 0x4, 0x70bd2b, 0x25dfdbfc, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0xed0}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8}, @IPVS_CMD_ATTR_DEST={0xc, 0x2, 0x0, 0x1, [@IPVS_DEST_ATTR_PORT={0x6, 0x2, 0x4e22}]}]}, 0x38}, 0x1, 0x0, 0x0, 0x1}, 0x20000090) 03:49:49 executing program 4: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff00000000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="02000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000040)) 03:49:49 executing program 2: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf", 0x8, 0x400}, {&(0x7f0000010100)="05000000c025", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000040)={[{@fault_injection={'fault_injection'}}, {@noacl='noacl'}]}) 03:49:49 executing program 0: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="10030000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000040)) 03:49:49 executing program 3: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x6000, 0x1000}], 0x0, &(0x7f0000000040)={[{@fault_injection={'fault_injection'}}, {@noacl='noacl'}]}) 03:49:49 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000c80)=@raw={'raw\x00', 0x3c1, 0x3, 0x308, 0x0, 0x150, 0x150, 0xc2030000, 0x3, 0x238, 0x238, 0x238, 0x238, 0x238, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x3], 0x0, 0x128, 0x150, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'dummy0\x00', {0x0, 0x0, 0x3, 0x0, 0x0, 0xfffd, 0x7}}}, @common=@ipv6header={{0x28, 'ipv6header\x00'}, {0x0, 0x81}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}, {{@uncond, 0x0, 0xa8, 0xe8}, @common=@inet=@LOG={0x40, 'LOG\x00', 0x0, {0x0, 0x0, "59e2b655a7928de9d18f6f4ce2fcb46e2fbbb084e62170a6b5ab23bc6a36"}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x368) [ 741.888711] erofs: unmounted for /dev/loop0 [ 741.907825] erofs: unmounted for /dev/loop3 03:49:49 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000c80)=@raw={'raw\x00', 0x3c1, 0x3, 0x308, 0x0, 0x150, 0x150, 0xc6020000, 0x3, 0x238, 0x238, 0x238, 0x238, 0x238, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x3], 0x0, 0x128, 0x150, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'dummy0\x00', {0x0, 0x0, 0x3, 0x0, 0x0, 0xfffd, 0x7}}}, @common=@ipv6header={{0x28, 'ipv6header\x00'}, {0x0, 0x81}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}, {{@uncond, 0x0, 0xa8, 0xe8}, @common=@inet=@LOG={0x40, 'LOG\x00', 0x0, {0x0, 0x0, "59e2b655a7928de9d18f6f4ce2fcb46e2fbbb084e62170a6b5ab23bc6a36"}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x368) [ 741.992055] erofs: read_super, device -> /dev/loop2 [ 742.004869] erofs: options -> fault_injection=0x0000000000000000,noacl, [ 742.016346] erofs: blksize 1 isn't supported on this platform 03:49:49 executing program 2: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf", 0x8, 0x400}, {&(0x7f0000010100)="05000000c025", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000040)={[{@fault_injection={'fault_injection'}}, {@noacl='noacl'}]}) [ 742.071731] erofs: read_super, device -> /dev/loop4 [ 742.085341] erofs: read_super, device -> /dev/loop0 [ 742.086992] erofs: options -> [ 742.108437] erofs: options -> [ 742.108878] erofs: read_super, device -> /dev/loop3 [ 742.120795] erofs: root inode @ nid 36 [ 742.136341] erofs: options -> fault_injection=0x0000000000000000,noacl, [ 742.140254] erofs: root inode @ nid 36 [ 742.153366] erofs: mounted on /dev/loop4 with opts: . [ 742.161338] erofs: mounted on /dev/loop0 with opts: . [ 742.173314] erofs: FAULT_INJECTION was not selected 03:49:49 executing program 4: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffffffffffff, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="02000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000040)) 03:49:49 executing program 0: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="10040000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000040)) 03:49:49 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000c80)=@raw={'raw\x00', 0x3c1, 0x3, 0x308, 0x0, 0x150, 0x150, 0xc8010000, 0x3, 0x238, 0x238, 0x238, 0x238, 0x238, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x3], 0x0, 0x128, 0x150, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'dummy0\x00', {0x0, 0x0, 0x3, 0x0, 0x0, 0xfffd, 0x7}}}, @common=@ipv6header={{0x28, 'ipv6header\x00'}, {0x0, 0x81}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}, {{@uncond, 0x0, 0xa8, 0xe8}, @common=@inet=@LOG={0x40, 'LOG\x00', 0x0, {0x0, 0x0, "59e2b655a7928de9d18f6f4ce2fcb46e2fbbb084e62170a6b5ab23bc6a36"}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x368) [ 742.208147] erofs: root inode @ nid 36 [ 742.226356] erofs: mounted on /dev/loop3 with opts: fault_injection=0x0000000000000000. [ 742.234508] erofs: read_super, device -> /dev/loop2 [ 742.241697] erofs: unmounted for /dev/loop4 [ 742.252451] erofs: unmounted for /dev/loop0 [ 742.260263] erofs: options -> fault_injection=0x0000000000000000,noacl, [ 742.267221] erofs: blksize 1 isn't supported on this platform 03:49:49 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000c80)=@raw={'raw\x00', 0x3c1, 0x3, 0x308, 0x0, 0x150, 0x150, 0xca000000, 0x3, 0x238, 0x238, 0x238, 0x238, 0x238, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x3], 0x0, 0x128, 0x150, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'dummy0\x00', {0x0, 0x0, 0x3, 0x0, 0x0, 0xfffd, 0x7}}}, @common=@ipv6header={{0x28, 'ipv6header\x00'}, {0x0, 0x81}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}, {{@uncond, 0x0, 0xa8, 0xe8}, @common=@inet=@LOG={0x40, 'LOG\x00', 0x0, {0x0, 0x0, "59e2b655a7928de9d18f6f4ce2fcb46e2fbbb084e62170a6b5ab23bc6a36"}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x368) 03:49:49 executing program 5: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f00000000c0)=[{&(0x7f0000000180)="77690addcfbe1fbb66ec", 0xa}], 0x1, 0x4) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000180)={0x54, 0x2, 0x6, 0x801, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0xd, 0x3, 'list:set\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_TIMEOUT={0x8, 0x6, 0x1, 0x0, 0x8241}]}]}, 0x54}}, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) socket$inet_udplite(0x2, 0x2, 0x88) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) sendmsg$NL80211_CMD_SET_STATION(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x30, 0x0, 0x200, 0x70bd2b, 0x25dfdbff, {{}, {@void, @void}}, [@NL80211_ATTR_OPMODE_NOTIF={0x5, 0xc2, 0x1e}, @NL80211_ATTR_LOCAL_MESH_POWER_MODE={0x8, 0xa4, 0x3}, @NL80211_ATTR_STA_FLAGS2={0xc, 0x43, {0x2, 0x3}}]}, 0x30}, 0x1, 0x0, 0x0, 0x40000}, 0x40011) splice(r0, 0x0, r2, 0x0, 0x100000000, 0x0) 03:49:49 executing program 2: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf01000000", 0xc, 0x400}, {&(0x7f0000010100)="05000000c025", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000040)={[{@fault_injection={'fault_injection'}}, {@noacl='noacl'}]}) [ 742.384476] erofs: read_super, device -> /dev/loop4 [ 742.402286] erofs: options -> 03:49:49 executing program 3: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0xe226, 0x1000}], 0x0, &(0x7f0000000040)={[{@fault_injection={'fault_injection'}}, {@noacl='noacl'}]}) 03:49:50 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000c80)=@raw={'raw\x00', 0x3c1, 0x3, 0x308, 0x0, 0x150, 0x150, 0xce020000, 0x3, 0x238, 0x238, 0x238, 0x238, 0x238, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x3], 0x0, 0x128, 0x150, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'dummy0\x00', {0x0, 0x0, 0x3, 0x0, 0x0, 0xfffd, 0x7}}}, @common=@ipv6header={{0x28, 'ipv6header\x00'}, {0x0, 0x81}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}, {{@uncond, 0x0, 0xa8, 0xe8}, @common=@inet=@LOG={0x40, 'LOG\x00', 0x0, {0x0, 0x0, "59e2b655a7928de9d18f6f4ce2fcb46e2fbbb084e62170a6b5ab23bc6a36"}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x368) [ 742.426108] erofs: root inode @ nid 36 [ 742.431949] erofs: unmounted for /dev/loop3 [ 742.444249] erofs: mounted on /dev/loop4 with opts: . 03:49:50 executing program 4: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="02000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000040)) 03:49:50 executing program 0: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="10080000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000040)) [ 742.491701] erofs: read_super, device -> /dev/loop0 [ 742.496750] erofs: options -> [ 742.505796] erofs: root inode @ nid 36 [ 742.510549] erofs: mounted on /dev/loop0 with opts: . [ 742.529974] erofs: unmounted for /dev/loop4 [ 742.557789] erofs: unmounted for /dev/loop0 [ 742.564087] erofs: read_super, device -> /dev/loop2 [ 742.569892] erofs: options -> fault_injection=0x0000000000000000,noacl, [ 742.584101] erofs: read_super, device -> /dev/loop3 [ 742.589232] erofs: options -> fault_injection=0x0000000000000000,noacl, [ 742.597595] erofs: blksize 1 isn't supported on this platform 03:49:50 executing program 3: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0xe926, 0x1000}], 0x0, &(0x7f0000000040)={[{@fault_injection={'fault_injection'}}, {@noacl='noacl'}]}) [ 742.604435] erofs: FAULT_INJECTION was not selected [ 742.612928] erofs: root inode @ nid 36 [ 742.617472] erofs: mounted on /dev/loop3 with opts: fault_injection=0x0000000000000000. [ 742.652022] erofs: unmounted for /dev/loop3 [ 742.664477] erofs: read_super, device -> /dev/loop4 03:49:50 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000c80)=@raw={'raw\x00', 0x3c1, 0x3, 0x308, 0x0, 0x150, 0x150, 0xd0020000, 0x3, 0x238, 0x238, 0x238, 0x238, 0x238, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x3], 0x0, 0x128, 0x150, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'dummy0\x00', {0x0, 0x0, 0x3, 0x0, 0x0, 0xfffd, 0x7}}}, @common=@ipv6header={{0x28, 'ipv6header\x00'}, {0x0, 0x81}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}, {{@uncond, 0x0, 0xa8, 0xe8}, @common=@inet=@LOG={0x40, 'LOG\x00', 0x0, {0x0, 0x0, "59e2b655a7928de9d18f6f4ce2fcb46e2fbbb084e62170a6b5ab23bc6a36"}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x368) 03:49:50 executing program 2: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf01000000", 0xc, 0x400}, {&(0x7f0000010100)="05000000c025", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000040)={[{@fault_injection={'fault_injection'}}, {@noacl='noacl'}]}) 03:49:50 executing program 5: pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$SNDCTL_DSP_SETTRIGGER(r1, 0x40045010, &(0x7f0000000140)=0x20000) sendmsg$ETHTOOL_MSG_LINKINFO_SET(r1, &(0x7f00000026c0)={&(0x7f0000002500)={0x10, 0x0, 0x0, 0x60000000}, 0xc, &(0x7f0000002680)={&(0x7f0000002600)=ANY=[@ANYBLOB='p\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="000426bd7000ffdbdf2503000000050005004a0000003c00018008000100", @ANYRES32=0x0, @ANYBLOB="140002006261746176655f3000001400020076656207459d4536287468315f746f5f7465616d", @ANYRES32=0x0, @ANYBLOB="05000200da00000005000300060000000500020006000000"], 0x70}, 0x1, 0x0, 0x0, 0x8080}, 0x80) ioctl$RTC_VL_CLR(r3, 0x7014) socket$bt_cmtp(0x1f, 0x3, 0x5) vmsplice(r1, &(0x7f00000000c0)=[{&(0x7f0000000180)="77690addcfbe1fbb66ec", 0xff3b}], 0x1, 0x1) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000300)=@ipv6_getaddrlabel={0x30, 0x4a, 0x1, 0x0, 0x0, {0xa, 0x0, 0x80}, [@IFAL_ADDRESS={0x14, 0x1, @ipv4={[], [], @multicast1}}]}, 0x30}}, 0x0) ioctl$sock_TIOCINQ(r4, 0x541b, &(0x7f00000024c0)) sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000002540)=ANY=[@ANYBLOB="580000000206000e0000000000000000000000000d0003006c6973743a7365740000000005000400000000000506000000050005000c00cbd69fbd597f04b02875001e36000300686173683a69702c6d61726b00000000"], 0x58}, 0x1, 0x0, 0x0, 0xc1}, 0x8091) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) recvmsg(0xffffffffffffffff, &(0x7f0000002340)={&(0x7f0000001200)=@xdp={0x2c, 0x0, 0x0}, 0x80, &(0x7f0000002300)=[{&(0x7f0000000140)}, {&(0x7f0000001280)=""/4096, 0x1000}, {&(0x7f0000002280)=""/76, 0x4c}], 0x3}, 0x40012040) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002400)={0x18, 0x6, &(0x7f0000000040)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x1, 0x1000, &(0x7f0000000200)=""/4096, 0x40f00, 0x2, [], r6, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000002380)={0x8, 0x4}, 0x8, 0x10, &(0x7f00000023c0)={0x2, 0x2, 0x100, 0x400}, 0x10}, 0x78) r7 = dup(r5) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xa, &(0x7f0000002480)={0x0, &(0x7f0000000140)}) splice(r0, 0x0, 0xffffffffffffffff, 0x0, 0x100000000, 0x0) [ 742.692603] erofs: options -> [ 742.720302] erofs: cannot read erofs superblock [ 742.810170] erofs: read_super, device -> /dev/loop0 [ 742.814971] erofs: read_super, device -> /dev/loop3 [ 742.815479] erofs: options -> [ 742.830026] erofs: options -> fault_injection=0x0000000000000000,noacl, [ 742.834920] erofs: read_super, device -> /dev/loop4 [ 742.853190] erofs: read_super, device -> /dev/loop2 03:49:50 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000c80)=@raw={'raw\x00', 0x3c1, 0x3, 0x308, 0x0, 0x150, 0x150, 0xe0030000, 0x3, 0x238, 0x238, 0x238, 0x238, 0x238, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x3], 0x0, 0x128, 0x150, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'dummy0\x00', {0x0, 0x0, 0x3, 0x0, 0x0, 0xfffd, 0x7}}}, @common=@ipv6header={{0x28, 'ipv6header\x00'}, {0x0, 0x81}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}, {{@uncond, 0x0, 0xa8, 0xe8}, @common=@inet=@LOG={0x40, 'LOG\x00', 0x0, {0x0, 0x0, "59e2b655a7928de9d18f6f4ce2fcb46e2fbbb084e62170a6b5ab23bc6a36"}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x368) [ 742.858417] erofs: options -> [ 742.862430] erofs: options -> fault_injection=0x0000000000000000,noacl, [ 742.870315] erofs: FAULT_INJECTION was not selected [ 742.873496] erofs: root inode @ nid 36 [ 742.881622] erofs: root inode @ nid 36 [ 742.893104] erofs: mounted on /dev/loop3 with opts: fault_injection=0x0000000000000000. [ 742.893156] erofs: cannot read erofs superblock [ 742.916650] erofs: mounted on /dev/loop0 with opts: . 03:49:50 executing program 3: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0xedc0, 0x1000}], 0x0, &(0x7f0000000040)={[{@fault_injection={'fault_injection'}}, {@noacl='noacl'}]}) 03:49:50 executing program 0: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="10000300c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000040)) 03:49:50 executing program 4: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="02000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000040)) 03:49:50 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000c80)=@raw={'raw\x00', 0x3c1, 0x3, 0x308, 0x0, 0x150, 0x150, 0xe2020000, 0x3, 0x238, 0x238, 0x238, 0x238, 0x238, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x3], 0x0, 0x128, 0x150, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'dummy0\x00', {0x0, 0x0, 0x3, 0x0, 0x0, 0xfffd, 0x7}}}, @common=@ipv6header={{0x28, 'ipv6header\x00'}, {0x0, 0x81}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}, {{@uncond, 0x0, 0xa8, 0xe8}, @common=@inet=@LOG={0x40, 'LOG\x00', 0x0, {0x0, 0x0, "59e2b655a7928de9d18f6f4ce2fcb46e2fbbb084e62170a6b5ab23bc6a36"}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x368) [ 742.962558] erofs: blksize 1 isn't supported on this platform [ 742.996241] erofs: unmounted for /dev/loop3 [ 743.004777] erofs: unmounted for /dev/loop0 03:49:50 executing program 2: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf01000000", 0xc, 0x400}, {&(0x7f0000010100)="05000000c025", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000040)={[{@fault_injection={'fault_injection'}}, {@noacl='noacl'}]}) 03:49:50 executing program 5: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f00000000c0)=[{&(0x7f0000000180)="77690addcfbe1fbb66ec", 0xff3b}], 0x1, 0x1) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000001c0)={0x68, 0x2, 0x6, 0x801, 0x0, 0x0, {0x0, 0x0, 0xa}, [@IPSET_ATTR_TYPENAME={0xe, 0x3, 'bitmap:ip\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_DATA={0x1c, 0x7, 0x0, 0x1, [@IPSET_ATTR_TIMEOUT={0x8, 0x6, 0x1, 0x0, 0x8241}, @IPSET_ATTR_MARK={0x8, 0xa, 0x1, 0x0, 0x2}, @IPSET_ATTR_TIMEOUT={0x8, 0x6, 0x1, 0x0, 0x80000000}]}]}, 0x68}}, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) splice(r0, 0x0, r2, 0x0, 0x100000000, 0x0) 03:49:50 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000c80)=@raw={'raw\x00', 0x3c1, 0x3, 0x308, 0x0, 0x150, 0x150, 0xe4020000, 0x3, 0x238, 0x238, 0x238, 0x238, 0x238, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x3], 0x0, 0x128, 0x150, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'dummy0\x00', {0x0, 0x0, 0x3, 0x0, 0x0, 0xfffd, 0x7}}}, @common=@ipv6header={{0x28, 'ipv6header\x00'}, {0x0, 0x81}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}, {{@uncond, 0x0, 0xa8, 0xe8}, @common=@inet=@LOG={0x40, 'LOG\x00', 0x0, {0x0, 0x0, "59e2b655a7928de9d18f6f4ce2fcb46e2fbbb084e62170a6b5ab23bc6a36"}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x368) 03:49:50 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000c80)=@raw={'raw\x00', 0x3c1, 0x3, 0x308, 0x0, 0x150, 0x150, 0xf2020000, 0x3, 0x238, 0x238, 0x238, 0x238, 0x238, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x3], 0x0, 0x128, 0x150, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'dummy0\x00', {0x0, 0x0, 0x3, 0x0, 0x0, 0xfffd, 0x7}}}, @common=@ipv6header={{0x28, 'ipv6header\x00'}, {0x0, 0x81}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}, {{@uncond, 0x0, 0xa8, 0xe8}, @common=@inet=@LOG={0x40, 'LOG\x00', 0x0, {0x0, 0x0, "59e2b655a7928de9d18f6f4ce2fcb46e2fbbb084e62170a6b5ab23bc6a36"}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x368) [ 743.191953] erofs: read_super, device -> /dev/loop2 [ 743.195015] erofs: read_super, device -> /dev/loop3 [ 743.197135] erofs: options -> fault_injection=0x0000000000000000,noacl, [ 743.202345] erofs: read_super, device -> /dev/loop4 [ 743.211075] erofs: blksize 1 isn't supported on this platform [ 743.241432] erofs: read_super, device -> /dev/loop0 [ 743.253901] erofs: options -> [ 743.255369] erofs: options -> fault_injection=0x0000000000000000,noacl, [ 743.261668] erofs: root inode @ nid 36 [ 743.266466] erofs: options -> [ 743.274391] erofs: mounted on /dev/loop0 with opts: . 03:49:50 executing program 2: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c00", 0xe, 0x400}, {&(0x7f0000010100)="05000000c025", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000040)={[{@fault_injection={'fault_injection'}}, {@noacl='noacl'}]}) 03:49:50 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000c80)=@raw={'raw\x00', 0x3c1, 0x3, 0x308, 0x0, 0x150, 0x150, 0xfa030000, 0x3, 0x238, 0x238, 0x238, 0x238, 0x238, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x3], 0x0, 0x128, 0x150, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'dummy0\x00', {0x0, 0x0, 0x3, 0x0, 0x0, 0xfffd, 0x7}}}, @common=@ipv6header={{0x28, 'ipv6header\x00'}, {0x0, 0x81}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}, {{@uncond, 0x0, 0xa8, 0xe8}, @common=@inet=@LOG={0x40, 'LOG\x00', 0x0, {0x0, 0x0, "59e2b655a7928de9d18f6f4ce2fcb46e2fbbb084e62170a6b5ab23bc6a36"}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x368) 03:49:50 executing program 0: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="10002000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000040)) [ 743.292067] erofs: root inode @ nid 36 [ 743.296735] erofs: FAULT_INJECTION was not selected [ 743.307942] erofs: mounted on /dev/loop4 with opts: . [ 743.326658] erofs: root inode @ nid 36 [ 743.338523] erofs: unmounted for /dev/loop0 [ 743.346504] erofs: mounted on /dev/loop3 with opts: fault_injection=0x0000000000000000. [ 743.399877] erofs: read_super, device -> /dev/loop2 03:49:50 executing program 3: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0xf703, 0x1000}], 0x0, &(0x7f0000000040)={[{@fault_injection={'fault_injection'}}, {@noacl='noacl'}]}) 03:49:50 executing program 4: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="02000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000040)) 03:49:50 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000c80)=@raw={'raw\x00', 0x3c1, 0x3, 0x308, 0x0, 0x150, 0x150, 0xfc030000, 0x3, 0x238, 0x238, 0x238, 0x238, 0x238, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x3], 0x0, 0x128, 0x150, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'dummy0\x00', {0x0, 0x0, 0x3, 0x0, 0x0, 0xfffd, 0x7}}}, @common=@ipv6header={{0x28, 'ipv6header\x00'}, {0x0, 0x81}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}, {{@uncond, 0x0, 0xa8, 0xe8}, @common=@inet=@LOG={0x40, 'LOG\x00', 0x0, {0x0, 0x0, "59e2b655a7928de9d18f6f4ce2fcb46e2fbbb084e62170a6b5ab23bc6a36"}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x368) [ 743.422258] erofs: options -> fault_injection=0x0000000000000000,noacl, [ 743.430948] erofs: unmounted for /dev/loop3 [ 743.437189] erofs: FAULT_INJECTION was not selected [ 743.442895] erofs: root inode @ nid 0 [ 743.443354] erofs: unmounted for /dev/loop4 03:49:51 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000c80)=@raw={'raw\x00', 0x3c1, 0x3, 0x308, 0x0, 0x150, 0x150, 0xfe020000, 0x3, 0x238, 0x238, 0x238, 0x238, 0x238, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x3], 0x0, 0x128, 0x150, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'dummy0\x00', {0x0, 0x0, 0x3, 0x0, 0x0, 0xfffd, 0x7}}}, @common=@ipv6header={{0x28, 'ipv6header\x00'}, {0x0, 0x81}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}, {{@uncond, 0x0, 0xa8, 0xe8}, @common=@inet=@LOG={0x40, 'LOG\x00', 0x0, {0x0, 0x0, "59e2b655a7928de9d18f6f4ce2fcb46e2fbbb084e62170a6b5ab23bc6a36"}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x368) [ 743.576911] erofs: read_super, device -> /dev/loop0 [ 743.582562] erofs: read_super, device -> /dev/loop3 [ 743.589380] erofs: options -> [ 743.606770] erofs: root inode @ nid 36 [ 743.619577] erofs: options -> fault_injection=0x0000000000000000,noacl, 03:49:51 executing program 2: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c00", 0xe, 0x400}, {&(0x7f0000010100)="05000000c025", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000040)={[{@fault_injection={'fault_injection'}}, {@noacl='noacl'}]}) [ 743.643014] erofs: mounted on /dev/loop0 with opts: . 03:49:51 executing program 5: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f00000000c0)=[{&(0x7f0000000180)="77690addcfbe1fbb66ec", 0xff3b}], 0x1, 0x1) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) fcntl$F_GET_FILE_RW_HINT(r1, 0x40d, &(0x7f0000000040)) sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000180)={0x54, 0x2, 0x6, 0x801, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0xd, 0x3, 'list:set\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_TIMEOUT={0x8, 0x6, 0x1, 0x0, 0x8241}]}]}, 0x54}}, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) splice(r0, 0x0, r2, 0x0, 0x100000000, 0x0) [ 743.687953] erofs: FAULT_INJECTION was not selected [ 743.713357] erofs: root inode @ nid 36 [ 743.741413] erofs: read_super, device -> /dev/loop4 03:49:51 executing program 0: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="10fdef00c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000040)) [ 743.763643] erofs: mounted on /dev/loop3 with opts: fault_injection=0x0000000000000000. [ 743.790305] erofs: options -> [ 743.793769] erofs: unmounted for /dev/loop0 [ 743.805203] erofs: root inode @ nid 36 [ 743.844471] erofs: mounted on /dev/loop4 with opts: . [ 743.892382] erofs: read_super, device -> /dev/loop2 03:49:51 executing program 3: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0xfa03, 0x1000}], 0x0, &(0x7f0000000040)={[{@fault_injection={'fault_injection'}}, {@noacl='noacl'}]}) 03:49:51 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000c80)=@raw={'raw\x00', 0x3c1, 0x3, 0x308, 0x0, 0x150, 0x150, 0xfe030000, 0x3, 0x238, 0x238, 0x238, 0x238, 0x238, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x3], 0x0, 0x128, 0x150, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'dummy0\x00', {0x0, 0x0, 0x3, 0x0, 0x0, 0xfffd, 0x7}}}, @common=@ipv6header={{0x28, 'ipv6header\x00'}, {0x0, 0x81}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}, {{@uncond, 0x0, 0xa8, 0xe8}, @common=@inet=@LOG={0x40, 'LOG\x00', 0x0, {0x0, 0x0, "59e2b655a7928de9d18f6f4ce2fcb46e2fbbb084e62170a6b5ab23bc6a36"}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x368) [ 743.918349] erofs: options -> fault_injection=0x0000000000000000,noacl, [ 743.933485] erofs: unmounted for /dev/loop3 03:49:51 executing program 4: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x10, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="02000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000040)) [ 743.977119] erofs: FAULT_INJECTION was not selected [ 743.984867] erofs: unmounted for /dev/loop4 [ 744.000465] erofs: root inode @ nid 0 03:49:51 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000c80)=@raw={'raw\x00', 0x3c1, 0x3, 0x308, 0x0, 0x150, 0x150, 0xffff1f00, 0x3, 0x238, 0x238, 0x238, 0x238, 0x238, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x3], 0x0, 0x128, 0x150, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'dummy0\x00', {0x0, 0x0, 0x3, 0x0, 0x0, 0xfffd, 0x7}}}, @common=@ipv6header={{0x28, 'ipv6header\x00'}, {0x0, 0x81}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}, {{@uncond, 0x0, 0xa8, 0xe8}, @common=@inet=@LOG={0x40, 'LOG\x00', 0x0, {0x0, 0x0, "59e2b655a7928de9d18f6f4ce2fcb46e2fbbb084e62170a6b5ab23bc6a36"}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x368) [ 744.099543] erofs: read_super, device -> /dev/loop0 [ 744.099660] erofs: read_super, device -> /dev/loop3 [ 744.104598] erofs: options -> [ 744.116927] erofs: root inode @ nid 36 [ 744.136014] erofs: mounted on /dev/loop0 with opts: . 03:49:51 executing program 2: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c00", 0xe, 0x400}, {&(0x7f0000010100)="05000000c025", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000040)={[{@fault_injection={'fault_injection'}}, {@noacl='noacl'}]}) 03:49:51 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000c80)=@raw={'raw\x00', 0x3c1, 0x3, 0x308, 0x0, 0x150, 0x150, 0xffffff80, 0x3, 0x238, 0x238, 0x238, 0x238, 0x238, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x3], 0x0, 0x128, 0x150, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'dummy0\x00', {0x0, 0x0, 0x3, 0x0, 0x0, 0xfffd, 0x7}}}, @common=@ipv6header={{0x28, 'ipv6header\x00'}, {0x0, 0x81}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}, {{@uncond, 0x0, 0xa8, 0xe8}, @common=@inet=@LOG={0x40, 'LOG\x00', 0x0, {0x0, 0x0, "59e2b655a7928de9d18f6f4ce2fcb46e2fbbb084e62170a6b5ab23bc6a36"}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x368) [ 744.143765] erofs: options -> fault_injection=0x0000000000000000,noacl, [ 744.167941] erofs: FAULT_INJECTION was not selected [ 744.181147] erofs: read_super, device -> /dev/loop4 03:49:51 executing program 0: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="10effd00c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000040)) [ 744.204847] erofs: root inode @ nid 36 [ 744.207518] erofs: options -> [ 744.231245] erofs: root inode @ nid 36 [ 744.235337] erofs: mounted on /dev/loop3 with opts: fault_injection=0x0000000000000000. [ 744.256257] erofs: mounted on /dev/loop4 with opts: . [ 744.262384] erofs: unmounted for /dev/loop0 03:49:51 executing program 3: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0xff0f, 0x1000}], 0x0, &(0x7f0000000040)={[{@fault_injection={'fault_injection'}}, {@noacl='noacl'}]}) 03:49:51 executing program 4: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x14, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="02000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000040)) 03:49:51 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000c80)=@raw={'raw\x00', 0x3c1, 0x3, 0x308, 0x0, 0x150, 0x150, 0x0, 0x2, 0x238, 0x238, 0x238, 0x238, 0x238, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x3], 0x0, 0x128, 0x150, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'dummy0\x00', {0x0, 0x0, 0x3, 0x0, 0x0, 0xfffd, 0x7}}}, @common=@ipv6header={{0x28, 'ipv6header\x00'}, {0x0, 0x81}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}, {{@uncond, 0x0, 0xa8, 0xe8}, @common=@inet=@LOG={0x40, 'LOG\x00', 0x0, {0x0, 0x0, "59e2b655a7928de9d18f6f4ce2fcb46e2fbbb084e62170a6b5ab23bc6a36"}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x368) [ 744.322342] erofs: unmounted for /dev/loop3 [ 744.341006] erofs: read_super, device -> /dev/loop2 [ 744.349589] erofs: unmounted for /dev/loop4 [ 744.361928] erofs: options -> fault_injection=0x0000000000000000,noacl, [ 744.425511] erofs: FAULT_INJECTION was not selected [ 744.445424] erofs: root inode @ nid 0 [ 744.446359] erofs: read_super, device -> /dev/loop0 [ 744.459025] erofs: options -> [ 744.474130] erofs: root inode @ nid 36 [ 744.478508] erofs: mounted on /dev/loop0 with opts: . [ 744.551079] erofs: unmounted for /dev/loop0 [ 744.588113] erofs: read_super, device -> /dev/loop3 [ 744.595961] erofs: read_super, device -> /dev/loop4 [ 744.601262] erofs: options -> fault_injection=0x0000000000000000,noacl, [ 744.602251] erofs: options -> [ 744.622789] erofs: root inode @ nid 36 [ 744.631291] erofs: mounted on /dev/loop4 with opts: . [ 744.633998] erofs: FAULT_INJECTION was not selected [ 744.656632] erofs: root inode @ nid 36 [ 744.674773] erofs: mounted on /dev/loop3 with opts: fault_injection=0x0000000000000000. 03:49:52 executing program 5: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f00000000c0)=[{&(0x7f0000000180)="77690addcfbe1fbb66ec", 0xff3b}], 0x1, 0x1) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000002c0)=ANY=[@ANYBLOB="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"], 0x54}}, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) splice(r0, 0x0, r2, 0x0, 0x100000000, 0x0) 03:49:52 executing program 0: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="10000200c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000040)) 03:49:52 executing program 2: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c0024", 0xf}, {&(0x7f0000010100)="05000000c025", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000040)={[{@fault_injection={'fault_injection'}}, {@noacl='noacl'}]}) 03:49:52 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000c80)=@raw={'raw\x00', 0x3c1, 0x3, 0x308, 0x0, 0x150, 0x150, 0x0, 0x5, 0x238, 0x238, 0x238, 0x238, 0x238, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x3], 0x0, 0x128, 0x150, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'dummy0\x00', {0x0, 0x0, 0x3, 0x0, 0x0, 0xfffd, 0x7}}}, @common=@ipv6header={{0x28, 'ipv6header\x00'}, {0x0, 0x81}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}, {{@uncond, 0x0, 0xa8, 0xe8}, @common=@inet=@LOG={0x40, 'LOG\x00', 0x0, {0x0, 0x0, "59e2b655a7928de9d18f6f4ce2fcb46e2fbbb084e62170a6b5ab23bc6a36"}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x368) [ 745.110105] erofs: unmounted for /dev/loop4 [ 745.114946] erofs: unmounted for /dev/loop3 03:49:52 executing program 4: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x22, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="02000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000040)) 03:49:52 executing program 3: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x40000, 0x1000}], 0x0, &(0x7f0000000040)={[{@fault_injection={'fault_injection'}}, {@noacl='noacl'}]}) [ 745.258402] erofs: read_super, device -> /dev/loop0 [ 745.262154] erofs: read_super, device -> /dev/loop4 [ 745.268845] erofs: options -> [ 745.272789] erofs: root inode @ nid 36 [ 745.274270] erofs: read_super, device -> /dev/loop2 [ 745.276997] erofs: mounted on /dev/loop4 with opts: . [ 745.292906] erofs: options -> 03:49:52 executing program 4: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2a, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="02000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000040)) 03:49:52 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000c80)=@raw={'raw\x00', 0x3c1, 0x3, 0x308, 0x0, 0x150, 0x150, 0x0, 0x11, 0x238, 0x238, 0x238, 0x238, 0x238, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x3], 0x0, 0x128, 0x150, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'dummy0\x00', {0x0, 0x0, 0x3, 0x0, 0x0, 0xfffd, 0x7}}}, @common=@ipv6header={{0x28, 'ipv6header\x00'}, {0x0, 0x81}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}, {{@uncond, 0x0, 0xa8, 0xe8}, @common=@inet=@LOG={0x40, 'LOG\x00', 0x0, {0x0, 0x0, "59e2b655a7928de9d18f6f4ce2fcb46e2fbbb084e62170a6b5ab23bc6a36"}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x368) [ 745.313361] erofs: root inode @ nid 36 [ 745.320637] erofs: unmounted for /dev/loop4 [ 745.326375] erofs: options -> fault_injection=0x0000000000000000,noacl, [ 745.333882] erofs: read_super, device -> /dev/loop3 [ 745.344593] erofs: mounted on /dev/loop0 with opts: . [ 745.346476] erofs: options -> fault_injection=0x0000000000000000,noacl, [ 745.357828] erofs: cannot find valid erofs superblock [ 745.363930] erofs: FAULT_INJECTION was not selected 03:49:52 executing program 0: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="10000300c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000040)) 03:49:52 executing program 2: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c0024", 0xf}, {&(0x7f0000010100)="05000000c025", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000040)={[{@fault_injection={'fault_injection'}}, {@noacl='noacl'}]}) [ 745.408581] erofs: root inode @ nid 36 [ 745.417684] erofs: unmounted for /dev/loop0 [ 745.438293] erofs: mounted on /dev/loop3 with opts: fault_injection=0x0000000000000000. 03:49:53 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000c80)=@raw={'raw\x00', 0x3c1, 0x3, 0x308, 0x0, 0x150, 0x150, 0x0, 0x2000, 0x238, 0x238, 0x238, 0x238, 0x238, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x3], 0x0, 0x128, 0x150, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'dummy0\x00', {0x0, 0x0, 0x3, 0x0, 0x0, 0xfffd, 0x7}}}, @common=@ipv6header={{0x28, 'ipv6header\x00'}, {0x0, 0x81}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}, {{@uncond, 0x0, 0xa8, 0xe8}, @common=@inet=@LOG={0x40, 'LOG\x00', 0x0, {0x0, 0x0, "59e2b655a7928de9d18f6f4ce2fcb46e2fbbb084e62170a6b5ab23bc6a36"}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x368) [ 745.479885] erofs: read_super, device -> /dev/loop4 [ 745.490960] erofs: options -> [ 745.506252] erofs: root inode @ nid 36 03:49:53 executing program 3: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x1fffff, 0x1000}], 0x0, &(0x7f0000000040)={[{@fault_injection={'fault_injection'}}, {@noacl='noacl'}]}) [ 745.531279] erofs: mounted on /dev/loop4 with opts: . [ 745.542454] erofs: unmounted for /dev/loop3 [ 745.583811] erofs: read_super, device -> /dev/loop2 [ 745.588868] erofs: options -> fault_injection=0x0000000000000000,noacl, [ 745.619334] erofs: cannot find valid erofs superblock [ 745.624973] erofs: read_super, device -> /dev/loop0 03:49:53 executing program 5: ioctl$KDGKBSENT(0xffffffffffffffff, 0x4b48, &(0x7f0000000200)={0x1, "bf0ead881d9ed4c95360a5e9a9465b33979c8b803affbcf898ae182971f491c2ae7a4a81d3deab1dd85a43ddfab8ceeab9fc1e1aa6372fa4ddbb6ddc11d167f24a38f9dfbf66ce479c63231d0d9a99a1fb3320216a0b20c379a09fa610430130a00508e123f8a138b6264dee44b13c18b7c7146376f13c96850b653304c89ff2be0e2dba00303dd88137bd594b7abe21b146e082987a308fa59211a70eecf6d68a73d96cbba20ed31b937a6e147f73eceaab60d8814cc0a8227fef318a36979affbd128f1953cf557f7afbff5f09cd1b1e951af5bd8ca14ee91918a5d5d7976fab653dbdc3f5e444d080c6636767d35c39f7f9fe5518a7ab08031100a45f21afa8832a0eab2f1285cc1bf24f67c1f72b7cc1d50d7932c3026021ad147070b0645d25b632b29d345d4f226e1fcfb157cfc659362a0d68c32feee14fa107a1466b3247b3923f9d516df5863ec1f75c6881b5b20972e3f84dc8b66af3406d6323a3f2c13ab22bc97ab83f528d1043ae194e3f0c8b65ccdee15713ff827abe419be233d8b680f081e6950e7b11b7a019da6a8a1a0c8e93a4ca2326175b2d975f37f54dae79a16aa106ef3002956dec343570216ed906ab69503125a44edeb7f1e90857f5f9d5bad28a21362f31c22fb255e68670379fe17a9fcc2b732c6776b2e8ee5688fbfe8e9577e20ec43f427a764370f3469b4639b7c8fd5baadd0c0ba1dcc3"}) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f00000000c0)=[{&(0x7f0000000180)="77690addcfbe1fbb66ec", 0xff3b}], 0x1, 0x1) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000180)={0x54, 0x2, 0x6, 0x801, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0xd, 0x3, 'list:set\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_TIMEOUT={0x8, 0x6, 0x1, 0x0, 0x8241}]}]}, 0x54}}, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) splice(r0, 0x0, r2, 0x0, 0x100000000, 0x0) 03:49:53 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000c80)=@raw={'raw\x00', 0x3c1, 0x3, 0x308, 0x0, 0x150, 0x150, 0x0, 0x7fffffe, 0x238, 0x238, 0x238, 0x238, 0x238, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x3], 0x0, 0x128, 0x150, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'dummy0\x00', {0x0, 0x0, 0x3, 0x0, 0x0, 0xfffd, 0x7}}}, @common=@ipv6header={{0x28, 'ipv6header\x00'}, {0x0, 0x81}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}, {{@uncond, 0x0, 0xa8, 0xe8}, @common=@inet=@LOG={0x40, 'LOG\x00', 0x0, {0x0, 0x0, "59e2b655a7928de9d18f6f4ce2fcb46e2fbbb084e62170a6b5ab23bc6a36"}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x368) 03:49:53 executing program 4: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x37, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="02000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000040)) [ 745.650682] erofs: options -> [ 745.655582] erofs: unmounted for /dev/loop4 [ 745.659291] erofs: root inode @ nid 36 [ 745.670628] erofs: mounted on /dev/loop0 with opts: . 03:49:53 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000c80)=@raw={'raw\x00', 0x3c1, 0x3, 0x308, 0x0, 0x150, 0x150, 0x0, 0x8000000, 0x238, 0x238, 0x238, 0x238, 0x238, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x3], 0x0, 0x128, 0x150, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'dummy0\x00', {0x0, 0x0, 0x3, 0x0, 0x0, 0xfffd, 0x7}}}, @common=@ipv6header={{0x28, 'ipv6header\x00'}, {0x0, 0x81}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}, {{@uncond, 0x0, 0xa8, 0xe8}, @common=@inet=@LOG={0x40, 'LOG\x00', 0x0, {0x0, 0x0, "59e2b655a7928de9d18f6f4ce2fcb46e2fbbb084e62170a6b5ab23bc6a36"}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x368) [ 745.756656] erofs: read_super, device -> /dev/loop3 03:49:53 executing program 0: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="10000400c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000040)) 03:49:53 executing program 2: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c0024", 0xf}, {&(0x7f0000010100)="05000000c025", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000040)={[{@fault_injection={'fault_injection'}}, {@noacl='noacl'}]}) [ 745.784294] erofs: options -> fault_injection=0x0000000000000000,noacl, [ 745.791323] erofs: unmounted for /dev/loop0 [ 745.819980] erofs: FAULT_INJECTION was not selected [ 745.836806] erofs: root inode @ nid 36 [ 745.854426] erofs: read_super, device -> /dev/loop4 [ 745.867937] erofs: mounted on /dev/loop3 with opts: fault_injection=0x0000000000000000. [ 745.883216] erofs: options -> 03:49:53 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000c80)=@raw={'raw\x00', 0x3c1, 0x3, 0x308, 0x0, 0x150, 0x150, 0x0, 0x3, 0x150, 0x238, 0x238, 0x238, 0x238, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x3], 0x0, 0x128, 0x150, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'dummy0\x00', {0x0, 0x0, 0x3, 0x0, 0x0, 0xfffd, 0x7}}}, @common=@ipv6header={{0x28, 'ipv6header\x00'}, {0x0, 0x81}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}, {{@uncond, 0x0, 0xa8, 0xe8}, @common=@inet=@LOG={0x40, 'LOG\x00', 0x0, {0x0, 0x0, "59e2b655a7928de9d18f6f4ce2fcb46e2fbbb084e62170a6b5ab23bc6a36"}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x368) [ 745.893445] erofs: root inode @ nid 36 [ 745.906745] erofs: mounted on /dev/loop4 with opts: . [ 745.928586] erofs: read_super, device -> /dev/loop2 03:49:53 executing program 3: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x1000000, 0x1000}], 0x0, &(0x7f0000000040)={[{@fault_injection={'fault_injection'}}, {@noacl='noacl'}]}) [ 745.948176] erofs: options -> fault_injection=0x0000000000000000,noacl, [ 745.955854] erofs: read_super, device -> /dev/loop0 [ 745.964216] erofs: options -> [ 745.971344] erofs: root inode @ nid 36 [ 745.975465] erofs: mounted on /dev/loop0 with opts: . [ 745.982003] erofs: unmounted for /dev/loop3 03:49:53 executing program 4: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x39, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="02000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000040)) 03:49:53 executing program 5: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f00000000c0)=[{&(0x7f0000000180)="77690addcfbe1fbb66ec", 0xff3b}], 0x1, 0x1) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000180)={0x54, 0x2, 0x6, 0x801, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x10, 0x3, 'bitmap:port\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_TIMEOUT={0x8, 0x6, 0x1, 0x0, 0x8241}]}]}, 0x54}}, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) splice(r0, 0x0, r2, 0x0, 0x100000000, 0x0) 03:49:53 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000c80)=@raw={'raw\x00', 0x3c1, 0x3, 0x308, 0x0, 0x150, 0x150, 0x0, 0x3, 0x23d, 0x238, 0x238, 0x238, 0x238, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x3], 0x0, 0x128, 0x150, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'dummy0\x00', {0x0, 0x0, 0x3, 0x0, 0x0, 0xfffd, 0x7}}}, @common=@ipv6header={{0x28, 'ipv6header\x00'}, {0x0, 0x81}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}, {{@uncond, 0x0, 0xa8, 0xe8}, @common=@inet=@LOG={0x40, 'LOG\x00', 0x0, {0x0, 0x0, "59e2b655a7928de9d18f6f4ce2fcb46e2fbbb084e62170a6b5ab23bc6a36"}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x368) [ 745.997496] erofs: cannot find valid erofs superblock [ 746.004894] erofs: unmounted for /dev/loop4 03:49:53 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000c80)=@raw={'raw\x00', 0x3c1, 0x3, 0x308, 0x0, 0x150, 0x150, 0x0, 0x3, 0x308, 0x238, 0x238, 0x238, 0x238, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x3], 0x0, 0x128, 0x150, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'dummy0\x00', {0x0, 0x0, 0x3, 0x0, 0x0, 0xfffd, 0x7}}}, @common=@ipv6header={{0x28, 'ipv6header\x00'}, {0x0, 0x81}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}, {{@uncond, 0x0, 0xa8, 0xe8}, @common=@inet=@LOG={0x40, 'LOG\x00', 0x0, {0x0, 0x0, "59e2b655a7928de9d18f6f4ce2fcb46e2fbbb084e62170a6b5ab23bc6a36"}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x368) 03:49:53 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000c80)=@raw={'raw\x00', 0x3c1, 0x3, 0x308, 0x0, 0x150, 0x150, 0x0, 0x3, 0x2000, 0x238, 0x238, 0x238, 0x238, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x3], 0x0, 0x128, 0x150, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'dummy0\x00', {0x0, 0x0, 0x3, 0x0, 0x0, 0xfffd, 0x7}}}, @common=@ipv6header={{0x28, 'ipv6header\x00'}, {0x0, 0x81}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}, {{@uncond, 0x0, 0xa8, 0xe8}, @common=@inet=@LOG={0x40, 'LOG\x00', 0x0, {0x0, 0x0, "59e2b655a7928de9d18f6f4ce2fcb46e2fbbb084e62170a6b5ab23bc6a36"}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x368) 03:49:53 executing program 0: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="10000800c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000040)) 03:49:53 executing program 2: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c025", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, 0x0) 03:49:53 executing program 5: prctl$PR_SET_SECUREBITS(0x1c, 0x38) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r1, r0) ioctl$VT_RESIZE(r2, 0x5609, &(0x7f0000000040)={0xe000, 0x8, 0x9}) vmsplice(r1, &(0x7f00000000c0)=[{&(0x7f0000000180)="77690addcfbe1fbb66ec", 0xff3b}], 0x1, 0x1) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000180)={0x54, 0x2, 0x6, 0x801, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0xd, 0x3, 'list:set\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_TIMEOUT={0x8, 0x6, 0x1, 0x0, 0x8241}]}]}, 0x54}}, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) splice(r0, 0x0, r3, 0x0, 0x100000000, 0x0) [ 746.144142] erofs: unmounted for /dev/loop0 [ 746.201688] erofs: read_super, device -> /dev/loop3 [ 746.225658] erofs: read_super, device -> /dev/loop4 [ 746.244842] erofs: options -> [ 746.254656] erofs: root inode @ nid 36 [ 746.262434] erofs: mounted on /dev/loop4 with opts: . [ 746.263216] erofs: options -> fault_injection=0x0000000000000000,noacl, 03:49:53 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000c80)=@raw={'raw\x00', 0x3c1, 0x3, 0x308, 0x0, 0x150, 0x150, 0x0, 0x3, 0x238, 0x150, 0x238, 0x238, 0x238, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x3], 0x0, 0x128, 0x150, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'dummy0\x00', {0x0, 0x0, 0x3, 0x0, 0x0, 0xfffd, 0x7}}}, @common=@ipv6header={{0x28, 'ipv6header\x00'}, {0x0, 0x81}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}, {{@uncond, 0x0, 0xa8, 0xe8}, @common=@inet=@LOG={0x40, 'LOG\x00', 0x0, {0x0, 0x0, "59e2b655a7928de9d18f6f4ce2fcb46e2fbbb084e62170a6b5ab23bc6a36"}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x368) 03:49:53 executing program 2: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c025", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, 0x0) 03:49:53 executing program 4: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x223, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="02000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000040)) [ 746.295681] erofs: FAULT_INJECTION was not selected [ 746.307189] erofs: root inode @ nid 36 [ 746.311851] erofs: mounted on /dev/loop3 with opts: fault_injection=0x0000000000000000. [ 746.345955] erofs: unmounted for /dev/loop4 [ 746.377994] erofs: read_super, device -> /dev/loop0 [ 746.384329] erofs: options -> [ 746.387813] erofs: root inode @ nid 36 [ 746.393362] erofs: mounted on /dev/loop0 with opts: . 03:49:54 executing program 3: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x2000000, 0x1000}], 0x0, &(0x7f0000000040)={[{@fault_injection={'fault_injection'}}, {@noacl='noacl'}]}) 03:49:54 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000c80)=@raw={'raw\x00', 0x3c1, 0x3, 0x308, 0x0, 0x150, 0x150, 0x0, 0x3, 0x238, 0x23d, 0x238, 0x238, 0x238, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x3], 0x0, 0x128, 0x150, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'dummy0\x00', {0x0, 0x0, 0x3, 0x0, 0x0, 0xfffd, 0x7}}}, @common=@ipv6header={{0x28, 'ipv6header\x00'}, {0x0, 0x81}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}, {{@uncond, 0x0, 0xa8, 0xe8}, @common=@inet=@LOG={0x40, 'LOG\x00', 0x0, {0x0, 0x0, "59e2b655a7928de9d18f6f4ce2fcb46e2fbbb084e62170a6b5ab23bc6a36"}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x368) 03:49:54 executing program 5: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f00000000c0)=[{&(0x7f0000000180)="77690addcfbe1fbb66ec", 0xff3b}], 0x1, 0x1) writev(r1, &(0x7f0000000140)=[{&(0x7f0000000040)="10b7c1a1295c539c86c997ba407d4274b1e8c21266577cff04d570c8c8898d5e4478fbbab256dd", 0x27}, {&(0x7f0000000100)}, {&(0x7f0000000200)="52f25cb72025c4507b572288080b24a284f9cbf561eb66864a3569c7300032286dd0e3ad8a64808fd0a8a6b1ee64d575294ffcfe4ca1065872939290f30aa0d06c586fc7f7690f2d9c62368acfa413f5b42b38cf1f522103e8cd77e234d49a34360b9378be241c75206b4d2f714ccde3ccb357e9488be490d619f18c7e8dc76ff09816cb5f455660ec25e155182942e584d5d1d6e05a2f6ea17a60be41df5f48069327d709a0f6585fd7f349781ed45b0359a8f1d2c432801be03c264cc07e7eedb77f0adb9b68efbb69dcf84f783a61077bec1eba7e292a0af109e8b05c", 0xde}, {&(0x7f0000000300)="71b459d3b922c3d671c30d372df4e0f6aff411e6461135d5774bb05ba53721ffb49bc707a7e99c01f8e41e7af95e9c92e532fa098e1b4b8f3c4f7ff18ac1d7acf7dcc3422aa1d17a8aa3cdead4f2f4621ffbad2743a3d21de0ec54cb3ca3e1018f1cdae0a4b4", 0x66}], 0x4) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000180)={0x54, 0x2, 0x6, 0x801, 0x0, 0x0, {0x1}, [@IPSET_ATTR_TYPENAME={0xd, 0x3, 'list:set\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_TIMEOUT={0x8, 0x6, 0x1, 0x0, 0x8241}]}]}, 0x54}, 0x1, 0x0, 0x0, 0x34086c6cc1180385}, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) splice(r0, 0x0, r2, 0x0, 0x100000000, 0x0) 03:49:54 executing program 0: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="10000003c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000040)) [ 746.480948] erofs: unmounted for /dev/loop0 03:49:54 executing program 2: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c025", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, 0x0) 03:49:54 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000c80)=@raw={'raw\x00', 0x3c1, 0x3, 0x308, 0x0, 0x150, 0x150, 0x0, 0x3, 0x238, 0x308, 0x238, 0x238, 0x238, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x3], 0x0, 0x128, 0x150, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'dummy0\x00', {0x0, 0x0, 0x3, 0x0, 0x0, 0xfffd, 0x7}}}, @common=@ipv6header={{0x28, 'ipv6header\x00'}, {0x0, 0x81}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}, {{@uncond, 0x0, 0xa8, 0xe8}, @common=@inet=@LOG={0x40, 'LOG\x00', 0x0, {0x0, 0x0, "59e2b655a7928de9d18f6f4ce2fcb46e2fbbb084e62170a6b5ab23bc6a36"}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x368) [ 746.509936] erofs: unmounted for /dev/loop3 [ 746.552613] erofs: read_super, device -> /dev/loop4 [ 746.557668] erofs: options -> [ 746.568095] erofs: root inode @ nid 36 [ 746.593159] erofs: mounted on /dev/loop4 with opts: . 03:49:54 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000c80)=@raw={'raw\x00', 0x3c1, 0x3, 0x308, 0x0, 0x150, 0x150, 0x0, 0x3, 0x238, 0x2000, 0x238, 0x238, 0x238, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x3], 0x0, 0x128, 0x150, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'dummy0\x00', {0x0, 0x0, 0x3, 0x0, 0x0, 0xfffd, 0x7}}}, @common=@ipv6header={{0x28, 'ipv6header\x00'}, {0x0, 0x81}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}, {{@uncond, 0x0, 0xa8, 0xe8}, @common=@inet=@LOG={0x40, 'LOG\x00', 0x0, {0x0, 0x0, "59e2b655a7928de9d18f6f4ce2fcb46e2fbbb084e62170a6b5ab23bc6a36"}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x368) 03:49:54 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000c80)=@raw={'raw\x00', 0x3c1, 0x3, 0x308, 0x0, 0x150, 0x150, 0x0, 0x3, 0x238, 0x238, 0x150, 0x238, 0x238, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x3], 0x0, 0x128, 0x150, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'dummy0\x00', {0x0, 0x0, 0x3, 0x0, 0x0, 0xfffd, 0x7}}}, @common=@ipv6header={{0x28, 'ipv6header\x00'}, {0x0, 0x81}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}, {{@uncond, 0x0, 0xa8, 0xe8}, @common=@inet=@LOG={0x40, 'LOG\x00', 0x0, {0x0, 0x0, "59e2b655a7928de9d18f6f4ce2fcb46e2fbbb084e62170a6b5ab23bc6a36"}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x368) 03:49:54 executing program 2: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c025", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000040)={[{@fault_injection={'fault_injection'}}]}) [ 746.698204] erofs: read_super, device -> /dev/loop0 03:49:54 executing program 5: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f00000000c0)=[{&(0x7f0000000180)="77690addcfbe1fbb66ec", 0xff3b}], 0x1, 0x1) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000180)={0x54, 0x2, 0x6, 0x801, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0xd, 0x3, 'list:set\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_TIMEOUT={0x8, 0x6, 0x1, 0x0, 0x8241}]}]}, 0x54}}, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) setsockopt$ax25_SO_BINDTODEVICE(r1, 0x101, 0x19, &(0x7f0000000040)=@rose={'rose', 0x0}, 0x10) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) splice(r0, 0x0, r2, 0x0, 0x100000000, 0x0) 03:49:54 executing program 4: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5068a3f0fcf010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="02000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000040)) [ 746.721897] erofs: options -> [ 746.735692] erofs: read_super, device -> /dev/loop3 [ 746.736300] erofs: root inode @ nid 36 [ 746.748127] erofs: mounted on /dev/loop0 with opts: . [ 746.753538] erofs: options -> fault_injection=0x0000000000000000,noacl, 03:49:54 executing program 0: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="10000020c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000040)) [ 746.779989] erofs: read_super, device -> /dev/loop2 [ 746.785211] erofs: options -> fault_injection=0x0000000000000000, [ 746.794685] erofs: FAULT_INJECTION was not selected [ 746.795835] erofs: FAULT_INJECTION was not selected [ 746.800932] erofs: root inode @ nid 36 [ 746.810163] erofs: rootino(nid 36) is not a directory(i_mode 22700) [ 746.816865] erofs: unmounted for /dev/loop4 [ 746.818130] erofs: root inode @ nid 36 [ 746.835171] erofs: mounted on /dev/loop3 with opts: fault_injection=0x0000000000000000. [ 746.845832] erofs: unmounted for /dev/loop0 [ 746.940430] erofs: read_super, device -> /dev/loop4 03:49:54 executing program 3: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x3000000, 0x1000}], 0x0, &(0x7f0000000040)={[{@fault_injection={'fault_injection'}}, {@noacl='noacl'}]}) 03:49:54 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000c80)=@raw={'raw\x00', 0x3c1, 0x3, 0x308, 0x0, 0x150, 0x150, 0x0, 0x3, 0x238, 0x238, 0x23d, 0x238, 0x238, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x3], 0x0, 0x128, 0x150, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'dummy0\x00', {0x0, 0x0, 0x3, 0x0, 0x0, 0xfffd, 0x7}}}, @common=@ipv6header={{0x28, 'ipv6header\x00'}, {0x0, 0x81}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}, {{@uncond, 0x0, 0xa8, 0xe8}, @common=@inet=@LOG={0x40, 'LOG\x00', 0x0, {0x0, 0x0, "59e2b655a7928de9d18f6f4ce2fcb46e2fbbb084e62170a6b5ab23bc6a36"}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x368) 03:49:54 executing program 5: pipe(&(0x7f0000000080)={0xffffffffffffffff}) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000180)={0x54, 0x2, 0x6, 0x801, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0xd, 0x3, 'list:set\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_TIMEOUT={0x8, 0x6, 0x1, 0x0, 0x8241}]}]}, 0x54}}, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) splice(r0, 0x0, r1, 0x0, 0x100000000, 0x0) 03:49:54 executing program 2: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c025", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000040)) [ 746.964665] erofs: options -> [ 746.968103] erofs: cannot find valid erofs superblock [ 746.975414] erofs: read_super, device -> /dev/loop0 [ 746.981802] erofs: unmounted for /dev/loop3 [ 746.994401] erofs: options -> [ 746.998342] erofs: root inode @ nid 36 [ 747.004241] erofs: mounted on /dev/loop0 with opts: . 03:49:54 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000c80)=@raw={'raw\x00', 0x3c1, 0x3, 0x308, 0x0, 0x150, 0x150, 0x0, 0x3, 0x238, 0x238, 0x308, 0x238, 0x238, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x3], 0x0, 0x128, 0x150, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'dummy0\x00', {0x0, 0x0, 0x3, 0x0, 0x0, 0xfffd, 0x7}}}, @common=@ipv6header={{0x28, 'ipv6header\x00'}, {0x0, 0x81}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}, {{@uncond, 0x0, 0xa8, 0xe8}, @common=@inet=@LOG={0x40, 'LOG\x00', 0x0, {0x0, 0x0, "59e2b655a7928de9d18f6f4ce2fcb46e2fbbb084e62170a6b5ab23bc6a36"}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x368) [ 747.068325] erofs: read_super, device -> /dev/loop2 [ 747.073718] erofs: options -> [ 747.077157] erofs: root inode @ nid 36 [ 747.084157] erofs: rootino(nid 36) is not a directory(i_mode 22700) [ 747.088898] erofs: read_super, device -> /dev/loop3 [ 747.101454] erofs: options -> fault_injection=0x0000000000000000,noacl, [ 747.108717] erofs: FAULT_INJECTION was not selected [ 747.114054] erofs: root inode @ nid 36 [ 747.118599] erofs: mounted on /dev/loop3 with opts: fault_injection=0x0000000000000000. [ 747.140471] erofs: read_super, device -> /dev/loop4 [ 747.154425] erofs: options -> 03:49:54 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000c80)=@raw={'raw\x00', 0x3c1, 0x3, 0x308, 0x0, 0x150, 0x150, 0x0, 0x3, 0x238, 0x238, 0x2000, 0x238, 0x238, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x3], 0x0, 0x128, 0x150, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'dummy0\x00', {0x0, 0x0, 0x3, 0x0, 0x0, 0xfffd, 0x7}}}, @common=@ipv6header={{0x28, 'ipv6header\x00'}, {0x0, 0x81}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}, {{@uncond, 0x0, 0xa8, 0xe8}, @common=@inet=@LOG={0x40, 'LOG\x00', 0x0, {0x0, 0x0, "59e2b655a7928de9d18f6f4ce2fcb46e2fbbb084e62170a6b5ab23bc6a36"}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x368) 03:49:54 executing program 0: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="1000fdefc041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000040)) [ 747.167293] erofs: cannot find valid erofs superblock 03:49:54 executing program 3: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x4000000, 0x1000}], 0x0, &(0x7f0000000040)={[{@fault_injection={'fault_injection'}}, {@noacl='noacl'}]}) [ 747.195252] erofs: unmounted for /dev/loop0 [ 747.200160] erofs: unmounted for /dev/loop3 03:49:54 executing program 4: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5078a3f0fcf010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="02000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000040)) 03:49:54 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000c80)=@raw={'raw\x00', 0x3c1, 0x3, 0x308, 0x0, 0x150, 0x150, 0x0, 0x3, 0x238, 0x238, 0x238, 0x150, 0x238, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x3], 0x0, 0x128, 0x150, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'dummy0\x00', {0x0, 0x0, 0x3, 0x0, 0x0, 0xfffd, 0x7}}}, @common=@ipv6header={{0x28, 'ipv6header\x00'}, {0x0, 0x81}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}, {{@uncond, 0x0, 0xa8, 0xe8}, @common=@inet=@LOG={0x40, 'LOG\x00', 0x0, {0x0, 0x0, "59e2b655a7928de9d18f6f4ce2fcb46e2fbbb084e62170a6b5ab23bc6a36"}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x368) 03:49:54 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000c80)=@raw={'raw\x00', 0x3c1, 0x3, 0x308, 0x0, 0x150, 0x150, 0x0, 0x3, 0x238, 0x238, 0x238, 0x23d, 0x238, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x3], 0x0, 0x128, 0x150, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'dummy0\x00', {0x0, 0x0, 0x3, 0x0, 0x0, 0xfffd, 0x7}}}, @common=@ipv6header={{0x28, 'ipv6header\x00'}, {0x0, 0x81}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}, {{@uncond, 0x0, 0xa8, 0xe8}, @common=@inet=@LOG={0x40, 'LOG\x00', 0x0, {0x0, 0x0, "59e2b655a7928de9d18f6f4ce2fcb46e2fbbb084e62170a6b5ab23bc6a36"}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x368) 03:49:54 executing program 2: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="10000300c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000040)) 03:49:54 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000c80)=@raw={'raw\x00', 0x3c1, 0x3, 0x308, 0x0, 0x150, 0x150, 0x0, 0x3, 0x238, 0x238, 0x238, 0x308, 0x238, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x3], 0x0, 0x128, 0x150, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'dummy0\x00', {0x0, 0x0, 0x3, 0x0, 0x0, 0xfffd, 0x7}}}, @common=@ipv6header={{0x28, 'ipv6header\x00'}, {0x0, 0x81}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}, {{@uncond, 0x0, 0xa8, 0xe8}, @common=@inet=@LOG={0x40, 'LOG\x00', 0x0, {0x0, 0x0, "59e2b655a7928de9d18f6f4ce2fcb46e2fbbb084e62170a6b5ab23bc6a36"}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x368) [ 747.437401] erofs: read_super, device -> /dev/loop3 [ 747.443853] erofs: read_super, device -> /dev/loop2 [ 747.444281] erofs: read_super, device -> /dev/loop4 [ 747.448889] erofs: options -> [ 747.451556] erofs: root inode @ nid 36 [ 747.473722] erofs: read_super, device -> /dev/loop0 [ 747.496035] erofs: options -> fault_injection=0x0000000000000000,noacl, [ 747.520398] erofs: options -> [ 747.528452] erofs: mounted on /dev/loop2 with opts: . [ 747.534288] erofs: root inode @ nid 36 [ 747.538427] erofs: FAULT_INJECTION was not selected 03:49:55 executing program 0: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="1000effdc041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000040)) [ 747.544725] erofs: options -> [ 747.553872] erofs: mounted on /dev/loop0 with opts: . [ 747.559672] erofs: root inode @ nid 36 [ 747.563790] erofs: cannot find valid erofs superblock [ 747.570615] erofs: mounted on /dev/loop3 with opts: fault_injection=0x0000000000000000. [ 747.603204] erofs: unmounted for /dev/loop0 [ 747.634072] erofs: unmounted for /dev/loop2 [ 747.713080] erofs: read_super, device -> /dev/loop0 [ 747.718101] erofs: options -> [ 747.721589] erofs: read_super, device -> /dev/loop4 [ 747.726611] erofs: options -> [ 747.755246] erofs: cannot find valid erofs superblock [ 747.761283] erofs: root inode @ nid 36 [ 747.761515] erofs: unmounted for /dev/loop3 [ 747.765247] erofs: mounted on /dev/loop0 with opts: . 03:49:55 executing program 5: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f00000000c0)=[{&(0x7f0000000180)="77690addcfbe1fbb66ec", 0xff3b}], 0x1, 0x1) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) bind$x25(r0, &(0x7f0000000600)={0x9, @remote={[], 0x1}}, 0x12) sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000180)={0x54, 0x2, 0x6, 0x801, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0xd, 0x3, 'list:set\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_TIMEOUT={0x8, 0x6, 0x1, 0x0, 0x8241}]}]}, 0x54}}, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$SIOCGETNODEID(r4, 0x89e1, &(0x7f0000000640)={0x1}) splice(r0, 0x0, r2, 0x0, 0x100000000, 0x0) sendmsg$TIPC_NL_BEARER_SET(r4, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000100)={&(0x7f00000006c0)=ANY=[@ANYBLOB="d0030000", @ANYRES16=0x0, @ANYBLOB="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"], 0x3d0}, 0x1, 0x0, 0x0, 0x40005}, 0x40000) 03:49:55 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000c80)=@raw={'raw\x00', 0x3c1, 0x3, 0x308, 0x0, 0x150, 0x150, 0x0, 0x3, 0x238, 0x238, 0x238, 0x2000, 0x238, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x3], 0x0, 0x128, 0x150, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'dummy0\x00', {0x0, 0x0, 0x3, 0x0, 0x0, 0xfffd, 0x7}}}, @common=@ipv6header={{0x28, 'ipv6header\x00'}, {0x0, 0x81}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}, {{@uncond, 0x0, 0xa8, 0xe8}, @common=@inet=@LOG={0x40, 'LOG\x00', 0x0, {0x0, 0x0, "59e2b655a7928de9d18f6f4ce2fcb46e2fbbb084e62170a6b5ab23bc6a36"}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x368) 03:49:55 executing program 3: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x5000000, 0x1000}], 0x0, &(0x7f0000000040)={[{@fault_injection={'fault_injection'}}, {@noacl='noacl'}]}) 03:49:55 executing program 2: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="10000300c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000040)) 03:49:55 executing program 4: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e08a3f10cf010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="02000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000040)) 03:49:55 executing program 0: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="10000002c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000040)) [ 747.947878] erofs: unmounted for /dev/loop0 [ 748.036742] erofs: read_super, device -> /dev/loop3 [ 748.038751] erofs: read_super, device -> /dev/loop2 [ 748.050829] erofs: options -> [ 748.060045] erofs: root inode @ nid 36 [ 748.064482] erofs: options -> fault_injection=0x0000000000000000,noacl, [ 748.071296] erofs: read_super, device -> /dev/loop4 [ 748.076820] erofs: mounted on /dev/loop2 with opts: . [ 748.082444] erofs: read_super, device -> /dev/loop0 [ 748.089415] erofs: options -> [ 748.103480] erofs: FAULT_INJECTION was not selected [ 748.105244] erofs: root inode @ nid 36 [ 748.111391] erofs: options -> [ 748.126581] erofs: root inode @ nid 36 03:49:55 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000c80)=@raw={'raw\x00', 0x3c1, 0x3, 0x308, 0x0, 0x150, 0x150, 0x0, 0x3, 0x238, 0x238, 0x238, 0x238, 0x150, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x3], 0x0, 0x128, 0x150, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'dummy0\x00', {0x0, 0x0, 0x3, 0x0, 0x0, 0xfffd, 0x7}}}, @common=@ipv6header={{0x28, 'ipv6header\x00'}, {0x0, 0x81}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}, {{@uncond, 0x0, 0xa8, 0xe8}, @common=@inet=@LOG={0x40, 'LOG\x00', 0x0, {0x0, 0x0, "59e2b655a7928de9d18f6f4ce2fcb46e2fbbb084e62170a6b5ab23bc6a36"}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x368) [ 748.136022] erofs: root inode @ nid 36 [ 748.147743] erofs: mounted on /dev/loop4 with opts: . [ 748.153311] erofs: mounted on /dev/loop0 with opts: . [ 748.154173] erofs: mounted on /dev/loop3 with opts: fault_injection=0x0000000000000000. 03:49:55 executing program 2: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="10000300c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000040)) 03:49:55 executing program 4: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e08a3f22cf010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="02000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000040)) 03:49:55 executing program 0: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="10000003c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000040)) 03:49:55 executing program 3: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x6000000, 0x1000}], 0x0, &(0x7f0000000040)={[{@fault_injection={'fault_injection'}}, {@noacl='noacl'}]}) 03:49:55 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000c80)=@raw={'raw\x00', 0x3c1, 0x3, 0x308, 0x0, 0x150, 0x150, 0x0, 0x3, 0x238, 0x238, 0x238, 0x238, 0x23d, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x3], 0x0, 0x128, 0x150, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'dummy0\x00', {0x0, 0x0, 0x3, 0x0, 0x0, 0xfffd, 0x7}}}, @common=@ipv6header={{0x28, 'ipv6header\x00'}, {0x0, 0x81}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}, {{@uncond, 0x0, 0xa8, 0xe8}, @common=@inet=@LOG={0x40, 'LOG\x00', 0x0, {0x0, 0x0, "59e2b655a7928de9d18f6f4ce2fcb46e2fbbb084e62170a6b5ab23bc6a36"}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x368) [ 748.232236] erofs: unmounted for /dev/loop2 [ 748.249207] erofs: unmounted for /dev/loop4 [ 748.260663] erofs: unmounted for /dev/loop0 [ 748.265153] erofs: unmounted for /dev/loop3 [ 748.363851] erofs: read_super, device -> /dev/loop2 03:49:55 executing program 5: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f00000000c0)=[{&(0x7f0000000300)="774e0addcfbe1fbb66ec", 0xa}], 0x1, 0x1) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000180)={0x54, 0x2, 0x6, 0x801, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0xd, 0x3, 'list:set\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_TIMEOUT={0x8, 0x6, 0x1, 0x0, 0x8241}]}]}, 0x54}}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) splice(r0, 0x0, r2, 0x0, 0x100000000, 0x0) sendmsg$TIPC_CMD_GET_BEARER_NAMES(r0, &(0x7f00000002c0)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)={0x1c, 0x0, 0x200, 0x70bd29, 0x25dfdbfb, {}, ["", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4008040}, 0x0) ioctl$DRM_IOCTL_MODE_GETPLANERESOURCES(r0, 0xc01064b5, &(0x7f0000000100)={&(0x7f0000000040)=[0x0, 0x0, 0x0], 0x3}) 03:49:55 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000c80)=@raw={'raw\x00', 0x3c1, 0x3, 0x308, 0x0, 0x150, 0x150, 0x0, 0x3, 0x238, 0x238, 0x238, 0x238, 0x308, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x3], 0x0, 0x128, 0x150, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'dummy0\x00', {0x0, 0x0, 0x3, 0x0, 0x0, 0xfffd, 0x7}}}, @common=@ipv6header={{0x28, 'ipv6header\x00'}, {0x0, 0x81}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}, {{@uncond, 0x0, 0xa8, 0xe8}, @common=@inet=@LOG={0x40, 'LOG\x00', 0x0, {0x0, 0x0, "59e2b655a7928de9d18f6f4ce2fcb46e2fbbb084e62170a6b5ab23bc6a36"}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x368) [ 748.386796] erofs: read_super, device -> /dev/loop4 [ 748.395633] erofs: options -> [ 748.403806] erofs: root inode @ nid 36 [ 748.408002] erofs: options -> [ 748.413056] erofs: mounted on /dev/loop2 with opts: . [ 748.418724] erofs: root inode @ nid 36 [ 748.425114] erofs: mounted on /dev/loop4 with opts: . 03:49:55 executing program 4: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e08a3f2acf010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="02000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000040)) 03:49:56 executing program 2: syz_mount_image$erofs(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="10000300c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000040)) [ 748.463632] erofs: unmounted for /dev/loop4 03:49:56 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000c80)=@raw={'raw\x00', 0x3c1, 0x3, 0x308, 0x0, 0x150, 0x150, 0x0, 0x3, 0x238, 0x238, 0x238, 0x238, 0x2000, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x3], 0x0, 0x128, 0x150, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'dummy0\x00', {0x0, 0x0, 0x3, 0x0, 0x0, 0xfffd, 0x7}}}, @common=@ipv6header={{0x28, 'ipv6header\x00'}, {0x0, 0x81}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}, {{@uncond, 0x0, 0xa8, 0xe8}, @common=@inet=@LOG={0x40, 'LOG\x00', 0x0, {0x0, 0x0, "59e2b655a7928de9d18f6f4ce2fcb46e2fbbb084e62170a6b5ab23bc6a36"}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x368) [ 748.487459] erofs: unmounted for /dev/loop2 [ 748.510525] erofs: read_super, device -> /dev/loop3 [ 748.516329] erofs: options -> fault_injection=0x0000000000000000,noacl, [ 748.530612] erofs: FAULT_INJECTION was not selected [ 748.535759] erofs: root inode @ nid 36 [ 748.541150] erofs: mounted on /dev/loop3 with opts: fault_injection=0x0000000000000000. [ 748.566975] erofs: read_super, device -> /dev/loop0 [ 748.595667] erofs: options -> 03:49:56 executing program 3: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x7000000, 0x1000}], 0x0, &(0x7f0000000040)={[{@fault_injection={'fault_injection'}}, {@noacl='noacl'}]}) 03:49:56 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000c80)=@raw={'raw\x00', 0x3c1, 0x3, 0x308, 0x0, 0x150, 0x150, 0x0, 0x3, 0x238, 0x238, 0x238, 0x238, 0x238, 0x2, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x3], 0x0, 0x128, 0x150, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'dummy0\x00', {0x0, 0x0, 0x3, 0x0, 0x0, 0xfffd, 0x7}}}, @common=@ipv6header={{0x28, 'ipv6header\x00'}, {0x0, 0x81}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}, {{@uncond, 0x0, 0xa8, 0xe8}, @common=@inet=@LOG={0x40, 'LOG\x00', 0x0, {0x0, 0x0, "59e2b655a7928de9d18f6f4ce2fcb46e2fbbb084e62170a6b5ab23bc6a36"}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x368) 03:49:56 executing program 5: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f00000000c0)=[{&(0x7f0000000180)="77690addcfbe1fbb66ec", 0xff3b}], 0x1, 0x1) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$vim2m_VIDIOC_STREAMON(r1, 0x40045612, &(0x7f0000000100)=0x1) sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000180)={0x54, 0x2, 0x6, 0x801, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0xd, 0x3, 'list:set\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_TIMEOUT={0x8, 0x6, 0x1, 0x0, 0x8241}]}]}, 0x54}}, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$BTRFS_IOC_SET_FEATURES(r3, 0x40309439, &(0x7f0000000040)={0x2, 0x3, 0x1b}) splice(r0, 0x0, r2, 0x0, 0x100000000, 0x0) [ 748.616709] erofs: root inode @ nid 36 [ 748.632476] erofs: unmounted for /dev/loop3 [ 748.636656] erofs: mounted on /dev/loop0 with opts: . 03:49:56 executing program 0: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="10000004c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000040)) [ 748.671247] erofs: read_super, device -> /dev/loop4 [ 748.679409] erofs: options -> [ 748.684071] erofs: root inode @ nid 36 [ 748.690443] erofs: mounted on /dev/loop4 with opts: . 03:49:56 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000c80)=@raw={'raw\x00', 0x3c1, 0x3, 0x308, 0x0, 0x150, 0x150, 0x0, 0x3, 0x238, 0x238, 0x238, 0x238, 0x238, 0x5, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x3], 0x0, 0x128, 0x150, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'dummy0\x00', {0x0, 0x0, 0x3, 0x0, 0x0, 0xfffd, 0x7}}}, @common=@ipv6header={{0x28, 'ipv6header\x00'}, {0x0, 0x81}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}, {{@uncond, 0x0, 0xa8, 0xe8}, @common=@inet=@LOG={0x40, 'LOG\x00', 0x0, {0x0, 0x0, "59e2b655a7928de9d18f6f4ce2fcb46e2fbbb084e62170a6b5ab23bc6a36"}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x368) [ 748.715731] erofs: unmounted for /dev/loop0 03:49:56 executing program 2: syz_mount_image$erofs(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="10000300c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000040)) 03:49:56 executing program 4: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e08a3f37cf010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="02000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000040)) [ 748.756335] erofs: read_super, device -> /dev/loop3 [ 748.763616] erofs: options -> fault_injection=0x0000000000000000,noacl, [ 748.773696] erofs: FAULT_INJECTION was not selected [ 748.783195] erofs: root inode @ nid 36 [ 748.792839] erofs: mounted on /dev/loop3 with opts: fault_injection=0x0000000000000000. 03:49:56 executing program 3: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x8000000, 0x1000}], 0x0, &(0x7f0000000040)={[{@fault_injection={'fault_injection'}}, {@noacl='noacl'}]}) 03:49:56 executing program 5: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f00000000c0), 0x0, 0x1) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000240)={0xac, 0x2, 0x6, 0x801, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0xd, 0x3, 'list:set\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_TIMEOUT={0x8, 0x6, 0x1, 0x0, 0x8241}]}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xb}, @IPSET_ATTR_DATA={0x2c, 0x7, 0x0, 0x1, [@IPSET_ATTR_LINENO={0x8, 0x9, 0x1, 0x0, 0x100}, @IPSET_ATTR_HASHSIZE={0x8, 0x12, 0x1, 0x0, 0xa494}, @IPSET_ATTR_MAXELEM={0x8, 0x13, 0x1, 0x0, 0x4311}, @IPSET_ATTR_MAXELEM={0x8, 0x13, 0x1, 0x0, 0x7}, @IPSET_ATTR_MARK={0x8, 0xa, 0x1, 0x0, 0xa9}]}, @IPSET_ATTR_TYPENAME={0x10, 0x3, 'hash:ip,mac\x00'}, @IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:ip,port\x00'}]}, 0xac}}, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) splice(r0, 0x0, r2, 0x0, 0x100000000, 0x0) r5 = socket$inet_udplite(0x2, 0x2, 0x88) r6 = dup(r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) r7 = socket$inet_udplite(0x2, 0x2, 0x88) r8 = dup(r7) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) sendmsg$AUDIT_LIST_RULES(r8, &(0x7f0000000200)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x10, 0x3f5, 0x2, 0x70bd29, 0x25dfdbfb, "", ["", "", "", ""]}, 0x10}, 0x1, 0x0, 0x0, 0x80}, 0x0) [ 748.832152] erofs: unmounted for /dev/loop4 [ 748.836790] erofs: unmounted for /dev/loop3 03:49:56 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000c80)=@raw={'raw\x00', 0x3c1, 0x3, 0x308, 0x0, 0x150, 0x150, 0x0, 0x3, 0x238, 0x238, 0x238, 0x238, 0x238, 0x11, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x3], 0x0, 0x128, 0x150, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'dummy0\x00', {0x0, 0x0, 0x3, 0x0, 0x0, 0xfffd, 0x7}}}, @common=@ipv6header={{0x28, 'ipv6header\x00'}, {0x0, 0x81}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}, {{@uncond, 0x0, 0xa8, 0xe8}, @common=@inet=@LOG={0x40, 'LOG\x00', 0x0, {0x0, 0x0, "59e2b655a7928de9d18f6f4ce2fcb46e2fbbb084e62170a6b5ab23bc6a36"}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x368) 03:49:56 executing program 2: syz_mount_image$erofs(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="10000300c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000040)) [ 748.891616] erofs: read_super, device -> /dev/loop0 [ 748.896913] erofs: options -> [ 748.913668] erofs: root inode @ nid 36 [ 748.919495] erofs: mounted on /dev/loop0 with opts: . 03:49:56 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000c80)=@raw={'raw\x00', 0x3c1, 0x3, 0x308, 0x0, 0x150, 0x150, 0x0, 0x3, 0x238, 0x238, 0x238, 0x238, 0x238, 0x2000, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x3], 0x0, 0x128, 0x150, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'dummy0\x00', {0x0, 0x0, 0x3, 0x0, 0x0, 0xfffd, 0x7}}}, @common=@ipv6header={{0x28, 'ipv6header\x00'}, {0x0, 0x81}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}, {{@uncond, 0x0, 0xa8, 0xe8}, @common=@inet=@LOG={0x40, 'LOG\x00', 0x0, {0x0, 0x0, "59e2b655a7928de9d18f6f4ce2fcb46e2fbbb084e62170a6b5ab23bc6a36"}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x368) 03:49:56 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000c80)=@raw={'raw\x00', 0x3c1, 0x3, 0x308, 0x0, 0x150, 0x150, 0x0, 0x3, 0x238, 0x238, 0x238, 0x238, 0x238, 0x7fffffe, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x3], 0x0, 0x128, 0x150, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'dummy0\x00', {0x0, 0x0, 0x3, 0x0, 0x0, 0xfffd, 0x7}}}, @common=@ipv6header={{0x28, 'ipv6header\x00'}, {0x0, 0x81}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}, {{@uncond, 0x0, 0xa8, 0xe8}, @common=@inet=@LOG={0x40, 'LOG\x00', 0x0, {0x0, 0x0, "59e2b655a7928de9d18f6f4ce2fcb46e2fbbb084e62170a6b5ab23bc6a36"}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x368) [ 749.052230] erofs: read_super, device -> /dev/loop4 [ 749.065153] erofs: read_super, device -> /dev/loop3 [ 749.070372] erofs: options -> [ 749.075823] erofs: root inode @ nid 36 [ 749.081986] erofs: options -> fault_injection=0x0000000000000000,noacl, [ 749.092176] erofs: mounted on /dev/loop4 with opts: . 03:49:56 executing program 0: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="10000008c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000040)) 03:49:56 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000c80)=@raw={'raw\x00', 0x3c1, 0x3, 0x308, 0x0, 0x150, 0x150, 0x0, 0x3, 0x238, 0x238, 0x238, 0x238, 0x238, 0x8000000, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x3], 0x0, 0x128, 0x150, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'dummy0\x00', {0x0, 0x0, 0x3, 0x0, 0x0, 0xfffd, 0x7}}}, @common=@ipv6header={{0x28, 'ipv6header\x00'}, {0x0, 0x81}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}, {{@uncond, 0x0, 0xa8, 0xe8}, @common=@inet=@LOG={0x40, 'LOG\x00', 0x0, {0x0, 0x0, "59e2b655a7928de9d18f6f4ce2fcb46e2fbbb084e62170a6b5ab23bc6a36"}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x368) [ 749.107474] erofs: FAULT_INJECTION was not selected [ 749.115871] erofs: unmounted for /dev/loop0 [ 749.123819] erofs: root inode @ nid 36 [ 749.131914] erofs: mounted on /dev/loop3 with opts: fault_injection=0x0000000000000000. 03:49:56 executing program 4: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e08a3f39cf010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="02000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000040)) 03:49:56 executing program 3: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x9000000, 0x1000}], 0x0, &(0x7f0000000040)={[{@fault_injection={'fault_injection'}}, {@noacl='noacl'}]}) 03:49:56 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000c80)=@raw={'raw\x00', 0x3c1, 0x3, 0x308, 0x0, 0x150, 0x150, 0x0, 0x3, 0x238, 0x238, 0x238, 0x238, 0x238, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x3], 0x0, 0x128, 0x150, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'dummy0\x00', {0x0, 0x0, 0x3, 0x0, 0x0, 0xfffd, 0x7}}}, @common=@ipv6header={{0x28, 'ipv6header\x00'}, {0x0, 0x81}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}, {{@uncond, 0x0, 0xa8, 0xe8}, @common=@inet=@LOG={0x40, 'LOG\x00', 0x0, {0x0, 0x0, "59e2b655a7928de9d18f6f4ce2fcb46e2fbbb084e62170a6b5ab23bc6a36"}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x368) 03:49:56 executing program 2: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', 0x0, 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="10000300c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000040)) 03:49:56 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000c80)=@raw={'raw\x00', 0x3c1, 0x3, 0x308, 0x0, 0x150, 0x150, 0x0, 0x3, 0x238, 0x238, 0x238, 0x238, 0x238, 0x3, 0x0, {[{{@uncond=[0x2, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x3], 0x0, 0x128, 0x150, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'dummy0\x00', {0x0, 0x0, 0x3, 0x0, 0x0, 0xfffd, 0x7}}}, @common=@ipv6header={{0x28, 'ipv6header\x00'}, {0x0, 0x81}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}, {{@uncond, 0x0, 0xa8, 0xe8}, @common=@inet=@LOG={0x40, 'LOG\x00', 0x0, {0x0, 0x0, "59e2b655a7928de9d18f6f4ce2fcb46e2fbbb084e62170a6b5ab23bc6a36"}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x368) [ 749.223188] erofs: unmounted for /dev/loop4 [ 749.229364] erofs: unmounted for /dev/loop3 [ 749.236670] erofs: read_super, device -> /dev/loop0 [ 749.245297] erofs: options -> [ 749.256700] erofs: root inode @ nid 36 [ 749.262876] erofs: mounted on /dev/loop0 with opts: . [ 749.354695] erofs: unmounted for /dev/loop0 [ 749.464351] erofs: read_super, device -> /dev/loop4 [ 749.469373] erofs: read_super, device -> /dev/loop3 [ 749.475230] erofs: options -> fault_injection=0x0000000000000000,noacl, [ 749.479077] erofs: options -> [ 749.487275] erofs: cannot read erofs superblock [ 749.487378] erofs: root inode @ nid 36 [ 749.497135] erofs: mounted on /dev/loop4 with opts: . [ 749.535991] erofs: read_super, device -> /dev/loop3 [ 749.551024] erofs: unmounted for /dev/loop4 [ 749.566974] erofs: options -> fault_injection=0x0000000000000000,noacl, [ 749.574426] erofs: cannot read erofs superblock 03:49:57 executing program 0: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="10000000c041", 0x7, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000040)) 03:49:57 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000c80)=@raw={'raw\x00', 0x3c1, 0x3, 0x308, 0x0, 0x150, 0x150, 0x0, 0x3, 0x238, 0x238, 0x238, 0x238, 0x238, 0x3, 0x0, {[{{@uncond=[0x3, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x3], 0x0, 0x128, 0x150, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'dummy0\x00', {0x0, 0x0, 0x3, 0x0, 0x0, 0xfffd, 0x7}}}, @common=@ipv6header={{0x28, 'ipv6header\x00'}, {0x0, 0x81}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}, {{@uncond, 0x0, 0xa8, 0xe8}, @common=@inet=@LOG={0x40, 'LOG\x00', 0x0, {0x0, 0x0, "59e2b655a7928de9d18f6f4ce2fcb46e2fbbb084e62170a6b5ab23bc6a36"}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x368) 03:49:57 executing program 5: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f00000000c0)=[{&(0x7f0000000180)="77690addcfbe1fbb66ec", 0xff3b}], 0x1, 0x1) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000180)={0x54, 0x2, 0x6, 0x801, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0xd, 0x3, 'list:set\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_TIMEOUT={0x8, 0x6, 0x1, 0x0, 0x8241}]}]}, 0x54}}, 0x0) ioctl$sock_ipv6_tunnel_SIOCADD6RD(r0, 0x89f9, &(0x7f0000000440)={'ip6tnl0\x00', &(0x7f00000003c0)={'ip6gre0\x00', 0x0, 0x29, 0x1, 0x81, 0x262183e3, 0x4, @mcast2, @empty, 0x40, 0x700, 0x2, 0x4}}) sendmsg$TCPDIAG_GETSOCK(r0, &(0x7f0000001b00)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x30004100}, 0xc, &(0x7f0000001ac0)={&(0x7f0000000480)={0x1628, 0x12, 0x200, 0x70bd28, 0x25dfdbff, {0x15, 0x6, 0x5, 0x2e, {0x4e23, 0x4e21, [0x5, 0x200, 0x3ff, 0x6], [0x81, 0x42e, 0x5, 0x5], r3, [0x28, 0x6f]}, 0x10, 0x2}, [@INET_DIAG_REQ_BYTECODE={0x98, 0x1, "f11c9bcaac06ece7130181fd9a30390f048e947f751ebb4b3fc5793e559efc7e961653fab35bbe18f1131667aaf487cbc08ba4492043d8f07f91f984109eb97f4c1b0c32d28eba28a7d9beca89b490cf657ecb3a081ca3e15f4033a8b6f412fa9db77580162d2b8cd436ce44f9277c594b2bd994ea028a942e01c3008b6a31af1692e330193efba4d95c914ea22c435f995e0888"}, @INET_DIAG_REQ_BYTECODE={0xcc, 0x1, "05995f10ae1db60270b53645079571c80c6f7115f03144364a9237145e0a2e1cee61948f2ec0becd04ac3aaf2aa3b63b015fc7038a130cf70ea59ee1505ea0892a817bdec39186e8d388ac739afaccd2b999785821d2df875a7612f33986a7dfdc5830979d2a2db2fd88d58f63ed67eaae6bf539d058026100fb1cbaba20a3ef5252e6a0eb1f09eb04243521752b7ad55c96c8395906bf58548c6b7fb87672f0e14847c946e87b789e61e5156cf6019296387f703d2ea68b4945117f6ff48b84abb960f7f063e492"}, @INET_DIAG_REQ_BYTECODE={0x1004, 0x1, "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"}, @INET_DIAG_REQ_BYTECODE={0x59, 0x1, "7a285ed62588c8e16c533cf70e524c0dcf490476767e279f36d02b85aeb3859646ec2dd8bcab3765a0f2918e4898f66d8942bca7df67332d7565e22dc6803778f32c02ea64e598864361aa14c4aa56eb4cb8f501ef"}, @INET_DIAG_REQ_BYTECODE={0xe0, 0x1, "1aaf3365afb42b2bcda8bb5afdabfad274b057317d287ac6f1561d6ed3f73daaa826cfc54dba11e710e067d19a60e9fa06308c518ddc3bfe86890a762e43511982e5e588d499a8160760e450eb1f56945b24b413c5324ce3f7a71aa760e3fdce721b1cb287f71f9d23a6324607e3089eb3e338c86496f355ef8717bb386a76dbbbc47411fc86f439b45abccfa0d2ad9c8af74b99d15eedfa01e875c9e08fae437605c06200c440821321874500ee6baf9ccc03fd6c215afd4ba8f6f302d354d248a71e9b8d806dda788c57bde76e282b37909e98f1fd3f5851c4f18b"}, @INET_DIAG_REQ_BYTECODE={0xd7, 0x1, "6aa0a8aa4e595b78d4b4e445a31e96a055502087287e8c19f231805718a37bd6c0dc7686ade325c150a6751bc58b643d290b1d490350c66c240be15e5e0902c40066ca17c56572fc740a5481718b6e3f0f792b5afe31e5a49fa21ca3a72681785cbaa2f70f481ec62f42bdb1d313cc5ed696f24bab4a5f99ec8b1087a69e4553e1ea5acb65a26573ffeab9e3495816ab479af7fa0dd99da578f2fb735059ce7f2fd628250bfb5ffcc3f733ded946f0ae9eed5aa4d3992cd7e0e8c4d361de9c9348a3502f6718f5c2ad61bd1b47977ffa15e574"}, @INET_DIAG_REQ_BYTECODE={0x9f, 0x1, "5eb4313e3dca6a26560d5e8f7190636467f58cae665b6750fba78f269c34ebc9c3c6cc90b00dd3d823e39370c4920d54777e6af89273f902fc588d14d5659ccfc0d99ef4911c70dfaaca49e6fea315e2d39dd39310b1ce23ceacc08a245aa4e9f0dd45464a3a17c2bf520a77db0d72a48aabd4efed519aba6ef00cd36c45d930a280b9639f51ef77886d575de896cb3d26e57e4ebcea2cce48065b"}, @INET_DIAG_REQ_BYTECODE={0xb6, 0x1, "893b8dedc300c4854a1d7778f21bf4ea370a591b4f9c855f12d59156f883e2d2e1f78df17ee670945408e21eba04761353e46d57895ad1bdb2642392856a72f13b85f85b2bd537738703badaf91127cb071a67bc0351a60ed59c125fbf0f6a0d44bbeab9b29bac9ddc9340c82f57d2a241bdd0f12003328bec00b47ff9a71f9dd16c67692acf794c829bc9dbf7f1ba699674691aa8596caa82d18e72ad07d734062dad6f97335b02c1981027f7ece1d0af44"}, @INET_DIAG_REQ_BYTECODE={0x50, 0x1, "cb254632a69a08e5a6f2a6dcb8d06ab14e199a02b0b162d15e06717ddbd8afb3bd9162c8a0fefee90f520d83c0bc3b63183e662fe5198d15e823d8fa3fa63f971095d6ea0288fdbd7dfe21c9"}, @INET_DIAG_REQ_BYTECODE={0xb8, 0x1, "3f12d288f27dcd4fc6f12aec0ce2ce4d6e3ee41726d54896145cdf50034f76d73a04536d8d36535383fc318e5f9bef533ac8c359a693b6fa0aefcfe61574b4c2ad4159b4ad2fa30e98c5ba016c29bf324e1a74e69d3852aeb9ad10e53b01d93a3e77d2bef923f08e130065fa35a498ea6ddd6ea74acd1692169e714fda5bb0f8fc137bbc9f537baab25718c9bdd3f15535f6b2d8d97e3cf75305aef0fcbdd9eae983345a6994504dc42c69ad19d0a5652134b392"}]}, 0x1628}}, 0x4c080) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) name_to_handle_at(r5, &(0x7f0000001b80)='./file0\x00', &(0x7f0000001bc0)={0x71, 0x0, "460b8cf94673226d3f04bb1327f7de0e7b233a6191685d19fa63335718a8162d2192631998068c9dc9c348a0fa718d77a4413f210c09e37df8f15e4e25afe24396dd081ac4449f328c97034a7a31fc26546f4be99a57599911c7c8bbd9ca88f56be41e993198fd044c"}, &(0x7f0000001c40), 0x400) r6 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r6, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000300)=ANY=[@ANYBLOB="300000004a00010000000000000000000a008000", @ANYRES32=0x0, @ANYBLOB="00000014e9000000000000000000000000ffffe000000100"], 0x30}}, 0x0) pwritev(r6, &(0x7f0000000040)=[{&(0x7f0000000200)="b4ab5b6f2a780a33b3341d48a7b153d8be20dc6c46021c44cc6416696e62a38d125ab31fb20b2939776c367785b1bb42b0bd8a88d6e92abdac1ae09efe1602a0cf9a0b90cce118af46979ea48334b911cb15a39a1ef92fbdcab861518b70a445435a61f3ded2b9c6d49cdbc875a73b1cdc6877f86442bfab4d99be5f332364e495438b92adfde1c02b4bbe57ea7e6fe7aaebd110964c1d77b573de826dc020c8ec110c78cf866e2b6e00931aac1813d9d3d70e53bde6b71a7c74a0e7fc4f9104cf", 0xc1}, {&(0x7f0000000300)="f2b35c81480e353dce13aadfa3b437e34a77145206c947a48f5972dac2be28c9a72ccb8c6cf9386e6fe35f520db433bcdb51d0e806bae5f9e7758fb5ac56702e95961c8ae3ba0940c23e3971cb5db85affce31e01e5160b0b813bc9cf4281e1012043ffa609f75263f2e38deade13962dcd1fa956e3bd3142c1e09a53d511e9a19e3c27fa61ace992df2a6", 0x8b}], 0x2, 0x7fdc8ca1, 0x3) splice(r0, 0x0, r2, 0x0, 0x100000000, 0x0) r7 = socket$inet_udplite(0x2, 0x2, 0x88) r8 = dup(r7) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) setsockopt$CAN_RAW_FD_FRAMES(r1, 0x65, 0x5, &(0x7f0000001c80)=0x1, 0x4) 03:49:57 executing program 2: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', 0x0, 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="10000300c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000040)) 03:49:57 executing program 4: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf020000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="02000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000040)) 03:49:57 executing program 3: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x10000000, 0x1000}], 0x0, &(0x7f0000000040)={[{@fault_injection={'fault_injection'}}, {@noacl='noacl'}]}) 03:49:57 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000c80)=@raw={'raw\x00', 0x3c1, 0x3, 0x308, 0x0, 0x150, 0x150, 0x0, 0x3, 0x238, 0x238, 0x238, 0x238, 0x238, 0x3, 0x0, {[{{@uncond=[0x4, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x3], 0x0, 0x128, 0x150, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'dummy0\x00', {0x0, 0x0, 0x3, 0x0, 0x0, 0xfffd, 0x7}}}, @common=@ipv6header={{0x28, 'ipv6header\x00'}, {0x0, 0x81}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}, {{@uncond, 0x0, 0xa8, 0xe8}, @common=@inet=@LOG={0x40, 'LOG\x00', 0x0, {0x0, 0x0, "59e2b655a7928de9d18f6f4ce2fcb46e2fbbb084e62170a6b5ab23bc6a36"}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x368) [ 749.894599] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.5'. [ 749.926002] erofs: read_super, device -> /dev/loop0 [ 749.927736] erofs: read_super, device -> /dev/loop4 [ 749.937355] erofs: read_super, device -> /dev/loop3 03:49:57 executing program 2: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', 0x0, 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="10000300c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000040)) [ 749.949249] erofs: options -> [ 749.954511] erofs: root inode @ nid 36 [ 749.957837] erofs: options -> [ 749.959946] erofs: options -> fault_injection=0x0000000000000000,noacl, [ 749.973041] erofs: root inode @ nid 36 [ 749.980701] erofs: mounted on /dev/loop0 with opts: . [ 749.981103] erofs: cannot read erofs superblock [ 749.986098] erofs: mounted on /dev/loop4 with opts: . 03:49:57 executing program 0: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="10000000c041", 0x486, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000040)) 03:49:57 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000c80)=@raw={'raw\x00', 0x3c1, 0x3, 0x308, 0x0, 0x150, 0x150, 0x0, 0x3, 0x238, 0x238, 0x238, 0x238, 0x238, 0x3, 0x0, {[{{@uncond=[0x7, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x3], 0x0, 0x128, 0x150, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'dummy0\x00', {0x0, 0x0, 0x3, 0x0, 0x0, 0xfffd, 0x7}}}, @common=@ipv6header={{0x28, 'ipv6header\x00'}, {0x0, 0x81}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}, {{@uncond, 0x0, 0xa8, 0xe8}, @common=@inet=@LOG={0x40, 'LOG\x00', 0x0, {0x0, 0x0, "59e2b655a7928de9d18f6f4ce2fcb46e2fbbb084e62170a6b5ab23bc6a36"}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x368) [ 750.054834] erofs: unmounted for /dev/loop0 03:49:57 executing program 4: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf030000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="02000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000040)) [ 750.080613] erofs: unmounted for /dev/loop4 03:49:57 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$inet6_dccp_buf(r2, 0x21, 0xe, &(0x7f0000000600)=""/247, &(0x7f0000000700)=0xf7) vmsplice(r3, &(0x7f00000000c0)=[{&(0x7f0000000180)="77690addcfbe1fbb66ec", 0xff3b}], 0x1, 0x1) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) timer_create(0x0, &(0x7f00000001c0)={0x0, 0x15}, &(0x7f0000000040)=0x0) clock_gettime(0x0, &(0x7f0000000340)={0x0, 0x0}) timer_settime(r5, 0x0, &(0x7f0000000140)={{0x0, 0x989680}, {r6, r7+10000000}}, 0x0) timer_gettime(r5, &(0x7f0000000040)) sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000380)=ANY=[@ANYBLOB="54000000020601080000000000000000000000000d0003006c69b2827c91752934f40000050004000000deff0800020073797a30000000050001000600000005000500000000000c0007804800064000008241a202e8d3a351874848dfb4e377105f03a9078aa19b6a26f49c6cfb008caf94c0fe0fb1ab6fa546de963feea4591a594bc17db30647fb8fd5479829d7a70dd9a5be4add6e0ab103e09aae317490611ffeffffff7ceb2665c82b60a2ab91b1bf21641f562dc0c9c0dea897e195e361fe1bb1438d2076cae5df00"], 0x54}}, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/net/pfkey\x00', 0x80080, 0x0) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, &(0x7f0000000200)=""/212) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) ioctl$TIOCSETD(r3, 0x5423, &(0x7f0000000300)=0x9) r9 = dup(r8) ioctl$PERF_EVENT_IOC_ENABLE(r9, 0x8912, 0x400200) splice(r2, 0x0, r4, 0x0, 0x100000000, 0x0) 03:49:57 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000c80)=@raw={'raw\x00', 0x3c1, 0x3, 0x308, 0x0, 0x150, 0x150, 0x0, 0x3, 0x238, 0x238, 0x238, 0x238, 0x238, 0x3, 0x0, {[{{@uncond=[0x8, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x3], 0x0, 0x128, 0x150, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'dummy0\x00', {0x0, 0x0, 0x3, 0x0, 0x0, 0xfffd, 0x7}}}, @common=@ipv6header={{0x28, 'ipv6header\x00'}, {0x0, 0x81}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}, {{@uncond, 0x0, 0xa8, 0xe8}, @common=@inet=@LOG={0x40, 'LOG\x00', 0x0, {0x0, 0x0, "59e2b655a7928de9d18f6f4ce2fcb46e2fbbb084e62170a6b5ab23bc6a36"}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x368) [ 750.179241] erofs: read_super, device -> /dev/loop3 [ 750.189464] erofs: options -> fault_injection=0x0000000000000000,noacl, [ 750.205769] erofs: cannot read erofs superblock 03:49:57 executing program 2: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)) 03:49:57 executing program 3: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x14000000, 0x1000}], 0x0, &(0x7f0000000040)={[{@fault_injection={'fault_injection'}}, {@noacl='noacl'}]}) 03:49:57 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000c80)=@raw={'raw\x00', 0x3c1, 0x3, 0x308, 0x0, 0x150, 0x150, 0x0, 0x3, 0x238, 0x238, 0x238, 0x238, 0x238, 0x3, 0x0, {[{{@uncond=[0x4a, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x3], 0x0, 0x128, 0x150, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'dummy0\x00', {0x0, 0x0, 0x3, 0x0, 0x0, 0xfffd, 0x7}}}, @common=@ipv6header={{0x28, 'ipv6header\x00'}, {0x0, 0x81}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}, {{@uncond, 0x0, 0xa8, 0xe8}, @common=@inet=@LOG={0x40, 'LOG\x00', 0x0, {0x0, 0x0, "59e2b655a7928de9d18f6f4ce2fcb46e2fbbb084e62170a6b5ab23bc6a36"}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x368) 03:49:57 executing program 5: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f00000000c0)=[{&(0x7f0000000180)="77690addcfbe1fbb66ec", 0xff3b}], 0x1, 0x1) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000180)={0x54, 0x2, 0x6, 0x801, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0xd, 0x3, 'list:set\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_TIMEOUT={0x8, 0x6, 0x1, 0x0, 0x8241}]}]}, 0x54}}, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) splice(r0, 0x0, r2, 0x0, 0x100000000, 0x0) [ 750.224828] erofs: read_super, device -> /dev/loop0 [ 750.236216] erofs: options -> [ 750.251081] erofs: root inode @ nid 36 [ 750.265471] erofs: mounted on /dev/loop0 with opts: . 03:49:57 executing program 0: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="10000000c041", 0xfdef, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000040)) [ 750.331648] erofs: read_super, device -> /dev/loop4 [ 750.340025] erofs: options -> [ 750.353083] erofs: unmounted for /dev/loop0 [ 750.356977] erofs: root inode @ nid 36 [ 750.375009] erofs: mounted on /dev/loop4 with opts: . 03:49:57 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000c80)=@raw={'raw\x00', 0x3c1, 0x3, 0x308, 0x0, 0x150, 0x150, 0x0, 0x3, 0x238, 0x238, 0x238, 0x238, 0x238, 0x3, 0x0, {[{{@uncond=[0x60, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x3], 0x0, 0x128, 0x150, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'dummy0\x00', {0x0, 0x0, 0x3, 0x0, 0x0, 0xfffd, 0x7}}}, @common=@ipv6header={{0x28, 'ipv6header\x00'}, {0x0, 0x81}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}, {{@uncond, 0x0, 0xa8, 0xe8}, @common=@inet=@LOG={0x40, 'LOG\x00', 0x0, {0x0, 0x0, "59e2b655a7928de9d18f6f4ce2fcb46e2fbbb084e62170a6b5ab23bc6a36"}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x368) 03:49:57 executing program 2: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)) [ 750.418711] erofs: read_super, device -> /dev/loop3 03:49:58 executing program 4: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf040000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="02000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000040)) [ 750.459632] erofs: options -> fault_injection=0x0000000000000000,noacl, [ 750.467404] erofs: cannot read erofs superblock [ 750.489179] erofs: read_super, device -> /dev/loop0 [ 750.494319] erofs: options -> 03:49:58 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000c80)=@raw={'raw\x00', 0x3c1, 0x3, 0x308, 0x0, 0x150, 0x150, 0x0, 0x3, 0x238, 0x238, 0x238, 0x238, 0x238, 0x3, 0x0, {[{{@uncond=[0x62, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x3], 0x0, 0x128, 0x150, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'dummy0\x00', {0x0, 0x0, 0x3, 0x0, 0x0, 0xfffd, 0x7}}}, @common=@ipv6header={{0x28, 'ipv6header\x00'}, {0x0, 0x81}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}, {{@uncond, 0x0, 0xa8, 0xe8}, @common=@inet=@LOG={0x40, 'LOG\x00', 0x0, {0x0, 0x0, "59e2b655a7928de9d18f6f4ce2fcb46e2fbbb084e62170a6b5ab23bc6a36"}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x368) 03:49:58 executing program 2: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)) 03:49:58 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000c80)=@raw={'raw\x00', 0x3c1, 0x3, 0x308, 0x0, 0x150, 0x150, 0x0, 0x3, 0x238, 0x238, 0x238, 0x238, 0x238, 0x3, 0x0, {[{{@uncond=[0x6a, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x3], 0x0, 0x128, 0x150, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'dummy0\x00', {0x0, 0x0, 0x3, 0x0, 0x0, 0xfffd, 0x7}}}, @common=@ipv6header={{0x28, 'ipv6header\x00'}, {0x0, 0x81}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}, {{@uncond, 0x0, 0xa8, 0xe8}, @common=@inet=@LOG={0x40, 'LOG\x00', 0x0, {0x0, 0x0, "59e2b655a7928de9d18f6f4ce2fcb46e2fbbb084e62170a6b5ab23bc6a36"}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x368) 03:49:58 executing program 2: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="10000300c041", 0x6, 0x480}], 0x0, &(0x7f0000000040)) [ 750.512131] erofs: root inode @ nid 36 [ 750.516313] erofs: mounted on /dev/loop0 with opts: . [ 750.522809] erofs: unmounted for /dev/loop4 03:49:58 executing program 0: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="10000000c041", 0x87ffb80, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000040)) [ 750.579534] erofs: read_super, device -> /dev/loop3 [ 750.584702] erofs: options -> fault_injection=0x0000000000000000,noacl, [ 750.622848] erofs: cannot read erofs superblock [ 750.630359] erofs: unmounted for /dev/loop0 [ 750.637771] erofs: read_super, device -> /dev/loop4 [ 750.648510] erofs: options -> [ 750.653239] erofs: root inode @ nid 36 [ 750.657410] erofs: mounted on /dev/loop4 with opts: . 03:49:58 executing program 3: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x1d040000, 0x1000}], 0x0, &(0x7f0000000040)={[{@fault_injection={'fault_injection'}}, {@noacl='noacl'}]}) 03:49:58 executing program 5: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f00000000c0)=[{&(0x7f0000000100)="77690addcfbe1fbb66ec470b27a76b302e6d619703c76e0140546115e9ebcc5b", 0x20}], 0x1, 0x7) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000300)=ANY=[@ANYBLOB="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"], 0x54}}, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r4 = dup(r3) r5 = socket$inet_udplite(0x2, 0x2, 0x88) r6 = dup(r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) getsockopt$IP6T_SO_GET_INFO(r6, 0x29, 0x40, &(0x7f0000000140)={'mangle\x00'}, &(0x7f0000000040)=0x54) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) splice(r0, 0x0, r2, 0x0, 0x100000000, 0x0) 03:49:58 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000c80)=@raw={'raw\x00', 0x3c1, 0x3, 0x308, 0x0, 0x150, 0x150, 0x0, 0x3, 0x238, 0x238, 0x238, 0x238, 0x238, 0x3, 0x0, {[{{@uncond=[0x7a, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x3], 0x0, 0x128, 0x150, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'dummy0\x00', {0x0, 0x0, 0x3, 0x0, 0x0, 0xfffd, 0x7}}}, @common=@ipv6header={{0x28, 'ipv6header\x00'}, {0x0, 0x81}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}, {{@uncond, 0x0, 0xa8, 0xe8}, @common=@inet=@LOG={0x40, 'LOG\x00', 0x0, {0x0, 0x0, "59e2b655a7928de9d18f6f4ce2fcb46e2fbbb084e62170a6b5ab23bc6a36"}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x368) 03:49:58 executing program 4: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf050000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="02000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000040)) [ 750.721959] erofs: read_super, device -> /dev/loop2 [ 750.727001] erofs: options -> [ 750.744382] erofs: cannot read erofs superblock [ 750.777722] erofs: unmounted for /dev/loop4 03:49:58 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000c80)=@raw={'raw\x00', 0x3c1, 0x3, 0x308, 0x0, 0x150, 0x150, 0x0, 0x3, 0x238, 0x238, 0x238, 0x238, 0x238, 0x3, 0x0, {[{{@uncond=[0x9e, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x3], 0x0, 0x128, 0x150, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'dummy0\x00', {0x0, 0x0, 0x3, 0x0, 0x0, 0xfffd, 0x7}}}, @common=@ipv6header={{0x28, 'ipv6header\x00'}, {0x0, 0x81}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}, {{@uncond, 0x0, 0xa8, 0xe8}, @common=@inet=@LOG={0x40, 'LOG\x00', 0x0, {0x0, 0x0, "59e2b655a7928de9d18f6f4ce2fcb46e2fbbb084e62170a6b5ab23bc6a36"}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x368) 03:49:58 executing program 2: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="10000300c041", 0x6, 0x480}], 0x0, &(0x7f0000000040)) [ 750.890758] erofs: read_super, device -> /dev/loop4 [ 750.895193] erofs: read_super, device -> /dev/loop3 [ 750.908172] erofs: options -> [ 750.908194] erofs: options -> fault_injection=0x0000000000000000,noacl, [ 750.922124] erofs: root inode @ nid 36 03:49:58 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000c80)=@raw={'raw\x00', 0x3c1, 0x3, 0x308, 0x0, 0x150, 0x150, 0x0, 0x3, 0x238, 0x238, 0x238, 0x238, 0x238, 0x3, 0x0, {[{{@uncond=[0xa6, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x3], 0x0, 0x128, 0x150, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'dummy0\x00', {0x0, 0x0, 0x3, 0x0, 0x0, 0xfffd, 0x7}}}, @common=@ipv6header={{0x28, 'ipv6header\x00'}, {0x0, 0x81}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}, {{@uncond, 0x0, 0xa8, 0xe8}, @common=@inet=@LOG={0x40, 'LOG\x00', 0x0, {0x0, 0x0, "59e2b655a7928de9d18f6f4ce2fcb46e2fbbb084e62170a6b5ab23bc6a36"}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x368) [ 750.936571] erofs: cannot read erofs superblock [ 750.953338] erofs: mounted on /dev/loop4 with opts: . [ 750.959639] erofs: read_super, device -> /dev/loop2 [ 750.977871] erofs: options -> [ 750.984837] erofs: cannot read erofs superblock 03:49:58 executing program 4: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf070000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="02000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000040)) 03:49:58 executing program 2: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="10000300c041", 0x6, 0x480}], 0x0, &(0x7f0000000040)) [ 751.052867] erofs: read_super, device -> /dev/loop3 [ 751.059903] erofs: options -> fault_injection=0x0000000000000000,noacl, [ 751.063535] erofs: read_super, device -> /dev/loop0 [ 751.066913] erofs: unmounted for /dev/loop4 [ 751.085689] erofs: options -> [ 751.093904] erofs: cannot read erofs superblock 03:49:58 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000c80)=@raw={'raw\x00', 0x3c1, 0x3, 0x308, 0x0, 0x150, 0x150, 0x0, 0x3, 0x238, 0x238, 0x238, 0x238, 0x238, 0x3, 0x0, {[{{@uncond=[0xb0, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x3], 0x0, 0x128, 0x150, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'dummy0\x00', {0x0, 0x0, 0x3, 0x0, 0x0, 0xfffd, 0x7}}}, @common=@ipv6header={{0x28, 'ipv6header\x00'}, {0x0, 0x81}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}, {{@uncond, 0x0, 0xa8, 0xe8}, @common=@inet=@LOG={0x40, 'LOG\x00', 0x0, {0x0, 0x0, "59e2b655a7928de9d18f6f4ce2fcb46e2fbbb084e62170a6b5ab23bc6a36"}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x368) [ 751.100459] erofs: cannot find valid erofs superblock 03:49:58 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000c80)=@raw={'raw\x00', 0x3c1, 0x3, 0x308, 0x0, 0x150, 0x150, 0x0, 0x3, 0x238, 0x238, 0x238, 0x238, 0x238, 0x3, 0x0, {[{{@uncond=[0xca, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x3], 0x0, 0x128, 0x150, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'dummy0\x00', {0x0, 0x0, 0x3, 0x0, 0x0, 0xfffd, 0x7}}}, @common=@ipv6header={{0x28, 'ipv6header\x00'}, {0x0, 0x81}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}, {{@uncond, 0x0, 0xa8, 0xe8}, @common=@inet=@LOG={0x40, 'LOG\x00', 0x0, {0x0, 0x0, "59e2b655a7928de9d18f6f4ce2fcb46e2fbbb084e62170a6b5ab23bc6a36"}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x368) [ 751.261426] erofs: read_super, device -> /dev/loop4 [ 751.269023] erofs: read_super, device -> /dev/loop2 [ 751.269030] erofs: options -> [ 751.269084] erofs: cannot read erofs superblock [ 751.289122] erofs: options -> [ 751.289451] erofs: root inode @ nid 36 [ 751.290526] erofs: mounted on /dev/loop4 with opts: . [ 751.338706] erofs: unmounted for /dev/loop4 03:49:58 executing program 0: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="10000000c041", 0x20010106, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000040)) 03:49:58 executing program 3: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x1e040000, 0x1000}], 0x0, &(0x7f0000000040)={[{@fault_injection={'fault_injection'}}, {@noacl='noacl'}]}) 03:49:58 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000c80)=@raw={'raw\x00', 0x3c1, 0x3, 0x308, 0x0, 0x150, 0x150, 0x0, 0x3, 0x238, 0x238, 0x238, 0x238, 0x238, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x3], 0x0, 0x128, 0x150, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'dummy0\x00', {0x0, 0x0, 0x3, 0x0, 0x0, 0xfffd, 0x7}}}, @common=@ipv6header={{0x28, 'ipv6header\x00'}, {0x0, 0x81}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}, {{@uncond, 0x0, 0xa8, 0xe8}, @common=@inet=@LOG={0x40, 'LOG\x00', 0x0, {0x0, 0x0, "59e2b655a7928de9d18f6f4ce2fcb46e2fbbb084e62170a6b5ab23bc6a36"}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x368) 03:49:58 executing program 5: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f00000000c0)=[{&(0x7f0000000180)="77690addcfbe1fbb66ec", 0xff3b}], 0x1, 0x1) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000100)=ANY=[@ANYBLOB="54000000020601080000000000000000000000000d0003006c6973743a7365740000000005000400000000000900020073797a30000015e5f0aefefb6335a353d23f0000050001000600000005000500000000000c0007800800064000008241"], 0x54}}, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) splice(r0, 0x0, r2, 0x0, 0x100000000, 0x0) 03:49:58 executing program 4: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf080000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="02000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000040)) 03:49:58 executing program 2: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="10000300c041", 0x6, 0x480}, {0x0}], 0x0, &(0x7f0000000040)) [ 751.498056] erofs: read_super, device -> /dev/loop4 03:49:59 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000c80)=@raw={'raw\x00', 0x3c1, 0x3, 0x308, 0x0, 0x150, 0x150, 0x0, 0x3, 0x238, 0x238, 0x238, 0x238, 0x238, 0x3, 0x0, {[{{@uncond=[0x0, 0x2, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x3], 0x0, 0x128, 0x150, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'dummy0\x00', {0x0, 0x0, 0x3, 0x0, 0x0, 0xfffd, 0x7}}}, @common=@ipv6header={{0x28, 'ipv6header\x00'}, {0x0, 0x81}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}, {{@uncond, 0x0, 0xa8, 0xe8}, @common=@inet=@LOG={0x40, 'LOG\x00', 0x0, {0x0, 0x0, "59e2b655a7928de9d18f6f4ce2fcb46e2fbbb084e62170a6b5ab23bc6a36"}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x368) [ 751.542615] erofs: read_super, device -> /dev/loop3 [ 751.570059] erofs: read_super, device -> /dev/loop2 [ 751.580688] erofs: options -> [ 751.585409] erofs: options -> fault_injection=0x0000000000000000,noacl, [ 751.596993] erofs: options -> [ 751.601534] erofs: root inode @ nid 36 [ 751.607500] erofs: cannot read erofs superblock [ 751.615288] erofs: cannot read erofs superblock [ 751.624220] erofs: mounted on /dev/loop4 with opts: . 03:49:59 executing program 2: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="10000300c041", 0x6, 0x480}, {0x0}], 0x0, &(0x7f0000000040)) 03:49:59 executing program 4: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf100000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="02000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000040)) 03:49:59 executing program 3: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x1f040000, 0x1000}], 0x0, &(0x7f0000000040)={[{@fault_injection={'fault_injection'}}, {@noacl='noacl'}]}) [ 751.680890] erofs: unmounted for /dev/loop4 03:49:59 executing program 5: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f00000000c0)=[{&(0x7f0000000180)="77690addcfbe1fbb66ec", 0xff3b}], 0x1, 0x1) ioctl$DRM_IOCTL_MODE_CREATE_LEASE(r1, 0xc01864c6, &(0x7f0000000100)={&(0x7f0000000040)=[0x4, 0xfffffff9], 0x2, 0x40800}) ioctl$USBDEVFS_RELEASE_PORT(r1, 0x80045519, &(0x7f00000001c0)=0x1009) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) r3 = socket$inet_udplite(0x2, 0x2, 0x88) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$sock_bt_hci(r4, 0x800448d2, &(0x7f0000000200)="564d4d305c0f") sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000240)=ANY=[@ANYBLOB="54000000020601080000000000000000000000000d0003006c6973743a7365740000000005000400000000000900020073797a3000000000050001000600000005000500000000000c0007800800064000008241d9221291eb572620af19e352bf31c8eb40544ed9c1a83b414a4993ff57fd"], 0x54}}, 0x0) r5 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) splice(r0, 0x0, r2, 0x0, 0x100000000, 0x0) 03:49:59 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000c80)=@raw={'raw\x00', 0x3c1, 0x3, 0x308, 0x0, 0x150, 0x150, 0x0, 0x3, 0x238, 0x238, 0x238, 0x238, 0x238, 0x3, 0x0, {[{{@uncond=[0x0, 0x3, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x3], 0x0, 0x128, 0x150, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'dummy0\x00', {0x0, 0x0, 0x3, 0x0, 0x0, 0xfffd, 0x7}}}, @common=@ipv6header={{0x28, 'ipv6header\x00'}, {0x0, 0x81}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}, {{@uncond, 0x0, 0xa8, 0xe8}, @common=@inet=@LOG={0x40, 'LOG\x00', 0x0, {0x0, 0x0, "59e2b655a7928de9d18f6f4ce2fcb46e2fbbb084e62170a6b5ab23bc6a36"}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x368) [ 751.814762] erofs: read_super, device -> /dev/loop0 [ 751.837119] erofs: read_super, device -> /dev/loop2 [ 751.842493] erofs: options -> [ 751.852598] erofs: cannot find valid erofs superblock [ 751.857399] erofs: read_super, device -> /dev/loop4 [ 751.860695] erofs: options -> [ 751.868380] erofs: cannot read erofs superblock [ 751.906202] erofs: options -> [ 751.912164] erofs: root inode @ nid 36 [ 751.916254] erofs: mounted on /dev/loop4 with opts: . [ 751.931092] erofs: read_super, device -> /dev/loop3 [ 751.943207] erofs: options -> fault_injection=0x0000000000000000,noacl, [ 751.950859] erofs: cannot read erofs superblock [ 752.011509] erofs: read_super, device -> /dev/loop3 [ 752.016796] erofs: options -> fault_injection=0x0000000000000000,noacl, [ 752.028451] erofs: cannot read erofs superblock [ 752.038265] erofs: unmounted for /dev/loop4 03:49:59 executing program 0: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="10000000c041", 0xfffffdef, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000040)) 03:49:59 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000c80)=@raw={'raw\x00', 0x3c1, 0x3, 0x308, 0x0, 0x150, 0x150, 0x0, 0x3, 0x238, 0x238, 0x238, 0x238, 0x238, 0x3, 0x0, {[{{@uncond=[0x0, 0x4, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x3], 0x0, 0x128, 0x150, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'dummy0\x00', {0x0, 0x0, 0x3, 0x0, 0x0, 0xfffd, 0x7}}}, @common=@ipv6header={{0x28, 'ipv6header\x00'}, {0x0, 0x81}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}, {{@uncond, 0x0, 0xa8, 0xe8}, @common=@inet=@LOG={0x40, 'LOG\x00', 0x0, {0x0, 0x0, "59e2b655a7928de9d18f6f4ce2fcb46e2fbbb084e62170a6b5ab23bc6a36"}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x368) 03:49:59 executing program 5: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e08a3f37cf010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="02000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000040)) 03:49:59 executing program 4: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf140000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="02000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000040)) 03:49:59 executing program 2: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="10000300c041", 0x6, 0x480}, {0x0}], 0x0, &(0x7f0000000040)) 03:49:59 executing program 3: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x20000000, 0x1000}], 0x0, &(0x7f0000000040)={[{@fault_injection={'fault_injection'}}, {@noacl='noacl'}]}) [ 752.260144] erofs: read_super, device -> /dev/loop4 [ 752.273162] erofs: options -> [ 752.287534] erofs: root inode @ nid 36 [ 752.304425] erofs: mounted on /dev/loop4 with opts: . 03:49:59 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000c80)=@raw={'raw\x00', 0x3c1, 0x3, 0x308, 0x0, 0x150, 0x150, 0x0, 0x3, 0x238, 0x238, 0x238, 0x238, 0x238, 0x3, 0x0, {[{{@uncond=[0x0, 0x7, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x3], 0x0, 0x128, 0x150, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'dummy0\x00', {0x0, 0x0, 0x3, 0x0, 0x0, 0xfffd, 0x7}}}, @common=@ipv6header={{0x28, 'ipv6header\x00'}, {0x0, 0x81}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}, {{@uncond, 0x0, 0xa8, 0xe8}, @common=@inet=@LOG={0x40, 'LOG\x00', 0x0, {0x0, 0x0, "59e2b655a7928de9d18f6f4ce2fcb46e2fbbb084e62170a6b5ab23bc6a36"}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x368) [ 752.316828] erofs: read_super, device -> /dev/loop2 [ 752.340087] erofs: read_super, device -> /dev/loop3 03:49:59 executing program 4: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf220000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="02000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000040)) [ 752.364614] erofs: options -> [ 752.367889] erofs: cannot read erofs superblock [ 752.371900] erofs: options -> fault_injection=0x0000000000000000,noacl, 03:49:59 executing program 2: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c0024", 0xf, 0x400}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000040)) [ 752.406856] erofs: cannot read erofs superblock [ 752.413869] erofs: unmounted for /dev/loop4 03:50:00 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000c80)=@raw={'raw\x00', 0x3c1, 0x3, 0x308, 0x0, 0x150, 0x150, 0x0, 0x3, 0x238, 0x238, 0x238, 0x238, 0x238, 0x3, 0x0, {[{{@uncond=[0x0, 0x8, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x3], 0x0, 0x128, 0x150, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'dummy0\x00', {0x0, 0x0, 0x3, 0x0, 0x0, 0xfffd, 0x7}}}, @common=@ipv6header={{0x28, 'ipv6header\x00'}, {0x0, 0x81}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}, {{@uncond, 0x0, 0xa8, 0xe8}, @common=@inet=@LOG={0x40, 'LOG\x00', 0x0, {0x0, 0x0, "59e2b655a7928de9d18f6f4ce2fcb46e2fbbb084e62170a6b5ab23bc6a36"}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x368) [ 752.528179] erofs: read_super, device -> /dev/loop3 [ 752.534792] erofs: options -> fault_injection=0x0000000000000000,noacl, [ 752.547490] erofs: read_super, device -> /dev/loop4 [ 752.570150] erofs: options -> [ 752.576209] erofs: read_super, device -> /dev/loop2 [ 752.586322] erofs: root inode @ nid 36 [ 752.591351] erofs: cannot read erofs superblock [ 752.604626] erofs: options -> [ 752.612675] erofs: mounted on /dev/loop4 with opts: . 03:50:00 executing program 5: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e08a3f37cf010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="02000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000040)) 03:50:00 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000c80)=@raw={'raw\x00', 0x3c1, 0x3, 0x308, 0x0, 0x150, 0x150, 0x0, 0x3, 0x238, 0x238, 0x238, 0x238, 0x238, 0x3, 0x0, {[{{@uncond=[0x0, 0x4a, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x3], 0x0, 0x128, 0x150, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'dummy0\x00', {0x0, 0x0, 0x3, 0x0, 0x0, 0xfffd, 0x7}}}, @common=@ipv6header={{0x28, 'ipv6header\x00'}, {0x0, 0x81}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}, {{@uncond, 0x0, 0xa8, 0xe8}, @common=@inet=@LOG={0x40, 'LOG\x00', 0x0, {0x0, 0x0, "59e2b655a7928de9d18f6f4ce2fcb46e2fbbb084e62170a6b5ab23bc6a36"}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x368) [ 752.614661] erofs: read_super, device -> /dev/loop0 [ 752.628708] erofs: root inode @ nid 36 [ 752.647837] erofs: options -> [ 752.661225] erofs: cannot find valid erofs superblock [ 752.809583] erofs: unmounted for /dev/loop4 03:50:00 executing program 0: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="10000000c041", 0x7ffffffffffffb7f, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000040)) 03:50:00 executing program 3: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x20040000, 0x1000}], 0x0, &(0x7f0000000040)={[{@fault_injection={'fault_injection'}}, {@noacl='noacl'}]}) 03:50:00 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000c80)=@raw={'raw\x00', 0x3c1, 0x3, 0x308, 0x0, 0x150, 0x150, 0x0, 0x3, 0x238, 0x238, 0x238, 0x238, 0x238, 0x3, 0x0, {[{{@uncond=[0x0, 0x60, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x3], 0x0, 0x128, 0x150, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'dummy0\x00', {0x0, 0x0, 0x3, 0x0, 0x0, 0xfffd, 0x7}}}, @common=@ipv6header={{0x28, 'ipv6header\x00'}, {0x0, 0x81}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}, {{@uncond, 0x0, 0xa8, 0xe8}, @common=@inet=@LOG={0x40, 'LOG\x00', 0x0, {0x0, 0x0, "59e2b655a7928de9d18f6f4ce2fcb46e2fbbb084e62170a6b5ab23bc6a36"}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x368) 03:50:00 executing program 5: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e08a3f37cf010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="02000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000040)) 03:50:00 executing program 4: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf250000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="02000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000040)) 03:50:00 executing program 2: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c0024", 0xf, 0x400}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000040)) [ 752.943308] erofs: read_super, device -> /dev/loop3 03:50:00 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000c80)=@raw={'raw\x00', 0x3c1, 0x3, 0x308, 0x0, 0x150, 0x150, 0x0, 0x3, 0x238, 0x238, 0x238, 0x238, 0x238, 0x3, 0x0, {[{{@uncond=[0x0, 0x62, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x3], 0x0, 0x128, 0x150, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'dummy0\x00', {0x0, 0x0, 0x3, 0x0, 0x0, 0xfffd, 0x7}}}, @common=@ipv6header={{0x28, 'ipv6header\x00'}, {0x0, 0x81}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}, {{@uncond, 0x0, 0xa8, 0xe8}, @common=@inet=@LOG={0x40, 'LOG\x00', 0x0, {0x0, 0x0, "59e2b655a7928de9d18f6f4ce2fcb46e2fbbb084e62170a6b5ab23bc6a36"}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x368) [ 752.965432] erofs: read_super, device -> /dev/loop4 [ 752.970811] erofs: options -> [ 752.974357] erofs: root inode @ nid 36 [ 752.978669] erofs: mounted on /dev/loop4 with opts: . [ 752.988795] erofs: options -> fault_injection=0x0000000000000000,noacl, [ 752.997064] erofs: read_super, device -> /dev/loop2 03:50:00 executing program 4: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf2a0000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="02000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000040)) [ 753.014873] erofs: options -> [ 753.022010] erofs: cannot read erofs superblock [ 753.036359] erofs: root inode @ nid 36 03:50:00 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000c80)=@raw={'raw\x00', 0x3c1, 0x3, 0x308, 0x0, 0x150, 0x150, 0x0, 0x3, 0x238, 0x238, 0x238, 0x238, 0x238, 0x3, 0x0, {[{{@uncond=[0x0, 0x6a, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x3], 0x0, 0x128, 0x150, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'dummy0\x00', {0x0, 0x0, 0x3, 0x0, 0x0, 0xfffd, 0x7}}}, @common=@ipv6header={{0x28, 'ipv6header\x00'}, {0x0, 0x81}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}, {{@uncond, 0x0, 0xa8, 0xe8}, @common=@inet=@LOG={0x40, 'LOG\x00', 0x0, {0x0, 0x0, "59e2b655a7928de9d18f6f4ce2fcb46e2fbbb084e62170a6b5ab23bc6a36"}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x368) [ 753.057189] erofs: unmounted for /dev/loop4 03:50:00 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000c80)=@raw={'raw\x00', 0x3c1, 0x3, 0x308, 0x0, 0x150, 0x150, 0x0, 0x3, 0x238, 0x238, 0x238, 0x238, 0x238, 0x3, 0x0, {[{{@uncond=[0x0, 0x7a, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x3], 0x0, 0x128, 0x150, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'dummy0\x00', {0x0, 0x0, 0x3, 0x0, 0x0, 0xfffd, 0x7}}}, @common=@ipv6header={{0x28, 'ipv6header\x00'}, {0x0, 0x81}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}, {{@uncond, 0x0, 0xa8, 0xe8}, @common=@inet=@LOG={0x40, 'LOG\x00', 0x0, {0x0, 0x0, "59e2b655a7928de9d18f6f4ce2fcb46e2fbbb084e62170a6b5ab23bc6a36"}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x368) 03:50:00 executing program 5: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x26e2, 0x1000}], 0x0, &(0x7f0000000040)={[{@fault_injection={'fault_injection'}}, {@noacl='noacl'}]}) [ 753.183263] erofs: read_super, device -> /dev/loop3 03:50:00 executing program 2: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c0024", 0xf, 0x400}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000040)) [ 753.204954] erofs: options -> fault_injection=0x0000000000000000,noacl, [ 753.228826] erofs: read_super, device -> /dev/loop4 [ 753.244188] erofs: options -> [ 753.251185] erofs: read_super, device -> /dev/loop0 [ 753.256610] erofs: root inode @ nid 36 [ 753.259986] erofs: cannot read erofs superblock [ 753.266435] erofs: options -> [ 753.270519] erofs: mounted on /dev/loop4 with opts: . [ 753.278503] erofs: cannot find valid erofs superblock [ 753.321712] erofs: read_super, device -> /dev/loop2 [ 753.327821] erofs: options -> [ 753.366743] erofs: unmounted for /dev/loop4 [ 753.373328] erofs: root inode @ nid 36 03:50:00 executing program 0: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="10000000c041", 0xfffffffffffffdef, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000040)) 03:50:00 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000c80)=@raw={'raw\x00', 0x3c1, 0x3, 0x308, 0x0, 0x150, 0x150, 0x0, 0x3, 0x238, 0x238, 0x238, 0x238, 0x238, 0x3, 0x0, {[{{@uncond=[0x0, 0x9e, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x3], 0x0, 0x128, 0x150, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'dummy0\x00', {0x0, 0x0, 0x3, 0x0, 0x0, 0xfffd, 0x7}}}, @common=@ipv6header={{0x28, 'ipv6header\x00'}, {0x0, 0x81}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}, {{@uncond, 0x0, 0xa8, 0xe8}, @common=@inet=@LOG={0x40, 'LOG\x00', 0x0, {0x0, 0x0, "59e2b655a7928de9d18f6f4ce2fcb46e2fbbb084e62170a6b5ab23bc6a36"}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x368) 03:50:00 executing program 3: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x21040000, 0x1000}], 0x0, &(0x7f0000000040)={[{@fault_injection={'fault_injection'}}, {@noacl='noacl'}]}) 03:50:00 executing program 4: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf370000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="02000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000040)) 03:50:00 executing program 5: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x26e2, 0x1000}], 0x0, &(0x7f0000000040)={[{@fault_injection={'fault_injection'}}, {@noacl='noacl'}]}) 03:50:01 executing program 5: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x26e2, 0x1000}], 0x0, &(0x7f0000000040)={[{@fault_injection={'fault_injection'}}, {@noacl='noacl'}]}) 03:50:01 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000c80)=@raw={'raw\x00', 0x3c1, 0x3, 0x308, 0x0, 0x150, 0x150, 0x0, 0x3, 0x238, 0x238, 0x238, 0x238, 0x238, 0x3, 0x0, {[{{@uncond=[0x0, 0xa6, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x3], 0x0, 0x128, 0x150, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'dummy0\x00', {0x0, 0x0, 0x3, 0x0, 0x0, 0xfffd, 0x7}}}, @common=@ipv6header={{0x28, 'ipv6header\x00'}, {0x0, 0x81}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}, {{@uncond, 0x0, 0xa8, 0xe8}, @common=@inet=@LOG={0x40, 'LOG\x00', 0x0, {0x0, 0x0, "59e2b655a7928de9d18f6f4ce2fcb46e2fbbb084e62170a6b5ab23bc6a36"}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x368) 03:50:01 executing program 2: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c0024", 0xf, 0x400}, {0x0, 0x0, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000040)) [ 753.511937] erofs: read_super, device -> /dev/loop3 [ 753.531309] erofs: options -> fault_injection=0x0000000000000000,noacl, [ 753.557173] erofs: cannot read erofs superblock 03:50:01 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000c80)=@raw={'raw\x00', 0x3c1, 0x3, 0x308, 0x0, 0x150, 0x150, 0x0, 0x3, 0x238, 0x238, 0x238, 0x238, 0x238, 0x3, 0x0, {[{{@uncond=[0x0, 0xb0, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x3], 0x0, 0x128, 0x150, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'dummy0\x00', {0x0, 0x0, 0x3, 0x0, 0x0, 0xfffd, 0x7}}}, @common=@ipv6header={{0x28, 'ipv6header\x00'}, {0x0, 0x81}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}, {{@uncond, 0x0, 0xa8, 0xe8}, @common=@inet=@LOG={0x40, 'LOG\x00', 0x0, {0x0, 0x0, "59e2b655a7928de9d18f6f4ce2fcb46e2fbbb084e62170a6b5ab23bc6a36"}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x368) [ 753.586784] erofs: read_super, device -> /dev/loop4 [ 753.621472] erofs: options -> [ 753.628171] erofs: root inode @ nid 36 [ 753.634418] erofs: mounted on /dev/loop4 with opts: . 03:50:01 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000c80)=@raw={'raw\x00', 0x3c1, 0x3, 0x308, 0x0, 0x150, 0x150, 0x0, 0x3, 0x238, 0x238, 0x238, 0x238, 0x238, 0x3, 0x0, {[{{@uncond=[0x0, 0xca, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x3], 0x0, 0x128, 0x150, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'dummy0\x00', {0x0, 0x0, 0x3, 0x0, 0x0, 0xfffd, 0x7}}}, @common=@ipv6header={{0x28, 'ipv6header\x00'}, {0x0, 0x81}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}, {{@uncond, 0x0, 0xa8, 0xe8}, @common=@inet=@LOG={0x40, 'LOG\x00', 0x0, {0x0, 0x0, "59e2b655a7928de9d18f6f4ce2fcb46e2fbbb084e62170a6b5ab23bc6a36"}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x368) [ 753.666456] erofs: read_super, device -> /dev/loop2 [ 753.684519] erofs: options -> [ 753.694618] erofs: read_super, device -> /dev/loop3 [ 753.699865] erofs: options -> fault_injection=0x0000000000000000,noacl, 03:50:01 executing program 4: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf390000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="02000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000040)) 03:50:01 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000c80)=@raw={'raw\x00', 0x3c1, 0x3, 0x308, 0x0, 0x150, 0x150, 0x0, 0x3, 0x238, 0x238, 0x238, 0x238, 0x238, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x3], 0x0, 0x128, 0x150, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'dummy0\x00', {0x0, 0x0, 0x3, 0x0, 0x0, 0xfffd, 0x7}}}, @common=@ipv6header={{0x28, 'ipv6header\x00'}, {0x0, 0x81}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}, {{@uncond, 0x0, 0xa8, 0xe8}, @common=@inet=@LOG={0x40, 'LOG\x00', 0x0, {0x0, 0x0, "59e2b655a7928de9d18f6f4ce2fcb46e2fbbb084e62170a6b5ab23bc6a36"}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x368) [ 753.725750] erofs: cannot read erofs superblock [ 753.726230] erofs: root inode @ nid 36 [ 753.757428] erofs: unmounted for /dev/loop4 [ 753.902350] erofs: read_super, device -> /dev/loop0 [ 753.907401] erofs: options -> [ 753.908973] erofs: read_super, device -> /dev/loop4 [ 753.917190] erofs: options -> [ 753.921156] erofs: root inode @ nid 36 [ 753.922682] erofs: cannot find valid erofs superblock [ 753.925389] erofs: mounted on /dev/loop4 with opts: . [ 753.994435] erofs: unmounted for /dev/loop4 [ 754.097402] erofs: read_super, device -> /dev/loop0 [ 754.107904] erofs: options -> [ 754.112724] erofs: cannot find valid erofs superblock 03:50:01 executing program 5: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="050000", 0x3, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000040)={[{@fault_injection={'fault_injection'}}, {@noacl='noacl'}]}) 03:50:01 executing program 2: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c0024", 0xf, 0x400}, {0x0, 0x0, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000040)) 03:50:01 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000c80)=@raw={'raw\x00', 0x3c1, 0x3, 0x308, 0x0, 0x150, 0x150, 0x0, 0x3, 0x238, 0x238, 0x238, 0x238, 0x238, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x2, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x3], 0x0, 0x128, 0x150, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'dummy0\x00', {0x0, 0x0, 0x3, 0x0, 0x0, 0xfffd, 0x7}}}, @common=@ipv6header={{0x28, 'ipv6header\x00'}, {0x0, 0x81}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}, {{@uncond, 0x0, 0xa8, 0xe8}, @common=@inet=@LOG={0x40, 'LOG\x00', 0x0, {0x0, 0x0, "59e2b655a7928de9d18f6f4ce2fcb46e2fbbb084e62170a6b5ab23bc6a36"}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x368) 03:50:01 executing program 0: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="10000000c041", 0x6, 0x8800000}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000040)) 03:50:01 executing program 3: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x22040000, 0x1000}], 0x0, &(0x7f0000000040)={[{@fault_injection={'fault_injection'}}, {@noacl='noacl'}]}) 03:50:01 executing program 4: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf440000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="02000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000040)) 03:50:01 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000c80)=@raw={'raw\x00', 0x3c1, 0x3, 0x308, 0x0, 0x150, 0x150, 0x0, 0x3, 0x238, 0x238, 0x238, 0x238, 0x238, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x3, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x3], 0x0, 0x128, 0x150, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'dummy0\x00', {0x0, 0x0, 0x3, 0x0, 0x0, 0xfffd, 0x7}}}, @common=@ipv6header={{0x28, 'ipv6header\x00'}, {0x0, 0x81}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}, {{@uncond, 0x0, 0xa8, 0xe8}, @common=@inet=@LOG={0x40, 'LOG\x00', 0x0, {0x0, 0x0, "59e2b655a7928de9d18f6f4ce2fcb46e2fbbb084e62170a6b5ab23bc6a36"}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x368) 03:50:01 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000c80)=@raw={'raw\x00', 0x3c1, 0x3, 0x308, 0x0, 0x150, 0x150, 0x0, 0x3, 0x238, 0x238, 0x238, 0x238, 0x238, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x4, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x3], 0x0, 0x128, 0x150, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'dummy0\x00', {0x0, 0x0, 0x3, 0x0, 0x0, 0xfffd, 0x7}}}, @common=@ipv6header={{0x28, 'ipv6header\x00'}, {0x0, 0x81}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}, {{@uncond, 0x0, 0xa8, 0xe8}, @common=@inet=@LOG={0x40, 'LOG\x00', 0x0, {0x0, 0x0, "59e2b655a7928de9d18f6f4ce2fcb46e2fbbb084e62170a6b5ab23bc6a36"}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x368) [ 754.247408] erofs: read_super, device -> /dev/loop2 [ 754.252864] erofs: read_super, device -> /dev/loop4 [ 754.258083] erofs: read_super, device -> /dev/loop3 [ 754.263713] erofs: read_super, device -> /dev/loop0 [ 754.272148] erofs: options -> [ 754.280110] erofs: options -> [ 754.284501] erofs: options -> [ 754.289547] erofs: options -> fault_injection=0x0000000000000000,noacl, 03:50:01 executing program 5: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c0024", 0x40f, 0x400}, {&(0x7f0000010100)="10000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000040)) [ 754.302585] erofs: root inode @ nid 36 [ 754.306622] erofs: root inode @ nid 36 [ 754.306923] erofs: root inode @ nid 36 [ 754.316406] erofs: cannot read erofs superblock [ 754.324862] erofs: mounted on /dev/loop4 with opts: . 03:50:01 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000c80)=@raw={'raw\x00', 0x3c1, 0x3, 0x308, 0x0, 0x150, 0x150, 0x0, 0x3, 0x238, 0x238, 0x238, 0x238, 0x238, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x7, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x3], 0x0, 0x128, 0x150, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'dummy0\x00', {0x0, 0x0, 0x3, 0x0, 0x0, 0xfffd, 0x7}}}, @common=@ipv6header={{0x28, 'ipv6header\x00'}, {0x0, 0x81}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}, {{@uncond, 0x0, 0xa8, 0xe8}, @common=@inet=@LOG={0x40, 'LOG\x00', 0x0, {0x0, 0x0, "59e2b655a7928de9d18f6f4ce2fcb46e2fbbb084e62170a6b5ab23bc6a36"}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x368) 03:50:01 executing program 5: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c0024", 0x40f, 0x400}, {&(0x7f0000010100)="10000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000040)) 03:50:01 executing program 4: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf000300000c0024", 0xf, 0x400}, {&(0x7f0000010100)="02000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000040)) 03:50:02 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000c80)=@raw={'raw\x00', 0x3c1, 0x3, 0x308, 0x0, 0x150, 0x150, 0x0, 0x3, 0x238, 0x238, 0x238, 0x238, 0x238, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x8, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x3], 0x0, 0x128, 0x150, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'dummy0\x00', {0x0, 0x0, 0x3, 0x0, 0x0, 0xfffd, 0x7}}}, @common=@ipv6header={{0x28, 'ipv6header\x00'}, {0x0, 0x81}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}, {{@uncond, 0x0, 0xa8, 0xe8}, @common=@inet=@LOG={0x40, 'LOG\x00', 0x0, {0x0, 0x0, "59e2b655a7928de9d18f6f4ce2fcb46e2fbbb084e62170a6b5ab23bc6a36"}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x368) 03:50:02 executing program 2: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c0024", 0xf, 0x400}, {0x0, 0x0, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000040)) 03:50:02 executing program 5: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c0024", 0x40f, 0x400}, {&(0x7f0000010100)="10000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000040)) [ 754.449862] erofs: read_super, device -> /dev/loop0 [ 754.457666] erofs: unmounted for /dev/loop4 [ 754.462760] erofs: options -> [ 754.469789] erofs: read_super, device -> /dev/loop3 [ 754.474823] erofs: options -> fault_injection=0x0000000000000000,noacl, [ 754.477707] erofs: root inode @ nid 36 [ 754.513257] erofs: cannot read erofs superblock 03:50:02 executing program 0: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="10000000c041", 0x6, 0x7fffffffffffffff}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000040)) 03:50:02 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000c80)=@raw={'raw\x00', 0x3c1, 0x3, 0x308, 0x0, 0x150, 0x150, 0x0, 0x3, 0x238, 0x238, 0x238, 0x238, 0x238, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x4a, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x3], 0x0, 0x128, 0x150, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'dummy0\x00', {0x0, 0x0, 0x3, 0x0, 0x0, 0xfffd, 0x7}}}, @common=@ipv6header={{0x28, 'ipv6header\x00'}, {0x0, 0x81}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}, {{@uncond, 0x0, 0xa8, 0xe8}, @common=@inet=@LOG={0x40, 'LOG\x00', 0x0, {0x0, 0x0, "59e2b655a7928de9d18f6f4ce2fcb46e2fbbb084e62170a6b5ab23bc6a36"}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x368) 03:50:02 executing program 5: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0xfffffff6, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="02000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000040)) 03:50:02 executing program 3: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x23040000, 0x1000}], 0x0, &(0x7f0000000040)={[{@fault_injection={'fault_injection'}}, {@noacl='noacl'}]}) 03:50:02 executing program 5: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0xfffffff6, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="02000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000040)) 03:50:02 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000c80)=@raw={'raw\x00', 0x3c1, 0x3, 0x308, 0x0, 0x150, 0x150, 0x0, 0x3, 0x238, 0x238, 0x238, 0x238, 0x238, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x60, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x3], 0x0, 0x128, 0x150, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'dummy0\x00', {0x0, 0x0, 0x3, 0x0, 0x0, 0xfffd, 0x7}}}, @common=@ipv6header={{0x28, 'ipv6header\x00'}, {0x0, 0x81}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}, {{@uncond, 0x0, 0xa8, 0xe8}, @common=@inet=@LOG={0x40, 'LOG\x00', 0x0, {0x0, 0x0, "59e2b655a7928de9d18f6f4ce2fcb46e2fbbb084e62170a6b5ab23bc6a36"}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x368) [ 754.622319] erofs: read_super, device -> /dev/loop2 [ 754.628170] erofs: options -> [ 754.634712] erofs: root inode @ nid 36 03:50:02 executing program 5: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0xfffffff6, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="02000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000040)) 03:50:02 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000c80)=@raw={'raw\x00', 0x3c1, 0x3, 0x308, 0x0, 0x150, 0x150, 0x0, 0x3, 0x238, 0x238, 0x238, 0x238, 0x238, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x62, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x3], 0x0, 0x128, 0x150, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'dummy0\x00', {0x0, 0x0, 0x3, 0x0, 0x0, 0xfffd, 0x7}}}, @common=@ipv6header={{0x28, 'ipv6header\x00'}, {0x0, 0x81}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}, {{@uncond, 0x0, 0xa8, 0xe8}, @common=@inet=@LOG={0x40, 'LOG\x00', 0x0, {0x0, 0x0, "59e2b655a7928de9d18f6f4ce2fcb46e2fbbb084e62170a6b5ab23bc6a36"}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x368) [ 754.734722] erofs: read_super, device -> /dev/loop4 [ 754.762044] erofs: options -> [ 754.770947] erofs: read_super, device -> /dev/loop0 [ 754.772297] erofs: root inode @ nid 36 [ 754.787919] erofs: mounted on /dev/loop4 with opts: . 03:50:02 executing program 4: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcfb70300000c0024", 0xf, 0x400}, {&(0x7f0000010100)="02000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000040)) 03:50:02 executing program 2: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c0024", 0xf, 0x400}, {&(0x7f0000010100), 0x0, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000040)) 03:50:02 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000c80)=@raw={'raw\x00', 0x3c1, 0x3, 0x308, 0x0, 0x150, 0x150, 0x0, 0x3, 0x238, 0x238, 0x238, 0x238, 0x238, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x6a, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x3], 0x0, 0x128, 0x150, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'dummy0\x00', {0x0, 0x0, 0x3, 0x0, 0x0, 0xfffd, 0x7}}}, @common=@ipv6header={{0x28, 'ipv6header\x00'}, {0x0, 0x81}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}, {{@uncond, 0x0, 0xa8, 0xe8}, @common=@inet=@LOG={0x40, 'LOG\x00', 0x0, {0x0, 0x0, "59e2b655a7928de9d18f6f4ce2fcb46e2fbbb084e62170a6b5ab23bc6a36"}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x368) 03:50:02 executing program 5: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010008000c0024", 0xf, 0x400}, {&(0x7f0000010100)="10000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000040)) [ 754.809787] erofs: options -> [ 754.813274] erofs: root inode @ nid 36 [ 754.825661] erofs: unmounted for /dev/loop4 [ 754.831388] erofs: read_super, device -> /dev/loop3 [ 754.837879] erofs: options -> fault_injection=0x0000000000000000,noacl, [ 754.846452] erofs: cannot read erofs superblock [ 754.934661] erofs: read_super, device -> /dev/loop0 [ 754.935001] erofs: read_super, device -> /dev/loop2 [ 754.960334] erofs: options -> [ 754.961380] erofs: options -> [ 754.966860] erofs: root inode @ nid 36 [ 754.974753] erofs: root inode @ nid 36 [ 754.987842] erofs: read_super, device -> /dev/loop4 [ 754.999672] erofs: options -> [ 755.002945] erofs: root inode @ nid 36 [ 755.006874] erofs: mounted on /dev/loop4 with opts: . 03:50:02 executing program 0: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="10000000c041", 0x6, 0x480}, {0x0, 0x2, 0x1000}], 0x0, &(0x7f0000000040)) 03:50:02 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000c80)=@raw={'raw\x00', 0x3c1, 0x3, 0x308, 0x0, 0x150, 0x150, 0x0, 0x3, 0x238, 0x238, 0x238, 0x238, 0x238, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x7a, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x3], 0x0, 0x128, 0x150, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'dummy0\x00', {0x0, 0x0, 0x3, 0x0, 0x0, 0xfffd, 0x7}}}, @common=@ipv6header={{0x28, 'ipv6header\x00'}, {0x0, 0x81}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}, {{@uncond, 0x0, 0xa8, 0xe8}, @common=@inet=@LOG={0x40, 'LOG\x00', 0x0, {0x0, 0x0, "59e2b655a7928de9d18f6f4ce2fcb46e2fbbb084e62170a6b5ab23bc6a36"}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x368) 03:50:02 executing program 3: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x24040000, 0x1000}], 0x0, &(0x7f0000000040)={[{@fault_injection={'fault_injection'}}, {@noacl='noacl'}]}) 03:50:02 executing program 5: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010008000c0024", 0xf, 0x400}, {&(0x7f0000010100)="10000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000040)) 03:50:02 executing program 2: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c0024", 0xf, 0x400}, {&(0x7f0000010100), 0x0, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000040)) 03:50:02 executing program 4: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcfc40300000c0024", 0xf, 0x400}, {&(0x7f0000010100)="02000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000040)) [ 755.135662] erofs: unmounted for /dev/loop4 03:50:02 executing program 5: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010008000c0024", 0xf, 0x400}, {&(0x7f0000010100)="10000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000040)) 03:50:02 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000c80)=@raw={'raw\x00', 0x3c1, 0x3, 0x308, 0x0, 0x150, 0x150, 0x0, 0x3, 0x238, 0x238, 0x238, 0x238, 0x238, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x9e, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x3], 0x0, 0x128, 0x150, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'dummy0\x00', {0x0, 0x0, 0x3, 0x0, 0x0, 0xfffd, 0x7}}}, @common=@ipv6header={{0x28, 'ipv6header\x00'}, {0x0, 0x81}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}, {{@uncond, 0x0, 0xa8, 0xe8}, @common=@inet=@LOG={0x40, 'LOG\x00', 0x0, {0x0, 0x0, "59e2b655a7928de9d18f6f4ce2fcb46e2fbbb084e62170a6b5ab23bc6a36"}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x368) [ 755.191809] erofs: read_super, device -> /dev/loop0 [ 755.199367] erofs: read_super, device -> /dev/loop3 [ 755.206866] erofs: options -> fault_injection=0x0000000000000000,noacl, [ 755.206954] erofs: options -> [ 755.210461] erofs: read_super, device -> /dev/loop2 [ 755.232834] erofs: root inode @ nid 36 03:50:02 executing program 2: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c0024", 0xf, 0x400}, {&(0x7f0000010100), 0x0, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000040)) 03:50:02 executing program 5: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf040000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="10000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000040)) [ 755.238005] erofs: mounted on /dev/loop0 with opts: . [ 755.238771] erofs: cannot read erofs superblock [ 755.260766] erofs: options -> [ 755.265579] erofs: root inode @ nid 36 03:50:02 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000c80)=@raw={'raw\x00', 0x3c1, 0x3, 0x308, 0x0, 0x150, 0x150, 0x0, 0x3, 0x238, 0x238, 0x238, 0x238, 0x238, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0xa6, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x3], 0x0, 0x128, 0x150, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'dummy0\x00', {0x0, 0x0, 0x3, 0x0, 0x0, 0xfffd, 0x7}}}, @common=@ipv6header={{0x28, 'ipv6header\x00'}, {0x0, 0x81}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}, {{@uncond, 0x0, 0xa8, 0xe8}, @common=@inet=@LOG={0x40, 'LOG\x00', 0x0, {0x0, 0x0, "59e2b655a7928de9d18f6f4ce2fcb46e2fbbb084e62170a6b5ab23bc6a36"}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x368) [ 755.339625] erofs: read_super, device -> /dev/loop3 [ 755.341766] erofs: read_super, device -> /dev/loop4 [ 755.345297] erofs: options -> fault_injection=0x0000000000000000,noacl, [ 755.361643] erofs: cannot read erofs superblock 03:50:02 executing program 0: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="10000000c041", 0x6, 0x480}, {0x0, 0x3, 0x1000}], 0x0, &(0x7f0000000040)) 03:50:02 executing program 5: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf040000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="10000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000040)) 03:50:02 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000c80)=@raw={'raw\x00', 0x3c1, 0x3, 0x308, 0x0, 0x150, 0x150, 0x0, 0x3, 0x238, 0x238, 0x238, 0x238, 0x238, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0xb0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x3], 0x0, 0x128, 0x150, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'dummy0\x00', {0x0, 0x0, 0x3, 0x0, 0x0, 0xfffd, 0x7}}}, @common=@ipv6header={{0x28, 'ipv6header\x00'}, {0x0, 0x81}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}, {{@uncond, 0x0, 0xa8, 0xe8}, @common=@inet=@LOG={0x40, 'LOG\x00', 0x0, {0x0, 0x0, "59e2b655a7928de9d18f6f4ce2fcb46e2fbbb084e62170a6b5ab23bc6a36"}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x368) [ 755.389690] erofs: options -> [ 755.395485] erofs: root inode @ nid 36 [ 755.400872] erofs: unmounted for /dev/loop0 [ 755.405386] erofs: mounted on /dev/loop4 with opts: . 03:50:03 executing program 3: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x25040000, 0x1000}], 0x0, &(0x7f0000000040)={[{@fault_injection={'fault_injection'}}, {@noacl='noacl'}]}) 03:50:03 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000c80)=@raw={'raw\x00', 0x3c1, 0x3, 0x308, 0x0, 0x150, 0x150, 0x0, 0x3, 0x238, 0x238, 0x238, 0x238, 0x238, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0xca, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x3], 0x0, 0x128, 0x150, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'dummy0\x00', {0x0, 0x0, 0x3, 0x0, 0x0, 0xfffd, 0x7}}}, @common=@ipv6header={{0x28, 'ipv6header\x00'}, {0x0, 0x81}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}, {{@uncond, 0x0, 0xa8, 0xe8}, @common=@inet=@LOG={0x40, 'LOG\x00', 0x0, {0x0, 0x0, "59e2b655a7928de9d18f6f4ce2fcb46e2fbbb084e62170a6b5ab23bc6a36"}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x368) 03:50:03 executing program 4: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcfcc0300000c0024", 0xf, 0x400}, {&(0x7f0000010100)="02000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000040)) 03:50:03 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000c80)=@raw={'raw\x00', 0x3c1, 0x3, 0x308, 0x0, 0x150, 0x150, 0x0, 0x3, 0x238, 0x238, 0x238, 0x238, 0x238, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x11, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x3], 0x0, 0x128, 0x150, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'dummy0\x00', {0x0, 0x0, 0x3, 0x0, 0x0, 0xfffd, 0x7}}}, @common=@ipv6header={{0x28, 'ipv6header\x00'}, {0x0, 0x81}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}, {{@uncond, 0x0, 0xa8, 0xe8}, @common=@inet=@LOG={0x40, 'LOG\x00', 0x0, {0x0, 0x0, "59e2b655a7928de9d18f6f4ce2fcb46e2fbbb084e62170a6b5ab23bc6a36"}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x368) 03:50:03 executing program 5: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf040000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="10000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000040)) [ 755.493514] erofs: read_super, device -> /dev/loop2 [ 755.507552] erofs: options -> [ 755.517603] erofs: root inode @ nid 36 [ 755.533629] erofs: unmounted for /dev/loop4 03:50:03 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000c80)=@raw={'raw\x00', 0x3c1, 0x3, 0x308, 0x0, 0x150, 0x150, 0x0, 0x3, 0x238, 0x238, 0x238, 0x238, 0x238, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x3], 0x0, 0x128, 0x150, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'dummy0\x00', {0x0, 0x0, 0x3, 0x0, 0x0, 0xfffd, 0x7}}}, @common=@ipv6header={{0x28, 'ipv6header\x00'}, {0x0, 0x81}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}, {{@uncond, 0x0, 0xa8, 0xe8}, @common=@inet=@LOG={0x40, 'LOG\x00', 0x0, {0x0, 0x0, "59e2b655a7928de9d18f6f4ce2fcb46e2fbbb084e62170a6b5ab23bc6a36"}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x368) [ 755.600661] erofs: read_super, device -> /dev/loop0 [ 755.615394] erofs: options -> [ 755.624059] erofs: read_super, device -> /dev/loop3 [ 755.635061] erofs: options -> fault_injection=0x0000000000000000,noacl, [ 755.644485] erofs: root inode @ nid 36 03:50:03 executing program 2: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="100003", 0x3, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000040)) [ 755.654398] erofs: cannot read erofs superblock [ 755.658493] erofs: mounted on /dev/loop0 with opts: . [ 755.675080] erofs: read_super, device -> /dev/loop4 [ 755.683089] erofs: read_super, device -> /dev/loop2 [ 755.688114] erofs: options -> [ 755.699214] erofs: root inode @ nid 36 03:50:03 executing program 0: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="10000000c041", 0x6, 0x480}, {0x0, 0x4, 0x1000}], 0x0, &(0x7f0000000040)) 03:50:03 executing program 5 (fault-call:0 fault-nth:0): syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c025", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000040)) 03:50:03 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000c80)=@raw={'raw\x00', 0x3c1, 0x3, 0x308, 0x0, 0x150, 0x150, 0x0, 0x3, 0x238, 0x238, 0x238, 0x238, 0x238, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0xe, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x3], 0x0, 0x128, 0x150, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'dummy0\x00', {0x0, 0x0, 0x3, 0x0, 0x0, 0xfffd, 0x7}}}, @common=@ipv6header={{0x28, 'ipv6header\x00'}, {0x0, 0x81}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}, {{@uncond, 0x0, 0xa8, 0xe8}, @common=@inet=@LOG={0x40, 'LOG\x00', 0x0, {0x0, 0x0, "59e2b655a7928de9d18f6f4ce2fcb46e2fbbb084e62170a6b5ab23bc6a36"}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x368) 03:50:03 executing program 2: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="100003", 0x3, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000040)) [ 755.715146] erofs: options -> [ 755.719748] erofs: unmounted for /dev/loop0 [ 755.725123] erofs: root inode @ nid 36 [ 755.733042] erofs: mounted on /dev/loop4 with opts: . 03:50:03 executing program 5: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c025", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000040)) [ 755.848819] erofs: read_super, device -> /dev/loop3 [ 755.853897] erofs: options -> fault_injection=0x0000000000000000,noacl, [ 755.861498] erofs: cannot read erofs superblock [ 755.867134] erofs: read_super, device -> /dev/loop0 [ 755.867943] erofs: read_super, device -> /dev/loop2 [ 755.872452] erofs: options -> [ 755.879964] erofs: options -> [ 755.885877] erofs: root inode @ nid 36 [ 755.900592] erofs: root inode @ nid 36 [ 755.904792] erofs: mounted on /dev/loop0 with opts: . [ 755.904836] erofs: unmounted for /dev/loop4 03:50:03 executing program 3: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x26040000, 0x1000}], 0x0, &(0x7f0000000040)={[{@fault_injection={'fault_injection'}}, {@noacl='noacl'}]}) 03:50:03 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000c80)=@raw={'raw\x00', 0x3c1, 0x3, 0x308, 0x0, 0x150, 0x150, 0x0, 0x3, 0x238, 0x238, 0x238, 0x238, 0x238, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0xe, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x3], 0x0, 0x128, 0x150, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'dummy0\x00', {0x0, 0x0, 0x3, 0x0, 0x0, 0xfffd, 0x7}}}, @common=@ipv6header={{0x28, 'ipv6header\x00'}, {0x0, 0x81}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}, {{@uncond, 0x0, 0xa8, 0xe8}, @common=@inet=@LOG={0x40, 'LOG\x00', 0x0, {0x0, 0x0, "59e2b655a7928de9d18f6f4ce2fcb46e2fbbb084e62170a6b5ab23bc6a36"}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x368) 03:50:03 executing program 5: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x2, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c025", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000040)) 03:50:03 executing program 4: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf000500000c0024", 0xf, 0x400}, {&(0x7f0000010100)="02000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000040)) 03:50:03 executing program 2: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="100003", 0x3, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000040)) 03:50:03 executing program 5: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x3, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c025", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000040)) 03:50:03 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000c80)=@raw={'raw\x00', 0x3c1, 0x3, 0x308, 0x0, 0x150, 0x150, 0x0, 0x3, 0x238, 0x238, 0x238, 0x238, 0x238, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0xe, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x3], 0x0, 0x128, 0x150, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'dummy0\x00', {0x0, 0x0, 0x3, 0x0, 0x0, 0xfffd, 0x7}}}, @common=@ipv6header={{0x28, 'ipv6header\x00'}, {0x0, 0x81}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}, {{@uncond, 0x0, 0xa8, 0xe8}, @common=@inet=@LOG={0x40, 'LOG\x00', 0x0, {0x0, 0x0, "59e2b655a7928de9d18f6f4ce2fcb46e2fbbb084e62170a6b5ab23bc6a36"}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x368) 03:50:03 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000c80)=@raw={'raw\x00', 0x3c1, 0x3, 0x308, 0x0, 0x150, 0x150, 0x0, 0x3, 0x238, 0x238, 0x238, 0x238, 0x238, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0xe, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x3], 0x0, 0x128, 0x150, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'dummy0\x00', {0x0, 0x0, 0x3, 0x0, 0x0, 0xfffd, 0x7}}}, @common=@ipv6header={{0x28, 'ipv6header\x00'}, {0x0, 0x81}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}, {{@uncond, 0x0, 0xa8, 0xe8}, @common=@inet=@LOG={0x40, 'LOG\x00', 0x0, {0x0, 0x0, "59e2b655a7928de9d18f6f4ce2fcb46e2fbbb084e62170a6b5ab23bc6a36"}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x368) 03:50:03 executing program 0: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="10000000c041", 0x6, 0x480}, {0x0, 0x8, 0x1000}], 0x0, &(0x7f0000000040)) 03:50:03 executing program 5: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x4, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c025", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000040)) [ 756.121879] erofs: unmounted for /dev/loop0 03:50:03 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000c80)=@raw={'raw\x00', 0x3c1, 0x3, 0x308, 0x0, 0x150, 0x150, 0x0, 0x3, 0x238, 0x238, 0x238, 0x238, 0x238, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0xe, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x3], 0x0, 0x128, 0x150, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'dummy0\x00', {0x0, 0x0, 0x3, 0x0, 0x0, 0xfffd, 0x7}}}, @common=@ipv6header={{0x28, 'ipv6header\x00'}, {0x0, 0x81}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}, {{@uncond, 0x0, 0xa8, 0xe8}, @common=@inet=@LOG={0x40, 'LOG\x00', 0x0, {0x0, 0x0, "59e2b655a7928de9d18f6f4ce2fcb46e2fbbb084e62170a6b5ab23bc6a36"}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x368) 03:50:03 executing program 5: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x7, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c025", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000040)) [ 756.164177] erofs: read_super, device -> /dev/loop4 [ 756.172737] erofs: read_super, device -> /dev/loop2 [ 756.177873] erofs: options -> [ 756.178916] erofs: read_super, device -> /dev/loop3 [ 756.197192] erofs: options -> fault_injection=0x0000000000000000,noacl, [ 756.202536] erofs: options -> [ 756.215658] erofs: root inode @ nid 36 [ 756.227827] erofs: root inode @ nid 36 [ 756.231569] erofs: cannot read erofs superblock [ 756.244357] erofs: read_super, device -> /dev/loop0 [ 756.250759] erofs: mounted on /dev/loop4 with opts: . [ 756.256161] erofs: options -> [ 756.262148] erofs: root inode @ nid 36 [ 756.266780] erofs: mounted on /dev/loop0 with opts: . 03:50:03 executing program 3: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x3f000000, 0x1000}], 0x0, &(0x7f0000000040)={[{@fault_injection={'fault_injection'}}, {@noacl='noacl'}]}) 03:50:03 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000c80)=@raw={'raw\x00', 0x3c1, 0x3, 0x308, 0x0, 0x150, 0x150, 0x0, 0x3, 0x238, 0x238, 0x238, 0x238, 0x238, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0xe, 0x4a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x3], 0x0, 0x128, 0x150, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'dummy0\x00', {0x0, 0x0, 0x3, 0x0, 0x0, 0xfffd, 0x7}}}, @common=@ipv6header={{0x28, 'ipv6header\x00'}, {0x0, 0x81}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}, {{@uncond, 0x0, 0xa8, 0xe8}, @common=@inet=@LOG={0x40, 'LOG\x00', 0x0, {0x0, 0x0, "59e2b655a7928de9d18f6f4ce2fcb46e2fbbb084e62170a6b5ab23bc6a36"}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x368) 03:50:03 executing program 2: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="10000300c0", 0x5, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000040)) 03:50:03 executing program 0: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="10000000c041", 0x6, 0x480}, {0x0, 0x300, 0x1000}], 0x0, &(0x7f0000000040)) 03:50:03 executing program 4: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf009800000c0024", 0xf, 0x400}, {&(0x7f0000010100)="02000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000040)) 03:50:03 executing program 5: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x300, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c025", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000040)) [ 756.358836] erofs: unmounted for /dev/loop0 [ 756.363356] erofs: unmounted for /dev/loop4 [ 756.367929] erofs: read_super, device -> /dev/loop3 [ 756.374185] erofs: options -> fault_injection=0x0000000000000000,noacl, [ 756.386480] erofs: cannot read erofs superblock 03:50:04 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000c80)=@raw={'raw\x00', 0x3c1, 0x3, 0x308, 0x0, 0x150, 0x150, 0x0, 0x3, 0x238, 0x238, 0x238, 0x238, 0x238, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0xe, 0x60, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x3], 0x0, 0x128, 0x150, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'dummy0\x00', {0x0, 0x0, 0x3, 0x0, 0x0, 0xfffd, 0x7}}}, @common=@ipv6header={{0x28, 'ipv6header\x00'}, {0x0, 0x81}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}, {{@uncond, 0x0, 0xa8, 0xe8}, @common=@inet=@LOG={0x40, 'LOG\x00', 0x0, {0x0, 0x0, "59e2b655a7928de9d18f6f4ce2fcb46e2fbbb084e62170a6b5ab23bc6a36"}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x368) [ 756.489393] erofs: read_super, device -> /dev/loop2 [ 756.494736] erofs: options -> [ 756.498296] erofs: root inode @ nid 36 [ 756.500508] erofs: read_super, device -> /dev/loop0 [ 756.508628] erofs: options -> [ 756.523253] erofs: root inode @ nid 36 [ 756.533161] erofs: mounted on /dev/loop0 with opts: . 03:50:04 executing program 0: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="10000000c041", 0x6, 0x480}, {0x0, 0x2000, 0x1000}], 0x0, &(0x7f0000000040)) 03:50:04 executing program 5: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x700, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c025", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000040)) 03:50:04 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000c80)=@raw={'raw\x00', 0x3c1, 0x3, 0x308, 0x0, 0x150, 0x150, 0x0, 0x3, 0x238, 0x238, 0x238, 0x238, 0x238, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0xe, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x3], 0x0, 0x128, 0x150, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'dummy0\x00', {0x0, 0x0, 0x3, 0x0, 0x0, 0xfffd, 0x7}}}, @common=@ipv6header={{0x28, 'ipv6header\x00'}, {0x0, 0x81}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}, {{@uncond, 0x0, 0xa8, 0xe8}, @common=@inet=@LOG={0x40, 'LOG\x00', 0x0, {0x0, 0x0, "59e2b655a7928de9d18f6f4ce2fcb46e2fbbb084e62170a6b5ab23bc6a36"}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x368) [ 756.576096] erofs: unmounted for /dev/loop0 [ 756.585862] erofs: read_super, device -> /dev/loop4 [ 756.596394] erofs: options -> [ 756.599960] erofs: read_super, device -> /dev/loop3 [ 756.608140] erofs: options -> fault_injection=0x0000000000000000,noacl, [ 756.619434] erofs: cannot read erofs superblock 03:50:04 executing program 2: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="10000300c0", 0x5, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000040)) [ 756.626305] erofs: root inode @ nid 36 03:50:04 executing program 3: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x60000000, 0x1000}], 0x0, &(0x7f0000000040)={[{@fault_injection={'fault_injection'}}, {@noacl='noacl'}]}) [ 756.669176] erofs: mounted on /dev/loop4 with opts: . [ 756.698121] erofs: read_super, device -> /dev/loop0 03:50:04 executing program 4: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf009900000c0024", 0xf, 0x400}, {&(0x7f0000010100)="02000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000040)) 03:50:04 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000c80)=@raw={'raw\x00', 0x3c1, 0x3, 0x308, 0x0, 0x150, 0x150, 0x0, 0x3, 0x238, 0x238, 0x238, 0x238, 0x238, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0xe, 0x6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x3], 0x0, 0x128, 0x150, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'dummy0\x00', {0x0, 0x0, 0x3, 0x0, 0x0, 0xfffd, 0x7}}}, @common=@ipv6header={{0x28, 'ipv6header\x00'}, {0x0, 0x81}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}, {{@uncond, 0x0, 0xa8, 0xe8}, @common=@inet=@LOG={0x40, 'LOG\x00', 0x0, {0x0, 0x0, "59e2b655a7928de9d18f6f4ce2fcb46e2fbbb084e62170a6b5ab23bc6a36"}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x368) 03:50:04 executing program 5: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x2000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c025", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000040)) [ 756.724821] erofs: options -> [ 756.742787] erofs: unmounted for /dev/loop4 [ 756.744084] erofs: root inode @ nid 36 [ 756.767591] erofs: mounted on /dev/loop0 with opts: . 03:50:04 executing program 0: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="10000000c041", 0x6, 0x480}, {0x0, 0xeffd, 0x1000}], 0x0, &(0x7f0000000040)) [ 756.793498] erofs: read_super, device -> /dev/loop2 [ 756.812014] erofs: read_super, device -> /dev/loop3 [ 756.821282] erofs: options -> [ 756.828077] erofs: root inode @ nid 36 [ 756.833159] erofs: options -> fault_injection=0x0000000000000000,noacl, 03:50:04 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000c80)=@raw={'raw\x00', 0x3c1, 0x3, 0x308, 0x0, 0x150, 0x150, 0x0, 0x3, 0x238, 0x238, 0x238, 0x238, 0x238, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0xe, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x3], 0x0, 0x128, 0x150, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'dummy0\x00', {0x0, 0x0, 0x3, 0x0, 0x0, 0xfffd, 0x7}}}, @common=@ipv6header={{0x28, 'ipv6header\x00'}, {0x0, 0x81}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}, {{@uncond, 0x0, 0xa8, 0xe8}, @common=@inet=@LOG={0x40, 'LOG\x00', 0x0, {0x0, 0x0, "59e2b655a7928de9d18f6f4ce2fcb46e2fbbb084e62170a6b5ab23bc6a36"}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x368) 03:50:04 executing program 2: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="10000300c0", 0x5, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000040)) [ 756.863605] erofs: unmounted for /dev/loop0 [ 756.865489] erofs: cannot read erofs superblock 03:50:04 executing program 5: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0xeffd, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c025", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000040)) [ 756.924654] erofs: read_super, device -> /dev/loop4 [ 756.935578] erofs: options -> [ 756.944550] erofs: root inode @ nid 36 [ 756.957410] erofs: mounted on /dev/loop4 with opts: . [ 756.969744] erofs: read_super, device -> /dev/loop2 03:50:04 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000c80)=@raw={'raw\x00', 0x3c1, 0x3, 0x308, 0x0, 0x150, 0x150, 0x0, 0x3, 0x238, 0x238, 0x238, 0x238, 0x238, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0xe, 0x9e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x3], 0x0, 0x128, 0x150, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'dummy0\x00', {0x0, 0x0, 0x3, 0x0, 0x0, 0xfffd, 0x7}}}, @common=@ipv6header={{0x28, 'ipv6header\x00'}, {0x0, 0x81}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}, {{@uncond, 0x0, 0xa8, 0xe8}, @common=@inet=@LOG={0x40, 'LOG\x00', 0x0, {0x0, 0x0, "59e2b655a7928de9d18f6f4ce2fcb46e2fbbb084e62170a6b5ab23bc6a36"}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x368) 03:50:04 executing program 2: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="10000300c041", 0x6}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000040)) [ 756.979521] erofs: options -> [ 756.983653] erofs: root inode @ nid 36 [ 757.022309] erofs: read_super, device -> /dev/loop0 [ 757.029172] erofs: options -> [ 757.033002] erofs: root inode @ nid 36 [ 757.038330] erofs: mounted on /dev/loop0 with opts: . 03:50:04 executing program 3: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x8cffffff, 0x1000}], 0x0, &(0x7f0000000040)={[{@fault_injection={'fault_injection'}}, {@noacl='noacl'}]}) [ 757.065599] erofs: read_super, device -> /dev/loop2 03:50:04 executing program 0: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="10000000c041", 0x6, 0x480}, {0x0, 0xfdef, 0x1000}], 0x0, &(0x7f0000000040)) 03:50:04 executing program 4: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf197de0720c0024", 0xf, 0x400}, {&(0x7f0000010100)="02000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000040)) 03:50:04 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000c80)=@raw={'raw\x00', 0x3c1, 0x3, 0x308, 0x0, 0x150, 0x150, 0x0, 0x3, 0x238, 0x238, 0x238, 0x238, 0x238, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0xe, 0xa6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x3], 0x0, 0x128, 0x150, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'dummy0\x00', {0x0, 0x0, 0x3, 0x0, 0x0, 0xfffd, 0x7}}}, @common=@ipv6header={{0x28, 'ipv6header\x00'}, {0x0, 0x81}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}, {{@uncond, 0x0, 0xa8, 0xe8}, @common=@inet=@LOG={0x40, 'LOG\x00', 0x0, {0x0, 0x0, "59e2b655a7928de9d18f6f4ce2fcb46e2fbbb084e62170a6b5ab23bc6a36"}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x368) 03:50:04 executing program 5: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0xfdef, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c025", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000040)) [ 757.088904] erofs: options -> [ 757.105219] erofs: unmounted for /dev/loop0 [ 757.109679] erofs: unmounted for /dev/loop4 [ 757.122025] erofs: root inode @ nid 36 03:50:04 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000c80)=@raw={'raw\x00', 0x3c1, 0x3, 0x308, 0x0, 0x150, 0x150, 0x0, 0x3, 0x238, 0x238, 0x238, 0x238, 0x238, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0xe, 0xb0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x3], 0x0, 0x128, 0x150, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'dummy0\x00', {0x0, 0x0, 0x3, 0x0, 0x0, 0xfffd, 0x7}}}, @common=@ipv6header={{0x28, 'ipv6header\x00'}, {0x0, 0x81}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}, {{@uncond, 0x0, 0xa8, 0xe8}, @common=@inet=@LOG={0x40, 'LOG\x00', 0x0, {0x0, 0x0, "59e2b655a7928de9d18f6f4ce2fcb46e2fbbb084e62170a6b5ab23bc6a36"}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x368) 03:50:04 executing program 5: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c025", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000040)) 03:50:04 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000c80)=@raw={'raw\x00', 0x3c1, 0x3, 0x308, 0x0, 0x150, 0x150, 0x0, 0x3, 0x238, 0x238, 0x238, 0x238, 0x238, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0xe, 0xca, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x3], 0x0, 0x128, 0x150, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'dummy0\x00', {0x0, 0x0, 0x3, 0x0, 0x0, 0xfffd, 0x7}}}, @common=@ipv6header={{0x28, 'ipv6header\x00'}, {0x0, 0x81}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}, {{@uncond, 0x0, 0xa8, 0xe8}, @common=@inet=@LOG={0x40, 'LOG\x00', 0x0, {0x0, 0x0, "59e2b655a7928de9d18f6f4ce2fcb46e2fbbb084e62170a6b5ab23bc6a36"}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x368) [ 757.224381] erofs: read_super, device -> /dev/loop3 [ 757.238320] erofs: options -> fault_injection=0x0000000000000000,noacl, [ 757.249085] erofs: read_super, device -> /dev/loop4 [ 757.254294] erofs: options -> [ 757.257541] erofs: root inode @ nid 36 [ 757.258731] erofs: read_super, device -> /dev/loop0 [ 757.269770] erofs: options -> 03:50:04 executing program 2: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="10000300c041", 0x6}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000040)) 03:50:04 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000c80)=@raw={'raw\x00', 0x3c1, 0x3, 0x308, 0x0, 0x150, 0x150, 0x0, 0x3, 0x238, 0x238, 0x238, 0x238, 0x238, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x3], 0x0, 0x128, 0x150, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'dummy0\x00', {0x0, 0x0, 0x3, 0x0, 0x0, 0xfffd, 0x7}}}, @common=@ipv6header={{0x28, 'ipv6header\x00'}, {0x0, 0x81}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}, {{@uncond, 0x0, 0xa8, 0xe8}, @common=@inet=@LOG={0x40, 'LOG\x00', 0x0, {0x0, 0x0, "59e2b655a7928de9d18f6f4ce2fcb46e2fbbb084e62170a6b5ab23bc6a36"}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x368) [ 757.273428] erofs: root inode @ nid 36 [ 757.278959] erofs: mounted on /dev/loop4 with opts: . [ 757.285429] erofs: cannot read erofs superblock [ 757.299840] erofs: mounted on /dev/loop0 with opts: . 03:50:04 executing program 4: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf1f7de0720c0024", 0xf, 0x400}, {&(0x7f0000010100)="02000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000040)) 03:50:04 executing program 5: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x1000000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c025", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000040)) [ 757.341273] erofs: unmounted for /dev/loop4 [ 757.374207] erofs: unmounted for /dev/loop0 [ 757.434163] erofs: read_super, device -> /dev/loop2 [ 757.439613] erofs: read_super, device -> /dev/loop3 [ 757.444643] erofs: options -> fault_injection=0x0000000000000000,noacl, [ 757.457429] erofs: options -> [ 757.464384] erofs: cannot read erofs superblock [ 757.467659] erofs: root inode @ nid 36 [ 757.471914] erofs: read_super, device -> /dev/loop4 [ 757.478052] erofs: options -> [ 757.482323] erofs: root inode @ nid 36 [ 757.486441] erofs: mounted on /dev/loop4 with opts: . 03:50:05 executing program 3: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0xc0ed0000, 0x1000}], 0x0, &(0x7f0000000040)={[{@fault_injection={'fault_injection'}}, {@noacl='noacl'}]}) 03:50:05 executing program 0: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="10000000c041", 0x6, 0x480}, {0x0, 0x200000, 0x1000}], 0x0, &(0x7f0000000040)) 03:50:05 executing program 5: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x2000000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c025", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000040)) 03:50:05 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000c80)=@raw={'raw\x00', 0x3c1, 0x3, 0x308, 0x0, 0x150, 0x150, 0x0, 0x3, 0x238, 0x238, 0x238, 0x238, 0x238, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0xe, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x3], 0x0, 0x128, 0x150, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'dummy0\x00', {0x0, 0x0, 0x3, 0x0, 0x0, 0xfffd, 0x7}}}, @common=@ipv6header={{0x28, 'ipv6header\x00'}, {0x0, 0x81}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}, {{@uncond, 0x0, 0xa8, 0xe8}, @common=@inet=@LOG={0x40, 'LOG\x00', 0x0, {0x0, 0x0, "59e2b655a7928de9d18f6f4ce2fcb46e2fbbb084e62170a6b5ab23bc6a36"}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x368) 03:50:05 executing program 2: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="10000300c041", 0x6}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000040)) 03:50:05 executing program 4: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf1fffffff0c0024", 0xf, 0x400}, {&(0x7f0000010100)="02000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000040)) [ 757.566105] erofs: unmounted for /dev/loop4 03:50:05 executing program 5: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x3000000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c025", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000040)) 03:50:05 executing program 5: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x4000000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c025", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000040)) [ 757.637358] erofs: read_super, device -> /dev/loop0 [ 757.648317] erofs: options -> [ 757.654033] erofs: root inode @ nid 36 [ 757.669590] erofs: mounted on /dev/loop0 with opts: . [ 757.679802] erofs: read_super, device -> /dev/loop2 03:50:05 executing program 5: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x7000000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c025", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000040)) 03:50:05 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000c80)=@raw={'raw\x00', 0x3c1, 0x3, 0x308, 0x0, 0x150, 0x150, 0x0, 0x3, 0x238, 0x238, 0x238, 0x238, 0x238, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0xe, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x3], 0x0, 0x128, 0x150, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'dummy0\x00', {0x0, 0x0, 0x3, 0x0, 0x0, 0xfffd, 0x7}}}, @common=@ipv6header={{0x28, 'ipv6header\x00'}, {0x0, 0x81}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}, {{@uncond, 0x0, 0xa8, 0xe8}, @common=@inet=@LOG={0x40, 'LOG\x00', 0x0, {0x0, 0x0, "59e2b655a7928de9d18f6f4ce2fcb46e2fbbb084e62170a6b5ab23bc6a36"}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x368) 03:50:05 executing program 0: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="10000000c041", 0x6, 0x480}, {0x0, 0x1000000, 0x1000}], 0x0, &(0x7f0000000040)) [ 757.685063] erofs: read_super, device -> /dev/loop4 [ 757.690261] erofs: options -> [ 757.693597] erofs: options -> [ 757.697730] erofs: root inode @ nid 36 [ 757.704456] erofs: root inode @ nid 36 [ 757.712406] erofs: mounted on /dev/loop4 with opts: . 03:50:05 executing program 2: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010100)="10000300c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000040)) [ 757.737440] erofs: unmounted for /dev/loop0 [ 757.744900] erofs: read_super, device -> /dev/loop3 [ 757.759831] erofs: options -> fault_injection=0x0000000000000000,noacl, [ 757.773930] erofs: cannot read erofs superblock [ 757.812516] erofs: read_super, device -> /dev/loop0 [ 757.842006] erofs: options -> [ 757.848586] erofs: root inode @ nid 36 [ 757.852622] erofs: unmounted for /dev/loop4 [ 757.853480] erofs: mounted on /dev/loop0 with opts: . [ 757.918634] erofs: read_super, device -> /dev/loop2 [ 757.923687] erofs: options -> [ 757.931189] erofs: read_super, device -> /dev/loop3 [ 757.937559] erofs: cannot find valid erofs superblock [ 757.946697] erofs: options -> fault_injection=0x0000000000000000,noacl, [ 757.956502] erofs: cannot read erofs superblock [ 757.968108] erofs: unmounted for /dev/loop0 03:50:05 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000c80)=@raw={'raw\x00', 0x3c1, 0x3, 0x308, 0x0, 0x150, 0x150, 0x0, 0x3, 0x238, 0x238, 0x238, 0x238, 0x238, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0xe, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x3], 0x0, 0x128, 0x150, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'dummy0\x00', {0x0, 0x0, 0x3, 0x0, 0x0, 0xfffd, 0x7}}}, @common=@ipv6header={{0x28, 'ipv6header\x00'}, {0x0, 0x81}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}, {{@uncond, 0x0, 0xa8, 0xe8}, @common=@inet=@LOG={0x40, 'LOG\x00', 0x0, {0x0, 0x0, "59e2b655a7928de9d18f6f4ce2fcb46e2fbbb084e62170a6b5ab23bc6a36"}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x368) 03:50:05 executing program 3: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0xe2260000, 0x1000}], 0x0, &(0x7f0000000040)={[{@fault_injection={'fault_injection'}}, {@noacl='noacl'}]}) 03:50:05 executing program 5: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0xeffdffff, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c025", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000040)) 03:50:05 executing program 0: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="10000000c041", 0x6, 0x480}, {0x0, 0x2000000, 0x1000}], 0x0, &(0x7f0000000040)) 03:50:05 executing program 4: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf01000000010024", 0xf, 0x400}, {&(0x7f0000010100)="02000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000040)) 03:50:05 executing program 5: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0xf6ffffff, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c025", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000040)) 03:50:05 executing program 2: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010100)="10000300c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000040)) 03:50:05 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000c80)=@raw={'raw\x00', 0x3c1, 0x3, 0x308, 0x0, 0x150, 0x150, 0x0, 0x3, 0x238, 0x238, 0x238, 0x238, 0x238, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0xe, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x3], 0x0, 0x128, 0x150, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'dummy0\x00', {0x0, 0x0, 0x3, 0x0, 0x0, 0xfffd, 0x7}}}, @common=@ipv6header={{0x28, 'ipv6header\x00'}, {0x0, 0x81}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}, {{@uncond, 0x0, 0xa8, 0xe8}, @common=@inet=@LOG={0x40, 'LOG\x00', 0x0, {0x0, 0x0, "59e2b655a7928de9d18f6f4ce2fcb46e2fbbb084e62170a6b5ab23bc6a36"}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x368) [ 758.102212] erofs: read_super, device -> /dev/loop4 [ 758.107543] erofs: read_super, device -> /dev/loop0 [ 758.112741] erofs: options -> [ 758.117177] erofs: options -> [ 758.125098] erofs: blksize 2 isn't supported on this platform [ 758.137193] erofs: root inode @ nid 36 03:50:05 executing program 5: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0xfcfdffff, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c025", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000040)) [ 758.157020] erofs: mounted on /dev/loop0 with opts: . 03:50:05 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000c80)=@raw={'raw\x00', 0x3c1, 0x3, 0x308, 0x0, 0x150, 0x150, 0x0, 0x3, 0x238, 0x238, 0x238, 0x238, 0x238, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0xe, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x3], 0x0, 0x128, 0x150, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'dummy0\x00', {0x0, 0x0, 0x3, 0x0, 0x0, 0xfffd, 0x7}}}, @common=@ipv6header={{0x28, 'ipv6header\x00'}, {0x0, 0x81}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}, {{@uncond, 0x0, 0xa8, 0xe8}, @common=@inet=@LOG={0x40, 'LOG\x00', 0x0, {0x0, 0x0, "59e2b655a7928de9d18f6f4ce2fcb46e2fbbb084e62170a6b5ab23bc6a36"}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x368) 03:50:05 executing program 0: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="10000000c041", 0x6, 0x480}, {0x0, 0x3000000, 0x1000}], 0x0, &(0x7f0000000040)) [ 758.218382] erofs: read_super, device -> /dev/loop3 [ 758.218795] erofs: read_super, device -> /dev/loop2 [ 758.228948] erofs: options -> fault_injection=0x0000000000000000,noacl, [ 758.235746] erofs: cannot read erofs superblock [ 758.246558] erofs: options -> [ 758.250703] erofs: unmounted for /dev/loop0 [ 758.251105] erofs: cannot find valid erofs superblock [ 758.261777] erofs: read_super, device -> /dev/loop4 03:50:05 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000c80)=@raw={'raw\x00', 0x3c1, 0x3, 0x308, 0x0, 0x150, 0x150, 0x0, 0x3, 0x238, 0x238, 0x238, 0x238, 0x238, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0xe, 0x0, 0x4a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x3], 0x0, 0x128, 0x150, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'dummy0\x00', {0x0, 0x0, 0x3, 0x0, 0x0, 0xfffd, 0x7}}}, @common=@ipv6header={{0x28, 'ipv6header\x00'}, {0x0, 0x81}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}, {{@uncond, 0x0, 0xa8, 0xe8}, @common=@inet=@LOG={0x40, 'LOG\x00', 0x0, {0x0, 0x0, "59e2b655a7928de9d18f6f4ce2fcb46e2fbbb084e62170a6b5ab23bc6a36"}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x368) [ 758.285403] erofs: options -> [ 758.293308] erofs: blksize 2 isn't supported on this platform [ 758.322683] erofs: read_super, device -> /dev/loop3 03:50:05 executing program 5: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0xfeffffff, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c025", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000040)) [ 758.329329] erofs: options -> fault_injection=0x0000000000000000,noacl, [ 758.336274] erofs: cannot read erofs superblock [ 758.406966] erofs: read_super, device -> /dev/loop0 03:50:05 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000c80)=@raw={'raw\x00', 0x3c1, 0x3, 0x308, 0x0, 0x150, 0x150, 0x0, 0x3, 0x238, 0x238, 0x238, 0x238, 0x238, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0xe, 0x0, 0x60, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x3], 0x0, 0x128, 0x150, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'dummy0\x00', {0x0, 0x0, 0x3, 0x0, 0x0, 0xfffd, 0x7}}}, @common=@ipv6header={{0x28, 'ipv6header\x00'}, {0x0, 0x81}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}, {{@uncond, 0x0, 0xa8, 0xe8}, @common=@inet=@LOG={0x40, 'LOG\x00', 0x0, {0x0, 0x0, "59e2b655a7928de9d18f6f4ce2fcb46e2fbbb084e62170a6b5ab23bc6a36"}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x368) 03:50:05 executing program 3: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0xe9260000, 0x1000}], 0x0, &(0x7f0000000040)={[{@fault_injection={'fault_injection'}}, {@noacl='noacl'}]}) 03:50:05 executing program 5: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0xfffffdef, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c025", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000040)) 03:50:05 executing program 4: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010200000c0024", 0xf, 0x400}, {&(0x7f0000010100)="02000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000040)) 03:50:05 executing program 2: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010100)="10000300c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000040)) 03:50:06 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000c80)=@raw={'raw\x00', 0x3c1, 0x3, 0x308, 0x0, 0x150, 0x150, 0x0, 0x3, 0x238, 0x238, 0x238, 0x238, 0x238, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0xe, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x3], 0x0, 0x128, 0x150, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'dummy0\x00', {0x0, 0x0, 0x3, 0x0, 0x0, 0xfffd, 0x7}}}, @common=@ipv6header={{0x28, 'ipv6header\x00'}, {0x0, 0x81}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}, {{@uncond, 0x0, 0xa8, 0xe8}, @common=@inet=@LOG={0x40, 'LOG\x00', 0x0, {0x0, 0x0, "59e2b655a7928de9d18f6f4ce2fcb46e2fbbb084e62170a6b5ab23bc6a36"}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x368) 03:50:06 executing program 5: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0xfffffdfc, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c025", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000040)) [ 758.428707] erofs: options -> [ 758.435201] erofs: root inode @ nid 36 [ 758.452143] erofs: mounted on /dev/loop0 with opts: . [ 758.525226] erofs: read_super, device -> /dev/loop4 [ 758.541492] erofs: read_super, device -> /dev/loop3 [ 758.549147] erofs: options -> fault_injection=0x0000000000000000,noacl, [ 758.564728] erofs: options -> [ 758.566018] erofs: cannot read erofs superblock 03:50:06 executing program 0: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="10000000c041", 0x6, 0x480}, {0x0, 0x4000000, 0x1000}], 0x0, &(0x7f0000000040)) 03:50:06 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000c80)=@raw={'raw\x00', 0x3c1, 0x3, 0x308, 0x0, 0x150, 0x150, 0x0, 0x3, 0x238, 0x238, 0x238, 0x238, 0x238, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0xe, 0x0, 0x6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x3], 0x0, 0x128, 0x150, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'dummy0\x00', {0x0, 0x0, 0x3, 0x0, 0x0, 0xfffd, 0x7}}}, @common=@ipv6header={{0x28, 'ipv6header\x00'}, {0x0, 0x81}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}, {{@uncond, 0x0, 0xa8, 0xe8}, @common=@inet=@LOG={0x40, 'LOG\x00', 0x0, {0x0, 0x0, "59e2b655a7928de9d18f6f4ce2fcb46e2fbbb084e62170a6b5ab23bc6a36"}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x368) [ 758.578131] erofs: root inode @ nid 36 [ 758.583920] erofs: read_super, device -> /dev/loop2 [ 758.594995] erofs: mounted on /dev/loop4 with opts: . [ 758.603117] erofs: options -> [ 758.610953] erofs: cannot find valid erofs superblock [ 758.621400] erofs: unmounted for /dev/loop0 03:50:06 executing program 4: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010300000c0024", 0xf, 0x400}, {&(0x7f0000010100)="02000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000040)) 03:50:06 executing program 2: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{0x0, 0x0, 0x400}, {&(0x7f0000010100)="10000300c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000040)) 03:50:06 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000c80)=@raw={'raw\x00', 0x3c1, 0x3, 0x308, 0x0, 0x150, 0x150, 0x0, 0x3, 0x238, 0x238, 0x238, 0x238, 0x238, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0xe, 0x0, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x3], 0x0, 0x128, 0x150, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'dummy0\x00', {0x0, 0x0, 0x3, 0x0, 0x0, 0xfffd, 0x7}}}, @common=@ipv6header={{0x28, 'ipv6header\x00'}, {0x0, 0x81}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}, {{@uncond, 0x0, 0xa8, 0xe8}, @common=@inet=@LOG={0x40, 'LOG\x00', 0x0, {0x0, 0x0, "59e2b655a7928de9d18f6f4ce2fcb46e2fbbb084e62170a6b5ab23bc6a36"}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x368) 03:50:06 executing program 5: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0xfffffff6, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c025", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000040)) [ 758.687118] erofs: unmounted for /dev/loop4 [ 758.704446] erofs: read_super, device -> /dev/loop3 [ 758.711454] erofs: options -> fault_injection=0x0000000000000000,noacl, [ 758.718262] erofs: cannot read erofs superblock 03:50:06 executing program 3: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0xf6ffffff, 0x1000}], 0x0, &(0x7f0000000040)={[{@fault_injection={'fault_injection'}}, {@noacl='noacl'}]}) 03:50:06 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000c80)=@raw={'raw\x00', 0x3c1, 0x3, 0x308, 0x0, 0x150, 0x150, 0x0, 0x3, 0x238, 0x238, 0x238, 0x238, 0x238, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0xe, 0x0, 0x9e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x3], 0x0, 0x128, 0x150, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'dummy0\x00', {0x0, 0x0, 0x3, 0x0, 0x0, 0xfffd, 0x7}}}, @common=@ipv6header={{0x28, 'ipv6header\x00'}, {0x0, 0x81}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}, {{@uncond, 0x0, 0xa8, 0xe8}, @common=@inet=@LOG={0x40, 'LOG\x00', 0x0, {0x0, 0x0, "59e2b655a7928de9d18f6f4ce2fcb46e2fbbb084e62170a6b5ab23bc6a36"}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x368) 03:50:06 executing program 5: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0xfffffffe, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c025", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000040)) [ 758.811435] erofs: read_super, device -> /dev/loop0 [ 758.816482] erofs: options -> [ 758.824787] erofs: root inode @ nid 36 [ 758.831384] erofs: mounted on /dev/loop0 with opts: . 03:50:06 executing program 5: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x7ffffffff000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c025", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000040)) [ 758.869582] erofs: read_super, device -> /dev/loop4 [ 758.876491] erofs: options -> [ 758.881702] erofs: root inode @ nid 36 [ 758.886038] erofs: mounted on /dev/loop4 with opts: . [ 758.906843] erofs: read_super, device -> /dev/loop2 [ 758.912439] erofs: options -> [ 758.915883] erofs: cannot find valid erofs superblock 03:50:06 executing program 4: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010400000c0024", 0xf, 0x400}, {&(0x7f0000010100)="02000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000040)) 03:50:06 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000c80)=@raw={'raw\x00', 0x3c1, 0x3, 0x308, 0x0, 0x150, 0x150, 0x0, 0x3, 0x238, 0x238, 0x238, 0x238, 0x238, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0xe, 0x0, 0xa6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x3], 0x0, 0x128, 0x150, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'dummy0\x00', {0x0, 0x0, 0x3, 0x0, 0x0, 0xfffd, 0x7}}}, @common=@ipv6header={{0x28, 'ipv6header\x00'}, {0x0, 0x81}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}, {{@uncond, 0x0, 0xa8, 0xe8}, @common=@inet=@LOG={0x40, 'LOG\x00', 0x0, {0x0, 0x0, "59e2b655a7928de9d18f6f4ce2fcb46e2fbbb084e62170a6b5ab23bc6a36"}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x368) 03:50:06 executing program 0: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="10000000c041", 0x6, 0x480}, {0x0, 0x8000000, 0x1000}], 0x0, &(0x7f0000000040)) 03:50:06 executing program 2: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{0x0, 0x0, 0x400}, {&(0x7f0000010100)="10000300c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000040)) 03:50:06 executing program 5: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x1000000000000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c025", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000040)) [ 758.970511] erofs: unmounted for /dev/loop4 [ 758.977662] erofs: read_super, device -> /dev/loop3 [ 758.999897] erofs: options -> fault_injection=0x0000000000000000,noacl, [ 759.006767] erofs: cannot read erofs superblock [ 759.007848] erofs: unmounted for /dev/loop0 03:50:06 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000c80)=@raw={'raw\x00', 0x3c1, 0x3, 0x308, 0x0, 0x150, 0x150, 0x0, 0x3, 0x238, 0x238, 0x238, 0x238, 0x238, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0xe, 0x0, 0xb0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x3], 0x0, 0x128, 0x150, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'dummy0\x00', {0x0, 0x0, 0x3, 0x0, 0x0, 0xfffd, 0x7}}}, @common=@ipv6header={{0x28, 'ipv6header\x00'}, {0x0, 0x81}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}, {{@uncond, 0x0, 0xa8, 0xe8}, @common=@inet=@LOG={0x40, 'LOG\x00', 0x0, {0x0, 0x0, "59e2b655a7928de9d18f6f4ce2fcb46e2fbbb084e62170a6b5ab23bc6a36"}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x368) [ 759.089365] erofs: read_super, device -> /dev/loop3 [ 759.094542] erofs: options -> fault_injection=0x0000000000000000,noacl, [ 759.105349] erofs: cannot read erofs superblock [ 759.118578] erofs: read_super, device -> /dev/loop2 [ 759.123608] erofs: options -> 03:50:06 executing program 5: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x7ffffffffffff, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c025", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000040)) 03:50:06 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000c80)=@raw={'raw\x00', 0x3c1, 0x3, 0x308, 0x0, 0x150, 0x150, 0x0, 0x3, 0x238, 0x238, 0x238, 0x238, 0x238, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0xe, 0x0, 0xca, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x3], 0x0, 0x128, 0x150, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'dummy0\x00', {0x0, 0x0, 0x3, 0x0, 0x0, 0xfffd, 0x7}}}, @common=@ipv6header={{0x28, 'ipv6header\x00'}, {0x0, 0x81}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}, {{@uncond, 0x0, 0xa8, 0xe8}, @common=@inet=@LOG={0x40, 'LOG\x00', 0x0, {0x0, 0x0, "59e2b655a7928de9d18f6f4ce2fcb46e2fbbb084e62170a6b5ab23bc6a36"}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x368) 03:50:06 executing program 3: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0xf7030000, 0x1000}], 0x0, &(0x7f0000000040)={[{@fault_injection={'fault_injection'}}, {@noacl='noacl'}]}) [ 759.137710] erofs: cannot find valid erofs superblock [ 759.158977] erofs: read_super, device -> /dev/loop4 [ 759.165224] erofs: options -> [ 759.184393] erofs: root inode @ nid 36 [ 759.193288] erofs: mounted on /dev/loop4 with opts: . [ 759.200169] erofs: read_super, device -> /dev/loop0 [ 759.216176] erofs: options -> [ 759.225858] erofs: root inode @ nid 36 03:50:06 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000c80)=@raw={'raw\x00', 0x3c1, 0x3, 0x308, 0x0, 0x150, 0x150, 0x0, 0x3, 0x238, 0x238, 0x238, 0x238, 0x238, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x3], 0x0, 0x128, 0x150, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'dummy0\x00', {0x0, 0x0, 0x3, 0x0, 0x0, 0xfffd, 0x7}}}, @common=@ipv6header={{0x28, 'ipv6header\x00'}, {0x0, 0x81}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}, {{@uncond, 0x0, 0xa8, 0xe8}, @common=@inet=@LOG={0x40, 'LOG\x00', 0x0, {0x0, 0x0, "59e2b655a7928de9d18f6f4ce2fcb46e2fbbb084e62170a6b5ab23bc6a36"}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x368) 03:50:06 executing program 4: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010500000c0024", 0xf, 0x400}, {&(0x7f0000010100)="02000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000040)) [ 759.247738] erofs: mounted on /dev/loop0 with opts: . 03:50:06 executing program 2: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{0x0, 0x0, 0x400}, {&(0x7f0000010100)="10000300c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000040)) [ 759.269773] erofs: unmounted for /dev/loop4 03:50:06 executing program 5: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x20000000000000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c025", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000040)) 03:50:06 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000c80)=@raw={'raw\x00', 0x3c1, 0x3, 0x308, 0x0, 0x150, 0x150, 0x0, 0x3, 0x238, 0x238, 0x238, 0x238, 0x238, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0xe, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x3], 0x0, 0x128, 0x150, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'dummy0\x00', {0x0, 0x0, 0x3, 0x0, 0x0, 0xfffd, 0x7}}}, @common=@ipv6header={{0x28, 'ipv6header\x00'}, {0x0, 0x81}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}, {{@uncond, 0x0, 0xa8, 0xe8}, @common=@inet=@LOG={0x40, 'LOG\x00', 0x0, {0x0, 0x0, "59e2b655a7928de9d18f6f4ce2fcb46e2fbbb084e62170a6b5ab23bc6a36"}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x368) [ 759.352875] erofs: read_super, device -> /dev/loop3 [ 759.356505] erofs: read_super, device -> /dev/loop2 [ 759.357928] erofs: options -> fault_injection=0x0000000000000000,noacl, [ 759.373005] erofs: options -> 03:50:06 executing program 0: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="10000000c041", 0x6, 0x480}, {0x0, 0xeffdffff, 0x1000}], 0x0, &(0x7f0000000040)) [ 759.399423] erofs: read_super, device -> /dev/loop4 [ 759.401044] erofs: cannot read erofs superblock [ 759.415832] erofs: options -> [ 759.420055] erofs: cannot find valid erofs superblock [ 759.426138] erofs: unmounted for /dev/loop0 [ 759.433014] erofs: root inode @ nid 36 [ 759.439969] erofs: mounted on /dev/loop4 with opts: . 03:50:07 executing program 2: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000), 0x0, 0x400}, {&(0x7f0000010100)="10000300c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000040)) 03:50:07 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000c80)=@raw={'raw\x00', 0x3c1, 0x3, 0x308, 0x0, 0x150, 0x150, 0x0, 0x3, 0x238, 0x238, 0x238, 0x238, 0x238, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0xe, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x3], 0x0, 0x128, 0x150, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'dummy0\x00', {0x0, 0x0, 0x3, 0x0, 0x0, 0xfffd, 0x7}}}, @common=@ipv6header={{0x28, 'ipv6header\x00'}, {0x0, 0x81}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}, {{@uncond, 0x0, 0xa8, 0xe8}, @common=@inet=@LOG={0x40, 'LOG\x00', 0x0, {0x0, 0x0, "59e2b655a7928de9d18f6f4ce2fcb46e2fbbb084e62170a6b5ab23bc6a36"}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x368) 03:50:07 executing program 5: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0xf0ffffff7f0000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c025", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000040)) 03:50:07 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000c80)=@raw={'raw\x00', 0x3c1, 0x3, 0x308, 0x0, 0x150, 0x150, 0x0, 0x3, 0x238, 0x238, 0x238, 0x238, 0x238, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0xe, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x3], 0x0, 0x128, 0x150, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'dummy0\x00', {0x0, 0x0, 0x3, 0x0, 0x0, 0xfffd, 0x7}}}, @common=@ipv6header={{0x28, 'ipv6header\x00'}, {0x0, 0x81}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}, {{@uncond, 0x0, 0xa8, 0xe8}, @common=@inet=@LOG={0x40, 'LOG\x00', 0x0, {0x0, 0x0, "59e2b655a7928de9d18f6f4ce2fcb46e2fbbb084e62170a6b5ab23bc6a36"}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x368) 03:50:07 executing program 5: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x100000000000000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c025", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000040)) [ 759.549399] erofs: read_super, device -> /dev/loop0 [ 759.554639] erofs: options -> [ 759.558568] erofs: read_super, device -> /dev/loop3 [ 759.561298] erofs: cannot read erofs superblock [ 759.563592] erofs: options -> fault_injection=0x0000000000000000,noacl, [ 759.563635] erofs: cannot read erofs superblock 03:50:07 executing program 3: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0xfa030000, 0x1000}], 0x0, &(0x7f0000000040)={[{@fault_injection={'fault_injection'}}, {@noacl='noacl'}]}) 03:50:07 executing program 4: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010600000c0024", 0xf, 0x400}, {&(0x7f0000010100)="02000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000040)) [ 759.637031] erofs: unmounted for /dev/loop4 03:50:07 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000c80)=@raw={'raw\x00', 0x3c1, 0x3, 0x308, 0x0, 0x150, 0x150, 0x0, 0x3, 0x238, 0x238, 0x238, 0x238, 0x238, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0xe, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x3], 0x0, 0x128, 0x150, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'dummy0\x00', {0x0, 0x0, 0x3, 0x0, 0x0, 0xfffd, 0x7}}}, @common=@ipv6header={{0x28, 'ipv6header\x00'}, {0x0, 0x81}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}, {{@uncond, 0x0, 0xa8, 0xe8}, @common=@inet=@LOG={0x40, 'LOG\x00', 0x0, {0x0, 0x0, "59e2b655a7928de9d18f6f4ce2fcb46e2fbbb084e62170a6b5ab23bc6a36"}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x368) 03:50:07 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000c80)=@raw={'raw\x00', 0x3c1, 0x3, 0x308, 0x0, 0x150, 0x150, 0x0, 0x3, 0x238, 0x238, 0x238, 0x238, 0x238, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0xe, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x3], 0x0, 0x128, 0x150, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'dummy0\x00', {0x0, 0x0, 0x3, 0x0, 0x0, 0xfffd, 0x7}}}, @common=@ipv6header={{0x28, 'ipv6header\x00'}, {0x0, 0x81}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}, {{@uncond, 0x0, 0xa8, 0xe8}, @common=@inet=@LOG={0x40, 'LOG\x00', 0x0, {0x0, 0x0, "59e2b655a7928de9d18f6f4ce2fcb46e2fbbb084e62170a6b5ab23bc6a36"}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x368) 03:50:07 executing program 5: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x200000000000000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c025", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000040)) [ 759.669888] erofs: read_super, device -> /dev/loop2 [ 759.675337] erofs: options -> [ 759.680530] erofs: cannot find valid erofs superblock 03:50:07 executing program 5: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x300000000000000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c025", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000040)) [ 759.828714] erofs: read_super, device -> /dev/loop3 [ 759.828731] erofs: read_super, device -> /dev/loop0 [ 759.833872] erofs: options -> fault_injection=0x0000000000000000,noacl, [ 759.868226] erofs: cannot read erofs superblock [ 759.876252] erofs: read_super, device -> /dev/loop4 [ 759.882015] erofs: options -> [ 759.885579] erofs: root inode @ nid 36 [ 759.891408] erofs: mounted on /dev/loop4 with opts: . [ 759.894219] erofs: options -> [ 759.901025] erofs: cannot read erofs superblock [ 759.914362] erofs: read_super, device -> /dev/loop3 [ 759.920565] erofs: options -> fault_injection=0x0000000000000000,noacl, [ 759.927558] erofs: cannot read erofs superblock 03:50:07 executing program 0: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="10000000c041", 0x6, 0x480}, {0x0, 0xf6ffffff, 0x1000}], 0x0, &(0x7f0000000040)) 03:50:07 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000c80)=@raw={'raw\x00', 0x3c1, 0x3, 0x308, 0x0, 0x150, 0x150, 0x0, 0x3, 0x238, 0x238, 0x238, 0x238, 0x238, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0xe, 0x0, 0x0, 0x4a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x3], 0x0, 0x128, 0x150, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'dummy0\x00', {0x0, 0x0, 0x3, 0x0, 0x0, 0xfffd, 0x7}}}, @common=@ipv6header={{0x28, 'ipv6header\x00'}, {0x0, 0x81}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}, {{@uncond, 0x0, 0xa8, 0xe8}, @common=@inet=@LOG={0x40, 'LOG\x00', 0x0, {0x0, 0x0, "59e2b655a7928de9d18f6f4ce2fcb46e2fbbb084e62170a6b5ab23bc6a36"}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x368) 03:50:07 executing program 5: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x400000000000000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c025", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000040)) 03:50:07 executing program 2: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000), 0x0, 0x400}, {&(0x7f0000010100)="10000300c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000040)) 03:50:07 executing program 4: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010700000c0024", 0xf, 0x400}, {&(0x7f0000010100)="02000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000040)) [ 760.001420] erofs: unmounted for /dev/loop4 03:50:07 executing program 5: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x700000000000000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c025", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000040)) 03:50:07 executing program 3: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0xfeffffff, 0x1000}], 0x0, &(0x7f0000000040)={[{@fault_injection={'fault_injection'}}, {@noacl='noacl'}]}) 03:50:07 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000c80)=@raw={'raw\x00', 0x3c1, 0x3, 0x308, 0x0, 0x150, 0x150, 0x0, 0x3, 0x238, 0x238, 0x238, 0x238, 0x238, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0xe, 0x0, 0x0, 0x60, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x3], 0x0, 0x128, 0x150, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'dummy0\x00', {0x0, 0x0, 0x3, 0x0, 0x0, 0xfffd, 0x7}}}, @common=@ipv6header={{0x28, 'ipv6header\x00'}, {0x0, 0x81}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}, {{@uncond, 0x0, 0xa8, 0xe8}, @common=@inet=@LOG={0x40, 'LOG\x00', 0x0, {0x0, 0x0, "59e2b655a7928de9d18f6f4ce2fcb46e2fbbb084e62170a6b5ab23bc6a36"}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x368) 03:50:07 executing program 5: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x8000000000000000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c025", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000040)) 03:50:07 executing program 5: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0xeffdffffffffffff, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c025", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000040)) 03:50:07 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000c80)=@raw={'raw\x00', 0x3c1, 0x3, 0x308, 0x0, 0x150, 0x150, 0x0, 0x3, 0x238, 0x238, 0x238, 0x238, 0x238, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0xe, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x3], 0x0, 0x128, 0x150, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'dummy0\x00', {0x0, 0x0, 0x3, 0x0, 0x0, 0xfffd, 0x7}}}, @common=@ipv6header={{0x28, 'ipv6header\x00'}, {0x0, 0x81}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}, {{@uncond, 0x0, 0xa8, 0xe8}, @common=@inet=@LOG={0x40, 'LOG\x00', 0x0, {0x0, 0x0, "59e2b655a7928de9d18f6f4ce2fcb46e2fbbb084e62170a6b5ab23bc6a36"}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x368) [ 760.140137] erofs: read_super, device -> /dev/loop2 [ 760.145428] erofs: options -> [ 760.155765] erofs: cannot find valid erofs superblock 03:50:07 executing program 5: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0xf6ffffff00000000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c025", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000040)) [ 760.219588] erofs: read_super, device -> /dev/loop0 [ 760.224759] erofs: options -> [ 760.231018] erofs: cannot read erofs superblock 03:50:07 executing program 0: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="10000000c041", 0x6, 0x480}, {0x0, 0xfcfdffff, 0x1000}], 0x0, &(0x7f0000000040)) 03:50:07 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000c80)=@raw={'raw\x00', 0x3c1, 0x3, 0x308, 0x0, 0x150, 0x150, 0x0, 0x3, 0x238, 0x238, 0x238, 0x238, 0x238, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0xe, 0x0, 0x0, 0x6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x3], 0x0, 0x128, 0x150, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'dummy0\x00', {0x0, 0x0, 0x3, 0x0, 0x0, 0xfffd, 0x7}}}, @common=@ipv6header={{0x28, 'ipv6header\x00'}, {0x0, 0x81}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}, {{@uncond, 0x0, 0xa8, 0xe8}, @common=@inet=@LOG={0x40, 'LOG\x00', 0x0, {0x0, 0x0, "59e2b655a7928de9d18f6f4ce2fcb46e2fbbb084e62170a6b5ab23bc6a36"}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x368) 03:50:07 executing program 5: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0xfcfdffff00000000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c025", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000040)) 03:50:07 executing program 2: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000), 0x0, 0x400}, {&(0x7f0000010100)="10000300c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000040)) [ 760.274301] erofs: read_super, device -> /dev/loop4 [ 760.286025] erofs: options -> [ 760.307010] erofs: root inode @ nid 36 [ 760.315709] erofs: mounted on /dev/loop4 with opts: . [ 760.347885] erofs: read_super, device -> /dev/loop3 [ 760.353595] erofs: options -> fault_injection=0x0000000000000000,noacl, [ 760.381270] erofs: read_super, device -> /dev/loop0 [ 760.393757] erofs: options -> 03:50:07 executing program 4: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010800000c0024", 0xf, 0x400}, {&(0x7f0000010100)="02000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000040)) 03:50:07 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000c80)=@raw={'raw\x00', 0x3c1, 0x3, 0x308, 0x0, 0x150, 0x150, 0x0, 0x3, 0x238, 0x238, 0x238, 0x238, 0x238, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0xe, 0x0, 0x0, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x3], 0x0, 0x128, 0x150, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'dummy0\x00', {0x0, 0x0, 0x3, 0x0, 0x0, 0xfffd, 0x7}}}, @common=@ipv6header={{0x28, 'ipv6header\x00'}, {0x0, 0x81}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}, {{@uncond, 0x0, 0xa8, 0xe8}, @common=@inet=@LOG={0x40, 'LOG\x00', 0x0, {0x0, 0x0, "59e2b655a7928de9d18f6f4ce2fcb46e2fbbb084e62170a6b5ab23bc6a36"}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x368) [ 760.396959] erofs: read_super, device -> /dev/loop2 [ 760.397355] erofs: cannot read erofs superblock [ 760.411743] erofs: cannot read erofs superblock [ 760.418538] erofs: unmounted for /dev/loop4 [ 760.432806] erofs: options -> [ 760.437449] erofs: cannot find valid erofs superblock [ 760.569055] erofs: read_super, device -> /dev/loop0 [ 760.582829] erofs: options -> [ 760.587048] erofs: cannot read erofs superblock [ 760.596311] erofs: read_super, device -> /dev/loop4 [ 760.604253] erofs: options -> [ 760.607623] erofs: root inode @ nid 36 [ 760.613067] erofs: mounted on /dev/loop4 with opts: . 03:50:08 executing program 3: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0xff0f0000, 0x1000}], 0x0, &(0x7f0000000040)={[{@fault_injection={'fault_injection'}}, {@noacl='noacl'}]}) 03:50:08 executing program 5: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0xfeffffff00000000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c025", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000040)) 03:50:08 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000c80)=@raw={'raw\x00', 0x3c1, 0x3, 0x308, 0x0, 0x150, 0x150, 0x0, 0x3, 0x238, 0x238, 0x238, 0x238, 0x238, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0xe, 0x0, 0x0, 0x9e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x3], 0x0, 0x128, 0x150, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'dummy0\x00', {0x0, 0x0, 0x3, 0x0, 0x0, 0xfffd, 0x7}}}, @common=@ipv6header={{0x28, 'ipv6header\x00'}, {0x0, 0x81}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}, {{@uncond, 0x0, 0xa8, 0xe8}, @common=@inet=@LOG={0x40, 'LOG\x00', 0x0, {0x0, 0x0, "59e2b655a7928de9d18f6f4ce2fcb46e2fbbb084e62170a6b5ab23bc6a36"}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x368) 03:50:08 executing program 2: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf", 0x8, 0x400}, {&(0x7f0000010100)="10000300c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000040)) 03:50:08 executing program 0: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="10000000c041", 0x6, 0x480}, {0x0, 0xfdfdffff, 0x1000}], 0x0, &(0x7f0000000040)) [ 760.619970] erofs: read_super, device -> /dev/loop3 [ 760.628418] erofs: options -> fault_injection=0x0000000000000000,noacl, [ 760.647403] erofs: cannot read erofs superblock 03:50:08 executing program 4: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf016000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="02000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000040)) 03:50:08 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000c80)=@raw={'raw\x00', 0x3c1, 0x3, 0x308, 0x0, 0x150, 0x150, 0x0, 0x3, 0x238, 0x238, 0x238, 0x238, 0x238, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0xe, 0x0, 0x0, 0xa6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x3], 0x0, 0x128, 0x150, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'dummy0\x00', {0x0, 0x0, 0x3, 0x0, 0x0, 0xfffd, 0x7}}}, @common=@ipv6header={{0x28, 'ipv6header\x00'}, {0x0, 0x81}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}, {{@uncond, 0x0, 0xa8, 0xe8}, @common=@inet=@LOG={0x40, 'LOG\x00', 0x0, {0x0, 0x0, "59e2b655a7928de9d18f6f4ce2fcb46e2fbbb084e62170a6b5ab23bc6a36"}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x368) [ 760.715690] erofs: read_super, device -> /dev/loop0 [ 760.735564] erofs: options -> [ 760.741147] erofs: unmounted for /dev/loop4 [ 760.755954] erofs: cannot read erofs superblock 03:50:08 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000c80)=@raw={'raw\x00', 0x3c1, 0x3, 0x308, 0x0, 0x150, 0x150, 0x0, 0x3, 0x238, 0x238, 0x238, 0x238, 0x238, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0xe, 0x0, 0x0, 0xb0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x3], 0x0, 0x128, 0x150, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'dummy0\x00', {0x0, 0x0, 0x3, 0x0, 0x0, 0xfffd, 0x7}}}, @common=@ipv6header={{0x28, 'ipv6header\x00'}, {0x0, 0x81}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}, {{@uncond, 0x0, 0xa8, 0xe8}, @common=@inet=@LOG={0x40, 'LOG\x00', 0x0, {0x0, 0x0, "59e2b655a7928de9d18f6f4ce2fcb46e2fbbb084e62170a6b5ab23bc6a36"}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x368) 03:50:08 executing program 5: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff00000000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c025", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000040)) [ 760.776737] erofs: read_super, device -> /dev/loop3 [ 760.783249] erofs: options -> fault_injection=0x0000000000000000,noacl, [ 760.800957] erofs: cannot read erofs superblock [ 760.846475] erofs: read_super, device -> /dev/loop2 [ 760.852614] erofs: read_super, device -> /dev/loop0 [ 760.858484] erofs: read_super, device -> /dev/loop4 [ 760.867815] erofs: options -> [ 760.869159] erofs: options -> [ 760.876211] erofs: options -> [ 760.884436] erofs: root inode @ nid 36 [ 760.885458] erofs: blksize 1 isn't supported on this platform 03:50:08 executing program 3: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0xffff1f00, 0x1000}], 0x0, &(0x7f0000000040)={[{@fault_injection={'fault_injection'}}, {@noacl='noacl'}]}) 03:50:08 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000c80)=@raw={'raw\x00', 0x3c1, 0x3, 0x308, 0x0, 0x150, 0x150, 0x0, 0x3, 0x238, 0x238, 0x238, 0x238, 0x238, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0xe, 0x0, 0x0, 0xca, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x3], 0x0, 0x128, 0x150, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'dummy0\x00', {0x0, 0x0, 0x3, 0x0, 0x0, 0xfffd, 0x7}}}, @common=@ipv6header={{0x28, 'ipv6header\x00'}, {0x0, 0x81}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}, {{@uncond, 0x0, 0xa8, 0xe8}, @common=@inet=@LOG={0x40, 'LOG\x00', 0x0, {0x0, 0x0, "59e2b655a7928de9d18f6f4ce2fcb46e2fbbb084e62170a6b5ab23bc6a36"}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x368) [ 760.890410] erofs: cannot read erofs superblock [ 760.905028] erofs: mounted on /dev/loop4 with opts: . 03:50:08 executing program 0: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="10000000c041", 0x6, 0x480}, {0x0, 0xfeffffff, 0x1000}], 0x0, &(0x7f0000000040)) 03:50:08 executing program 4: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010402000c0024", 0xf, 0x400}, {&(0x7f0000010100)="02000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000040)) [ 761.005621] erofs: read_super, device -> /dev/loop3 [ 761.012074] erofs: options -> fault_injection=0x0000000000000000,noacl, 03:50:08 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000c80)=@raw={'raw\x00', 0x3c1, 0x3, 0x308, 0x0, 0x150, 0x150, 0x0, 0x3, 0x238, 0x238, 0x238, 0x238, 0x238, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x3], 0x0, 0x128, 0x150, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'dummy0\x00', {0x0, 0x0, 0x3, 0x0, 0x0, 0xfffd, 0x7}}}, @common=@ipv6header={{0x28, 'ipv6header\x00'}, {0x0, 0x81}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}, {{@uncond, 0x0, 0xa8, 0xe8}, @common=@inet=@LOG={0x40, 'LOG\x00', 0x0, {0x0, 0x0, "59e2b655a7928de9d18f6f4ce2fcb46e2fbbb084e62170a6b5ab23bc6a36"}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x368) 03:50:08 executing program 2: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf", 0x8, 0x400}, {&(0x7f0000010100)="10000300c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000040)) 03:50:08 executing program 5: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffffffff0700, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c025", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000040)) [ 761.047936] erofs: unmounted for /dev/loop4 [ 761.055507] erofs: cannot read erofs superblock [ 761.081098] erofs: read_super, device -> /dev/loop0 [ 761.086342] erofs: options -> 03:50:08 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000c80)=@raw={'raw\x00', 0x3c1, 0x3, 0x308, 0x0, 0x150, 0x150, 0x0, 0x3, 0x238, 0x238, 0x238, 0x238, 0x238, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x3], 0x0, 0x128, 0x150, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'dummy0\x00', {0x0, 0x0, 0x3, 0x0, 0x0, 0xfffd, 0x7}}}, @common=@ipv6header={{0x28, 'ipv6header\x00'}, {0x0, 0x81}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}, {{@uncond, 0x0, 0xa8, 0xe8}, @common=@inet=@LOG={0x40, 'LOG\x00', 0x0, {0x0, 0x0, "59e2b655a7928de9d18f6f4ce2fcb46e2fbbb084e62170a6b5ab23bc6a36"}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x368) [ 761.095464] erofs: cannot read erofs superblock [ 761.194631] erofs: read_super, device -> /dev/loop3 [ 761.204333] erofs: read_super, device -> /dev/loop2 [ 761.214052] erofs: options -> [ 761.221172] erofs: read_super, device -> /dev/loop0 [ 761.224292] erofs: options -> fault_injection=0x0000000000000000,noacl, [ 761.226206] erofs: options -> [ 761.226262] erofs: cannot read erofs superblock 03:50:08 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000c80)=@raw={'raw\x00', 0x3c1, 0x3, 0x308, 0x0, 0x150, 0x150, 0x0, 0x3, 0x238, 0x238, 0x238, 0x238, 0x238, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x3], 0x0, 0x128, 0x150, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'dummy0\x00', {0x0, 0x0, 0x3, 0x0, 0x0, 0xfffd, 0x7}}}, @common=@ipv6header={{0x28, 'ipv6header\x00'}, {0x0, 0x81}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}, {{@uncond, 0x0, 0xa8, 0xe8}, @common=@inet=@LOG={0x40, 'LOG\x00', 0x0, {0x0, 0x0, "59e2b655a7928de9d18f6f4ce2fcb46e2fbbb084e62170a6b5ab23bc6a36"}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x368) 03:50:08 executing program 5: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0xfffffffffffffdef, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c025", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000040)) 03:50:08 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000c80)=@raw={'raw\x00', 0x3c1, 0x3, 0x308, 0x0, 0x150, 0x150, 0x0, 0x3, 0x238, 0x238, 0x238, 0x238, 0x238, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x3], 0x0, 0x128, 0x150, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'dummy0\x00', {0x0, 0x0, 0x3, 0x0, 0x0, 0xfffd, 0x7}}}, @common=@ipv6header={{0x28, 'ipv6header\x00'}, {0x0, 0x81}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}, {{@uncond, 0x0, 0xa8, 0xe8}, @common=@inet=@LOG={0x40, 'LOG\x00', 0x0, {0x0, 0x0, "59e2b655a7928de9d18f6f4ce2fcb46e2fbbb084e62170a6b5ab23bc6a36"}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x368) [ 761.226582] erofs: blksize 1 isn't supported on this platform [ 761.240386] erofs: cannot read erofs superblock 03:50:08 executing program 3: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0xffffff7f, 0x1000}], 0x0, &(0x7f0000000040)={[{@fault_injection={'fault_injection'}}, {@noacl='noacl'}]}) [ 761.322970] erofs: read_super, device -> /dev/loop4 [ 761.328032] erofs: options -> [ 761.352079] erofs: root inode @ nid 36 03:50:08 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000c80)=@raw={'raw\x00', 0x3c1, 0x3, 0x308, 0x0, 0x150, 0x150, 0x0, 0x3, 0x238, 0x238, 0x238, 0x238, 0x238, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x3], 0x0, 0x128, 0x150, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'dummy0\x00', {0x0, 0x0, 0x3, 0x0, 0x0, 0xfffd, 0x7}}}, @common=@ipv6header={{0x28, 'ipv6header\x00'}, {0x0, 0x81}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}, {{@uncond, 0x0, 0xa8, 0xe8}, @common=@inet=@LOG={0x40, 'LOG\x00', 0x0, {0x0, 0x0, "59e2b655a7928de9d18f6f4ce2fcb46e2fbbb084e62170a6b5ab23bc6a36"}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x368) 03:50:08 executing program 5: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffffffffffff, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c025", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000040)) [ 761.369569] erofs: mounted on /dev/loop4 with opts: . 03:50:08 executing program 0: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="10000000c041", 0x6, 0x480}, {0x0, 0xfffffdef, 0x1000}], 0x0, &(0x7f0000000040)) 03:50:09 executing program 4: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010003000c0024", 0xf, 0x400}, {&(0x7f0000010100)="02000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000040)) 03:50:09 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000c80)=@raw={'raw\x00', 0x3c1, 0x3, 0x308, 0x0, 0x150, 0x150, 0x0, 0x3, 0x238, 0x238, 0x238, 0x238, 0x238, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x3], 0x0, 0x128, 0x150, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'dummy0\x00', {0x0, 0x0, 0x3, 0x0, 0x0, 0xfffd, 0x7}}}, @common=@ipv6header={{0x28, 'ipv6header\x00'}, {0x0, 0x81}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}, {{@uncond, 0x0, 0xa8, 0xe8}, @common=@inet=@LOG={0x40, 'LOG\x00', 0x0, {0x0, 0x0, "59e2b655a7928de9d18f6f4ce2fcb46e2fbbb084e62170a6b5ab23bc6a36"}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x368) 03:50:09 executing program 2: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf", 0x8, 0x400}, {&(0x7f0000010100)="10000300c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000040)) [ 761.474906] erofs: read_super, device -> /dev/loop3 [ 761.495573] erofs: read_super, device -> /dev/loop2 [ 761.500854] erofs: options -> [ 761.504522] erofs: blksize 1 isn't supported on this platform [ 761.513189] erofs: options -> fault_injection=0x0000000000000000,noacl, [ 761.524139] erofs: read_super, device -> /dev/loop0 [ 761.535187] erofs: options -> [ 761.538308] erofs: cannot read erofs superblock 03:50:09 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000c80)=@raw={'raw\x00', 0x3c1, 0x3, 0x308, 0x0, 0x150, 0x150, 0x0, 0x3, 0x238, 0x238, 0x238, 0x238, 0x238, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, 0x4a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x3], 0x0, 0x128, 0x150, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'dummy0\x00', {0x0, 0x0, 0x3, 0x0, 0x0, 0xfffd, 0x7}}}, @common=@ipv6header={{0x28, 'ipv6header\x00'}, {0x0, 0x81}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}, {{@uncond, 0x0, 0xa8, 0xe8}, @common=@inet=@LOG={0x40, 'LOG\x00', 0x0, {0x0, 0x0, "59e2b655a7928de9d18f6f4ce2fcb46e2fbbb084e62170a6b5ab23bc6a36"}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x368) 03:50:09 executing program 5: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c025", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000040)) [ 761.540300] erofs: cannot read erofs superblock [ 761.560144] erofs: unmounted for /dev/loop4 03:50:09 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000c80)=@raw={'raw\x00', 0x3c1, 0x3, 0x308, 0x0, 0x150, 0x150, 0x0, 0x3, 0x238, 0x238, 0x238, 0x238, 0x238, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, 0x60, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x3], 0x0, 0x128, 0x150, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'dummy0\x00', {0x0, 0x0, 0x3, 0x0, 0x0, 0xfffd, 0x7}}}, @common=@ipv6header={{0x28, 'ipv6header\x00'}, {0x0, 0x81}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}, {{@uncond, 0x0, 0xa8, 0xe8}, @common=@inet=@LOG={0x40, 'LOG\x00', 0x0, {0x0, 0x0, "59e2b655a7928de9d18f6f4ce2fcb46e2fbbb084e62170a6b5ab23bc6a36"}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x368) 03:50:09 executing program 5: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c025", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000040)) 03:50:09 executing program 2: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf01000000", 0xc, 0x400}, {&(0x7f0000010100)="10000300c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000040)) [ 761.677960] erofs: read_super, device -> /dev/loop3 [ 761.696231] erofs: options -> fault_injection=0x0000000000000000,noacl, [ 761.707167] erofs: read_super, device -> /dev/loop0 [ 761.712551] erofs: options -> [ 761.716621] erofs: cannot read erofs superblock [ 761.737831] erofs: cannot read erofs superblock 03:50:09 executing program 3: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0xffffff8c, 0x1000}], 0x0, &(0x7f0000000040)={[{@fault_injection={'fault_injection'}}, {@noacl='noacl'}]}) 03:50:09 executing program 4: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf01f803000c0024", 0xf, 0x400}, {&(0x7f0000010100)="02000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000040)) 03:50:09 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000c80)=@raw={'raw\x00', 0x3c1, 0x3, 0x308, 0x0, 0x150, 0x150, 0x0, 0x3, 0x238, 0x238, 0x238, 0x238, 0x238, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x3], 0x0, 0x128, 0x150, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'dummy0\x00', {0x0, 0x0, 0x3, 0x0, 0x0, 0xfffd, 0x7}}}, @common=@ipv6header={{0x28, 'ipv6header\x00'}, {0x0, 0x81}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}, {{@uncond, 0x0, 0xa8, 0xe8}, @common=@inet=@LOG={0x40, 'LOG\x00', 0x0, {0x0, 0x0, "59e2b655a7928de9d18f6f4ce2fcb46e2fbbb084e62170a6b5ab23bc6a36"}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x368) 03:50:09 executing program 0: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="10000000c041", 0x6, 0x480}, {0x0, 0xfffffdfc, 0x1000}], 0x0, &(0x7f0000000040)) 03:50:09 executing program 5: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x223, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c025", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000040)) [ 761.788581] erofs: read_super, device -> /dev/loop2 [ 761.798657] erofs: options -> [ 761.819692] erofs: blksize 1 isn't supported on this platform [ 761.856837] erofs: read_super, device -> /dev/loop4 [ 761.862463] erofs: options -> [ 761.875445] erofs: root inode @ nid 36 [ 761.882937] erofs: mounted on /dev/loop4 with opts: . [ 761.890486] erofs: read_super, device -> /dev/loop3 03:50:09 executing program 4: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010204000c0024", 0xf, 0x400}, {&(0x7f0000010100)="02000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000040)) 03:50:09 executing program 2: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf01000000", 0xc, 0x400}, {&(0x7f0000010100)="10000300c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000040)) 03:50:09 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000c80)=@raw={'raw\x00', 0x3c1, 0x3, 0x308, 0x0, 0x150, 0x150, 0x0, 0x3, 0x238, 0x238, 0x238, 0x238, 0x238, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, 0x6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x3], 0x0, 0x128, 0x150, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'dummy0\x00', {0x0, 0x0, 0x3, 0x0, 0x0, 0xfffd, 0x7}}}, @common=@ipv6header={{0x28, 'ipv6header\x00'}, {0x0, 0x81}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}, {{@uncond, 0x0, 0xa8, 0xe8}, @common=@inet=@LOG={0x40, 'LOG\x00', 0x0, {0x0, 0x0, "59e2b655a7928de9d18f6f4ce2fcb46e2fbbb084e62170a6b5ab23bc6a36"}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x368) 03:50:09 executing program 5: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5138a3f0fcf010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c025", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000040)) [ 761.908737] erofs: options -> fault_injection=0x0000000000000000,noacl, [ 761.923618] erofs: cannot read erofs superblock [ 761.931017] erofs: unmounted for /dev/loop4 03:50:09 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000c80)=@raw={'raw\x00', 0x3c1, 0x3, 0x308, 0x0, 0x150, 0x150, 0x0, 0x3, 0x238, 0x238, 0x238, 0x238, 0x238, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x3], 0x0, 0x128, 0x150, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'dummy0\x00', {0x0, 0x0, 0x3, 0x0, 0x0, 0xfffd, 0x7}}}, @common=@ipv6header={{0x28, 'ipv6header\x00'}, {0x0, 0x81}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}, {{@uncond, 0x0, 0xa8, 0xe8}, @common=@inet=@LOG={0x40, 'LOG\x00', 0x0, {0x0, 0x0, "59e2b655a7928de9d18f6f4ce2fcb46e2fbbb084e62170a6b5ab23bc6a36"}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x368) [ 762.028088] erofs: read_super, device -> /dev/loop3 [ 762.038729] erofs: read_super, device -> /dev/loop0 [ 762.043766] erofs: options -> [ 762.047001] erofs: cannot read erofs superblock [ 762.062509] erofs: options -> fault_injection=0x0000000000000000,noacl, 03:50:09 executing program 5: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5148a3f0fcf010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c025", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000040)) 03:50:09 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000c80)=@raw={'raw\x00', 0x3c1, 0x3, 0x308, 0x0, 0x150, 0x150, 0x0, 0x3, 0x238, 0x238, 0x238, 0x238, 0x238, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, 0x9e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x3], 0x0, 0x128, 0x150, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'dummy0\x00', {0x0, 0x0, 0x3, 0x0, 0x0, 0xfffd, 0x7}}}, @common=@ipv6header={{0x28, 'ipv6header\x00'}, {0x0, 0x81}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}, {{@uncond, 0x0, 0xa8, 0xe8}, @common=@inet=@LOG={0x40, 'LOG\x00', 0x0, {0x0, 0x0, "59e2b655a7928de9d18f6f4ce2fcb46e2fbbb084e62170a6b5ab23bc6a36"}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x368) [ 762.080790] erofs: cannot read erofs superblock 03:50:09 executing program 3: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0xfffffff6, 0x1000}], 0x0, &(0x7f0000000040)={[{@fault_injection={'fault_injection'}}, {@noacl='noacl'}]}) 03:50:09 executing program 5: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5158a3f0fcf010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c025", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000040)) 03:50:09 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000c80)=@raw={'raw\x00', 0x3c1, 0x3, 0x308, 0x0, 0x150, 0x150, 0x0, 0x3, 0x238, 0x238, 0x238, 0x238, 0x238, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, 0xa6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x3], 0x0, 0x128, 0x150, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'dummy0\x00', {0x0, 0x0, 0x3, 0x0, 0x0, 0xfffd, 0x7}}}, @common=@ipv6header={{0x28, 'ipv6header\x00'}, {0x0, 0x81}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}, {{@uncond, 0x0, 0xa8, 0xe8}, @common=@inet=@LOG={0x40, 'LOG\x00', 0x0, {0x0, 0x0, "59e2b655a7928de9d18f6f4ce2fcb46e2fbbb084e62170a6b5ab23bc6a36"}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x368) [ 762.145803] erofs: read_super, device -> /dev/loop2 [ 762.154752] erofs: options -> [ 762.164900] erofs: read_super, device -> /dev/loop0 [ 762.170281] erofs: options -> [ 762.179971] erofs: cannot read erofs superblock [ 762.180629] erofs: blksize 1 isn't supported on this platform 03:50:09 executing program 0: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="10000000c041", 0x6, 0x480}, {0x0, 0xfffffdfd, 0x1000}], 0x0, &(0x7f0000000040)) 03:50:09 executing program 5: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf020000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c025", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000040)) [ 762.279247] erofs: read_super, device -> /dev/loop4 [ 762.284616] erofs: options -> [ 762.305563] erofs: root inode @ nid 36 [ 762.310300] erofs: mounted on /dev/loop4 with opts: . [ 762.359365] erofs: read_super, device -> /dev/loop3 03:50:09 executing program 4: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf015704000c0024", 0xf, 0x400}, {&(0x7f0000010100)="02000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000040)) 03:50:09 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000c80)=@raw={'raw\x00', 0x3c1, 0x3, 0x308, 0x0, 0x150, 0x150, 0x0, 0x3, 0x238, 0x238, 0x238, 0x238, 0x238, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, 0xb0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x3], 0x0, 0x128, 0x150, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'dummy0\x00', {0x0, 0x0, 0x3, 0x0, 0x0, 0xfffd, 0x7}}}, @common=@ipv6header={{0x28, 'ipv6header\x00'}, {0x0, 0x81}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}, {{@uncond, 0x0, 0xa8, 0xe8}, @common=@inet=@LOG={0x40, 'LOG\x00', 0x0, {0x0, 0x0, "59e2b655a7928de9d18f6f4ce2fcb46e2fbbb084e62170a6b5ab23bc6a36"}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x368) 03:50:09 executing program 2: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf01000000", 0xc, 0x400}, {&(0x7f0000010100)="10000300c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000040)) 03:50:09 executing program 5: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf030000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c025", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000040)) [ 762.381076] erofs: options -> fault_injection=0x0000000000000000,noacl, [ 762.393135] erofs: cannot read erofs superblock [ 762.408558] erofs: unmounted for /dev/loop4 03:50:10 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000c80)=@raw={'raw\x00', 0x3c1, 0x3, 0x308, 0x0, 0x150, 0x150, 0x0, 0x3, 0x238, 0x238, 0x238, 0x238, 0x238, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, 0xca, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x3], 0x0, 0x128, 0x150, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'dummy0\x00', {0x0, 0x0, 0x3, 0x0, 0x0, 0xfffd, 0x7}}}, @common=@ipv6header={{0x28, 'ipv6header\x00'}, {0x0, 0x81}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}, {{@uncond, 0x0, 0xa8, 0xe8}, @common=@inet=@LOG={0x40, 'LOG\x00', 0x0, {0x0, 0x0, "59e2b655a7928de9d18f6f4ce2fcb46e2fbbb084e62170a6b5ab23bc6a36"}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x368) 03:50:10 executing program 5: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf040000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c025", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000040)) 03:50:10 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000c80)=@raw={'raw\x00', 0x3c1, 0x3, 0x308, 0x0, 0x150, 0x150, 0x0, 0x3, 0x238, 0x238, 0x238, 0x238, 0x238, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x3], 0x0, 0x128, 0x150, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'dummy0\x00', {0x0, 0x0, 0x3, 0x0, 0x0, 0xfffd, 0x7}}}, @common=@ipv6header={{0x28, 'ipv6header\x00'}, {0x0, 0x81}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}, {{@uncond, 0x0, 0xa8, 0xe8}, @common=@inet=@LOG={0x40, 'LOG\x00', 0x0, {0x0, 0x0, "59e2b655a7928de9d18f6f4ce2fcb46e2fbbb084e62170a6b5ab23bc6a36"}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x368) [ 762.540404] erofs: read_super, device -> /dev/loop0 [ 762.545459] erofs: options -> [ 762.553358] erofs: cannot read erofs superblock [ 762.564748] erofs: read_super, device -> /dev/loop2 [ 762.575409] erofs: read_super, device -> /dev/loop4 [ 762.587824] erofs: options -> [ 762.598314] erofs: read_super, device -> /dev/loop3 [ 762.603373] erofs: options -> fault_injection=0x0000000000000000,noacl, [ 762.617748] erofs: options -> [ 762.622160] erofs: root inode @ nid 36 [ 762.635169] erofs: blksize 1 isn't supported on this platform [ 762.636410] erofs: cannot read erofs superblock [ 762.642176] erofs: mounted on /dev/loop4 with opts: . [ 762.670524] erofs: read_super, device -> /dev/loop0 [ 762.684882] erofs: options -> [ 762.689539] erofs: cannot read erofs superblock 03:50:10 executing program 3: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0xfffffffe, 0x1000}], 0x0, &(0x7f0000000040)={[{@fault_injection={'fault_injection'}}, {@noacl='noacl'}]}) 03:50:10 executing program 5: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf050000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c025", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000040)) 03:50:10 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000c80)=@raw={'raw\x00', 0x3c1, 0x3, 0x308, 0x0, 0x150, 0x150, 0x0, 0x3, 0x238, 0x238, 0x238, 0x238, 0x238, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x3], 0x0, 0x128, 0x150, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'dummy0\x00', {0x0, 0x0, 0x3, 0x0, 0x0, 0xfffd, 0x7}}}, @common=@ipv6header={{0x28, 'ipv6header\x00'}, {0x0, 0x81}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}, {{@uncond, 0x0, 0xa8, 0xe8}, @common=@inet=@LOG={0x40, 'LOG\x00', 0x0, {0x0, 0x0, "59e2b655a7928de9d18f6f4ce2fcb46e2fbbb084e62170a6b5ab23bc6a36"}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x368) 03:50:10 executing program 0: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="10000000c041", 0x6, 0x480}, {0x0, 0xfffffff6, 0x1000}], 0x0, &(0x7f0000000040)) 03:50:10 executing program 2: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c00", 0xe, 0x400}, {&(0x7f0000010100)="10000300c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000040)) 03:50:10 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000c80)=@raw={'raw\x00', 0x3c1, 0x3, 0x308, 0x0, 0x150, 0x150, 0x0, 0x3, 0x238, 0x238, 0x238, 0x238, 0x238, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x3], 0x0, 0x128, 0x150, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'dummy0\x00', {0x0, 0x0, 0x3, 0x0, 0x0, 0xfffd, 0x7}}}, @common=@ipv6header={{0x28, 'ipv6header\x00'}, {0x0, 0x81}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}, {{@uncond, 0x0, 0xa8, 0xe8}, @common=@inet=@LOG={0x40, 'LOG\x00', 0x0, {0x0, 0x0, "59e2b655a7928de9d18f6f4ce2fcb46e2fbbb084e62170a6b5ab23bc6a36"}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x368) 03:50:10 executing program 5: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf0f0000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c025", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000040)) 03:50:10 executing program 4: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf015804000c0024", 0xf, 0x400}, {&(0x7f0000010100)="02000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000040)) [ 762.815279] erofs: unmounted for /dev/loop4 03:50:10 executing program 5: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf000300000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c025", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000040)) 03:50:10 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000c80)=@raw={'raw\x00', 0x3c1, 0x3, 0x308, 0x0, 0x150, 0x150, 0x0, 0x3, 0x238, 0x238, 0x238, 0x238, 0x238, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x3], 0x0, 0x128, 0x150, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'dummy0\x00', {0x0, 0x0, 0x3, 0x0, 0x0, 0xfffd, 0x7}}}, @common=@ipv6header={{0x28, 'ipv6header\x00'}, {0x0, 0x81}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}, {{@uncond, 0x0, 0xa8, 0xe8}, @common=@inet=@LOG={0x40, 'LOG\x00', 0x0, {0x0, 0x0, "59e2b655a7928de9d18f6f4ce2fcb46e2fbbb084e62170a6b5ab23bc6a36"}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x368) 03:50:10 executing program 5: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf0a6711000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c025", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000040)) 03:50:10 executing program 5: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf1fffffff0c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c025", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000040)) [ 762.967312] erofs: read_super, device -> /dev/loop3 [ 762.968347] erofs: read_super, device -> /dev/loop2 [ 762.972768] erofs: options -> fault_injection=0x0000000000000000,noacl, [ 762.977389] erofs: options -> [ 762.987755] erofs: cannot read erofs superblock [ 763.010577] erofs: root inode @ nid 0 [ 763.053063] erofs: read_super, device -> /dev/loop0 [ 763.061170] erofs: read_super, device -> /dev/loop3 [ 763.066205] erofs: options -> fault_injection=0x0000000000000000,noacl, [ 763.069701] erofs: options -> [ 763.082386] erofs: cannot read erofs superblock [ 763.085712] erofs: cannot read erofs superblock [ 763.095635] erofs: read_super, device -> /dev/loop4 03:50:10 executing program 3: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0xedc000000000, 0x1000}], 0x0, &(0x7f0000000040)={[{@fault_injection={'fault_injection'}}, {@noacl='noacl'}]}) 03:50:10 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000c80)=@raw={'raw\x00', 0x3c1, 0x3, 0x308, 0x0, 0x150, 0x150, 0x0, 0x3, 0x238, 0x238, 0x238, 0x238, 0x238, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x3], 0x0, 0x128, 0x150, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'dummy0\x00', {0x0, 0x0, 0x3, 0x0, 0x0, 0xfffd, 0x7}}}, @common=@ipv6header={{0x28, 'ipv6header\x00'}, {0x0, 0x81}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}, {{@uncond, 0x0, 0xa8, 0xe8}, @common=@inet=@LOG={0x40, 'LOG\x00', 0x0, {0x0, 0x0, "59e2b655a7928de9d18f6f4ce2fcb46e2fbbb084e62170a6b5ab23bc6a36"}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x368) 03:50:10 executing program 5: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010200000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c025", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000040)) 03:50:10 executing program 0: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="10000000c041", 0x6, 0x480}, {0x0, 0xfffffffe, 0x1000}], 0x0, &(0x7f0000000040)) 03:50:10 executing program 2: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c00", 0xe, 0x400}, {&(0x7f0000010100)="10000300c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000040)) [ 763.112613] erofs: options -> [ 763.122202] erofs: root inode @ nid 36 [ 763.136954] erofs: mounted on /dev/loop4 with opts: . 03:50:10 executing program 4: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf015904000c0024", 0xf, 0x400}, {&(0x7f0000010100)="02000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000040)) 03:50:10 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000c80)=@raw={'raw\x00', 0x3c1, 0x3, 0x308, 0x0, 0x150, 0x150, 0x0, 0x3, 0x238, 0x238, 0x238, 0x238, 0x238, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x3], 0x0, 0x128, 0x150, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'dummy0\x00', {0x0, 0x0, 0x3, 0x0, 0x0, 0xfffd, 0x7}}}, @common=@ipv6header={{0x28, 'ipv6header\x00'}, {0x0, 0x81}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}, {{@uncond, 0x0, 0xa8, 0xe8}, @common=@inet=@LOG={0x40, 'LOG\x00', 0x0, {0x0, 0x0, "59e2b655a7928de9d18f6f4ce2fcb46e2fbbb084e62170a6b5ab23bc6a36"}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x368) [ 763.218325] erofs: unmounted for /dev/loop4 [ 763.278025] erofs: read_super, device -> /dev/loop3 [ 763.294691] erofs: read_super, device -> /dev/loop0 [ 763.298764] erofs: read_super, device -> /dev/loop2 [ 763.304965] erofs: options -> [ 763.305857] erofs: options -> fault_injection=0x0000000000000000,noacl, [ 763.323236] erofs: cannot read erofs superblock [ 763.338019] erofs: options -> [ 763.345747] erofs: root inode @ nid 0 [ 763.357149] erofs: cannot read erofs superblock 03:50:10 executing program 3: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x4000000000000, 0x1000}], 0x0, &(0x7f0000000040)={[{@fault_injection={'fault_injection'}}, {@noacl='noacl'}]}) 03:50:10 executing program 2: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c00", 0xe, 0x400}, {&(0x7f0000010100)="10000300c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000040)) 03:50:10 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000c80)=@raw={'raw\x00', 0x3c1, 0x3, 0x308, 0x0, 0x150, 0x150, 0x0, 0x3, 0x238, 0x238, 0x238, 0x238, 0x238, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x4a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x3], 0x0, 0x128, 0x150, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'dummy0\x00', {0x0, 0x0, 0x3, 0x0, 0x0, 0xfffd, 0x7}}}, @common=@ipv6header={{0x28, 'ipv6header\x00'}, {0x0, 0x81}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}, {{@uncond, 0x0, 0xa8, 0xe8}, @common=@inet=@LOG={0x40, 'LOG\x00', 0x0, {0x0, 0x0, "59e2b655a7928de9d18f6f4ce2fcb46e2fbbb084e62170a6b5ab23bc6a36"}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x368) 03:50:10 executing program 0: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="10000000c041", 0x6, 0x480}, {0x0, 0x225c17d03, 0x1000}], 0x0, &(0x7f0000000040)) 03:50:10 executing program 5: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010300000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c025", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000040)) 03:50:11 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000c80)=@raw={'raw\x00', 0x3c1, 0x3, 0x308, 0x0, 0x150, 0x150, 0x0, 0x3, 0x238, 0x238, 0x238, 0x238, 0x238, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x60, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x3], 0x0, 0x128, 0x150, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'dummy0\x00', {0x0, 0x0, 0x3, 0x0, 0x0, 0xfffd, 0x7}}}, @common=@ipv6header={{0x28, 'ipv6header\x00'}, {0x0, 0x81}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}, {{@uncond, 0x0, 0xa8, 0xe8}, @common=@inet=@LOG={0x40, 'LOG\x00', 0x0, {0x0, 0x0, "59e2b655a7928de9d18f6f4ce2fcb46e2fbbb084e62170a6b5ab23bc6a36"}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x368) 03:50:11 executing program 5: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010400000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c025", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000040)) 03:50:11 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000c80)=@raw={'raw\x00', 0x3c1, 0x3, 0x308, 0x0, 0x150, 0x150, 0x0, 0x3, 0x238, 0x238, 0x238, 0x238, 0x238, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x3], 0x0, 0x128, 0x150, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'dummy0\x00', {0x0, 0x0, 0x3, 0x0, 0x0, 0xfffd, 0x7}}}, @common=@ipv6header={{0x28, 'ipv6header\x00'}, {0x0, 0x81}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}, {{@uncond, 0x0, 0xa8, 0xe8}, @common=@inet=@LOG={0x40, 'LOG\x00', 0x0, {0x0, 0x0, "59e2b655a7928de9d18f6f4ce2fcb46e2fbbb084e62170a6b5ab23bc6a36"}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x368) [ 763.532976] erofs: read_super, device -> /dev/loop4 [ 763.538034] erofs: options -> [ 763.546920] erofs: read_super, device -> /dev/loop0 [ 763.554336] erofs: options -> [ 763.564805] erofs: cannot read erofs superblock [ 763.569918] erofs: root inode @ nid 36 03:50:11 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000c80)=@raw={'raw\x00', 0x3c1, 0x3, 0x308, 0x0, 0x150, 0x150, 0x0, 0x3, 0x238, 0x238, 0x238, 0x238, 0x238, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x3], 0x0, 0x128, 0x150, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'dummy0\x00', {0x0, 0x0, 0x3, 0x0, 0x0, 0xfffd, 0x7}}}, @common=@ipv6header={{0x28, 'ipv6header\x00'}, {0x0, 0x81}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}, {{@uncond, 0x0, 0xa8, 0xe8}, @common=@inet=@LOG={0x40, 'LOG\x00', 0x0, {0x0, 0x0, "59e2b655a7928de9d18f6f4ce2fcb46e2fbbb084e62170a6b5ab23bc6a36"}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x368) 03:50:11 executing program 0: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="10000000c041", 0x6, 0x480}, {0x0, 0x7ffffffff000, 0x1000}], 0x0, &(0x7f0000000040)) [ 763.592797] erofs: read_super, device -> /dev/loop3 [ 763.603512] erofs: mounted on /dev/loop4 with opts: . [ 763.606312] erofs: options -> fault_injection=0x0000000000000000,noacl, [ 763.635872] erofs: read_super, device -> /dev/loop2 03:50:11 executing program 4: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf015a04000c0024", 0xf, 0x400}, {&(0x7f0000010100)="02000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000040)) 03:50:11 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000c80)=@raw={'raw\x00', 0x3c1, 0x3, 0x308, 0x0, 0x150, 0x150, 0x0, 0x3, 0x238, 0x238, 0x238, 0x238, 0x238, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x3], 0x0, 0x128, 0x150, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'dummy0\x00', {0x0, 0x0, 0x3, 0x0, 0x0, 0xfffd, 0x7}}}, @common=@ipv6header={{0x28, 'ipv6header\x00'}, {0x0, 0x81}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}, {{@uncond, 0x0, 0xa8, 0xe8}, @common=@inet=@LOG={0x40, 'LOG\x00', 0x0, {0x0, 0x0, "59e2b655a7928de9d18f6f4ce2fcb46e2fbbb084e62170a6b5ab23bc6a36"}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x368) [ 763.656476] erofs: options -> [ 763.695426] erofs: read_super, device -> /dev/loop0 [ 763.704375] erofs: options -> [ 763.705736] erofs: root inode @ nid 0 [ 763.711135] erofs: cannot read erofs superblock [ 763.719714] erofs: cannot read erofs superblock [ 763.742860] erofs: unmounted for /dev/loop4 [ 763.860280] erofs: read_super, device -> /dev/loop0 [ 763.865334] erofs: options -> [ 763.878467] erofs: read_super, device -> /dev/loop3 [ 763.879842] erofs: cannot read erofs superblock [ 763.887996] erofs: options -> fault_injection=0x0000000000000000,noacl, [ 763.901538] erofs: cannot read erofs superblock 03:50:11 executing program 3: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x100000000000000, 0x1000}], 0x0, &(0x7f0000000040)={[{@fault_injection={'fault_injection'}}, {@noacl='noacl'}]}) 03:50:11 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000c80)=@raw={'raw\x00', 0x3c1, 0x3, 0x308, 0x0, 0x150, 0x150, 0x0, 0x3, 0x238, 0x238, 0x238, 0x238, 0x238, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x9e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x3], 0x0, 0x128, 0x150, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'dummy0\x00', {0x0, 0x0, 0x3, 0x0, 0x0, 0xfffd, 0x7}}}, @common=@ipv6header={{0x28, 'ipv6header\x00'}, {0x0, 0x81}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}, {{@uncond, 0x0, 0xa8, 0xe8}, @common=@inet=@LOG={0x40, 'LOG\x00', 0x0, {0x0, 0x0, "59e2b655a7928de9d18f6f4ce2fcb46e2fbbb084e62170a6b5ab23bc6a36"}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x368) 03:50:11 executing program 5: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010700000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c025", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000040)) 03:50:11 executing program 2: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c0024", 0xf}, {&(0x7f0000010100)="10000300c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000040)) 03:50:11 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000c80)=@raw={'raw\x00', 0x3c1, 0x3, 0x308, 0x0, 0x150, 0x150, 0x0, 0x3, 0x238, 0x238, 0x238, 0x238, 0x238, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0xa6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x3], 0x0, 0x128, 0x150, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'dummy0\x00', {0x0, 0x0, 0x3, 0x0, 0x0, 0xfffd, 0x7}}}, @common=@ipv6header={{0x28, 'ipv6header\x00'}, {0x0, 0x81}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}, {{@uncond, 0x0, 0xa8, 0xe8}, @common=@inet=@LOG={0x40, 'LOG\x00', 0x0, {0x0, 0x0, "59e2b655a7928de9d18f6f4ce2fcb46e2fbbb084e62170a6b5ab23bc6a36"}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x368) 03:50:11 executing program 0: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="10000000c041", 0x6, 0x480}, {0x0, 0x1000000000000, 0x1000}], 0x0, &(0x7f0000000040)) 03:50:11 executing program 4: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf015b04000c0024", 0xf, 0x400}, {&(0x7f0000010100)="02000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000040)) [ 764.004453] erofs: read_super, device -> /dev/loop4 [ 764.009723] erofs: options -> [ 764.014124] erofs: read_super, device -> /dev/loop2 [ 764.022025] erofs: root inode @ nid 36 [ 764.027627] erofs: options -> [ 764.032088] erofs: mounted on /dev/loop4 with opts: . [ 764.037482] erofs: cannot find valid erofs superblock 03:50:11 executing program 2: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c0024", 0xf}, {&(0x7f0000010100)="10000300c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000040)) 03:50:11 executing program 5: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010003000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c025", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000040)) [ 764.117595] erofs: unmounted for /dev/loop4 [ 764.140696] erofs: read_super, device -> /dev/loop3 03:50:11 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000c80)=@raw={'raw\x00', 0x3c1, 0x3, 0x308, 0x0, 0x150, 0x150, 0x0, 0x3, 0x238, 0x238, 0x238, 0x238, 0x238, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0xb0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x3], 0x0, 0x128, 0x150, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'dummy0\x00', {0x0, 0x0, 0x3, 0x0, 0x0, 0xfffd, 0x7}}}, @common=@ipv6header={{0x28, 'ipv6header\x00'}, {0x0, 0x81}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}, {{@uncond, 0x0, 0xa8, 0xe8}, @common=@inet=@LOG={0x40, 'LOG\x00', 0x0, {0x0, 0x0, "59e2b655a7928de9d18f6f4ce2fcb46e2fbbb084e62170a6b5ab23bc6a36"}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x368) [ 764.162382] erofs: options -> fault_injection=0x0000000000000000,noacl, [ 764.189792] erofs: cannot read erofs superblock [ 764.204060] erofs: read_super, device -> /dev/loop0 03:50:11 executing program 5: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010007000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c025", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000040)) [ 764.215797] erofs: options -> [ 764.220831] erofs: cannot read erofs superblock 03:50:11 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000c80)=@raw={'raw\x00', 0x3c1, 0x3, 0x308, 0x0, 0x150, 0x150, 0x0, 0x3, 0x238, 0x238, 0x238, 0x238, 0x238, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0xca, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x3], 0x0, 0x128, 0x150, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'dummy0\x00', {0x0, 0x0, 0x3, 0x0, 0x0, 0xfffd, 0x7}}}, @common=@ipv6header={{0x28, 'ipv6header\x00'}, {0x0, 0x81}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}, {{@uncond, 0x0, 0xa8, 0xe8}, @common=@inet=@LOG={0x40, 'LOG\x00', 0x0, {0x0, 0x0, "59e2b655a7928de9d18f6f4ce2fcb46e2fbbb084e62170a6b5ab23bc6a36"}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x368) [ 764.297482] erofs: read_super, device -> /dev/loop2 03:50:11 executing program 3: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x200000000000000, 0x1000}], 0x0, &(0x7f0000000040)={[{@fault_injection={'fault_injection'}}, {@noacl='noacl'}]}) 03:50:11 executing program 5: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010020000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c025", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000040)) [ 764.328548] erofs: options -> [ 764.332496] erofs: read_super, device -> /dev/loop0 [ 764.337767] erofs: options -> [ 764.344697] erofs: read_super, device -> /dev/loop4 [ 764.351804] erofs: cannot read erofs superblock 03:50:11 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000c80)=@raw={'raw\x00', 0x3c1, 0x3, 0x308, 0x0, 0x150, 0x150, 0x0, 0x3, 0x238, 0x238, 0x238, 0x238, 0x238, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x3], 0x0, 0x128, 0x150, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'dummy0\x00', {0x0, 0x0, 0x3, 0x0, 0x0, 0xfffd, 0x7}}}, @common=@ipv6header={{0x28, 'ipv6header\x00'}, {0x0, 0x81}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}, {{@uncond, 0x0, 0xa8, 0xe8}, @common=@inet=@LOG={0x40, 'LOG\x00', 0x0, {0x0, 0x0, "59e2b655a7928de9d18f6f4ce2fcb46e2fbbb084e62170a6b5ab23bc6a36"}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x368) [ 764.375799] erofs: cannot find valid erofs superblock [ 764.385563] erofs: options -> [ 764.397574] erofs: root inode @ nid 36 [ 764.417731] erofs: mounted on /dev/loop4 with opts: . 03:50:11 executing program 0: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="10000000c041", 0x6, 0x480}, {0x0, 0x7ffffffffffff, 0x1000}], 0x0, &(0x7f0000000040)) 03:50:12 executing program 2: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c0024", 0xf}, {&(0x7f0000010100)="10000300c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000040)) 03:50:12 executing program 5: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf01fdef000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c025", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000040)) [ 764.508594] erofs: read_super, device -> /dev/loop0 03:50:12 executing program 4: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf015c04000c0024", 0xf, 0x400}, {&(0x7f0000010100)="02000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000040)) 03:50:12 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000c80)=@raw={'raw\x00', 0x3c1, 0x3, 0x308, 0x0, 0x150, 0x150, 0x0, 0x3, 0x238, 0x238, 0x238, 0x238, 0x238, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x3], 0x0, 0x128, 0x150, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'dummy0\x00', {0x0, 0x0, 0x3, 0x0, 0x0, 0xfffd, 0x7}}}, @common=@ipv6header={{0x28, 'ipv6header\x00'}, {0x0, 0x81}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}, {{@uncond, 0x0, 0xa8, 0xe8}, @common=@inet=@LOG={0x40, 'LOG\x00', 0x0, {0x0, 0x0, "59e2b655a7928de9d18f6f4ce2fcb46e2fbbb084e62170a6b5ab23bc6a36"}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x368) [ 764.531447] erofs: read_super, device -> /dev/loop3 [ 764.537666] erofs: options -> [ 764.551974] erofs: cannot read erofs superblock [ 764.558306] erofs: options -> fault_injection=0x0000000000000000,noacl, [ 764.572291] erofs: unmounted for /dev/loop4 [ 764.579852] erofs: cannot read erofs superblock 03:50:12 executing program 0: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="10000000c041", 0x6, 0x480}, {0x0, 0x20000000000000, 0x1000}], 0x0, &(0x7f0000000040)) 03:50:12 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000c80)=@raw={'raw\x00', 0x3c1, 0x3, 0x308, 0x0, 0x150, 0x150, 0x0, 0x3, 0x238, 0x238, 0x238, 0x238, 0x238, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x3], 0x0, 0x128, 0x150, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'dummy0\x00', {0x0, 0x0, 0x3, 0x0, 0x0, 0xfffd, 0x7}}}, @common=@ipv6header={{0x28, 'ipv6header\x00'}, {0x0, 0x81}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}, {{@uncond, 0x0, 0xa8, 0xe8}, @common=@inet=@LOG={0x40, 'LOG\x00', 0x0, {0x0, 0x0, "59e2b655a7928de9d18f6f4ce2fcb46e2fbbb084e62170a6b5ab23bc6a36"}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x368) 03:50:12 executing program 5: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf01effd000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c025", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000040)) 03:50:12 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000c80)=@raw={'raw\x00', 0x3c1, 0x3, 0x308, 0x0, 0x150, 0x150, 0x0, 0x3, 0x238, 0x238, 0x238, 0x238, 0x238, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x3], 0x0, 0x128, 0x150, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'dummy0\x00', {0x0, 0x0, 0x3, 0x0, 0x0, 0xfffd, 0x7}}}, @common=@ipv6header={{0x28, 'ipv6header\x00'}, {0x0, 0x81}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}, {{@uncond, 0x0, 0xa8, 0xe8}, @common=@inet=@LOG={0x40, 'LOG\x00', 0x0, {0x0, 0x0, "59e2b655a7928de9d18f6f4ce2fcb46e2fbbb084e62170a6b5ab23bc6a36"}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x368) [ 764.688237] erofs: read_super, device -> /dev/loop2 [ 764.693487] erofs: options -> [ 764.699963] erofs: read_super, device -> /dev/loop4 [ 764.705078] erofs: cannot find valid erofs superblock [ 764.710398] erofs: options -> [ 764.714131] erofs: root inode @ nid 36 [ 764.718459] erofs: mounted on /dev/loop4 with opts: . [ 764.720867] erofs: read_super, device -> /dev/loop3 [ 764.737881] erofs: options -> fault_injection=0x0000000000000000,noacl, [ 764.767605] erofs: cannot read erofs superblock [ 764.797366] erofs: unmounted for /dev/loop4 03:50:12 executing program 3: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x300000000000000, 0x1000}], 0x0, &(0x7f0000000040)={[{@fault_injection={'fault_injection'}}, {@noacl='noacl'}]}) 03:50:12 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000c80)=@raw={'raw\x00', 0x3c1, 0x3, 0x308, 0x0, 0x150, 0x150, 0x0, 0x3, 0x238, 0x238, 0x238, 0x238, 0x238, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x3], 0x0, 0x128, 0x150, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'dummy0\x00', {0x0, 0x0, 0x3, 0x0, 0x0, 0xfffd, 0x7}}}, @common=@ipv6header={{0x28, 'ipv6header\x00'}, {0x0, 0x81}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}, {{@uncond, 0x0, 0xa8, 0xe8}, @common=@inet=@LOG={0x40, 'LOG\x00', 0x0, {0x0, 0x0, "59e2b655a7928de9d18f6f4ce2fcb46e2fbbb084e62170a6b5ab23bc6a36"}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x368) 03:50:12 executing program 5: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010002000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c025", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000040)) 03:50:12 executing program 4: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf015d04000c0024", 0xf, 0x400}, {&(0x7f0000010100)="02000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000040)) 03:50:12 executing program 2: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="10000300c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, 0x0) [ 764.828589] erofs: read_super, device -> /dev/loop0 [ 764.839855] erofs: options -> [ 764.843135] erofs: cannot read erofs superblock 03:50:12 executing program 5: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010003000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c025", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000040)) [ 764.939664] erofs: read_super, device -> /dev/loop0 [ 764.944857] erofs: options -> [ 764.950038] erofs: cannot read erofs superblock 03:50:12 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000c80)=@raw={'raw\x00', 0x3c1, 0x3, 0x308, 0x0, 0x150, 0x150, 0x0, 0x3, 0x238, 0x238, 0x238, 0x238, 0x238, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x3], 0x0, 0x128, 0x150, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'dummy0\x00', {0x0, 0x0, 0x3, 0x0, 0x0, 0xfffd, 0x7}}}, @common=@ipv6header={{0x28, 'ipv6header\x00'}, {0x0, 0x81}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}, {{@uncond, 0x0, 0xa8, 0xe8}, @common=@inet=@LOG={0x40, 'LOG\x00', 0x0, {0x0, 0x0, "59e2b655a7928de9d18f6f4ce2fcb46e2fbbb084e62170a6b5ab23bc6a36"}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x368) 03:50:12 executing program 0: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="10000000c041", 0x6, 0x480}, {0x0, 0xf0ffffff7f0000, 0x1000}], 0x0, &(0x7f0000000040)) [ 765.130756] erofs: read_super, device -> /dev/loop4 [ 765.138148] erofs: read_super, device -> /dev/loop3 [ 765.146465] erofs: options -> fault_injection=0x0000000000000000,noacl, [ 765.152376] erofs: options -> [ 765.168624] erofs: cannot read erofs superblock 03:50:12 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000c80)=@raw={'raw\x00', 0x3c1, 0x3, 0x308, 0x0, 0x150, 0x150, 0x0, 0x3, 0x238, 0x238, 0x238, 0x238, 0x238, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x3], 0x0, 0x128, 0x150, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'dummy0\x00', {0x0, 0x0, 0x3, 0x0, 0x0, 0xfffd, 0x7}}}, @common=@ipv6header={{0x28, 'ipv6header\x00'}, {0x0, 0x81}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}, {{@uncond, 0x0, 0xa8, 0xe8}, @common=@inet=@LOG={0x40, 'LOG\x00', 0x0, {0x0, 0x0, "59e2b655a7928de9d18f6f4ce2fcb46e2fbbb084e62170a6b5ab23bc6a36"}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x368) 03:50:12 executing program 2: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="10000300c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, 0x0) [ 765.187037] erofs: root inode @ nid 36 [ 765.192885] erofs: mounted on /dev/loop4 with opts: . [ 765.209965] erofs: read_super, device -> /dev/loop0 [ 765.217692] erofs: options -> [ 765.225489] erofs: cannot read erofs superblock 03:50:12 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000c80)=@raw={'raw\x00', 0x3c1, 0x3, 0x308, 0x0, 0x150, 0x150, 0x0, 0x3, 0x238, 0x238, 0x238, 0x238, 0x238, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x3], 0x0, 0x128, 0x150, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'dummy0\x00', {0x0, 0x0, 0x3, 0x0, 0x0, 0xfffd, 0x7}}}, @common=@ipv6header={{0x28, 'ipv6header\x00'}, {0x0, 0x81}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}, {{@uncond, 0x0, 0xa8, 0xe8}, @common=@inet=@LOG={0x40, 'LOG\x00', 0x0, {0x0, 0x0, "59e2b655a7928de9d18f6f4ce2fcb46e2fbbb084e62170a6b5ab23bc6a36"}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x368) [ 765.240280] erofs: read_super, device -> /dev/loop3 [ 765.245758] erofs: options -> fault_injection=0x0000000000000000,noacl, [ 765.261721] erofs: cannot read erofs superblock 03:50:12 executing program 3: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x400000000000000, 0x1000}], 0x0, &(0x7f0000000040)={[{@fault_injection={'fault_injection'}}, {@noacl='noacl'}]}) 03:50:12 executing program 4: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf015e04000c0024", 0xf, 0x400}, {&(0x7f0000010100)="02000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000040)) 03:50:12 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000c80)=@raw={'raw\x00', 0x3c1, 0x3, 0x308, 0x0, 0x150, 0x150, 0x0, 0x3, 0x238, 0x238, 0x238, 0x238, 0x238, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x3], 0x0, 0x128, 0x150, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'dummy0\x00', {0x0, 0x0, 0x3, 0x0, 0x0, 0xfffd, 0x7}}}, @common=@ipv6header={{0x28, 'ipv6header\x00'}, {0x0, 0x81}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}, {{@uncond, 0x0, 0xa8, 0xe8}, @common=@inet=@LOG={0x40, 'LOG\x00', 0x0, {0x0, 0x0, "59e2b655a7928de9d18f6f4ce2fcb46e2fbbb084e62170a6b5ab23bc6a36"}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x368) 03:50:12 executing program 5: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010004000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c025", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000040)) [ 765.323307] erofs: read_super, device -> /dev/loop0 [ 765.328574] erofs: options -> [ 765.333110] erofs: cannot read erofs superblock [ 765.356554] erofs: unmounted for /dev/loop4 03:50:12 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000c80)=@raw={'raw\x00', 0x3c1, 0x3, 0x308, 0x0, 0x150, 0x150, 0x0, 0x3, 0x238, 0x238, 0x238, 0x238, 0x238, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x3], 0x0, 0x128, 0x150, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'dummy0\x00', {0x0, 0x0, 0x3, 0x0, 0x0, 0xfffd, 0x7}}}, @common=@ipv6header={{0x28, 'ipv6header\x00'}, {0x0, 0x81}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}, {{@uncond, 0x0, 0xa8, 0xe8}, @common=@inet=@LOG={0x40, 'LOG\x00', 0x0, {0x0, 0x0, "59e2b655a7928de9d18f6f4ce2fcb46e2fbbb084e62170a6b5ab23bc6a36"}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x368) 03:50:12 executing program 2: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="10000300c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, 0x0) 03:50:13 executing program 0: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="10000000c041", 0x6, 0x480}, {0x0, 0x100000000000000, 0x1000}], 0x0, &(0x7f0000000040)) 03:50:13 executing program 5: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010007000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c025", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000040)) 03:50:13 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000c80)=@raw={'raw\x00', 0x3c1, 0x3, 0x308, 0x0, 0x150, 0x150, 0x0, 0x3, 0x238, 0x238, 0x238, 0x238, 0x238, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x3], 0x0, 0x128, 0x150, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'dummy0\x00', {0x0, 0x0, 0x3, 0x0, 0x0, 0xfffd, 0x7}}}, @common=@ipv6header={{0x28, 'ipv6header\x00'}, {0x0, 0x81}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}, {{@uncond, 0x0, 0xa8, 0xe8}, @common=@inet=@LOG={0x40, 'LOG\x00', 0x0, {0x0, 0x0, "59e2b655a7928de9d18f6f4ce2fcb46e2fbbb084e62170a6b5ab23bc6a36"}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x368) 03:50:13 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000c80)=@raw={'raw\x00', 0x3c1, 0x3, 0x308, 0x0, 0x150, 0x150, 0x0, 0x3, 0x238, 0x238, 0x238, 0x238, 0x238, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x3], 0x0, 0x128, 0x150, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'dummy0\x00', {0x0, 0x0, 0x3, 0x0, 0x0, 0xfffd, 0x7}}}, @common=@ipv6header={{0x28, 'ipv6header\x00'}, {0x0, 0x81}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}, {{@uncond, 0x0, 0xa8, 0xe8}, @common=@inet=@LOG={0x40, 'LOG\x00', 0x0, {0x0, 0x0, "59e2b655a7928de9d18f6f4ce2fcb46e2fbbb084e62170a6b5ab23bc6a36"}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x368) [ 765.530550] erofs: read_super, device -> /dev/loop3 [ 765.541592] erofs: options -> fault_injection=0x0000000000000000,noacl, [ 765.565209] erofs: cannot read erofs superblock 03:50:13 executing program 5: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000030c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c025", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000040)) [ 765.634996] erofs: read_super, device -> /dev/loop4 03:50:13 executing program 5: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000070c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c025", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000040)) [ 765.661128] erofs: options -> [ 765.666155] erofs: root inode @ nid 36 [ 765.670805] erofs: mounted on /dev/loop4 with opts: . [ 765.699273] erofs: read_super, device -> /dev/loop0 [ 765.704310] erofs: options -> [ 765.707552] erofs: cannot read erofs superblock [ 765.718334] erofs: read_super, device -> /dev/loop3 [ 765.723830] erofs: options -> fault_injection=0x0000000000000000,noacl, [ 765.744639] erofs: cannot read erofs superblock [ 765.784707] erofs: unmounted for /dev/loop4 03:50:13 executing program 3: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x500000000000000, 0x1000}], 0x0, &(0x7f0000000040)={[{@fault_injection={'fault_injection'}}, {@noacl='noacl'}]}) 03:50:13 executing program 5: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000200c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c025", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000040)) 03:50:13 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000c80)=@raw={'raw\x00', 0x3c1, 0x3, 0x308, 0x0, 0x150, 0x150, 0x0, 0x3, 0x238, 0x238, 0x238, 0x238, 0x238, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x3], 0x0, 0x128, 0x150, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'dummy0\x00', {0x0, 0x0, 0x3, 0x0, 0x0, 0xfffd, 0x7}}}, @common=@ipv6header={{0x28, 'ipv6header\x00'}, {0x0, 0x81}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}, {{@uncond, 0x0, 0xa8, 0xe8}, @common=@inet=@LOG={0x40, 'LOG\x00', 0x0, {0x0, 0x0, "59e2b655a7928de9d18f6f4ce2fcb46e2fbbb084e62170a6b5ab23bc6a36"}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x368) 03:50:13 executing program 4: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf015f04000c0024", 0xf, 0x400}, {&(0x7f0000010100)="02000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000040)) 03:50:13 executing program 2 (fault-call:0 fault-nth:0): syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="10000300c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000040)) [ 765.868691] erofs: read_super, device -> /dev/loop0 [ 765.873768] erofs: options -> [ 765.882724] erofs: cannot read erofs superblock [ 765.915301] FAULT_INJECTION: forcing a failure. [ 765.915301] name failslab, interval 1, probability 0, space 0, times 0 [ 765.926781] CPU: 1 PID: 11172 Comm: syz-executor.2 Not tainted 4.19.163-syzkaller #0 [ 765.934677] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 765.944042] Call Trace: [ 765.946640] dump_stack+0x1fc/0x2fe [ 765.950279] should_fail.cold+0xa/0x14 [ 765.954178] ? setup_fault_attr+0x200/0x200 [ 765.958537] ? lock_acquire+0x170/0x3c0 03:50:13 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000c80)=@raw={'raw\x00', 0x3c1, 0x3, 0x308, 0x0, 0x150, 0x150, 0x0, 0x3, 0x238, 0x238, 0x238, 0x238, 0x238, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x3], 0x0, 0x128, 0x150, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'dummy0\x00', {0x0, 0x0, 0x3, 0x0, 0x0, 0xfffd, 0x7}}}, @common=@ipv6header={{0x28, 'ipv6header\x00'}, {0x0, 0x81}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}, {{@uncond, 0x0, 0xa8, 0xe8}, @common=@inet=@LOG={0x40, 'LOG\x00', 0x0, {0x0, 0x0, "59e2b655a7928de9d18f6f4ce2fcb46e2fbbb084e62170a6b5ab23bc6a36"}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x368) [ 765.962524] __should_failslab+0x115/0x180 [ 765.966772] should_failslab+0x5/0xf [ 765.970494] __kmalloc+0x2ab/0x3c0 [ 765.974044] ? __se_sys_memfd_create+0xf8/0x440 [ 765.978725] __se_sys_memfd_create+0xf8/0x440 [ 765.983230] ? memfd_file_seals_ptr+0x150/0x150 [ 765.987927] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 765.993305] ? trace_hardirqs_off_caller+0x6e/0x210 [ 765.998331] ? do_syscall_64+0x21/0x620 [ 766.002314] do_syscall_64+0xf9/0x620 [ 766.006124] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 766.011307] RIP: 0033:0x45e149 [ 766.014491] Code: 0d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 766.033390] RSP: 002b:00007f4258f54a18 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 766.041102] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 000000000045e149 [ 766.048426] RDX: 0000000020000248 RSI: 0000000000000000 RDI: 00000000004c2bc7 [ 766.055681] RBP: 0000000000002000 R08: 0000000020000248 R09: 0000000000000000 [ 766.063041] R10: fe03f80fe03f80ff R11: 0000000000000246 R12: 0000000000000003 [ 766.070339] R13: 0000000020000100 R14: 0000000020000200 R15: 0000000020000040 03:50:13 executing program 0: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="10000000c041", 0x6, 0x480}, {0x0, 0x200000000000000, 0x1000}], 0x0, &(0x7f0000000040)) 03:50:13 executing program 5: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf0100fdef0c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c025", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000040)) 03:50:13 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000c80)=@raw={'raw\x00', 0x3c1, 0x3, 0x308, 0x0, 0x150, 0x150, 0x0, 0x3, 0x238, 0x238, 0x238, 0x238, 0x238, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0xca, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x3], 0x0, 0x128, 0x150, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'dummy0\x00', {0x0, 0x0, 0x3, 0x0, 0x0, 0xfffd, 0x7}}}, @common=@ipv6header={{0x28, 'ipv6header\x00'}, {0x0, 0x81}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}, {{@uncond, 0x0, 0xa8, 0xe8}, @common=@inet=@LOG={0x40, 'LOG\x00', 0x0, {0x0, 0x0, "59e2b655a7928de9d18f6f4ce2fcb46e2fbbb084e62170a6b5ab23bc6a36"}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x368) 03:50:13 executing program 2 (fault-call:0 fault-nth:1): syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="10000300c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000040)) [ 766.162718] erofs: read_super, device -> /dev/loop4 [ 766.168219] erofs: options -> [ 766.171768] erofs: root inode @ nid 36 [ 766.181182] erofs: mounted on /dev/loop4 with opts: . [ 766.219348] erofs: read_super, device -> /dev/loop3 [ 766.232477] erofs: options -> fault_injection=0x0000000000000000,noacl, 03:50:13 executing program 4: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf016004000c0024", 0xf, 0x400}, {&(0x7f0000010100)="02000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000040)) 03:50:13 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000c80)=@raw={'raw\x00', 0x3c1, 0x3, 0x308, 0x0, 0x150, 0x150, 0x0, 0x3, 0x238, 0x238, 0x238, 0x238, 0x238, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x3], 0x0, 0x128, 0x150, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'dummy0\x00', {0x0, 0x0, 0x3, 0x0, 0x0, 0xfffd, 0x7}}}, @common=@ipv6header={{0x28, 'ipv6header\x00'}, {0x0, 0x81}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}, {{@uncond, 0x0, 0xa8, 0xe8}, @common=@inet=@LOG={0x40, 'LOG\x00', 0x0, {0x0, 0x0, "59e2b655a7928de9d18f6f4ce2fcb46e2fbbb084e62170a6b5ab23bc6a36"}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x368) [ 766.265496] FAULT_INJECTION: forcing a failure. [ 766.265496] name failslab, interval 1, probability 0, space 0, times 0 [ 766.273958] erofs: cannot read erofs superblock [ 766.289991] erofs: unmounted for /dev/loop4 [ 766.295182] CPU: 1 PID: 11193 Comm: syz-executor.2 Not tainted 4.19.163-syzkaller #0 [ 766.303077] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 766.312433] Call Trace: [ 766.315029] dump_stack+0x1fc/0x2fe [ 766.318670] should_fail.cold+0xa/0x14 [ 766.322566] ? setup_fault_attr+0x200/0x200 [ 766.326897] ? lock_acquire+0x170/0x3c0 [ 766.330887] __should_failslab+0x115/0x180 [ 766.335128] should_failslab+0x5/0xf [ 766.338844] kmem_cache_alloc+0x277/0x370 [ 766.342997] ? shmem_destroy_callback+0xb0/0xb0 [ 766.347668] shmem_alloc_inode+0x18/0x40 [ 766.351732] ? shmem_destroy_callback+0xb0/0xb0 [ 766.356401] alloc_inode+0x5d/0x180 [ 766.360032] new_inode+0x1d/0xf0 [ 766.363401] shmem_get_inode+0x96/0x8d0 [ 766.367382] __shmem_file_setup.part.0+0x7a/0x2b0 [ 766.372230] shmem_file_setup+0x61/0x90 [ 766.376221] __se_sys_memfd_create+0x26b/0x440 [ 766.380813] ? memfd_file_seals_ptr+0x150/0x150 [ 766.385485] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 766.390859] ? trace_hardirqs_off_caller+0x6e/0x210 [ 766.395880] ? do_syscall_64+0x21/0x620 [ 766.399861] do_syscall_64+0xf9/0x620 [ 766.403672] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 766.408857] RIP: 0033:0x45e149 [ 766.412032] Code: 0d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 766.430985] RSP: 002b:00007f4258f54a18 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 766.438684] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 000000000045e149 [ 766.445945] RDX: 0000000020000248 RSI: 0000000000000000 RDI: 00000000004c2bc7 [ 766.453283] RBP: 0000000000002000 R08: 0000000020000248 R09: 0000000000000000 [ 766.460541] R10: fe03f80fe03f80ff R11: 0000000000000246 R12: 0000000000000003 [ 766.467801] R13: 0000000020000100 R14: 0000000020000200 R15: 0000000020000040 [ 766.514875] erofs: read_super, device -> /dev/loop4 [ 766.520125] erofs: options -> [ 766.523646] erofs: root inode @ nid 36 [ 766.527766] erofs: mounted on /dev/loop4 with opts: . [ 766.548299] erofs: read_super, device -> /dev/loop0 [ 766.585899] erofs: options -> [ 766.588222] erofs: read_super, device -> /dev/loop3 [ 766.594191] erofs: options -> fault_injection=0x0000000000000000,noacl, [ 766.615703] erofs: cannot read erofs superblock [ 766.625002] erofs: cannot read erofs superblock 03:50:14 executing program 3: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x600000000000000, 0x1000}], 0x0, &(0x7f0000000040)={[{@fault_injection={'fault_injection'}}, {@noacl='noacl'}]}) 03:50:14 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000c80)=@raw={'raw\x00', 0x3c1, 0x3, 0x308, 0x0, 0x150, 0x150, 0x0, 0x3, 0x238, 0x238, 0x238, 0x238, 0x238, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x3], 0x0, 0x128, 0x150, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'dummy0\x00', {0x0, 0x0, 0x3, 0x0, 0x0, 0xfffd, 0x7}}}, @common=@ipv6header={{0x28, 'ipv6header\x00'}, {0x0, 0x81}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}, {{@uncond, 0x0, 0xa8, 0xe8}, @common=@inet=@LOG={0x40, 'LOG\x00', 0x0, {0x0, 0x0, "59e2b655a7928de9d18f6f4ce2fcb46e2fbbb084e62170a6b5ab23bc6a36"}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x368) 03:50:14 executing program 5: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf0100effd0c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c025", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000040)) 03:50:14 executing program 2 (fault-call:0 fault-nth:2): syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="10000300c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000040)) 03:50:14 executing program 4: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf016104000c0024", 0xf, 0x400}, {&(0x7f0000010100)="02000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000040)) [ 766.638391] erofs: unmounted for /dev/loop4 03:50:14 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000c80)=@raw={'raw\x00', 0x3c1, 0x3, 0x308, 0x0, 0x150, 0x150, 0x0, 0x3, 0x238, 0x238, 0x238, 0x238, 0x238, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x3], 0x0, 0x128, 0x150, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'dummy0\x00', {0x0, 0x0, 0x3, 0x0, 0x0, 0xfffd, 0x7}}}, @common=@ipv6header={{0x28, 'ipv6header\x00'}, {0x0, 0x81}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}, {{@uncond, 0x0, 0xa8, 0xe8}, @common=@inet=@LOG={0x40, 'LOG\x00', 0x0, {0x0, 0x0, "59e2b655a7928de9d18f6f4ce2fcb46e2fbbb084e62170a6b5ab23bc6a36"}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x368) [ 766.685996] FAULT_INJECTION: forcing a failure. [ 766.685996] name failslab, interval 1, probability 0, space 0, times 0 [ 766.730140] CPU: 0 PID: 11221 Comm: syz-executor.2 Not tainted 4.19.163-syzkaller #0 [ 766.738056] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 766.747408] Call Trace: [ 766.750004] dump_stack+0x1fc/0x2fe [ 766.753644] should_fail.cold+0xa/0x14 [ 766.757540] ? setup_fault_attr+0x200/0x200 [ 766.761870] ? lock_acquire+0x170/0x3c0 [ 766.765862] __should_failslab+0x115/0x180 [ 766.770101] should_failslab+0x5/0xf [ 766.773826] kmem_cache_alloc+0x277/0x370 [ 766.777989] __d_alloc+0x2b/0xa10 [ 766.781454] d_alloc_pseudo+0x19/0x70 [ 766.785260] alloc_file_pseudo+0xc6/0x250 [ 766.789428] ? alloc_file+0x4d0/0x4d0 [ 766.791935] erofs: read_super, device -> /dev/loop4 [ 766.793235] ? lockdep_annotate_inode_mutex_key+0x43/0x130 [ 766.803852] ? shmem_get_inode+0x44c/0x8d0 [ 766.808098] __shmem_file_setup.part.0+0x102/0x2b0 [ 766.809064] erofs: options -> [ 766.813029] shmem_file_setup+0x61/0x90 [ 766.813049] __se_sys_memfd_create+0x26b/0x440 [ 766.813068] ? memfd_file_seals_ptr+0x150/0x150 [ 766.816584] erofs: root inode @ nid 36 [ 766.820239] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 766.820257] ? trace_hardirqs_off_caller+0x6e/0x210 [ 766.820271] ? do_syscall_64+0x21/0x620 [ 766.820287] do_syscall_64+0xf9/0x620 [ 766.820303] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 766.820312] RIP: 0033:0x45e149 [ 766.820328] Code: 0d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 766.831731] erofs: mounted on /dev/loop4 with opts: . [ 766.833418] RSP: 002b:00007f4258f54a18 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 766.833433] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 000000000045e149 [ 766.833442] RDX: 0000000020000248 RSI: 0000000000000000 RDI: 00000000004c2bc7 [ 766.833449] RBP: 0000000000002000 R08: 0000000020000248 R09: 0000000000000000 [ 766.833464] R10: fe03f80fe03f80ff R11: 0000000000000246 R12: 0000000000000003 [ 766.875753] erofs: read_super, device -> /dev/loop3 [ 766.878787] R13: 0000000020000100 R14: 0000000020000200 R15: 0000000020000040 [ 766.935883] erofs: read_super, device -> /dev/loop0 [ 766.961962] erofs: options -> [ 766.963158] erofs: options -> fault_injection=0x0000000000000000,noacl, [ 766.975121] erofs: cannot read erofs superblock 03:50:14 executing program 0: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="10000000c041", 0x6, 0x480}, {0x0, 0x300000000000000, 0x1000}], 0x0, &(0x7f0000000040)) 03:50:14 executing program 5: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000020c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c025", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000040)) 03:50:14 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000c80)=@raw={'raw\x00', 0x3c1, 0x3, 0x308, 0x0, 0x150, 0x150, 0x0, 0x3, 0x238, 0x238, 0x238, 0x238, 0x238, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x3], 0x0, 0x128, 0x150, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'dummy0\x00', {0x0, 0x0, 0x3, 0x0, 0x0, 0xfffd, 0x7}}}, @common=@ipv6header={{0x28, 'ipv6header\x00'}, {0x0, 0x81}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}, {{@uncond, 0x0, 0xa8, 0xe8}, @common=@inet=@LOG={0x40, 'LOG\x00', 0x0, {0x0, 0x0, "59e2b655a7928de9d18f6f4ce2fcb46e2fbbb084e62170a6b5ab23bc6a36"}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x368) 03:50:14 executing program 2 (fault-call:0 fault-nth:3): syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="10000300c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000040)) 03:50:14 executing program 4: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf016204000c0024", 0xf, 0x400}, {&(0x7f0000010100)="02000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000040)) [ 766.985240] erofs: cannot read erofs superblock [ 766.991828] erofs: unmounted for /dev/loop4 [ 767.044380] FAULT_INJECTION: forcing a failure. [ 767.044380] name failslab, interval 1, probability 0, space 0, times 0 [ 767.064697] CPU: 0 PID: 11249 Comm: syz-executor.2 Not tainted 4.19.163-syzkaller #0 [ 767.072617] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 767.081968] Call Trace: [ 767.084548] dump_stack+0x1fc/0x2fe [ 767.088169] should_fail.cold+0xa/0x14 [ 767.092044] ? setup_fault_attr+0x200/0x200 [ 767.096350] ? lock_acquire+0x170/0x3c0 [ 767.100315] __should_failslab+0x115/0x180 [ 767.104532] should_failslab+0x5/0xf [ 767.108227] kmem_cache_alloc+0x277/0x370 [ 767.112361] __alloc_file+0x21/0x330 [ 767.116058] alloc_empty_file+0x6d/0x170 [ 767.120103] alloc_file+0x5e/0x4d0 [ 767.123630] alloc_file_pseudo+0x165/0x250 [ 767.127857] ? alloc_file+0x4d0/0x4d0 [ 767.131644] ? lockdep_annotate_inode_mutex_key+0x43/0x130 [ 767.137251] ? shmem_get_inode+0x44c/0x8d0 [ 767.141473] __shmem_file_setup.part.0+0x102/0x2b0 [ 767.146387] shmem_file_setup+0x61/0x90 [ 767.150351] __se_sys_memfd_create+0x26b/0x440 [ 767.154935] ? memfd_file_seals_ptr+0x150/0x150 [ 767.159586] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 767.164937] ? trace_hardirqs_off_caller+0x6e/0x210 [ 767.169938] ? do_syscall_64+0x21/0x620 [ 767.173909] do_syscall_64+0xf9/0x620 [ 767.177693] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 767.182868] RIP: 0033:0x45e149 [ 767.186045] Code: 0d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 767.204929] RSP: 002b:00007f4258f54a18 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 767.212618] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 000000000045e149 [ 767.219868] RDX: 0000000020000248 RSI: 0000000000000000 RDI: 00000000004c2bc7 [ 767.227118] RBP: 0000000000002000 R08: 0000000020000248 R09: 0000000000000000 [ 767.234369] R10: fe03f80fe03f80ff R11: 0000000000000246 R12: 0000000000000003 03:50:14 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000c80)=@raw={'raw\x00', 0x3c1, 0x3, 0x308, 0x0, 0x150, 0x150, 0x0, 0x3, 0x238, 0x238, 0x238, 0x238, 0x238, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x3], 0x0, 0x128, 0x150, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'dummy0\x00', {0x0, 0x0, 0x3, 0x0, 0x0, 0xfffd, 0x7}}}, @common=@ipv6header={{0x28, 'ipv6header\x00'}, {0x0, 0x81}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}, {{@uncond, 0x0, 0xa8, 0xe8}, @common=@inet=@LOG={0x40, 'LOG\x00', 0x0, {0x0, 0x0, "59e2b655a7928de9d18f6f4ce2fcb46e2fbbb084e62170a6b5ab23bc6a36"}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x368) [ 767.241621] R13: 0000000020000100 R14: 0000000020000200 R15: 0000000020000040 03:50:14 executing program 3: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x700000000000000, 0x1000}], 0x0, &(0x7f0000000040)={[{@fault_injection={'fault_injection'}}, {@noacl='noacl'}]}) 03:50:14 executing program 2 (fault-call:0 fault-nth:4): syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="10000300c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000040)) 03:50:14 executing program 5: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000030c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c025", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000040)) 03:50:14 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000c80)=@raw={'raw\x00', 0x3c1, 0x3, 0x308, 0x0, 0x150, 0x150, 0x0, 0x3, 0x238, 0x238, 0x238, 0x238, 0x238, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x3], 0x0, 0x128, 0x150, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'dummy0\x00', {0x0, 0x0, 0x3, 0x0, 0x0, 0xfffd, 0x7}}}, @common=@ipv6header={{0x28, 'ipv6header\x00'}, {0x0, 0x81}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}, {{@uncond, 0x0, 0xa8, 0xe8}, @common=@inet=@LOG={0x40, 'LOG\x00', 0x0, {0x0, 0x0, "59e2b655a7928de9d18f6f4ce2fcb46e2fbbb084e62170a6b5ab23bc6a36"}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x368) [ 767.378080] erofs: read_super, device -> /dev/loop4 [ 767.383130] erofs: options -> [ 767.394941] erofs: root inode @ nid 36 [ 767.433731] erofs: mounted on /dev/loop4 with opts: . [ 767.443015] FAULT_INJECTION: forcing a failure. [ 767.443015] name failslab, interval 1, probability 0, space 0, times 0 [ 767.463208] erofs: read_super, device -> /dev/loop3 [ 767.468426] CPU: 0 PID: 11273 Comm: syz-executor.2 Not tainted 4.19.163-syzkaller #0 03:50:15 executing program 4: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf016304000c0024", 0xf, 0x400}, {&(0x7f0000010100)="02000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000040)) 03:50:15 executing program 5: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000040c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c025", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000040)) [ 767.476310] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 767.485664] Call Trace: [ 767.488264] dump_stack+0x1fc/0x2fe [ 767.491910] should_fail.cold+0xa/0x14 [ 767.495810] ? setup_fault_attr+0x200/0x200 [ 767.500144] ? lock_acquire+0x170/0x3c0 [ 767.504133] __should_failslab+0x115/0x180 [ 767.508375] should_failslab+0x5/0xf [ 767.512096] kmem_cache_alloc_trace+0x284/0x380 [ 767.516775] apparmor_file_alloc_security+0x394/0xad0 [ 767.521976] ? apparmor_file_receive+0x160/0x160 [ 767.526739] ? __alloc_file+0x21/0x330 [ 767.530642] security_file_alloc+0x40/0x90 [ 767.534886] __alloc_file+0xc9/0x330 [ 767.538606] alloc_empty_file+0x6d/0x170 [ 767.542676] alloc_file+0x5e/0x4d0 [ 767.546226] alloc_file_pseudo+0x165/0x250 [ 767.550456] ? alloc_file+0x4d0/0x4d0 [ 767.554244] ? lockdep_annotate_inode_mutex_key+0x43/0x130 [ 767.559917] ? shmem_get_inode+0x44c/0x8d0 [ 767.563952] erofs: options -> fault_injection=0x0000000000000000,noacl, [ 767.564149] __shmem_file_setup.part.0+0x102/0x2b0 [ 767.564166] shmem_file_setup+0x61/0x90 [ 767.579813] __se_sys_memfd_create+0x26b/0x440 [ 767.580576] erofs: cannot read erofs superblock [ 767.584402] ? memfd_file_seals_ptr+0x150/0x150 [ 767.584420] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 767.584436] ? trace_hardirqs_off_caller+0x6e/0x210 [ 767.584455] ? do_syscall_64+0x21/0x620 [ 767.608067] do_syscall_64+0xf9/0x620 [ 767.611867] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 767.617044] RIP: 0033:0x45e149 [ 767.620227] Code: 0d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 767.639122] RSP: 002b:00007f4258f54a18 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 767.646818] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 000000000045e149 [ 767.654070] RDX: 0000000020000248 RSI: 0000000000000000 RDI: 00000000004c2bc7 [ 767.661324] RBP: 0000000000002000 R08: 0000000020000248 R09: 0000000000000000 [ 767.668574] R10: fe03f80fe03f80ff R11: 0000000000000246 R12: 0000000000000003 [ 767.675864] R13: 0000000020000100 R14: 0000000020000200 R15: 0000000020000040 [ 767.687190] erofs: unmounted for /dev/loop4 [ 767.704951] erofs: read_super, device -> /dev/loop0 [ 767.715185] erofs: options -> [ 767.718713] erofs: cannot read erofs superblock [ 767.776025] erofs: read_super, device -> /dev/loop3 [ 767.781817] erofs: options -> fault_injection=0x0000000000000000,noacl, [ 767.789917] erofs: cannot read erofs superblock [ 767.792471] erofs: read_super, device -> /dev/loop4 [ 767.801289] erofs: options -> [ 767.804538] erofs: root inode @ nid 36 [ 767.810989] erofs: mounted on /dev/loop4 with opts: . [ 767.841427] erofs: read_super, device -> /dev/loop0 [ 767.846457] erofs: options -> [ 767.888243] erofs: cannot read erofs superblock [ 767.893947] erofs: unmounted for /dev/loop4 03:50:15 executing program 0: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="10000000c041", 0x6, 0x480}, {0x0, 0x37dc12502000000, 0x1000}], 0x0, &(0x7f0000000040)) 03:50:15 executing program 5: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000070c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c025", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000040)) 03:50:15 executing program 2 (fault-call:0 fault-nth:5): syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="10000300c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000040)) 03:50:15 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000c80)=@raw={'raw\x00', 0x3c1, 0x3, 0x308, 0x0, 0x150, 0x150, 0x0, 0x3, 0x238, 0x238, 0x238, 0x238, 0x238, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x3], 0x0, 0x128, 0x150, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'dummy0\x00', {0x0, 0x0, 0x3, 0x0, 0x0, 0xfffd, 0x7}}}, @common=@ipv6header={{0x28, 'ipv6header\x00'}, {0x0, 0x81}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}, {{@uncond, 0x0, 0xa8, 0xe8}, @common=@inet=@LOG={0x40, 'LOG\x00', 0x0, {0x0, 0x0, "59e2b655a7928de9d18f6f4ce2fcb46e2fbbb084e62170a6b5ab23bc6a36"}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x368) 03:50:15 executing program 4: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010005000c0024", 0xf, 0x400}, {&(0x7f0000010100)="02000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000040)) 03:50:15 executing program 3: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x800000000000000, 0x1000}], 0x0, &(0x7f0000000040)={[{@fault_injection={'fault_injection'}}, {@noacl='noacl'}]}) [ 768.011118] FAULT_INJECTION: forcing a failure. [ 768.011118] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 768.073856] erofs: read_super, device -> /dev/loop4 [ 768.079517] CPU: 1 PID: 11306 Comm: syz-executor.2 Not tainted 4.19.163-syzkaller #0 [ 768.087407] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 768.096762] Call Trace: [ 768.099361] dump_stack+0x1fc/0x2fe [ 768.103004] should_fail.cold+0xa/0x14 [ 768.106897] ? lock_acquire+0x170/0x3c0 [ 768.110881] ? setup_fault_attr+0x200/0x200 [ 768.115218] __alloc_pages_nodemask+0x239/0x2890 [ 768.119980] ? __lock_acquire+0x6de/0x3ff0 03:50:15 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000c80)=@raw={'raw\x00', 0x3c1, 0x3, 0x308, 0x0, 0x150, 0x150, 0x0, 0x3, 0x238, 0x238, 0x238, 0x238, 0x238, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x3], 0x0, 0x128, 0x150, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'dummy0\x00', {0x0, 0x0, 0x3, 0x0, 0x0, 0xfffd, 0x7}}}, @common=@ipv6header={{0x28, 'ipv6header\x00'}, {0x0, 0x81}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}, {{@uncond, 0x0, 0xa8, 0xe8}, @common=@inet=@LOG={0x40, 'LOG\x00', 0x0, {0x0, 0x0, "59e2b655a7928de9d18f6f4ce2fcb46e2fbbb084e62170a6b5ab23bc6a36"}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x368) [ 768.124231] ? static_obj+0x50/0x50 [ 768.127871] ? __lock_acquire+0x6de/0x3ff0 [ 768.132112] ? gfp_pfmemalloc_allowed+0x150/0x150 [ 768.136956] ? __lock_acquire+0x6de/0x3ff0 [ 768.141199] ? deref_stack_reg+0x134/0x1d0 [ 768.145467] ? mark_held_locks+0xf0/0xf0 [ 768.149536] ? mark_held_locks+0xf0/0xf0 [ 768.153612] ? unwind_next_frame+0x10a9/0x1c60 [ 768.158208] alloc_pages_vma+0xf2/0x780 [ 768.162223] shmem_alloc_page+0x11c/0x1f0 [ 768.166376] ? shmem_swapin+0x220/0x220 [ 768.170377] ? percpu_counter_add_batch+0x126/0x180 [ 768.175405] ? __vm_enough_memory+0x316/0x650 [ 768.179910] shmem_alloc_and_acct_page+0x15a/0x850 [ 768.182385] erofs: options -> [ 768.184848] shmem_getpage_gfp+0x4e9/0x37f0 [ 768.184879] ? shmem_alloc_and_acct_page+0x850/0x850 [ 768.197473] ? mark_held_locks+0xa6/0xf0 [ 768.201542] ? ktime_get_coarse_real_ts64+0x1c7/0x290 [ 768.206748] ? iov_iter_fault_in_readable+0x1fc/0x3f0 [ 768.211310] erofs: root inode @ nid 36 [ 768.211943] shmem_write_begin+0xff/0x1e0 [ 768.211961] generic_perform_write+0x1f8/0x4d0 [ 768.224576] ? filemap_page_mkwrite+0x2f0/0x2f0 [ 768.225691] erofs: mounted on /dev/loop4 with opts: . [ 768.229281] ? current_time+0x1c0/0x1c0 [ 768.229301] ? lock_acquire+0x170/0x3c0 [ 768.229319] __generic_file_write_iter+0x24b/0x610 [ 768.229338] generic_file_write_iter+0x3f8/0x729 [ 768.229357] __vfs_write+0x51b/0x770 [ 768.229372] ? kernel_read+0x110/0x110 [ 768.229392] ? check_preemption_disabled+0x41/0x280 [ 768.229411] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 768.253314] erofs: read_super, device -> /dev/loop3 [ 768.255852] vfs_write+0x1f3/0x540 [ 768.272633] erofs: read_super, device -> /dev/loop0 [ 768.274745] __x64_sys_pwrite64+0x1f7/0x250 [ 768.274762] ? ksys_pwrite64+0x1a0/0x1a0 [ 768.274779] ? trace_hardirqs_off_caller+0x6e/0x210 [ 768.274793] ? do_syscall_64+0x21/0x620 [ 768.274809] do_syscall_64+0xf9/0x620 [ 768.274823] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 768.274833] RIP: 0033:0x417ca7 [ 768.274847] Code: 12 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 a1 18 00 00 c3 48 83 ec 08 e8 07 fa ff ff 48 89 04 24 49 89 ca b8 12 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 4d fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 768.274854] RSP: 002b:00007f4258f54a10 EFLAGS: 00000293 ORIG_RAX: 0000000000000012 [ 768.274868] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 0000000000417ca7 [ 768.274876] RDX: 000000000000000f RSI: 0000000020010000 RDI: 0000000000000004 [ 768.274884] RBP: 0000000000000000 R08: 0000000020000248 R09: 0000000000000000 [ 768.274892] R10: 0000000000000400 R11: 0000000000000293 R12: 0000000000000003 03:50:15 executing program 4: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010006000c0024", 0xf, 0x400}, {&(0x7f0000010100)="02000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000040)) 03:50:15 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000c80)=@raw={'raw\x00', 0x3c1, 0x3, 0x308, 0x0, 0x150, 0x150, 0x0, 0x3, 0x238, 0x238, 0x238, 0x238, 0x238, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x3], 0x0, 0x128, 0x150, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'dummy0\x00', {0x0, 0x0, 0x3, 0x0, 0x0, 0xfffd, 0x7}}}, @common=@ipv6header={{0x28, 'ipv6header\x00'}, {0x0, 0x81}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}, {{@uncond, 0x0, 0xa8, 0xe8}, @common=@inet=@LOG={0x40, 'LOG\x00', 0x0, {0x0, 0x0, "59e2b655a7928de9d18f6f4ce2fcb46e2fbbb084e62170a6b5ab23bc6a36"}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x368) [ 768.274900] R13: 0000000000000004 R14: 0000000000000004 R15: 0000000020000210 [ 768.303231] erofs: options -> fault_injection=0x0000000000000000,noacl, [ 768.306846] erofs: options -> [ 768.325243] erofs: cannot read erofs superblock [ 768.399581] erofs: unmounted for /dev/loop4 [ 768.411559] erofs: cannot read erofs superblock 03:50:16 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000c80)=@raw={'raw\x00', 0x3c1, 0x3, 0x308, 0x0, 0x150, 0x150, 0x0, 0x3, 0x238, 0x238, 0x238, 0x238, 0x238, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x3], 0x0, 0x128, 0x150, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'dummy0\x00', {0x0, 0x0, 0x3, 0x0, 0x0, 0xfffd, 0x7}}}, @common=@ipv6header={{0x28, 'ipv6header\x00'}, {0x0, 0x81}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}, {{@uncond, 0x0, 0xa8, 0xe8}, @common=@inet=@LOG={0x40, 'LOG\x00', 0x0, {0x0, 0x0, "59e2b655a7928de9d18f6f4ce2fcb46e2fbbb084e62170a6b5ab23bc6a36"}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x368) 03:50:16 executing program 5: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c0224", 0xf, 0x400}, {&(0x7f0000010100)="05000000c025", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000040)) [ 768.506421] erofs: read_super, device -> /dev/loop4 [ 768.511623] erofs: read_super, device -> /dev/loop2 [ 768.511631] erofs: options -> [ 768.520131] erofs: options -> [ 768.523467] erofs: root inode @ nid 36 [ 768.524868] erofs: cannot find valid erofs superblock [ 768.527436] erofs: mounted on /dev/loop4 with opts: . [ 768.534163] erofs: read_super, device -> /dev/loop0 [ 768.543848] erofs: options -> [ 768.547660] erofs: cannot read erofs superblock 03:50:16 executing program 2 (fault-call:0 fault-nth:6): syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="10000300c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000040)) [ 768.613895] erofs: read_super, device -> /dev/loop3 [ 768.620672] erofs: options -> fault_injection=0x0000000000000000,noacl, [ 768.630828] erofs: cannot read erofs superblock 03:50:16 executing program 0: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="10000000c041", 0x6, 0x480}, {0x0, 0x400000000000000, 0x1000}], 0x0, &(0x7f0000000040)) 03:50:16 executing program 5: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c0324", 0xf, 0x400}, {&(0x7f0000010100)="05000000c025", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000040)) 03:50:16 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000c80)=@raw={'raw\x00', 0x3c1, 0x3, 0x308, 0x0, 0x150, 0x150, 0x0, 0x3, 0x238, 0x238, 0x238, 0x238, 0x238, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x3], 0x0, 0x128, 0x150, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'dummy0\x00', {0x0, 0x0, 0x3, 0x0, 0x0, 0xfffd, 0x7}}}, @common=@ipv6header={{0x28, 'ipv6header\x00'}, {0x0, 0x81}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}, {{@uncond, 0x0, 0xa8, 0xe8}, @common=@inet=@LOG={0x40, 'LOG\x00', 0x0, {0x0, 0x0, "59e2b655a7928de9d18f6f4ce2fcb46e2fbbb084e62170a6b5ab23bc6a36"}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x368) 03:50:16 executing program 4: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010007000c0024", 0xf, 0x400}, {&(0x7f0000010100)="02000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000040)) [ 768.689210] erofs: unmounted for /dev/loop4 03:50:16 executing program 3: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x900000000000000, 0x1000}], 0x0, &(0x7f0000000040)={[{@fault_injection={'fault_injection'}}, {@noacl='noacl'}]}) [ 768.716254] FAULT_INJECTION: forcing a failure. [ 768.716254] name failslab, interval 1, probability 0, space 0, times 0 [ 768.755212] CPU: 1 PID: 11362 Comm: syz-executor.2 Not tainted 4.19.163-syzkaller #0 03:50:16 executing program 5: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c0424", 0xf, 0x400}, {&(0x7f0000010100)="05000000c025", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000040)) [ 768.763129] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 768.772484] Call Trace: [ 768.775078] dump_stack+0x1fc/0x2fe [ 768.778720] should_fail.cold+0xa/0x14 [ 768.782620] ? setup_fault_attr+0x200/0x200 [ 768.786962] ? lock_acquire+0x170/0x3c0 [ 768.791055] __should_failslab+0x115/0x180 [ 768.795295] should_failslab+0x5/0xf [ 768.799012] kmem_cache_alloc+0x277/0x370 [ 768.803172] getname_flags+0xce/0x590 [ 768.806979] do_sys_open+0x26c/0x520 [ 768.810698] ? filp_open+0x70/0x70 03:50:16 executing program 5: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c0724", 0xf, 0x400}, {&(0x7f0000010100)="05000000c025", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000040)) [ 768.814248] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 768.819633] ? trace_hardirqs_off_caller+0x6e/0x210 [ 768.824657] ? do_syscall_64+0x21/0x620 [ 768.828638] do_syscall_64+0xf9/0x620 [ 768.832448] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 768.837640] RIP: 0033:0x417c41 [ 768.840837] Code: 75 14 b8 02 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 04 19 00 00 c3 48 83 ec 08 e8 6a fa ff ff 48 89 04 24 b8 02 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 b3 fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 03:50:16 executing program 5: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c0024", 0x40f, 0x400}, {&(0x7f0000010100)="05000000c025", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000040)) 03:50:16 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000c80)=@raw={'raw\x00', 0x3c1, 0x3, 0x308, 0x0, 0x150, 0x150, 0x0, 0x3, 0x238, 0x238, 0x238, 0x238, 0x238, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x3], 0x0, 0x128, 0x150, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'dummy0\x00', {0x0, 0x0, 0x3, 0x0, 0x0, 0xfffd, 0x7}}}, @common=@ipv6header={{0x28, 'ipv6header\x00'}, {0x0, 0x81}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}, {{@uncond, 0x0, 0xa8, 0xe8}, @common=@inet=@LOG={0x40, 'LOG\x00', 0x0, {0x0, 0x0, "59e2b655a7928de9d18f6f4ce2fcb46e2fbbb084e62170a6b5ab23bc6a36"}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x368) [ 768.859736] RSP: 002b:00007f4258f54a10 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 768.867446] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000417c41 [ 768.874713] RDX: 0000000000000000 RSI: 0000000000000002 RDI: 00007f4258f54ad0 [ 768.881984] RBP: 0000000000000000 R08: 0000000020000248 R09: 0000000000000000 [ 768.889256] R10: 0000000000001000 R11: 0000000000000293 R12: 0000000000000003 [ 768.896527] R13: 0000000000000004 R14: 0000000000000004 R15: 0000000020000258 03:50:16 executing program 5: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c0024", 0xfdef, 0x400}, {&(0x7f0000010100)="05000000c025", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000040)) 03:50:16 executing program 2 (fault-call:0 fault-nth:7): syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="10000300c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000040)) [ 768.918211] erofs: read_super, device -> /dev/loop0 [ 768.923680] erofs: options -> [ 768.952978] erofs: cannot read erofs superblock 03:50:16 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000c80)=@raw={'raw\x00', 0x3c1, 0x3, 0x308, 0x0, 0x150, 0x150, 0x0, 0x3, 0x238, 0x238, 0x238, 0x238, 0x238, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x3], 0x0, 0x128, 0x150, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'dummy0\x00', {0x0, 0x0, 0x3, 0x0, 0x0, 0xfffd, 0x7}}}, @common=@ipv6header={{0x28, 'ipv6header\x00'}, {0x0, 0x81}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}, {{@uncond, 0x0, 0xa8, 0xe8}, @common=@inet=@LOG={0x40, 'LOG\x00', 0x0, {0x0, 0x0, "59e2b655a7928de9d18f6f4ce2fcb46e2fbbb084e62170a6b5ab23bc6a36"}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x368) [ 768.987926] erofs: read_super, device -> /dev/loop4 [ 768.994334] erofs: options -> [ 768.997586] erofs: root inode @ nid 36 [ 769.036433] FAULT_INJECTION: forcing a failure. [ 769.036433] name failslab, interval 1, probability 0, space 0, times 0 [ 769.043776] erofs: mounted on /dev/loop4 with opts: . [ 769.058273] CPU: 0 PID: 11393 Comm: syz-executor.2 Not tainted 4.19.163-syzkaller #0 [ 769.066172] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 769.075525] Call Trace: [ 769.078128] dump_stack+0x1fc/0x2fe [ 769.081759] should_fail.cold+0xa/0x14 [ 769.085634] ? setup_fault_attr+0x200/0x200 [ 769.089940] ? lock_acquire+0x170/0x3c0 [ 769.093919] __should_failslab+0x115/0x180 [ 769.098143] should_failslab+0x5/0xf [ 769.101841] kmem_cache_alloc+0x277/0x370 [ 769.105976] __alloc_file+0x21/0x330 [ 769.109703] alloc_empty_file+0x6d/0x170 [ 769.113754] path_openat+0xe9/0x2df0 [ 769.117451] ? __lock_acquire+0x6de/0x3ff0 [ 769.121677] ? path_lookupat+0x8d0/0x8d0 [ 769.125722] ? mark_held_locks+0xf0/0xf0 [ 769.129767] ? mark_held_locks+0xf0/0xf0 [ 769.133832] do_filp_open+0x18c/0x3f0 [ 769.137620] ? may_open_dev+0xf0/0xf0 [ 769.141406] ? __alloc_fd+0x28d/0x570 [ 769.145204] ? lock_downgrade+0x720/0x720 [ 769.149333] ? lock_acquire+0x170/0x3c0 [ 769.153298] ? __alloc_fd+0x34/0x570 [ 769.156999] ? do_raw_spin_unlock+0x171/0x230 [ 769.161481] ? _raw_spin_unlock+0x29/0x40 [ 769.165613] ? __alloc_fd+0x28d/0x570 [ 769.169400] do_sys_open+0x3b3/0x520 [ 769.173098] ? filp_open+0x70/0x70 [ 769.176640] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 769.181990] ? trace_hardirqs_off_caller+0x6e/0x210 [ 769.186990] ? do_syscall_64+0x21/0x620 [ 769.190951] do_syscall_64+0xf9/0x620 [ 769.194739] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 769.199913] RIP: 0033:0x417c41 [ 769.203091] Code: 75 14 b8 02 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 04 19 00 00 c3 48 83 ec 08 e8 6a fa ff ff 48 89 04 24 b8 02 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 b3 fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 769.221972] RSP: 002b:00007f4258f54a10 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 769.229664] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000417c41 [ 769.236927] RDX: 0000000000000000 RSI: 0000000000000002 RDI: 00007f4258f54ad0 [ 769.244194] RBP: 0000000000000000 R08: 0000000020000248 R09: 0000000000000000 [ 769.251447] R10: 0000000000001000 R11: 0000000000000293 R12: 0000000000000003 [ 769.258710] R13: 0000000000000004 R14: 0000000000000004 R15: 0000000020000258 [ 769.301538] erofs: read_super, device -> /dev/loop0 [ 769.306584] erofs: options -> [ 769.326579] erofs: read_super, device -> /dev/loop3 [ 769.334283] erofs: options -> fault_injection=0x0000000000000000,noacl, [ 769.341697] erofs: cannot read erofs superblock [ 769.352416] erofs: cannot read erofs superblock [ 769.358033] erofs: unmounted for /dev/loop4 03:50:16 executing program 0: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="10000000c041", 0x6, 0x480}, {0x0, 0x800000000000000, 0x1000}], 0x0, &(0x7f0000000040)) 03:50:16 executing program 2 (fault-call:0 fault-nth:8): syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="10000300c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000040)) 03:50:16 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000c80)=@raw={'raw\x00', 0x3c1, 0x3, 0x308, 0x0, 0x150, 0x150, 0x0, 0x3, 0x238, 0x238, 0x238, 0x238, 0x238, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x3], 0x0, 0x128, 0x150, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'dummy0\x00', {0x0, 0x0, 0x3, 0x0, 0x0, 0xfffd, 0x7}}}, @common=@ipv6header={{0x28, 'ipv6header\x00'}, {0x0, 0x81}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}, {{@uncond, 0x0, 0xa8, 0xe8}, @common=@inet=@LOG={0x40, 'LOG\x00', 0x0, {0x0, 0x0, "59e2b655a7928de9d18f6f4ce2fcb46e2fbbb084e62170a6b5ab23bc6a36"}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x368) 03:50:16 executing program 4: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010020000c0024", 0xf, 0x400}, {&(0x7f0000010100)="02000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000040)) [ 769.418403] erofs: read_super, device -> /dev/loop3 [ 769.426980] erofs: options -> fault_injection=0x0000000000000000,noacl, [ 769.444504] erofs: cannot read erofs superblock [ 769.477360] FAULT_INJECTION: forcing a failure. [ 769.477360] name failslab, interval 1, probability 0, space 0, times 0 [ 769.497444] CPU: 0 PID: 11419 Comm: syz-executor.2 Not tainted 4.19.163-syzkaller #0 [ 769.505364] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 769.514723] Call Trace: [ 769.517312] dump_stack+0x1fc/0x2fe [ 769.521027] should_fail.cold+0xa/0x14 [ 769.524900] ? setup_fault_attr+0x200/0x200 [ 769.529204] ? lock_acquire+0x170/0x3c0 [ 769.533166] __should_failslab+0x115/0x180 [ 769.537409] should_failslab+0x5/0xf [ 769.541153] kmem_cache_alloc+0x277/0x370 [ 769.545286] __alloc_file+0x21/0x330 [ 769.548985] alloc_empty_file+0x6d/0x170 [ 769.553029] path_openat+0xe9/0x2df0 [ 769.556724] ? __lock_acquire+0x6de/0x3ff0 [ 769.560942] ? path_lookupat+0x8d0/0x8d0 [ 769.564988] ? mark_held_locks+0xf0/0xf0 [ 769.569037] do_filp_open+0x18c/0x3f0 [ 769.572855] ? may_open_dev+0xf0/0xf0 [ 769.576644] ? __alloc_fd+0x28d/0x570 [ 769.580430] ? lock_downgrade+0x720/0x720 [ 769.584557] ? lock_acquire+0x170/0x3c0 [ 769.588512] ? __alloc_fd+0x34/0x570 [ 769.592209] ? do_raw_spin_unlock+0x171/0x230 [ 769.596688] ? _raw_spin_unlock+0x29/0x40 [ 769.600955] ? __alloc_fd+0x28d/0x570 [ 769.604810] do_sys_open+0x3b3/0x520 [ 769.608520] ? filp_open+0x70/0x70 [ 769.612047] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 769.617395] ? trace_hardirqs_off_caller+0x6e/0x210 [ 769.622401] ? do_syscall_64+0x21/0x620 [ 769.626409] do_syscall_64+0xf9/0x620 [ 769.630193] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 769.635399] RIP: 0033:0x417c41 [ 769.638575] Code: 75 14 b8 02 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 04 19 00 00 c3 48 83 ec 08 e8 6a fa ff ff 48 89 04 24 b8 02 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 b3 fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 769.657727] RSP: 002b:00007f4258f54a10 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 769.665415] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000417c41 [ 769.672665] RDX: 0000000000000000 RSI: 0000000000000002 RDI: 00007f4258f54ad0 [ 769.679926] RBP: 0000000000000000 R08: 0000000020000248 R09: 0000000000000000 [ 769.687176] R10: 0000000000001000 R11: 0000000000000293 R12: 0000000000000003 [ 769.694425] R13: 0000000000000004 R14: 0000000000000004 R15: 0000000020000258 03:50:17 executing program 3: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x1000000000000000, 0x1000}], 0x0, &(0x7f0000000040)={[{@fault_injection={'fault_injection'}}, {@noacl='noacl'}]}) 03:50:17 executing program 5: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c0024", 0x87ffc00, 0x400}, {&(0x7f0000010100)="05000000c025", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000040)) 03:50:17 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000c80)=@raw={'raw\x00', 0x3c1, 0x3, 0x308, 0x0, 0x150, 0x150, 0x0, 0x3, 0x238, 0x238, 0x238, 0x238, 0x238, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xca, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x3], 0x0, 0x128, 0x150, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'dummy0\x00', {0x0, 0x0, 0x3, 0x0, 0x0, 0xfffd, 0x7}}}, @common=@ipv6header={{0x28, 'ipv6header\x00'}, {0x0, 0x81}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}, {{@uncond, 0x0, 0xa8, 0xe8}, @common=@inet=@LOG={0x40, 'LOG\x00', 0x0, {0x0, 0x0, "59e2b655a7928de9d18f6f4ce2fcb46e2fbbb084e62170a6b5ab23bc6a36"}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x368) 03:50:17 executing program 2 (fault-call:0 fault-nth:9): syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="10000300c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000040)) [ 769.740992] erofs: read_super, device -> /dev/loop4 [ 769.746030] erofs: options -> [ 769.772019] erofs: root inode @ nid 36 [ 769.806542] erofs: mounted on /dev/loop4 with opts: . [ 769.826236] FAULT_INJECTION: forcing a failure. [ 769.826236] name failslab, interval 1, probability 0, space 0, times 0 [ 769.842840] erofs: read_super, device -> /dev/loop0 [ 769.853599] erofs: options -> [ 769.856175] CPU: 0 PID: 11436 Comm: syz-executor.2 Not tainted 4.19.163-syzkaller #0 [ 769.863783] erofs: cannot read erofs superblock [ 769.864720] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 769.864725] Call Trace: [ 769.864746] dump_stack+0x1fc/0x2fe [ 769.864767] should_fail.cold+0xa/0x14 [ 769.888927] ? setup_fault_attr+0x200/0x200 [ 769.893266] ? lock_acquire+0x170/0x3c0 [ 769.897247] __should_failslab+0x115/0x180 [ 769.901487] should_failslab+0x5/0xf [ 769.905206] kmem_cache_alloc_trace+0x284/0x380 [ 769.909893] apparmor_file_alloc_security+0x394/0xad0 [ 769.915091] ? apparmor_file_receive+0x160/0x160 [ 769.919861] ? __alloc_file+0x21/0x330 [ 769.923767] security_file_alloc+0x40/0x90 [ 769.928005] __alloc_file+0xc9/0x330 [ 769.931724] alloc_empty_file+0x6d/0x170 [ 769.935791] path_openat+0xe9/0x2df0 [ 769.939513] ? __lock_acquire+0x6de/0x3ff0 [ 769.943761] ? path_lookupat+0x8d0/0x8d0 [ 769.947828] ? mark_held_locks+0xf0/0xf0 [ 769.951904] do_filp_open+0x18c/0x3f0 [ 769.956669] ? may_open_dev+0xf0/0xf0 [ 769.960475] ? __alloc_fd+0x28d/0x570 [ 769.964285] ? lock_downgrade+0x720/0x720 [ 769.968435] ? lock_acquire+0x170/0x3c0 [ 769.972416] ? __alloc_fd+0x34/0x570 [ 769.976136] ? do_raw_spin_unlock+0x171/0x230 [ 769.980638] ? _raw_spin_unlock+0x29/0x40 [ 769.984788] ? __alloc_fd+0x28d/0x570 [ 769.988594] do_sys_open+0x3b3/0x520 [ 769.992311] ? filp_open+0x70/0x70 [ 769.995853] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 770.001219] ? trace_hardirqs_off_caller+0x6e/0x210 [ 770.006239] ? do_syscall_64+0x21/0x620 [ 770.010216] do_syscall_64+0xf9/0x620 [ 770.014023] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 770.019218] RIP: 0033:0x417c41 [ 770.022412] Code: 75 14 b8 02 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 04 19 00 00 c3 48 83 ec 08 e8 6a fa ff ff 48 89 04 24 b8 02 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 b3 fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 770.041317] RSP: 002b:00007f4258f54a10 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 770.049036] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000417c41 03:50:17 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000c80)=@raw={'raw\x00', 0x3c1, 0x3, 0x308, 0x0, 0x150, 0x150, 0x0, 0x3, 0x238, 0x238, 0x238, 0x238, 0x238, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x3], 0x0, 0x128, 0x150, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'dummy0\x00', {0x0, 0x0, 0x3, 0x0, 0x0, 0xfffd, 0x7}}}, @common=@ipv6header={{0x28, 'ipv6header\x00'}, {0x0, 0x81}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}, {{@uncond, 0x0, 0xa8, 0xe8}, @common=@inet=@LOG={0x40, 'LOG\x00', 0x0, {0x0, 0x0, "59e2b655a7928de9d18f6f4ce2fcb46e2fbbb084e62170a6b5ab23bc6a36"}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x368) [ 770.056308] RDX: 0000000000000000 RSI: 0000000000000002 RDI: 00007f4258f54ad0 [ 770.063582] RBP: 0000000000000000 R08: 0000000020000248 R09: 0000000000000000 [ 770.070852] R10: 0000000000001000 R11: 0000000000000293 R12: 0000000000000003 [ 770.078124] R13: 0000000000000004 R14: 0000000000000004 R15: 0000000020000258 03:50:17 executing program 4: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf01f826000c0024", 0xf, 0x400}, {&(0x7f0000010100)="02000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000040)) 03:50:17 executing program 2 (fault-call:0 fault-nth:10): syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="10000300c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000040)) 03:50:17 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000c80)=@raw={'raw\x00', 0x3c1, 0x3, 0x308, 0x0, 0x150, 0x150, 0x0, 0x3, 0x238, 0x238, 0x238, 0x238, 0x238, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x3], 0x0, 0x128, 0x150, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'dummy0\x00', {0x0, 0x0, 0x3, 0x0, 0x0, 0xfffd, 0x7}}}, @common=@ipv6header={{0x28, 'ipv6header\x00'}, {0x0, 0x81}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}, {{@uncond, 0x0, 0xa8, 0xe8}, @common=@inet=@LOG={0x40, 'LOG\x00', 0x0, {0x0, 0x0, "59e2b655a7928de9d18f6f4ce2fcb46e2fbbb084e62170a6b5ab23bc6a36"}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x368) [ 770.138670] erofs: unmounted for /dev/loop4 [ 770.139313] erofs: read_super, device -> /dev/loop3 [ 770.163155] erofs: options -> fault_injection=0x0000000000000000,noacl, [ 770.171577] erofs: cannot read erofs superblock [ 770.211418] erofs: read_super, device -> /dev/loop0 [ 770.222432] erofs: options -> [ 770.227611] erofs: cannot read erofs superblock 03:50:17 executing program 0: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="10000000c041", 0x6, 0x480}, {0x0, 0x8000000000000000, 0x1000}], 0x0, &(0x7f0000000040)) 03:50:17 executing program 3: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x1400000000000000, 0x1000}], 0x0, &(0x7f0000000040)={[{@fault_injection={'fault_injection'}}, {@noacl='noacl'}]}) 03:50:17 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000c80)=@raw={'raw\x00', 0x3c1, 0x3, 0x308, 0x0, 0x150, 0x150, 0x0, 0x3, 0x238, 0x238, 0x238, 0x238, 0x238, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x3], 0x0, 0x128, 0x150, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'dummy0\x00', {0x0, 0x0, 0x3, 0x0, 0x0, 0xfffd, 0x7}}}, @common=@ipv6header={{0x28, 'ipv6header\x00'}, {0x0, 0x81}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}, {{@uncond, 0x0, 0xa8, 0xe8}, @common=@inet=@LOG={0x40, 'LOG\x00', 0x0, {0x0, 0x0, "59e2b655a7928de9d18f6f4ce2fcb46e2fbbb084e62170a6b5ab23bc6a36"}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x368) [ 770.306678] FAULT_INJECTION: forcing a failure. [ 770.306678] name failslab, interval 1, probability 0, space 0, times 0 [ 770.332784] CPU: 0 PID: 11461 Comm: syz-executor.2 Not tainted 4.19.163-syzkaller #0 [ 770.340689] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 770.350054] Call Trace: [ 770.352650] dump_stack+0x1fc/0x2fe 03:50:17 executing program 5: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c0024", 0x2001000f, 0x400}, {&(0x7f0000010100)="05000000c025", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000040)) [ 770.356290] should_fail.cold+0xa/0x14 [ 770.360185] ? setup_fault_attr+0x200/0x200 [ 770.364512] ? lock_acquire+0x170/0x3c0 [ 770.368503] __should_failslab+0x115/0x180 [ 770.372745] should_failslab+0x5/0xf [ 770.376466] kmem_cache_alloc_trace+0x284/0x380 [ 770.381146] ? loop_info64_to_compat+0x5e0/0x5e0 [ 770.385910] __kthread_create_on_node+0xd2/0x410 [ 770.390673] ? kthread_parkme+0xa0/0xa0 [ 770.394656] ? lo_ioctl+0x1bb/0x20e0 [ 770.398384] ? __mutex_lock+0x3a8/0x1260 [ 770.402448] ? lock_downgrade+0x720/0x720 [ 770.406600] ? loop_info64_to_compat+0x5e0/0x5e0 [ 770.411354] kthread_create_on_node+0xbb/0xf0 [ 770.415852] ? __kthread_create_on_node+0x410/0x410 [ 770.420881] ? __fget+0x356/0x510 [ 770.424341] ? do_dup2+0x450/0x450 [ 770.427890] ? __lockdep_init_map+0x100/0x5a0 [ 770.432387] ? __lockdep_init_map+0x100/0x5a0 [ 770.436897] lo_ioctl+0xae5/0x20e0 [ 770.440448] ? loop_set_status64+0x110/0x110 [ 770.444862] blkdev_ioctl+0x5cb/0x1a7e [ 770.448756] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 770.454132] ? blkpg_ioctl+0x9d0/0x9d0 [ 770.458029] ? mark_held_locks+0xf0/0xf0 [ 770.462125] ? mark_held_locks+0xf0/0xf0 [ 770.466195] ? debug_check_no_obj_freed+0x201/0x482 [ 770.471219] ? lock_downgrade+0x720/0x720 [ 770.475370] block_ioctl+0xe9/0x130 [ 770.478998] ? blkdev_fallocate+0x3f0/0x3f0 [ 770.483322] do_vfs_ioctl+0xcdb/0x12e0 [ 770.487215] ? lock_downgrade+0x720/0x720 [ 770.491364] ? check_preemption_disabled+0x41/0x280 [ 770.496384] ? ioctl_preallocate+0x200/0x200 [ 770.500801] ? __fget+0x356/0x510 [ 770.504262] ? do_dup2+0x450/0x450 [ 770.507813] ? do_sys_open+0x2bf/0x520 [ 770.511716] ksys_ioctl+0x9b/0xc0 [ 770.515179] __x64_sys_ioctl+0x6f/0xb0 [ 770.519069] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 770.523654] do_syscall_64+0xf9/0x620 [ 770.527463] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 770.532663] RIP: 0033:0x45dfb7 [ 770.535946] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 6d b5 fb ff c3 66 2e 0f 1f 84 00 00 00 00 03:50:18 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000c80)=@raw={'raw\x00', 0x3c1, 0x3, 0x308, 0x0, 0x150, 0x150, 0x0, 0x3, 0x238, 0x238, 0x238, 0x238, 0x238, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x3], 0x0, 0x128, 0x150, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'dummy0\x00', {0x0, 0x0, 0x3, 0x0, 0x0, 0xfffd, 0x7}}}, @common=@ipv6header={{0x28, 'ipv6header\x00'}, {0x0, 0x81}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}, {{@uncond, 0x0, 0xa8, 0xe8}, @common=@inet=@LOG={0x40, 'LOG\x00', 0x0, {0x0, 0x0, "59e2b655a7928de9d18f6f4ce2fcb46e2fbbb084e62170a6b5ab23bc6a36"}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x368) [ 770.554854] RSP: 002b:00007f4258f54a18 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 770.562567] RAX: ffffffffffffffda RBX: 0000000000000005 RCX: 000000000045dfb7 [ 770.569839] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 770.577108] RBP: 0000000000000000 R08: 0000000020000248 R09: 0000000000000000 [ 770.584378] R10: 0000000000001000 R11: 0000000000000246 R12: 0000000000000003 [ 770.591649] R13: 0000000000000004 R14: 0000000000000004 R15: 0000000020000258 03:50:18 executing program 2 (fault-call:0 fault-nth:11): syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="10000300c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000040)) 03:50:18 executing program 5: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c0024", 0xfffffdef, 0x400}, {&(0x7f0000010100)="05000000c025", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000040)) [ 770.638137] erofs: read_super, device -> /dev/loop4 [ 770.643612] erofs: read_super, device -> /dev/loop3 [ 770.649087] erofs: options -> [ 770.658599] erofs: options -> fault_injection=0x0000000000000000,noacl, [ 770.666248] erofs: root inode @ nid 36 [ 770.674988] erofs: cannot read erofs superblock [ 770.681297] erofs: mounted on /dev/loop4 with opts: . 03:50:18 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000c80)=@raw={'raw\x00', 0x3c1, 0x3, 0x308, 0x0, 0x150, 0x150, 0x0, 0x3, 0x238, 0x238, 0x238, 0x238, 0x238, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x3], 0x0, 0x128, 0x150, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'dummy0\x00', {0x0, 0x0, 0x3, 0x0, 0x0, 0xfffd, 0x7}}}, @common=@ipv6header={{0x28, 'ipv6header\x00'}, {0x0, 0x81}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}, {{@uncond, 0x0, 0xa8, 0xe8}, @common=@inet=@LOG={0x40, 'LOG\x00', 0x0, {0x0, 0x0, "59e2b655a7928de9d18f6f4ce2fcb46e2fbbb084e62170a6b5ab23bc6a36"}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x368) 03:50:18 executing program 4: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf01003f000c0024", 0xf, 0x400}, {&(0x7f0000010100)="02000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000040)) [ 770.754409] erofs: read_super, device -> /dev/loop0 [ 770.754644] erofs: read_super, device -> /dev/loop3 [ 770.760516] erofs: options -> [ 770.779140] erofs: unmounted for /dev/loop4 [ 770.786135] erofs: options -> fault_injection=0x0000000000000000,noacl, [ 770.790204] erofs: cannot read erofs superblock 03:50:18 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000c80)=@raw={'raw\x00', 0x3c1, 0x3, 0x308, 0x0, 0x150, 0x150, 0x0, 0x3, 0x238, 0x238, 0x238, 0x238, 0x238, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x3], 0x0, 0x128, 0x150, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'dummy0\x00', {0x0, 0x0, 0x3, 0x0, 0x0, 0xfffd, 0x7}}}, @common=@ipv6header={{0x28, 'ipv6header\x00'}, {0x0, 0x81}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}, {{@uncond, 0x0, 0xa8, 0xe8}, @common=@inet=@LOG={0x40, 'LOG\x00', 0x0, {0x0, 0x0, "59e2b655a7928de9d18f6f4ce2fcb46e2fbbb084e62170a6b5ab23bc6a36"}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x368) [ 770.801253] erofs: cannot read erofs superblock [ 770.857734] Bluetooth: hci2: command 0x0406 tx timeout [ 770.886725] FAULT_INJECTION: forcing a failure. [ 770.886725] name failslab, interval 1, probability 0, space 0, times 0 [ 770.898400] CPU: 0 PID: 11498 Comm: syz-executor.2 Not tainted 4.19.163-syzkaller #0 [ 770.906291] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 770.915642] Call Trace: [ 770.918235] dump_stack+0x1fc/0x2fe [ 770.921881] should_fail.cold+0xa/0x14 [ 770.925779] ? setup_fault_attr+0x200/0x200 [ 770.930109] ? lock_acquire+0x170/0x3c0 [ 770.934099] __should_failslab+0x115/0x180 [ 770.938345] should_failslab+0x5/0xf [ 770.942059] kmem_cache_alloc+0x277/0x370 [ 770.946214] __kernfs_new_node+0xd2/0x680 [ 770.950366] ? kernfs_dop_revalidate+0x3a0/0x3a0 03:50:18 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000c80)=@raw={'raw\x00', 0x3c1, 0x3, 0x308, 0x0, 0x150, 0x150, 0x0, 0x3, 0x238, 0x238, 0x238, 0x238, 0x238, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x3], 0x0, 0x128, 0x150, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'dummy0\x00', {0x0, 0x0, 0x3, 0x0, 0x0, 0xfffd, 0x7}}}, @common=@ipv6header={{0x28, 'ipv6header\x00'}, {0x0, 0x81}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}, {{@uncond, 0x0, 0xa8, 0xe8}, @common=@inet=@LOG={0x40, 'LOG\x00', 0x0, {0x0, 0x0, "59e2b655a7928de9d18f6f4ce2fcb46e2fbbb084e62170a6b5ab23bc6a36"}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x368) [ 770.955130] ? __cpu_to_node+0x7b/0xa0 [ 770.959023] ? account_entity_enqueue+0x2e5/0x440 [ 770.963878] ? mark_held_locks+0xf0/0xf0 [ 770.967943] ? enqueue_entity+0xf86/0x3850 [ 770.972183] ? set_user_nice.part.0+0x3b9/0xab0 [ 770.976861] kernfs_create_dir_ns+0x9e/0x230 [ 770.981277] internal_create_group+0x1c1/0xb20 [ 770.985870] ? sysfs_remove_link_from_group+0x70/0x70 [ 770.991064] ? lock_downgrade+0x720/0x720 [ 770.995226] lo_ioctl+0xf7c/0x20e0 [ 770.998774] ? loop_set_status64+0x110/0x110 [ 771.003193] blkdev_ioctl+0x5cb/0x1a7e [ 771.007085] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 771.012457] ? blkpg_ioctl+0x9d0/0x9d0 [ 771.016353] ? mark_held_locks+0xf0/0xf0 [ 771.020439] ? mark_held_locks+0xf0/0xf0 [ 771.024510] ? debug_check_no_obj_freed+0x201/0x482 [ 771.029535] ? lock_downgrade+0x720/0x720 [ 771.033690] block_ioctl+0xe9/0x130 [ 771.037318] ? blkdev_fallocate+0x3f0/0x3f0 [ 771.041654] do_vfs_ioctl+0xcdb/0x12e0 [ 771.045546] ? lock_downgrade+0x720/0x720 [ 771.049698] ? check_preemption_disabled+0x41/0x280 [ 771.054721] ? ioctl_preallocate+0x200/0x200 [ 771.059138] ? __fget+0x356/0x510 [ 771.062596] ? do_dup2+0x450/0x450 [ 771.066138] ? do_sys_open+0x2bf/0x520 [ 771.070037] ksys_ioctl+0x9b/0xc0 [ 771.073496] __x64_sys_ioctl+0x6f/0xb0 [ 771.077385] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 771.081970] do_syscall_64+0xf9/0x620 [ 771.085779] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 771.090967] RIP: 0033:0x45dfb7 03:50:18 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000c80)=@raw={'raw\x00', 0x3c1, 0x3, 0x308, 0x0, 0x150, 0x150, 0x0, 0x3, 0x238, 0x238, 0x238, 0x238, 0x238, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x3], 0x0, 0x128, 0x150, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'dummy0\x00', {0x0, 0x0, 0x3, 0x0, 0x0, 0xfffd, 0x7}}}, @common=@ipv6header={{0x28, 'ipv6header\x00'}, {0x0, 0x81}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}, {{@uncond, 0x0, 0xa8, 0xe8}, @common=@inet=@LOG={0x40, 'LOG\x00', 0x0, {0x0, 0x0, "59e2b655a7928de9d18f6f4ce2fcb46e2fbbb084e62170a6b5ab23bc6a36"}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x368) [ 771.094164] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 6d b5 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 771.113175] RSP: 002b:00007f4258f54a18 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 771.120883] RAX: ffffffffffffffda RBX: 0000000000000005 RCX: 000000000045dfb7 [ 771.128154] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 771.135422] RBP: 0000000000000000 R08: 0000000020000248 R09: 0000000000000000 [ 771.142688] R10: 0000000000001000 R11: 0000000000000246 R12: 0000000000000003 [ 771.149998] R13: 0000000000000004 R14: 0000000000000004 R15: 0000000020000258 [ 771.218740] erofs: read_super, device -> /dev/loop2 [ 771.223787] erofs: options -> [ 771.229336] erofs: root inode @ nid 36 [ 771.233718] erofs: mounted on /dev/loop2 with opts: . [ 771.257827] erofs: read_super, device -> /dev/loop4 [ 771.262871] erofs: options -> [ 771.266537] erofs: read_super, device -> /dev/loop0 [ 771.278657] erofs: options -> [ 771.282000] erofs: cannot read erofs superblock [ 771.286753] erofs: root inode @ nid 36 [ 771.293090] erofs: unmounted for /dev/loop2 [ 771.297900] erofs: mounted on /dev/loop4 with opts: . 03:50:18 executing program 0: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="10000000c041", 0x6, 0x480}, {0x0, 0xeffdffffffffffff, 0x1000}], 0x0, &(0x7f0000000040)) 03:50:18 executing program 5: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c0024", 0x7ffffffffffffbff, 0x400}, {&(0x7f0000010100)="05000000c025", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000040)) 03:50:18 executing program 3: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x1d04000000000000, 0x1000}], 0x0, &(0x7f0000000040)={[{@fault_injection={'fault_injection'}}, {@noacl='noacl'}]}) 03:50:18 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000c80)=@raw={'raw\x00', 0x3c1, 0x3, 0x308, 0x0, 0x150, 0x150, 0x0, 0x3, 0x238, 0x238, 0x238, 0x238, 0x238, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x3], 0x0, 0x128, 0x150, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'dummy0\x00', {0x0, 0x0, 0x3, 0x0, 0x0, 0xfffd, 0x7}}}, @common=@ipv6header={{0x28, 'ipv6header\x00'}, {0x0, 0x81}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}, {{@uncond, 0x0, 0xa8, 0xe8}, @common=@inet=@LOG={0x40, 'LOG\x00', 0x0, {0x0, 0x0, "59e2b655a7928de9d18f6f4ce2fcb46e2fbbb084e62170a6b5ab23bc6a36"}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x368) 03:50:18 executing program 2 (fault-call:0 fault-nth:12): syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="10000300c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000040)) 03:50:18 executing program 4: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010457000c0024", 0xf, 0x400}, {&(0x7f0000010100)="02000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000040)) [ 771.426925] erofs: unmounted for /dev/loop4 03:50:19 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000c80)=@raw={'raw\x00', 0x3c1, 0x3, 0x308, 0x0, 0x150, 0x150, 0x0, 0x3, 0x238, 0x238, 0x238, 0x238, 0x238, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x3], 0x0, 0x128, 0x150, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'dummy0\x00', {0x0, 0x0, 0x3, 0x0, 0x0, 0xfffd, 0x7}}}, @common=@ipv6header={{0x28, 'ipv6header\x00'}, {0x0, 0x81}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}, {{@uncond, 0x0, 0xa8, 0xe8}, @common=@inet=@LOG={0x40, 'LOG\x00', 0x0, {0x0, 0x0, "59e2b655a7928de9d18f6f4ce2fcb46e2fbbb084e62170a6b5ab23bc6a36"}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x368) [ 771.532183] FAULT_INJECTION: forcing a failure. [ 771.532183] name failslab, interval 1, probability 0, space 0, times 0 [ 771.543633] CPU: 1 PID: 11537 Comm: syz-executor.2 Not tainted 4.19.163-syzkaller #0 [ 771.551518] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 771.560869] Call Trace: [ 771.563465] dump_stack+0x1fc/0x2fe [ 771.567110] should_fail.cold+0xa/0x14 [ 771.571005] ? setup_fault_attr+0x200/0x200 [ 771.575333] ? lock_acquire+0x170/0x3c0 [ 771.579329] __should_failslab+0x115/0x180 [ 771.583571] should_failslab+0x5/0xf [ 771.587289] kmem_cache_alloc+0x277/0x370 [ 771.591448] __kernfs_new_node+0xd2/0x680 [ 771.595601] ? kernfs_dop_revalidate+0x3a0/0x3a0 [ 771.600367] ? __mutex_unlock_slowpath+0xea/0x610 [ 771.605222] ? wait_for_completion_io+0x10/0x10 [ 771.610022] ? kernfs_next_descendant_post+0x19c/0x290 [ 771.615309] kernfs_new_node+0x92/0x120 [ 771.619402] __kernfs_create_file+0x51/0x33f [ 771.623816] sysfs_add_file_mode_ns+0x226/0x540 03:50:19 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000c80)=@raw={'raw\x00', 0x3c1, 0x3, 0x308, 0x0, 0x150, 0x150, 0x0, 0x3, 0x238, 0x238, 0x238, 0x238, 0x238, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x3], 0x0, 0x128, 0x150, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'dummy0\x00', {0x0, 0x0, 0x3, 0x0, 0x0, 0xfffd, 0x7}}}, @common=@ipv6header={{0x28, 'ipv6header\x00'}, {0x0, 0x81}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}, {{@uncond, 0x0, 0xa8, 0xe8}, @common=@inet=@LOG={0x40, 'LOG\x00', 0x0, {0x0, 0x0, "59e2b655a7928de9d18f6f4ce2fcb46e2fbbb084e62170a6b5ab23bc6a36"}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x368) [ 771.628495] internal_create_group+0x355/0xb20 [ 771.633088] ? sysfs_remove_link_from_group+0x70/0x70 [ 771.638374] ? lock_downgrade+0x720/0x720 [ 771.642626] lo_ioctl+0xf7c/0x20e0 [ 771.646178] ? loop_set_status64+0x110/0x110 [ 771.650595] blkdev_ioctl+0x5cb/0x1a7e [ 771.654485] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 771.659856] ? blkpg_ioctl+0x9d0/0x9d0 [ 771.663750] ? mark_held_locks+0xf0/0xf0 [ 771.667815] ? mark_held_locks+0xf0/0xf0 [ 771.671889] ? debug_check_no_obj_freed+0x201/0x482 [ 771.676914] ? lock_downgrade+0x720/0x720 [ 771.681066] block_ioctl+0xe9/0x130 [ 771.684694] ? blkdev_fallocate+0x3f0/0x3f0 [ 771.689018] do_vfs_ioctl+0xcdb/0x12e0 [ 771.692906] ? lock_downgrade+0x720/0x720 [ 771.697052] ? check_preemption_disabled+0x41/0x280 [ 771.702066] ? ioctl_preallocate+0x200/0x200 [ 771.706480] ? __fget+0x356/0x510 [ 771.709936] ? do_dup2+0x450/0x450 [ 771.713477] ? do_sys_open+0x2bf/0x520 [ 771.717380] ksys_ioctl+0x9b/0xc0 [ 771.720838] __x64_sys_ioctl+0x6f/0xb0 [ 771.724750] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 771.729343] do_syscall_64+0xf9/0x620 [ 771.733154] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 771.738343] RIP: 0033:0x45dfb7 [ 771.741543] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 6d b5 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 771.760443] RSP: 002b:00007f4258f54a18 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 771.768151] RAX: ffffffffffffffda RBX: 0000000000000005 RCX: 000000000045dfb7 [ 771.775421] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 771.782694] RBP: 0000000000000000 R08: 0000000020000248 R09: 0000000000000000 [ 771.789964] R10: 0000000000001000 R11: 0000000000000246 R12: 0000000000000003 [ 771.797232] R13: 0000000000000004 R14: 0000000000000004 R15: 0000000020000258 03:50:19 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000c80)=@raw={'raw\x00', 0x3c1, 0x3, 0x308, 0x0, 0x150, 0x150, 0x0, 0x3, 0x238, 0x238, 0x238, 0x238, 0x238, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x3], 0x0, 0x128, 0x150, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'dummy0\x00', {0x0, 0x0, 0x3, 0x0, 0x0, 0xfffd, 0x7}}}, @common=@ipv6header={{0x28, 'ipv6header\x00'}, {0x0, 0x81}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}, {{@uncond, 0x0, 0xa8, 0xe8}, @common=@inet=@LOG={0x40, 'LOG\x00', 0x0, {0x0, 0x0, "59e2b655a7928de9d18f6f4ce2fcb46e2fbbb084e62170a6b5ab23bc6a36"}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x368) [ 771.847530] erofs: read_super, device -> /dev/loop3 [ 771.853903] erofs: read_super, device -> /dev/loop4 [ 771.869644] erofs: options -> fault_injection=0x0000000000000000,noacl, [ 771.893187] erofs: read_super, device -> /dev/loop2 [ 771.899435] erofs: options -> [ 771.911107] erofs: cannot read erofs superblock [ 771.934481] erofs: options -> [ 771.938515] erofs: root inode @ nid 36 [ 771.949369] erofs: root inode @ nid 36 [ 771.956872] erofs: mounted on /dev/loop4 with opts: . [ 771.964807] erofs: mounted on /dev/loop2 with opts: . [ 771.983317] erofs: read_super, device -> /dev/loop0 03:50:19 executing program 3: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x1e04000000000000, 0x1000}], 0x0, &(0x7f0000000040)={[{@fault_injection={'fault_injection'}}, {@noacl='noacl'}]}) 03:50:19 executing program 4: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010458000c0024", 0xf, 0x400}, {&(0x7f0000010100)="02000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000040)) [ 772.000772] erofs: options -> [ 772.013032] erofs: cannot read erofs superblock [ 772.027488] erofs: unmounted for /dev/loop4 03:50:19 executing program 2 (fault-call:0 fault-nth:13): syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="10000300c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000040)) [ 772.082193] erofs: read_super, device -> /dev/loop0 [ 772.087341] erofs: options -> [ 772.111242] erofs: unmounted for /dev/loop2 [ 772.118509] erofs: cannot read erofs superblock [ 772.164790] erofs: read_super, device -> /dev/loop3 [ 772.186111] FAULT_INJECTION: forcing a failure. [ 772.186111] name failslab, interval 1, probability 0, space 0, times 0 [ 772.193411] erofs: options -> fault_injection=0x0000000000000000,noacl, [ 772.202394] CPU: 0 PID: 11595 Comm: syz-executor.2 Not tainted 4.19.163-syzkaller #0 [ 772.212000] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 772.221347] Call Trace: [ 772.223930] dump_stack+0x1fc/0x2fe [ 772.227575] should_fail.cold+0xa/0x14 [ 772.229166] erofs: cannot read erofs superblock 03:50:19 executing program 0: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="10000000c041", 0x6, 0x480}, {0x0, 0xf6ffffff00000000, 0x1000}], 0x0, &(0x7f0000000040)) 03:50:19 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000c80)=@raw={'raw\x00', 0x3c1, 0x3, 0x308, 0x0, 0x150, 0x150, 0x0, 0x3, 0x238, 0x238, 0x238, 0x238, 0x238, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x3], 0x0, 0x128, 0x150, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'dummy0\x00', {0x0, 0x0, 0x3, 0x0, 0x0, 0xfffd, 0x7}}}, @common=@ipv6header={{0x28, 'ipv6header\x00'}, {0x0, 0x81}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}, {{@uncond, 0x0, 0xa8, 0xe8}, @common=@inet=@LOG={0x40, 'LOG\x00', 0x0, {0x0, 0x0, "59e2b655a7928de9d18f6f4ce2fcb46e2fbbb084e62170a6b5ab23bc6a36"}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x368) 03:50:19 executing program 5: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c0024", 0xfffffffffffffdef, 0x400}, {&(0x7f0000010100)="05000000c025", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000040)) [ 772.231471] ? setup_fault_attr+0x200/0x200 [ 772.231487] ? lock_acquire+0x170/0x3c0 [ 772.231508] __should_failslab+0x115/0x180 [ 772.231525] should_failslab+0x5/0xf [ 772.252380] kmem_cache_alloc+0x277/0x370 [ 772.256536] __kernfs_new_node+0xd2/0x680 [ 772.260694] ? kernfs_dop_revalidate+0x3a0/0x3a0 [ 772.265457] ? __mutex_unlock_slowpath+0xea/0x610 [ 772.270310] ? wait_for_completion_io+0x10/0x10 [ 772.275020] ? kernfs_next_descendant_post+0x19c/0x290 [ 772.280306] kernfs_new_node+0x92/0x120 [ 772.284291] __kernfs_create_file+0x51/0x33f [ 772.288709] sysfs_add_file_mode_ns+0x226/0x540 [ 772.293395] internal_create_group+0x355/0xb20 [ 772.297987] ? sysfs_remove_link_from_group+0x70/0x70 [ 772.303180] ? lock_downgrade+0x720/0x720 [ 772.307343] lo_ioctl+0xf7c/0x20e0 [ 772.310895] ? loop_set_status64+0x110/0x110 [ 772.315308] blkdev_ioctl+0x5cb/0x1a7e [ 772.319198] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 772.324565] ? blkpg_ioctl+0x9d0/0x9d0 [ 772.328456] ? mark_held_locks+0xf0/0xf0 [ 772.332609] ? mark_held_locks+0xf0/0xf0 [ 772.336677] ? debug_check_no_obj_freed+0x201/0x482 [ 772.341703] ? lock_downgrade+0x720/0x720 [ 772.345945] block_ioctl+0xe9/0x130 [ 772.349570] ? blkdev_fallocate+0x3f0/0x3f0 [ 772.353900] do_vfs_ioctl+0xcdb/0x12e0 [ 772.357788] ? lock_downgrade+0x720/0x720 [ 772.361941] ? check_preemption_disabled+0x41/0x280 [ 772.366962] ? ioctl_preallocate+0x200/0x200 [ 772.371376] ? __fget+0x356/0x510 [ 772.374879] ? do_dup2+0x450/0x450 [ 772.378420] ? do_sys_open+0x2bf/0x520 [ 772.382319] ksys_ioctl+0x9b/0xc0 [ 772.385783] __x64_sys_ioctl+0x6f/0xb0 [ 772.389677] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 772.394262] do_syscall_64+0xf9/0x620 [ 772.398070] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 772.403259] RIP: 0033:0x45dfb7 [ 772.406456] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 6d b5 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 772.425488] RSP: 002b:00007f4258f54a18 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 772.433209] RAX: ffffffffffffffda RBX: 0000000000000005 RCX: 000000000045dfb7 [ 772.440484] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 772.447759] RBP: 0000000000000000 R08: 0000000020000248 R09: 0000000000000000 [ 772.455147] R10: 0000000000001000 R11: 0000000000000246 R12: 0000000000000003 [ 772.462419] R13: 0000000000000004 R14: 0000000000000004 R15: 0000000020000258 [ 772.479780] erofs: read_super, device -> /dev/loop4 [ 772.484817] erofs: options -> [ 772.495241] erofs: root inode @ nid 36 [ 772.503412] erofs: mounted on /dev/loop4 with opts: . [ 772.527783] erofs: read_super, device -> /dev/loop2 [ 772.532842] erofs: options -> [ 772.536083] erofs: root inode @ nid 36 [ 772.547944] erofs: read_super, device -> /dev/loop3 [ 772.556887] erofs: mounted on /dev/loop2 with opts: . [ 772.557613] erofs: options -> fault_injection=0x0000000000000000,noacl, 03:50:20 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000c80)=@raw={'raw\x00', 0x3c1, 0x3, 0x308, 0x0, 0x150, 0x150, 0x0, 0x3, 0x238, 0x238, 0x238, 0x238, 0x238, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x3], 0x0, 0x128, 0x150, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'dummy0\x00', {0x0, 0x0, 0x3, 0x0, 0x0, 0xfffd, 0x7}}}, @common=@ipv6header={{0x28, 'ipv6header\x00'}, {0x0, 0x81}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}, {{@uncond, 0x0, 0xa8, 0xe8}, @common=@inet=@LOG={0x40, 'LOG\x00', 0x0, {0x0, 0x0, "59e2b655a7928de9d18f6f4ce2fcb46e2fbbb084e62170a6b5ab23bc6a36"}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x368) 03:50:20 executing program 4: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010459000c0024", 0xf, 0x400}, {&(0x7f0000010100)="02000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000040)) 03:50:20 executing program 2 (fault-call:0 fault-nth:14): syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="10000300c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000040)) [ 772.573558] erofs: read_super, device -> /dev/loop0 [ 772.582408] erofs: options -> [ 772.585975] erofs: cannot read erofs superblock 03:50:20 executing program 5: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c0024", 0xffffffffffffffff, 0x400}, {&(0x7f0000010100)="05000000c025", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000040)) 03:50:20 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000c80)=@raw={'raw\x00', 0x3c1, 0x3, 0x308, 0x0, 0x150, 0x150, 0x0, 0x3, 0x238, 0x238, 0x238, 0x238, 0x238, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xca, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x3], 0x0, 0x128, 0x150, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'dummy0\x00', {0x0, 0x0, 0x3, 0x0, 0x0, 0xfffd, 0x7}}}, @common=@ipv6header={{0x28, 'ipv6header\x00'}, {0x0, 0x81}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}, {{@uncond, 0x0, 0xa8, 0xe8}, @common=@inet=@LOG={0x40, 'LOG\x00', 0x0, {0x0, 0x0, "59e2b655a7928de9d18f6f4ce2fcb46e2fbbb084e62170a6b5ab23bc6a36"}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x368) [ 772.624978] erofs: unmounted for /dev/loop4 [ 772.629686] erofs: unmounted for /dev/loop2 [ 772.651125] erofs: cannot read erofs superblock 03:50:20 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000c80)=@raw={'raw\x00', 0x3c1, 0x3, 0x308, 0x0, 0x150, 0x150, 0x0, 0x3, 0x238, 0x238, 0x238, 0x238, 0x238, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x3], 0x0, 0x128, 0x150, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'dummy0\x00', {0x0, 0x0, 0x3, 0x0, 0x0, 0xfffd, 0x7}}}, @common=@ipv6header={{0x28, 'ipv6header\x00'}, {0x0, 0x81}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}, {{@uncond, 0x0, 0xa8, 0xe8}, @common=@inet=@LOG={0x40, 'LOG\x00', 0x0, {0x0, 0x0, "59e2b655a7928de9d18f6f4ce2fcb46e2fbbb084e62170a6b5ab23bc6a36"}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x368) 03:50:20 executing program 3: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x1f04000000000000, 0x1000}], 0x0, &(0x7f0000000040)={[{@fault_injection={'fault_injection'}}, {@noacl='noacl'}]}) 03:50:20 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000c80)=@raw={'raw\x00', 0x3c1, 0x3, 0x308, 0x0, 0x150, 0x150, 0x0, 0x3, 0x238, 0x238, 0x238, 0x238, 0x238, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x3], 0x0, 0x128, 0x150, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'dummy0\x00', {0x0, 0x0, 0x3, 0x0, 0x0, 0xfffd, 0x7}}}, @common=@ipv6header={{0x28, 'ipv6header\x00'}, {0x0, 0x81}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}, {{@uncond, 0x0, 0xa8, 0xe8}, @common=@inet=@LOG={0x40, 'LOG\x00', 0x0, {0x0, 0x0, "59e2b655a7928de9d18f6f4ce2fcb46e2fbbb084e62170a6b5ab23bc6a36"}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x368) [ 772.787899] erofs: read_super, device -> /dev/loop0 [ 772.792979] erofs: options -> [ 772.796222] erofs: cannot read erofs superblock 03:50:20 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000c80)=@raw={'raw\x00', 0x3c1, 0x3, 0x308, 0x0, 0x150, 0x150, 0x0, 0x3, 0x238, 0x238, 0x238, 0x238, 0x238, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x3], 0x0, 0x128, 0x150, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'dummy0\x00', {0x0, 0x0, 0x3, 0x0, 0x0, 0xfffd, 0x7}}}, @common=@ipv6header={{0x28, 'ipv6header\x00'}, {0x0, 0x81}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}, {{@uncond, 0x0, 0xa8, 0xe8}, @common=@inet=@LOG={0x40, 'LOG\x00', 0x0, {0x0, 0x0, "59e2b655a7928de9d18f6f4ce2fcb46e2fbbb084e62170a6b5ab23bc6a36"}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x368) [ 772.911791] FAULT_INJECTION: forcing a failure. [ 772.911791] name failslab, interval 1, probability 0, space 0, times 0 [ 772.931089] CPU: 1 PID: 11639 Comm: syz-executor.2 Not tainted 4.19.163-syzkaller #0 [ 772.938994] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 772.948350] Call Trace: [ 772.950944] dump_stack+0x1fc/0x2fe [ 772.954584] should_fail.cold+0xa/0x14 [ 772.958669] ? setup_fault_attr+0x200/0x200 [ 772.962999] ? lock_acquire+0x170/0x3c0 [ 772.966986] __should_failslab+0x115/0x180 [ 772.971223] should_failslab+0x5/0xf [ 772.974939] kmem_cache_alloc+0x277/0x370 [ 772.979092] __kernfs_new_node+0xd2/0x680 [ 772.983249] ? kernfs_dop_revalidate+0x3a0/0x3a0 [ 772.988021] ? __mutex_unlock_slowpath+0xea/0x610 [ 772.992869] ? wait_for_completion_io+0x10/0x10 [ 772.997542] ? kernfs_next_descendant_post+0x19c/0x290 [ 773.002957] kernfs_new_node+0x92/0x120 [ 773.006938] __kernfs_create_file+0x51/0x33f [ 773.011352] sysfs_add_file_mode_ns+0x226/0x540 [ 773.016031] internal_create_group+0x355/0xb20 [ 773.020622] ? sysfs_remove_link_from_group+0x70/0x70 [ 773.025812] ? lock_downgrade+0x720/0x720 [ 773.029993] lo_ioctl+0xf7c/0x20e0 [ 773.033539] ? loop_set_status64+0x110/0x110 [ 773.037952] blkdev_ioctl+0x5cb/0x1a7e [ 773.041842] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 773.047315] ? blkpg_ioctl+0x9d0/0x9d0 [ 773.051205] ? mark_held_locks+0xf0/0xf0 [ 773.055264] ? mark_held_locks+0xf0/0xf0 03:50:20 executing program 0: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="10000000c041", 0x6, 0x480}, {0x0, 0xfcfdffff00000000, 0x1000}], 0x0, &(0x7f0000000040)) 03:50:20 executing program 5: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c0024", 0xf, 0x300}, {&(0x7f0000010100)="05000000c025", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000040)) 03:50:20 executing program 5: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c0024", 0xf, 0x402}, {&(0x7f0000010100)="05000000c025", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000040)) [ 773.059329] ? debug_check_no_obj_freed+0x201/0x482 [ 773.064351] ? lock_downgrade+0x720/0x720 [ 773.068505] block_ioctl+0xe9/0x130 [ 773.072130] ? blkdev_fallocate+0x3f0/0x3f0 [ 773.076455] do_vfs_ioctl+0xcdb/0x12e0 [ 773.080348] ? lock_downgrade+0x720/0x720 [ 773.084497] ? check_preemption_disabled+0x41/0x280 [ 773.089516] ? ioctl_preallocate+0x200/0x200 [ 773.093929] ? __fget+0x356/0x510 [ 773.097390] ? do_dup2+0x450/0x450 [ 773.100934] ? do_sys_open+0x2bf/0x520 [ 773.104831] ksys_ioctl+0x9b/0xc0 [ 773.108293] __x64_sys_ioctl+0x6f/0xb0 03:50:20 executing program 5: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c0024", 0xf, 0x403}, {&(0x7f0000010100)="05000000c025", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000040)) [ 773.112182] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 773.116770] do_syscall_64+0xf9/0x620 [ 773.120575] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 773.125766] RIP: 0033:0x45dfb7 [ 773.128964] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 6d b5 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 773.147864] RSP: 002b:00007f4258f54a18 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 773.155576] RAX: ffffffffffffffda RBX: 0000000000000005 RCX: 000000000045dfb7 [ 773.162844] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 773.170112] RBP: 0000000000000000 R08: 0000000020000248 R09: 0000000000000000 [ 773.177375] R10: 0000000000001000 R11: 0000000000000246 R12: 0000000000000003 [ 773.184635] R13: 0000000000000004 R14: 0000000000000004 R15: 0000000020000258 [ 773.207965] erofs: read_super, device -> /dev/loop4 [ 773.209589] erofs: read_super, device -> /dev/loop2 [ 773.212999] erofs: options -> [ 773.216060] erofs: root inode @ nid 36 [ 773.230666] erofs: read_super, device -> /dev/loop3 [ 773.241877] erofs: options -> fault_injection=0x0000000000000000,noacl, 03:50:20 executing program 4: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf01045a000c0024", 0xf, 0x400}, {&(0x7f0000010100)="02000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000040)) [ 773.260758] erofs: options -> [ 773.262695] erofs: mounted on /dev/loop4 with opts: . [ 773.266296] erofs: read_super, device -> /dev/loop0 [ 773.283321] erofs: options -> [ 773.286702] erofs: root inode @ nid 36 [ 773.293163] erofs: cannot read erofs superblock [ 773.299871] erofs: unmounted for /dev/loop4 [ 773.302538] erofs: cannot read erofs superblock [ 773.311573] erofs: mounted on /dev/loop2 with opts: . 03:50:20 executing program 2 (fault-call:0 fault-nth:15): syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="10000300c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000040)) 03:50:20 executing program 5: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c0024", 0xf, 0x404}, {&(0x7f0000010100)="05000000c025", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000040)) 03:50:20 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000c80)=@raw={'raw\x00', 0x3c1, 0x3, 0x308, 0x0, 0x150, 0x150, 0x0, 0x3, 0x238, 0x238, 0x238, 0x238, 0x238, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x3], 0x0, 0x128, 0x150, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'dummy0\x00', {0x0, 0x0, 0x3, 0x0, 0x0, 0xfffd, 0x7}}}, @common=@ipv6header={{0x28, 'ipv6header\x00'}, {0x0, 0x81}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}, {{@uncond, 0x0, 0xa8, 0xe8}, @common=@inet=@LOG={0x40, 'LOG\x00', 0x0, {0x0, 0x0, "59e2b655a7928de9d18f6f4ce2fcb46e2fbbb084e62170a6b5ab23bc6a36"}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x368) [ 773.390885] erofs: unmounted for /dev/loop2 03:50:21 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000c80)=@raw={'raw\x00', 0x3c1, 0x3, 0x308, 0x0, 0x150, 0x150, 0x0, 0x3, 0x238, 0x238, 0x238, 0x238, 0x238, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x3], 0x0, 0x128, 0x150, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'dummy0\x00', {0x0, 0x0, 0x3, 0x0, 0x0, 0xfffd, 0x7}}}, @common=@ipv6header={{0x28, 'ipv6header\x00'}, {0x0, 0x81}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}, {{@uncond, 0x0, 0xa8, 0xe8}, @common=@inet=@LOG={0x40, 'LOG\x00', 0x0, {0x0, 0x0, "59e2b655a7928de9d18f6f4ce2fcb46e2fbbb084e62170a6b5ab23bc6a36"}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x368) [ 773.468529] erofs: read_super, device -> /dev/loop0 [ 773.484601] erofs: options -> [ 773.488746] erofs: read_super, device -> /dev/loop3 [ 773.493772] erofs: options -> fault_injection=0x0000000000000000,noacl, [ 773.503433] FAULT_INJECTION: forcing a failure. [ 773.503433] name failslab, interval 1, probability 0, space 0, times 0 [ 773.516234] CPU: 1 PID: 11688 Comm: syz-executor.2 Not tainted 4.19.163-syzkaller #0 [ 773.524125] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 773.525654] erofs: cannot read erofs superblock [ 773.533472] Call Trace: [ 773.533497] dump_stack+0x1fc/0x2fe [ 773.533518] should_fail.cold+0xa/0x14 [ 773.533535] ? setup_fault_attr+0x200/0x200 [ 773.533548] ? lock_acquire+0x170/0x3c0 [ 773.533572] __should_failslab+0x115/0x180 [ 773.533588] should_failslab+0x5/0xf [ 773.533601] kmem_cache_alloc+0x277/0x370 [ 773.533617] __kernfs_new_node+0xd2/0x680 [ 773.533632] ? kernfs_dop_revalidate+0x3a0/0x3a0 [ 773.533649] ? __mutex_unlock_slowpath+0xea/0x610 [ 773.533662] ? wait_for_completion_io+0x10/0x10 [ 773.533678] ? kernfs_next_descendant_post+0x19c/0x290 [ 773.581538] erofs: cannot read erofs superblock [ 773.582391] kernfs_new_node+0x92/0x120 [ 773.582408] __kernfs_create_file+0x51/0x33f [ 773.605462] sysfs_add_file_mode_ns+0x226/0x540 [ 773.610148] internal_create_group+0x355/0xb20 [ 773.614758] ? sysfs_remove_link_from_group+0x70/0x70 [ 773.619951] ? lock_downgrade+0x720/0x720 [ 773.624236] lo_ioctl+0xf7c/0x20e0 [ 773.627782] ? loop_set_status64+0x110/0x110 [ 773.632202] blkdev_ioctl+0x5cb/0x1a7e [ 773.636094] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 773.641453] ? blkpg_ioctl+0x9d0/0x9d0 [ 773.645331] ? mark_held_locks+0xf0/0xf0 [ 773.649388] ? mark_held_locks+0xf0/0xf0 [ 773.653446] ? debug_check_no_obj_freed+0x201/0x482 [ 773.658449] ? lock_downgrade+0x720/0x720 [ 773.662627] block_ioctl+0xe9/0x130 [ 773.666250] ? blkdev_fallocate+0x3f0/0x3f0 [ 773.670569] do_vfs_ioctl+0xcdb/0x12e0 [ 773.674450] ? lock_downgrade+0x720/0x720 [ 773.678587] ? check_preemption_disabled+0x41/0x280 [ 773.683586] ? ioctl_preallocate+0x200/0x200 [ 773.687992] ? __fget+0x356/0x510 [ 773.691451] ? do_dup2+0x450/0x450 [ 773.694981] ? do_sys_open+0x2bf/0x520 [ 773.698853] ksys_ioctl+0x9b/0xc0 [ 773.702291] __x64_sys_ioctl+0x6f/0xb0 [ 773.706177] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 773.710753] do_syscall_64+0xf9/0x620 [ 773.714553] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 773.719889] RIP: 0033:0x45dfb7 [ 773.723067] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 6d b5 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 773.741952] RSP: 002b:00007f4258f54a18 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 773.749667] RAX: ffffffffffffffda RBX: 0000000000000005 RCX: 000000000045dfb7 [ 773.756950] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 03:50:21 executing program 3: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x2000000000000000, 0x1000}], 0x0, &(0x7f0000000040)={[{@fault_injection={'fault_injection'}}, {@noacl='noacl'}]}) 03:50:21 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000c80)=@raw={'raw\x00', 0x3c1, 0x3, 0x308, 0x0, 0x150, 0x150, 0x0, 0x3, 0x238, 0x238, 0x238, 0x238, 0x238, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x3], 0x0, 0x128, 0x150, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'dummy0\x00', {0x0, 0x0, 0x3, 0x0, 0x0, 0xfffd, 0x7}}}, @common=@ipv6header={{0x28, 'ipv6header\x00'}, {0x0, 0x81}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}, {{@uncond, 0x0, 0xa8, 0xe8}, @common=@inet=@LOG={0x40, 'LOG\x00', 0x0, {0x0, 0x0, "59e2b655a7928de9d18f6f4ce2fcb46e2fbbb084e62170a6b5ab23bc6a36"}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x368) 03:50:21 executing program 5: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c0024", 0xf, 0x407}, {&(0x7f0000010100)="05000000c025", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000040)) [ 773.764205] RBP: 0000000000000000 R08: 0000000020000248 R09: 0000000000000000 [ 773.771457] R10: 0000000000001000 R11: 0000000000000246 R12: 0000000000000003 [ 773.778707] R13: 0000000000000004 R14: 0000000000000004 R15: 0000000020000258 [ 773.798351] erofs: read_super, device -> /dev/loop2 [ 773.812059] erofs: options -> [ 773.818674] erofs: root inode @ nid 36 [ 773.822792] erofs: mounted on /dev/loop2 with opts: . 03:50:21 executing program 0: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="10000000c041", 0x6, 0x480}, {0x0, 0xfdfdffff00000000, 0x1000}], 0x0, &(0x7f0000000040)) 03:50:21 executing program 5: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c0024", 0xf, 0x500}, {&(0x7f0000010100)="05000000c025", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000040)) 03:50:21 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000c80)=@raw={'raw\x00', 0x3c1, 0x3, 0x308, 0x0, 0x150, 0x150, 0x0, 0x3, 0x238, 0x238, 0x238, 0x238, 0x238, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x3], 0x0, 0x128, 0x150, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'dummy0\x00', {0x0, 0x0, 0x3, 0x0, 0x0, 0xfffd, 0x7}}}, @common=@ipv6header={{0x28, 'ipv6header\x00'}, {0x0, 0x81}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}, {{@uncond, 0x0, 0xa8, 0xe8}, @common=@inet=@LOG={0x40, 'LOG\x00', 0x0, {0x0, 0x0, "59e2b655a7928de9d18f6f4ce2fcb46e2fbbb084e62170a6b5ab23bc6a36"}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x368) 03:50:21 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000c80)=@raw={'raw\x00', 0x3c1, 0x3, 0x308, 0x0, 0x150, 0x150, 0x0, 0x3, 0x238, 0x238, 0x238, 0x238, 0x238, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x3], 0x0, 0x128, 0x150, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'dummy0\x00', {0x0, 0x0, 0x3, 0x0, 0x0, 0xfffd, 0x7}}}, @common=@ipv6header={{0x28, 'ipv6header\x00'}, {0x0, 0x81}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}, {{@uncond, 0x0, 0xa8, 0xe8}, @common=@inet=@LOG={0x40, 'LOG\x00', 0x0, {0x0, 0x0, "59e2b655a7928de9d18f6f4ce2fcb46e2fbbb084e62170a6b5ab23bc6a36"}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x368) [ 773.901840] erofs: read_super, device -> /dev/loop4 [ 773.911956] erofs: options -> [ 773.921921] erofs: root inode @ nid 36 [ 773.926321] erofs: mounted on /dev/loop4 with opts: . 03:50:21 executing program 4: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf01045b000c0024", 0xf, 0x400}, {&(0x7f0000010100)="02000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000040)) 03:50:21 executing program 2 (fault-call:0 fault-nth:16): syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="10000300c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000040)) [ 774.010692] erofs: unmounted for /dev/loop2 [ 774.030324] erofs: unmounted for /dev/loop4 03:50:21 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000c80)=@raw={'raw\x00', 0x3c1, 0x3, 0x308, 0x0, 0x150, 0x150, 0x0, 0x3, 0x238, 0x238, 0x238, 0x238, 0x238, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x3], 0x0, 0x128, 0x150, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'dummy0\x00', {0x0, 0x0, 0x3, 0x0, 0x0, 0xfffd, 0x7}}}, @common=@ipv6header={{0x28, 'ipv6header\x00'}, {0x0, 0x81}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}, {{@uncond, 0x0, 0xa8, 0xe8}, @common=@inet=@LOG={0x40, 'LOG\x00', 0x0, {0x0, 0x0, "59e2b655a7928de9d18f6f4ce2fcb46e2fbbb084e62170a6b5ab23bc6a36"}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x368) 03:50:21 executing program 5: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c0024", 0xf, 0x8800000}, {&(0x7f0000010100)="05000000c025", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000040)) [ 774.093926] erofs: read_super, device -> /dev/loop3 [ 774.107686] erofs: read_super, device -> /dev/loop0 [ 774.115685] erofs: options -> [ 774.118680] erofs: options -> fault_injection=0x0000000000000000,noacl, [ 774.124334] erofs: cannot read erofs superblock [ 774.134290] FAULT_INJECTION: forcing a failure. 03:50:21 executing program 5: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c0024", 0xf, 0x7fffffffffffffff}, {&(0x7f0000010100)="05000000c025", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000040)) [ 774.134290] name failslab, interval 1, probability 0, space 0, times 0 [ 774.149365] erofs: cannot read erofs superblock [ 774.156379] CPU: 1 PID: 11732 Comm: syz-executor.2 Not tainted 4.19.163-syzkaller #0 [ 774.164271] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 774.173626] Call Trace: [ 774.176230] dump_stack+0x1fc/0x2fe [ 774.179870] should_fail.cold+0xa/0x14 [ 774.183781] ? setup_fault_attr+0x200/0x200 [ 774.188109] ? lock_acquire+0x170/0x3c0 [ 774.192101] __should_failslab+0x115/0x180 [ 774.196346] should_failslab+0x5/0xf [ 774.200072] kmem_cache_alloc+0x277/0x370 [ 774.204229] __kernfs_new_node+0xd2/0x680 [ 774.208388] ? kernfs_dop_revalidate+0x3a0/0x3a0 [ 774.213155] ? __mutex_unlock_slowpath+0xea/0x610 [ 774.218009] ? wait_for_completion_io+0x10/0x10 [ 774.222677] ? kernfs_next_descendant_post+0x19c/0x290 [ 774.227960] kernfs_new_node+0x92/0x120 [ 774.231942] __kernfs_create_file+0x51/0x33f [ 774.236359] sysfs_add_file_mode_ns+0x226/0x540 [ 774.241041] internal_create_group+0x355/0xb20 [ 774.245642] ? sysfs_remove_link_from_group+0x70/0x70 [ 774.250839] ? lock_downgrade+0x720/0x720 [ 774.255006] lo_ioctl+0xf7c/0x20e0 [ 774.258556] ? loop_set_status64+0x110/0x110 [ 774.262969] blkdev_ioctl+0x5cb/0x1a7e [ 774.266965] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 774.272335] ? blkpg_ioctl+0x9d0/0x9d0 [ 774.276218] ? mark_held_locks+0xf0/0xf0 [ 774.280319] ? mark_held_locks+0xf0/0xf0 [ 774.284368] ? debug_check_no_obj_freed+0x201/0x482 [ 774.289384] ? lock_downgrade+0x720/0x720 [ 774.293532] block_ioctl+0xe9/0x130 [ 774.297141] ? blkdev_fallocate+0x3f0/0x3f0 [ 774.301447] do_vfs_ioctl+0xcdb/0x12e0 [ 774.305331] ? lock_downgrade+0x720/0x720 [ 774.309480] ? check_preemption_disabled+0x41/0x280 [ 774.314487] ? ioctl_preallocate+0x200/0x200 [ 774.318891] ? __fget+0x356/0x510 [ 774.322408] ? do_dup2+0x450/0x450 [ 774.325931] ? do_sys_open+0x2bf/0x520 [ 774.329821] ksys_ioctl+0x9b/0xc0 [ 774.333269] __x64_sys_ioctl+0x6f/0xb0 [ 774.338020] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 774.342597] do_syscall_64+0xf9/0x620 [ 774.346384] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 774.351646] RIP: 0033:0x45dfb7 [ 774.354823] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 6d b5 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 774.373709] RSP: 002b:00007f4258f54a18 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 774.381472] RAX: ffffffffffffffda RBX: 0000000000000005 RCX: 000000000045dfb7 [ 774.388735] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 774.396037] RBP: 0000000000000000 R08: 0000000020000248 R09: 0000000000000000 [ 774.403304] R10: 0000000000001000 R11: 0000000000000246 R12: 0000000000000003 [ 774.410583] R13: 0000000000000004 R14: 0000000000000004 R15: 0000000020000258 [ 774.481267] erofs: read_super, device -> /dev/loop2 [ 774.486321] erofs: options -> [ 774.497319] erofs: root inode @ nid 36 [ 774.502162] erofs: read_super, device -> /dev/loop3 [ 774.502527] erofs: mounted on /dev/loop2 with opts: . [ 774.507471] erofs: read_super, device -> /dev/loop0 [ 774.520073] erofs: read_super, device -> /dev/loop4 [ 774.530232] erofs: options -> [ 774.538963] erofs: root inode @ nid 36 [ 774.547356] erofs: options -> fault_injection=0x0000000000000000,noacl, [ 774.550342] erofs: mounted on /dev/loop4 with opts: . [ 774.563167] erofs: options -> [ 774.566525] erofs: unmounted for /dev/loop2 [ 774.567830] erofs: cannot read erofs superblock [ 774.577849] erofs: cannot read erofs superblock 03:50:22 executing program 3: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x2004000000000000, 0x1000}], 0x0, &(0x7f0000000040)={[{@fault_injection={'fault_injection'}}, {@noacl='noacl'}]}) 03:50:22 executing program 5: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="04000000c025", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000040)) 03:50:22 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000c80)=@raw={'raw\x00', 0x3c1, 0x3, 0x308, 0x0, 0x150, 0x150, 0x0, 0x3, 0x238, 0x238, 0x238, 0x238, 0x238, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x3], 0x0, 0x128, 0x150, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'dummy0\x00', {0x0, 0x0, 0x3, 0x0, 0x0, 0xfffd, 0x7}}}, @common=@ipv6header={{0x28, 'ipv6header\x00'}, {0x0, 0x81}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}, {{@uncond, 0x0, 0xa8, 0xe8}, @common=@inet=@LOG={0x40, 'LOG\x00', 0x0, {0x0, 0x0, "59e2b655a7928de9d18f6f4ce2fcb46e2fbbb084e62170a6b5ab23bc6a36"}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x368) 03:50:22 executing program 2 (fault-call:0 fault-nth:17): syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="10000300c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000040)) 03:50:22 executing program 0: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="10000000c041", 0x6, 0x480}, {0x0, 0xfeffffff00000000, 0x1000}], 0x0, &(0x7f0000000040)) 03:50:22 executing program 5: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="07000000c025", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000040)) 03:50:22 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000c80)=@raw={'raw\x00', 0x3c1, 0x3, 0x308, 0x0, 0x150, 0x150, 0x0, 0x3, 0x238, 0x238, 0x238, 0x238, 0x238, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x3], 0x0, 0x128, 0x150, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'dummy0\x00', {0x0, 0x0, 0x3, 0x0, 0x0, 0xfffd, 0x7}}}, @common=@ipv6header={{0x28, 'ipv6header\x00'}, {0x0, 0x81}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}, {{@uncond, 0x0, 0xa8, 0xe8}, @common=@inet=@LOG={0x40, 'LOG\x00', 0x0, {0x0, 0x0, "59e2b655a7928de9d18f6f4ce2fcb46e2fbbb084e62170a6b5ab23bc6a36"}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x368) 03:50:22 executing program 4: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf01045c000c0024", 0xf, 0x400}, {&(0x7f0000010100)="02000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000040)) 03:50:22 executing program 5: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05020000c025", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000040)) [ 774.794105] erofs: unmounted for /dev/loop4 [ 774.809397] FAULT_INJECTION: forcing a failure. [ 774.809397] name failslab, interval 1, probability 0, space 0, times 0 [ 774.827828] CPU: 0 PID: 11766 Comm: syz-executor.2 Not tainted 4.19.163-syzkaller #0 [ 774.835729] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 774.845083] Call Trace: [ 774.847681] dump_stack+0x1fc/0x2fe [ 774.851324] should_fail.cold+0xa/0x14 [ 774.855226] ? setup_fault_attr+0x200/0x200 [ 774.859555] ? lock_acquire+0x170/0x3c0 [ 774.863553] __should_failslab+0x115/0x180 [ 774.867826] should_failslab+0x5/0xf [ 774.871546] kmem_cache_alloc+0x277/0x370 [ 774.875702] __kernfs_new_node+0xd2/0x680 [ 774.879852] ? kernfs_dop_revalidate+0x3a0/0x3a0 [ 774.885320] ? __mutex_unlock_slowpath+0xea/0x610 03:50:22 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000c80)=@raw={'raw\x00', 0x3c1, 0x3, 0x308, 0x0, 0x150, 0x150, 0x0, 0x3, 0x238, 0x238, 0x238, 0x238, 0x238, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x3], 0x0, 0x128, 0x150, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'dummy0\x00', {0x0, 0x0, 0x3, 0x0, 0x0, 0xfffd, 0x7}}}, @common=@ipv6header={{0x28, 'ipv6header\x00'}, {0x0, 0x81}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}, {{@uncond, 0x0, 0xa8, 0xe8}, @common=@inet=@LOG={0x40, 'LOG\x00', 0x0, {0x0, 0x0, "59e2b655a7928de9d18f6f4ce2fcb46e2fbbb084e62170a6b5ab23bc6a36"}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x368) 03:50:22 executing program 5: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05030000c025", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000040)) 03:50:22 executing program 5: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05040000c025", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000040)) [ 774.890176] ? wait_for_completion_io+0x10/0x10 [ 774.894854] ? kernfs_next_descendant_post+0x19c/0x290 [ 774.900147] kernfs_new_node+0x92/0x120 [ 774.904134] __kernfs_create_file+0x51/0x33f [ 774.908551] sysfs_add_file_mode_ns+0x226/0x540 [ 774.913245] internal_create_group+0x355/0xb20 [ 774.917841] ? sysfs_remove_link_from_group+0x70/0x70 [ 774.923041] ? lock_downgrade+0x720/0x720 [ 774.927200] lo_ioctl+0xf7c/0x20e0 [ 774.930754] ? loop_set_status64+0x110/0x110 [ 774.935171] blkdev_ioctl+0x5cb/0x1a7e [ 774.939063] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 774.944434] ? blkpg_ioctl+0x9d0/0x9d0 [ 774.948334] ? mark_held_locks+0xf0/0xf0 [ 774.952401] ? mark_held_locks+0xf0/0xf0 [ 774.956473] ? debug_check_no_obj_freed+0x201/0x482 [ 774.961499] ? lock_downgrade+0x720/0x720 [ 774.965646] block_ioctl+0xe9/0x130 [ 774.969390] ? blkdev_fallocate+0x3f0/0x3f0 [ 774.973699] do_vfs_ioctl+0xcdb/0x12e0 [ 774.977572] ? lock_downgrade+0x720/0x720 [ 774.981708] ? check_preemption_disabled+0x41/0x280 [ 774.986829] ? ioctl_preallocate+0x200/0x200 [ 774.991282] ? __fget+0x356/0x510 [ 774.994781] ? do_dup2+0x450/0x450 [ 774.998308] ? do_sys_open+0x2bf/0x520 [ 775.002190] ksys_ioctl+0x9b/0xc0 [ 775.005646] __x64_sys_ioctl+0x6f/0xb0 [ 775.009517] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 775.014086] do_syscall_64+0xf9/0x620 [ 775.017890] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 775.023079] RIP: 0033:0x45dfb7 [ 775.026258] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 6d b5 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 775.045162] RSP: 002b:00007f4258f54a18 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 775.052857] RAX: ffffffffffffffda RBX: 0000000000000005 RCX: 000000000045dfb7 [ 775.060130] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 775.067407] RBP: 0000000000000000 R08: 0000000020000248 R09: 0000000000000000 [ 775.074660] R10: 0000000000001000 R11: 0000000000000246 R12: 0000000000000003 [ 775.081999] R13: 0000000000000004 R14: 0000000000000004 R15: 0000000020000258 [ 775.141296] erofs: read_super, device -> /dev/loop2 [ 775.146411] erofs: options -> [ 775.154044] erofs: root inode @ nid 36 [ 775.164373] erofs: mounted on /dev/loop2 with opts: . [ 775.170831] erofs: read_super, device -> /dev/loop3 [ 775.179252] erofs: options -> fault_injection=0x0000000000000000,noacl, [ 775.191713] erofs: cannot read erofs superblock [ 775.219749] erofs: unmounted for /dev/loop2 [ 775.243542] erofs: read_super, device -> /dev/loop4 [ 775.249177] erofs: read_super, device -> /dev/loop0 [ 775.254314] erofs: options -> [ 775.256502] erofs: options -> [ 775.262912] erofs: root inode @ nid 36 [ 775.263598] erofs: cannot read erofs superblock [ 775.266970] erofs: mounted on /dev/loop4 with opts: . [ 775.302309] erofs: read_super, device -> /dev/loop3 [ 775.309931] erofs: options -> fault_injection=0x0000000000000000,noacl, [ 775.317707] erofs: cannot read erofs superblock [ 775.347112] erofs: unmounted for /dev/loop4 03:50:22 executing program 3: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x2104000000000000, 0x1000}], 0x0, &(0x7f0000000040)={[{@fault_injection={'fault_injection'}}, {@noacl='noacl'}]}) 03:50:22 executing program 5: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05070000c025", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000040)) 03:50:22 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000c80)=@raw={'raw\x00', 0x3c1, 0x3, 0x308, 0x0, 0x150, 0x150, 0x0, 0x3, 0x238, 0x238, 0x238, 0x238, 0x238, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x3], 0x0, 0x128, 0x150, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'dummy0\x00', {0x0, 0x0, 0x3, 0x0, 0x0, 0xfffd, 0x7}}}, @common=@ipv6header={{0x28, 'ipv6header\x00'}, {0x0, 0x81}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}, {{@uncond, 0x0, 0xa8, 0xe8}, @common=@inet=@LOG={0x40, 'LOG\x00', 0x0, {0x0, 0x0, "59e2b655a7928de9d18f6f4ce2fcb46e2fbbb084e62170a6b5ab23bc6a36"}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x368) 03:50:22 executing program 2 (fault-call:0 fault-nth:18): syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="10000300c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000040)) 03:50:22 executing program 0: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="10000000c041", 0x6, 0x480}, {0x0, 0xffffffff00000000, 0x1000}], 0x0, &(0x7f0000000040)) 03:50:22 executing program 4: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf01045d000c0024", 0xf, 0x400}, {&(0x7f0000010100)="02000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000040)) [ 775.434202] erofs: read_super, device -> /dev/loop4 [ 775.439695] erofs: options -> [ 775.443340] erofs: root inode @ nid 36 [ 775.450063] FAULT_INJECTION: forcing a failure. [ 775.450063] name failslab, interval 1, probability 0, space 0, times 0 [ 775.461826] CPU: 1 PID: 11824 Comm: syz-executor.2 Not tainted 4.19.163-syzkaller #0 [ 775.469718] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 775.479066] Call Trace: [ 775.481660] dump_stack+0x1fc/0x2fe [ 775.485312] should_fail.cold+0xa/0x14 [ 775.489206] ? setup_fault_attr+0x200/0x200 [ 775.493531] ? lock_acquire+0x170/0x3c0 [ 775.497518] ? dev_uevent_filter+0xd0/0xd0 [ 775.501757] __should_failslab+0x115/0x180 [ 775.506031] should_failslab+0x5/0xf [ 775.509750] kmem_cache_alloc_trace+0x284/0x380 [ 775.514436] ? dev_uevent_filter+0xd0/0xd0 [ 775.518678] kobject_uevent_env+0x236/0x14a0 [ 775.523105] lo_ioctl+0xff9/0x20e0 [ 775.526656] ? loop_set_status64+0x110/0x110 [ 775.531073] blkdev_ioctl+0x5cb/0x1a7e [ 775.534963] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 775.540338] ? blkpg_ioctl+0x9d0/0x9d0 [ 775.544231] ? mark_held_locks+0xf0/0xf0 [ 775.548297] ? mark_held_locks+0xf0/0xf0 [ 775.552367] ? debug_check_no_obj_freed+0x201/0x482 [ 775.555737] erofs: mounted on /dev/loop4 with opts: . [ 775.557389] ? lock_downgrade+0x720/0x720 [ 775.557406] block_ioctl+0xe9/0x130 [ 775.557418] ? blkdev_fallocate+0x3f0/0x3f0 [ 775.557432] do_vfs_ioctl+0xcdb/0x12e0 [ 775.557446] ? lock_downgrade+0x720/0x720 03:50:23 executing program 5: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000300c025", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000040)) [ 775.557459] ? check_preemption_disabled+0x41/0x280 [ 775.557472] ? ioctl_preallocate+0x200/0x200 [ 775.557489] ? __fget+0x356/0x510 [ 775.557504] ? do_dup2+0x450/0x450 [ 775.599294] ? do_sys_open+0x2bf/0x520 [ 775.603216] ksys_ioctl+0x9b/0xc0 [ 775.606679] __x64_sys_ioctl+0x6f/0xb0 [ 775.610580] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 775.615175] do_syscall_64+0xf9/0x620 [ 775.618985] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 775.624179] RIP: 0033:0x45dfb7 03:50:23 executing program 5: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000700c025", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000040)) 03:50:23 executing program 5: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05002000c025", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000040)) [ 775.627398] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 6d b5 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 775.646758] RSP: 002b:00007f4258f54a18 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 775.654468] RAX: ffffffffffffffda RBX: 0000000000000005 RCX: 000000000045dfb7 [ 775.661738] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 775.669012] RBP: 0000000000000000 R08: 0000000020000248 R09: 0000000000000000 [ 775.676285] R10: 0000000000001000 R11: 0000000000000246 R12: 0000000000000003 03:50:23 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000c80)=@raw={'raw\x00', 0x3c1, 0x3, 0x308, 0x0, 0x150, 0x150, 0x0, 0x3, 0x238, 0x238, 0x238, 0x238, 0x238, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x3], 0x0, 0x128, 0x150, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'dummy0\x00', {0x0, 0x0, 0x3, 0x0, 0x0, 0xfffd, 0x7}}}, @common=@ipv6header={{0x28, 'ipv6header\x00'}, {0x0, 0x81}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}, {{@uncond, 0x0, 0xa8, 0xe8}, @common=@inet=@LOG={0x40, 'LOG\x00', 0x0, {0x0, 0x0, "59e2b655a7928de9d18f6f4ce2fcb46e2fbbb084e62170a6b5ab23bc6a36"}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x368) [ 775.683731] R13: 0000000000000004 R14: 0000000000000004 R15: 0000000020000258 03:50:23 executing program 4: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf01045e000c0024", 0xf, 0x400}, {&(0x7f0000010100)="02000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000040)) [ 775.743994] erofs: read_super, device -> /dev/loop3 [ 775.751804] erofs: read_super, device -> /dev/loop0 [ 775.761387] erofs: options -> [ 775.764171] erofs: read_super, device -> /dev/loop2 [ 775.767268] erofs: options -> fault_injection=0x0000000000000000,noacl, [ 775.778931] erofs: unmounted for /dev/loop4 [ 775.784381] erofs: cannot read erofs superblock [ 775.786620] erofs: options -> 03:50:23 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000c80)=@raw={'raw\x00', 0x3c1, 0x3, 0x308, 0x0, 0x150, 0x150, 0x0, 0x3, 0x238, 0x238, 0x238, 0x238, 0x238, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xca, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x3], 0x0, 0x128, 0x150, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'dummy0\x00', {0x0, 0x0, 0x3, 0x0, 0x0, 0xfffd, 0x7}}}, @common=@ipv6header={{0x28, 'ipv6header\x00'}, {0x0, 0x81}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}, {{@uncond, 0x0, 0xa8, 0xe8}, @common=@inet=@LOG={0x40, 'LOG\x00', 0x0, {0x0, 0x0, "59e2b655a7928de9d18f6f4ce2fcb46e2fbbb084e62170a6b5ab23bc6a36"}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x368) [ 775.790429] erofs: cannot read erofs superblock [ 775.824208] erofs: root inode @ nid 36 [ 775.829676] erofs: mounted on /dev/loop2 with opts: . [ 775.932945] erofs: read_super, device -> /dev/loop4 [ 775.934099] erofs: read_super, device -> /dev/loop0 [ 775.938368] erofs: options -> [ 775.944544] erofs: read_super, device -> /dev/loop3 [ 775.946647] erofs: root inode @ nid 36 [ 775.958658] erofs: mounted on /dev/loop4 with opts: . [ 775.960881] erofs: options -> fault_injection=0x0000000000000000,noacl, [ 775.966141] erofs: options -> [ 775.974512] erofs: cannot read erofs superblock [ 775.982595] erofs: cannot read erofs superblock [ 775.989211] erofs: unmounted for /dev/loop2 [ 775.998970] erofs: unmounted for /dev/loop4 03:50:23 executing program 3: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x2204000000000000, 0x1000}], 0x0, &(0x7f0000000040)={[{@fault_injection={'fault_injection'}}, {@noacl='noacl'}]}) 03:50:23 executing program 5: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05fdef00c025", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000040)) 03:50:23 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000c80)=@raw={'raw\x00', 0x3c1, 0x3, 0x308, 0x0, 0x150, 0x150, 0x0, 0x3, 0x238, 0x238, 0x238, 0x238, 0x238, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x3], 0x0, 0x128, 0x150, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'dummy0\x00', {0x0, 0x0, 0x3, 0x0, 0x0, 0xfffd, 0x7}}}, @common=@ipv6header={{0x28, 'ipv6header\x00'}, {0x0, 0x81}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}, {{@uncond, 0x0, 0xa8, 0xe8}, @common=@inet=@LOG={0x40, 'LOG\x00', 0x0, {0x0, 0x0, "59e2b655a7928de9d18f6f4ce2fcb46e2fbbb084e62170a6b5ab23bc6a36"}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x368) 03:50:23 executing program 2 (fault-call:0 fault-nth:19): syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="10000300c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000040)) 03:50:23 executing program 4: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf01045f000c0024", 0xf, 0x400}, {&(0x7f0000010100)="02000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000040)) 03:50:23 executing program 0: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="10000000c041", 0x6, 0x480}, {0x0, 0xffffffffffff0700, 0x1000}], 0x0, &(0x7f0000000040)) 03:50:23 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000c80)=@raw={'raw\x00', 0x3c1, 0x3, 0x308, 0x0, 0x150, 0x150, 0x0, 0x3, 0x238, 0x238, 0x238, 0x238, 0x238, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x3], 0x0, 0x128, 0x150, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'dummy0\x00', {0x0, 0x0, 0x3, 0x0, 0x0, 0xfffd, 0x7}}}, @common=@ipv6header={{0x28, 'ipv6header\x00'}, {0x0, 0x81}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}, {{@uncond, 0x0, 0xa8, 0xe8}, @common=@inet=@LOG={0x40, 'LOG\x00', 0x0, {0x0, 0x0, "59e2b655a7928de9d18f6f4ce2fcb46e2fbbb084e62170a6b5ab23bc6a36"}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x368) 03:50:23 executing program 5: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05effd00c025", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000040)) [ 776.148920] FAULT_INJECTION: forcing a failure. [ 776.148920] name failslab, interval 1, probability 0, space 0, times 0 [ 776.160738] CPU: 0 PID: 11873 Comm: syz-executor.2 Not tainted 4.19.163-syzkaller #0 [ 776.168628] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 776.177979] Call Trace: [ 776.180581] dump_stack+0x1fc/0x2fe [ 776.184224] should_fail.cold+0xa/0x14 [ 776.188124] ? setup_fault_attr+0x200/0x200 [ 776.192454] ? lock_acquire+0x170/0x3c0 03:50:23 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000c80)=@raw={'raw\x00', 0x3c1, 0x3, 0x308, 0x0, 0x150, 0x150, 0x0, 0x3, 0x238, 0x238, 0x238, 0x238, 0x238, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x3], 0x0, 0x128, 0x150, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'dummy0\x00', {0x0, 0x0, 0x3, 0x0, 0x0, 0xfffd, 0x7}}}, @common=@ipv6header={{0x28, 'ipv6header\x00'}, {0x0, 0x81}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}, {{@uncond, 0x0, 0xa8, 0xe8}, @common=@inet=@LOG={0x40, 'LOG\x00', 0x0, {0x0, 0x0, "59e2b655a7928de9d18f6f4ce2fcb46e2fbbb084e62170a6b5ab23bc6a36"}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x368) [ 776.196442] __should_failslab+0x115/0x180 [ 776.200686] should_failslab+0x5/0xf [ 776.204402] __kmalloc+0x2ab/0x3c0 [ 776.207951] ? kobject_get_path+0xbf/0x240 [ 776.212198] kobject_get_path+0xbf/0x240 [ 776.216270] kobject_uevent_env+0x25c/0x14a0 [ 776.220695] lo_ioctl+0xff9/0x20e0 [ 776.224239] ? loop_set_status64+0x110/0x110 [ 776.228644] blkdev_ioctl+0x5cb/0x1a7e [ 776.232517] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 776.237871] ? blkpg_ioctl+0x9d0/0x9d0 [ 776.241752] ? mark_held_locks+0xf0/0xf0 [ 776.245797] ? mark_held_locks+0xf0/0xf0 [ 776.249846] ? debug_check_no_obj_freed+0x201/0x482 [ 776.254975] ? lock_downgrade+0x720/0x720 [ 776.259116] block_ioctl+0xe9/0x130 [ 776.262725] ? blkdev_fallocate+0x3f0/0x3f0 [ 776.267028] do_vfs_ioctl+0xcdb/0x12e0 [ 776.270908] ? lock_downgrade+0x720/0x720 [ 776.275040] ? check_preemption_disabled+0x41/0x280 [ 776.280040] ? ioctl_preallocate+0x200/0x200 [ 776.284446] ? __fget+0x356/0x510 [ 776.287923] ? do_dup2+0x450/0x450 [ 776.291474] ? do_sys_open+0x2bf/0x520 [ 776.295348] ksys_ioctl+0x9b/0xc0 [ 776.298787] __x64_sys_ioctl+0x6f/0xb0 [ 776.302668] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 776.307239] do_syscall_64+0xf9/0x620 [ 776.311053] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 776.316243] RIP: 0033:0x45dfb7 [ 776.319441] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 6d b5 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 776.338324] RSP: 002b:00007f4258f54a18 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 03:50:23 executing program 5: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000200c025", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000040)) 03:50:23 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000c80)=@raw={'raw\x00', 0x3c1, 0x3, 0x308, 0x0, 0x150, 0x150, 0x0, 0x3, 0x238, 0x238, 0x238, 0x238, 0x238, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x3], 0x0, 0x128, 0x150, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'dummy0\x00', {0x0, 0x0, 0x3, 0x0, 0x0, 0xfffd, 0x7}}}, @common=@ipv6header={{0x28, 'ipv6header\x00'}, {0x0, 0x81}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}, {{@uncond, 0x0, 0xa8, 0xe8}, @common=@inet=@LOG={0x40, 'LOG\x00', 0x0, {0x0, 0x0, "59e2b655a7928de9d18f6f4ce2fcb46e2fbbb084e62170a6b5ab23bc6a36"}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x368) [ 776.346016] RAX: ffffffffffffffda RBX: 0000000000000005 RCX: 000000000045dfb7 [ 776.353269] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 776.360528] RBP: 0000000000000000 R08: 0000000020000248 R09: 0000000000000000 [ 776.367795] R10: 0000000000001000 R11: 0000000000000246 R12: 0000000000000003 [ 776.375044] R13: 0000000000000004 R14: 0000000000000004 R15: 0000000020000258 [ 776.441065] erofs: read_super, device -> /dev/loop2 [ 776.446114] erofs: options -> [ 776.452113] erofs: read_super, device -> /dev/loop4 [ 776.457154] erofs: options -> [ 776.472108] erofs: root inode @ nid 36 [ 776.473459] erofs: root inode @ nid 36 [ 776.481591] erofs: mounted on /dev/loop4 with opts: . 03:50:24 executing program 4: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010060000c0024", 0xf, 0x400}, {&(0x7f0000010100)="02000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000040)) [ 776.503803] erofs: read_super, device -> /dev/loop3 [ 776.503922] erofs: mounted on /dev/loop2 with opts: . [ 776.516471] erofs: options -> fault_injection=0x0000000000000000,noacl, [ 776.535540] erofs: unmounted for /dev/loop4 [ 776.540239] erofs: cannot read erofs superblock [ 776.565998] erofs: unmounted for /dev/loop2 [ 776.648158] erofs: read_super, device -> /dev/loop0 [ 776.653345] erofs: options -> [ 776.657065] erofs: cannot read erofs superblock [ 776.669016] erofs: read_super, device -> /dev/loop3 [ 776.671590] erofs: read_super, device -> /dev/loop4 [ 776.674213] erofs: options -> fault_injection=0x0000000000000000,noacl, [ 776.674266] erofs: cannot read erofs superblock [ 776.693282] erofs: options -> [ 776.698460] erofs: root inode @ nid 36 [ 776.702587] erofs: mounted on /dev/loop4 with opts: . 03:50:24 executing program 3: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x2304000000000000, 0x1000}], 0x0, &(0x7f0000000040)={[{@fault_injection={'fault_injection'}}, {@noacl='noacl'}]}) 03:50:24 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000c80)=@raw={'raw\x00', 0x3c1, 0x3, 0x308, 0x0, 0x150, 0x150, 0x0, 0x3, 0x238, 0x238, 0x238, 0x238, 0x238, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x3], 0x0, 0x128, 0x150, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'dummy0\x00', {0x0, 0x0, 0x3, 0x0, 0x0, 0xfffd, 0x7}}}, @common=@ipv6header={{0x28, 'ipv6header\x00'}, {0x0, 0x81}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}, {{@uncond, 0x0, 0xa8, 0xe8}, @common=@inet=@LOG={0x40, 'LOG\x00', 0x0, {0x0, 0x0, "59e2b655a7928de9d18f6f4ce2fcb46e2fbbb084e62170a6b5ab23bc6a36"}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x368) 03:50:24 executing program 2 (fault-call:0 fault-nth:20): syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="10000300c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000040)) 03:50:24 executing program 5: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000300c025", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000040)) 03:50:24 executing program 0: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="10000000c041", 0x6, 0x480}, {0x0, 0xfffffffffffffdef, 0x1000}], 0x0, &(0x7f0000000040)) [ 776.777793] erofs: read_super, device -> /dev/loop0 [ 776.782849] erofs: options -> [ 776.786093] erofs: cannot read erofs superblock 03:50:24 executing program 4: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010460000c0024", 0xf, 0x400}, {&(0x7f0000010100)="02000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000040)) [ 776.856330] erofs: unmounted for /dev/loop4 [ 776.864031] FAULT_INJECTION: forcing a failure. [ 776.864031] name failslab, interval 1, probability 0, space 0, times 0 [ 776.892437] CPU: 1 PID: 11937 Comm: syz-executor.2 Not tainted 4.19.163-syzkaller #0 [ 776.900339] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 776.909690] Call Trace: [ 776.912285] dump_stack+0x1fc/0x2fe [ 776.915927] should_fail.cold+0xa/0x14 [ 776.919828] ? setup_fault_attr+0x200/0x200 [ 776.924160] ? lock_acquire+0x170/0x3c0 [ 776.928152] __should_failslab+0x115/0x180 [ 776.932393] should_failslab+0x5/0xf [ 776.936110] kmem_cache_alloc_node+0x245/0x3b0 [ 776.940703] __alloc_skb+0x71/0x560 [ 776.944342] alloc_uevent_skb+0x7b/0x210 [ 776.948415] kobject_uevent_env+0xa83/0x14a0 [ 776.952849] lo_ioctl+0xff9/0x20e0 03:50:24 executing program 5: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000400c025", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000040)) 03:50:24 executing program 5: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000700c025", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000040)) [ 776.956401] ? loop_set_status64+0x110/0x110 [ 776.960818] blkdev_ioctl+0x5cb/0x1a7e [ 776.964715] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 776.970085] ? blkpg_ioctl+0x9d0/0x9d0 [ 776.973980] ? mark_held_locks+0xf0/0xf0 [ 776.978043] ? mark_held_locks+0xf0/0xf0 [ 776.982116] ? debug_check_no_obj_freed+0x201/0x482 [ 776.987139] ? lock_downgrade+0x720/0x720 [ 776.991300] block_ioctl+0xe9/0x130 [ 776.994931] ? blkdev_fallocate+0x3f0/0x3f0 [ 776.999259] do_vfs_ioctl+0xcdb/0x12e0 03:50:24 executing program 5: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000003c025", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000040)) [ 777.003152] ? lock_downgrade+0x720/0x720 [ 777.011297] ? check_preemption_disabled+0x41/0x280 [ 777.016319] ? ioctl_preallocate+0x200/0x200 [ 777.020741] ? __fget+0x356/0x510 [ 777.024205] ? do_dup2+0x450/0x450 [ 777.027754] ? do_sys_open+0x2bf/0x520 [ 777.031915] ksys_ioctl+0x9b/0xc0 [ 777.035377] __x64_sys_ioctl+0x6f/0xb0 [ 777.039363] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 777.043953] do_syscall_64+0xf9/0x620 [ 777.047854] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 777.053047] RIP: 0033:0x45dfb7 03:50:24 executing program 5: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000007c025", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000040)) [ 777.056253] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 6d b5 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 777.075360] RSP: 002b:00007f4258f54a18 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 777.083078] RAX: ffffffffffffffda RBX: 0000000000000005 RCX: 000000000045dfb7 [ 777.090342] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 777.097648] RBP: 0000000000000000 R08: 0000000020000248 R09: 0000000000000000 03:50:24 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000c80)=@raw={'raw\x00', 0x3c1, 0x3, 0x308, 0x0, 0x150, 0x150, 0x0, 0x3, 0x238, 0x238, 0x238, 0x238, 0x238, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x3], 0x0, 0x128, 0x150, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'dummy0\x00', {0x0, 0x0, 0x3, 0x0, 0x0, 0xfffd, 0x7}}}, @common=@ipv6header={{0x28, 'ipv6header\x00'}, {0x0, 0x81}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}, {{@uncond, 0x0, 0xa8, 0xe8}, @common=@inet=@LOG={0x40, 'LOG\x00', 0x0, {0x0, 0x0, "59e2b655a7928de9d18f6f4ce2fcb46e2fbbb084e62170a6b5ab23bc6a36"}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x368) 03:50:24 executing program 5: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000020c025", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000040)) [ 777.104946] R10: 0000000000001000 R11: 0000000000000246 R12: 0000000000000003 [ 777.112235] R13: 0000000000000004 R14: 0000000000000004 R15: 0000000020000258 [ 777.196143] erofs: read_super, device -> /dev/loop2 [ 777.207513] erofs: read_super, device -> /dev/loop0 [ 777.212566] erofs: options -> [ 777.215801] erofs: cannot read erofs superblock [ 777.221088] erofs: read_super, device -> /dev/loop3 [ 777.223437] erofs: read_super, device -> /dev/loop4 [ 777.226209] erofs: options -> [ 777.238220] erofs: options -> [ 777.242364] erofs: root inode @ nid 36 [ 777.244141] erofs: options -> fault_injection=0x0000000000000000,noacl, [ 777.246764] erofs: mounted on /dev/loop4 with opts: . [ 777.259455] erofs: root inode @ nid 36 [ 777.268652] erofs: cannot read erofs superblock [ 777.268698] erofs: mounted on /dev/loop2 with opts: . [ 777.345885] erofs: unmounted for /dev/loop2 [ 777.351509] erofs: read_super, device -> /dev/loop3 [ 777.356834] erofs: read_super, device -> /dev/loop0 [ 777.380170] erofs: options -> [ 777.386970] erofs: options -> fault_injection=0x0000000000000000,noacl, [ 777.390572] erofs: cannot read erofs superblock [ 777.396415] erofs: cannot read erofs superblock [ 777.406798] erofs: unmounted for /dev/loop4 03:50:25 executing program 3: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x2404000000000000, 0x1000}], 0x0, &(0x7f0000000040)={[{@fault_injection={'fault_injection'}}, {@noacl='noacl'}]}) 03:50:25 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000c80)=@raw={'raw\x00', 0x3c1, 0x3, 0x308, 0x0, 0x150, 0x150, 0x0, 0x3, 0x238, 0x238, 0x238, 0x238, 0x238, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x3], 0x0, 0x128, 0x150, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'dummy0\x00', {0x0, 0x0, 0x3, 0x0, 0x0, 0xfffd, 0x7}}}, @common=@ipv6header={{0x28, 'ipv6header\x00'}, {0x0, 0x81}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}, {{@uncond, 0x0, 0xa8, 0xe8}, @common=@inet=@LOG={0x40, 'LOG\x00', 0x0, {0x0, 0x0, "59e2b655a7928de9d18f6f4ce2fcb46e2fbbb084e62170a6b5ab23bc6a36"}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x368) 03:50:25 executing program 5: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="0500fdefc025", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000040)) 03:50:25 executing program 2 (fault-call:0 fault-nth:21): syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="10000300c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000040)) 03:50:25 executing program 4: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010461000c0024", 0xf, 0x400}, {&(0x7f0000010100)="02000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000040)) 03:50:25 executing program 0: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="10000000c041", 0x6, 0x480}, {0x0, 0xffffffffffffffff, 0x1000}], 0x0, &(0x7f0000000040)) 03:50:25 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000c80)=@raw={'raw\x00', 0x3c1, 0x3, 0x308, 0x0, 0x150, 0x150, 0x0, 0x3, 0x238, 0x238, 0x238, 0x238, 0x238, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x3], 0x0, 0x128, 0x150, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'dummy0\x00', {0x0, 0x0, 0x3, 0x0, 0x0, 0xfffd, 0x7}}}, @common=@ipv6header={{0x28, 'ipv6header\x00'}, {0x0, 0x81}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}, {{@uncond, 0x0, 0xa8, 0xe8}, @common=@inet=@LOG={0x40, 'LOG\x00', 0x0, {0x0, 0x0, "59e2b655a7928de9d18f6f4ce2fcb46e2fbbb084e62170a6b5ab23bc6a36"}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x368) [ 777.577424] FAULT_INJECTION: forcing a failure. [ 777.577424] name failslab, interval 1, probability 0, space 0, times 0 [ 777.591825] CPU: 0 PID: 11993 Comm: syz-executor.2 Not tainted 4.19.163-syzkaller #0 [ 777.599728] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 777.609083] Call Trace: [ 777.611682] dump_stack+0x1fc/0x2fe [ 777.615324] should_fail.cold+0xa/0x14 [ 777.619228] ? setup_fault_attr+0x200/0x200 [ 777.623555] ? lock_acquire+0x170/0x3c0 03:50:25 executing program 5: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="0500effdc025", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000040)) 03:50:25 executing program 5: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000002c025", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000040)) [ 777.627542] __should_failslab+0x115/0x180 [ 777.631776] should_failslab+0x5/0xf [ 777.635497] kmem_cache_alloc_node_trace+0x244/0x3b0 [ 777.640610] __kmalloc_node_track_caller+0x38/0x70 [ 777.645547] __alloc_skb+0xae/0x560 [ 777.649189] alloc_uevent_skb+0x7b/0x210 [ 777.653263] kobject_uevent_env+0xa83/0x14a0 [ 777.657689] lo_ioctl+0xff9/0x20e0 [ 777.661250] ? loop_set_status64+0x110/0x110 [ 777.665668] blkdev_ioctl+0x5cb/0x1a7e [ 777.669560] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe 03:50:25 executing program 5: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000003c025", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000040)) [ 777.674931] ? blkpg_ioctl+0x9d0/0x9d0 [ 777.678825] ? mark_held_locks+0xf0/0xf0 [ 777.682896] ? mark_held_locks+0xf0/0xf0 [ 777.686974] ? debug_check_no_obj_freed+0x201/0x482 [ 777.691997] ? lock_downgrade+0x720/0x720 [ 777.696146] block_ioctl+0xe9/0x130 [ 777.699769] ? blkdev_fallocate+0x3f0/0x3f0 [ 777.704100] do_vfs_ioctl+0xcdb/0x12e0 [ 777.707991] ? lock_downgrade+0x720/0x720 [ 777.712140] ? check_preemption_disabled+0x41/0x280 [ 777.717161] ? ioctl_preallocate+0x200/0x200 [ 777.721581] ? __fget+0x356/0x510 03:50:25 executing program 5: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000004c025", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000040)) 03:50:25 executing program 5: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000007c025", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000040)) [ 777.725040] ? do_dup2+0x450/0x450 [ 777.728585] ? do_sys_open+0x2bf/0x520 [ 777.732484] ksys_ioctl+0x9b/0xc0 [ 777.735944] __x64_sys_ioctl+0x6f/0xb0 [ 777.739838] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 777.744434] do_syscall_64+0xf9/0x620 [ 777.748243] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 777.753435] RIP: 0033:0x45dfb7 [ 777.756630] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 6d b5 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 777.775533] RSP: 002b:00007f4258f54a18 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 777.783247] RAX: ffffffffffffffda RBX: 0000000000000005 RCX: 000000000045dfb7 [ 777.790521] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 777.797793] RBP: 0000000000000000 R08: 0000000020000248 R09: 0000000000000000 [ 777.805491] R10: 0000000000001000 R11: 0000000000000246 R12: 0000000000000003 [ 777.812744] R13: 0000000000000004 R14: 0000000000000004 R15: 0000000020000258 [ 777.864181] erofs: read_super, device -> /dev/loop2 [ 777.871113] erofs: options -> [ 777.874219] erofs: read_super, device -> /dev/loop4 [ 777.874493] erofs: root inode @ nid 36 [ 777.885978] erofs: mounted on /dev/loop2 with opts: . [ 777.891442] erofs: read_super, device -> /dev/loop0 [ 777.896461] erofs: options -> [ 777.904875] erofs: cannot read erofs superblock [ 777.906252] erofs: options -> [ 777.928310] erofs: root inode @ nid 36 [ 777.936783] erofs: unmounted for /dev/loop2 [ 777.940749] erofs: mounted on /dev/loop4 with opts: . [ 777.991287] erofs: read_super, device -> /dev/loop0 [ 777.991425] erofs: read_super, device -> /dev/loop3 [ 778.019727] erofs: options -> fault_injection=0x0000000000000000,noacl, [ 778.030861] erofs: options -> [ 778.036852] erofs: cannot read erofs superblock 03:50:25 executing program 3: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x2504000000000000, 0x1000}], 0x0, &(0x7f0000000040)={[{@fault_injection={'fault_injection'}}, {@noacl='noacl'}]}) 03:50:25 executing program 5: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c025", 0x486, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000040)) 03:50:25 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000c80)=@raw={'raw\x00', 0x3c1, 0x3, 0x308, 0x0, 0x150, 0x150, 0x0, 0x3, 0x238, 0x238, 0x238, 0x238, 0x238, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x3], 0x0, 0x128, 0x150, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'dummy0\x00', {0x0, 0x0, 0x3, 0x0, 0x0, 0xfffd, 0x7}}}, @common=@ipv6header={{0x28, 'ipv6header\x00'}, {0x0, 0x81}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}, {{@uncond, 0x0, 0xa8, 0xe8}, @common=@inet=@LOG={0x40, 'LOG\x00', 0x0, {0x0, 0x0, "59e2b655a7928de9d18f6f4ce2fcb46e2fbbb084e62170a6b5ab23bc6a36"}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x368) 03:50:25 executing program 2 (fault-call:0 fault-nth:22): syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="10000300c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000040)) 03:50:25 executing program 4: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010462000c0024", 0xf, 0x400}, {&(0x7f0000010100)="02000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000040)) [ 778.044557] erofs: cannot read erofs superblock [ 778.060409] erofs: unmounted for /dev/loop4 [ 778.134138] FAULT_INJECTION: forcing a failure. [ 778.134138] name failslab, interval 1, probability 0, space 0, times 0 [ 778.154336] CPU: 1 PID: 12038 Comm: syz-executor.2 Not tainted 4.19.163-syzkaller #0 [ 778.162250] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 778.171600] Call Trace: [ 778.174185] dump_stack+0x1fc/0x2fe [ 778.177804] should_fail.cold+0xa/0x14 [ 778.181678] ? setup_fault_attr+0x200/0x200 [ 778.185987] ? lock_acquire+0x170/0x3c0 [ 778.189952] __should_failslab+0x115/0x180 [ 778.194189] should_failslab+0x5/0xf [ 778.197895] kmem_cache_alloc+0x277/0x370 [ 778.202028] skb_clone+0x151/0x3d0 [ 778.205555] netlink_broadcast_filtered+0x8df/0xbc0 [ 778.210562] netlink_broadcast+0x35/0x40 [ 778.214626] kobject_uevent_env+0xa49/0x14a0 [ 778.219034] lo_ioctl+0xff9/0x20e0 [ 778.222562] ? loop_set_status64+0x110/0x110 [ 778.226956] blkdev_ioctl+0x5cb/0x1a7e [ 778.230827] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 778.236183] ? blkpg_ioctl+0x9d0/0x9d0 [ 778.240071] ? mark_held_locks+0xf0/0xf0 [ 778.244117] ? mark_held_locks+0xf0/0xf0 [ 778.248164] ? debug_check_no_obj_freed+0x201/0x482 [ 778.253165] ? lock_downgrade+0x720/0x720 [ 778.257297] block_ioctl+0xe9/0x130 [ 778.260906] ? blkdev_fallocate+0x3f0/0x3f0 [ 778.265213] do_vfs_ioctl+0xcdb/0x12e0 [ 778.269083] ? lock_downgrade+0x720/0x720 [ 778.273216] ? check_preemption_disabled+0x41/0x280 [ 778.278219] ? ioctl_preallocate+0x200/0x200 [ 778.282614] ? __fget+0x356/0x510 [ 778.286065] ? do_dup2+0x450/0x450 [ 778.289597] ? do_sys_open+0x2bf/0x520 [ 778.293474] ksys_ioctl+0x9b/0xc0 [ 778.296913] __x64_sys_ioctl+0x6f/0xb0 [ 778.300784] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 778.305369] do_syscall_64+0xf9/0x620 [ 778.309157] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 778.314329] RIP: 0033:0x45dfb7 [ 778.317524] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 6d b5 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 778.336502] RSP: 002b:00007f4258f54a18 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 778.344219] RAX: ffffffffffffffda RBX: 0000000000000005 RCX: 000000000045dfb7 [ 778.351923] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 778.359175] RBP: 0000000000000000 R08: 0000000020000248 R09: 0000000000000000 [ 778.366450] R10: 0000000000001000 R11: 0000000000000246 R12: 0000000000000003 [ 778.373711] R13: 0000000000000004 R14: 0000000000000004 R15: 0000000020000258 03:50:25 executing program 0: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="10000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1002}], 0x0, &(0x7f0000000040)) 03:50:25 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000c80)=@raw={'raw\x00', 0x3c1, 0x3, 0x308, 0x0, 0x150, 0x150, 0x0, 0x3, 0x238, 0x238, 0x238, 0x238, 0x238, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x3], 0x0, 0x128, 0x150, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'dummy0\x00', {0x0, 0x0, 0x3, 0x0, 0x0, 0xfffd, 0x7}}}, @common=@ipv6header={{0x28, 'ipv6header\x00'}, {0x0, 0x81}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}, {{@uncond, 0x0, 0xa8, 0xe8}, @common=@inet=@LOG={0x40, 'LOG\x00', 0x0, {0x0, 0x0, "59e2b655a7928de9d18f6f4ce2fcb46e2fbbb084e62170a6b5ab23bc6a36"}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x368) 03:50:25 executing program 5: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c025", 0xfdef, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000040)) [ 778.396474] erofs: read_super, device -> /dev/loop3 [ 778.409825] erofs: options -> fault_injection=0x0000000000000000,noacl, [ 778.438200] erofs: cannot read erofs superblock 03:50:26 executing program 5: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c025", 0x87ffb80, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000040)) [ 778.463256] erofs: read_super, device -> /dev/loop2 [ 778.468818] erofs: options -> [ 778.473857] erofs: root inode @ nid 36 [ 778.479994] erofs: read_super, device -> /dev/loop4 [ 778.485023] erofs: options -> [ 778.489970] erofs: root inode @ nid 36 [ 778.490715] erofs: mounted on /dev/loop2 with opts: . [ 778.499588] erofs: mounted on /dev/loop4 with opts: . 03:50:26 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000c80)=@raw={'raw\x00', 0x3c1, 0x3, 0x308, 0x0, 0x150, 0x150, 0x0, 0x3, 0x238, 0x238, 0x238, 0x238, 0x238, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x3], 0x0, 0x128, 0x150, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'dummy0\x00', {0x0, 0x0, 0x3, 0x0, 0x0, 0xfffd, 0x7}}}, @common=@ipv6header={{0x28, 'ipv6header\x00'}, {0x0, 0x81}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}, {{@uncond, 0x0, 0xa8, 0xe8}, @common=@inet=@LOG={0x40, 'LOG\x00', 0x0, {0x0, 0x0, "59e2b655a7928de9d18f6f4ce2fcb46e2fbbb084e62170a6b5ab23bc6a36"}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x368) 03:50:26 executing program 4: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010463000c0024", 0xf, 0x400}, {&(0x7f0000010100)="02000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000040)) 03:50:26 executing program 2 (fault-call:0 fault-nth:23): syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="10000300c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000040)) [ 778.563377] erofs: read_super, device -> /dev/loop3 [ 778.569739] erofs: options -> fault_injection=0x0000000000000000,noacl, [ 778.584113] erofs: unmounted for /dev/loop4 [ 778.584740] erofs: cannot read erofs superblock [ 778.611234] erofs: unmounted for /dev/loop2 [ 778.704653] erofs: read_super, device -> /dev/loop0 [ 778.714817] erofs: options -> [ 778.761893] erofs: read_super, device -> /dev/loop4 [ 778.767700] erofs: options -> [ 778.768567] FAULT_INJECTION: forcing a failure. [ 778.768567] name failslab, interval 1, probability 0, space 0, times 0 [ 778.770983] erofs: root inode @ nid 36 [ 778.771056] erofs: mounted on /dev/loop4 with opts: . [ 778.783026] CPU: 0 PID: 12085 Comm: syz-executor.2 Not tainted 4.19.163-syzkaller #0 [ 778.799271] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 778.808610] Call Trace: [ 778.811188] dump_stack+0x1fc/0x2fe [ 778.814807] should_fail.cold+0xa/0x14 [ 778.818696] ? setup_fault_attr+0x200/0x200 [ 778.823022] ? lock_acquire+0x170/0x3c0 [ 778.823887] erofs: root inode @ nid 36 [ 778.827004] __should_failslab+0x115/0x180 [ 778.827024] should_failslab+0x5/0xf [ 778.835289] erofs: mounted on /dev/loop0 with opts: . [ 778.838834] kmem_cache_alloc_trace+0x284/0x380 [ 778.838851] ? wait_for_completion_io+0x10/0x10 [ 778.838867] ? kobject_init_and_add.cold+0x16/0x16 [ 778.838882] call_usermodehelper_setup+0x84/0x300 [ 778.838899] kobject_uevent_env+0xe87/0x14a0 [ 778.867627] lo_ioctl+0xff9/0x20e0 [ 778.871183] ? loop_set_status64+0x110/0x110 [ 778.875600] blkdev_ioctl+0x5cb/0x1a7e [ 778.879488] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 778.884846] ? blkpg_ioctl+0x9d0/0x9d0 [ 778.888719] ? mark_held_locks+0xf0/0xf0 [ 778.892765] ? mark_held_locks+0xf0/0xf0 [ 778.896812] ? debug_check_no_obj_freed+0x201/0x482 [ 778.901814] ? lock_downgrade+0x720/0x720 [ 778.905947] block_ioctl+0xe9/0x130 [ 778.909559] ? blkdev_fallocate+0x3f0/0x3f0 [ 778.913903] do_vfs_ioctl+0xcdb/0x12e0 [ 778.917773] ? lock_downgrade+0x720/0x720 [ 778.921909] ? check_preemption_disabled+0x41/0x280 [ 778.926923] ? ioctl_preallocate+0x200/0x200 [ 778.931318] ? __fget+0x356/0x510 [ 778.934754] ? do_dup2+0x450/0x450 [ 778.938331] ? do_sys_open+0x2bf/0x520 [ 778.942216] ksys_ioctl+0x9b/0xc0 [ 778.945653] __x64_sys_ioctl+0x6f/0xb0 [ 778.949530] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 778.954094] do_syscall_64+0xf9/0x620 [ 778.957921] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 778.963096] RIP: 0033:0x45dfb7 [ 778.966271] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 6d b5 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 778.985156] RSP: 002b:00007f4258f54a18 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 778.992845] RAX: ffffffffffffffda RBX: 0000000000000005 RCX: 000000000045dfb7 [ 779.000096] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 03:50:26 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000c80)=@raw={'raw\x00', 0x3c1, 0x3, 0x308, 0x0, 0x150, 0x150, 0x0, 0x3, 0x238, 0x238, 0x238, 0x238, 0x238, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x3], 0x0, 0x128, 0x150, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'dummy0\x00', {0x0, 0x0, 0x3, 0x0, 0x0, 0xfffd, 0x7}}}, @common=@ipv6header={{0x28, 'ipv6header\x00'}, {0x0, 0x81}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}, {{@uncond, 0x0, 0xa8, 0xe8}, @common=@inet=@LOG={0x40, 'LOG\x00', 0x0, {0x0, 0x0, "59e2b655a7928de9d18f6f4ce2fcb46e2fbbb084e62170a6b5ab23bc6a36"}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x368) 03:50:26 executing program 3: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x2604000000000000, 0x1000}], 0x0, &(0x7f0000000040)={[{@fault_injection={'fault_injection'}}, {@noacl='noacl'}]}) [ 779.007355] RBP: 0000000000000000 R08: 0000000020000248 R09: 0000000000000000 [ 779.014657] R10: 0000000000001000 R11: 0000000000000246 R12: 0000000000000003 [ 779.021911] R13: 0000000000000004 R14: 0000000000000004 R15: 0000000020000258 [ 779.047871] erofs: read_super, device -> /dev/loop2 03:50:26 executing program 0: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="10000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1003}], 0x0, &(0x7f0000000040)) 03:50:26 executing program 4: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf0103f8000c0024", 0xf, 0x400}, {&(0x7f0000010100)="02000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000040)) [ 779.089233] erofs: options -> [ 779.101324] erofs: root inode @ nid 36 [ 779.116289] erofs: mounted on /dev/loop2 with opts: . [ 779.134658] erofs: unmounted for /dev/loop0 [ 779.139495] erofs: unmounted for /dev/loop4 03:50:26 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000c80)=@raw={'raw\x00', 0x3c1, 0x3, 0x308, 0x0, 0x150, 0x150, 0x0, 0x3, 0x238, 0x238, 0x238, 0x238, 0x238, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x3], 0x0, 0x128, 0x150, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'dummy0\x00', {0x0, 0x0, 0x3, 0x0, 0x0, 0xfffd, 0x7}}}, @common=@ipv6header={{0x28, 'ipv6header\x00'}, {0x0, 0x81}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}, {{@uncond, 0x0, 0xa8, 0xe8}, @common=@inet=@LOG={0x40, 'LOG\x00', 0x0, {0x0, 0x0, "59e2b655a7928de9d18f6f4ce2fcb46e2fbbb084e62170a6b5ab23bc6a36"}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x368) 03:50:26 executing program 2 (fault-call:0 fault-nth:24): syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="10000300c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000040)) [ 779.245494] erofs: read_super, device -> /dev/loop0 [ 779.249962] erofs: read_super, device -> /dev/loop3 [ 779.257277] erofs: options -> [ 779.266168] erofs: options -> fault_injection=0x0000000000000000,noacl, [ 779.282487] erofs: unmounted for /dev/loop2 03:50:26 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000c80)=@raw={'raw\x00', 0x3c1, 0x3, 0x308, 0x0, 0x150, 0x150, 0x0, 0x3, 0x238, 0x238, 0x238, 0x238, 0x238, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x3], 0x0, 0x128, 0x150, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'dummy0\x00', {0x0, 0x0, 0x3, 0x0, 0x0, 0xfffd, 0x7}}}, @common=@ipv6header={{0x28, 'ipv6header\x00'}, {0x0, 0x81}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}, {{@uncond, 0x0, 0xa8, 0xe8}, @common=@inet=@LOG={0x40, 'LOG\x00', 0x0, {0x0, 0x0, "59e2b655a7928de9d18f6f4ce2fcb46e2fbbb084e62170a6b5ab23bc6a36"}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x368) [ 779.295415] erofs: root inode @ nid 36 [ 779.305764] erofs: mounted on /dev/loop0 with opts: . [ 779.336428] erofs: cannot read erofs superblock 03:50:26 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000c80)=@raw={'raw\x00', 0x3c1, 0x3, 0x308, 0x0, 0x150, 0x150, 0x0, 0x3, 0x238, 0x238, 0x238, 0x238, 0x238, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xca, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x3], 0x0, 0x128, 0x150, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'dummy0\x00', {0x0, 0x0, 0x3, 0x0, 0x0, 0xfffd, 0x7}}}, @common=@ipv6header={{0x28, 'ipv6header\x00'}, {0x0, 0x81}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}, {{@uncond, 0x0, 0xa8, 0xe8}, @common=@inet=@LOG={0x40, 'LOG\x00', 0x0, {0x0, 0x0, "59e2b655a7928de9d18f6f4ce2fcb46e2fbbb084e62170a6b5ab23bc6a36"}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x368) [ 779.394302] FAULT_INJECTION: forcing a failure. [ 779.394302] name failslab, interval 1, probability 0, space 0, times 0 [ 779.398287] erofs: read_super, device -> /dev/loop4 [ 779.405776] CPU: 1 PID: 12116 Comm: syz-executor.2 Not tainted 4.19.163-syzkaller #0 [ 779.414129] erofs: options -> [ 779.418462] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 779.418468] Call Trace: [ 779.418490] dump_stack+0x1fc/0x2fe [ 779.418513] should_fail.cold+0xa/0x14 [ 779.418530] ? setup_fault_attr+0x200/0x200 [ 779.418543] ? lock_acquire+0x170/0x3c0 [ 779.418566] __should_failslab+0x115/0x180 [ 779.418580] should_failslab+0x5/0xf [ 779.418597] kmem_cache_alloc+0x277/0x370 [ 779.422046] erofs: root inode @ nid 36 [ 779.431129] getname_flags+0xce/0x590 [ 779.431150] do_mkdirat+0x8d/0x2d0 [ 779.431168] ? __ia32_sys_mknod+0x120/0x120 [ 779.431182] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 779.431198] ? trace_hardirqs_off_caller+0x6e/0x210 [ 779.431212] ? do_syscall_64+0x21/0x620 [ 779.431226] do_syscall_64+0xf9/0x620 [ 779.431241] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 779.431251] RIP: 0033:0x45d567 [ 779.431264] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 dd bf fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 bd bf fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 779.431275] RSP: 002b:00007f4258f54a78 EFLAGS: 00000213 ORIG_RAX: 0000000000000053 [ 779.434184] erofs: mounted on /dev/loop4 with opts: . [ 779.437463] RAX: ffffffffffffffda RBX: 00007f4258f54b10 RCX: 000000000045d567 03:50:27 executing program 5: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c025", 0x20010106, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000040)) 03:50:27 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000c80)=@raw={'raw\x00', 0x3c1, 0x3, 0x308, 0x0, 0x150, 0x150, 0x0, 0x3, 0x238, 0x238, 0x238, 0x238, 0x238, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x3], 0x0, 0x128, 0x150, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'dummy0\x00', {0x0, 0x0, 0x3, 0x0, 0x0, 0xfffd, 0x7}}}, @common=@ipv6header={{0x28, 'ipv6header\x00'}, {0x0, 0x81}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}, {{@uncond, 0x0, 0xa8, 0xe8}, @common=@inet=@LOG={0x40, 'LOG\x00', 0x0, {0x0, 0x0, "59e2b655a7928de9d18f6f4ce2fcb46e2fbbb084e62170a6b5ab23bc6a36"}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x368) 03:50:27 executing program 4: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf0126f8000c0024", 0xf, 0x400}, {&(0x7f0000010100)="02000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000040)) [ 779.437472] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000100 [ 779.437481] RBP: 00007f4258f54ad0 R08: 0000000020000248 R09: 0000000000000000 [ 779.437488] R10: 0000000000001000 R11: 0000000000000213 R12: 0000000020000000 [ 779.437495] R13: 0000000020000100 R14: 0000000020000200 R15: 0000000020000040 [ 779.522699] erofs: read_super, device -> /dev/loop3 [ 779.558743] erofs: unmounted for /dev/loop4 [ 779.589192] erofs: options -> fault_injection=0x0000000000000000,noacl, [ 779.596806] erofs: cannot read erofs superblock 03:50:27 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000c80)=@raw={'raw\x00', 0x3c1, 0x3, 0x308, 0x0, 0x150, 0x150, 0x0, 0x3, 0x238, 0x238, 0x238, 0x238, 0x238, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x3], 0x0, 0x128, 0x150, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'dummy0\x00', {0x0, 0x0, 0x3, 0x0, 0x0, 0xfffd, 0x7}}}, @common=@ipv6header={{0x28, 'ipv6header\x00'}, {0x0, 0x81}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}, {{@uncond, 0x0, 0xa8, 0xe8}, @common=@inet=@LOG={0x40, 'LOG\x00', 0x0, {0x0, 0x0, "59e2b655a7928de9d18f6f4ce2fcb46e2fbbb084e62170a6b5ab23bc6a36"}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x368) 03:50:27 executing program 3: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x3f00000000000000, 0x1000}], 0x0, &(0x7f0000000040)={[{@fault_injection={'fault_injection'}}, {@noacl='noacl'}]}) 03:50:27 executing program 0: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="10000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1004}], 0x0, &(0x7f0000000040)) 03:50:27 executing program 2 (fault-call:0 fault-nth:25): syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="10000300c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000040)) [ 779.666451] erofs: unmounted for /dev/loop0 03:50:27 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000c80)=@raw={'raw\x00', 0x3c1, 0x3, 0x308, 0x0, 0x150, 0x150, 0x0, 0x3, 0x238, 0x238, 0x238, 0x238, 0x238, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x3], 0x0, 0x128, 0x150, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'dummy0\x00', {0x0, 0x0, 0x3, 0x0, 0x0, 0xfffd, 0x7}}}, @common=@ipv6header={{0x28, 'ipv6header\x00'}, {0x0, 0x81}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}, {{@uncond, 0x0, 0xa8, 0xe8}, @common=@inet=@LOG={0x40, 'LOG\x00', 0x0, {0x0, 0x0, "59e2b655a7928de9d18f6f4ce2fcb46e2fbbb084e62170a6b5ab23bc6a36"}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x368) [ 779.791176] erofs: read_super, device -> /dev/loop3 [ 779.796353] erofs: options -> fault_injection=0x0000000000000000,noacl, [ 779.799622] erofs: read_super, device -> /dev/loop4 [ 779.810709] erofs: read_super, device -> /dev/loop0 [ 779.815907] erofs: cannot read erofs superblock [ 779.826602] erofs: options -> [ 779.834009] erofs: root inode @ nid 36 [ 779.836727] erofs: options -> 03:50:27 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000c80)=@raw={'raw\x00', 0x3c1, 0x3, 0x308, 0x0, 0x150, 0x150, 0x0, 0x3, 0x238, 0x238, 0x238, 0x238, 0x238, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x3], 0x0, 0x128, 0x150, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'dummy0\x00', {0x0, 0x0, 0x3, 0x0, 0x0, 0xfffd, 0x7}}}, @common=@ipv6header={{0x28, 'ipv6header\x00'}, {0x0, 0x81}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}, {{@uncond, 0x0, 0xa8, 0xe8}, @common=@inet=@LOG={0x40, 'LOG\x00', 0x0, {0x0, 0x0, "59e2b655a7928de9d18f6f4ce2fcb46e2fbbb084e62170a6b5ab23bc6a36"}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x368) [ 779.844717] erofs: mounted on /dev/loop0 with opts: . [ 779.850512] erofs: root inode @ nid 36 [ 779.855859] erofs: mounted on /dev/loop4 with opts: . [ 779.886970] FAULT_INJECTION: forcing a failure. [ 779.886970] name failslab, interval 1, probability 0, space 0, times 0 [ 779.899370] CPU: 1 PID: 12166 Comm: syz-executor.2 Not tainted 4.19.163-syzkaller #0 [ 779.907556] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 779.916909] Call Trace: [ 779.919507] dump_stack+0x1fc/0x2fe [ 779.923148] should_fail.cold+0xa/0x14 [ 779.927053] ? setup_fault_attr+0x200/0x200 [ 779.931383] ? lock_acquire+0x170/0x3c0 [ 779.935401] __should_failslab+0x115/0x180 [ 779.939652] should_failslab+0x5/0xf [ 779.943374] kmem_cache_alloc+0x277/0x370 [ 779.947534] __d_alloc+0x2b/0xa10 [ 779.951003] d_alloc+0x4a/0x230 [ 779.954299] __lookup_hash+0xc8/0x180 [ 779.958113] filename_create+0x186/0x490 [ 779.962187] ? kern_path_mountpoint+0x40/0x40 [ 779.966692] ? strncpy_from_user+0x2a2/0x350 [ 779.971117] ? getname_flags+0x25b/0x590 [ 779.975199] do_mkdirat+0xa0/0x2d0 [ 779.978754] ? __ia32_sys_mknod+0x120/0x120 [ 779.983084] ? trace_hardirqs_off_caller+0x6e/0x210 [ 779.988194] ? do_syscall_64+0x21/0x620 [ 779.992180] do_syscall_64+0xf9/0x620 [ 779.995988] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 780.001176] RIP: 0033:0x45d567 [ 780.004369] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 dd bf fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 bd bf fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 780.023442] RSP: 002b:00007f4258f54a78 EFLAGS: 00000213 ORIG_RAX: 0000000000000053 [ 780.031157] RAX: ffffffffffffffda RBX: 00007f4258f54b10 RCX: 000000000045d567 [ 780.038888] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000100 [ 780.046162] RBP: 00007f4258f54ad0 R08: 0000000020000248 R09: 0000000000000000 [ 780.053469] R10: 0000000000001000 R11: 0000000000000213 R12: 0000000020000000 [ 780.060746] R13: 0000000020000100 R14: 0000000020000200 R15: 0000000020000040 03:50:27 executing program 3: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x6000000000000000, 0x1000}], 0x0, &(0x7f0000000040)={[{@fault_injection={'fault_injection'}}, {@noacl='noacl'}]}) 03:50:27 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000c80)=@raw={'raw\x00', 0x3c1, 0x3, 0x308, 0x0, 0x150, 0x150, 0x0, 0x3, 0x238, 0x238, 0x238, 0x238, 0x238, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x3], 0x0, 0x128, 0x150, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'dummy0\x00', {0x0, 0x0, 0x3, 0x0, 0x0, 0xfffd, 0x7}}}, @common=@ipv6header={{0x28, 'ipv6header\x00'}, {0x0, 0x81}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}, {{@uncond, 0x0, 0xa8, 0xe8}, @common=@inet=@LOG={0x40, 'LOG\x00', 0x0, {0x0, 0x0, "59e2b655a7928de9d18f6f4ce2fcb46e2fbbb084e62170a6b5ab23bc6a36"}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x368) 03:50:27 executing program 0: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="10000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1008}], 0x0, &(0x7f0000000040)) [ 780.145975] erofs: unmounted for /dev/loop0 [ 780.161049] erofs: unmounted for /dev/loop4 [ 780.230549] erofs: read_super, device -> /dev/loop3 [ 780.235873] erofs: options -> fault_injection=0x0000000000000000,noacl, [ 780.247183] erofs: cannot read erofs superblock [ 780.293545] erofs: read_super, device -> /dev/loop0 [ 780.322519] erofs: read_super, device -> /dev/loop3 [ 780.336869] erofs: options -> [ 780.346950] erofs: options -> fault_injection=0x0000000000000000,noacl, [ 780.354396] erofs: root inode @ nid 36 [ 780.360741] erofs: cannot read erofs superblock [ 780.369809] erofs: mounted on /dev/loop0 with opts: . 03:50:27 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000c80)=@raw={'raw\x00', 0x3c1, 0x3, 0x308, 0x0, 0x150, 0x150, 0x0, 0x3, 0x238, 0x238, 0x238, 0x238, 0x238, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x3], 0x0, 0x128, 0x150, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'dummy0\x00', {0x0, 0x0, 0x3, 0x0, 0x0, 0xfffd, 0x7}}}, @common=@ipv6header={{0x28, 'ipv6header\x00'}, {0x0, 0x81}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}, {{@uncond, 0x0, 0xa8, 0xe8}, @common=@inet=@LOG={0x40, 'LOG\x00', 0x0, {0x0, 0x0, "59e2b655a7928de9d18f6f4ce2fcb46e2fbbb084e62170a6b5ab23bc6a36"}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x368) 03:50:27 executing program 5: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c025", 0xfffffdef, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000040)) 03:50:27 executing program 2 (fault-call:0 fault-nth:26): syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="10000300c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000040)) 03:50:27 executing program 3: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x8cffffff00000000, 0x1000}], 0x0, &(0x7f0000000040)={[{@fault_injection={'fault_injection'}}, {@noacl='noacl'}]}) 03:50:27 executing program 0: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="10000000c041", 0x6, 0x480}, {0x0, 0x0, 0x2302}], 0x0, &(0x7f0000000040)) 03:50:27 executing program 4: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010fff000c0024", 0xf, 0x400}, {&(0x7f0000010100)="02000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000040)) [ 780.420175] erofs: unmounted for /dev/loop0 [ 780.525706] erofs: read_super, device -> /dev/loop4 [ 780.554401] FAULT_INJECTION: forcing a failure. [ 780.554401] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 780.566237] CPU: 1 PID: 12210 Comm: syz-executor.2 Not tainted 4.19.163-syzkaller #0 [ 780.574123] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 780.583487] Call Trace: [ 780.586090] dump_stack+0x1fc/0x2fe [ 780.586716] erofs: options -> [ 780.589728] should_fail.cold+0xa/0x14 [ 780.589746] ? setup_fault_attr+0x200/0x200 [ 780.589760] ? wake_up_q+0x93/0xe0 03:50:28 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000c80)=@raw={'raw\x00', 0x3c1, 0x3, 0x308, 0x0, 0x150, 0x150, 0x0, 0x3, 0x238, 0x238, 0x238, 0x238, 0x238, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x3], 0x0, 0x128, 0x150, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'dummy0\x00', {0x0, 0x0, 0x3, 0x0, 0x0, 0xfffd, 0x7}}}, @common=@ipv6header={{0x28, 'ipv6header\x00'}, {0x0, 0x81}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}, {{@uncond, 0x0, 0xa8, 0xe8}, @common=@inet=@LOG={0x40, 'LOG\x00', 0x0, {0x0, 0x0, "59e2b655a7928de9d18f6f4ce2fcb46e2fbbb084e62170a6b5ab23bc6a36"}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x368) [ 780.589778] ? __mutex_unlock_slowpath+0x2be/0x610 [ 780.589798] __alloc_pages_nodemask+0x239/0x2890 [ 780.589820] ? __lock_acquire+0x6de/0x3ff0 [ 780.589841] ? gfp_pfmemalloc_allowed+0x150/0x150 [ 780.615068] erofs: root inode @ nid 36 [ 780.618632] ? blkdev_ioctl+0x11a/0x1a7e [ 780.618648] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 780.618662] ? blkpg_ioctl+0x9d0/0x9d0 [ 780.618684] ? debug_check_no_obj_freed+0x201/0x482 [ 780.618702] ? lock_downgrade+0x720/0x720 [ 780.618720] cache_grow_begin+0xa4/0x8a0 [ 780.618736] ? setup_fault_attr+0x200/0x200 [ 780.618747] ? lock_acquire+0x170/0x3c0 [ 780.618764] cache_alloc_refill+0x273/0x340 [ 780.636835] erofs: mounted on /dev/loop4 with opts: . [ 780.636877] kmem_cache_alloc+0x346/0x370 [ 780.657338] erofs: read_super, device -> /dev/loop3 [ 780.658240] getname_flags+0xce/0x590 [ 780.658261] do_mkdirat+0x8d/0x2d0 [ 780.658283] ? __ia32_sys_mknod+0x120/0x120 [ 780.662238] erofs: options -> fault_injection=0x0000000000000000,noacl, [ 780.666549] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 780.666565] ? trace_hardirqs_off_caller+0x6e/0x210 [ 780.666578] ? do_syscall_64+0x21/0x620 [ 780.666593] do_syscall_64+0xf9/0x620 [ 780.666607] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 780.666618] RIP: 0033:0x45d567 [ 780.666632] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 dd bf fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 bd bf fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 780.666640] RSP: 002b:00007f4258f54a78 EFLAGS: 00000213 ORIG_RAX: 0000000000000053 03:50:28 executing program 4: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000d0024", 0xf, 0x400}, {&(0x7f0000010100)="02000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000040)) [ 780.666653] RAX: ffffffffffffffda RBX: 00007f4258f54b10 RCX: 000000000045d567 [ 780.666661] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000100 [ 780.666670] RBP: 00007f4258f54ad0 R08: 0000000020000248 R09: 0000000000000000 [ 780.666678] R10: 0000000000001000 R11: 0000000000000213 R12: 0000000020000000 [ 780.666685] R13: 0000000020000100 R14: 0000000020000200 R15: 0000000020000040 [ 780.677718] erofs: read_super, device -> /dev/loop2 [ 780.701889] erofs: read_super, device -> /dev/loop0 [ 780.709962] erofs: options -> 03:50:28 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000c80)=@raw={'raw\x00', 0x3c1, 0x3, 0x308, 0x0, 0x150, 0x150, 0x0, 0x3, 0x238, 0x238, 0x238, 0x238, 0x238, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x3], 0x0, 0x128, 0x150, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'dummy0\x00', {0x0, 0x0, 0x3, 0x0, 0x0, 0xfffd, 0x7}}}, @common=@ipv6header={{0x28, 'ipv6header\x00'}, {0x0, 0x81}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}, {{@uncond, 0x0, 0xa8, 0xe8}, @common=@inet=@LOG={0x40, 'LOG\x00', 0x0, {0x0, 0x0, "59e2b655a7928de9d18f6f4ce2fcb46e2fbbb084e62170a6b5ab23bc6a36"}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x368) [ 780.797843] erofs: options -> [ 780.807848] erofs: unmounted for /dev/loop4 [ 780.811795] erofs: cannot read erofs superblock [ 780.818883] erofs: root inode @ nid 36 [ 780.820362] erofs: root inode @ nid 36 [ 780.831919] erofs: mounted on /dev/loop0 with opts: . [ 780.835081] erofs: mounted on /dev/loop2 with opts: . 03:50:28 executing program 0: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="10000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x2, &(0x7f0000000040)) 03:50:28 executing program 2 (fault-call:0 fault-nth:27): syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="10000300c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000040)) [ 780.938281] erofs: read_super, device -> /dev/loop3 [ 780.947265] erofs: options -> fault_injection=0x0000000000000000,noacl, [ 780.958435] erofs: unmounted for /dev/loop0 [ 780.975906] erofs: unmounted for /dev/loop2 03:50:28 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000c80)=@raw={'raw\x00', 0x3c1, 0x3, 0x308, 0x0, 0x150, 0x150, 0x0, 0x3, 0x238, 0x238, 0x238, 0x238, 0x238, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x3], 0x0, 0x128, 0x150, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'dummy0\x00', {0x0, 0x0, 0x3, 0x0, 0x0, 0xfffd, 0x7}}}, @common=@ipv6header={{0x28, 'ipv6header\x00'}, {0x0, 0x81}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}, {{@uncond, 0x0, 0xa8, 0xe8}, @common=@inet=@LOG={0x40, 'LOG\x00', 0x0, {0x0, 0x0, "59e2b655a7928de9d18f6f4ce2fcb46e2fbbb084e62170a6b5ab23bc6a36"}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x368) [ 780.986962] erofs: cannot read erofs superblock [ 781.041765] erofs: read_super, device -> /dev/loop4 [ 781.048452] erofs: options -> [ 781.058789] erofs: blksize 8192 isn't supported on this platform 03:50:28 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000c80)=@raw={'raw\x00', 0x3c1, 0x3, 0x308, 0x0, 0x150, 0x150, 0x0, 0x3, 0x238, 0x238, 0x238, 0x238, 0x238, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x3], 0x0, 0x128, 0x150, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'dummy0\x00', {0x0, 0x0, 0x3, 0x0, 0x0, 0xfffd, 0x7}}}, @common=@ipv6header={{0x28, 'ipv6header\x00'}, {0x0, 0x81}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}, {{@uncond, 0x0, 0xa8, 0xe8}, @common=@inet=@LOG={0x40, 'LOG\x00', 0x0, {0x0, 0x0, "59e2b655a7928de9d18f6f4ce2fcb46e2fbbb084e62170a6b5ab23bc6a36"}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x368) [ 781.088108] FAULT_INJECTION: forcing a failure. [ 781.088108] name failslab, interval 1, probability 0, space 0, times 0 [ 781.107213] erofs: read_super, device -> /dev/loop0 [ 781.112277] erofs: options -> [ 781.115528] erofs: root inode @ nid 36 [ 781.122891] CPU: 1 PID: 12252 Comm: syz-executor.2 Not tainted 4.19.163-syzkaller #0 [ 781.130802] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 781.140157] Call Trace: [ 781.142760] dump_stack+0x1fc/0x2fe [ 781.143844] erofs: mounted on /dev/loop0 with opts: . [ 781.146415] should_fail.cold+0xa/0x14 [ 781.146433] ? setup_fault_attr+0x200/0x200 [ 781.159835] __should_failslab+0x115/0x180 [ 781.164081] should_failslab+0x5/0xf [ 781.167801] kmem_cache_alloc+0x277/0x370 [ 781.171954] ? ext4_sync_fs+0x8d0/0x8d0 [ 781.175934] ext4_alloc_inode+0x1a/0x630 [ 781.180026] ? ext4_sync_fs+0x8d0/0x8d0 [ 781.184005] alloc_inode+0x5d/0x180 [ 781.187641] new_inode+0x1d/0xf0 [ 781.191015] __ext4_new_inode+0x400/0x5a20 [ 781.195262] ? putname+0xe1/0x120 [ 781.198721] ? do_mkdirat+0xa0/0x2d0 [ 781.202453] ? ext4_free_inode+0x1780/0x1780 [ 781.206864] ? debug_check_no_obj_freed+0x201/0x482 [ 781.211880] ? __dquot_initialize+0x298/0xb70 [ 781.216384] ? lock_acquire+0x170/0x3c0 [ 781.220362] ? dquot_initialize_needed+0x290/0x290 [ 781.225295] ? trace_hardirqs_off+0x64/0x200 [ 781.229711] ? common_perm+0x4be/0x800 [ 781.233607] ext4_mkdir+0x396/0xe10 [ 781.237242] ? putname+0xe1/0x120 [ 781.240701] ? ext4_init_dot_dotdot+0x600/0x600 [ 781.245551] ? generic_permission+0x116/0x4d0 [ 781.250049] ? security_inode_permission+0xc5/0xf0 [ 781.254987] ? inode_permission.part.0+0x10c/0x450 [ 781.259924] vfs_mkdir+0x508/0x7a0 [ 781.263474] do_mkdirat+0x262/0x2d0 [ 781.267109] ? __ia32_sys_mknod+0x120/0x120 [ 781.271438] ? trace_hardirqs_off_caller+0x6e/0x210 [ 781.276573] ? do_syscall_64+0x21/0x620 [ 781.280557] do_syscall_64+0xf9/0x620 [ 781.284368] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 781.289815] RIP: 0033:0x45d567 [ 781.293011] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 dd bf fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 bd bf fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 781.311912] RSP: 002b:00007f4258f54a78 EFLAGS: 00000213 ORIG_RAX: 0000000000000053 [ 781.319630] RAX: ffffffffffffffda RBX: 00007f4258f54b10 RCX: 000000000045d567 [ 781.326901] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000100 03:50:28 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000c80)=@raw={'raw\x00', 0x3c1, 0x3, 0x308, 0x0, 0x150, 0x150, 0x0, 0x3, 0x238, 0x238, 0x238, 0x238, 0x238, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x3], 0x0, 0x128, 0x150, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'dummy0\x00', {0x0, 0x0, 0x3, 0x0, 0x0, 0xfffd, 0x7}}}, @common=@ipv6header={{0x28, 'ipv6header\x00'}, {0x0, 0x81}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}, {{@uncond, 0x0, 0xa8, 0xe8}, @common=@inet=@LOG={0x40, 'LOG\x00', 0x0, {0x0, 0x0, "59e2b655a7928de9d18f6f4ce2fcb46e2fbbb084e62170a6b5ab23bc6a36"}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x368) 03:50:28 executing program 5: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c025", 0x7ffffffffffffb7f, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000040)) 03:50:28 executing program 3: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0xe226000000000000, 0x1000}], 0x0, &(0x7f0000000040)={[{@fault_injection={'fault_injection'}}, {@noacl='noacl'}]}) [ 781.334174] RBP: 00007f4258f54ad0 R08: 0000000020000248 R09: 0000000000000000 [ 781.342222] R10: 0000000000001000 R11: 0000000000000213 R12: 0000000020000000 [ 781.349495] R13: 0000000020000100 R14: 0000000020000200 R15: 0000000020000040 03:50:28 executing program 2 (fault-call:0 fault-nth:28): syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="10000300c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000040)) 03:50:28 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000c80)=@raw={'raw\x00', 0x3c1, 0x3, 0x308, 0x0, 0x150, 0x150, 0x0, 0x3, 0x238, 0x238, 0x238, 0x238, 0x238, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x3], 0x0, 0x128, 0x150, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'dummy0\x00', {0x0, 0x0, 0x3, 0x0, 0x0, 0xfffd, 0x7}}}, @common=@ipv6header={{0x28, 'ipv6header\x00'}, {0x0, 0x81}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}, {{@uncond, 0x0, 0xa8, 0xe8}, @common=@inet=@LOG={0x40, 'LOG\x00', 0x0, {0x0, 0x0, "59e2b655a7928de9d18f6f4ce2fcb46e2fbbb084e62170a6b5ab23bc6a36"}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x368) 03:50:29 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000c80)=@raw={'raw\x00', 0x3c1, 0x3, 0x308, 0x0, 0x150, 0x150, 0x0, 0x3, 0x238, 0x238, 0x238, 0x238, 0x238, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x3], 0x0, 0x128, 0x150, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'dummy0\x00', {0x0, 0x0, 0x3, 0x0, 0x0, 0xfffd, 0x7}}}, @common=@ipv6header={{0x28, 'ipv6header\x00'}, {0x0, 0x81}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}, {{@uncond, 0x0, 0xa8, 0xe8}, @common=@inet=@LOG={0x40, 'LOG\x00', 0x0, {0x0, 0x0, "59e2b655a7928de9d18f6f4ce2fcb46e2fbbb084e62170a6b5ab23bc6a36"}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x368) [ 781.507466] erofs: read_super, device -> /dev/loop4 [ 781.513072] erofs: options -> [ 781.517343] erofs: blksize 8192 isn't supported on this platform 03:50:29 executing program 4: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf01000000100024", 0xf, 0x400}, {&(0x7f0000010100)="02000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000040)) 03:50:29 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000c80)=@raw={'raw\x00', 0x3c1, 0x3, 0x308, 0x0, 0x150, 0x150, 0x0, 0x3, 0x238, 0x238, 0x238, 0x238, 0x238, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x3], 0x0, 0x128, 0x150, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'dummy0\x00', {0x0, 0x0, 0x3, 0x0, 0x0, 0xfffd, 0x7}}}, @common=@ipv6header={{0x28, 'ipv6header\x00'}, {0x0, 0x81}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}, {{@uncond, 0x0, 0xa8, 0xe8}, @common=@inet=@LOG={0x40, 'LOG\x00', 0x0, {0x0, 0x0, "59e2b655a7928de9d18f6f4ce2fcb46e2fbbb084e62170a6b5ab23bc6a36"}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x368) 03:50:29 executing program 0: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="10000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x3, &(0x7f0000000040)) [ 781.642935] erofs: unmounted for /dev/loop0 03:50:29 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000c80)=@raw={'raw\x00', 0x3c1, 0x3, 0x308, 0x0, 0x150, 0x150, 0x0, 0x3, 0x238, 0x238, 0x238, 0x238, 0x238, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xca, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x3], 0x0, 0x128, 0x150, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'dummy0\x00', {0x0, 0x0, 0x3, 0x0, 0x0, 0xfffd, 0x7}}}, @common=@ipv6header={{0x28, 'ipv6header\x00'}, {0x0, 0x81}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}, {{@uncond, 0x0, 0xa8, 0xe8}, @common=@inet=@LOG={0x40, 'LOG\x00', 0x0, {0x0, 0x0, "59e2b655a7928de9d18f6f4ce2fcb46e2fbbb084e62170a6b5ab23bc6a36"}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x368) [ 781.729601] FAULT_INJECTION: forcing a failure. [ 781.729601] name failslab, interval 1, probability 0, space 0, times 0 [ 781.735964] erofs: read_super, device -> /dev/loop3 [ 781.750737] CPU: 1 PID: 12299 Comm: syz-executor.2 Not tainted 4.19.163-syzkaller #0 [ 781.758642] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 781.763301] erofs: options -> fault_injection=0x0000000000000000,noacl, [ 781.768013] Call Trace: [ 781.768125] dump_stack+0x1fc/0x2fe [ 781.768146] should_fail.cold+0xa/0x14 [ 781.768161] ? finish_task_switch+0x146/0x780 [ 781.768178] ? setup_fault_attr+0x200/0x200 [ 781.788916] erofs: cannot read erofs superblock [ 781.789510] __should_failslab+0x115/0x180 [ 781.789525] should_failslab+0x5/0xf [ 781.789536] __kmalloc+0x2ab/0x3c0 [ 781.789548] ? ext4_find_extent+0x9bb/0xc70 [ 781.789562] ext4_find_extent+0x9bb/0xc70 [ 781.789584] ext4_ext_map_blocks+0x1c0/0x7390 [ 781.789600] ? __lock_acquire+0x6de/0x3ff0 03:50:29 executing program 5: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c025", 0xfffffffffffffdef, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000040)) [ 781.789626] ? __lock_acquire+0x6de/0x3ff0 [ 781.789645] ? mark_held_locks+0xf0/0xf0 [ 781.789659] ? __ext4_handle_dirty_metadata+0x1e0/0x590 [ 781.789674] ? ext4_find_delalloc_cluster+0x1f0/0x1f0 [ 781.789688] ? mark_held_locks+0xf0/0xf0 [ 781.789701] ? ext4_mark_iloc_dirty+0x1af6/0x2b10 [ 781.789720] ? ext4_es_lookup_extent+0x375/0xb60 [ 781.789738] ? lock_downgrade+0x720/0x720 [ 781.789750] ? lock_acquire+0x170/0x3c0 [ 781.789762] ? check_preemption_disabled+0x41/0x280 [ 781.789780] ? lock_acquire+0x170/0x3c0 [ 781.789795] ? ext4_map_blocks+0x33e/0x1a50 [ 781.789819] ext4_map_blocks+0xd88/0x1a50 [ 781.789835] ? check_preemption_disabled+0x41/0x280 [ 781.789853] ? ext4_issue_zeroout+0x160/0x160 [ 781.789869] ? __brelse+0x84/0xa0 [ 781.789884] ? __ext4_new_inode+0x2eb/0x5a20 [ 781.789911] ext4_getblk+0xad/0x4f0 [ 781.789928] ? ext4_iomap_begin+0xe00/0xe00 [ 781.910671] ? ext4_free_inode+0x1780/0x1780 [ 781.915088] ? debug_check_no_obj_freed+0x201/0x482 [ 781.920107] ? __dquot_initialize+0x298/0xb70 [ 781.924615] ext4_bread+0x7c/0x210 [ 781.928164] ? ext4_getblk+0x4f0/0x4f0 [ 781.932056] ? dquot_initialize_needed+0x290/0x290 [ 781.936989] ? trace_hardirqs_off+0x64/0x200 [ 781.941406] ext4_append+0x155/0x370 [ 781.945130] ext4_mkdir+0x5bd/0xe10 [ 781.948771] ? ext4_init_dot_dotdot+0x600/0x600 [ 781.953446] ? generic_permission+0x116/0x4d0 [ 781.957948] ? inode_permission.part.0+0x10c/0x450 [ 781.962892] vfs_mkdir+0x508/0x7a0 [ 781.966441] do_mkdirat+0x262/0x2d0 [ 781.970080] ? __ia32_sys_mknod+0x120/0x120 [ 781.974408] ? trace_hardirqs_off_caller+0x6e/0x210 [ 781.979432] ? do_syscall_64+0x21/0x620 [ 781.983437] do_syscall_64+0xf9/0x620 [ 781.987247] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 781.992435] RIP: 0033:0x45d567 [ 781.995628] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 dd bf fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 bd bf fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 782.014535] RSP: 002b:00007f4258f54a78 EFLAGS: 00000213 ORIG_RAX: 0000000000000053 [ 782.022246] RAX: ffffffffffffffda RBX: 00007f4258f54b10 RCX: 000000000045d567 03:50:29 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000c80)=@raw={'raw\x00', 0x3c1, 0x3, 0x308, 0x0, 0x150, 0x150, 0x0, 0x3, 0x238, 0x238, 0x238, 0x238, 0x238, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x3], 0x0, 0x128, 0x150, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'dummy0\x00', {0x0, 0x0, 0x3, 0x0, 0x0, 0xfffd, 0x7}}}, @common=@ipv6header={{0x28, 'ipv6header\x00'}, {0x0, 0x81}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}, {{@uncond, 0x0, 0xa8, 0xe8}, @common=@inet=@LOG={0x40, 'LOG\x00', 0x0, {0x0, 0x0, "59e2b655a7928de9d18f6f4ce2fcb46e2fbbb084e62170a6b5ab23bc6a36"}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x368) [ 782.029520] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000100 [ 782.036792] RBP: 00007f4258f54ad0 R08: 0000000020000248 R09: 0000000000000000 [ 782.044063] R10: 0000000000001000 R11: 0000000000000213 R12: 0000000020000000 [ 782.051333] R13: 0000000020000100 R14: 0000000020000200 R15: 0000000020000040 [ 782.073991] erofs: read_super, device -> /dev/loop2 [ 782.077574] erofs: read_super, device -> /dev/loop4 [ 782.084047] erofs: options -> [ 782.099071] erofs: options -> [ 782.103850] erofs: blksize 65536 isn't supported on this platform [ 782.118535] erofs: root inode @ nid 36 [ 782.126007] erofs: read_super, device -> /dev/loop0 [ 782.131430] erofs: mounted on /dev/loop2 with opts: . [ 782.139870] erofs: read_super, device -> /dev/loop3 [ 782.160236] erofs: options -> [ 782.163792] erofs: options -> fault_injection=0x0000000000000000,noacl, [ 782.172888] erofs: root inode @ nid 36 03:50:29 executing program 2 (fault-call:0 fault-nth:29): syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="10000300c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000040)) [ 782.192087] erofs: mounted on /dev/loop0 with opts: . [ 782.198639] erofs: cannot read erofs superblock 03:50:29 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000c80)=@raw={'raw\x00', 0x3c1, 0x3, 0x308, 0x0, 0x150, 0x150, 0x0, 0x3, 0x238, 0x238, 0x238, 0x238, 0x238, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x3], 0x0, 0x128, 0x150, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'dummy0\x00', {0x0, 0x0, 0x3, 0x0, 0x0, 0xfffd, 0x7}}}, @common=@ipv6header={{0x28, 'ipv6header\x00'}, {0x0, 0x81}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}, {{@uncond, 0x0, 0xa8, 0xe8}, @common=@inet=@LOG={0x40, 'LOG\x00', 0x0, {0x0, 0x0, "59e2b655a7928de9d18f6f4ce2fcb46e2fbbb084e62170a6b5ab23bc6a36"}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x368) [ 782.242668] erofs: unmounted for /dev/loop2 [ 782.249589] erofs: read_super, device -> /dev/loop4 [ 782.255045] erofs: options -> [ 782.260313] erofs: blksize 65536 isn't supported on this platform 03:50:29 executing program 3: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0xe926000000000000, 0x1000}], 0x0, &(0x7f0000000040)={[{@fault_injection={'fault_injection'}}, {@noacl='noacl'}]}) 03:50:29 executing program 5: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c025", 0x6, 0x8800000}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000040)) [ 782.350613] FAULT_INJECTION: forcing a failure. [ 782.350613] name failslab, interval 1, probability 0, space 0, times 0 [ 782.362329] CPU: 0 PID: 12339 Comm: syz-executor.2 Not tainted 4.19.163-syzkaller #0 [ 782.370226] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 782.379582] Call Trace: [ 782.382185] dump_stack+0x1fc/0x2fe [ 782.385826] should_fail.cold+0xa/0x14 [ 782.389728] ? setup_fault_attr+0x200/0x200 [ 782.394056] ? __es_tree_search.isra.0+0x1af/0x210 [ 782.399089] __should_failslab+0x115/0x180 [ 782.403341] should_failslab+0x5/0xf [ 782.407062] kmem_cache_alloc+0x3f/0x370 [ 782.411135] __es_insert_extent+0x39b/0x13b0 [ 782.415554] ? lock_acquire+0x170/0x3c0 [ 782.419535] ? ext4_es_insert_extent+0x17e/0x5e0 [ 782.424307] ext4_es_insert_extent+0x22e/0x5e0 [ 782.428906] ? lock_downgrade+0x720/0x720 [ 782.433072] ? ext4_es_find_delayed_extent_range+0x9f0/0x9f0 [ 782.438884] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 782.443906] ? ext4_es_find_delayed_extent_range+0x7d9/0x9f0 [ 782.449719] ext4_ext_map_blocks+0x2129/0x7390 [ 782.454310] ? __lock_acquire+0x6de/0x3ff0 [ 782.458570] ? __lock_acquire+0x6de/0x3ff0 [ 782.462816] ? mark_held_locks+0xf0/0xf0 [ 782.466888] ? __ext4_handle_dirty_metadata+0x1e0/0x590 [ 782.472251] ? ext4_find_delalloc_cluster+0x1f0/0x1f0 [ 782.477441] ? mark_held_locks+0xf0/0xf0 [ 782.481508] ? ext4_mark_iloc_dirty+0x1af6/0x2b10 [ 782.486360] ? ext4_es_lookup_extent+0x375/0xb60 [ 782.491127] ? check_preemption_disabled+0x41/0x280 [ 782.496152] ? lock_acquire+0x170/0x3c0 [ 782.500135] ? ext4_map_blocks+0x33e/0x1a50 [ 782.504468] ext4_map_blocks+0xd88/0x1a50 [ 782.508623] ? check_preemption_disabled+0x41/0x280 [ 782.513648] ? ext4_issue_zeroout+0x160/0x160 [ 782.518149] ? __brelse+0x84/0xa0 [ 782.521610] ? __ext4_new_inode+0x2eb/0x5a20 [ 782.526037] ext4_getblk+0xad/0x4f0 [ 782.529675] ? ext4_iomap_begin+0xe00/0xe00 [ 782.534006] ? ext4_free_inode+0x1780/0x1780 [ 782.538420] ? debug_check_no_obj_freed+0x201/0x482 [ 782.543436] ? __dquot_initialize+0x298/0xb70 [ 782.547941] ext4_bread+0x7c/0x210 [ 782.551484] ? ext4_getblk+0x4f0/0x4f0 [ 782.555374] ? dquot_initialize_needed+0x290/0x290 [ 782.560310] ? trace_hardirqs_off+0x64/0x200 [ 782.564729] ext4_append+0x155/0x370 [ 782.568454] ext4_mkdir+0x5bd/0xe10 [ 782.572095] ? ext4_init_dot_dotdot+0x600/0x600 [ 782.576773] ? generic_permission+0x116/0x4d0 [ 782.581277] ? inode_permission.part.0+0x10c/0x450 [ 782.586233] vfs_mkdir+0x508/0x7a0 [ 782.589783] do_mkdirat+0x262/0x2d0 [ 782.593417] ? __ia32_sys_mknod+0x120/0x120 [ 782.597746] ? trace_hardirqs_off_caller+0x6e/0x210 [ 782.602766] ? do_syscall_64+0x21/0x620 [ 782.606750] do_syscall_64+0xf9/0x620 [ 782.610565] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 782.615868] RIP: 0033:0x45d567 [ 782.619064] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 dd bf fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 bd bf fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 782.637965] RSP: 002b:00007f4258f54a78 EFLAGS: 00000213 ORIG_RAX: 0000000000000053 03:50:29 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000c80)=@raw={'raw\x00', 0x3c1, 0x3, 0x308, 0x0, 0x150, 0x150, 0x0, 0x3, 0x238, 0x238, 0x238, 0x238, 0x238, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x3], 0x0, 0x128, 0x150, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'dummy0\x00', {0x0, 0x0, 0x3, 0x0, 0x0, 0xfffd, 0x7}}}, @common=@ipv6header={{0x28, 'ipv6header\x00'}, {0x0, 0x81}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}, {{@uncond, 0x0, 0xa8, 0xe8}, @common=@inet=@LOG={0x40, 'LOG\x00', 0x0, {0x0, 0x0, "59e2b655a7928de9d18f6f4ce2fcb46e2fbbb084e62170a6b5ab23bc6a36"}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x368) 03:50:29 executing program 0: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="10000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x4, &(0x7f0000000040)) 03:50:29 executing program 4: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf01000000220024", 0xf, 0x400}, {&(0x7f0000010100)="02000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000040)) 03:50:30 executing program 3: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0xf6ffffff00000000, 0x1000}], 0x0, &(0x7f0000000040)={[{@fault_injection={'fault_injection'}}, {@noacl='noacl'}]}) 03:50:30 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000c80)=@raw={'raw\x00', 0x3c1, 0x3, 0x308, 0x0, 0x150, 0x150, 0x0, 0x3, 0x238, 0x238, 0x238, 0x238, 0x238, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x3], 0x0, 0x128, 0x150, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'dummy0\x00', {0x0, 0x0, 0x3, 0x0, 0x0, 0xfffd, 0x7}}}, @common=@ipv6header={{0x28, 'ipv6header\x00'}, {0x0, 0x81}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}, {{@uncond, 0x0, 0xa8, 0xe8}, @common=@inet=@LOG={0x40, 'LOG\x00', 0x0, {0x0, 0x0, "59e2b655a7928de9d18f6f4ce2fcb46e2fbbb084e62170a6b5ab23bc6a36"}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x368) 03:50:30 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000c80)=@raw={'raw\x00', 0x3c1, 0x3, 0x308, 0x0, 0x150, 0x150, 0x0, 0x3, 0x238, 0x238, 0x238, 0x238, 0x238, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x3], 0x0, 0x128, 0x150, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'dummy0\x00', {0x0, 0x0, 0x3, 0x0, 0x0, 0xfffd, 0x7}}}, @common=@ipv6header={{0x28, 'ipv6header\x00'}, {0x0, 0x81}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}, {{@uncond, 0x0, 0xa8, 0xe8}, @common=@inet=@LOG={0x40, 'LOG\x00', 0x0, {0x0, 0x0, "59e2b655a7928de9d18f6f4ce2fcb46e2fbbb084e62170a6b5ab23bc6a36"}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x368) 03:50:30 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000c80)=@raw={'raw\x00', 0x3c1, 0x3, 0x308, 0x0, 0x150, 0x150, 0x0, 0x3, 0x238, 0x238, 0x238, 0x238, 0x238, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x3], 0x0, 0x128, 0x150, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'dummy0\x00', {0x0, 0x0, 0x3, 0x0, 0x0, 0xfffd, 0x7}}}, @common=@ipv6header={{0x28, 'ipv6header\x00'}, {0x0, 0x81}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}, {{@uncond, 0x0, 0xa8, 0xe8}, @common=@inet=@LOG={0x40, 'LOG\x00', 0x0, {0x0, 0x0, "59e2b655a7928de9d18f6f4ce2fcb46e2fbbb084e62170a6b5ab23bc6a36"}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x368) 03:50:30 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000c80)=@raw={'raw\x00', 0x3c1, 0x3, 0x308, 0x0, 0x150, 0x150, 0x0, 0x3, 0x238, 0x238, 0x238, 0x238, 0x238, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x3], 0x0, 0x128, 0x150, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'dummy0\x00', {0x0, 0x0, 0x3, 0x0, 0x0, 0xfffd, 0x7}}}, @common=@ipv6header={{0x28, 'ipv6header\x00'}, {0x0, 0x81}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}, {{@uncond, 0x0, 0xa8, 0xe8}, @common=@inet=@LOG={0x40, 'LOG\x00', 0x0, {0x0, 0x0, "59e2b655a7928de9d18f6f4ce2fcb46e2fbbb084e62170a6b5ab23bc6a36"}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x368) [ 782.645680] RAX: ffffffffffffffda RBX: 00007f4258f54b10 RCX: 000000000045d567 [ 782.652949] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000100 [ 782.660216] RBP: 00007f4258f54ad0 R08: 0000000020000248 R09: 0000000000000000 [ 782.667489] R10: 0000000000001000 R11: 0000000000000213 R12: 0000000020000000 [ 782.674762] R13: 0000000020000100 R14: 0000000020000200 R15: 0000000020000040 [ 782.685266] erofs: unmounted for /dev/loop0 [ 782.726139] erofs: read_super, device -> /dev/loop4 [ 782.731746] erofs: options -> [ 782.735357] erofs: blksize 4 isn't supported on this platform [ 782.765985] erofs: read_super, device -> /dev/loop2 [ 782.781098] erofs: read_super, device -> /dev/loop3 [ 782.788428] erofs: options -> [ 782.803312] erofs: root inode @ nid 36 [ 782.809322] erofs: options -> fault_injection=0x0000000000000000,noacl, [ 782.814697] erofs: mounted on /dev/loop2 with opts: . [ 782.824637] erofs: cannot read erofs superblock 03:50:30 executing program 2 (fault-call:0 fault-nth:30): syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="10000300c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000040)) 03:50:30 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000c80)=@raw={'raw\x00', 0x3c1, 0x3, 0x308, 0x0, 0x150, 0x150, 0x0, 0x3, 0x238, 0x238, 0x238, 0x238, 0x238, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x3], 0x0, 0x128, 0x150, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'dummy0\x00', {0x0, 0x0, 0x3, 0x0, 0x0, 0xfffd, 0x7}}}, @common=@ipv6header={{0x28, 'ipv6header\x00'}, {0x0, 0x81}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}, {{@uncond, 0x0, 0xa8, 0xe8}, @common=@inet=@LOG={0x40, 'LOG\x00', 0x0, {0x0, 0x0, "59e2b655a7928de9d18f6f4ce2fcb46e2fbbb084e62170a6b5ab23bc6a36"}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x368) 03:50:30 executing program 5: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c025", 0x6, 0x7fffffffffffffff}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000040)) 03:50:30 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000c80)=@raw={'raw\x00', 0x3c1, 0x3, 0x308, 0x0, 0x150, 0x150, 0x0, 0x3, 0x238, 0x238, 0x238, 0x238, 0x238, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x3], 0x0, 0x128, 0x150, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'dummy0\x00', {0x0, 0x0, 0x3, 0x0, 0x0, 0xfffd, 0x7}}}, @common=@ipv6header={{0x28, 'ipv6header\x00'}, {0x0, 0x81}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}, {{@uncond, 0x0, 0xa8, 0xe8}, @common=@inet=@LOG={0x40, 'LOG\x00', 0x0, {0x0, 0x0, "59e2b655a7928de9d18f6f4ce2fcb46e2fbbb084e62170a6b5ab23bc6a36"}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x368) [ 782.833347] erofs: read_super, device -> /dev/loop4 [ 782.839109] erofs: options -> [ 782.842476] erofs: blksize 4 isn't supported on this platform [ 782.866046] erofs: unmounted for /dev/loop2 [ 782.948079] erofs: read_super, device -> /dev/loop3 [ 782.948648] erofs: read_super, device -> /dev/loop0 [ 782.958354] erofs: options -> fault_injection=0x0000000000000000,noacl, [ 782.958406] erofs: cannot read erofs superblock 03:50:30 executing program 4: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000002a0024", 0xf, 0x400}, {&(0x7f0000010100)="02000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000040)) [ 782.988872] FAULT_INJECTION: forcing a failure. [ 782.988872] name failslab, interval 1, probability 0, space 0, times 0 [ 783.007598] erofs: options -> [ 783.011012] erofs: root inode @ nid 36 [ 783.015269] erofs: mounted on /dev/loop0 with opts: . [ 783.026835] CPU: 0 PID: 12404 Comm: syz-executor.2 Not tainted 4.19.163-syzkaller #0 [ 783.034723] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 783.044081] Call Trace: [ 783.046677] dump_stack+0x1fc/0x2fe [ 783.050303] should_fail.cold+0xa/0x14 [ 783.054183] ? setup_fault_attr+0x200/0x200 [ 783.058709] ? lock_downgrade+0x720/0x720 [ 783.062859] __should_failslab+0x115/0x180 [ 783.067132] should_failslab+0x5/0xf [ 783.070830] __kmalloc+0x2ab/0x3c0 [ 783.074354] ? ext4_find_extent+0x9bb/0xc70 [ 783.078707] ext4_find_extent+0x9bb/0xc70 [ 783.082850] ext4_ext_map_blocks+0x1c0/0x7390 [ 783.087336] ? __lock_acquire+0x6de/0x3ff0 [ 783.091561] ? mark_held_locks+0xf0/0xf0 [ 783.095615] ? __ext4_handle_dirty_metadata+0x1e0/0x590 [ 783.100973] ? ext4_find_delalloc_cluster+0x1f0/0x1f0 [ 783.106147] ? mark_held_locks+0xf0/0xf0 [ 783.110337] ? ext4_mark_iloc_dirty+0x1af6/0x2b10 [ 783.115211] ? ext4_es_lookup_extent+0x375/0xb60 [ 783.119972] ? ext4_map_blocks+0x59f/0x1a50 [ 783.124289] ? lock_acquire+0x170/0x3c0 [ 783.128245] ? ext4_map_blocks+0x740/0x1a50 [ 783.132555] ext4_map_blocks+0x7a2/0x1a50 [ 783.136699] ? check_preemption_disabled+0x41/0x280 [ 783.141704] ? ext4_issue_zeroout+0x160/0x160 [ 783.146235] ? __brelse+0x84/0xa0 [ 783.149730] ? __ext4_new_inode+0x2eb/0x5a20 [ 783.154126] ext4_getblk+0xad/0x4f0 [ 783.157749] ? ext4_iomap_begin+0xe00/0xe00 [ 783.162076] ? ext4_free_inode+0x1780/0x1780 [ 783.166518] ? debug_check_no_obj_freed+0x201/0x482 [ 783.171563] ? __dquot_initialize+0x298/0xb70 [ 783.176044] ext4_bread+0x7c/0x210 [ 783.179576] ? ext4_getblk+0x4f0/0x4f0 [ 783.183443] ? dquot_initialize_needed+0x290/0x290 [ 783.188357] ? trace_hardirqs_off+0x64/0x200 [ 783.192753] ext4_append+0x155/0x370 [ 783.196464] ext4_mkdir+0x5bd/0xe10 [ 783.200089] ? ext4_init_dot_dotdot+0x600/0x600 [ 783.204740] ? generic_permission+0x116/0x4d0 [ 783.209220] ? inode_permission.part.0+0x10c/0x450 [ 783.214148] vfs_mkdir+0x508/0x7a0 [ 783.217683] do_mkdirat+0x262/0x2d0 [ 783.221296] ? __ia32_sys_mknod+0x120/0x120 [ 783.225601] ? trace_hardirqs_off_caller+0x6e/0x210 [ 783.230600] ? do_syscall_64+0x21/0x620 [ 783.234558] do_syscall_64+0xf9/0x620 [ 783.238343] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 783.243515] RIP: 0033:0x45d567 [ 783.246705] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 dd bf fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 bd bf fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 783.265592] RSP: 002b:00007f4258f54a78 EFLAGS: 00000213 ORIG_RAX: 0000000000000053 [ 783.273283] RAX: ffffffffffffffda RBX: 00007f4258f54b10 RCX: 000000000045d567 [ 783.280533] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000100 [ 783.287784] RBP: 00007f4258f54ad0 R08: 0000000020000248 R09: 0000000000000000 [ 783.295043] R10: 0000000000001000 R11: 0000000000000213 R12: 0000000020000000 [ 783.302302] R13: 0000000020000100 R14: 0000000020000200 R15: 0000000020000040 03:50:31 executing program 0: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="10000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x8, &(0x7f0000000040)) 03:50:31 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000c80)=@raw={'raw\x00', 0x3c1, 0x3, 0x308, 0x0, 0x150, 0x150, 0x0, 0x3, 0x238, 0x238, 0x238, 0x238, 0x238, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x3], 0x0, 0x128, 0x150, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'dummy0\x00', {0x0, 0x0, 0x3, 0x0, 0x0, 0xfffd, 0x7}}}, @common=@ipv6header={{0x28, 'ipv6header\x00'}, {0x0, 0x81}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}, {{@uncond, 0x0, 0xa8, 0xe8}, @common=@inet=@LOG={0x40, 'LOG\x00', 0x0, {0x0, 0x0, "59e2b655a7928de9d18f6f4ce2fcb46e2fbbb084e62170a6b5ab23bc6a36"}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x368) 03:50:31 executing program 5: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c025", 0x6, 0x480}, {0x0, 0x2, 0x1000}], 0x0, &(0x7f0000000040)) 03:50:31 executing program 3: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0xf703000000000000, 0x1000}], 0x0, &(0x7f0000000040)={[{@fault_injection={'fault_injection'}}, {@noacl='noacl'}]}) 03:50:31 executing program 2 (fault-call:0 fault-nth:31): syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="10000300c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000040)) [ 783.549636] erofs: unmounted for /dev/loop0 03:50:31 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000c80)=@raw={'raw\x00', 0x3c1, 0x3, 0x308, 0x0, 0x150, 0x150, 0x0, 0x3, 0x238, 0x238, 0x238, 0x238, 0x238, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x3], 0x0, 0x128, 0x150, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'dummy0\x00', {0x0, 0x0, 0x3, 0x0, 0x0, 0xfffd, 0x7}}}, @common=@ipv6header={{0x28, 'ipv6header\x00'}, {0x0, 0x81}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}, {{@uncond, 0x0, 0xa8, 0xe8}, @common=@inet=@LOG={0x40, 'LOG\x00', 0x0, {0x0, 0x0, "59e2b655a7928de9d18f6f4ce2fcb46e2fbbb084e62170a6b5ab23bc6a36"}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x368) [ 783.605021] erofs: read_super, device -> /dev/loop4 [ 783.617165] erofs: options -> [ 783.623493] erofs: read_super, device -> /dev/loop3 [ 783.636518] erofs: blksize 1024 isn't supported on this platform [ 783.642611] erofs: options -> fault_injection=0x0000000000000000,noacl, [ 783.644732] FAULT_INJECTION: forcing a failure. [ 783.644732] name failslab, interval 1, probability 0, space 0, times 0 [ 783.684104] CPU: 1 PID: 12433 Comm: syz-executor.2 Not tainted 4.19.163-syzkaller #0 [ 783.691194] erofs: cannot read erofs superblock [ 783.692007] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 783.692013] Call Trace: [ 783.692035] dump_stack+0x1fc/0x2fe [ 783.692056] should_fail.cold+0xa/0x14 [ 783.692074] ? setup_fault_attr+0x200/0x200 [ 783.720428] ? lock_downgrade+0x720/0x720 [ 783.724562] __should_failslab+0x115/0x180 [ 783.728782] should_failslab+0x5/0xf [ 783.732477] __kmalloc+0x2ab/0x3c0 [ 783.736005] ? ext4_find_extent+0x9bb/0xc70 [ 783.740333] ext4_find_extent+0x9bb/0xc70 [ 783.744492] ext4_ext_map_blocks+0x1c0/0x7390 [ 783.749007] ? __lock_acquire+0x6de/0x3ff0 [ 783.753255] ? mark_held_locks+0xf0/0xf0 [ 783.757311] ? __ext4_handle_dirty_metadata+0x1e0/0x590 [ 783.762657] ? ext4_find_delalloc_cluster+0x1f0/0x1f0 [ 783.767842] ? mark_held_locks+0xf0/0xf0 [ 783.771922] ? ext4_mark_iloc_dirty+0x1af6/0x2b10 [ 783.776763] ? ext4_es_lookup_extent+0x375/0xb60 [ 783.781507] ? ext4_map_blocks+0x59f/0x1a50 [ 783.785815] ? lock_acquire+0x170/0x3c0 [ 783.789784] ? ext4_map_blocks+0x740/0x1a50 [ 783.794099] ext4_map_blocks+0x7a2/0x1a50 [ 783.798231] ? check_preemption_disabled+0x41/0x280 [ 783.803233] ? ext4_issue_zeroout+0x160/0x160 [ 783.807723] ? __brelse+0x84/0xa0 [ 783.811184] ? __ext4_new_inode+0x2eb/0x5a20 [ 783.815581] ext4_getblk+0xad/0x4f0 [ 783.819191] ? ext4_iomap_begin+0xe00/0xe00 [ 783.823497] ? ext4_free_inode+0x1780/0x1780 [ 783.827913] ? debug_check_no_obj_freed+0x201/0x482 [ 783.832917] ? __dquot_initialize+0x298/0xb70 [ 783.837406] ext4_bread+0x7c/0x210 [ 783.840952] ? ext4_getblk+0x4f0/0x4f0 [ 783.844826] ? dquot_initialize_needed+0x290/0x290 [ 783.849751] ? trace_hardirqs_off+0x64/0x200 [ 783.854175] ext4_append+0x155/0x370 [ 783.857884] ext4_mkdir+0x5bd/0xe10 [ 783.861503] ? ext4_init_dot_dotdot+0x600/0x600 [ 783.866151] ? generic_permission+0x116/0x4d0 [ 783.870633] ? inode_permission.part.0+0x10c/0x450 [ 783.875546] vfs_mkdir+0x508/0x7a0 [ 783.879089] do_mkdirat+0x262/0x2d0 [ 783.882700] ? __ia32_sys_mknod+0x120/0x120 [ 783.887015] ? trace_hardirqs_off_caller+0x6e/0x210 [ 783.892025] ? do_syscall_64+0x21/0x620 [ 783.895982] do_syscall_64+0xf9/0x620 [ 783.899768] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 783.904941] RIP: 0033:0x45d567 [ 783.908210] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 dd bf fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 bd bf fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 783.927106] RSP: 002b:00007f4258f54a78 EFLAGS: 00000213 ORIG_RAX: 0000000000000053 [ 783.934829] RAX: ffffffffffffffda RBX: 00007f4258f54b10 RCX: 000000000045d567 [ 783.942097] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000100 [ 783.949357] RBP: 00007f4258f54ad0 R08: 0000000020000248 R09: 0000000000000000 03:50:31 executing program 5: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c025", 0x6, 0x480}, {0x0, 0x3, 0x1000}], 0x0, &(0x7f0000000040)) 03:50:31 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000c80)=@raw={'raw\x00', 0x3c1, 0x3, 0x308, 0x0, 0x150, 0x150, 0x0, 0x3, 0x238, 0x238, 0x238, 0x238, 0x238, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x3], 0x0, 0x128, 0x150, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'dummy0\x00', {0x0, 0x0, 0x3, 0x0, 0x0, 0xfffd, 0x7}}}, @common=@ipv6header={{0x28, 'ipv6header\x00'}, {0x0, 0x81}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}, {{@uncond, 0x0, 0xa8, 0xe8}, @common=@inet=@LOG={0x40, 'LOG\x00', 0x0, {0x0, 0x0, "59e2b655a7928de9d18f6f4ce2fcb46e2fbbb084e62170a6b5ab23bc6a36"}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x368) [ 783.956630] R10: 0000000000001000 R11: 0000000000000213 R12: 0000000020000000 [ 783.963910] R13: 0000000020000100 R14: 0000000020000200 R15: 0000000020000040 03:50:31 executing program 5: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c025", 0x6, 0x480}, {0x0, 0x4, 0x1000}], 0x0, &(0x7f0000000040)) 03:50:31 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000c80)=@raw={'raw\x00', 0x3c1, 0x3, 0x308, 0x0, 0x150, 0x150, 0x0, 0x3, 0x238, 0x238, 0x238, 0x238, 0x238, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x3], 0x0, 0x128, 0x150, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'dummy0\x00', {0x0, 0x0, 0x3, 0x0, 0x0, 0xfffd, 0x7}}}, @common=@ipv6header={{0x28, 'ipv6header\x00'}, {0x0, 0x81}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}, {{@uncond, 0x0, 0xa8, 0xe8}, @common=@inet=@LOG={0x40, 'LOG\x00', 0x0, {0x0, 0x0, "59e2b655a7928de9d18f6f4ce2fcb46e2fbbb084e62170a6b5ab23bc6a36"}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x368) [ 784.054433] erofs: read_super, device -> /dev/loop0 03:50:31 executing program 2 (fault-call:0 fault-nth:32): syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="10000300c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000040)) [ 784.074758] erofs: options -> [ 784.087596] erofs: read_super, device -> /dev/loop4 [ 784.088138] erofs: read_super, device -> /dev/loop3 [ 784.092625] erofs: options -> [ 784.094683] erofs: blksize 1024 isn't supported on this platform [ 784.107123] erofs: root inode @ nid 36 [ 784.107226] erofs: mounted on /dev/loop0 with opts: . [ 784.107745] erofs: options -> fault_injection=0x0000000000000000,noacl, [ 784.162935] erofs: unmounted for /dev/loop0 [ 784.163590] erofs: cannot read erofs superblock [ 784.182125] FAULT_INJECTION: forcing a failure. [ 784.182125] name failslab, interval 1, probability 0, space 0, times 0 [ 784.193514] CPU: 1 PID: 12468 Comm: syz-executor.2 Not tainted 4.19.163-syzkaller #0 [ 784.201402] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 784.210754] Call Trace: [ 784.213351] dump_stack+0x1fc/0x2fe [ 784.216969] should_fail.cold+0xa/0x14 [ 784.220839] ? setup_fault_attr+0x200/0x200 [ 784.225160] ? __es_tree_search.isra.0+0x1af/0x210 [ 784.230078] __should_failslab+0x115/0x180 [ 784.234307] should_failslab+0x5/0xf [ 784.238008] kmem_cache_alloc+0x3f/0x370 [ 784.242061] __es_insert_extent+0x39b/0x13b0 [ 784.246482] ext4_es_insert_extent+0x22e/0x5e0 [ 784.251050] ? ext4_map_blocks+0x59f/0x1a50 [ 784.255354] ? ext4_es_find_delayed_extent_range+0x9f0/0x9f0 [ 784.261159] ext4_map_blocks+0xa2a/0x1a50 [ 784.265296] ? ext4_issue_zeroout+0x160/0x160 [ 784.269775] ? __brelse+0x84/0xa0 [ 784.273212] ? __ext4_new_inode+0x2eb/0x5a20 [ 784.277606] ext4_getblk+0xad/0x4f0 [ 784.281216] ? ext4_iomap_begin+0xe00/0xe00 [ 784.285520] ? ext4_free_inode+0x1780/0x1780 [ 784.289924] ? debug_check_no_obj_freed+0x201/0x482 [ 784.294918] ? __dquot_initialize+0x298/0xb70 [ 784.299412] ext4_bread+0x7c/0x210 [ 784.302942] ? ext4_getblk+0x4f0/0x4f0 [ 784.306814] ? dquot_initialize_needed+0x290/0x290 [ 784.311733] ? trace_hardirqs_off+0x64/0x200 [ 784.316124] ext4_append+0x155/0x370 [ 784.319822] ext4_mkdir+0x5bd/0xe10 [ 784.323434] ? ext4_init_dot_dotdot+0x600/0x600 [ 784.328086] ? generic_permission+0x116/0x4d0 [ 784.332563] ? inode_permission.part.0+0x10c/0x450 [ 784.337494] vfs_mkdir+0x508/0x7a0 [ 784.341018] do_mkdirat+0x262/0x2d0 [ 784.344629] ? __ia32_sys_mknod+0x120/0x120 [ 784.348936] ? trace_hardirqs_off_caller+0x6e/0x210 [ 784.353932] ? do_syscall_64+0x21/0x620 [ 784.357907] do_syscall_64+0xf9/0x620 [ 784.361702] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 784.366885] RIP: 0033:0x45d567 [ 784.370066] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 dd bf fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 bd bf fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 784.388952] RSP: 002b:00007f4258f54a78 EFLAGS: 00000213 ORIG_RAX: 0000000000000053 [ 784.396648] RAX: ffffffffffffffda RBX: 00007f4258f54b10 RCX: 000000000045d567 [ 784.403904] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000100 03:50:31 executing program 4: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf01000000370024", 0xf, 0x400}, {&(0x7f0000010100)="02000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000040)) 03:50:31 executing program 0: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="10000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x300, &(0x7f0000000040)) 03:50:31 executing program 5: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c025", 0x6, 0x480}, {0x0, 0x7, 0x1000}], 0x0, &(0x7f0000000040)) 03:50:31 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000c80)=@raw={'raw\x00', 0x3c1, 0x3, 0x308, 0x0, 0x150, 0x150, 0x0, 0x3, 0x238, 0x238, 0x238, 0x238, 0x238, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x3], 0x0, 0x128, 0x150, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'dummy0\x00', {0x0, 0x0, 0x3, 0x0, 0x0, 0xfffd, 0x7}}}, @common=@ipv6header={{0x28, 'ipv6header\x00'}, {0x0, 0x81}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}, {{@uncond, 0x0, 0xa8, 0xe8}, @common=@inet=@LOG={0x40, 'LOG\x00', 0x0, {0x0, 0x0, "59e2b655a7928de9d18f6f4ce2fcb46e2fbbb084e62170a6b5ab23bc6a36"}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x368) [ 784.411157] RBP: 00007f4258f54ad0 R08: 0000000020000248 R09: 0000000000000000 [ 784.418408] R10: 0000000000001000 R11: 0000000000000213 R12: 0000000020000000 [ 784.425794] R13: 0000000020000100 R14: 0000000020000200 R15: 0000000020000040 03:50:32 executing program 3: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0xfa03000000000000, 0x1000}], 0x0, &(0x7f0000000040)={[{@fault_injection={'fault_injection'}}, {@noacl='noacl'}]}) 03:50:32 executing program 5: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c025", 0x6, 0x480}, {0x0, 0x300, 0x1000}], 0x0, &(0x7f0000000040)) 03:50:32 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000c80)=@raw={'raw\x00', 0x3c1, 0x3, 0x308, 0x0, 0x150, 0x150, 0x0, 0x3, 0x238, 0x238, 0x238, 0x238, 0x238, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xca, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x3], 0x0, 0x128, 0x150, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'dummy0\x00', {0x0, 0x0, 0x3, 0x0, 0x0, 0xfffd, 0x7}}}, @common=@ipv6header={{0x28, 'ipv6header\x00'}, {0x0, 0x81}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}, {{@uncond, 0x0, 0xa8, 0xe8}, @common=@inet=@LOG={0x40, 'LOG\x00', 0x0, {0x0, 0x0, "59e2b655a7928de9d18f6f4ce2fcb46e2fbbb084e62170a6b5ab23bc6a36"}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x368) 03:50:32 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000c80)=@raw={'raw\x00', 0x3c1, 0x3, 0x308, 0x0, 0x150, 0x150, 0x0, 0x3, 0x238, 0x238, 0x238, 0x238, 0x238, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x3], 0x0, 0x128, 0x150, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'dummy0\x00', {0x0, 0x0, 0x3, 0x0, 0x0, 0xfffd, 0x7}}}, @common=@ipv6header={{0x28, 'ipv6header\x00'}, {0x0, 0x81}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}, {{@uncond, 0x0, 0xa8, 0xe8}, @common=@inet=@LOG={0x40, 'LOG\x00', 0x0, {0x0, 0x0, "59e2b655a7928de9d18f6f4ce2fcb46e2fbbb084e62170a6b5ab23bc6a36"}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x368) [ 784.507580] erofs: read_super, device -> /dev/loop2 [ 784.512774] erofs: options -> [ 784.516278] erofs: root inode @ nid 36 [ 784.523716] erofs: mounted on /dev/loop2 with opts: . 03:50:32 executing program 5: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c025", 0x6, 0x480}, {0x0, 0x700, 0x1000}], 0x0, &(0x7f0000000040)) 03:50:32 executing program 2 (fault-call:0 fault-nth:33): syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="10000300c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000040)) 03:50:32 executing program 5: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c025", 0x6, 0x480}, {0x0, 0x2000, 0x1000}], 0x0, &(0x7f0000000040)) 03:50:32 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000c80)=@raw={'raw\x00', 0x3c1, 0x3, 0x308, 0x0, 0x150, 0x150, 0x0, 0x3, 0x238, 0x238, 0x238, 0x238, 0x238, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x3], 0x0, 0x128, 0x150, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'dummy0\x00', {0x0, 0x0, 0x3, 0x0, 0x0, 0xfffd, 0x7}}}, @common=@ipv6header={{0x28, 'ipv6header\x00'}, {0x0, 0x81}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}, {{@uncond, 0x0, 0xa8, 0xe8}, @common=@inet=@LOG={0x40, 'LOG\x00', 0x0, {0x0, 0x0, "59e2b655a7928de9d18f6f4ce2fcb46e2fbbb084e62170a6b5ab23bc6a36"}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x368) [ 784.620086] erofs: unmounted for /dev/loop2 [ 784.629565] erofs: read_super, device -> /dev/loop0 [ 784.634848] erofs: options -> [ 784.646977] erofs: root inode @ nid 36 [ 784.661475] erofs: mounted on /dev/loop0 with opts: . [ 784.699276] FAULT_INJECTION: forcing a failure. [ 784.699276] name failslab, interval 1, probability 0, space 0, times 0 [ 784.710774] CPU: 0 PID: 12511 Comm: syz-executor.2 Not tainted 4.19.163-syzkaller #0 [ 784.718655] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 784.728013] Call Trace: [ 784.730605] dump_stack+0x1fc/0x2fe [ 784.734240] should_fail.cold+0xa/0x14 [ 784.738136] ? setup_fault_attr+0x200/0x200 [ 784.742637] ? __es_tree_search.isra.0+0x1af/0x210 [ 784.747578] __should_failslab+0x115/0x180 [ 784.751825] should_failslab+0x5/0xf [ 784.755544] kmem_cache_alloc+0x3f/0x370 [ 784.758587] erofs: read_super, device -> /dev/loop3 [ 784.759615] __es_insert_extent+0x39b/0x13b0 [ 784.759742] ext4_es_insert_extent+0x22e/0x5e0 [ 784.759759] ? ext4_map_blocks+0x59f/0x1a50 [ 784.759774] ? ext4_es_find_delayed_extent_range+0x9f0/0x9f0 [ 784.759804] ext4_map_blocks+0xa2a/0x1a50 [ 784.759827] ? ext4_issue_zeroout+0x160/0x160 [ 784.759843] ? __brelse+0x84/0xa0 [ 784.759858] ? __ext4_new_inode+0x2eb/0x5a20 [ 784.759881] ext4_getblk+0xad/0x4f0 [ 784.759899] ? ext4_iomap_begin+0xe00/0xe00 [ 784.759916] ? ext4_free_inode+0x1780/0x1780 [ 784.759931] ? debug_check_no_obj_freed+0x201/0x482 [ 784.759943] ? __dquot_initialize+0x298/0xb70 [ 784.759958] ext4_bread+0x7c/0x210 [ 784.759971] ? ext4_getblk+0x4f0/0x4f0 [ 784.759983] ? dquot_initialize_needed+0x290/0x290 [ 784.760001] ? trace_hardirqs_off+0x64/0x200 [ 784.760020] ext4_append+0x155/0x370 [ 784.765044] erofs: options -> fault_injection=0x0000000000000000,noacl, [ 784.769441] ext4_mkdir+0x5bd/0xe10 [ 784.769463] ? ext4_init_dot_dotdot+0x600/0x600 [ 784.769479] ? generic_permission+0x116/0x4d0 [ 784.769494] ? inode_permission.part.0+0x10c/0x450 [ 784.769511] vfs_mkdir+0x508/0x7a0 [ 784.796952] erofs: cannot read erofs superblock [ 784.800776] do_mkdirat+0x262/0x2d0 [ 784.800794] ? __ia32_sys_mknod+0x120/0x120 [ 784.800812] ? trace_hardirqs_off_caller+0x6e/0x210 [ 784.888467] ? do_syscall_64+0x21/0x620 [ 784.892444] do_syscall_64+0xf9/0x620 [ 784.896231] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 784.901443] RIP: 0033:0x45d567 [ 784.904624] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 dd bf fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 bd bf fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 784.923510] RSP: 002b:00007f4258f54a78 EFLAGS: 00000213 ORIG_RAX: 0000000000000053 [ 784.931200] RAX: ffffffffffffffda RBX: 00007f4258f54b10 RCX: 000000000045d567 [ 784.938458] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000100 [ 784.945732] RBP: 00007f4258f54ad0 R08: 0000000020000248 R09: 0000000000000000 [ 784.952987] R10: 0000000000001000 R11: 0000000000000213 R12: 0000000020000000 [ 784.960247] R13: 0000000020000100 R14: 0000000020000200 R15: 0000000020000040 [ 784.968254] erofs: unmounted for /dev/loop0 [ 784.990309] erofs: read_super, device -> /dev/loop2 [ 784.995340] erofs: options -> [ 785.000216] erofs: root inode @ nid 36 [ 785.005657] erofs: mounted on /dev/loop2 with opts: . [ 785.013371] erofs: read_super, device -> /dev/loop4 [ 785.022500] erofs: options -> [ 785.025821] erofs: blksize 8388608 isn't supported on this platform [ 785.035336] erofs: read_super, device -> /dev/loop3 [ 785.040702] erofs: options -> fault_injection=0x0000000000000000,noacl, [ 785.048741] erofs: cannot read erofs superblock [ 785.062574] erofs: unmounted for /dev/loop2 [ 785.158553] erofs: read_super, device -> /dev/loop4 [ 785.163598] erofs: options -> [ 785.176604] erofs: blksize 8388608 isn't supported on this platform 03:50:32 executing program 5: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c025", 0x6, 0x480}, {0x0, 0xeffd, 0x1000}], 0x0, &(0x7f0000000040)) 03:50:32 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000c80)=@raw={'raw\x00', 0x3c1, 0x3, 0x308, 0x0, 0x150, 0x150, 0x0, 0x3, 0x238, 0x238, 0x238, 0x238, 0x238, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x3], 0x0, 0x128, 0x150, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'dummy0\x00', {0x0, 0x0, 0x3, 0x0, 0x0, 0xfffd, 0x7}}}, @common=@ipv6header={{0x28, 'ipv6header\x00'}, {0x0, 0x81}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}, {{@uncond, 0x0, 0xa8, 0xe8}, @common=@inet=@LOG={0x40, 'LOG\x00', 0x0, {0x0, 0x0, "59e2b655a7928de9d18f6f4ce2fcb46e2fbbb084e62170a6b5ab23bc6a36"}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x368) 03:50:32 executing program 4: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf01000000390024", 0xf, 0x400}, {&(0x7f0000010100)="02000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000040)) 03:50:32 executing program 2 (fault-call:0 fault-nth:34): syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="10000300c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000040)) 03:50:32 executing program 3: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0xfeffffff00000000, 0x1000}], 0x0, &(0x7f0000000040)={[{@fault_injection={'fault_injection'}}, {@noacl='noacl'}]}) 03:50:32 executing program 0: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="10000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x2000, &(0x7f0000000040)) 03:50:32 executing program 5: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c025", 0x6, 0x480}, {0x0, 0xfdef, 0x1000}], 0x0, &(0x7f0000000040)) [ 785.278867] FAULT_INJECTION: forcing a failure. [ 785.278867] name failslab, interval 1, probability 0, space 0, times 0 [ 785.291623] CPU: 1 PID: 12548 Comm: syz-executor.2 Not tainted 4.19.163-syzkaller #0 [ 785.299527] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 785.308879] Call Trace: [ 785.311478] dump_stack+0x1fc/0x2fe [ 785.315116] should_fail.cold+0xa/0x14 [ 785.319013] ? setup_fault_attr+0x200/0x200 [ 785.323362] ? lock_acquire+0x170/0x3c0 03:50:32 executing program 5: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c025", 0x6, 0x480}, {0x0, 0x200000, 0x1000}], 0x0, &(0x7f0000000040)) [ 785.327348] __should_failslab+0x115/0x180 [ 785.331586] should_failslab+0x5/0xf [ 785.332454] erofs: read_super, device -> /dev/loop3 [ 785.335298] __kmalloc_track_caller+0x2a6/0x3c0 [ 785.344961] ? strndup_user+0x70/0x120 [ 785.348856] memdup_user+0x22/0xb0 [ 785.352405] strndup_user+0x70/0x120 [ 785.356123] ksys_mount+0x34/0x130 [ 785.359674] __x64_sys_mount+0xba/0x150 [ 785.363654] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 785.368240] do_syscall_64+0xf9/0x620 [ 785.372050] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 785.377239] RIP: 0033:0x460b9a [ 785.380432] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 ad 89 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 8a 89 fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 785.385942] erofs: options -> fault_injection=0x0000000000000000,noacl, [ 785.399330] RSP: 002b:00007f4258f54a78 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 785.399343] RAX: ffffffffffffffda RBX: 00007f4258f54b10 RCX: 0000000000460b9a [ 785.399350] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007f4258f54ad0 03:50:32 executing program 5: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c025", 0x6, 0x480}, {0x0, 0x1000000, 0x1000}], 0x0, &(0x7f0000000040)) 03:50:32 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000c80)=@raw={'raw\x00', 0x3c1, 0x3, 0x308, 0x0, 0x150, 0x150, 0x0, 0x3, 0x238, 0x238, 0x238, 0x238, 0x238, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x3], 0x0, 0x128, 0x150, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'dummy0\x00', {0x0, 0x0, 0x3, 0x0, 0x0, 0xfffd, 0x7}}}, @common=@ipv6header={{0x28, 'ipv6header\x00'}, {0x0, 0x81}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}, {{@uncond, 0x0, 0xa8, 0xe8}, @common=@inet=@LOG={0x40, 'LOG\x00', 0x0, {0x0, 0x0, "59e2b655a7928de9d18f6f4ce2fcb46e2fbbb084e62170a6b5ab23bc6a36"}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x368) [ 785.399358] RBP: 00007f4258f54ad0 R08: 00007f4258f54b10 R09: 0000000020000000 [ 785.399364] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000020000000 [ 785.399371] R13: 0000000020000100 R14: 0000000020000200 R15: 0000000020000040 03:50:33 executing program 2 (fault-call:0 fault-nth:35): syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="10000300c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000040)) [ 785.479210] erofs: cannot read erofs superblock 03:50:33 executing program 0: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="10000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0xeffd, &(0x7f0000000040)) 03:50:33 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000c80)=@raw={'raw\x00', 0x3c1, 0x3, 0x308, 0x0, 0x150, 0x150, 0x0, 0x3, 0x238, 0x238, 0x238, 0x238, 0x238, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x3], 0x0, 0x128, 0x150, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'dummy0\x00', {0x0, 0x0, 0x3, 0x0, 0x0, 0xfffd, 0x7}}}, @common=@ipv6header={{0x28, 'ipv6header\x00'}, {0x0, 0x81}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}, {{@uncond, 0x0, 0xa8, 0xe8}, @common=@inet=@LOG={0x40, 'LOG\x00', 0x0, {0x0, 0x0, "59e2b655a7928de9d18f6f4ce2fcb46e2fbbb084e62170a6b5ab23bc6a36"}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x368) [ 785.517172] erofs: read_super, device -> /dev/loop4 [ 785.526178] erofs: options -> [ 785.535952] erofs: blksize 33554432 isn't supported on this platform 03:50:33 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000c80)=@raw={'raw\x00', 0x3c1, 0x3, 0x308, 0x0, 0x150, 0x150, 0x0, 0x3, 0x238, 0x238, 0x238, 0x238, 0x238, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x3], 0x0, 0x128, 0x150, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'dummy0\x00', {0x0, 0x0, 0x3, 0x0, 0x0, 0xfffd, 0x7}}}, @common=@ipv6header={{0x28, 'ipv6header\x00'}, {0x0, 0x81}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}, {{@uncond, 0x0, 0xa8, 0xe8}, @common=@inet=@LOG={0x40, 'LOG\x00', 0x0, {0x0, 0x0, "59e2b655a7928de9d18f6f4ce2fcb46e2fbbb084e62170a6b5ab23bc6a36"}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x368) [ 785.594163] FAULT_INJECTION: forcing a failure. [ 785.594163] name failslab, interval 1, probability 0, space 0, times 0 [ 785.608422] CPU: 1 PID: 12585 Comm: syz-executor.2 Not tainted 4.19.163-syzkaller #0 [ 785.616329] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 785.625681] Call Trace: [ 785.628278] dump_stack+0x1fc/0x2fe [ 785.631919] should_fail.cold+0xa/0x14 [ 785.635815] ? setup_fault_attr+0x200/0x200 [ 785.640139] ? lock_acquire+0x170/0x3c0 [ 785.644125] __should_failslab+0x115/0x180 [ 785.648367] should_failslab+0x5/0xf [ 785.652073] kmem_cache_alloc_trace+0x284/0x380 [ 785.656722] ? _copy_from_user+0xd2/0x130 [ 785.660861] copy_mount_options+0x59/0x380 [ 785.665082] ksys_mount+0x9b/0x130 [ 785.668624] __x64_sys_mount+0xba/0x150 [ 785.672599] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 785.677181] do_syscall_64+0xf9/0x620 [ 785.680975] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 785.686147] RIP: 0033:0x460b9a [ 785.689335] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 ad 89 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 8a 89 fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 785.708235] RSP: 002b:00007f4258f54a78 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 785.715933] RAX: ffffffffffffffda RBX: 00007f4258f54b10 RCX: 0000000000460b9a [ 785.723238] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007f4258f54ad0 [ 785.730496] RBP: 00007f4258f54ad0 R08: 00007f4258f54b10 R09: 0000000020000000 [ 785.737756] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000020000000 [ 785.745008] R13: 0000000020000100 R14: 0000000020000200 R15: 0000000020000040 [ 785.881701] erofs: read_super, device -> /dev/loop4 [ 785.890174] erofs: options -> [ 785.898074] erofs: blksize 33554432 isn't supported on this platform 03:50:33 executing program 4: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf01000003c20024", 0xf, 0x400}, {&(0x7f0000010100)="02000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000040)) 03:50:33 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000c80)=@raw={'raw\x00', 0x3c1, 0x3, 0x308, 0x0, 0x150, 0x150, 0x0, 0x3, 0x238, 0x238, 0x238, 0x238, 0x238, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x3], 0x0, 0x128, 0x150, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'dummy0\x00', {0x0, 0x0, 0x3, 0x0, 0x0, 0xfffd, 0x7}}}, @common=@ipv6header={{0x28, 'ipv6header\x00'}, {0x0, 0x81}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}, {{@uncond, 0x0, 0xa8, 0xe8}, @common=@inet=@LOG={0x40, 'LOG\x00', 0x0, {0x0, 0x0, "59e2b655a7928de9d18f6f4ce2fcb46e2fbbb084e62170a6b5ab23bc6a36"}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x368) 03:50:33 executing program 5: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c025", 0x6, 0x480}, {0x0, 0x2000000, 0x1000}], 0x0, &(0x7f0000000040)) 03:50:33 executing program 3: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0xff0f000000000000, 0x1000}], 0x0, &(0x7f0000000040)={[{@fault_injection={'fault_injection'}}, {@noacl='noacl'}]}) 03:50:33 executing program 2 (fault-call:0 fault-nth:36): syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="10000300c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000040)) 03:50:33 executing program 0: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="10000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0xfdef, &(0x7f0000000040)) [ 786.030215] erofs: read_super, device -> /dev/loop4 [ 786.045578] FAULT_INJECTION: forcing a failure. [ 786.045578] name failslab, interval 1, probability 0, space 0, times 0 [ 786.047534] erofs: options -> 03:50:33 executing program 5: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c025", 0x6, 0x480}, {0x0, 0x3000000, 0x1000}], 0x0, &(0x7f0000000040)) [ 786.077447] CPU: 0 PID: 12619 Comm: syz-executor.2 Not tainted 4.19.163-syzkaller #0 [ 786.085361] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 786.090750] erofs: blksize 4 isn't supported on this platform [ 786.094741] Call Trace: [ 786.094764] dump_stack+0x1fc/0x2fe [ 786.094784] should_fail.cold+0xa/0x14 [ 786.110720] ? setup_fault_attr+0x200/0x200 [ 786.115051] ? lock_acquire+0x170/0x3c0 [ 786.119042] __should_failslab+0x115/0x180 [ 786.123288] should_failslab+0x5/0xf 03:50:33 executing program 5: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c025", 0x6, 0x480}, {0x0, 0x4000000, 0x1000}], 0x0, &(0x7f0000000040)) [ 786.127007] kmem_cache_alloc+0x277/0x370 [ 786.131173] getname_flags+0xce/0x590 [ 786.134988] user_path_at_empty+0x2a/0x50 [ 786.139157] do_mount+0x147/0x2f10 [ 786.142713] ? setup_fault_attr+0x200/0x200 [ 786.147037] ? lock_acquire+0x170/0x3c0 [ 786.151014] ? check_preemption_disabled+0x41/0x280 [ 786.156036] ? copy_mount_string+0x40/0x40 [ 786.160274] ? copy_mount_options+0x59/0x380 [ 786.164689] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 786.169709] ? kmem_cache_alloc_trace+0x323/0x380 [ 786.174573] ? copy_mount_options+0x26f/0x380 03:50:33 executing program 5: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c025", 0x6, 0x480}, {0x0, 0x7000000, 0x1000}], 0x0, &(0x7f0000000040)) 03:50:33 executing program 5: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c025", 0x6, 0x480}, {0x0, 0xeffdffff, 0x1000}], 0x0, &(0x7f0000000040)) [ 786.179084] ksys_mount+0xcf/0x130 [ 786.182632] __x64_sys_mount+0xba/0x150 [ 786.186612] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 786.191205] do_syscall_64+0xf9/0x620 [ 786.195015] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 786.200206] RIP: 0033:0x460b9a [ 786.203403] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 ad 89 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 8a 89 fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 786.222307] RSP: 002b:00007f4258f54a78 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 03:50:33 executing program 5: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c025", 0x6, 0x480}, {0x0, 0xf6ffffff, 0x1000}], 0x0, &(0x7f0000000040)) 03:50:33 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000c80)=@raw={'raw\x00', 0x3c1, 0x3, 0x308, 0x0, 0x150, 0x150, 0x0, 0x3, 0x238, 0x238, 0x238, 0x238, 0x238, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x3], 0x0, 0x128, 0x150, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'dummy0\x00', {0x0, 0x0, 0x3, 0x0, 0x0, 0xfffd, 0x7}}}, @common=@ipv6header={{0x28, 'ipv6header\x00'}, {0x0, 0x81}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}, {{@uncond, 0x0, 0xa8, 0xe8}, @common=@inet=@LOG={0x40, 'LOG\x00', 0x0, {0x0, 0x0, "59e2b655a7928de9d18f6f4ce2fcb46e2fbbb084e62170a6b5ab23bc6a36"}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x368) [ 786.230019] RAX: ffffffffffffffda RBX: 00007f4258f54b10 RCX: 0000000000460b9a [ 786.237291] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007f4258f54ad0 [ 786.244561] RBP: 00007f4258f54ad0 R08: 00007f4258f54b10 R09: 0000000020000000 [ 786.251831] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000020000000 [ 786.259104] R13: 0000000020000100 R14: 0000000020000200 R15: 0000000020000040 [ 786.291179] erofs: read_super, device -> /dev/loop3 [ 786.296619] erofs: options -> fault_injection=0x0000000000000000,noacl, [ 786.312022] erofs: cannot read erofs superblock [ 786.413591] erofs: read_super, device -> /dev/loop3 [ 786.422076] erofs: options -> fault_injection=0x0000000000000000,noacl, [ 786.430074] erofs: cannot read erofs superblock [ 786.435483] erofs: read_super, device -> /dev/loop4 [ 786.467577] erofs: options -> [ 786.470839] erofs: blksize 4 isn't supported on this platform 03:50:34 executing program 4: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf017ffffffe0024", 0xf, 0x400}, {&(0x7f0000010100)="02000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000040)) 03:50:34 executing program 5: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c025", 0x6, 0x480}, {0x0, 0xfcfdffff, 0x1000}], 0x0, &(0x7f0000000040)) 03:50:34 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000c80)=@raw={'raw\x00', 0x3c1, 0x3, 0x308, 0x0, 0x150, 0x150, 0x0, 0x3, 0x238, 0x238, 0x238, 0x238, 0x238, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x3], 0x0, 0x128, 0x150, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'dummy0\x00', {0x0, 0x0, 0x3, 0x0, 0x0, 0xfffd, 0x7}}}, @common=@ipv6header={{0x28, 'ipv6header\x00'}, {0x0, 0x81}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}, {{@uncond, 0x0, 0xa8, 0xe8}, @common=@inet=@LOG={0x40, 'LOG\x00', 0x0, {0x0, 0x0, "59e2b655a7928de9d18f6f4ce2fcb46e2fbbb084e62170a6b5ab23bc6a36"}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x368) 03:50:34 executing program 2 (fault-call:0 fault-nth:37): syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="10000300c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000040)) 03:50:34 executing program 0: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="10000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x200000, &(0x7f0000000040)) 03:50:34 executing program 3: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0xffff1f0000000000, 0x1000}], 0x0, &(0x7f0000000040)={[{@fault_injection={'fault_injection'}}, {@noacl='noacl'}]}) 03:50:34 executing program 5: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c025", 0x6, 0x480}, {0x0, 0xfeffffff, 0x1000}], 0x0, &(0x7f0000000040)) 03:50:34 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000c80)=@raw={'raw\x00', 0x3c1, 0x3, 0x308, 0x0, 0x150, 0x150, 0x0, 0x3, 0x238, 0x238, 0x238, 0x238, 0x238, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x3], 0x0, 0x128, 0x150, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'dummy0\x00', {0x0, 0x0, 0x3, 0x0, 0x0, 0xfffd, 0x7}}}, @common=@ipv6header={{0x28, 'ipv6header\x00'}, {0x0, 0x81}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}, {{@uncond, 0x0, 0xa8, 0xe8}, @common=@inet=@LOG={0x40, 'LOG\x00', 0x0, {0x0, 0x0, "59e2b655a7928de9d18f6f4ce2fcb46e2fbbb084e62170a6b5ab23bc6a36"}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x368) 03:50:34 executing program 5: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c025", 0x6, 0x480}, {0x0, 0xfffffdef, 0x1000}], 0x0, &(0x7f0000000040)) [ 786.728634] FAULT_INJECTION: forcing a failure. [ 786.728634] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 786.740467] CPU: 1 PID: 12674 Comm: syz-executor.2 Not tainted 4.19.163-syzkaller #0 [ 786.748355] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 786.757707] Call Trace: [ 786.760160] erofs: read_super, device -> /dev/loop3 [ 786.760303] dump_stack+0x1fc/0x2fe [ 786.768938] should_fail.cold+0xa/0x14 03:50:34 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000c80)=@raw={'raw\x00', 0x3c1, 0x3, 0x308, 0x0, 0x150, 0x150, 0x0, 0x3, 0x238, 0x238, 0x238, 0x238, 0x238, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x3], 0x0, 0x128, 0x150, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'dummy0\x00', {0x0, 0x0, 0x3, 0x0, 0x0, 0xfffd, 0x7}}}, @common=@ipv6header={{0x28, 'ipv6header\x00'}, {0x0, 0x81}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}, {{@uncond, 0x0, 0xa8, 0xe8}, @common=@inet=@LOG={0x40, 'LOG\x00', 0x0, {0x0, 0x0, "59e2b655a7928de9d18f6f4ce2fcb46e2fbbb084e62170a6b5ab23bc6a36"}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x368) [ 786.770398] erofs: options -> fault_injection=0x0000000000000000,noacl, [ 786.772837] ? setup_fault_attr+0x200/0x200 [ 786.772852] ? is_bpf_text_address+0xfc/0x1b0 [ 786.772870] ? kernel_text_address+0xbd/0xf0 [ 786.772885] ? __kernel_text_address+0x9/0x30 [ 786.772906] __alloc_pages_nodemask+0x239/0x2890 [ 786.802053] ? __lock_acquire+0x6de/0x3ff0 [ 786.806303] ? __x64_sys_mount+0xba/0x150 [ 786.810462] ? gfp_pfmemalloc_allowed+0x150/0x150 [ 786.815310] ? ext4_mkdir+0x82b/0xe10 [ 786.819121] ? mark_held_locks+0xf0/0xf0 [ 786.823190] ? mark_held_locks+0xf0/0xf0 03:50:34 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000c80)=@raw={'raw\x00', 0x3c1, 0x3, 0x308, 0x0, 0x150, 0x150, 0x0, 0x3, 0x238, 0x238, 0x238, 0x238, 0x238, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x3], 0x0, 0x128, 0x150, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'dummy0\x00', {0x0, 0x0, 0x3, 0x0, 0x0, 0xfffd, 0x7}}}, @common=@ipv6header={{0x28, 'ipv6header\x00'}, {0x0, 0x81}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}, {{@uncond, 0x0, 0xa8, 0xe8}, @common=@inet=@LOG={0x40, 'LOG\x00', 0x0, {0x0, 0x0, "59e2b655a7928de9d18f6f4ce2fcb46e2fbbb084e62170a6b5ab23bc6a36"}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x368) [ 786.827267] ? list_lru_add+0x292/0x600 [ 786.827860] erofs: cannot read erofs superblock [ 786.831247] ? mntput_no_expire+0xf2/0xa30 [ 786.840129] cache_grow_begin+0xa4/0x8a0 [ 786.844197] ? setup_fault_attr+0x200/0x200 [ 786.848525] ? lock_acquire+0x170/0x3c0 [ 786.852508] cache_alloc_refill+0x273/0x340 [ 786.856839] kmem_cache_alloc_trace+0x354/0x380 [ 786.861521] copy_mount_options+0x59/0x380 [ 786.865767] ksys_mount+0x9b/0x130 [ 786.869313] __x64_sys_mount+0xba/0x150 [ 786.873297] ? lockdep_hardirqs_on+0x3a8/0x5c0 03:50:34 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000c80)=@raw={'raw\x00', 0x3c1, 0x3, 0x308, 0x0, 0x150, 0x150, 0x0, 0x3, 0x238, 0x238, 0x238, 0x238, 0x238, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x3], 0x0, 0x128, 0x150, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'dummy0\x00', {0x0, 0x0, 0x3, 0x0, 0x0, 0xfffd, 0x7}}}, @common=@ipv6header={{0x28, 'ipv6header\x00'}, {0x0, 0x81}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}, {{@uncond, 0x0, 0xa8, 0xe8}, @common=@inet=@LOG={0x40, 'LOG\x00', 0x0, {0x0, 0x0, "59e2b655a7928de9d18f6f4ce2fcb46e2fbbb084e62170a6b5ab23bc6a36"}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x368) [ 786.877887] do_syscall_64+0xf9/0x620 [ 786.881697] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 786.886890] RIP: 0033:0x460b9a [ 786.890082] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 ad 89 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 8a 89 fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 786.908985] RSP: 002b:00007f4258f54a78 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 786.916695] RAX: ffffffffffffffda RBX: 00007f4258f54b10 RCX: 0000000000460b9a [ 786.923971] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007f4258f54ad0 [ 786.931245] RBP: 00007f4258f54ad0 R08: 00007f4258f54b10 R09: 0000000020000000 [ 786.938516] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000020000000 [ 786.945785] R13: 0000000020000100 R14: 0000000020000200 R15: 0000000020000040 [ 786.976913] erofs: read_super, device -> /dev/loop0 [ 786.981984] erofs: options -> [ 786.985387] erofs: root inode @ nid 36 [ 786.995198] erofs: mounted on /dev/loop0 with opts: . [ 787.003287] erofs: read_super, device -> /dev/loop2 [ 787.022006] erofs: options -> [ 787.027173] erofs: read_super, device -> /dev/loop4 [ 787.032206] erofs: options -> [ 787.036434] erofs: read_super, device -> /dev/loop3 [ 787.052599] erofs: options -> fault_injection=0x0000000000000000,noacl, [ 787.071116] erofs: root inode @ nid 36 03:50:34 executing program 4: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010002000c0024", 0xf, 0x400}, {&(0x7f0000010100)="02000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000040)) 03:50:34 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000c80)=@raw={'raw\x00', 0x3c1, 0x3, 0x308, 0x0, 0x150, 0x150, 0x0, 0x3, 0x238, 0x238, 0x238, 0x238, 0x238, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x3], 0x0, 0x128, 0x150, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'dummy0\x00', {0x0, 0x0, 0x3, 0x0, 0x0, 0xfffd, 0x7}}}, @common=@ipv6header={{0x28, 'ipv6header\x00'}, {0x0, 0x81}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}, {{@uncond, 0x0, 0xa8, 0xe8}, @common=@inet=@LOG={0x40, 'LOG\x00', 0x0, {0x0, 0x0, "59e2b655a7928de9d18f6f4ce2fcb46e2fbbb084e62170a6b5ab23bc6a36"}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x368) 03:50:34 executing program 5: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c025", 0x6, 0x480}, {0x0, 0xfffffdfc, 0x1000}], 0x0, &(0x7f0000000040)) 03:50:34 executing program 2 (fault-call:0 fault-nth:38): syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="10000300c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000040)) 03:50:34 executing program 0: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="10000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x1000000, &(0x7f0000000040)) 03:50:34 executing program 3: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0xffffff7f00000000, 0x1000}], 0x0, &(0x7f0000000040)={[{@fault_injection={'fault_injection'}}, {@noacl='noacl'}]}) [ 787.075151] erofs: blksize 1073741824 isn't supported on this platform [ 787.089093] erofs: cannot read erofs superblock [ 787.095217] erofs: mounted on /dev/loop2 with opts: . [ 787.096394] erofs: unmounted for /dev/loop0 03:50:34 executing program 5: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c025", 0x6, 0x480}, {0x0, 0xfffffff6, 0x1000}], 0x0, &(0x7f0000000040)) [ 787.157857] erofs: unmounted for /dev/loop2 03:50:34 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000c80)=@raw={'raw\x00', 0x3c1, 0x3, 0x308, 0x0, 0x150, 0x150, 0x0, 0x3, 0x238, 0x238, 0x238, 0x238, 0x238, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xca, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x3], 0x0, 0x128, 0x150, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'dummy0\x00', {0x0, 0x0, 0x3, 0x0, 0x0, 0xfffd, 0x7}}}, @common=@ipv6header={{0x28, 'ipv6header\x00'}, {0x0, 0x81}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}, {{@uncond, 0x0, 0xa8, 0xe8}, @common=@inet=@LOG={0x40, 'LOG\x00', 0x0, {0x0, 0x0, "59e2b655a7928de9d18f6f4ce2fcb46e2fbbb084e62170a6b5ab23bc6a36"}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x368) 03:50:34 executing program 5: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c025", 0x6, 0x480}, {0x0, 0xfffffffe, 0x1000}], 0x0, &(0x7f0000000040)) [ 787.237116] erofs: read_super, device -> /dev/loop0 [ 787.260687] erofs: options -> [ 787.274100] erofs: root inode @ nid 36 [ 787.281791] erofs: read_super, device -> /dev/loop3 [ 787.306811] erofs: options -> fault_injection=0x0000000000000000,noacl, [ 787.306856] erofs: cannot read erofs superblock [ 787.322218] erofs: mounted on /dev/loop0 with opts: . 03:50:34 executing program 3: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0xffffffff00000000, 0x1000}], 0x0, &(0x7f0000000040)={[{@fault_injection={'fault_injection'}}, {@noacl='noacl'}]}) [ 787.351454] FAULT_INJECTION: forcing a failure. [ 787.351454] name failslab, interval 1, probability 0, space 0, times 0 03:50:34 executing program 0: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="10000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x2000000, &(0x7f0000000040)) 03:50:34 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000c80)=@raw={'raw\x00', 0x3c1, 0x3, 0x308, 0x0, 0x150, 0x150, 0x0, 0x3, 0x238, 0x238, 0x238, 0x238, 0x238, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x3], 0x0, 0x128, 0x150, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'dummy0\x00', {0x0, 0x0, 0x3, 0x0, 0x0, 0xfffd, 0x7}}}, @common=@ipv6header={{0x28, 'ipv6header\x00'}, {0x0, 0x81}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}, {{@uncond, 0x0, 0xa8, 0xe8}, @common=@inet=@LOG={0x40, 'LOG\x00', 0x0, {0x0, 0x0, "59e2b655a7928de9d18f6f4ce2fcb46e2fbbb084e62170a6b5ab23bc6a36"}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x368) [ 787.397295] erofs: read_super, device -> /dev/loop4 [ 787.408474] erofs: unmounted for /dev/loop0 [ 787.409652] erofs: options -> [ 787.421553] CPU: 0 PID: 12745 Comm: syz-executor.2 Not tainted 4.19.163-syzkaller #0 [ 787.429450] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 787.438804] Call Trace: [ 787.441399] dump_stack+0x1fc/0x2fe [ 787.445082] should_fail.cold+0xa/0x14 [ 787.448980] ? setup_fault_attr+0x200/0x200 [ 787.453308] ? lock_acquire+0x170/0x3c0 [ 787.457297] __should_failslab+0x115/0x180 [ 787.457615] erofs: root inode @ nid 36 [ 787.461534] should_failslab+0x5/0xf [ 787.461548] kmem_cache_alloc+0x277/0x370 [ 787.461568] alloc_vfsmnt+0x23/0x780 [ 787.465753] erofs: mounted on /dev/loop4 with opts: . [ 787.469183] ? _raw_read_unlock+0x29/0x40 [ 787.469201] vfs_kern_mount.part.0+0x27/0x470 [ 787.469219] do_mount+0x113c/0x2f10 [ 787.469235] ? lock_acquire+0x170/0x3c0 [ 787.469248] ? check_preemption_disabled+0x41/0x280 [ 787.469261] ? copy_mount_string+0x40/0x40 [ 787.469277] ? copy_mount_options+0x59/0x380 [ 787.512423] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 787.517429] ? kmem_cache_alloc_trace+0x323/0x380 [ 787.522262] ? copy_mount_options+0x26f/0x380 [ 787.526783] ksys_mount+0xcf/0x130 [ 787.530309] __x64_sys_mount+0xba/0x150 [ 787.534337] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 787.538911] do_syscall_64+0xf9/0x620 [ 787.542696] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 787.547868] RIP: 0033:0x460b9a [ 787.551042] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 ad 89 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 8a 89 fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 787.569962] RSP: 002b:00007f4258f54a78 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 787.577699] RAX: ffffffffffffffda RBX: 00007f4258f54b10 RCX: 0000000000460b9a [ 787.584981] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007f4258f54ad0 [ 787.592242] RBP: 00007f4258f54ad0 R08: 00007f4258f54b10 R09: 0000000020000000 [ 787.599494] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000020000000 [ 787.606791] R13: 0000000020000100 R14: 0000000020000200 R15: 0000000020000040 [ 787.654038] erofs: read_super, device -> /dev/loop0 [ 787.659486] erofs: options -> [ 787.663477] erofs: root inode @ nid 36 [ 787.669107] erofs: mounted on /dev/loop0 with opts: . [ 787.679557] erofs: read_super, device -> /dev/loop3 [ 787.689089] erofs: options -> fault_injection=0x0000000000000000,noacl, 03:50:35 executing program 4: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010003000c0024", 0xf, 0x400}, {&(0x7f0000010100)="02000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000040)) 03:50:35 executing program 5: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c025", 0x6, 0x480}, {0x0, 0x7ffffffff000, 0x1000}], 0x0, &(0x7f0000000040)) 03:50:35 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000c80)=@raw={'raw\x00', 0x3c1, 0x3, 0x308, 0x0, 0x150, 0x150, 0x0, 0x3, 0x238, 0x238, 0x238, 0x238, 0x238, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x3], 0x0, 0x128, 0x150, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'dummy0\x00', {0x0, 0x0, 0x3, 0x0, 0x0, 0xfffd, 0x7}}}, @common=@ipv6header={{0x28, 'ipv6header\x00'}, {0x0, 0x81}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}, {{@uncond, 0x0, 0xa8, 0xe8}, @common=@inet=@LOG={0x40, 'LOG\x00', 0x0, {0x0, 0x0, "59e2b655a7928de9d18f6f4ce2fcb46e2fbbb084e62170a6b5ab23bc6a36"}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x368) 03:50:35 executing program 2 (fault-call:0 fault-nth:39): syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="10000300c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000040)) 03:50:35 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000c80)=@raw={'raw\x00', 0x3c1, 0x3, 0x308, 0x0, 0x150, 0x150, 0x0, 0x3, 0x238, 0x238, 0x238, 0x238, 0x238, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x3], 0x0, 0x128, 0x150, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'dummy0\x00', {0x0, 0x0, 0x3, 0x0, 0x0, 0xfffd, 0x7}}}, @common=@ipv6header={{0x28, 'ipv6header\x00'}, {0x0, 0x81}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}, {{@uncond, 0x0, 0xa8, 0xe8}, @common=@inet=@LOG={0x40, 'LOG\x00', 0x0, {0x0, 0x0, "59e2b655a7928de9d18f6f4ce2fcb46e2fbbb084e62170a6b5ab23bc6a36"}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x368) [ 787.703707] erofs: cannot read erofs superblock [ 787.711850] erofs: unmounted for /dev/loop4 03:50:35 executing program 5: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c025", 0x6, 0x480}, {0x0, 0x1000000000000, 0x1000}], 0x0, &(0x7f0000000040)) [ 787.793832] FAULT_INJECTION: forcing a failure. [ 787.793832] name failslab, interval 1, probability 0, space 0, times 0 [ 787.813265] CPU: 0 PID: 12781 Comm: syz-executor.2 Not tainted 4.19.163-syzkaller #0 [ 787.821174] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 787.830528] Call Trace: [ 787.833129] dump_stack+0x1fc/0x2fe [ 787.836775] should_fail.cold+0xa/0x14 03:50:35 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000c80)=@raw={'raw\x00', 0x3c1, 0x3, 0x308, 0x0, 0x150, 0x150, 0x0, 0x3, 0x238, 0x238, 0x238, 0x238, 0x238, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x3], 0x0, 0x128, 0x150, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'dummy0\x00', {0x0, 0x0, 0x3, 0x0, 0x0, 0xfffd, 0x7}}}, @common=@ipv6header={{0x28, 'ipv6header\x00'}, {0x0, 0x81}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}, {{@uncond, 0x0, 0xa8, 0xe8}, @common=@inet=@LOG={0x40, 'LOG\x00', 0x0, {0x0, 0x0, "59e2b655a7928de9d18f6f4ce2fcb46e2fbbb084e62170a6b5ab23bc6a36"}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x368) [ 787.840671] ? setup_fault_attr+0x200/0x200 [ 787.845000] ? lock_acquire+0x170/0x3c0 [ 787.848991] __should_failslab+0x115/0x180 [ 787.853238] should_failslab+0x5/0xf [ 787.856958] kmem_cache_alloc+0x277/0x370 [ 787.861118] getname_kernel+0x4e/0x370 [ 787.865017] kern_path+0x1b/0x40 [ 787.868393] lookup_bdev+0xfc/0x220 [ 787.872028] ? bd_acquire+0x440/0x440 [ 787.875843] blkdev_get_by_path+0x1b/0xd0 [ 787.880004] mount_bdev+0x5b/0x3b0 [ 787.883552] ? init_once+0x13/0x13 [ 787.887104] erofs_mount+0x8c/0xc0 [ 787.890656] ? erofs_kill_sb+0x20/0x20 [ 787.894557] ? alloc_pages_current+0x19b/0x2a0 [ 787.899143] ? __lockdep_init_map+0x100/0x5a0 [ 787.903650] mount_fs+0xa3/0x30c [ 787.907028] vfs_kern_mount.part.0+0x68/0x470 [ 787.911538] do_mount+0x113c/0x2f10 [ 787.915174] ? lock_acquire+0x170/0x3c0 [ 787.919156] ? check_preemption_disabled+0x41/0x280 [ 787.924180] ? copy_mount_string+0x40/0x40 [ 787.928424] ? copy_mount_options+0x59/0x380 [ 787.932841] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 787.937876] ? kmem_cache_alloc_trace+0x323/0x380 [ 787.942735] ? copy_mount_options+0x26f/0x380 [ 787.947241] ksys_mount+0xcf/0x130 [ 787.950795] __x64_sys_mount+0xba/0x150 [ 787.954776] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 787.959366] do_syscall_64+0xf9/0x620 [ 787.963183] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 787.968376] RIP: 0033:0x460b9a [ 787.971578] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 ad 89 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 8a 89 fb ff c3 66 0f 1f 84 00 00 00 00 00 03:50:35 executing program 5: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c025", 0x6, 0x480}, {0x0, 0x7ffffffffffff, 0x1000}], 0x0, &(0x7f0000000040)) 03:50:35 executing program 5: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c025", 0x6, 0x480}, {0x0, 0x20000000000000, 0x1000}], 0x0, &(0x7f0000000040)) [ 787.990480] RSP: 002b:00007f4258f54a78 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 787.998314] RAX: ffffffffffffffda RBX: 00007f4258f54b10 RCX: 0000000000460b9a [ 788.005596] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007f4258f54ad0 [ 788.012870] RBP: 00007f4258f54ad0 R08: 00007f4258f54b10 R09: 0000000020000000 [ 788.020140] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000020000000 [ 788.027413] R13: 0000000020000100 R14: 0000000020000200 R15: 0000000020000040 03:50:35 executing program 3: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0xffffffffffffffff, 0x1000}], 0x0, &(0x7f0000000040)={[{@fault_injection={'fault_injection'}}, {@noacl='noacl'}]}) [ 788.064633] erofs: read_super, device -> /dev/loop4 [ 788.069896] erofs: options -> [ 788.073322] erofs: root inode @ nid 36 [ 788.077510] erofs: mounted on /dev/loop4 with opts: . 03:50:35 executing program 0: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="10000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x3000000, &(0x7f0000000040)) 03:50:35 executing program 4: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010004000c0024", 0xf, 0x400}, {&(0x7f0000010100)="02000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000040)) 03:50:35 executing program 5: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c025", 0x6, 0x480}, {0x0, 0xf0ffffff7f0000, 0x1000}], 0x0, &(0x7f0000000040)) [ 788.115271] erofs: unmounted for /dev/loop4 [ 788.126214] erofs: unmounted for /dev/loop0 03:50:35 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000c80)=@raw={'raw\x00', 0x3c1, 0x3, 0x308, 0x0, 0x150, 0x150, 0x0, 0x3, 0x238, 0x238, 0x238, 0x238, 0x238, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x3], 0x0, 0x128, 0x150, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'dummy0\x00', {0x0, 0x0, 0x3, 0x0, 0x0, 0xfffd, 0x7}}}, @common=@ipv6header={{0x28, 'ipv6header\x00'}, {0x0, 0x81}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}, {{@uncond, 0x0, 0xa8, 0xe8}, @common=@inet=@LOG={0x40, 'LOG\x00', 0x0, {0x0, 0x0, "59e2b655a7928de9d18f6f4ce2fcb46e2fbbb084e62170a6b5ab23bc6a36"}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x368) 03:50:35 executing program 2 (fault-call:0 fault-nth:40): syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="10000300c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000040)) 03:50:35 executing program 5: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c025", 0x6, 0x480}, {0x0, 0x100000000000000, 0x1000}], 0x0, &(0x7f0000000040)) 03:50:35 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000c80)=@raw={'raw\x00', 0x3c1, 0x3, 0x308, 0x0, 0x150, 0x150, 0x0, 0x3, 0x238, 0x238, 0x238, 0x238, 0x238, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x3], 0x0, 0x128, 0x150, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'dummy0\x00', {0x0, 0x0, 0x3, 0x0, 0x0, 0xfffd, 0x7}}}, @common=@ipv6header={{0x28, 'ipv6header\x00'}, {0x0, 0x81}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}, {{@uncond, 0x0, 0xa8, 0xe8}, @common=@inet=@LOG={0x40, 'LOG\x00', 0x0, {0x0, 0x0, "59e2b655a7928de9d18f6f4ce2fcb46e2fbbb084e62170a6b5ab23bc6a36"}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x368) 03:50:35 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000c80)=@raw={'raw\x00', 0x3c1, 0x3, 0x308, 0x0, 0x150, 0x150, 0x0, 0x3, 0x238, 0x238, 0x238, 0x238, 0x238, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x3], 0x0, 0x128, 0x150, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'dummy0\x00', {0x0, 0x0, 0x3, 0x0, 0x0, 0xfffd, 0x7}}}, @common=@ipv6header={{0x28, 'ipv6header\x00'}, {0x0, 0x81}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}, {{@uncond, 0x0, 0xa8, 0xe8}, @common=@inet=@LOG={0x40, 'LOG\x00', 0x0, {0x0, 0x0, "59e2b655a7928de9d18f6f4ce2fcb46e2fbbb084e62170a6b5ab23bc6a36"}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x368) 03:50:35 executing program 3: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x6}], 0x0, &(0x7f0000000040)={[{@fault_injection={'fault_injection'}}, {@noacl='noacl'}]}) 03:50:35 executing program 5: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c025", 0x6, 0x480}, {0x0, 0x200000000000000, 0x1000}], 0x0, &(0x7f0000000040)) [ 788.227733] erofs: read_super, device -> /dev/loop3 [ 788.236209] erofs: options -> fault_injection=0x0000000000000000,noacl, [ 788.248638] erofs: cannot read erofs superblock [ 788.308257] erofs: read_super, device -> /dev/loop4 [ 788.313302] erofs: options -> [ 788.316547] erofs: root inode @ nid 36 [ 788.324678] erofs: read_super, device -> /dev/loop3 [ 788.330311] erofs: options -> fault_injection=0x0000000000000000,noacl, [ 788.338990] erofs: cannot read erofs superblock [ 788.346411] erofs: read_super, device -> /dev/loop0 [ 788.353015] erofs: options -> [ 788.358972] erofs: root inode @ nid 36 [ 788.367402] FAULT_INJECTION: forcing a failure. [ 788.367402] name failslab, interval 1, probability 0, space 0, times 0 [ 788.371022] erofs: mounted on /dev/loop4 with opts: . [ 788.378827] erofs: mounted on /dev/loop0 with opts: . [ 788.389731] CPU: 0 PID: 12841 Comm: syz-executor.2 Not tainted 4.19.163-syzkaller #0 [ 788.397621] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 788.406974] Call Trace: [ 788.409571] dump_stack+0x1fc/0x2fe [ 788.413214] should_fail.cold+0xa/0x14 [ 788.417115] ? setup_fault_attr+0x200/0x200 [ 788.421444] ? lock_acquire+0x170/0x3c0 [ 788.425452] __should_failslab+0x115/0x180 [ 788.429695] should_failslab+0x5/0xf [ 788.433420] kmem_cache_alloc+0x277/0x370 [ 788.437577] getname_kernel+0x4e/0x370 [ 788.441477] kern_path+0x1b/0x40 [ 788.444852] lookup_bdev+0xfc/0x220 [ 788.448488] ? bd_acquire+0x440/0x440 [ 788.452299] blkdev_get_by_path+0x1b/0xd0 03:50:35 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000c80)=@raw={'raw\x00', 0x3c1, 0x3, 0x308, 0x0, 0x150, 0x150, 0x0, 0x3, 0x238, 0x238, 0x238, 0x238, 0x238, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x3], 0x0, 0x128, 0x150, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'dummy0\x00', {0x0, 0x0, 0x3, 0x0, 0x0, 0xfffd, 0x7}}}, @common=@ipv6header={{0x28, 'ipv6header\x00'}, {0x0, 0x81}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}, {{@uncond, 0x0, 0xa8, 0xe8}, @common=@inet=@LOG={0x40, 'LOG\x00', 0x0, {0x0, 0x0, "59e2b655a7928de9d18f6f4ce2fcb46e2fbbb084e62170a6b5ab23bc6a36"}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x368) 03:50:35 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000c80)=@raw={'raw\x00', 0x3c1, 0x3, 0x308, 0x0, 0x150, 0x150, 0x0, 0x3, 0x238, 0x238, 0x238, 0x238, 0x238, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x3], 0x0, 0x128, 0x150, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'dummy0\x00', {0x0, 0x0, 0x3, 0x0, 0x0, 0xfffd, 0x7}}}, @common=@ipv6header={{0x28, 'ipv6header\x00'}, {0x0, 0x81}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}, {{@uncond, 0x0, 0xa8, 0xe8}, @common=@inet=@LOG={0x40, 'LOG\x00', 0x0, {0x0, 0x0, "59e2b655a7928de9d18f6f4ce2fcb46e2fbbb084e62170a6b5ab23bc6a36"}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x368) [ 788.456459] mount_bdev+0x5b/0x3b0 [ 788.460003] ? init_once+0x13/0x13 [ 788.463551] erofs_mount+0x8c/0xc0 [ 788.467098] ? erofs_kill_sb+0x20/0x20 [ 788.470994] ? alloc_pages_current+0x19b/0x2a0 [ 788.475582] ? __lockdep_init_map+0x100/0x5a0 [ 788.480085] mount_fs+0xa3/0x30c [ 788.483465] vfs_kern_mount.part.0+0x68/0x470 [ 788.487973] do_mount+0x113c/0x2f10 [ 788.491604] ? lock_acquire+0x170/0x3c0 [ 788.495579] ? check_preemption_disabled+0x41/0x280 [ 788.500604] ? copy_mount_string+0x40/0x40 [ 788.504834] ? copy_mount_options+0x59/0x380 [ 788.509234] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 788.514234] ? kmem_cache_alloc_trace+0x323/0x380 [ 788.519085] ? copy_mount_options+0x26f/0x380 [ 788.523591] ksys_mount+0xcf/0x130 [ 788.527139] __x64_sys_mount+0xba/0x150 [ 788.531172] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 788.535737] do_syscall_64+0xf9/0x620 [ 788.539522] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 788.544692] RIP: 0033:0x460b9a [ 788.547866] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 ad 89 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 8a 89 fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 788.566749] RSP: 002b:00007f4258f54a78 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 788.574438] RAX: ffffffffffffffda RBX: 00007f4258f54b10 RCX: 0000000000460b9a [ 788.581689] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007f4258f54ad0 [ 788.588956] RBP: 00007f4258f54ad0 R08: 00007f4258f54b10 R09: 0000000020000000 [ 788.596386] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000020000000 [ 788.603727] R13: 0000000020000100 R14: 0000000020000200 R15: 0000000020000040 03:50:36 executing program 0: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="10000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x4000000, &(0x7f0000000040)) 03:50:36 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000c80)=@raw={'raw\x00', 0x3c1, 0x3, 0x308, 0x0, 0x150, 0x150, 0x0, 0x3, 0x238, 0x238, 0x238, 0x238, 0x238, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x3], 0x0, 0x128, 0x150, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'dummy0\x00', {0x0, 0x0, 0x3, 0x0, 0x0, 0xfffd, 0x7}}}, @common=@ipv6header={{0x28, 'ipv6header\x00'}, {0x0, 0x81}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}, {{@uncond, 0x0, 0xa8, 0xe8}, @common=@inet=@LOG={0x40, 'LOG\x00', 0x0, {0x0, 0x0, "59e2b655a7928de9d18f6f4ce2fcb46e2fbbb084e62170a6b5ab23bc6a36"}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x368) 03:50:36 executing program 5: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c025", 0x6, 0x480}, {0x0, 0x300000000000000, 0x1000}], 0x0, &(0x7f0000000040)) 03:50:36 executing program 2 (fault-call:0 fault-nth:41): syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="10000300c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000040)) 03:50:36 executing program 4: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010005000c0024", 0xf, 0x400}, {&(0x7f0000010100)="02000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000040)) [ 788.635041] erofs: read_super, device -> /dev/loop3 [ 788.645759] erofs: options -> fault_injection=0x0000000000000000,noacl, [ 788.660354] erofs: cannot read erofs superblock [ 788.678325] erofs: unmounted for /dev/loop0 03:50:36 executing program 5: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c025", 0x6, 0x480}, {0x0, 0x400000000000000, 0x1000}], 0x0, &(0x7f0000000040)) [ 788.687556] erofs: unmounted for /dev/loop4 03:50:36 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000c80)=@raw={'raw\x00', 0x3c1, 0x3, 0x308, 0x0, 0x150, 0x150, 0x0, 0x3, 0x238, 0x238, 0x238, 0x238, 0x238, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x3], 0x0, 0x128, 0x150, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'dummy0\x00', {0x0, 0x0, 0x3, 0x0, 0x0, 0xfffd, 0x7}}}, @common=@ipv6header={{0x28, 'ipv6header\x00'}, {0x0, 0x81}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}, {{@uncond, 0x0, 0xa8, 0xe8}, @common=@inet=@LOG={0x40, 'LOG\x00', 0x0, {0x0, 0x0, "59e2b655a7928de9d18f6f4ce2fcb46e2fbbb084e62170a6b5ab23bc6a36"}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x368) 03:50:36 executing program 5: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c025", 0x6, 0x480}, {0x0, 0x700000000000000, 0x1000}], 0x0, &(0x7f0000000040)) 03:50:36 executing program 3: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x8}], 0x0, &(0x7f0000000040)={[{@fault_injection={'fault_injection'}}, {@noacl='noacl'}]}) 03:50:36 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000c80)=@raw={'raw\x00', 0x3c1, 0x3, 0x308, 0x0, 0x150, 0x150, 0x0, 0x3, 0x238, 0x238, 0x238, 0x238, 0x238, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x3], 0x0, 0x128, 0x150, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'dummy0\x00', {0x0, 0x0, 0x3, 0x0, 0x0, 0xfffd, 0x7}}}, @common=@ipv6header={{0x28, 'ipv6header\x00'}, {0x0, 0x81}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}, {{@uncond, 0x0, 0xa8, 0xe8}, @common=@inet=@LOG={0x40, 'LOG\x00', 0x0, {0x0, 0x0, "59e2b655a7928de9d18f6f4ce2fcb46e2fbbb084e62170a6b5ab23bc6a36"}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x368) [ 788.815411] FAULT_INJECTION: forcing a failure. [ 788.815411] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 788.848344] erofs: read_super, device -> /dev/loop0 [ 788.853434] erofs: options -> 03:50:36 executing program 5: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c025", 0x6, 0x480}, {0x0, 0x8000000000000000, 0x1000}], 0x0, &(0x7f0000000040)) [ 788.876428] erofs: root inode @ nid 36 [ 788.882945] CPU: 1 PID: 12883 Comm: syz-executor.2 Not tainted 4.19.163-syzkaller #0 [ 788.890846] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 788.896344] erofs: mounted on /dev/loop0 with opts: . [ 788.900195] Call Trace: [ 788.900219] dump_stack+0x1fc/0x2fe [ 788.900240] should_fail.cold+0xa/0x14 [ 788.900253] ? lock_acquire+0x170/0x3c0 [ 788.900270] ? setup_fault_attr+0x200/0x200 03:50:36 executing program 5: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c025", 0x6, 0x480}, {0x0, 0xeffdffffffffffff, 0x1000}], 0x0, &(0x7f0000000040)) [ 788.900295] __alloc_pages_nodemask+0x239/0x2890 [ 788.900314] ? pcpu_alloc+0x91f/0x1190 [ 788.900329] ? mark_held_locks+0xf0/0xf0 [ 788.900342] ? pcpu_alloc+0xe78/0x1190 [ 788.900365] ? gfp_pfmemalloc_allowed+0x150/0x150 [ 788.900390] ? check_preemption_disabled+0x41/0x280 [ 788.950271] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 788.955308] ? pcpu_alloc+0xc9/0x1190 [ 788.959120] alloc_pages_current+0x193/0x2a0 [ 788.963538] ? __lockdep_init_map+0x100/0x5a0 [ 788.968043] get_zeroed_page+0x10/0x40 [ 788.971935] mount_fs+0x203/0x30c [ 788.975400] vfs_kern_mount.part.0+0x68/0x470 [ 788.979903] do_mount+0x113c/0x2f10 [ 788.983546] ? lock_acquire+0x170/0x3c0 [ 788.987527] ? check_preemption_disabled+0x41/0x280 [ 788.990521] erofs: read_super, device -> /dev/loop3 [ 788.992548] ? copy_mount_string+0x40/0x40 [ 788.992563] ? copy_mount_options+0x59/0x380 [ 788.992581] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 789.011206] ? kmem_cache_alloc_trace+0x323/0x380 [ 789.016058] ? copy_mount_options+0x26f/0x380 [ 789.020565] ksys_mount+0xcf/0x130 [ 789.024110] __x64_sys_mount+0xba/0x150 [ 789.028086] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 789.032674] do_syscall_64+0xf9/0x620 [ 789.032868] erofs: read_super, device -> /dev/loop4 [ 789.036476] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 789.036486] RIP: 0033:0x460b9a [ 789.036502] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 ad 89 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 8a 89 fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 789.052565] erofs: options -> fault_injection=0x0000000000000000,noacl, 03:50:36 executing program 0: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="10000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x8000000, &(0x7f0000000040)) 03:50:36 executing program 5: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c025", 0x6, 0x480}, {0x0, 0xf6ffffff00000000, 0x1000}], 0x0, &(0x7f0000000040)) 03:50:36 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000c80)=@raw={'raw\x00', 0x3c1, 0x3, 0x308, 0x0, 0x150, 0x150, 0x0, 0x3, 0x238, 0x238, 0x238, 0x238, 0x238, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x3], 0x0, 0x128, 0x150, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'dummy0\x00', {0x0, 0x0, 0x3, 0x0, 0x0, 0xfffd, 0x7}}}, @common=@ipv6header={{0x28, 'ipv6header\x00'}, {0x0, 0x81}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}, {{@uncond, 0x0, 0xa8, 0xe8}, @common=@inet=@LOG={0x40, 'LOG\x00', 0x0, {0x0, 0x0, "59e2b655a7928de9d18f6f4ce2fcb46e2fbbb084e62170a6b5ab23bc6a36"}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x368) [ 789.068767] RSP: 002b:00007f4258f54a78 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 789.068781] RAX: ffffffffffffffda RBX: 00007f4258f54b10 RCX: 0000000000460b9a [ 789.068788] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007f4258f54ad0 [ 789.068796] RBP: 00007f4258f54ad0 R08: 00007f4258f54b10 R09: 0000000020000000 [ 789.068802] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000020000000 [ 789.068809] R13: 0000000020000100 R14: 0000000020000200 R15: 0000000020000040 [ 789.096241] erofs: options -> [ 789.112795] erofs: cannot read erofs superblock [ 789.116764] erofs: unmounted for /dev/loop0 [ 789.128342] erofs: root inode @ nid 36 [ 789.143444] erofs: mounted on /dev/loop4 with opts: . 03:50:36 executing program 2 (fault-call:0 fault-nth:42): syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="10000300c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000040)) [ 789.253873] FAULT_INJECTION: forcing a failure. [ 789.253873] name failslab, interval 1, probability 0, space 0, times 0 [ 789.266329] CPU: 1 PID: 12930 Comm: syz-executor.2 Not tainted 4.19.163-syzkaller #0 [ 789.274221] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 789.279371] erofs: read_super, device -> /dev/loop0 [ 789.283573] Call Trace: [ 789.291208] dump_stack+0x1fc/0x2fe [ 789.294846] should_fail.cold+0xa/0x14 [ 789.298746] ? setup_fault_attr+0x200/0x200 [ 789.302781] erofs: options -> [ 789.303067] ? lock_acquire+0x170/0x3c0 [ 789.310245] __should_failslab+0x115/0x180 [ 789.314485] should_failslab+0x5/0xf [ 789.318202] __kmalloc+0x2ab/0x3c0 [ 789.318852] erofs: root inode @ nid 36 [ 789.321762] ? __list_lru_init+0xd3/0x7f0 [ 789.321781] __list_lru_init+0xd3/0x7f0 [ 789.321796] ? up_write+0x18/0x150 [ 789.335907] erofs: mounted on /dev/loop0 with opts: . [ 789.337291] sget_userns+0x7e2/0xcd0 [ 789.337306] ? set_bdev_super+0x110/0x110 [ 789.337325] ? ns_test_super+0x50/0x50 03:50:36 executing program 4: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010006000c0024", 0xf, 0x400}, {&(0x7f0000010100)="02000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000040)) 03:50:36 executing program 3: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0xb}], 0x0, &(0x7f0000000040)={[{@fault_injection={'fault_injection'}}, {@noacl='noacl'}]}) 03:50:36 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000c80)=@raw={'raw\x00', 0x3c1, 0x3, 0x308, 0x0, 0x150, 0x150, 0x0, 0x3, 0x238, 0x238, 0x238, 0x238, 0x238, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x3], 0x0, 0x128, 0x150, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'dummy0\x00', {0x0, 0x0, 0x3, 0x0, 0x0, 0xfffd, 0x7}}}, @common=@ipv6header={{0x28, 'ipv6header\x00'}, {0x0, 0x81}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}, {{@uncond, 0x0, 0xa8, 0xe8}, @common=@inet=@LOG={0x40, 'LOG\x00', 0x0, {0x0, 0x0, "59e2b655a7928de9d18f6f4ce2fcb46e2fbbb084e62170a6b5ab23bc6a36"}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x368) 03:50:36 executing program 5: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c025", 0x6, 0x480}, {0x0, 0xfcfdffff00000000, 0x1000}], 0x0, &(0x7f0000000040)) 03:50:36 executing program 0: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="10000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0xeffdffff, &(0x7f0000000040)) [ 789.337340] ? set_bdev_super+0x110/0x110 [ 789.337352] ? ns_test_super+0x50/0x50 [ 789.337364] sget+0x102/0x140 [ 789.337381] mount_bdev+0xf8/0x3b0 [ 789.337396] ? init_once+0x13/0x13 [ 789.372449] erofs_mount+0x8c/0xc0 [ 789.375995] ? erofs_kill_sb+0x20/0x20 [ 789.379918] ? alloc_pages_current+0x19b/0x2a0 [ 789.384504] ? __lockdep_init_map+0x100/0x5a0 [ 789.389008] mount_fs+0xa3/0x30c [ 789.392385] vfs_kern_mount.part.0+0x68/0x470 [ 789.396892] do_mount+0x113c/0x2f10 [ 789.400530] ? lock_acquire+0x170/0x3c0 03:50:36 executing program 5: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c025", 0x6, 0x480}, {0x0, 0xfeffffff00000000, 0x1000}], 0x0, &(0x7f0000000040)) [ 789.404514] ? check_preemption_disabled+0x41/0x280 [ 789.409541] ? copy_mount_string+0x40/0x40 [ 789.413780] ? copy_mount_options+0x59/0x380 [ 789.418201] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 789.423225] ? kmem_cache_alloc_trace+0x323/0x380 [ 789.428082] ? copy_mount_options+0x26f/0x380 [ 789.432583] ksys_mount+0xcf/0x130 [ 789.436133] __x64_sys_mount+0xba/0x150 [ 789.440111] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 789.444700] do_syscall_64+0xf9/0x620 [ 789.448511] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 789.453707] RIP: 0033:0x460b9a [ 789.456904] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 ad 89 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 8a 89 fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 789.475801] RSP: 002b:00007f4258f54a78 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 789.483514] RAX: ffffffffffffffda RBX: 00007f4258f54b10 RCX: 0000000000460b9a [ 789.490791] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007f4258f54ad0 [ 789.498063] RBP: 00007f4258f54ad0 R08: 00007f4258f54b10 R09: 0000000020000000 [ 789.505333] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000020000000 [ 789.512606] R13: 0000000020000100 R14: 0000000020000200 R15: 0000000020000040 [ 789.520378] erofs: unmounted for /dev/loop4 [ 789.526033] erofs: unmounted for /dev/loop0 03:50:37 executing program 5: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c025", 0x6, 0x480}, {0x0, 0xffffffff00000000, 0x1000}], 0x0, &(0x7f0000000040)) 03:50:37 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000c80)=@raw={'raw\x00', 0x3c1, 0x3, 0x308, 0x0, 0x150, 0x150, 0x0, 0x3, 0x238, 0x238, 0x238, 0x238, 0x238, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xca, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x3], 0x0, 0x128, 0x150, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'dummy0\x00', {0x0, 0x0, 0x3, 0x0, 0x0, 0xfffd, 0x7}}}, @common=@ipv6header={{0x28, 'ipv6header\x00'}, {0x0, 0x81}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}, {{@uncond, 0x0, 0xa8, 0xe8}, @common=@inet=@LOG={0x40, 'LOG\x00', 0x0, {0x0, 0x0, "59e2b655a7928de9d18f6f4ce2fcb46e2fbbb084e62170a6b5ab23bc6a36"}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x368) 03:50:37 executing program 2 (fault-call:0 fault-nth:43): syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="10000300c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000040)) 03:50:37 executing program 5: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c025", 0x6, 0x480}, {0x0, 0xffffffffffff0700, 0x1000}], 0x0, &(0x7f0000000040)) [ 789.642523] erofs: read_super, device -> /dev/loop3 [ 789.649016] erofs: options -> fault_injection=0x0000000000000000,noacl, [ 789.655917] erofs: cannot read erofs superblock 03:50:37 executing program 5: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c025", 0x6, 0x480}, {0x0, 0xfffffffffffffdef, 0x1000}], 0x0, &(0x7f0000000040)) 03:50:37 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000c80)=@raw={'raw\x00', 0x3c1, 0x3, 0x308, 0x0, 0x150, 0x150, 0x0, 0x3, 0x238, 0x238, 0x238, 0x238, 0x238, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x3], 0x0, 0x128, 0x150, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'dummy0\x00', {0x0, 0x0, 0x3, 0x0, 0x0, 0xfffd, 0x7}}}, @common=@ipv6header={{0x28, 'ipv6header\x00'}, {0x0, 0x81}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}, {{@uncond, 0x0, 0xa8, 0xe8}, @common=@inet=@LOG={0x40, 'LOG\x00', 0x0, {0x0, 0x0, "59e2b655a7928de9d18f6f4ce2fcb46e2fbbb084e62170a6b5ab23bc6a36"}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x368) [ 789.727343] erofs: read_super, device -> /dev/loop4 [ 789.738369] erofs: options -> [ 789.743003] erofs: root inode @ nid 36 [ 789.752129] erofs: mounted on /dev/loop4 with opts: . [ 789.761224] FAULT_INJECTION: forcing a failure. [ 789.761224] name failslab, interval 1, probability 0, space 0, times 0 [ 789.777173] erofs: read_super, device -> /dev/loop3 [ 789.792143] erofs: options -> fault_injection=0x0000000000000000,noacl, [ 789.808863] CPU: 1 PID: 12968 Comm: syz-executor.2 Not tainted 4.19.163-syzkaller #0 [ 789.816762] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 789.826204] Call Trace: [ 789.828779] erofs: cannot read erofs superblock [ 789.828806] dump_stack+0x1fc/0x2fe [ 789.837107] should_fail.cold+0xa/0x14 [ 789.840996] ? setup_fault_attr+0x200/0x200 [ 789.845319] ? lock_acquire+0x170/0x3c0 [ 789.849311] __should_failslab+0x115/0x180 [ 789.853547] should_failslab+0x5/0xf [ 789.857262] kmem_cache_alloc_trace+0x284/0x380 [ 789.861934] ? set_bdev_super+0x110/0x110 [ 789.866097] ? ns_test_super+0x50/0x50 [ 789.869989] sget_userns+0x122/0xcd0 [ 789.873707] ? set_bdev_super+0x110/0x110 [ 789.877864] ? ns_test_super+0x50/0x50 [ 789.881753] ? set_bdev_super+0x110/0x110 [ 789.885902] ? ns_test_super+0x50/0x50 [ 789.889785] sget+0x102/0x140 [ 789.892876] mount_bdev+0xf8/0x3b0 [ 789.896398] ? init_once+0x13/0x13 [ 789.899935] erofs_mount+0x8c/0xc0 [ 789.903467] ? erofs_kill_sb+0x20/0x20 [ 789.907337] ? alloc_pages_current+0x19b/0x2a0 [ 789.911899] ? __lockdep_init_map+0x100/0x5a0 [ 789.916376] mount_fs+0xa3/0x30c [ 789.919740] vfs_kern_mount.part.0+0x68/0x470 [ 789.924231] do_mount+0x113c/0x2f10 [ 789.927840] ? lock_acquire+0x170/0x3c0 [ 789.931796] ? check_preemption_disabled+0x41/0x280 [ 789.936808] ? copy_mount_string+0x40/0x40 [ 789.941041] ? copy_mount_options+0x59/0x380 [ 789.945439] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 789.950435] ? kmem_cache_alloc_trace+0x323/0x380 [ 789.955260] ? copy_mount_options+0x26f/0x380 [ 789.959752] ksys_mount+0xcf/0x130 [ 789.963287] __x64_sys_mount+0xba/0x150 [ 789.967256] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 789.971819] do_syscall_64+0xf9/0x620 [ 789.975604] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 789.980782] RIP: 0033:0x460b9a [ 789.983971] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 ad 89 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 8a 89 fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 790.002855] RSP: 002b:00007f4258f54a78 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 790.010580] RAX: ffffffffffffffda RBX: 00007f4258f54b10 RCX: 0000000000460b9a [ 790.017837] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007f4258f54ad0 [ 790.025099] RBP: 00007f4258f54ad0 R08: 00007f4258f54b10 R09: 0000000020000000 [ 790.032351] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000020000000 [ 790.039615] R13: 0000000020000100 R14: 0000000020000200 R15: 0000000020000040 03:50:37 executing program 4: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010007000c0024", 0xf, 0x400}, {&(0x7f0000010100)="02000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000040)) 03:50:37 executing program 3: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x10}], 0x0, &(0x7f0000000040)={[{@fault_injection={'fault_injection'}}, {@noacl='noacl'}]}) 03:50:37 executing program 5: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c025", 0x6, 0x480}, {0x0, 0xffffffffffffffff, 0x1000}], 0x0, &(0x7f0000000040)) 03:50:37 executing program 0: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="10000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0xf6ffffff, &(0x7f0000000040)) 03:50:37 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000c80)=@raw={'raw\x00', 0x3c1, 0x3, 0x308, 0x0, 0x150, 0x150, 0x0, 0x3, 0x238, 0x238, 0x238, 0x238, 0x238, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x3], 0x0, 0x128, 0x150, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'dummy0\x00', {0x0, 0x0, 0x3, 0x0, 0x0, 0xfffd, 0x7}}}, @common=@ipv6header={{0x28, 'ipv6header\x00'}, {0x0, 0x81}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}, {{@uncond, 0x0, 0xa8, 0xe8}, @common=@inet=@LOG={0x40, 'LOG\x00', 0x0, {0x0, 0x0, "59e2b655a7928de9d18f6f4ce2fcb46e2fbbb084e62170a6b5ab23bc6a36"}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x368) 03:50:37 executing program 2 (fault-call:0 fault-nth:44): syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="10000300c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000040)) [ 790.113363] erofs: unmounted for /dev/loop4 03:50:37 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000c80)=@raw={'raw\x00', 0x3c1, 0x3, 0x308, 0x0, 0x150, 0x150, 0x0, 0x3, 0x238, 0x238, 0x238, 0x238, 0x238, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x3], 0x0, 0x128, 0x150, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'dummy0\x00', {0x0, 0x0, 0x3, 0x0, 0x0, 0xfffd, 0x7}}}, @common=@ipv6header={{0x28, 'ipv6header\x00'}, {0x0, 0x81}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}, {{@uncond, 0x0, 0xa8, 0xe8}, @common=@inet=@LOG={0x40, 'LOG\x00', 0x0, {0x0, 0x0, "59e2b655a7928de9d18f6f4ce2fcb46e2fbbb084e62170a6b5ab23bc6a36"}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x368) 03:50:37 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000c80)=@raw={'raw\x00', 0x3c1, 0x3, 0x308, 0x0, 0x150, 0x150, 0x0, 0x3, 0x238, 0x238, 0x238, 0x238, 0x238, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x3], 0x0, 0x128, 0x150, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'dummy0\x00', {0x0, 0x0, 0x3, 0x0, 0x0, 0xfffd, 0x7}}}, @common=@ipv6header={{0x28, 'ipv6header\x00'}, {0x0, 0x81}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}, {{@uncond, 0x0, 0xa8, 0xe8}, @common=@inet=@LOG={0x40, 'LOG\x00', 0x0, {0x0, 0x0, "59e2b655a7928de9d18f6f4ce2fcb46e2fbbb084e62170a6b5ab23bc6a36"}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x368) [ 790.223779] FAULT_INJECTION: forcing a failure. [ 790.223779] name failslab, interval 1, probability 0, space 0, times 0 03:50:37 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000c80)=@raw={'raw\x00', 0x3c1, 0x3, 0x308, 0x0, 0x150, 0x150, 0x0, 0x3, 0x238, 0x238, 0x238, 0x238, 0x238, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x3], 0x0, 0x128, 0x150, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'dummy0\x00', {0x0, 0x0, 0x3, 0x0, 0x0, 0xfffd, 0x7}}}, @common=@ipv6header={{0x28, 'ipv6header\x00'}, {0x0, 0x81}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}, {{@uncond, 0x0, 0xa8, 0xe8}, @common=@inet=@LOG={0x40, 'LOG\x00', 0x0, {0x0, 0x0, "59e2b655a7928de9d18f6f4ce2fcb46e2fbbb084e62170a6b5ab23bc6a36"}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x368) 03:50:37 executing program 5: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c025", 0x6, 0x480}, {0x0, 0x0, 0x1002}], 0x0, &(0x7f0000000040)) [ 790.269659] CPU: 0 PID: 13003 Comm: syz-executor.2 Not tainted 4.19.163-syzkaller #0 [ 790.277579] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 790.286933] Call Trace: [ 790.289532] dump_stack+0x1fc/0x2fe [ 790.293174] should_fail.cold+0xa/0x14 [ 790.297072] ? setup_fault_attr+0x200/0x200 [ 790.301400] ? lock_acquire+0x170/0x3c0 [ 790.305377] __should_failslab+0x115/0x180 [ 790.309612] should_failslab+0x5/0xf [ 790.313421] __kmalloc+0x2ab/0x3c0 03:50:37 executing program 5: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c025", 0x6, 0x480}, {0x0, 0x0, 0x1003}], 0x0, &(0x7f0000000040)) [ 790.316970] ? prealloc_shrinker+0x15d/0x340 [ 790.321477] prealloc_shrinker+0x15d/0x340 [ 790.325726] sget_userns+0x7b4/0xcd0 [ 790.329444] ? set_bdev_super+0x110/0x110 [ 790.333602] ? ns_test_super+0x50/0x50 [ 790.337498] ? set_bdev_super+0x110/0x110 [ 790.341645] ? ns_test_super+0x50/0x50 [ 790.345555] sget+0x102/0x140 [ 790.348670] mount_bdev+0xf8/0x3b0 [ 790.352216] ? init_once+0x13/0x13 [ 790.355767] erofs_mount+0x8c/0xc0 [ 790.359313] ? erofs_kill_sb+0x20/0x20 [ 790.363205] ? alloc_pages_current+0x19b/0x2a0 03:50:37 executing program 5: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c025", 0x6, 0x480}, {0x0, 0x0, 0x1004}], 0x0, &(0x7f0000000040)) [ 790.367791] ? __lockdep_init_map+0x100/0x5a0 [ 790.372294] mount_fs+0xa3/0x30c [ 790.375668] vfs_kern_mount.part.0+0x68/0x470 [ 790.380175] do_mount+0x113c/0x2f10 [ 790.383811] ? lock_acquire+0x170/0x3c0 [ 790.387790] ? check_preemption_disabled+0x41/0x280 [ 790.392813] ? copy_mount_string+0x40/0x40 [ 790.397055] ? copy_mount_options+0x59/0x380 [ 790.401469] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 790.406490] ? kmem_cache_alloc_trace+0x323/0x380 [ 790.411342] ? copy_mount_options+0x26f/0x380 [ 790.415835] ksys_mount+0xcf/0x130 [ 790.419359] __x64_sys_mount+0xba/0x150 [ 790.423318] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 790.427885] do_syscall_64+0xf9/0x620 [ 790.431689] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 790.436881] RIP: 0033:0x460b9a [ 790.440064] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 ad 89 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 8a 89 fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 790.458962] RSP: 002b:00007f4258f54a78 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 790.466679] RAX: ffffffffffffffda RBX: 00007f4258f54b10 RCX: 0000000000460b9a [ 790.473935] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007f4258f54ad0 [ 790.481190] RBP: 00007f4258f54ad0 R08: 00007f4258f54b10 R09: 0000000020000000 [ 790.488441] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000020000000 [ 790.495692] R13: 0000000020000100 R14: 0000000020000200 R15: 0000000020000040 [ 790.518513] erofs: read_super, device -> /dev/loop4 [ 790.523574] erofs: options -> [ 790.527306] erofs: root inode @ nid 36 [ 790.545925] erofs: mounted on /dev/loop4 with opts: . [ 790.584985] erofs: read_super, device -> /dev/loop3 [ 790.600324] erofs: options -> fault_injection=0x0000000000000000,noacl, [ 790.607370] erofs: cannot read erofs superblock 03:50:38 executing program 4: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010008000c0024", 0xf, 0x400}, {&(0x7f0000010100)="02000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000040)) [ 790.683008] erofs: read_super, device -> /dev/loop3 [ 790.689349] erofs: options -> fault_injection=0x0000000000000000,noacl, [ 790.702696] erofs: unmounted for /dev/loop4 [ 790.719017] erofs: cannot read erofs superblock 03:50:38 executing program 3: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1002}], 0x0, &(0x7f0000000040)={[{@fault_injection={'fault_injection'}}, {@noacl='noacl'}]}) 03:50:38 executing program 5: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c025", 0x6, 0x480}, {0x0, 0x0, 0x1007}], 0x0, &(0x7f0000000040)) 03:50:38 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000c80)=@raw={'raw\x00', 0x3c1, 0x3, 0x308, 0x0, 0x150, 0x150, 0x0, 0x3, 0x238, 0x238, 0x238, 0x238, 0x238, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x3], 0x0, 0x128, 0x150, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'dummy0\x00', {0x0, 0x0, 0x3, 0x0, 0x0, 0xfffd, 0x7}}}, @common=@ipv6header={{0x28, 'ipv6header\x00'}, {0x0, 0x81}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}, {{@uncond, 0x0, 0xa8, 0xe8}, @common=@inet=@LOG={0x40, 'LOG\x00', 0x0, {0x0, 0x0, "59e2b655a7928de9d18f6f4ce2fcb46e2fbbb084e62170a6b5ab23bc6a36"}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x368) 03:50:38 executing program 0: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="10000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0xfcfdffff, &(0x7f0000000040)) 03:50:38 executing program 2 (fault-call:0 fault-nth:45): syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="10000300c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000040)) [ 790.792459] erofs: read_super, device -> /dev/loop4 [ 790.809301] erofs: options -> [ 790.812556] erofs: root inode @ nid 36 [ 790.854358] erofs: mounted on /dev/loop4 with opts: . 03:50:38 executing program 0: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="10000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0xfdfdffff, &(0x7f0000000040)) 03:50:38 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000c80)=@raw={'raw\x00', 0x3c1, 0x3, 0x308, 0x0, 0x150, 0x150, 0x0, 0x3, 0x238, 0x238, 0x238, 0x238, 0x238, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x3], 0x0, 0x128, 0x150, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'dummy0\x00', {0x0, 0x0, 0x3, 0x0, 0x0, 0xfffd, 0x7}}}, @common=@ipv6header={{0x28, 'ipv6header\x00'}, {0x0, 0x81}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}, {{@uncond, 0x0, 0xa8, 0xe8}, @common=@inet=@LOG={0x40, 'LOG\x00', 0x0, {0x0, 0x0, "59e2b655a7928de9d18f6f4ce2fcb46e2fbbb084e62170a6b5ab23bc6a36"}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x368) 03:50:38 executing program 5: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c025", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x2, &(0x7f0000000040)) 03:50:38 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000c80)=@raw={'raw\x00', 0x3c1, 0x3, 0x308, 0x0, 0x150, 0x150, 0x0, 0x3, 0x238, 0x238, 0x238, 0x238, 0x238, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x3], 0x0, 0x128, 0x150, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'dummy0\x00', {0x0, 0x0, 0x3, 0x0, 0x0, 0xfffd, 0x7}}}, @common=@ipv6header={{0x28, 'ipv6header\x00'}, {0x0, 0x81}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}, {{@uncond, 0x0, 0xa8, 0xe8}, @common=@inet=@LOG={0x40, 'LOG\x00', 0x0, {0x0, 0x0, "59e2b655a7928de9d18f6f4ce2fcb46e2fbbb084e62170a6b5ab23bc6a36"}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x368) [ 790.956230] FAULT_INJECTION: forcing a failure. [ 790.956230] name failslab, interval 1, probability 0, space 0, times 0 [ 790.966594] erofs: read_super, device -> /dev/loop3 [ 790.967888] CPU: 0 PID: 13072 Comm: syz-executor.2 Not tainted 4.19.163-syzkaller #0 [ 790.972481] erofs: options -> fault_injection=0x0000000000000000,noacl, [ 790.980343] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 790.980349] Call Trace: [ 790.980370] dump_stack+0x1fc/0x2fe [ 790.980390] should_fail.cold+0xa/0x14 [ 790.980408] ? setup_fault_attr+0x200/0x200 [ 790.980422] ? lock_acquire+0x170/0x3c0 [ 790.980446] __should_failslab+0x115/0x180 [ 790.980459] should_failslab+0x5/0xf [ 790.980474] kmem_cache_alloc_trace+0x284/0x380 [ 791.027473] ? set_bdev_super+0x110/0x110 [ 791.031627] ? ns_test_super+0x50/0x50 [ 791.035525] sget_userns+0x122/0xcd0 [ 791.039241] ? set_bdev_super+0x110/0x110 [ 791.043399] ? ns_test_super+0x50/0x50 [ 791.044002] erofs: FAULT_INJECTION was not selected [ 791.047292] ? set_bdev_super+0x110/0x110 [ 791.047306] ? ns_test_super+0x50/0x50 [ 791.047319] sget+0x102/0x140 [ 791.047337] mount_bdev+0xf8/0x3b0 [ 791.047349] ? init_once+0x13/0x13 [ 791.047365] erofs_mount+0x8c/0xc0 [ 791.060969] erofs: root inode @ nid 36 [ 791.063458] ? erofs_kill_sb+0x20/0x20 [ 791.063478] ? alloc_pages_current+0x19b/0x2a0 [ 791.063493] ? __lockdep_init_map+0x100/0x5a0 [ 791.075313] erofs: mounted on /dev/loop3 with opts: fault_injection=0x0000000000000000. [ 791.077939] mount_fs+0xa3/0x30c [ 791.077959] vfs_kern_mount.part.0+0x68/0x470 03:50:38 executing program 5: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c025", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x3, &(0x7f0000000040)) [ 791.077978] do_mount+0x113c/0x2f10 [ 791.078001] ? do_raw_spin_unlock+0x171/0x230 [ 791.114988] ? check_preemption_disabled+0x41/0x280 [ 791.120015] ? copy_mount_string+0x40/0x40 [ 791.124254] ? copy_mount_options+0x59/0x380 [ 791.128674] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 791.133696] ? kmem_cache_alloc_trace+0x323/0x380 [ 791.138553] ? copy_mount_options+0x26f/0x380 [ 791.143068] ksys_mount+0xcf/0x130 [ 791.146613] __x64_sys_mount+0xba/0x150 [ 791.150594] ? lockdep_hardirqs_on+0x3a8/0x5c0 03:50:38 executing program 5: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c025", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x4, &(0x7f0000000040)) [ 791.155181] do_syscall_64+0xf9/0x620 [ 791.158990] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 791.164179] RIP: 0033:0x460b9a [ 791.167374] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 ad 89 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 8a 89 fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 791.186275] RSP: 002b:00007f4258f54a78 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 791.193983] RAX: ffffffffffffffda RBX: 00007f4258f54b10 RCX: 0000000000460b9a 03:50:38 executing program 4: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010060000c0024", 0xf, 0x400}, {&(0x7f0000010100)="02000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000040)) 03:50:38 executing program 3: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1003}], 0x0, &(0x7f0000000040)={[{@fault_injection={'fault_injection'}}, {@noacl='noacl'}]}) 03:50:38 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000c80)=@raw={'raw\x00', 0x3c1, 0x3, 0x308, 0x0, 0x150, 0x150, 0x0, 0x3, 0x238, 0x238, 0x238, 0x238, 0x238, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x3], 0x0, 0x128, 0x150, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'dummy0\x00', {0x0, 0x0, 0x3, 0x0, 0x0, 0xfffd, 0x7}}}, @common=@ipv6header={{0x28, 'ipv6header\x00'}, {0x0, 0x81}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}, {{@uncond, 0x0, 0xa8, 0xe8}, @common=@inet=@LOG={0x40, 'LOG\x00', 0x0, {0x0, 0x0, "59e2b655a7928de9d18f6f4ce2fcb46e2fbbb084e62170a6b5ab23bc6a36"}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x368) [ 791.201252] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007f4258f54ad0 [ 791.208515] RBP: 00007f4258f54ad0 R08: 00007f4258f54b10 R09: 0000000020000000 [ 791.215776] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000020000000 [ 791.223044] R13: 0000000020000100 R14: 0000000020000200 R15: 0000000020000040 [ 791.247225] erofs: unmounted for /dev/loop3 03:50:38 executing program 5: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c025", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x7, &(0x7f0000000040)) 03:50:38 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000c80)=@raw={'raw\x00', 0x3c1, 0x3, 0x308, 0x0, 0x150, 0x150, 0x0, 0x3, 0x238, 0x238, 0x238, 0x238, 0x238, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x3], 0x0, 0x128, 0x150, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'dummy0\x00', {0x0, 0x0, 0x3, 0x0, 0x0, 0xfffd, 0x7}}}, @common=@ipv6header={{0x28, 'ipv6header\x00'}, {0x0, 0x81}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}, {{@uncond, 0x0, 0xa8, 0xe8}, @common=@inet=@LOG={0x40, 'LOG\x00', 0x0, {0x0, 0x0, "59e2b655a7928de9d18f6f4ce2fcb46e2fbbb084e62170a6b5ab23bc6a36"}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x368) [ 791.255399] erofs: unmounted for /dev/loop4 03:50:39 executing program 2 (fault-call:0 fault-nth:46): syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="10000300c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000040)) 03:50:39 executing program 5: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c025", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x300, &(0x7f0000000040)) 03:50:39 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000c80)=@raw={'raw\x00', 0x3c1, 0x3, 0x308, 0x0, 0x150, 0x150, 0x0, 0x3, 0x238, 0x238, 0x238, 0x238, 0x238, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x3], 0x0, 0x128, 0x150, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'dummy0\x00', {0x0, 0x0, 0x3, 0x0, 0x0, 0xfffd, 0x7}}}, @common=@ipv6header={{0x28, 'ipv6header\x00'}, {0x0, 0x81}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}, {{@uncond, 0x0, 0xa8, 0xe8}, @common=@inet=@LOG={0x40, 'LOG\x00', 0x0, {0x0, 0x0, "59e2b655a7928de9d18f6f4ce2fcb46e2fbbb084e62170a6b5ab23bc6a36"}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x368) 03:50:39 executing program 0: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="10000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0xfeffffff, &(0x7f0000000040)) [ 791.469425] erofs: read_super, device -> /dev/loop3 [ 791.474481] erofs: options -> fault_injection=0x0000000000000000,noacl, [ 791.496242] erofs: read_super, device -> /dev/loop4 [ 791.508036] erofs: FAULT_INJECTION was not selected [ 791.513197] erofs: root inode @ nid 36 [ 791.523533] erofs: options -> [ 791.528311] erofs: mounted on /dev/loop3 with opts: fault_injection=0x0000000000000000. [ 791.540710] erofs: root inode @ nid 36 [ 791.561905] FAULT_INJECTION: forcing a failure. [ 791.561905] name failslab, interval 1, probability 0, space 0, times 0 [ 791.571243] erofs: mounted on /dev/loop4 with opts: . [ 791.573392] CPU: 0 PID: 13137 Comm: syz-executor.2 Not tainted 4.19.163-syzkaller #0 [ 791.586248] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 791.595603] Call Trace: [ 791.598200] dump_stack+0x1fc/0x2fe [ 791.602338] should_fail.cold+0xa/0x14 [ 791.606239] ? setup_fault_attr+0x200/0x200 [ 791.610566] ? lock_acquire+0x170/0x3c0 [ 791.614557] __should_failslab+0x115/0x180 [ 791.618804] should_failslab+0x5/0xf 03:50:39 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000c80)=@raw={'raw\x00', 0x3c1, 0x3, 0x308, 0x0, 0x150, 0x150, 0x0, 0x3, 0x238, 0x238, 0x238, 0x238, 0x238, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x3], 0x0, 0x128, 0x150, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'dummy0\x00', {0x0, 0x0, 0x3, 0x0, 0x0, 0xfffd, 0x7}}}, @common=@ipv6header={{0x28, 'ipv6header\x00'}, {0x0, 0x81}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}, {{@uncond, 0x0, 0xa8, 0xe8}, @common=@inet=@LOG={0x40, 'LOG\x00', 0x0, {0x0, 0x0, "59e2b655a7928de9d18f6f4ce2fcb46e2fbbb084e62170a6b5ab23bc6a36"}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x368) 03:50:39 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000c80)=@raw={'raw\x00', 0x3c1, 0x3, 0x308, 0x0, 0x150, 0x150, 0x0, 0x3, 0x238, 0x238, 0x238, 0x238, 0x238, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x3], 0x0, 0x128, 0x150, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'dummy0\x00', {0x0, 0x0, 0x3, 0x0, 0x0, 0xfffd, 0x7}}}, @common=@ipv6header={{0x28, 'ipv6header\x00'}, {0x0, 0x81}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}, {{@uncond, 0x0, 0xa8, 0xe8}, @common=@inet=@LOG={0x40, 'LOG\x00', 0x0, {0x0, 0x0, "59e2b655a7928de9d18f6f4ce2fcb46e2fbbb084e62170a6b5ab23bc6a36"}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x368) [ 791.622530] kmem_cache_alloc_node_trace+0x244/0x3b0 [ 791.627641] __kmalloc_node+0x38/0x70 [ 791.631452] kvmalloc_node+0x61/0xf0 [ 791.635177] __list_lru_init+0x4c6/0x7f0 [ 791.639242] ? up_read+0x63/0x110 [ 791.642706] sget_userns+0x7e2/0xcd0 [ 791.646425] ? set_bdev_super+0x110/0x110 [ 791.650582] ? ns_test_super+0x50/0x50 [ 791.654477] ? set_bdev_super+0x110/0x110 [ 791.658628] ? ns_test_super+0x50/0x50 [ 791.662514] sget+0x102/0x140 [ 791.665630] mount_bdev+0xf8/0x3b0 [ 791.669176] ? init_once+0x13/0x13 03:50:39 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000c80)=@raw={'raw\x00', 0x3c1, 0x3, 0x308, 0x0, 0x150, 0x150, 0x0, 0x3, 0x238, 0x238, 0x238, 0x238, 0x238, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x3], 0x0, 0x128, 0x150, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'dummy0\x00', {0x0, 0x0, 0x3, 0x0, 0x0, 0xfffd, 0x7}}}, @common=@ipv6header={{0x28, 'ipv6header\x00'}, {0x0, 0x81}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}, {{@uncond, 0x0, 0xa8, 0xe8}, @common=@inet=@LOG={0x40, 'LOG\x00', 0x0, {0x0, 0x0, "59e2b655a7928de9d18f6f4ce2fcb46e2fbbb084e62170a6b5ab23bc6a36"}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x368) [ 791.672724] erofs_mount+0x8c/0xc0 [ 791.676268] ? erofs_kill_sb+0x20/0x20 [ 791.680162] ? alloc_pages_current+0x19b/0x2a0 [ 791.684751] ? __lockdep_init_map+0x100/0x5a0 [ 791.689253] mount_fs+0xa3/0x30c [ 791.692627] vfs_kern_mount.part.0+0x68/0x470 [ 791.697131] do_mount+0x113c/0x2f10 [ 791.700763] ? lock_acquire+0x170/0x3c0 [ 791.704742] ? check_preemption_disabled+0x41/0x280 [ 791.709765] ? copy_mount_string+0x40/0x40 [ 791.714004] ? copy_mount_options+0x59/0x380 [ 791.718421] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 791.723444] ? kmem_cache_alloc_trace+0x323/0x380 [ 791.728295] ? copy_mount_options+0x26f/0x380 [ 791.732802] ksys_mount+0xcf/0x130 [ 791.736352] __x64_sys_mount+0xba/0x150 [ 791.740333] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 791.744921] do_syscall_64+0xf9/0x620 [ 791.748733] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 791.753925] RIP: 0033:0x460b9a [ 791.757248] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 ad 89 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 8a 89 fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 791.776141] RSP: 002b:00007f4258f54a78 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 791.783903] RAX: ffffffffffffffda RBX: 00007f4258f54b10 RCX: 0000000000460b9a [ 791.791163] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007f4258f54ad0 [ 791.798414] RBP: 00007f4258f54ad0 R08: 00007f4258f54b10 R09: 0000000020000000 [ 791.805713] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000020000000 [ 791.812964] R13: 0000000020000100 R14: 0000000020000200 R15: 0000000020000040 03:50:39 executing program 4: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010004020c0024", 0xf, 0x400}, {&(0x7f0000010100)="02000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000040)) 03:50:39 executing program 3: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1004}], 0x0, &(0x7f0000000040)={[{@fault_injection={'fault_injection'}}, {@noacl='noacl'}]}) 03:50:39 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000c80)=@raw={'raw\x00', 0x3c1, 0x3, 0x308, 0x0, 0x150, 0x150, 0x0, 0x3, 0x238, 0x238, 0x238, 0x238, 0x238, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xca, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x3], 0x0, 0x128, 0x150, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'dummy0\x00', {0x0, 0x0, 0x3, 0x0, 0x0, 0xfffd, 0x7}}}, @common=@ipv6header={{0x28, 'ipv6header\x00'}, {0x0, 0x81}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}, {{@uncond, 0x0, 0xa8, 0xe8}, @common=@inet=@LOG={0x40, 'LOG\x00', 0x0, {0x0, 0x0, "59e2b655a7928de9d18f6f4ce2fcb46e2fbbb084e62170a6b5ab23bc6a36"}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x368) 03:50:39 executing program 5: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c025", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x700, &(0x7f0000000040)) [ 791.859371] erofs: unmounted for /dev/loop4 [ 791.870618] erofs: unmounted for /dev/loop3 03:50:39 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000c80)=@raw={'raw\x00', 0x3c1, 0x3, 0x308, 0x0, 0x150, 0x150, 0x0, 0x3, 0x238, 0x238, 0x238, 0x238, 0x238, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x3], 0x0, 0x128, 0x150, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'dummy0\x00', {0x0, 0x0, 0x3, 0x0, 0x0, 0xfffd, 0x7}}}, @common=@ipv6header={{0x28, 'ipv6header\x00'}, {0x0, 0x81}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}, {{@uncond, 0x0, 0xa8, 0xe8}, @common=@inet=@LOG={0x40, 'LOG\x00', 0x0, {0x0, 0x0, "59e2b655a7928de9d18f6f4ce2fcb46e2fbbb084e62170a6b5ab23bc6a36"}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x368) 03:50:39 executing program 2 (fault-call:0 fault-nth:47): syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="10000300c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000040)) 03:50:39 executing program 5: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c025", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x2000, &(0x7f0000000040)) 03:50:39 executing program 5: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c025", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0xeffd, &(0x7f0000000040)) [ 792.087745] erofs: read_super, device -> /dev/loop4 [ 792.098285] erofs: options -> [ 792.104200] erofs: root inode @ nid 36 [ 792.119667] erofs: read_super, device -> /dev/loop3 [ 792.121250] FAULT_INJECTION: forcing a failure. [ 792.121250] name failslab, interval 1, probability 0, space 0, times 0 03:50:39 executing program 0: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="10000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0xfffffdef, &(0x7f0000000040)) 03:50:39 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000c80)=@raw={'raw\x00', 0x3c1, 0x3, 0x308, 0x0, 0x150, 0x150, 0x0, 0x3, 0x238, 0x238, 0x238, 0x238, 0x238, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x3], 0x0, 0x128, 0x150, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'dummy0\x00', {0x0, 0x0, 0x3, 0x0, 0x0, 0xfffd, 0x7}}}, @common=@ipv6header={{0x28, 'ipv6header\x00'}, {0x0, 0x81}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}, {{@uncond, 0x0, 0xa8, 0xe8}, @common=@inet=@LOG={0x40, 'LOG\x00', 0x0, {0x0, 0x0, "59e2b655a7928de9d18f6f4ce2fcb46e2fbbb084e62170a6b5ab23bc6a36"}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x368) 03:50:39 executing program 5: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c025", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0xfdef, &(0x7f0000000040)) [ 792.124851] erofs: mounted on /dev/loop4 with opts: . [ 792.147830] erofs: options -> fault_injection=0x0000000000000000,noacl, [ 792.155116] erofs: FAULT_INJECTION was not selected [ 792.166145] erofs: root inode @ nid 36 03:50:39 executing program 4: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000030c0024", 0xf, 0x400}, {&(0x7f0000010100)="02000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000040)) [ 792.183552] erofs: mounted on /dev/loop3 with opts: fault_injection=0x0000000000000000. [ 792.210538] erofs: unmounted for /dev/loop4 [ 792.216082] CPU: 0 PID: 13192 Comm: syz-executor.2 Not tainted 4.19.163-syzkaller #0 [ 792.223975] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 792.233327] Call Trace: [ 792.235924] dump_stack+0x1fc/0x2fe [ 792.239566] should_fail.cold+0xa/0x14 [ 792.243461] ? setup_fault_attr+0x200/0x200 [ 792.247786] ? lock_acquire+0x170/0x3c0 [ 792.251773] __should_failslab+0x115/0x180 [ 792.256089] should_failslab+0x5/0xf 03:50:39 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000c80)=@raw={'raw\x00', 0x3c1, 0x3, 0x308, 0x0, 0x150, 0x150, 0x0, 0x3, 0x238, 0x238, 0x238, 0x238, 0x238, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x3], 0x0, 0x128, 0x150, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'dummy0\x00', {0x0, 0x0, 0x3, 0x0, 0x0, 0xfffd, 0x7}}}, @common=@ipv6header={{0x28, 'ipv6header\x00'}, {0x0, 0x81}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}, {{@uncond, 0x0, 0xa8, 0xe8}, @common=@inet=@LOG={0x40, 'LOG\x00', 0x0, {0x0, 0x0, "59e2b655a7928de9d18f6f4ce2fcb46e2fbbb084e62170a6b5ab23bc6a36"}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x368) [ 792.259807] kmem_cache_alloc_node_trace+0x244/0x3b0 [ 792.264923] __kmalloc_node+0x38/0x70 [ 792.268730] kvmalloc_node+0x61/0xf0 [ 792.272451] __list_lru_init+0x4c6/0x7f0 [ 792.276516] ? up_read+0x63/0x110 [ 792.279979] sget_userns+0x7e2/0xcd0 [ 792.283695] ? set_bdev_super+0x110/0x110 [ 792.287853] ? ns_test_super+0x50/0x50 [ 792.291749] ? set_bdev_super+0x110/0x110 [ 792.295899] ? ns_test_super+0x50/0x50 [ 792.299818] sget+0x102/0x140 [ 792.302935] mount_bdev+0xf8/0x3b0 [ 792.306476] ? init_once+0x13/0x13 [ 792.310030] erofs_mount+0x8c/0xc0 [ 792.313560] ? erofs_kill_sb+0x20/0x20 [ 792.317432] ? alloc_pages_current+0x19b/0x2a0 [ 792.321996] ? __lockdep_init_map+0x100/0x5a0 [ 792.326476] mount_fs+0xa3/0x30c [ 792.329828] vfs_kern_mount.part.0+0x68/0x470 [ 792.334313] do_mount+0x113c/0x2f10 [ 792.337998] ? do_raw_spin_unlock+0x171/0x230 [ 792.342484] ? check_preemption_disabled+0x41/0x280 [ 792.347486] ? copy_mount_string+0x40/0x40 [ 792.351754] ? copy_mount_options+0x59/0x380 [ 792.356146] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 792.361143] ? kmem_cache_alloc_trace+0x323/0x380 [ 792.365971] ? copy_mount_options+0x26f/0x380 [ 792.370499] ksys_mount+0xcf/0x130 [ 792.374024] __x64_sys_mount+0xba/0x150 [ 792.377982] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 792.382547] do_syscall_64+0xf9/0x620 [ 792.386350] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 792.391660] RIP: 0033:0x460b9a [ 792.394836] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 ad 89 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 8a 89 fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 792.413717] RSP: 002b:00007f4258f54a78 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 792.421418] RAX: ffffffffffffffda RBX: 00007f4258f54b10 RCX: 0000000000460b9a [ 792.428723] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007f4258f54ad0 [ 792.435985] RBP: 00007f4258f54ad0 R08: 00007f4258f54b10 R09: 0000000020000000 [ 792.443246] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000020000000 [ 792.450535] R13: 0000000020000100 R14: 0000000020000200 R15: 0000000020000040 03:50:40 executing program 3: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1005}], 0x0, &(0x7f0000000040)={[{@fault_injection={'fault_injection'}}, {@noacl='noacl'}]}) 03:50:40 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000c80)=@raw={'raw\x00', 0x3c1, 0x3, 0x308, 0x0, 0x150, 0x150, 0x0, 0x3, 0x238, 0x238, 0x238, 0x238, 0x238, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x3], 0x0, 0x128, 0x150, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'dummy0\x00', {0x0, 0x0, 0x3, 0x0, 0x0, 0xfffd, 0x7}}}, @common=@ipv6header={{0x28, 'ipv6header\x00'}, {0x0, 0x81}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}, {{@uncond, 0x0, 0xa8, 0xe8}, @common=@inet=@LOG={0x40, 'LOG\x00', 0x0, {0x0, 0x0, "59e2b655a7928de9d18f6f4ce2fcb46e2fbbb084e62170a6b5ab23bc6a36"}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x368) 03:50:40 executing program 5: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c025", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x200000, &(0x7f0000000040)) 03:50:40 executing program 2 (fault-call:0 fault-nth:48): syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="10000300c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000040)) [ 792.589466] erofs: unmounted for /dev/loop3 03:50:40 executing program 5: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c025", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x1000000, &(0x7f0000000040)) 03:50:40 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000c80)=@raw={'raw\x00', 0x3c1, 0x3, 0x308, 0x0, 0x150, 0x150, 0x0, 0x3, 0x238, 0x238, 0x238, 0x238, 0x238, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x3], 0x0, 0x128, 0x150, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'dummy0\x00', {0x0, 0x0, 0x3, 0x0, 0x0, 0xfffd, 0x7}}}, @common=@ipv6header={{0x28, 'ipv6header\x00'}, {0x0, 0x81}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}, {{@uncond, 0x0, 0xa8, 0xe8}, @common=@inet=@LOG={0x40, 'LOG\x00', 0x0, {0x0, 0x0, "59e2b655a7928de9d18f6f4ce2fcb46e2fbbb084e62170a6b5ab23bc6a36"}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x368) [ 792.683550] erofs: read_super, device -> /dev/loop4 03:50:40 executing program 0: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="10000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0xfffffdfc, &(0x7f0000000040)) [ 792.713350] erofs: options -> [ 792.730106] erofs: root inode @ nid 36 [ 792.747406] erofs: read_super, device -> /dev/loop3 [ 792.755998] erofs: options -> fault_injection=0x0000000000000000,noacl, 03:50:40 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000c80)=@raw={'raw\x00', 0x3c1, 0x3, 0x308, 0x0, 0x150, 0x150, 0x0, 0x3, 0x238, 0x238, 0x238, 0x238, 0x238, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x3], 0x0, 0x128, 0x150, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'dummy0\x00', {0x0, 0x0, 0x3, 0x0, 0x0, 0xfffd, 0x7}}}, @common=@ipv6header={{0x28, 'ipv6header\x00'}, {0x0, 0x81}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}, {{@uncond, 0x0, 0xa8, 0xe8}, @common=@inet=@LOG={0x40, 'LOG\x00', 0x0, {0x0, 0x0, "59e2b655a7928de9d18f6f4ce2fcb46e2fbbb084e62170a6b5ab23bc6a36"}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x368) [ 792.774021] erofs: FAULT_INJECTION was not selected [ 792.783175] erofs: mounted on /dev/loop4 with opts: . [ 792.788941] erofs: root inode @ nid 36 [ 792.798167] erofs: mounted on /dev/loop3 with opts: fault_injection=0x0000000000000000. 03:50:40 executing program 3: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1006}], 0x0, &(0x7f0000000040)={[{@fault_injection={'fault_injection'}}, {@noacl='noacl'}]}) 03:50:40 executing program 4: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf0100f8030c0024", 0xf, 0x400}, {&(0x7f0000010100)="02000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000040)) [ 792.820136] FAULT_INJECTION: forcing a failure. [ 792.820136] name failslab, interval 1, probability 0, space 0, times 0 [ 792.854991] erofs: unmounted for /dev/loop3 [ 792.872553] erofs: unmounted for /dev/loop4 [ 792.877576] CPU: 1 PID: 13241 Comm: syz-executor.2 Not tainted 4.19.163-syzkaller #0 [ 792.885467] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 792.894818] Call Trace: [ 792.897416] dump_stack+0x1fc/0x2fe [ 792.901063] should_fail.cold+0xa/0x14 [ 792.904961] ? setup_fault_attr+0x200/0x200 [ 792.909289] ? lock_acquire+0x170/0x3c0 [ 792.913470] __should_failslab+0x115/0x180 [ 792.917712] should_failslab+0x5/0xf [ 792.921432] __kmalloc+0x2ab/0x3c0 [ 792.924974] ? __list_lru_init+0xd3/0x7f0 [ 792.929128] __list_lru_init+0xd3/0x7f0 [ 792.933109] ? up_read+0x63/0x110 [ 792.936572] sget_userns+0x810/0xcd0 [ 792.940288] ? set_bdev_super+0x110/0x110 [ 792.944445] ? ns_test_super+0x50/0x50 [ 792.948339] ? set_bdev_super+0x110/0x110 [ 792.952489] ? ns_test_super+0x50/0x50 [ 792.956380] sget+0x102/0x140 [ 792.959490] mount_bdev+0xf8/0x3b0 [ 792.963035] ? init_once+0x13/0x13 [ 792.966586] erofs_mount+0x8c/0xc0 [ 792.970130] ? erofs_kill_sb+0x20/0x20 [ 792.974029] ? alloc_pages_current+0x19b/0x2a0 [ 792.978619] ? __lockdep_init_map+0x100/0x5a0 [ 792.983128] mount_fs+0xa3/0x30c [ 792.986506] vfs_kern_mount.part.0+0x68/0x470 [ 792.991011] do_mount+0x113c/0x2f10 [ 792.994645] ? lock_acquire+0x170/0x3c0 [ 792.998623] ? check_preemption_disabled+0x41/0x280 [ 793.003649] ? copy_mount_string+0x40/0x40 [ 793.007889] ? copy_mount_options+0x59/0x380 [ 793.012304] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 793.017323] ? kmem_cache_alloc_trace+0x323/0x380 [ 793.022172] ? copy_mount_options+0x26f/0x380 [ 793.026672] ksys_mount+0xcf/0x130 [ 793.030219] __x64_sys_mount+0xba/0x150 [ 793.034199] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 793.038780] do_syscall_64+0xf9/0x620 [ 793.042571] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 793.047746] RIP: 0033:0x460b9a [ 793.050923] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 ad 89 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 8a 89 fb ff c3 66 0f 1f 84 00 00 00 00 00 03:50:40 executing program 5: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c025", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x2000000, &(0x7f0000000040)) 03:50:40 executing program 5: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c025", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x3000000, &(0x7f0000000040)) 03:50:40 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000c80)=@raw={'raw\x00', 0x3c1, 0x3, 0x308, 0x0, 0x150, 0x150, 0x0, 0x3, 0x238, 0x238, 0x238, 0x238, 0x238, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x3], 0x0, 0x128, 0x150, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'dummy0\x00', {0x0, 0x0, 0x3, 0x0, 0x0, 0xfffd, 0x7}}}, @common=@ipv6header={{0x28, 'ipv6header\x00'}, {0x0, 0x81}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}, {{@uncond, 0x0, 0xa8, 0xe8}, @common=@inet=@LOG={0x40, 'LOG\x00', 0x0, {0x0, 0x0, "59e2b655a7928de9d18f6f4ce2fcb46e2fbbb084e62170a6b5ab23bc6a36"}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x368) [ 793.069811] RSP: 002b:00007f4258f54a78 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 793.077503] RAX: ffffffffffffffda RBX: 00007f4258f54b10 RCX: 0000000000460b9a [ 793.084755] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007f4258f54ad0 [ 793.092010] RBP: 00007f4258f54ad0 R08: 00007f4258f54b10 R09: 0000000020000000 [ 793.099263] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000020000000 [ 793.106514] R13: 0000000020000100 R14: 0000000020000200 R15: 0000000020000040 03:50:40 executing program 2 (fault-call:0 fault-nth:49): syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="10000300c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000040)) 03:50:40 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000c80)=@raw={'raw\x00', 0x3c1, 0x3, 0x308, 0x0, 0x150, 0x150, 0x0, 0x3, 0x238, 0x238, 0x238, 0x238, 0x238, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x3], 0x0, 0x128, 0x150, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'dummy0\x00', {0x0, 0x0, 0x3, 0x0, 0x0, 0xfffd, 0x7}}}, @common=@ipv6header={{0x28, 'ipv6header\x00'}, {0x0, 0x81}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}, {{@uncond, 0x0, 0xa8, 0xe8}, @common=@inet=@LOG={0x40, 'LOG\x00', 0x0, {0x0, 0x0, "59e2b655a7928de9d18f6f4ce2fcb46e2fbbb084e62170a6b5ab23bc6a36"}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x368) 03:50:40 executing program 5: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c025", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x4000000, &(0x7f0000000040)) 03:50:40 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000c80)=@raw={'raw\x00', 0x3c1, 0x3, 0x308, 0x0, 0x150, 0x150, 0x0, 0x3, 0x238, 0x238, 0x238, 0x238, 0x238, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x3], 0x0, 0x128, 0x150, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'dummy0\x00', {0x0, 0x0, 0x3, 0x0, 0x0, 0xfffd, 0x7}}}, @common=@ipv6header={{0x28, 'ipv6header\x00'}, {0x0, 0x81}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}, {{@uncond, 0x0, 0xa8, 0xe8}, @common=@inet=@LOG={0x40, 'LOG\x00', 0x0, {0x0, 0x0, "59e2b655a7928de9d18f6f4ce2fcb46e2fbbb084e62170a6b5ab23bc6a36"}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x368) [ 793.242654] erofs: read_super, device -> /dev/loop3 03:50:40 executing program 0: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="10000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0xfffffdfd, &(0x7f0000000040)) [ 793.272205] erofs: options -> fault_injection=0x0000000000000000,noacl, [ 793.286086] erofs: FAULT_INJECTION was not selected 03:50:40 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000c80)=@raw={'raw\x00', 0x3c1, 0x3, 0x308, 0x0, 0x150, 0x150, 0x0, 0x3, 0x238, 0x238, 0x238, 0x238, 0x238, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x3], 0x0, 0x128, 0x150, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'dummy0\x00', {0x0, 0x0, 0x3, 0x0, 0x0, 0xfffd, 0x7}}}, @common=@ipv6header={{0x28, 'ipv6header\x00'}, {0x0, 0x81}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}, {{@uncond, 0x0, 0xa8, 0xe8}, @common=@inet=@LOG={0x40, 'LOG\x00', 0x0, {0x0, 0x0, "59e2b655a7928de9d18f6f4ce2fcb46e2fbbb084e62170a6b5ab23bc6a36"}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x368) [ 793.337974] erofs: read_super, device -> /dev/loop4 [ 793.351929] FAULT_INJECTION: forcing a failure. [ 793.351929] name failslab, interval 1, probability 0, space 0, times 0 [ 793.352599] erofs: root inode @ nid 36 [ 793.360844] erofs: options -> [ 793.371122] CPU: 1 PID: 13295 Comm: syz-executor.2 Not tainted 4.19.163-syzkaller #0 [ 793.379012] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 793.388373] Call Trace: [ 793.390973] dump_stack+0x1fc/0x2fe [ 793.394617] should_fail.cold+0xa/0x14 [ 793.398516] ? setup_fault_attr+0x200/0x200 [ 793.399047] erofs: root inode @ nid 36 [ 793.402844] ? lock_acquire+0x170/0x3c0 [ 793.402867] __should_failslab+0x115/0x180 [ 793.402884] should_failslab+0x5/0xf [ 793.418661] __kmalloc+0x2ab/0x3c0 [ 793.422217] ? __list_lru_init+0xd3/0x7f0 [ 793.426375] __list_lru_init+0xd3/0x7f0 [ 793.430390] ? up_read+0x63/0x110 [ 793.433867] sget_userns+0x810/0xcd0 [ 793.437570] ? set_bdev_super+0x110/0x110 [ 793.441707] ? ns_test_super+0x50/0x50 [ 793.445596] ? set_bdev_super+0x110/0x110 [ 793.449739] ? ns_test_super+0x50/0x50 [ 793.453722] sget+0x102/0x140 [ 793.456822] mount_bdev+0xf8/0x3b0 [ 793.460351] ? init_once+0x13/0x13 [ 793.463884] erofs_mount+0x8c/0xc0 [ 793.467683] ? erofs_kill_sb+0x20/0x20 [ 793.471560] ? alloc_pages_current+0x19b/0x2a0 [ 793.476138] ? __lockdep_init_map+0x100/0x5a0 [ 793.480627] mount_fs+0xa3/0x30c [ 793.483992] vfs_kern_mount.part.0+0x68/0x470 [ 793.488478] do_mount+0x113c/0x2f10 [ 793.492095] ? do_raw_spin_unlock+0x171/0x230 [ 793.496573] ? check_preemption_disabled+0x41/0x280 [ 793.501574] ? copy_mount_string+0x40/0x40 [ 793.505792] ? copy_mount_options+0x59/0x380 [ 793.510190] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 793.515189] ? kmem_cache_alloc_trace+0x323/0x380 [ 793.520029] ? copy_mount_options+0x26f/0x380 [ 793.524510] ksys_mount+0xcf/0x130 [ 793.528034] __x64_sys_mount+0xba/0x150 [ 793.531992] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 793.536558] do_syscall_64+0xf9/0x620 [ 793.540344] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 793.545517] RIP: 0033:0x460b9a [ 793.548708] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 ad 89 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 8a 89 fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 793.567704] RSP: 002b:00007f4258f54a78 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 793.575401] RAX: ffffffffffffffda RBX: 00007f4258f54b10 RCX: 0000000000460b9a [ 793.582659] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007f4258f54ad0 [ 793.589914] RBP: 00007f4258f54ad0 R08: 00007f4258f54b10 R09: 0000000020000000 [ 793.597167] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000020000000 [ 793.604418] R13: 0000000020000100 R14: 0000000020000200 R15: 0000000020000040 03:50:41 executing program 0: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="10000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0xfffffff6, &(0x7f0000000040)) [ 793.643011] erofs: mounted on /dev/loop4 with opts: . [ 793.658753] erofs: mounted on /dev/loop3 with opts: fault_injection=0x0000000000000000. [ 793.695309] erofs: unmounted for /dev/loop4 03:50:41 executing program 3: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1007}], 0x0, &(0x7f0000000040)={[{@fault_injection={'fault_injection'}}, {@noacl='noacl'}]}) 03:50:41 executing program 4: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010002040c0024", 0xf, 0x400}, {&(0x7f0000010100)="02000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000040)) 03:50:41 executing program 5: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c025", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x7000000, &(0x7f0000000040)) 03:50:41 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000c80)=@raw={'raw\x00', 0x3c1, 0x3, 0x308, 0x0, 0x150, 0x150, 0x0, 0x3, 0x238, 0x238, 0x238, 0x238, 0x238, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x3], 0x0, 0x128, 0x150, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'dummy0\x00', {0x0, 0x0, 0x3, 0x0, 0x0, 0xfffd, 0x7}}}, @common=@ipv6header={{0x28, 'ipv6header\x00'}, {0x0, 0x81}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}, {{@uncond, 0x0, 0xa8, 0xe8}, @common=@inet=@LOG={0x40, 'LOG\x00', 0x0, {0x0, 0x0, "59e2b655a7928de9d18f6f4ce2fcb46e2fbbb084e62170a6b5ab23bc6a36"}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x368) 03:50:41 executing program 2 (fault-call:0 fault-nth:50): syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="10000300c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000040)) [ 793.840066] erofs: unmounted for /dev/loop3 [ 793.879285] erofs: read_super, device -> /dev/loop4 [ 793.885379] erofs: options -> [ 793.893642] erofs: root inode @ nid 36 [ 793.909488] erofs: mounted on /dev/loop4 with opts: . 03:50:41 executing program 5: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c025", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0xeffdffff, &(0x7f0000000040)) 03:50:41 executing program 0: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="10000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0xfffffffe, &(0x7f0000000040)) [ 793.975760] erofs: read_super, device -> /dev/loop3 [ 793.982345] FAULT_INJECTION: forcing a failure. [ 793.982345] name failslab, interval 1, probability 0, space 0, times 0 [ 793.994209] erofs: options -> fault_injection=0x0000000000000000,noacl, [ 794.020222] erofs: FAULT_INJECTION was not selected [ 794.027215] CPU: 0 PID: 13341 Comm: syz-executor.2 Not tainted 4.19.163-syzkaller #0 [ 794.035107] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 794.044460] Call Trace: [ 794.047056] dump_stack+0x1fc/0x2fe [ 794.050699] should_fail.cold+0xa/0x14 [ 794.054597] ? setup_fault_attr+0x200/0x200 [ 794.058925] ? lock_acquire+0x170/0x3c0 [ 794.062912] __should_failslab+0x115/0x180 [ 794.067153] should_failslab+0x5/0xf [ 794.070871] kmem_cache_alloc_node_trace+0x244/0x3b0 [ 794.075981] __kmalloc_node+0x38/0x70 [ 794.079789] kvmalloc_node+0x61/0xf0 [ 794.083515] __list_lru_init+0x4c6/0x7f0 [ 794.087580] ? up_read+0x63/0x110 [ 794.091044] sget_userns+0x810/0xcd0 [ 794.094762] ? set_bdev_super+0x110/0x110 [ 794.098919] ? ns_test_super+0x50/0x50 [ 794.102815] ? set_bdev_super+0x110/0x110 [ 794.106968] ? ns_test_super+0x50/0x50 [ 794.110859] sget+0x102/0x140 [ 794.113978] mount_bdev+0xf8/0x3b0 [ 794.117522] ? init_once+0x13/0x13 [ 794.121071] erofs_mount+0x8c/0xc0 [ 794.124619] ? erofs_kill_sb+0x20/0x20 [ 794.128515] ? alloc_pages_current+0x19b/0x2a0 [ 794.133098] ? __lockdep_init_map+0x100/0x5a0 [ 794.137601] mount_fs+0xa3/0x30c [ 794.140979] vfs_kern_mount.part.0+0x68/0x470 [ 794.145482] do_mount+0x113c/0x2f10 [ 794.149121] ? lock_acquire+0x170/0x3c0 [ 794.153101] ? check_preemption_disabled+0x41/0x280 [ 794.158125] ? copy_mount_string+0x40/0x40 [ 794.162367] ? copy_mount_options+0x59/0x380 [ 794.166789] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 794.171815] ? kmem_cache_alloc_trace+0x323/0x380 [ 794.176674] ? copy_mount_options+0x26f/0x380 [ 794.181177] ksys_mount+0xcf/0x130 [ 794.184712] __x64_sys_mount+0xba/0x150 [ 794.188681] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 794.193268] do_syscall_64+0xf9/0x620 [ 794.197163] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 794.202353] RIP: 0033:0x460b9a 03:50:41 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000c80)=@raw={'raw\x00', 0x3c1, 0x3, 0x308, 0x0, 0x150, 0x150, 0x0, 0x3, 0x238, 0x238, 0x238, 0x238, 0x238, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x3], 0x0, 0x128, 0x150, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'dummy0\x00', {0x0, 0x0, 0x3, 0x0, 0x0, 0xfffd, 0x7}}}, @common=@ipv6header={{0x28, 'ipv6header\x00'}, {0x0, 0x81}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}, {{@uncond, 0x0, 0xa8, 0xe8}, @common=@inet=@LOG={0x40, 'LOG\x00', 0x0, {0x0, 0x0, "59e2b655a7928de9d18f6f4ce2fcb46e2fbbb084e62170a6b5ab23bc6a36"}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x368) 03:50:41 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000c80)=@raw={'raw\x00', 0x3c1, 0x3, 0x308, 0x0, 0x150, 0x150, 0x0, 0x3, 0x238, 0x238, 0x238, 0x238, 0x238, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x3], 0x0, 0x128, 0x150, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'dummy0\x00', {0x0, 0x0, 0x3, 0x0, 0x0, 0xfffd, 0x7}}}, @common=@ipv6header={{0x28, 'ipv6header\x00'}, {0x0, 0x81}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}, {{@uncond, 0x0, 0xa8, 0xe8}, @common=@inet=@LOG={0x40, 'LOG\x00', 0x0, {0x0, 0x0, "59e2b655a7928de9d18f6f4ce2fcb46e2fbbb084e62170a6b5ab23bc6a36"}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x368) 03:50:41 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000c80)=@raw={'raw\x00', 0x3c1, 0x3, 0x308, 0x0, 0x150, 0x150, 0x0, 0x3, 0x238, 0x238, 0x238, 0x238, 0x238, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x3], 0x0, 0x128, 0x150, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'dummy0\x00', {0x0, 0x0, 0x3, 0x0, 0x0, 0xfffd, 0x7}}}, @common=@ipv6header={{0x28, 'ipv6header\x00'}, {0x0, 0x81}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}, {{@uncond, 0x0, 0xa8, 0xe8}, @common=@inet=@LOG={0x40, 'LOG\x00', 0x0, {0x0, 0x0, "59e2b655a7928de9d18f6f4ce2fcb46e2fbbb084e62170a6b5ab23bc6a36"}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x368) 03:50:41 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000c80)=@raw={'raw\x00', 0x3c1, 0x3, 0x308, 0x0, 0x150, 0x150, 0x0, 0x3, 0x238, 0x238, 0x238, 0x238, 0x238, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xca, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x3], 0x0, 0x128, 0x150, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'dummy0\x00', {0x0, 0x0, 0x3, 0x0, 0x0, 0xfffd, 0x7}}}, @common=@ipv6header={{0x28, 'ipv6header\x00'}, {0x0, 0x81}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}, {{@uncond, 0x0, 0xa8, 0xe8}, @common=@inet=@LOG={0x40, 'LOG\x00', 0x0, {0x0, 0x0, "59e2b655a7928de9d18f6f4ce2fcb46e2fbbb084e62170a6b5ab23bc6a36"}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x368) 03:50:41 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000c80)=@raw={'raw\x00', 0x3c1, 0x3, 0x308, 0x0, 0x150, 0x150, 0x0, 0x3, 0x238, 0x238, 0x238, 0x238, 0x238, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x3], 0x0, 0x128, 0x150, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'dummy0\x00', {0x0, 0x0, 0x3, 0x0, 0x0, 0xfffd, 0x7}}}, @common=@ipv6header={{0x28, 'ipv6header\x00'}, {0x0, 0x81}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}, {{@uncond, 0x0, 0xa8, 0xe8}, @common=@inet=@LOG={0x40, 'LOG\x00', 0x0, {0x0, 0x0, "59e2b655a7928de9d18f6f4ce2fcb46e2fbbb084e62170a6b5ab23bc6a36"}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x368) [ 794.205556] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 ad 89 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 8a 89 fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 794.224455] RSP: 002b:00007f4258f54a78 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 794.232169] RAX: ffffffffffffffda RBX: 00007f4258f54b10 RCX: 0000000000460b9a [ 794.239440] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007f4258f54ad0 [ 794.246713] RBP: 00007f4258f54ad0 R08: 00007f4258f54b10 R09: 0000000020000000 [ 794.253986] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000020000000 [ 794.261256] R13: 0000000020000100 R14: 0000000020000200 R15: 0000000020000040 [ 794.275361] erofs: root inode @ nid 36 [ 794.279413] erofs: unmounted for /dev/loop4 [ 794.291594] erofs: mounted on /dev/loop3 with opts: fault_injection=0x0000000000000000. 03:50:41 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000c80)=@raw={'raw\x00', 0x3c1, 0x3, 0x308, 0x0, 0x150, 0x150, 0x0, 0x3, 0x238, 0x238, 0x238, 0x238, 0x238, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x3], 0x0, 0x128, 0x150, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'dummy0\x00', {0x0, 0x0, 0x3, 0x0, 0x0, 0xfffd, 0x7}}}, @common=@ipv6header={{0x28, 'ipv6header\x00'}, {0x0, 0x81}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}, {{@uncond, 0x0, 0xa8, 0xe8}, @common=@inet=@LOG={0x40, 'LOG\x00', 0x0, {0x0, 0x0, "59e2b655a7928de9d18f6f4ce2fcb46e2fbbb084e62170a6b5ab23bc6a36"}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x368) 03:50:41 executing program 3: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1008}], 0x0, &(0x7f0000000040)={[{@fault_injection={'fault_injection'}}, {@noacl='noacl'}]}) 03:50:41 executing program 4: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010057040c0024", 0xf, 0x400}, {&(0x7f0000010100)="02000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000040)) 03:50:41 executing program 5: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c025", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0xf6ffffff, &(0x7f0000000040)) 03:50:41 executing program 2 (fault-call:0 fault-nth:51): syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="10000300c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000040)) [ 794.430546] erofs: unmounted for /dev/loop3 03:50:42 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000c80)=@raw={'raw\x00', 0x3c1, 0x3, 0x308, 0x0, 0x150, 0x150, 0x0, 0x3, 0x238, 0x238, 0x238, 0x238, 0x238, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x3], 0x0, 0x128, 0x150, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'dummy0\x00', {0x0, 0x0, 0x3, 0x0, 0x0, 0xfffd, 0x7}}}, @common=@ipv6header={{0x28, 'ipv6header\x00'}, {0x0, 0x81}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}, {{@uncond, 0x0, 0xa8, 0xe8}, @common=@inet=@LOG={0x40, 'LOG\x00', 0x0, {0x0, 0x0, "59e2b655a7928de9d18f6f4ce2fcb46e2fbbb084e62170a6b5ab23bc6a36"}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x368) 03:50:42 executing program 0: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="10000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x225c17d03, &(0x7f0000000040)) 03:50:42 executing program 5: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c025", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0xfcfdffff, &(0x7f0000000040)) 03:50:42 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000c80)=@raw={'raw\x00', 0x3c1, 0x3, 0x308, 0x0, 0x150, 0x150, 0x0, 0x3, 0x238, 0x238, 0x238, 0x238, 0x238, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x3], 0x0, 0x128, 0x150, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'dummy0\x00', {0x0, 0x0, 0x3, 0x0, 0x0, 0xfffd, 0x7}}}, @common=@ipv6header={{0x28, 'ipv6header\x00'}, {0x0, 0x81}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}, {{@uncond, 0x0, 0xa8, 0xe8}, @common=@inet=@LOG={0x40, 'LOG\x00', 0x0, {0x0, 0x0, "59e2b655a7928de9d18f6f4ce2fcb46e2fbbb084e62170a6b5ab23bc6a36"}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x368) [ 794.526875] erofs: read_super, device -> /dev/loop4 [ 794.532343] erofs: options -> [ 794.563665] erofs: read_super, device -> /dev/loop2 [ 794.566015] erofs: root inode @ nid 36 03:50:42 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000c80)=@raw={'raw\x00', 0x3c1, 0x3, 0x308, 0x0, 0x150, 0x150, 0x0, 0x3, 0x238, 0x238, 0x238, 0x238, 0x238, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x3], 0x0, 0x128, 0x150, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'dummy0\x00', {0x0, 0x0, 0x3, 0x0, 0x0, 0xfffd, 0x7}}}, @common=@ipv6header={{0x28, 'ipv6header\x00'}, {0x0, 0x81}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}, {{@uncond, 0x0, 0xa8, 0xe8}, @common=@inet=@LOG={0x40, 'LOG\x00', 0x0, {0x0, 0x0, "59e2b655a7928de9d18f6f4ce2fcb46e2fbbb084e62170a6b5ab23bc6a36"}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x368) [ 794.579636] erofs: mounted on /dev/loop4 with opts: . [ 794.582350] erofs: options -> 03:50:42 executing program 4: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010058040c0024", 0xf, 0x400}, {&(0x7f0000010100)="02000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000040)) [ 794.625584] erofs: root inode @ nid 36 [ 794.632032] FAULT_INJECTION: forcing a failure. [ 794.632032] name failslab, interval 1, probability 0, space 0, times 0 [ 794.646048] erofs: unmounted for /dev/loop4 [ 794.664992] CPU: 1 PID: 13405 Comm: syz-executor.2 Not tainted 4.19.163-syzkaller #0 03:50:42 executing program 5: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c025", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0xfeffffff, &(0x7f0000000040)) 03:50:42 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000c80)=@raw={'raw\x00', 0x3c1, 0x3, 0x308, 0x0, 0x150, 0x150, 0x0, 0x3, 0x238, 0x238, 0x238, 0x238, 0x238, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x3], 0x0, 0x128, 0x150, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'dummy0\x00', {0x0, 0x0, 0x3, 0x0, 0x0, 0xfffd, 0x7}}}, @common=@ipv6header={{0x28, 'ipv6header\x00'}, {0x0, 0x81}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}, {{@uncond, 0x0, 0xa8, 0xe8}, @common=@inet=@LOG={0x40, 'LOG\x00', 0x0, {0x0, 0x0, "59e2b655a7928de9d18f6f4ce2fcb46e2fbbb084e62170a6b5ab23bc6a36"}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x368) [ 794.672902] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 794.682254] Call Trace: [ 794.684846] dump_stack+0x1fc/0x2fe [ 794.688602] should_fail.cold+0xa/0x14 [ 794.692500] ? setup_fault_attr+0x200/0x200 [ 794.696826] ? lock_acquire+0x170/0x3c0 [ 794.700817] __should_failslab+0x115/0x180 [ 794.705063] should_failslab+0x5/0xf [ 794.708783] kmem_cache_alloc+0x277/0x370 [ 794.712942] ? destroy_inode+0x20/0x20 [ 794.716834] alloc_inode+0x18/0x50 [ 794.720379] ? destroy_inode+0x20/0x20 [ 794.724270] alloc_inode+0x5d/0x180 [ 794.727902] new_inode+0x1d/0xf0 [ 794.731273] erofs_fill_super+0xde9/0x12cc [ 794.735519] ? init_once+0x13/0x13 [ 794.739067] ? vsprintf+0x30/0x30 [ 794.742534] ? wait_for_completion_io+0x10/0x10 [ 794.747210] ? set_blocksize+0x163/0x3f0 [ 794.751287] mount_bdev+0x2fc/0x3b0 [ 794.754922] ? init_once+0x13/0x13 [ 794.758500] erofs_mount+0x8c/0xc0 [ 794.762047] ? erofs_kill_sb+0x20/0x20 [ 794.765945] ? alloc_pages_current+0x19b/0x2a0 [ 794.770531] ? __lockdep_init_map+0x100/0x5a0 [ 794.775040] mount_fs+0xa3/0x30c [ 794.778418] vfs_kern_mount.part.0+0x68/0x470 [ 794.782925] do_mount+0x113c/0x2f10 [ 794.786570] ? lock_acquire+0x170/0x3c0 [ 794.790539] ? check_preemption_disabled+0x41/0x280 [ 794.795614] ? copy_mount_string+0x40/0x40 [ 794.799833] ? copy_mount_options+0x59/0x380 [ 794.804226] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 794.809225] ? kmem_cache_alloc_trace+0x323/0x380 [ 794.814062] ? copy_mount_options+0x26f/0x380 [ 794.818559] ksys_mount+0xcf/0x130 [ 794.822082] __x64_sys_mount+0xba/0x150 [ 794.826038] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 794.830603] do_syscall_64+0xf9/0x620 [ 794.834390] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 794.839563] RIP: 0033:0x460b9a [ 794.842747] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 ad 89 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 8a 89 fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 794.861646] RSP: 002b:00007f4258f54a78 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 794.869337] RAX: ffffffffffffffda RBX: 00007f4258f54b10 RCX: 0000000000460b9a [ 794.876592] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007f4258f54ad0 [ 794.883843] RBP: 00007f4258f54ad0 R08: 00007f4258f54b10 R09: 0000000020000000 [ 794.891091] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000020000000 [ 794.898339] R13: 0000000020000100 R14: 0000000020000200 R15: 0000000020000040 [ 794.991515] erofs: read_super, device -> /dev/loop3 [ 794.996828] erofs: options -> fault_injection=0x0000000000000000,noacl, [ 795.005156] erofs: FAULT_INJECTION was not selected [ 795.023763] erofs: root inode @ nid 36 [ 795.033306] erofs: mounted on /dev/loop3 with opts: fault_injection=0x0000000000000000. 03:50:42 executing program 3: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1009}], 0x0, &(0x7f0000000040)={[{@fault_injection={'fault_injection'}}, {@noacl='noacl'}]}) 03:50:42 executing program 5: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c025", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0xfffffdef, &(0x7f0000000040)) 03:50:42 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000c80)=@raw={'raw\x00', 0x3c1, 0x3, 0x308, 0x0, 0x150, 0x150, 0x0, 0x3, 0x238, 0x238, 0x238, 0x238, 0x238, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x3], 0x0, 0x128, 0x150, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'dummy0\x00', {0x0, 0x0, 0x3, 0x0, 0x0, 0xfffd, 0x7}}}, @common=@ipv6header={{0x28, 'ipv6header\x00'}, {0x0, 0x81}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}, {{@uncond, 0x0, 0xa8, 0xe8}, @common=@inet=@LOG={0x40, 'LOG\x00', 0x0, {0x0, 0x0, "59e2b655a7928de9d18f6f4ce2fcb46e2fbbb084e62170a6b5ab23bc6a36"}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x368) 03:50:42 executing program 2 (fault-call:0 fault-nth:52): syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="10000300c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000040)) 03:50:42 executing program 0: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="10000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x7ffffffff000, &(0x7f0000000040)) [ 795.062047] erofs: read_super, device -> /dev/loop4 [ 795.067452] erofs: options -> [ 795.071084] erofs: root inode @ nid 36 [ 795.086156] erofs: mounted on /dev/loop4 with opts: . 03:50:42 executing program 4: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010059040c0024", 0xf, 0x400}, {&(0x7f0000010100)="02000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000040)) [ 795.127541] erofs: unmounted for /dev/loop3 [ 795.144398] erofs: unmounted for /dev/loop4 03:50:42 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000c80)=@raw={'raw\x00', 0x3c1, 0x3, 0x308, 0x0, 0x150, 0x150, 0x0, 0x3, 0x238, 0x238, 0x238, 0x238, 0x238, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x3], 0x0, 0x128, 0x150, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'dummy0\x00', {0x0, 0x0, 0x3, 0x0, 0x0, 0xfffd, 0x7}}}, @common=@ipv6header={{0x28, 'ipv6header\x00'}, {0x0, 0x81}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}, {{@uncond, 0x0, 0xa8, 0xe8}, @common=@inet=@LOG={0x40, 'LOG\x00', 0x0, {0x0, 0x0, "59e2b655a7928de9d18f6f4ce2fcb46e2fbbb084e62170a6b5ab23bc6a36"}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x368) [ 795.168728] erofs: read_super, device -> /dev/loop2 [ 795.174000] erofs: options -> [ 795.178761] erofs: root inode @ nid 36 [ 795.182889] FAULT_INJECTION: forcing a failure. [ 795.182889] name failslab, interval 1, probability 0, space 0, times 0 [ 795.231441] erofs: read_super, device -> /dev/loop3 [ 795.236910] erofs: options -> fault_injection=0x0000000000000000,noacl, [ 795.262109] erofs: FAULT_INJECTION was not selected [ 795.263688] CPU: 1 PID: 13461 Comm: syz-executor.2 Not tainted 4.19.163-syzkaller #0 [ 795.269581] erofs: root inode @ nid 36 03:50:42 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000c80)=@raw={'raw\x00', 0x3c1, 0x3, 0x308, 0x0, 0x150, 0x150, 0x0, 0x3, 0x238, 0x238, 0x238, 0x238, 0x238, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x3], 0x0, 0x128, 0x150, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'dummy0\x00', {0x0, 0x0, 0x3, 0x0, 0x0, 0xfffd, 0x7}}}, @common=@ipv6header={{0x28, 'ipv6header\x00'}, {0x0, 0x81}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}, {{@uncond, 0x0, 0xa8, 0xe8}, @common=@inet=@LOG={0x40, 'LOG\x00', 0x0, {0x0, 0x0, "59e2b655a7928de9d18f6f4ce2fcb46e2fbbb084e62170a6b5ab23bc6a36"}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x368) [ 795.275018] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 795.275024] Call Trace: [ 795.275044] dump_stack+0x1fc/0x2fe [ 795.275063] should_fail.cold+0xa/0x14 [ 795.275081] ? setup_fault_attr+0x200/0x200 [ 795.281588] erofs: mounted on /dev/loop3 with opts: fault_injection=0x0000000000000000. [ 795.288296] ? lock_acquire+0x170/0x3c0 [ 795.288320] __should_failslab+0x115/0x180 [ 795.288335] should_failslab+0x5/0xf [ 795.288347] kmem_cache_alloc+0x277/0x370 [ 795.288360] ? destroy_inode+0x20/0x20 03:50:42 executing program 5: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c025", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0xfffffdfc, &(0x7f0000000040)) 03:50:42 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000c80)=@raw={'raw\x00', 0x3c1, 0x3, 0x308, 0x0, 0x150, 0x150, 0x0, 0x3, 0x238, 0x238, 0x238, 0x238, 0x238, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x3], 0x0, 0x128, 0x150, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'dummy0\x00', {0x0, 0x0, 0x3, 0x0, 0x0, 0xfffd, 0x7}}}, @common=@ipv6header={{0x28, 'ipv6header\x00'}, {0x0, 0x81}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}, {{@uncond, 0x0, 0xa8, 0xe8}, @common=@inet=@LOG={0x40, 'LOG\x00', 0x0, {0x0, 0x0, "59e2b655a7928de9d18f6f4ce2fcb46e2fbbb084e62170a6b5ab23bc6a36"}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x368) [ 795.288371] alloc_inode+0x18/0x50 [ 795.288381] ? destroy_inode+0x20/0x20 [ 795.288394] alloc_inode+0x5d/0x180 [ 795.288410] new_inode+0x1d/0xf0 [ 795.345238] erofs_fill_super+0xde9/0x12cc [ 795.349491] ? init_once+0x13/0x13 [ 795.353038] ? vsprintf+0x30/0x30 [ 795.356507] ? wait_for_completion_io+0x10/0x10 [ 795.361182] ? set_blocksize+0x163/0x3f0 [ 795.365270] mount_bdev+0x2fc/0x3b0 [ 795.368904] ? init_once+0x13/0x13 [ 795.372449] erofs_mount+0x8c/0xc0 [ 795.375993] ? erofs_kill_sb+0x20/0x20 03:50:42 executing program 5: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c025", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0xfffffff6, &(0x7f0000000040)) [ 795.379893] ? alloc_pages_current+0x19b/0x2a0 [ 795.384477] ? __lockdep_init_map+0x100/0x5a0 [ 795.388981] mount_fs+0xa3/0x30c [ 795.392357] vfs_kern_mount.part.0+0x68/0x470 [ 795.396866] do_mount+0x113c/0x2f10 [ 795.400499] ? lock_acquire+0x170/0x3c0 [ 795.404479] ? check_preemption_disabled+0x41/0x280 [ 795.409504] ? copy_mount_string+0x40/0x40 [ 795.413745] ? copy_mount_options+0x59/0x380 [ 795.418162] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 795.423182] ? kmem_cache_alloc_trace+0x323/0x380 03:50:42 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000c80)=@raw={'raw\x00', 0x3c1, 0x3, 0x308, 0x0, 0x150, 0x150, 0x0, 0x3, 0x238, 0x238, 0x238, 0x238, 0x238, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x3], 0x0, 0x128, 0x150, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'dummy0\x00', {0x0, 0x0, 0x3, 0x0, 0x0, 0xfffd, 0x7}}}, @common=@ipv6header={{0x28, 'ipv6header\x00'}, {0x0, 0x81}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}, {{@uncond, 0x0, 0xa8, 0xe8}, @common=@inet=@LOG={0x40, 'LOG\x00', 0x0, {0x0, 0x0, "59e2b655a7928de9d18f6f4ce2fcb46e2fbbb084e62170a6b5ab23bc6a36"}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x368) [ 795.428033] ? copy_mount_options+0x26f/0x380 [ 795.432537] ksys_mount+0xcf/0x130 [ 795.436087] __x64_sys_mount+0xba/0x150 [ 795.440067] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 795.444675] do_syscall_64+0xf9/0x620 [ 795.448487] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 795.453677] RIP: 0033:0x460b9a [ 795.456875] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 ad 89 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 8a 89 fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 795.475776] RSP: 002b:00007f4258f54a78 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 795.483488] RAX: ffffffffffffffda RBX: 00007f4258f54b10 RCX: 0000000000460b9a [ 795.490784] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007f4258f54ad0 [ 795.498057] RBP: 00007f4258f54ad0 R08: 00007f4258f54b10 R09: 0000000020000000 [ 795.505317] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000020000000 [ 795.512569] R13: 0000000020000100 R14: 0000000020000200 R15: 0000000020000040 03:50:43 executing program 3: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1010}], 0x0, &(0x7f0000000040)={[{@fault_injection={'fault_injection'}}, {@noacl='noacl'}]}) 03:50:43 executing program 5: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c025", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0xfffffffe, &(0x7f0000000040)) 03:50:43 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000c80)=@raw={'raw\x00', 0x3c1, 0x3, 0x308, 0x0, 0x150, 0x150, 0x0, 0x3, 0x238, 0x238, 0x238, 0x238, 0x238, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x3], 0x0, 0x128, 0x150, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'dummy0\x00', {0x0, 0x0, 0x3, 0x0, 0x0, 0xfffd, 0x7}}}, @common=@ipv6header={{0x28, 'ipv6header\x00'}, {0x0, 0x81}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}, {{@uncond, 0x0, 0xa8, 0xe8}, @common=@inet=@LOG={0x40, 'LOG\x00', 0x0, {0x0, 0x0, "59e2b655a7928de9d18f6f4ce2fcb46e2fbbb084e62170a6b5ab23bc6a36"}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x368) 03:50:43 executing program 0: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="10000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x1000000000000, &(0x7f0000000040)) 03:50:43 executing program 2 (fault-call:0 fault-nth:53): syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="10000300c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000040)) [ 795.559295] erofs: read_super, device -> /dev/loop4 [ 795.566071] erofs: options -> [ 795.572552] erofs: root inode @ nid 36 [ 795.578395] erofs: mounted on /dev/loop4 with opts: . 03:50:43 executing program 4: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf01005a040c0024", 0xf, 0x400}, {&(0x7f0000010100)="02000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000040)) [ 795.635259] erofs: unmounted for /dev/loop3 [ 795.656773] erofs: unmounted for /dev/loop4 03:50:43 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000c80)=@raw={'raw\x00', 0x3c1, 0x3, 0x308, 0x0, 0x150, 0x150, 0x0, 0x3, 0x238, 0x238, 0x238, 0x238, 0x238, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x3], 0x0, 0x128, 0x150, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'dummy0\x00', {0x0, 0x0, 0x3, 0x0, 0x0, 0xfffd, 0x7}}}, @common=@ipv6header={{0x28, 'ipv6header\x00'}, {0x0, 0x81}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}, {{@uncond, 0x0, 0xa8, 0xe8}, @common=@inet=@LOG={0x40, 'LOG\x00', 0x0, {0x0, 0x0, "59e2b655a7928de9d18f6f4ce2fcb46e2fbbb084e62170a6b5ab23bc6a36"}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x368) 03:50:43 executing program 5: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c025", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x7ffffffff000, &(0x7f0000000040)) 03:50:43 executing program 0: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="10000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x7ffffffffffff, &(0x7f0000000040)) [ 795.722728] erofs: read_super, device -> /dev/loop2 [ 795.729548] erofs: options -> [ 795.734625] erofs: read_super, device -> /dev/loop3 [ 795.743400] FAULT_INJECTION: forcing a failure. [ 795.743400] name failslab, interval 1, probability 0, space 0, times 0 [ 795.761502] erofs: options -> fault_injection=0x0000000000000000,noacl, [ 795.784407] CPU: 0 PID: 13509 Comm: syz-executor.2 Not tainted 4.19.163-syzkaller #0 [ 795.792320] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 795.801676] Call Trace: [ 795.803366] erofs: FAULT_INJECTION was not selected [ 795.804270] dump_stack+0x1fc/0x2fe [ 795.812893] should_fail.cold+0xa/0x14 [ 795.816791] ? setup_fault_attr+0x200/0x200 [ 795.821132] __should_failslab+0x115/0x180 [ 795.821246] erofs: root inode @ nid 36 [ 795.825370] should_failslab+0x5/0xf [ 795.825383] kmem_cache_alloc+0x3f/0x370 [ 795.825400] ? mempool_alloc+0x350/0x350 [ 795.840638] erofs: mounted on /dev/loop3 with opts: fault_injection=0x0000000000000000. [ 795.841083] mempool_alloc+0x146/0x350 [ 795.853101] ? mempool_resize+0x790/0x790 [ 795.857260] ? lock_downgrade+0x720/0x720 [ 795.861423] ? mark_held_locks+0xa6/0xf0 [ 795.865514] bio_alloc_bioset+0x389/0x5e0 [ 795.869671] ? __find_get_block+0x314/0xde0 [ 795.874001] ? bvec_alloc+0x2f0/0x2f0 [ 795.877814] ? __getblk_slow+0x6a3/0x9e0 [ 795.881886] submit_bh_wbc+0x141/0x760 [ 795.885788] __bread_gfp+0x14e/0x300 [ 795.889509] erofs_fill_super+0x207/0x12cc [ 795.893755] ? init_once+0x13/0x13 [ 795.897317] ? vsprintf+0x30/0x30 [ 795.900785] ? wait_for_completion_io+0x10/0x10 [ 795.905457] ? set_blocksize+0x163/0x3f0 [ 795.909531] mount_bdev+0x2fc/0x3b0 [ 795.913171] ? init_once+0x13/0x13 [ 795.916723] erofs_mount+0x8c/0xc0 [ 795.920268] ? erofs_kill_sb+0x20/0x20 [ 795.924162] ? alloc_pages_current+0x19b/0x2a0 [ 795.928745] ? __lockdep_init_map+0x100/0x5a0 [ 795.933247] mount_fs+0xa3/0x30c [ 795.936623] vfs_kern_mount.part.0+0x68/0x470 [ 795.941129] do_mount+0x113c/0x2f10 [ 795.944765] ? lock_acquire+0x170/0x3c0 [ 795.948749] ? check_preemption_disabled+0x41/0x280 [ 795.953772] ? copy_mount_string+0x40/0x40 [ 795.958016] ? copy_mount_options+0x59/0x380 [ 795.962429] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 795.967449] ? kmem_cache_alloc_trace+0x323/0x380 [ 795.972296] ? copy_mount_options+0x26f/0x380 [ 795.976801] ksys_mount+0xcf/0x130 [ 795.980349] __x64_sys_mount+0xba/0x150 [ 795.984329] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 795.988913] do_syscall_64+0xf9/0x620 [ 795.992727] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 795.997930] RIP: 0033:0x460b9a [ 796.001125] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 ad 89 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 8a 89 fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 796.020026] RSP: 002b:00007f4258f54a78 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 796.027738] RAX: ffffffffffffffda RBX: 00007f4258f54b10 RCX: 0000000000460b9a 03:50:43 executing program 5: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c025", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x1000000000000, &(0x7f0000000040)) 03:50:43 executing program 5: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c025", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x7ffffffffffff, &(0x7f0000000040)) 03:50:43 executing program 5: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c025", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x20000000000000, &(0x7f0000000040)) 03:50:43 executing program 3: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1014}], 0x0, &(0x7f0000000040)={[{@fault_injection={'fault_injection'}}, {@noacl='noacl'}]}) 03:50:43 executing program 5: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c025", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0xf0ffffff7f0000, &(0x7f0000000040)) [ 796.035009] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007f4258f54ad0 [ 796.042278] RBP: 00007f4258f54ad0 R08: 00007f4258f54b10 R09: 0000000020000000 [ 796.043169] erofs: read_super, device -> /dev/loop4 [ 796.049544] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000020000000 [ 796.049552] R13: 0000000020000100 R14: 0000000020000200 R15: 0000000020000040 [ 796.072312] erofs: options -> [ 796.072837] erofs: unmounted for /dev/loop3 [ 796.075668] erofs: root inode @ nid 36 03:50:43 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000c80)=@raw={'raw\x00', 0x3c1, 0x3, 0x308, 0x0, 0x150, 0x150, 0x0, 0x3, 0x238, 0x238, 0x238, 0x238, 0x238, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x3], 0x0, 0x128, 0x150, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'dummy0\x00', {0x0, 0x0, 0x3, 0x0, 0x0, 0xfffd, 0x7}}}, @common=@ipv6header={{0x28, 'ipv6header\x00'}, {0x0, 0x81}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}, {{@uncond, 0x0, 0xa8, 0xe8}, @common=@inet=@LOG={0x40, 'LOG\x00', 0x0, {0x0, 0x0, "59e2b655a7928de9d18f6f4ce2fcb46e2fbbb084e62170a6b5ab23bc6a36"}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x368) [ 796.084292] erofs: mounted on /dev/loop4 with opts: . 03:50:43 executing program 4: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf01005b040c0024", 0xf, 0x400}, {&(0x7f0000010100)="02000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000040)) [ 796.121658] erofs: unmounted for /dev/loop4 [ 796.137681] erofs: root inode @ nid 36 [ 796.151750] erofs: mounted on /dev/loop2 with opts: . [ 796.245412] erofs: read_super, device -> /dev/loop3 03:50:43 executing program 2 (fault-call:0 fault-nth:54): syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="10000300c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000040)) 03:50:43 executing program 5: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c025", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x100000000000000, &(0x7f0000000040)) 03:50:43 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000c80)=@raw={'raw\x00', 0x3c1, 0x3, 0x308, 0x0, 0x150, 0x150, 0x0, 0x3, 0x238, 0x238, 0x238, 0x238, 0x238, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xca, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x3], 0x0, 0x128, 0x150, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'dummy0\x00', {0x0, 0x0, 0x3, 0x0, 0x0, 0xfffd, 0x7}}}, @common=@ipv6header={{0x28, 'ipv6header\x00'}, {0x0, 0x81}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}, {{@uncond, 0x0, 0xa8, 0xe8}, @common=@inet=@LOG={0x40, 'LOG\x00', 0x0, {0x0, 0x0, "59e2b655a7928de9d18f6f4ce2fcb46e2fbbb084e62170a6b5ab23bc6a36"}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x368) [ 796.289394] erofs: options -> fault_injection=0x0000000000000000,noacl, [ 796.314035] erofs: unmounted for /dev/loop2 [ 796.322356] erofs: FAULT_INJECTION was not selected [ 796.329397] erofs: root inode @ nid 36 [ 796.335476] erofs: read_super, device -> /dev/loop4 [ 796.348604] erofs: mounted on /dev/loop3 with opts: fault_injection=0x0000000000000000. [ 796.349381] erofs: options -> 03:50:43 executing program 0: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="10000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x20000000000000, &(0x7f0000000040)) 03:50:43 executing program 3: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1060}], 0x0, &(0x7f0000000040)={[{@fault_injection={'fault_injection'}}, {@noacl='noacl'}]}) [ 796.403441] erofs: root inode @ nid 36 [ 796.422611] erofs: unmounted for /dev/loop3 [ 796.423527] erofs: mounted on /dev/loop4 with opts: . [ 796.442223] erofs: read_super, device -> /dev/loop2 03:50:43 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000c80)=@raw={'raw\x00', 0x3c1, 0x3, 0x308, 0x0, 0x150, 0x150, 0x0, 0x3, 0x238, 0x238, 0x238, 0x238, 0x238, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x3], 0x0, 0x128, 0x150, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'dummy0\x00', {0x0, 0x0, 0x3, 0x0, 0x0, 0xfffd, 0x7}}}, @common=@ipv6header={{0x28, 'ipv6header\x00'}, {0x0, 0x81}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}, {{@uncond, 0x0, 0xa8, 0xe8}, @common=@inet=@LOG={0x40, 'LOG\x00', 0x0, {0x0, 0x0, "59e2b655a7928de9d18f6f4ce2fcb46e2fbbb084e62170a6b5ab23bc6a36"}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x368) 03:50:44 executing program 5: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c025", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x200000000000000, &(0x7f0000000040)) [ 796.450829] erofs: options -> [ 796.454539] erofs: root inode @ nid 36 [ 796.460925] FAULT_INJECTION: forcing a failure. [ 796.460925] name failslab, interval 1, probability 0, space 0, times 0 [ 796.481576] CPU: 0 PID: 13584 Comm: syz-executor.2 Not tainted 4.19.163-syzkaller #0 [ 796.489481] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 796.498832] Call Trace: [ 796.501442] dump_stack+0x1fc/0x2fe [ 796.505082] should_fail.cold+0xa/0x14 [ 796.508976] ? setup_fault_attr+0x200/0x200 [ 796.513317] ? lock_acquire+0x170/0x3c0 [ 796.517310] __should_failslab+0x115/0x180 [ 796.521545] should_failslab+0x5/0xf [ 796.525261] kmem_cache_alloc+0x277/0x370 [ 796.529425] erofs_fill_super+0x10a1/0x12cc [ 796.533755] ? init_once+0x13/0x13 [ 796.537310] ? vsprintf+0x30/0x30 [ 796.540771] ? wait_for_completion_io+0x10/0x10 [ 796.545442] ? set_blocksize+0x163/0x3f0 [ 796.549518] mount_bdev+0x2fc/0x3b0 03:50:44 executing program 5: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c025", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x300000000000000, &(0x7f0000000040)) 03:50:44 executing program 5: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c025", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x400000000000000, &(0x7f0000000040)) 03:50:44 executing program 5: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c025", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x700000000000000, &(0x7f0000000040)) [ 796.553148] ? init_once+0x13/0x13 [ 796.556697] erofs_mount+0x8c/0xc0 [ 796.560243] ? erofs_kill_sb+0x20/0x20 [ 796.564138] ? alloc_pages_current+0x19b/0x2a0 [ 796.568736] ? __lockdep_init_map+0x100/0x5a0 [ 796.573238] mount_fs+0xa3/0x30c [ 796.576621] vfs_kern_mount.part.0+0x68/0x470 [ 796.581129] do_mount+0x113c/0x2f10 [ 796.584775] ? copy_mount_string+0x40/0x40 [ 796.589026] ? copy_mount_options+0x1f4/0x380 [ 796.593532] ? copy_mount_options+0x26f/0x380 [ 796.598038] ksys_mount+0xcf/0x130 03:50:44 executing program 5: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf010000000c0024", 0xf, 0x400}, {&(0x7f0000010100)="05000000c025", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x8000000000000000, &(0x7f0000000040)) [ 796.601589] __x64_sys_mount+0xba/0x150 [ 796.605567] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 796.610157] do_syscall_64+0xf9/0x620 [ 796.613964] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 796.619156] RIP: 0033:0x460b9a [ 796.622364] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 ad 89 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 8a 89 fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 796.641268] RSP: 002b:00007f4258f54a78 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 03:50:44 executing program 4: syz_mount_image$erofs(&(0x7f0000000000)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e08a3f0fcf01005c040c0024", 0xf, 0x400}, {&(0x7f0000010100)="02000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000040)) [ 796.648973] RAX: ffffffffffffffda RBX: 00007f4258f54b10 RCX: 0000000000460b9a [ 796.656232] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007f4258f54ad0 [ 796.663494] RBP: 00007f4258f54ad0 R08: 00007f4258f54b10 R09: 0000000020000000 [ 796.670752] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000020000000 [ 796.678003] R13: 0000000020000100 R14: 0000000020000200 R15: 0000000020000040 [ 796.691307] erofs: unmounted for /dev/loop4 [ 796.696991] BUG: Dentry 00000000b42de44c{i=0,n=/} still in use (-128) [unmount of erofs loop2] [ 796.706701] ------------[ cut here ]------------ [ 796.711601] WARNING: CPU: 0 PID: 13584 at fs/dcache.c:1518 umount_check.cold+0xf2/0x116 [ 796.711918] erofs: read_super, device -> /dev/loop3 [ 796.719734] Kernel panic - not syncing: panic_on_warn set ... [ 796.719734] [ 796.719978] CPU: 0 PID: 13584 Comm: syz-executor.2 Not tainted 4.19.163-syzkaller #0 [ 796.719986] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 796.719991] Call Trace: [ 796.720012] dump_stack+0x1fc/0x2fe [ 796.736272] erofs: options -> fault_injection=0x0000000000000000,noacl, [ 796.740261] panic+0x26a/0x50e [ 796.740277] ? __warn_printk+0xf3/0xf3 [ 796.740299] ? umount_check.cold+0xf2/0x116 [ 796.740314] ? __probe_kernel_read+0x130/0x1b0 [ 796.740325] ? __warn.cold+0x5/0x61 [ 796.740341] ? umount_check.cold+0xf2/0x116 [ 796.740353] __warn.cold+0x20/0x61 [ 796.740368] ? umount_check.cold+0xf2/0x116 [ 796.740383] report_bug+0x262/0x2b0 [ 796.740401] do_error_trap+0x1d7/0x310 [ 796.740415] ? math_error+0x310/0x310 [ 796.740429] ? irq_work_claim+0xa6/0xc0 [ 796.740445] ? irq_work_queue+0x29/0x80 [ 796.740460] ? error_entry+0x72/0xd0 [ 796.740475] ? trace_hardirqs_off_caller+0x6e/0x210 [ 796.740493] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 796.740511] invalid_op+0x14/0x20 [ 796.740527] RIP: 0010:umount_check.cold+0xf2/0x116 [ 796.740541] Code: ff 4d 89 f1 45 89 e0 48 89 e9 41 55 4c 89 fa 48 89 ee 48 c7 c7 c0 a2 74 88 e8 82 00 a4 ff 48 c7 c7 c0 a1 74 88 e8 76 00 a4 ff <0f> 0b 58 e9 fe 9a ff ff e8 9a 2f ef ff e9 22 ff ff ff 48 89 df e8 [ 796.740548] RSP: 0018:ffff88804434fa98 EFLAGS: 00010286 [ 796.740559] RAX: 0000000000000024 RBX: 0000000000000000 RCX: 0000000000000000 [ 796.740568] RDX: 0000000000040000 RSI: ffffffff814fdbb1 RDI: ffffed1008869f45 [ 796.740575] RBP: ffff88809625f420 R08: 0000000000000024 R09: 0000000000000000 [ 796.740583] R10: 0000000000000005 R11: 0000000000000000 R12: 00000000ffffff80 [ 796.740592] R13: ffff8880951d3190 R14: ffffffff893f5040 R15: 0000000000000000 [ 796.740615] ? vprintk_func+0x81/0x17e [ 796.740630] ? umount_check.cold+0xf2/0x116 [ 796.740650] d_walk+0x196/0x990 [ 796.764428] erofs: FAULT_INJECTION was not selected [ 796.766104] ? shrink_dcache_parent+0x120/0x120 [ 796.766122] ? debug_check_no_obj_freed+0x201/0x482 [ 796.766149] shrink_dcache_for_umount+0x87/0x330 [ 796.766168] generic_shutdown_super+0x68/0x370 [ 796.766184] kill_block_super+0x97/0xf0 [ 796.772470] erofs: root inode @ nid 36 [ 796.774365] deactivate_locked_super+0x94/0x160 [ 796.774382] mount_bdev+0x373/0x3b0 [ 796.774394] ? init_once+0x13/0x13 [ 796.774414] erofs_mount+0x8c/0xc0 [ 796.781088] erofs: mounted on /dev/loop3 with opts: fault_injection=0x0000000000000000. [ 796.782589] ? erofs_kill_sb+0x20/0x20 [ 796.782609] ? alloc_pages_current+0x19b/0x2a0 [ 796.782622] ? __lockdep_init_map+0x100/0x5a0 [ 796.782646] mount_fs+0xa3/0x30c [ 796.979288] vfs_kern_mount.part.0+0x68/0x470 [ 796.983771] do_mount+0x113c/0x2f10 [ 796.987399] ? copy_mount_string+0x40/0x40 [ 796.991626] ? copy_mount_options+0x1f4/0x380 [ 796.996105] ? copy_mount_options+0x26f/0x380 [ 797.000589] ksys_mount+0xcf/0x130 [ 797.004118] __x64_sys_mount+0xba/0x150 [ 797.008087] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 797.012651] do_syscall_64+0xf9/0x620 [ 797.016438] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 797.021608] RIP: 0033:0x460b9a [ 797.024782] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 ad 89 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 8a 89 fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 797.043663] RSP: 002b:00007f4258f54a78 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 797.051372] RAX: ffffffffffffffda RBX: 00007f4258f54b10 RCX: 0000000000460b9a [ 797.058623] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007f4258f54ad0 [ 797.065888] RBP: 00007f4258f54ad0 R08: 00007f4258f54b10 R09: 0000000020000000 [ 797.073138] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000020000000 [ 797.080389] R13: 0000000020000100 R14: 0000000020000200 R15: 0000000020000040 [ 797.089040] Kernel Offset: disabled [ 797.092989] Rebooting in 86400 seconds..