786.523288] erofs: FAULT_INJECTION was not selected [ 786.530266] erofs: read_super, device -> /dev/loop2 [ 786.542380] erofs: options -> fault_injection=0x0000000000000000, [ 786.554379] erofs: root inode @ nid 36 [ 786.558476] erofs: FAULT_INJECTION was not selected [ 786.564317] erofs: root inode @ nid 36 [ 786.566394] erofs: bogus i_mode (0) @ nid 36 19:41:07 executing program 1: syz_mount_image$erofs(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c0024", 0xf, 0x400}, {&(0x7f0000000280)="050000040041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000080)={[{@fault_injection}]}) [ 786.572959] erofs: unsupported i_format 2053 of nid 36 19:41:07 executing program 4: r0 = creat(&(0x7f0000000280)='./file0\x00', 0x3) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[@ANYBLOB='!\t'], 0x191) close(r0) execve(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) bind$bt_l2cap(r1, &(0x7f0000000000), 0x58) listen(r1, 0x0) fstat(r1, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) bind$bt_l2cap(0xffffffffffffffff, &(0x7f0000000000), 0x58) listen(0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_MODE_CREATE_LEASE(0xffffffffffffffff, 0xc01864c6, &(0x7f00000006c0)={&(0x7f0000000680)=[0x9b7, 0x1, 0x9, 0x3, 0x4], 0x5, 0x0, 0x0, 0xffffffffffffffff}) r5 = socket$rxrpc(0x21, 0x2, 0x2) r6 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) bind$bt_l2cap(r6, &(0x7f0000000000), 0x58) listen(r6, 0x0) r7 = openat$proc_mixer(0xffffffffffffff9c, &(0x7f0000000700)='/proc/asound/card1/oss_mixer\x00', 0x0, 0x0) r8 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) bind$bt_l2cap(r8, &(0x7f0000000000), 0x58) listen(r8, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f00000007c0)=[{{0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000140)="1443b36950b9c8aed0447b3837d56d443afa65c89c6f4db07b3dc14583ac3fd1b207a2200e60029dbc71dfb6c9c3b7ebc9b30f1410af", 0x36}, {&(0x7f0000000180)="ff78dead985e5fb2436af9c5ed1c6ad8940c90c7ed5aa9e3a0c22728a13195ff6334f73a1531579f552114062161af28ecf59dd11ac27d24fbf07be30a1b3ce6cd88525962322e97c3314252bcbf876567f22cbef6096a64b2766bbf54538371", 0x60}], 0x2, &(0x7f00000002c0)=[@cred={{0x1c, 0x1, 0x2, {0x0, r2, r3}}}, @cred={{0x1c, 0x1, 0x2, {0x0, r2, r3}}}, @rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c, 0x1, 0x2, {0x0, r2, r3}}}], 0x80}}, {{&(0x7f0000000340)=@abs={0x0, 0x0, 0x4e20}, 0x6e, &(0x7f0000000600)=[{&(0x7f00000003c0)}, {&(0x7f0000000400)="a31de693e1459e8dcbf224165376f28d7fccbba9bfc5a7477559bba55e3d53e778012f551e23eb5aed7b6b25076ae42542bb65d12d92fe874edfc4e8ea54d62d44d45aee6e499894939bfe203f838efa8a8dcc25eaa7bf68584c49d71bc421249f049bb5356f771ff52d4d0319029604ef7c28cee93768e22f5476a3cc1e3842e55cfe12dfd71321850cd9", 0x8b}, {&(0x7f00000004c0)="a7189e93453c0080c4cca07434814cadf0348b1d2bc2e6750aa466a883dfeffd178dd77716bc", 0x26}, {&(0x7f0000000500)="0018f55549ac51d8a468519e166482794654a2e9796e6c99f3f26a10f90ca366ec02e5cce042994754329aa052782abe92c2a057bd77f9dfd2671ed7798744cc7728090132e34d621d5220b6ad4056b26347a3ebf42933555e9c75cea8224733e46c", 0x62}, {&(0x7f0000000580)="2068d55457faf0c26d58966ff700d20c48aa392c777fecdbdee3ba1ac36d629ee76ce303c56161cd0368b19450d1d0b99e408b5aea501980bd93c0d343da656c847a042d72c24a8e8619e48727c6b4b25a2a126791d6bf6d4544e10a0aa8e46a89a574f85542255c46809ef694d454e1f5e5743f23", 0x75}], 0x5, &(0x7f0000000740)=[@rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x28, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r4, r1, r1]}}, @rights={{0x28, 0x1, 0x1, [r5, r6, r7, r8, r0, r0]}}], 0x68, 0x880}}], 0x2, 0x0) 19:41:07 executing program 2: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c0024", 0xf, 0x400}, {&(0x7f0000000280)="053c0200c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000080)={[{@fault_injection}]}) 19:41:07 executing program 5: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00667010000000c0024", 0xf, 0x400}, {&(0x7f0000000280)="05", 0x1, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000080)={[{@fault_injection}]}) [ 786.724773] erofs: read_super, device -> /dev/loop0 [ 786.730073] erofs: read_super, device -> /dev/loop3 [ 786.743539] erofs: options -> [ 786.751510] erofs: options -> fault_injection=0x0000000000000000, [ 786.765088] erofs: cannot find valid erofs superblock [ 786.787592] erofs: FAULT_INJECTION was not selected [ 786.806166] erofs: root inode @ nid 0 [ 786.816178] erofs: bogus i_mode (0) @ nid 0 19:41:07 executing program 0: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e0", 0x4, 0x40e70100}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000080)) 19:41:07 executing program 4: r0 = creat(&(0x7f0000000280)='./file0\x00', 0x3) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[@ANYBLOB='!\t'], 0x191) close(r0) (async, rerun: 64) execve(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) (rerun: 64) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) bind$bt_l2cap(r1, &(0x7f0000000000), 0x58) (async) listen(r1, 0x0) (async) fstat(r1, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) bind$bt_l2cap(0xffffffffffffffff, &(0x7f0000000000), 0x58) listen(0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_MODE_CREATE_LEASE(0xffffffffffffffff, 0xc01864c6, &(0x7f00000006c0)={&(0x7f0000000680)=[0x9b7, 0x1, 0x9, 0x3, 0x4], 0x5, 0x0, 0x0, 0xffffffffffffffff}) (async, rerun: 32) r5 = socket$rxrpc(0x21, 0x2, 0x2) (rerun: 32) r6 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) bind$bt_l2cap(r6, &(0x7f0000000000), 0x58) listen(r6, 0x0) (async) r7 = openat$proc_mixer(0xffffffffffffff9c, &(0x7f0000000700)='/proc/asound/card1/oss_mixer\x00', 0x0, 0x0) (async, rerun: 64) r8 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) (rerun: 64) bind$bt_l2cap(r8, &(0x7f0000000000), 0x58) listen(r8, 0x0) (async) sendmmsg$unix(0xffffffffffffffff, &(0x7f00000007c0)=[{{0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000140)="1443b36950b9c8aed0447b3837d56d443afa65c89c6f4db07b3dc14583ac3fd1b207a2200e60029dbc71dfb6c9c3b7ebc9b30f1410af", 0x36}, {&(0x7f0000000180)="ff78dead985e5fb2436af9c5ed1c6ad8940c90c7ed5aa9e3a0c22728a13195ff6334f73a1531579f552114062161af28ecf59dd11ac27d24fbf07be30a1b3ce6cd88525962322e97c3314252bcbf876567f22cbef6096a64b2766bbf54538371", 0x60}], 0x2, &(0x7f00000002c0)=[@cred={{0x1c, 0x1, 0x2, {0x0, r2, r3}}}, @cred={{0x1c, 0x1, 0x2, {0x0, r2, r3}}}, @rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c, 0x1, 0x2, {0x0, r2, r3}}}], 0x80}}, {{&(0x7f0000000340)=@abs={0x0, 0x0, 0x4e20}, 0x6e, &(0x7f0000000600)=[{&(0x7f00000003c0)}, {&(0x7f0000000400)="a31de693e1459e8dcbf224165376f28d7fccbba9bfc5a7477559bba55e3d53e778012f551e23eb5aed7b6b25076ae42542bb65d12d92fe874edfc4e8ea54d62d44d45aee6e499894939bfe203f838efa8a8dcc25eaa7bf68584c49d71bc421249f049bb5356f771ff52d4d0319029604ef7c28cee93768e22f5476a3cc1e3842e55cfe12dfd71321850cd9", 0x8b}, {&(0x7f00000004c0)="a7189e93453c0080c4cca07434814cadf0348b1d2bc2e6750aa466a883dfeffd178dd77716bc", 0x26}, {&(0x7f0000000500)="0018f55549ac51d8a468519e166482794654a2e9796e6c99f3f26a10f90ca366ec02e5cce042994754329aa052782abe92c2a057bd77f9dfd2671ed7798744cc7728090132e34d621d5220b6ad4056b26347a3ebf42933555e9c75cea8224733e46c", 0x62}, {&(0x7f0000000580)="2068d55457faf0c26d58966ff700d20c48aa392c777fecdbdee3ba1ac36d629ee76ce303c56161cd0368b19450d1d0b99e408b5aea501980bd93c0d343da656c847a042d72c24a8e8619e48727c6b4b25a2a126791d6bf6d4544e10a0aa8e46a89a574f85542255c46809ef694d454e1f5e5743f23", 0x75}], 0x5, &(0x7f0000000740)=[@rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x28, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r4, r1, r1]}}, @rights={{0x28, 0x1, 0x1, [r5, r6, r7, r8, r0, r0]}}], 0x68, 0x880}}], 0x2, 0x0) [ 786.837204] erofs: read_super, device -> /dev/loop2 [ 786.854688] erofs: options -> fault_injection=0x0000000000000000, [ 786.862171] erofs: FAULT_INJECTION was not selected [ 786.867199] erofs: root inode @ nid 36 [ 786.872310] erofs: unsupported i_format 15365 of nid 36 19:41:08 executing program 1: syz_mount_image$erofs(&(0x7f0000000000), 0x0, 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c0024", 0xf, 0x400}, {&(0x7f0000000280)="050000040041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000080)={[{@fault_injection}]}) 19:41:08 executing program 2: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c0024", 0xf, 0x400}, {&(0x7f0000000280)="05000300c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000080)={[{@fault_injection}]}) 19:41:08 executing program 4: r0 = creat(&(0x7f0000000280)='./file0\x00', 0x3) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[@ANYBLOB='!\t'], 0x191) close(r0) (async) execve(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) bind$bt_l2cap(r1, &(0x7f0000000000), 0x58) listen(r1, 0x0) (async) fstat(r1, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) (async) bind$bt_l2cap(0xffffffffffffffff, &(0x7f0000000000), 0x58) (async) listen(0xffffffffffffffff, 0x0) (async) ioctl$DRM_IOCTL_MODE_CREATE_LEASE(0xffffffffffffffff, 0xc01864c6, &(0x7f00000006c0)={&(0x7f0000000680)=[0x9b7, 0x1, 0x9, 0x3, 0x4], 0x5, 0x0, 0x0, 0xffffffffffffffff}) (async) r5 = socket$rxrpc(0x21, 0x2, 0x2) (async) r6 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) bind$bt_l2cap(r6, &(0x7f0000000000), 0x58) (async) listen(r6, 0x0) (async) r7 = openat$proc_mixer(0xffffffffffffff9c, &(0x7f0000000700)='/proc/asound/card1/oss_mixer\x00', 0x0, 0x0) r8 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) bind$bt_l2cap(r8, &(0x7f0000000000), 0x58) (async) listen(r8, 0x0) (async) sendmmsg$unix(0xffffffffffffffff, &(0x7f00000007c0)=[{{0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000140)="1443b36950b9c8aed0447b3837d56d443afa65c89c6f4db07b3dc14583ac3fd1b207a2200e60029dbc71dfb6c9c3b7ebc9b30f1410af", 0x36}, {&(0x7f0000000180)="ff78dead985e5fb2436af9c5ed1c6ad8940c90c7ed5aa9e3a0c22728a13195ff6334f73a1531579f552114062161af28ecf59dd11ac27d24fbf07be30a1b3ce6cd88525962322e97c3314252bcbf876567f22cbef6096a64b2766bbf54538371", 0x60}], 0x2, &(0x7f00000002c0)=[@cred={{0x1c, 0x1, 0x2, {0x0, r2, r3}}}, @cred={{0x1c, 0x1, 0x2, {0x0, r2, r3}}}, @rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c, 0x1, 0x2, {0x0, r2, r3}}}], 0x80}}, {{&(0x7f0000000340)=@abs={0x0, 0x0, 0x4e20}, 0x6e, &(0x7f0000000600)=[{&(0x7f00000003c0)}, {&(0x7f0000000400)="a31de693e1459e8dcbf224165376f28d7fccbba9bfc5a7477559bba55e3d53e778012f551e23eb5aed7b6b25076ae42542bb65d12d92fe874edfc4e8ea54d62d44d45aee6e499894939bfe203f838efa8a8dcc25eaa7bf68584c49d71bc421249f049bb5356f771ff52d4d0319029604ef7c28cee93768e22f5476a3cc1e3842e55cfe12dfd71321850cd9", 0x8b}, {&(0x7f00000004c0)="a7189e93453c0080c4cca07434814cadf0348b1d2bc2e6750aa466a883dfeffd178dd77716bc", 0x26}, {&(0x7f0000000500)="0018f55549ac51d8a468519e166482794654a2e9796e6c99f3f26a10f90ca366ec02e5cce042994754329aa052782abe92c2a057bd77f9dfd2671ed7798744cc7728090132e34d621d5220b6ad4056b26347a3ebf42933555e9c75cea8224733e46c", 0x62}, {&(0x7f0000000580)="2068d55457faf0c26d58966ff700d20c48aa392c777fecdbdee3ba1ac36d629ee76ce303c56161cd0368b19450d1d0b99e408b5aea501980bd93c0d343da656c847a042d72c24a8e8619e48727c6b4b25a2a126791d6bf6d4544e10a0aa8e46a89a574f85542255c46809ef694d454e1f5e5743f23", 0x75}], 0x5, &(0x7f0000000740)=[@rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x28, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r4, r1, r1]}}, @rights={{0x28, 0x1, 0x1, [r5, r6, r7, r8, r0, r0]}}], 0x68, 0x880}}], 0x2, 0x0) [ 787.001434] erofs: read_super, device -> /dev/loop5 [ 787.006483] erofs: options -> fault_injection=0x0000000000000000, [ 787.029205] erofs: read_super, device -> /dev/loop0 19:41:08 executing program 3: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467dfdcdf720c", 0xd, 0x400}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000080)={[{@fault_injection}]}) 19:41:08 executing program 4: r0 = creat(&(0x7f0000000280)='./file0\x00', 0x3) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[@ANYBLOB='!\t'], 0x191) close(r0) execve(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000a00)={0x0, 0x0, &(0x7f00000009c0)={&(0x7f0000000880)=@deltfilter={0x24}, 0x24}}, 0x0) getsockname$packet(r1, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000000c0)=0x14) clock_gettime(0x0, &(0x7f0000000540)={0x0, 0x0}) recvmmsg$unix(r1, &(0x7f00000004c0)=[{{&(0x7f0000000080)=@abs, 0x6e, &(0x7f00000002c0)=[{&(0x7f0000000100)=""/79, 0x4f}, {&(0x7f0000000180)=""/29, 0x1d}, {&(0x7f00000001c0)=""/87, 0x57}, {&(0x7f0000000240)=""/4, 0x4}], 0x4, &(0x7f0000000300)=[@cred={{0x1c}}, @rights={{0x28, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0x48}}, {{0x0, 0x0, &(0x7f0000000380), 0x0, &(0x7f00000003c0)=[@cred={{0x1c}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x1c}}, @rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}], 0xd0}}], 0x2, 0x100, &(0x7f0000000580)={r2, r3+60000000}) [ 787.069937] erofs: options -> [ 787.077105] erofs: cannot find valid erofs superblock [ 787.090682] erofs: FAULT_INJECTION was not selected [ 787.095991] erofs: root inode @ nid 36 [ 787.100302] erofs: bogus i_mode (0) @ nid 36 19:41:08 executing program 1: syz_mount_image$erofs(&(0x7f0000000000), 0x0, 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c0024", 0xf, 0x400}, {&(0x7f0000000280)="050000040041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000080)={[{@fault_injection}]}) 19:41:08 executing program 0: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e0", 0x4, 0x40e80100}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000080)) [ 787.144360] erofs: read_super, device -> /dev/loop2 [ 787.157929] erofs: options -> fault_injection=0x0000000000000000, [ 787.177846] erofs: FAULT_INJECTION was not selected 19:41:08 executing program 5: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00767010000000c0024", 0xf, 0x400}, {&(0x7f0000000280)="05", 0x1, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000080)={[{@fault_injection}]}) 19:41:08 executing program 4: r0 = creat(&(0x7f0000000280)='./file0\x00', 0x3) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[@ANYBLOB='!\t'], 0x191) (async) close(r0) (async) execve(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000a00)={0x0, 0x0, &(0x7f00000009c0)={&(0x7f0000000880)=@deltfilter={0x24}, 0x24}}, 0x0) (async, rerun: 32) getsockname$packet(r1, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000000c0)=0x14) (async, rerun: 32) clock_gettime(0x0, &(0x7f0000000540)={0x0, 0x0}) recvmmsg$unix(r1, &(0x7f00000004c0)=[{{&(0x7f0000000080)=@abs, 0x6e, &(0x7f00000002c0)=[{&(0x7f0000000100)=""/79, 0x4f}, {&(0x7f0000000180)=""/29, 0x1d}, {&(0x7f00000001c0)=""/87, 0x57}, {&(0x7f0000000240)=""/4, 0x4}], 0x4, &(0x7f0000000300)=[@cred={{0x1c}}, @rights={{0x28, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0x48}}, {{0x0, 0x0, &(0x7f0000000380), 0x0, &(0x7f00000003c0)=[@cred={{0x1c}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x1c}}, @rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}], 0xd0}}], 0x2, 0x100, &(0x7f0000000580)={r2, r3+60000000}) 19:41:08 executing program 2: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c0024", 0xf, 0x400}, {&(0x7f0000000280)="05000500c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000080)={[{@fault_injection}]}) [ 787.214243] erofs: root inode @ nid 36 [ 787.224018] erofs: mounted on /dev/loop2 with opts: fault_injection=0x0000000000000000. [ 787.240291] erofs: read_super, device -> /dev/loop3 [ 787.257232] erofs: options -> fault_injection=0x0000000000000000, 19:41:08 executing program 1: syz_mount_image$erofs(&(0x7f0000000000), 0x0, 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c0024", 0xf, 0x400}, {&(0x7f0000000280)="050000040041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000080)={[{@fault_injection}]}) 19:41:08 executing program 4: r0 = creat(&(0x7f0000000280)='./file0\x00', 0x3) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[@ANYBLOB='!\t'], 0x191) close(r0) (async) execve(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) (async) r1 = socket(0x10, 0x803, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000a00)={0x0, 0x0, &(0x7f00000009c0)={&(0x7f0000000880)=@deltfilter={0x24}, 0x24}}, 0x0) getsockname$packet(r1, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000000c0)=0x14) (async) clock_gettime(0x0, &(0x7f0000000540)={0x0, 0x0}) recvmmsg$unix(r1, &(0x7f00000004c0)=[{{&(0x7f0000000080)=@abs, 0x6e, &(0x7f00000002c0)=[{&(0x7f0000000100)=""/79, 0x4f}, {&(0x7f0000000180)=""/29, 0x1d}, {&(0x7f00000001c0)=""/87, 0x57}, {&(0x7f0000000240)=""/4, 0x4}], 0x4, &(0x7f0000000300)=[@cred={{0x1c}}, @rights={{0x28, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0x48}}, {{0x0, 0x0, &(0x7f0000000380), 0x0, &(0x7f00000003c0)=[@cred={{0x1c}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x1c}}, @rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}], 0xd0}}], 0x2, 0x100, &(0x7f0000000580)={r2, r3+60000000}) [ 787.293888] erofs: unmounted for /dev/loop2 [ 787.295067] erofs: FAULT_INJECTION was not selected [ 787.326303] erofs: root inode @ nid 0 [ 787.331963] erofs: bogus i_mode (0) @ nid 0 [ 787.349708] erofs: read_super, device -> /dev/loop0 [ 787.354761] erofs: options -> [ 787.359917] erofs: cannot find valid erofs superblock 19:41:08 executing program 4: r0 = creat(&(0x7f0000000280)='./file0\x00', 0x3) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[@ANYBLOB='!\t'], 0x191) close(r0) execve(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) 19:41:08 executing program 3: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b004671fffffff0c", 0xd, 0x400}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000080)={[{@fault_injection}]}) 19:41:08 executing program 4: r0 = creat(&(0x7f0000000280)='./file0\x00', 0x3) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[@ANYBLOB='!\t'], 0x191) close(r0) execve(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) creat(&(0x7f0000000280)='./file0\x00', 0x3) (async) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[@ANYBLOB='!\t'], 0x191) (async) close(r0) (async) execve(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) (async) 19:41:08 executing program 1: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000080)={[{@fault_injection}]}) [ 787.495172] erofs: read_super, device -> /dev/loop2 [ 787.499111] erofs: read_super, device -> /dev/loop5 [ 787.505740] erofs: options -> fault_injection=0x0000000000000000, [ 787.509416] erofs: options -> fault_injection=0x0000000000000000, 19:41:08 executing program 0: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e0", 0x4, 0x40e90100}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000080)) [ 787.539836] erofs: FAULT_INJECTION was not selected [ 787.554198] erofs: read_super, device -> /dev/loop3 [ 787.559598] erofs: options -> fault_injection=0x0000000000000000, [ 787.566850] erofs: root inode @ nid 36 [ 787.569792] erofs: FAULT_INJECTION was not selected [ 787.579979] erofs: root inode @ nid 0 19:41:08 executing program 1: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000080)={[{@fault_injection}]}) 19:41:08 executing program 4: r0 = creat(&(0x7f0000000280)='./file0\x00', 0x3) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[@ANYBLOB='!\t'], 0x191) close(r0) (async) execve(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) [ 787.591773] erofs: mounted on /dev/loop2 with opts: fault_injection=0x0000000000000000. [ 787.592878] erofs: bogus i_mode (0) @ nid 0 [ 787.602834] erofs: FAULT_INJECTION was not selected [ 787.630294] erofs: root inode @ nid 36 [ 787.634501] erofs: bogus i_mode (0) @ nid 36 19:41:08 executing program 5: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b01067010000000c0024", 0xf, 0x400}, {&(0x7f0000000280)="05", 0x1, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000080)={[{@fault_injection}]}) 19:41:08 executing program 3: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010200000c", 0xd, 0x400}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000080)={[{@fault_injection}]}) 19:41:08 executing program 2: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c0024", 0xf, 0x400}, {&(0x7f0000000280)="05000600c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000080)={[{@fault_injection}]}) [ 787.649629] erofs: read_super, device -> /dev/loop0 [ 787.654672] erofs: options -> [ 787.672957] erofs: cannot find valid erofs superblock 19:41:08 executing program 1: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000080)={[{@fault_injection}]}) [ 787.708800] erofs: unmounted for /dev/loop2 19:41:08 executing program 0: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e0", 0x4, 0x40ea0100}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000080)) 19:41:08 executing program 4: sendmsg$FOU_CMD_DEL(0xffffffffffffffff, &(0x7f00000008c0)={&(0x7f00000006c0)={0x10, 0x0, 0x0, 0x80800000}, 0xc, &(0x7f0000000880)={&(0x7f0000000840)={0x20, 0x0, 0x4, 0x70bd27, 0x25dfdbfd, {}, [@FOU_ATTR_REMCSUM_NOPARTIAL={0x4}, @FOU_ATTR_PEER_PORT={0x6, 0xa, 0x4e20}]}, 0x20}, 0x1, 0x0, 0x0, 0x1}, 0x80) r0 = creat(&(0x7f0000000280)='./file0\x00', 0x3) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="61a8"], 0x191) close(r0) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(r0, 0xc0189375, &(0x7f0000000080)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) pipe(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) readahead(r2, 0x1, 0x2) r3 = gettid() perf_event_open(&(0x7f0000000640)={0x4, 0x80, 0x80, 0xec, 0x3, 0x80, 0x0, 0x1f, 0x801, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x2, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0xa39, 0x1, @perf_bp={&(0x7f0000000600), 0x8}, 0x2, 0x3, 0x3ff, 0x1, 0x0, 0x9, 0x9, 0x0, 0x3f, 0x0, 0x4}, r3, 0x10, 0xffffffffffffffff, 0x6) newfstatat(0xffffffffffffff9c, &(0x7f0000000500)='./file1\x00', &(0x7f0000000540)={0x0, 0x0, 0x0, 0x0, 0x0}, 0x100) syz_mount_image$vxfs(&(0x7f0000000140), &(0x7f0000000180)='./file0\x00', 0x82c, 0x4, &(0x7f0000000480)=[{&(0x7f00000001c0)="107a1d4408457cafcb7bbaea8aa4e385dcf6b4107b3e75de5842375b0eb0a2ff3a4df1a965b680688815bd7f", 0x2c, 0x5}, {&(0x7f0000000200)="a8d7efd955e9cda76a6b85dae713e928b0829548d3490012477c04824d50ae93d864bb88c477dda86b863d826f9e28e3a1b07d81e83d2c5ee4b8db199ed03f030c9f9e50df76c0036ad2cec46d46a40a8fc4c0a99184241a76702e29c19f218c239938b6a83ec4a8eef7c83c4253b25e0dfb76b44b739afafcbc9a4aa5ec", 0x7e, 0x1}, {&(0x7f00000002c0)="b0a32593cb9250ac85cc4a036037f38d60750a62476ab6f60da63b2262884126079bfc888b30211e053695b538138dba4c9bb4dc94b9c96e0849c9eaabccee5b84598378de6c771b2904c62c3b4a92504c473d42c11e6c354987df4edb55b5fbc3e80c7853d64ae917c2092791478ed01b68d3844621f52c2a693d6286a713e927f871cb46b48b1bad8f4d45c237395c10d0ee11148fa0a73981574873ae8032040673dd6a492f0d594c2a8aec0231b617d3d09bb8cadeb900d7e19ef0286c9fbc168332a4bdedc3f34234d8c3eed9f1f52f9861ab9aa63862077dc51e29bac5aeee5d7472d2200d3f5dfc0124c8b209b167e8", 0xf3, 0x100000000}, {&(0x7f00000003c0)="6afbc06f334035c0dfe8bc7e3f6988f5f1b37ba415d1d0d92df69346e282c331df2ad666361364595dc5a7a1e17415f8c6121e1bd69a89a7b2d16935ae10379ccf31b5657c5ca4578d83247eb82e3decd8a661765b6cff2b2317d42e986929ff35d8512a8d4d53bc0c0620c5dbd6f18eac7ca15a9adde14f1bd2c5ca79e87b501b64aace", 0x84, 0x8}], 0x2, &(0x7f0000000700)=ANY=[@ANYBLOB='\\,fowner>', @ANYRESDEC=r4, @ANYBLOB="2c66736e616d653d002c636f6e746578743d73797361646d5f752c005e4baebef1fd824dcf0c040d5ca5c962e08af84e2fdf4b5bc91907f28047557190f4b47a959742611beda571ea0bc89d43c2bf9d9a03e78682b9218bb8ff5a67fc04c5c035da79f42070bcd33661bcac8c2ae759d26e82bdfe0f0f91da5e01ece3fd9b9224ee9bf8868dbe427527934293f165193ca2a7372866b1a098af9b27c3fc2d6b16f163d9ebed1287f188bc5a8b5189d587878647c36e98ae307dba5ce07e89816fee14bde70c1e3213837c28ff775961f2d728115ad4754df1ae9a12198000cabd74c459"]) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@bloom_filter={0x1e, 0x8, 0x4, 0x0, 0x660, r1, 0x5, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x3, 0x0, 0x2}, 0x48) execve(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) 19:41:08 executing program 1: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c0024", 0xf, 0x400}, {&(0x7f0000000280)="050000040041", 0x6, 0x480}], 0x0, &(0x7f0000000080)={[{@fault_injection}]}) [ 787.791021] erofs: read_super, device -> /dev/loop5 [ 787.799121] erofs: read_super, device -> /dev/loop3 [ 787.814458] erofs: options -> fault_injection=0x0000000000000000, [ 787.823809] erofs: options -> fault_injection=0x0000000000000000, [ 787.826420] erofs: read_super, device -> /dev/loop0 [ 787.842990] erofs: options -> [ 787.843518] erofs: FAULT_INJECTION was not selected [ 787.852870] erofs: read_super, device -> /dev/loop2 [ 787.857909] erofs: options -> fault_injection=0x0000000000000000, [ 787.859772] erofs: FAULT_INJECTION was not selected [ 787.872516] erofs: cannot find valid erofs superblock [ 787.880096] erofs: root inode @ nid 36 [ 787.885806] erofs: root inode @ nid 0 19:41:08 executing program 4: sendmsg$FOU_CMD_DEL(0xffffffffffffffff, &(0x7f00000008c0)={&(0x7f00000006c0)={0x10, 0x0, 0x0, 0x80800000}, 0xc, &(0x7f0000000880)={&(0x7f0000000840)={0x20, 0x0, 0x4, 0x70bd27, 0x25dfdbfd, {}, [@FOU_ATTR_REMCSUM_NOPARTIAL={0x4}, @FOU_ATTR_PEER_PORT={0x6, 0xa, 0x4e20}]}, 0x20}, 0x1, 0x0, 0x0, 0x1}, 0x80) (async) r0 = creat(&(0x7f0000000280)='./file0\x00', 0x3) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="61a8"], 0x191) (async) close(r0) (async) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(r0, 0xc0189375, &(0x7f0000000080)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) (async) pipe(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) readahead(r2, 0x1, 0x2) r3 = gettid() perf_event_open(&(0x7f0000000640)={0x4, 0x80, 0x80, 0xec, 0x3, 0x80, 0x0, 0x1f, 0x801, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x2, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0xa39, 0x1, @perf_bp={&(0x7f0000000600), 0x8}, 0x2, 0x3, 0x3ff, 0x1, 0x0, 0x9, 0x9, 0x0, 0x3f, 0x0, 0x4}, r3, 0x10, 0xffffffffffffffff, 0x6) (async) newfstatat(0xffffffffffffff9c, &(0x7f0000000500)='./file1\x00', &(0x7f0000000540)={0x0, 0x0, 0x0, 0x0, 0x0}, 0x100) syz_mount_image$vxfs(&(0x7f0000000140), &(0x7f0000000180)='./file0\x00', 0x82c, 0x4, &(0x7f0000000480)=[{&(0x7f00000001c0)="107a1d4408457cafcb7bbaea8aa4e385dcf6b4107b3e75de5842375b0eb0a2ff3a4df1a965b680688815bd7f", 0x2c, 0x5}, {&(0x7f0000000200)="a8d7efd955e9cda76a6b85dae713e928b0829548d3490012477c04824d50ae93d864bb88c477dda86b863d826f9e28e3a1b07d81e83d2c5ee4b8db199ed03f030c9f9e50df76c0036ad2cec46d46a40a8fc4c0a99184241a76702e29c19f218c239938b6a83ec4a8eef7c83c4253b25e0dfb76b44b739afafcbc9a4aa5ec", 0x7e, 0x1}, {&(0x7f00000002c0)="b0a32593cb9250ac85cc4a036037f38d60750a62476ab6f60da63b2262884126079bfc888b30211e053695b538138dba4c9bb4dc94b9c96e0849c9eaabccee5b84598378de6c771b2904c62c3b4a92504c473d42c11e6c354987df4edb55b5fbc3e80c7853d64ae917c2092791478ed01b68d3844621f52c2a693d6286a713e927f871cb46b48b1bad8f4d45c237395c10d0ee11148fa0a73981574873ae8032040673dd6a492f0d594c2a8aec0231b617d3d09bb8cadeb900d7e19ef0286c9fbc168332a4bdedc3f34234d8c3eed9f1f52f9861ab9aa63862077dc51e29bac5aeee5d7472d2200d3f5dfc0124c8b209b167e8", 0xf3, 0x100000000}, {&(0x7f00000003c0)="6afbc06f334035c0dfe8bc7e3f6988f5f1b37ba415d1d0d92df69346e282c331df2ad666361364595dc5a7a1e17415f8c6121e1bd69a89a7b2d16935ae10379ccf31b5657c5ca4578d83247eb82e3decd8a661765b6cff2b2317d42e986929ff35d8512a8d4d53bc0c0620c5dbd6f18eac7ca15a9adde14f1bd2c5ca79e87b501b64aace", 0x84, 0x8}], 0x2, &(0x7f0000000700)=ANY=[@ANYBLOB='\\,fowner>', @ANYRESDEC=r4, @ANYBLOB="2c66736e616d653d002c636f6e746578743d73797361646d5f752c005e4baebef1fd824dcf0c040d5ca5c962e08af84e2fdf4b5bc91907f28047557190f4b47a959742611beda571ea0bc89d43c2bf9d9a03e78682b9218bb8ff5a67fc04c5c035da79f42070bcd33661bcac8c2ae759d26e82bdfe0f0f91da5e01ece3fd9b9224ee9bf8868dbe427527934293f165193ca2a7372866b1a098af9b27c3fc2d6b16f163d9ebed1287f188bc5a8b5189d587878647c36e98ae307dba5ce07e89816fee14bde70c1e3213837c28ff775961f2d728115ad4754df1ae9a12198000cabd74c459"]) (async) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@bloom_filter={0x1e, 0x8, 0x4, 0x0, 0x660, r1, 0x5, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x3, 0x0, 0x2}, 0x48) execve(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) 19:41:09 executing program 0: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e0", 0x4, 0x40eb0100}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000080)) [ 787.889082] erofs: FAULT_INJECTION was not selected [ 787.893265] erofs: bogus i_mode (0) @ nid 0 [ 787.899866] erofs: bogus i_mode (0) @ nid 36 [ 787.901693] erofs: root inode @ nid 36 [ 787.910151] erofs: mounted on /dev/loop2 with opts: fault_injection=0x0000000000000000. 19:41:09 executing program 2: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c0024", 0xf, 0x400}, {&(0x7f0000000280)="05000700c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000080)={[{@fault_injection}]}) [ 787.964006] erofs: read_super, device -> /dev/loop1 [ 787.969221] erofs: options -> fault_injection=0x0000000000000000, [ 787.977156] erofs: unmounted for /dev/loop2 [ 787.977755] erofs: cannot read erofs superblock 19:41:09 executing program 3: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010300000c", 0xd, 0x400}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000080)={[{@fault_injection}]}) 19:41:09 executing program 5: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b01267010000000c0024", 0xf, 0x400}, {&(0x7f0000000280)="05", 0x1, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000080)={[{@fault_injection}]}) 19:41:09 executing program 4: sendmsg$FOU_CMD_DEL(0xffffffffffffffff, &(0x7f00000008c0)={&(0x7f00000006c0)={0x10, 0x0, 0x0, 0x80800000}, 0xc, &(0x7f0000000880)={&(0x7f0000000840)={0x20, 0x0, 0x4, 0x70bd27, 0x25dfdbfd, {}, [@FOU_ATTR_REMCSUM_NOPARTIAL={0x4}, @FOU_ATTR_PEER_PORT={0x6, 0xa, 0x4e20}]}, 0x20}, 0x1, 0x0, 0x0, 0x1}, 0x80) r0 = creat(&(0x7f0000000280)='./file0\x00', 0x3) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="61a8"], 0x191) close(r0) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(r0, 0xc0189375, &(0x7f0000000080)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) pipe(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) readahead(r2, 0x1, 0x2) r3 = gettid() perf_event_open(&(0x7f0000000640)={0x4, 0x80, 0x80, 0xec, 0x3, 0x80, 0x0, 0x1f, 0x801, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x2, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0xa39, 0x1, @perf_bp={&(0x7f0000000600), 0x8}, 0x2, 0x3, 0x3ff, 0x1, 0x0, 0x9, 0x9, 0x0, 0x3f, 0x0, 0x4}, r3, 0x10, 0xffffffffffffffff, 0x6) newfstatat(0xffffffffffffff9c, &(0x7f0000000500)='./file1\x00', &(0x7f0000000540)={0x0, 0x0, 0x0, 0x0, 0x0}, 0x100) syz_mount_image$vxfs(&(0x7f0000000140), &(0x7f0000000180)='./file0\x00', 0x82c, 0x4, &(0x7f0000000480)=[{&(0x7f00000001c0)="107a1d4408457cafcb7bbaea8aa4e385dcf6b4107b3e75de5842375b0eb0a2ff3a4df1a965b680688815bd7f", 0x2c, 0x5}, {&(0x7f0000000200)="a8d7efd955e9cda76a6b85dae713e928b0829548d3490012477c04824d50ae93d864bb88c477dda86b863d826f9e28e3a1b07d81e83d2c5ee4b8db199ed03f030c9f9e50df76c0036ad2cec46d46a40a8fc4c0a99184241a76702e29c19f218c239938b6a83ec4a8eef7c83c4253b25e0dfb76b44b739afafcbc9a4aa5ec", 0x7e, 0x1}, {&(0x7f00000002c0)="b0a32593cb9250ac85cc4a036037f38d60750a62476ab6f60da63b2262884126079bfc888b30211e053695b538138dba4c9bb4dc94b9c96e0849c9eaabccee5b84598378de6c771b2904c62c3b4a92504c473d42c11e6c354987df4edb55b5fbc3e80c7853d64ae917c2092791478ed01b68d3844621f52c2a693d6286a713e927f871cb46b48b1bad8f4d45c237395c10d0ee11148fa0a73981574873ae8032040673dd6a492f0d594c2a8aec0231b617d3d09bb8cadeb900d7e19ef0286c9fbc168332a4bdedc3f34234d8c3eed9f1f52f9861ab9aa63862077dc51e29bac5aeee5d7472d2200d3f5dfc0124c8b209b167e8", 0xf3, 0x100000000}, {&(0x7f00000003c0)="6afbc06f334035c0dfe8bc7e3f6988f5f1b37ba415d1d0d92df69346e282c331df2ad666361364595dc5a7a1e17415f8c6121e1bd69a89a7b2d16935ae10379ccf31b5657c5ca4578d83247eb82e3decd8a661765b6cff2b2317d42e986929ff35d8512a8d4d53bc0c0620c5dbd6f18eac7ca15a9adde14f1bd2c5ca79e87b501b64aace", 0x84, 0x8}], 0x2, &(0x7f0000000700)=ANY=[@ANYBLOB='\\,fowner>', @ANYRESDEC=r4, @ANYBLOB="2c66736e616d653d002c636f6e746578743d73797361646d5f752c005e4baebef1fd824dcf0c040d5ca5c962e08af84e2fdf4b5bc91907f28047557190f4b47a959742611beda571ea0bc89d43c2bf9d9a03e78682b9218bb8ff5a67fc04c5c035da79f42070bcd33661bcac8c2ae759d26e82bdfe0f0f91da5e01ece3fd9b9224ee9bf8868dbe427527934293f165193ca2a7372866b1a098af9b27c3fc2d6b16f163d9ebed1287f188bc5a8b5189d587878647c36e98ae307dba5ce07e89816fee14bde70c1e3213837c28ff775961f2d728115ad4754df1ae9a12198000cabd74c459"]) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@bloom_filter={0x1e, 0x8, 0x4, 0x0, 0x660, r1, 0x5, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x3, 0x0, 0x2}, 0x48) execve(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) sendmsg$FOU_CMD_DEL(0xffffffffffffffff, &(0x7f00000008c0)={&(0x7f00000006c0)={0x10, 0x0, 0x0, 0x80800000}, 0xc, &(0x7f0000000880)={&(0x7f0000000840)={0x20, 0x0, 0x4, 0x70bd27, 0x25dfdbfd, {}, [@FOU_ATTR_REMCSUM_NOPARTIAL={0x4}, @FOU_ATTR_PEER_PORT={0x6, 0xa, 0x4e20}]}, 0x20}, 0x1, 0x0, 0x0, 0x1}, 0x80) (async) creat(&(0x7f0000000280)='./file0\x00', 0x3) (async) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="61a8"], 0x191) (async) close(r0) (async) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(r0, 0xc0189375, &(0x7f0000000080)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) (async) pipe(&(0x7f00000005c0)) (async) readahead(r2, 0x1, 0x2) (async) gettid() (async) perf_event_open(&(0x7f0000000640)={0x4, 0x80, 0x80, 0xec, 0x3, 0x80, 0x0, 0x1f, 0x801, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x2, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0xa39, 0x1, @perf_bp={&(0x7f0000000600), 0x8}, 0x2, 0x3, 0x3ff, 0x1, 0x0, 0x9, 0x9, 0x0, 0x3f, 0x0, 0x4}, r3, 0x10, 0xffffffffffffffff, 0x6) (async) newfstatat(0xffffffffffffff9c, &(0x7f0000000500)='./file1\x00', &(0x7f0000000540), 0x100) (async) syz_mount_image$vxfs(&(0x7f0000000140), &(0x7f0000000180)='./file0\x00', 0x82c, 0x4, &(0x7f0000000480)=[{&(0x7f00000001c0)="107a1d4408457cafcb7bbaea8aa4e385dcf6b4107b3e75de5842375b0eb0a2ff3a4df1a965b680688815bd7f", 0x2c, 0x5}, {&(0x7f0000000200)="a8d7efd955e9cda76a6b85dae713e928b0829548d3490012477c04824d50ae93d864bb88c477dda86b863d826f9e28e3a1b07d81e83d2c5ee4b8db199ed03f030c9f9e50df76c0036ad2cec46d46a40a8fc4c0a99184241a76702e29c19f218c239938b6a83ec4a8eef7c83c4253b25e0dfb76b44b739afafcbc9a4aa5ec", 0x7e, 0x1}, {&(0x7f00000002c0)="b0a32593cb9250ac85cc4a036037f38d60750a62476ab6f60da63b2262884126079bfc888b30211e053695b538138dba4c9bb4dc94b9c96e0849c9eaabccee5b84598378de6c771b2904c62c3b4a92504c473d42c11e6c354987df4edb55b5fbc3e80c7853d64ae917c2092791478ed01b68d3844621f52c2a693d6286a713e927f871cb46b48b1bad8f4d45c237395c10d0ee11148fa0a73981574873ae8032040673dd6a492f0d594c2a8aec0231b617d3d09bb8cadeb900d7e19ef0286c9fbc168332a4bdedc3f34234d8c3eed9f1f52f9861ab9aa63862077dc51e29bac5aeee5d7472d2200d3f5dfc0124c8b209b167e8", 0xf3, 0x100000000}, {&(0x7f00000003c0)="6afbc06f334035c0dfe8bc7e3f6988f5f1b37ba415d1d0d92df69346e282c331df2ad666361364595dc5a7a1e17415f8c6121e1bd69a89a7b2d16935ae10379ccf31b5657c5ca4578d83247eb82e3decd8a661765b6cff2b2317d42e986929ff35d8512a8d4d53bc0c0620c5dbd6f18eac7ca15a9adde14f1bd2c5ca79e87b501b64aace", 0x84, 0x8}], 0x2, &(0x7f0000000700)=ANY=[@ANYBLOB='\\,fowner>', @ANYRESDEC=r4, @ANYBLOB="2c66736e616d653d002c636f6e746578743d73797361646d5f752c005e4baebef1fd824dcf0c040d5ca5c962e08af84e2fdf4b5bc91907f28047557190f4b47a959742611beda571ea0bc89d43c2bf9d9a03e78682b9218bb8ff5a67fc04c5c035da79f42070bcd33661bcac8c2ae759d26e82bdfe0f0f91da5e01ece3fd9b9224ee9bf8868dbe427527934293f165193ca2a7372866b1a098af9b27c3fc2d6b16f163d9ebed1287f188bc5a8b5189d587878647c36e98ae307dba5ce07e89816fee14bde70c1e3213837c28ff775961f2d728115ad4754df1ae9a12198000cabd74c459"]) (async) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@bloom_filter={0x1e, 0x8, 0x4, 0x0, 0x660, r1, 0x5, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x3, 0x0, 0x2}, 0x48) (async) execve(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) (async) 19:41:09 executing program 1: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c0024", 0xf, 0x400}, {&(0x7f0000000280)="050000040041", 0x6, 0x480}], 0x0, &(0x7f0000000080)={[{@fault_injection}]}) [ 788.121136] erofs: read_super, device -> /dev/loop0 [ 788.126193] erofs: options -> [ 788.157200] erofs: read_super, device -> /dev/loop2 [ 788.164812] erofs: cannot find valid erofs superblock [ 788.176806] erofs: options -> fault_injection=0x0000000000000000, [ 788.177625] erofs: read_super, device -> /dev/loop5 [ 788.203175] erofs: options -> fault_injection=0x0000000000000000, [ 788.209812] erofs: FAULT_INJECTION was not selected [ 788.210038] erofs: FAULT_INJECTION was not selected [ 788.215353] erofs: root inode @ nid 36 19:41:09 executing program 0: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e0", 0x4, 0x54640300}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000080)) [ 788.220618] erofs: root inode @ nid 36 [ 788.228334] erofs: bogus i_mode (0) @ nid 36 [ 788.233456] erofs: mounted on /dev/loop2 with opts: fault_injection=0x0000000000000000. [ 788.235707] erofs: read_super, device -> /dev/loop3 [ 788.246937] erofs: options -> fault_injection=0x0000000000000000, [ 788.254528] erofs: FAULT_INJECTION was not selected [ 788.260249] erofs: root inode @ nid 0 [ 788.265604] erofs: bogus i_mode (0) @ nid 0 19:41:09 executing program 5: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b01467010000000c0024", 0xf, 0x400}, {&(0x7f0000000280)="05", 0x1, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000080)={[{@fault_injection}]}) 19:41:09 executing program 2: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c0024", 0xf, 0x400}, {&(0x7f0000000280)="05002000c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000080)={[{@fault_injection}]}) [ 788.280739] erofs: read_super, device -> /dev/loop1 [ 788.286053] erofs: options -> fault_injection=0x0000000000000000, [ 788.308514] erofs: cannot read erofs superblock 19:41:09 executing program 4: r0 = creat(&(0x7f0000000280)='./file0\x00', 0x3) open(&(0x7f0000000040)='./file0\x00', 0x12182, 0x98) write$binfmt_script(r0, &(0x7f0000000080)=ANY=[@ANYBLOB="21adb0132b7ec33ff1c9185099ba840945810fefe454d1f4937412d08f428e36d331cf3c13ab"], 0x191) close(r0) execve(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) [ 788.329224] erofs: unmounted for /dev/loop2 [ 788.384025] erofs: read_super, device -> /dev/loop0 [ 788.389422] erofs: options -> [ 788.395081] erofs: cannot find valid erofs superblock [ 788.410580] erofs: read_super, device -> /dev/loop5 19:41:09 executing program 4: r0 = creat(&(0x7f0000000280)='./file0\x00', 0x3) open(&(0x7f0000000040)='./file0\x00', 0x12182, 0x98) (async) write$binfmt_script(r0, &(0x7f0000000080)=ANY=[@ANYBLOB="21adb0132b7ec33ff1c9185099ba840945810fefe454d1f4937412d08f428e36d331cf3c13ab"], 0x191) (async) close(r0) (async) execve(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) 19:41:09 executing program 1: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c0024", 0xf, 0x400}, {&(0x7f0000000280)="050000040041", 0x6, 0x480}], 0x0, &(0x7f0000000080)={[{@fault_injection}]}) 19:41:09 executing program 0: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e0", 0x4, 0x80e70100}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000080)) 19:41:09 executing program 3: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010400000c", 0xd, 0x400}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000080)={[{@fault_injection}]}) [ 788.428709] erofs: options -> fault_injection=0x0000000000000000, [ 788.441117] erofs: FAULT_INJECTION was not selected [ 788.446655] erofs: root inode @ nid 36 [ 788.452166] erofs: bogus i_mode (0) @ nid 36 19:41:09 executing program 4: r0 = creat(&(0x7f0000000280)='./file0\x00', 0x3) open(&(0x7f0000000040)='./file0\x00', 0x12182, 0x98) write$binfmt_script(r0, &(0x7f0000000080)=ANY=[@ANYBLOB="21adb0132b7ec33ff1c9185099ba840945810fefe454d1f4937412d08f428e36d331cf3c13ab"], 0x191) close(r0) execve(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) creat(&(0x7f0000000280)='./file0\x00', 0x3) (async) open(&(0x7f0000000040)='./file0\x00', 0x12182, 0x98) (async) write$binfmt_script(r0, &(0x7f0000000080)=ANY=[@ANYBLOB="21adb0132b7ec33ff1c9185099ba840945810fefe454d1f4937412d08f428e36d331cf3c13ab"], 0x191) (async) close(r0) (async) execve(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) (async) 19:41:09 executing program 5: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b02a67010000000c0024", 0xf, 0x400}, {&(0x7f0000000280)="05", 0x1, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000080)={[{@fault_injection}]}) [ 788.583524] erofs: read_super, device -> /dev/loop2 [ 788.586764] erofs: read_super, device -> /dev/loop0 [ 788.588948] erofs: read_super, device -> /dev/loop1 [ 788.598449] erofs: options -> [ 788.607290] erofs: options -> fault_injection=0x0000000000000000, [ 788.620767] erofs: read_super, device -> /dev/loop3 [ 788.626212] erofs: cannot find valid erofs superblock [ 788.631429] erofs: options -> fault_injection=0x0000000000000000, [ 788.632961] erofs: cannot read erofs superblock [ 788.650215] erofs: options -> fault_injection=0x0000000000000000, [ 788.659341] erofs: FAULT_INJECTION was not selected [ 788.676797] erofs: root inode @ nid 36 19:41:09 executing program 4: r0 = creat(&(0x7f0000000280)='./file0\x00', 0x3) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[@ANYBLOB='!\t'], 0x191) mmap(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x100000c, 0x2010, r0, 0xde850000) close(r0) execve(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x7, 0x4, 0x1, 0x0, 0x1, 0x1000, 0x2, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x40, 0x2, @perf_bp={&(0x7f0000000080)}, 0x2600, 0x3, 0x4, 0x8, 0x9d0, 0x1000, 0xb5, 0x0, 0x5, 0x0, 0x3}, 0x0, 0xffffffffffffffff, r0, 0x0) 19:41:09 executing program 2: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c0024", 0xf, 0x400}, {&(0x7f0000000280)="05023c00c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000080)={[{@fault_injection}]}) [ 788.681683] erofs: FAULT_INJECTION was not selected [ 788.688315] erofs: root inode @ nid 0 [ 788.696446] erofs: mounted on /dev/loop2 with opts: fault_injection=0x0000000000000000. [ 788.705330] erofs: bogus i_mode (0) @ nid 0 [ 788.758421] erofs: unmounted for /dev/loop2 19:41:09 executing program 0: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e0", 0x4, 0x80e80100}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000080)) 19:41:09 executing program 3: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010500000c", 0xd, 0x400}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000080)={[{@fault_injection}]}) 19:41:09 executing program 1: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c0024", 0xf, 0x400}, {&(0x7f0000000280)="050000040041", 0x6, 0x480}, {0x0}], 0x0, &(0x7f0000000080)={[{@fault_injection}]}) 19:41:09 executing program 4: r0 = creat(&(0x7f0000000280)='./file0\x00', 0x3) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[@ANYBLOB='!\t'], 0x191) mmap(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x100000c, 0x2010, r0, 0xde850000) close(r0) execve(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x7, 0x4, 0x1, 0x0, 0x1, 0x1000, 0x2, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x40, 0x2, @perf_bp={&(0x7f0000000080)}, 0x2600, 0x3, 0x4, 0x8, 0x9d0, 0x1000, 0xb5, 0x0, 0x5, 0x0, 0x3}, 0x0, 0xffffffffffffffff, r0, 0x0) creat(&(0x7f0000000280)='./file0\x00', 0x3) (async) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[@ANYBLOB='!\t'], 0x191) (async) mmap(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x100000c, 0x2010, r0, 0xde850000) (async) close(r0) (async) execve(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) (async) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x7, 0x4, 0x1, 0x0, 0x1, 0x1000, 0x2, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x40, 0x2, @perf_bp={&(0x7f0000000080)}, 0x2600, 0x3, 0x4, 0x8, 0x9d0, 0x1000, 0xb5, 0x0, 0x5, 0x0, 0x3}, 0x0, 0xffffffffffffffff, r0, 0x0) (async) [ 788.788439] erofs: read_super, device -> /dev/loop5 [ 788.793918] erofs: options -> fault_injection=0x0000000000000000, [ 788.808963] erofs: FAULT_INJECTION was not selected [ 788.818098] erofs: root inode @ nid 36 [ 788.827952] erofs: bogus i_mode (0) @ nid 36 [ 788.857060] erofs: read_super, device -> /dev/loop0 [ 788.862985] erofs: options -> [ 788.866564] erofs: cannot find valid erofs superblock 19:41:10 executing program 5: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b03767010000000c0024", 0xf, 0x400}, {&(0x7f0000000280)="05", 0x1, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000080)={[{@fault_injection}]}) 19:41:10 executing program 0: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e0", 0x4, 0x80e90100}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000080)) 19:41:10 executing program 4: r0 = creat(&(0x7f0000000280)='./file0\x00', 0x3) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[@ANYBLOB='!\t'], 0x191) (async) mmap(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x100000c, 0x2010, r0, 0xde850000) (async) close(r0) execve(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) (async) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x7, 0x4, 0x1, 0x0, 0x1, 0x1000, 0x2, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x40, 0x2, @perf_bp={&(0x7f0000000080)}, 0x2600, 0x3, 0x4, 0x8, 0x9d0, 0x1000, 0xb5, 0x0, 0x5, 0x0, 0x3}, 0x0, 0xffffffffffffffff, r0, 0x0) [ 788.928292] erofs: read_super, device -> /dev/loop1 [ 788.933772] erofs: options -> fault_injection=0x0000000000000000, [ 788.944272] erofs: cannot read erofs superblock [ 788.949378] erofs: read_super, device -> /dev/loop2 [ 788.954402] erofs: options -> fault_injection=0x0000000000000000, [ 788.969359] erofs: FAULT_INJECTION was not selected 19:41:10 executing program 1: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c0024", 0xf, 0x400}, {&(0x7f0000000280)="050000040041", 0x6, 0x480}, {0x0}], 0x0, &(0x7f0000000080)={[{@fault_injection}]}) [ 788.974815] erofs: root inode @ nid 36 [ 788.980286] erofs: unsupported i_format 517 of nid 36 [ 789.009559] erofs: read_super, device -> /dev/loop3 19:41:10 executing program 2: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c0024", 0xf, 0x400}, {&(0x7f0000000280)="05003f00c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000080)={[{@fault_injection}]}) [ 789.039305] erofs: options -> fault_injection=0x0000000000000000, [ 789.055839] erofs: FAULT_INJECTION was not selected [ 789.074896] erofs: read_super, device -> /dev/loop5 [ 789.101489] erofs: options -> fault_injection=0x0000000000000000, [ 789.115630] erofs: root inode @ nid 0 [ 789.128293] erofs: read_super, device -> /dev/loop0 [ 789.134066] erofs: bogus i_mode (0) @ nid 0 [ 789.140124] erofs: FAULT_INJECTION was not selected 19:41:10 executing program 4: r0 = creat(&(0x7f0000000280)='./file0\x00', 0x3) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[@ANYBLOB='!\t'], 0x191) ioctl$vim2m_VIDIOC_EXPBUF(r0, 0xc0405610, &(0x7f0000000080)={0x2, 0x7, 0x7fffffff, 0x80000, 0xffffffffffffffff}) sendfile(r1, r0, &(0x7f00000000c0)=0x1, 0xb8bf) close(r0) r2 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) write$RDMA_USER_CM_CMD_MIGRATE_ID(0xffffffffffffffff, &(0x7f0000000180)={0x12, 0x10, 0xfa00, {&(0x7f0000000100), 0xffffffffffffffff, r2}}, 0x18) execve(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) [ 789.151066] erofs: options -> [ 789.162260] erofs: root inode @ nid 36 [ 789.171045] erofs: cannot find valid erofs superblock [ 789.176422] erofs: bogus i_mode (0) @ nid 36 [ 789.192852] erofs: read_super, device -> /dev/loop1 19:41:10 executing program 3: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010600000c", 0xd, 0x400}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000080)={[{@fault_injection}]}) 19:41:10 executing program 4: r0 = creat(&(0x7f0000000280)='./file0\x00', 0x3) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[@ANYBLOB='!\t'], 0x191) ioctl$vim2m_VIDIOC_EXPBUF(r0, 0xc0405610, &(0x7f0000000080)={0x2, 0x7, 0x7fffffff, 0x80000, 0xffffffffffffffff}) sendfile(r1, r0, &(0x7f00000000c0)=0x1, 0xb8bf) (async) close(r0) (async) r2 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) write$RDMA_USER_CM_CMD_MIGRATE_ID(0xffffffffffffffff, &(0x7f0000000180)={0x12, 0x10, 0xfa00, {&(0x7f0000000100), 0xffffffffffffffff, r2}}, 0x18) (async) execve(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) [ 789.197902] erofs: options -> fault_injection=0x0000000000000000, [ 789.207188] erofs: cannot read erofs superblock 19:41:10 executing program 4: r0 = creat(&(0x7f0000000280)='./file0\x00', 0x3) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[@ANYBLOB='!\t'], 0x191) ioctl$vim2m_VIDIOC_EXPBUF(r0, 0xc0405610, &(0x7f0000000080)={0x2, 0x7, 0x7fffffff, 0x80000, 0xffffffffffffffff}) sendfile(r1, r0, &(0x7f00000000c0)=0x1, 0xb8bf) (async) close(r0) (async) r2 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) write$RDMA_USER_CM_CMD_MIGRATE_ID(0xffffffffffffffff, &(0x7f0000000180)={0x12, 0x10, 0xfa00, {&(0x7f0000000100), 0xffffffffffffffff, r2}}, 0x18) (async) execve(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) 19:41:10 executing program 0: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e0", 0x4, 0x80ea0100}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000080)) [ 789.250675] erofs: read_super, device -> /dev/loop2 [ 789.261737] erofs: options -> fault_injection=0x0000000000000000, [ 789.280260] erofs: FAULT_INJECTION was not selected [ 789.285561] erofs: root inode @ nid 36 [ 789.291570] erofs: mounted on /dev/loop2 with opts: fault_injection=0x0000000000000000. 19:41:10 executing program 1: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c0024", 0xf, 0x400}, {&(0x7f0000000280)="050000040041", 0x6, 0x480}, {0x0}], 0x0, &(0x7f0000000080)={[{@fault_injection}]}) 19:41:10 executing program 5: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b04567010000000c0024", 0xf, 0x400}, {&(0x7f0000000280)="05", 0x1, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000080)={[{@fault_injection}]}) 19:41:10 executing program 2: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c0024", 0xf, 0x400}, {&(0x7f0000000280)="050fff00c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000080)={[{@fault_injection}]}) [ 789.345679] erofs: read_super, device -> /dev/loop3 19:41:10 executing program 4: ioctl$SNDRV_TIMER_IOCTL_START(0xffffffffffffffff, 0x54a0) r0 = creat(&(0x7f0000000280)='./file0\x00', 0x3) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) bind$bt_l2cap(r1, &(0x7f0000000000), 0x58) listen(r1, 0x0) write$binfmt_script(r0, &(0x7f00000000c0)=ANY=[@ANYRES64=r1], 0x191) close(r0) execve(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) creat(&(0x7f0000000080)='./file1\x00', 0x44) [ 789.366622] erofs: options -> fault_injection=0x0000000000000000, [ 789.377870] erofs: unmounted for /dev/loop2 [ 789.397957] erofs: FAULT_INJECTION was not selected [ 789.409083] erofs: root inode @ nid 0 [ 789.413174] erofs: bogus i_mode (0) @ nid 0 [ 789.427191] erofs: read_super, device -> /dev/loop1 [ 789.437821] erofs: read_super, device -> /dev/loop5 [ 789.439932] erofs: options -> fault_injection=0x0000000000000000, [ 789.454185] erofs: options -> fault_injection=0x0000000000000000, [ 789.459683] erofs: cannot read erofs superblock 19:41:10 executing program 4: ioctl$SNDRV_TIMER_IOCTL_START(0xffffffffffffffff, 0x54a0) r0 = creat(&(0x7f0000000280)='./file0\x00', 0x3) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) bind$bt_l2cap(r1, &(0x7f0000000000), 0x58) listen(r1, 0x0) write$binfmt_script(r0, &(0x7f00000000c0)=ANY=[@ANYRES64=r1], 0x191) close(r0) execve(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) creat(&(0x7f0000000080)='./file1\x00', 0x44) ioctl$SNDRV_TIMER_IOCTL_START(0xffffffffffffffff, 0x54a0) (async) creat(&(0x7f0000000280)='./file0\x00', 0x3) (async) syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) (async) bind$bt_l2cap(r1, &(0x7f0000000000), 0x58) (async) listen(r1, 0x0) (async) write$binfmt_script(r0, &(0x7f00000000c0)=ANY=[@ANYRES64=r1], 0x191) (async) close(r0) (async) execve(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) (async) creat(&(0x7f0000000080)='./file1\x00', 0x44) (async) [ 789.473281] erofs: FAULT_INJECTION was not selected [ 789.483844] erofs: root inode @ nid 36 [ 789.490111] erofs: read_super, device -> /dev/loop0 [ 789.495253] erofs: options -> 19:41:10 executing program 3: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010700000c", 0xd, 0x400}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000080)={[{@fault_injection}]}) 19:41:10 executing program 1: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c0024", 0xf, 0x400}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000080)={[{@fault_injection}]}) [ 789.543363] erofs: bogus i_mode (0) @ nid 36 [ 789.548295] erofs: cannot find valid erofs superblock [ 789.583493] erofs: read_super, device -> /dev/loop2 19:41:10 executing program 0: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e0", 0x4, 0x80eb0100}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000080)) 19:41:10 executing program 4: ioctl$SNDRV_TIMER_IOCTL_START(0xffffffffffffffff, 0x54a0) (async) r0 = creat(&(0x7f0000000280)='./file0\x00', 0x3) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) bind$bt_l2cap(r1, &(0x7f0000000000), 0x58) (async) listen(r1, 0x0) write$binfmt_script(r0, &(0x7f00000000c0)=ANY=[@ANYRES64=r1], 0x191) (async) close(r0) execve(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) (async) creat(&(0x7f0000000080)='./file1\x00', 0x44) [ 789.602282] erofs: options -> fault_injection=0x0000000000000000, [ 789.612601] erofs: FAULT_INJECTION was not selected [ 789.617759] erofs: root inode @ nid 36 [ 789.623082] erofs: unsupported i_format 3845 of nid 36 19:41:10 executing program 5: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00425010000000c0024", 0xf, 0x400}, {&(0x7f0000000280)="05", 0x1, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000080)={[{@fault_injection}]}) 19:41:10 executing program 4: r0 = creat(&(0x7f0000000280)='./file0\x00', 0x3) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[@ANYBLOB='!\t'], 0x191) close(r0) 19:41:10 executing program 2: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c0024", 0xf, 0x400}, {&(0x7f0000000280)="05000200c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000080)={[{@fault_injection}]}) [ 789.711020] erofs: read_super, device -> /dev/loop3 [ 789.722115] erofs: options -> fault_injection=0x0000000000000000, [ 789.730239] erofs: FAULT_INJECTION was not selected [ 789.735376] erofs: root inode @ nid 0 [ 789.741359] erofs: bogus i_mode (0) @ nid 0 [ 789.748700] erofs: read_super, device -> /dev/loop1 [ 789.755028] erofs: read_super, device -> /dev/loop0 [ 789.760379] erofs: options -> fault_injection=0x0000000000000000, [ 789.773272] erofs: options -> [ 789.783031] erofs: cannot find valid erofs superblock [ 789.794365] erofs: FAULT_INJECTION was not selected [ 789.805284] erofs: root inode @ nid 36 19:41:10 executing program 4: r0 = creat(&(0x7f0000000280)='./file0\x00', 0x3) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[@ANYBLOB='!\t'], 0x191) close(r0) [ 789.815470] erofs: bogus i_mode (0) @ nid 36 [ 789.870034] erofs: read_super, device -> /dev/loop5 [ 789.875473] erofs: options -> fault_injection=0x0000000000000000, [ 789.883179] erofs: FAULT_INJECTION was not selected [ 789.888347] erofs: root inode @ nid 36 [ 789.892840] erofs: bogus i_mode (0) @ nid 36 [ 789.914193] erofs: read_super, device -> /dev/loop2 19:41:10 executing program 0: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e0", 0x4, 0x82e90100}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000080)) 19:41:11 executing program 3: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010800000c", 0xd, 0x400}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000080)={[{@fault_injection}]}) 19:41:11 executing program 1: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c0024", 0xf, 0x400}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000080)={[{@fault_injection}]}) [ 789.919896] erofs: options -> fault_injection=0x0000000000000000, [ 789.940430] erofs: FAULT_INJECTION was not selected [ 789.945566] erofs: root inode @ nid 36 [ 789.955534] erofs: mounted on /dev/loop2 with opts: fault_injection=0x0000000000000000. 19:41:11 executing program 4: r0 = creat(&(0x7f0000000280)='./file0\x00', 0x3) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[@ANYBLOB='!\t'], 0x191) close(r0) 19:41:11 executing program 5: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00442010000000c0024", 0xf, 0x400}, {&(0x7f0000000280)="05", 0x1, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000080)={[{@fault_injection}]}) 19:41:11 executing program 2: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c0024", 0xf, 0x400}, {&(0x7f0000000280)="05000300c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000080)={[{@fault_injection}]}) [ 790.002832] erofs: read_super, device -> /dev/loop3 [ 790.005108] erofs: unmounted for /dev/loop2 [ 790.007870] erofs: options -> fault_injection=0x0000000000000000, [ 790.008221] erofs: FAULT_INJECTION was not selected [ 790.027623] erofs: root inode @ nid 0 [ 790.032752] erofs: bogus i_mode (0) @ nid 0 19:41:11 executing program 0: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e0", 0x4, 0x83e90100}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000080)) 19:41:11 executing program 3: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010900000c", 0xd, 0x400}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000080)={[{@fault_injection}]}) [ 790.049312] erofs: read_super, device -> /dev/loop0 [ 790.054348] erofs: options -> [ 790.058059] erofs: cannot find valid erofs superblock [ 790.164310] erofs: read_super, device -> /dev/loop0 19:41:11 executing program 4: r0 = creat(&(0x7f0000000280)='./file0\x00', 0x3) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) bind$bt_l2cap(r1, &(0x7f0000000000), 0x58) listen(r1, 0x0) write$binfmt_script(r0, &(0x7f0000000080)=ANY=[@ANYRESDEC=r1], 0x191) close(r0) execve(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) 19:41:11 executing program 0: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e0", 0x4, 0x90630300}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000080)) [ 790.190615] erofs: options -> [ 790.206897] erofs: cannot find valid erofs superblock [ 790.229524] erofs: read_super, device -> /dev/loop3 [ 790.235849] erofs: read_super, device -> /dev/loop2 [ 790.268695] erofs: options -> fault_injection=0x0000000000000000, [ 790.275035] erofs: options -> fault_injection=0x0000000000000000, [ 790.294528] erofs: FAULT_INJECTION was not selected [ 790.303154] erofs: FAULT_INJECTION was not selected [ 790.311473] erofs: read_super, device -> /dev/loop1 [ 790.316333] erofs: read_super, device -> /dev/loop5 [ 790.316620] erofs: options -> fault_injection=0x0000000000000000, [ 790.331259] erofs: options -> fault_injection=0x0000000000000000, [ 790.334997] erofs: root inode @ nid 36 [ 790.342469] erofs: root inode @ nid 0 [ 790.349219] erofs: FAULT_INJECTION was not selected [ 790.356739] erofs: bogus i_mode (0) @ nid 0 19:41:11 executing program 4: r0 = creat(&(0x7f0000000280)='./file0\x00', 0x3) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) bind$bt_l2cap(r1, &(0x7f0000000000), 0x58) listen(r1, 0x0) write$binfmt_script(r0, &(0x7f0000000080)=ANY=[@ANYRESDEC=r1], 0x191) (async) close(r0) (async) execve(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) [ 790.364679] erofs: mounted on /dev/loop2 with opts: fault_injection=0x0000000000000000. [ 790.373705] erofs: root inode @ nid 36 [ 790.383918] erofs: bogus i_mode (0) @ nid 36 [ 790.404600] erofs: FAULT_INJECTION was not selected [ 790.421099] erofs: root inode @ nid 36 [ 790.425181] erofs: bogus i_mode (0) @ nid 36 19:41:11 executing program 3: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467011000000c", 0xd, 0x400}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000080)={[{@fault_injection}]}) 19:41:11 executing program 2: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c0024", 0xf, 0x400}, {&(0x7f0000000280)="05000400c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000080)={[{@fault_injection}]}) 19:41:11 executing program 1: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c0024", 0xf, 0x400}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000080)={[{@fault_injection}]}) 19:41:11 executing program 4: r0 = creat(&(0x7f0000000280)='./file0\x00', 0x3) (async) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) bind$bt_l2cap(r1, &(0x7f0000000000), 0x58) (async) listen(r1, 0x0) (async) write$binfmt_script(r0, &(0x7f0000000080)=ANY=[@ANYRESDEC=r1], 0x191) close(r0) execve(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) 19:41:11 executing program 0: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e0", 0x4, 0xbae60100}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000080)) [ 790.510428] erofs: unmounted for /dev/loop2 [ 790.521309] erofs: read_super, device -> /dev/loop0 [ 790.546720] erofs: options -> [ 790.551880] erofs: cannot find valid erofs superblock 19:41:11 executing program 5: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00443010000000c0024", 0xf, 0x400}, {&(0x7f0000000280)="05", 0x1, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000080)={[{@fault_injection}]}) 19:41:11 executing program 4: r0 = creat(&(0x7f0000000080)='./file0\x00', 0x3) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[@ANYBLOB='!\t'], 0x191) close(r0) setxattr$security_capability(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), &(0x7f0000000140)=@v1={0x1000000, [{0x8, 0x7}]}, 0xc, 0x3) execve(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) [ 790.643830] erofs: read_super, device -> /dev/loop3 [ 790.649363] erofs: read_super, device -> /dev/loop1 [ 790.654393] erofs: options -> fault_injection=0x0000000000000000, [ 790.665856] erofs: options -> fault_injection=0x0000000000000000, [ 790.688810] erofs: read_super, device -> /dev/loop5 [ 790.714245] erofs: FAULT_INJECTION was not selected [ 790.718122] erofs: options -> fault_injection=0x0000000000000000, [ 790.732063] erofs: FAULT_INJECTION was not selected [ 790.746186] erofs: FAULT_INJECTION was not selected [ 790.782465] erofs: read_super, device -> /dev/loop0 [ 790.793981] erofs: root inode @ nid 36 [ 790.798197] erofs: root inode @ nid 36 [ 790.805793] erofs: bogus i_mode (0) @ nid 36 [ 790.817453] erofs: options -> [ 790.818943] erofs: root inode @ nid 0 [ 790.824325] erofs: bogus i_mode (0) @ nid 36 19:41:11 executing program 1: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c0024", 0xf, 0x400}, {0x0, 0x0, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000080)={[{@fault_injection}]}) 19:41:11 executing program 5: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00444010000000c0024", 0xf, 0x400}, {&(0x7f0000000280)="05", 0x1, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000080)={[{@fault_injection}]}) 19:41:11 executing program 4: r0 = creat(&(0x7f0000000080)='./file0\x00', 0x3) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[@ANYBLOB='!\t'], 0x191) (async) close(r0) setxattr$security_capability(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), &(0x7f0000000140)=@v1={0x1000000, [{0x8, 0x7}]}, 0xc, 0x3) (async) execve(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) [ 790.826404] erofs: bogus i_mode (0) @ nid 0 [ 790.834815] erofs: cannot find valid erofs superblock 19:41:12 executing program 3: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467012100000c", 0xd, 0x400}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000080)={[{@fault_injection}]}) 19:41:12 executing program 0: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e0", 0x4, 0xbbe60100}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000080)) [ 790.977547] erofs: read_super, device -> /dev/loop2 [ 790.983092] erofs: options -> fault_injection=0x0000000000000000, [ 790.996347] erofs: read_super, device -> /dev/loop5 [ 791.001573] erofs: options -> fault_injection=0x0000000000000000, [ 791.015965] erofs: FAULT_INJECTION was not selected [ 791.020798] erofs: FAULT_INJECTION was not selected [ 791.023921] erofs: root inode @ nid 36 [ 791.026432] erofs: root inode @ nid 36 [ 791.031847] erofs: mounted on /dev/loop2 with opts: fault_injection=0x0000000000000000. [ 791.036335] erofs: bogus i_mode (0) @ nid 36 [ 791.053087] erofs: read_super, device -> /dev/loop1 [ 791.058156] erofs: options -> fault_injection=0x0000000000000000, 19:41:12 executing program 4: r0 = creat(&(0x7f0000000080)='./file0\x00', 0x3) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[@ANYBLOB='!\t'], 0x191) close(r0) setxattr$security_capability(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), &(0x7f0000000140)=@v1={0x1000000, [{0x8, 0x7}]}, 0xc, 0x3) execve(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) creat(&(0x7f0000000080)='./file0\x00', 0x3) (async) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[@ANYBLOB='!\t'], 0x191) (async) close(r0) (async) setxattr$security_capability(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), &(0x7f0000000140)=@v1={0x1000000, [{0x8, 0x7}]}, 0xc, 0x3) (async) execve(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) (async) [ 791.110442] erofs: FAULT_INJECTION was not selected [ 791.117378] erofs: root inode @ nid 36 [ 791.123873] erofs: bogus i_mode (0) @ nid 36 [ 791.147135] erofs: read_super, device -> /dev/loop3 19:41:12 executing program 2: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c0024", 0xf, 0x400}, {&(0x7f0000000280)="05000500c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000080)={[{@fault_injection}]}) 19:41:12 executing program 5: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00445010000000c0024", 0xf, 0x400}, {&(0x7f0000000280)="05", 0x1, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000080)={[{@fault_injection}]}) 19:41:12 executing program 4: r0 = creat(&(0x7f0000000140)='./file0\x00', 0x8) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[@ANYBLOB='!\t'], 0x191) close(r0) execve(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) r1 = openat$tcp_mem(0xffffffffffffff9c, &(0x7f0000000080)='/proc/sys/net/ipv4/tcp_wmem\x00', 0x1, 0x0) sendfile(r0, r1, &(0x7f00000000c0)=0x1, 0x3ff) [ 791.167161] erofs: options -> fault_injection=0x0000000000000000, [ 791.175558] erofs: FAULT_INJECTION was not selected [ 791.181246] erofs: unmounted for /dev/loop2 [ 791.185071] erofs: root inode @ nid 0 [ 791.191431] erofs: bogus i_mode (0) @ nid 0 [ 791.249269] erofs: read_super, device -> /dev/loop0 [ 791.254316] erofs: options -> [ 791.257753] erofs: cannot find valid erofs superblock [ 791.271881] erofs: read_super, device -> /dev/loop5 [ 791.288410] erofs: options -> fault_injection=0x0000000000000000, 19:41:12 executing program 0: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e0", 0x4, 0xbde60100}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000080)) 19:41:12 executing program 1: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c0024", 0xf, 0x400}, {0x0, 0x0, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000080)={[{@fault_injection}]}) [ 791.316136] erofs: FAULT_INJECTION was not selected 19:41:12 executing program 3: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467012300000c", 0xd, 0x400}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000080)={[{@fault_injection}]}) [ 791.348376] erofs: root inode @ nid 36 [ 791.358182] erofs: bogus i_mode (0) @ nid 36 [ 791.370865] erofs: read_super, device -> /dev/loop2 [ 791.386638] erofs: options -> fault_injection=0x0000000000000000, [ 791.402757] erofs: FAULT_INJECTION was not selected 19:41:12 executing program 5: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00446010000000c0024", 0xf, 0x400}, {&(0x7f0000000280)="05", 0x1, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000080)={[{@fault_injection}]}) 19:41:12 executing program 4: r0 = creat(&(0x7f0000000140)='./file0\x00', 0x8) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[@ANYBLOB='!\t'], 0x191) (async) close(r0) execve(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) (async) r1 = openat$tcp_mem(0xffffffffffffff9c, &(0x7f0000000080)='/proc/sys/net/ipv4/tcp_wmem\x00', 0x1, 0x0) sendfile(r0, r1, &(0x7f00000000c0)=0x1, 0x3ff) [ 791.428030] erofs: root inode @ nid 36 [ 791.448178] erofs: mounted on /dev/loop2 with opts: fault_injection=0x0000000000000000. [ 791.468030] erofs: read_super, device -> /dev/loop1 [ 791.475185] erofs: read_super, device -> /dev/loop0 [ 791.497925] erofs: options -> fault_injection=0x0000000000000000, [ 791.505850] erofs: options -> [ 791.514695] erofs: read_super, device -> /dev/loop3 [ 791.523976] erofs: cannot find valid erofs superblock [ 791.530494] erofs: options -> fault_injection=0x0000000000000000, [ 791.537579] erofs: FAULT_INJECTION was not selected [ 791.556244] erofs: FAULT_INJECTION was not selected [ 791.570232] erofs: read_super, device -> /dev/loop5 19:41:12 executing program 0: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e0", 0x4, 0xbee60100}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000080)) 19:41:12 executing program 2: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c0024", 0xf, 0x400}, {&(0x7f0000000280)="05000600c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000080)={[{@fault_injection}]}) 19:41:12 executing program 1: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c0024", 0xf, 0x400}, {0x0, 0x0, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000080)={[{@fault_injection}]}) [ 791.593824] erofs: root inode @ nid 36 [ 791.601575] erofs: bogus i_mode (0) @ nid 36 [ 791.605192] erofs: options -> fault_injection=0x0000000000000000, [ 791.606312] erofs: root inode @ nid 0 [ 791.616678] erofs: unmounted for /dev/loop2 [ 791.618288] erofs: bogus i_mode (0) @ nid 0 19:41:12 executing program 4: r0 = creat(&(0x7f0000000140)='./file0\x00', 0x8) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[@ANYBLOB='!\t'], 0x191) (async) close(r0) (async) execve(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) (async) r1 = openat$tcp_mem(0xffffffffffffff9c, &(0x7f0000000080)='/proc/sys/net/ipv4/tcp_wmem\x00', 0x1, 0x0) sendfile(r0, r1, &(0x7f00000000c0)=0x1, 0x3ff) 19:41:12 executing program 5: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00447010000000c0024", 0xf, 0x400}, {&(0x7f0000000280)="05", 0x1, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000080)={[{@fault_injection}]}) 19:41:12 executing program 4: r0 = creat(&(0x7f0000000280)='./file0\x00', 0x3) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[@ANYBLOB='!\t'], 0x191) write$binfmt_misc(r0, &(0x7f0000000080)={'syz0'}, 0x4) lremovexattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)=@known='user.incfs.id\x00') close(r0) execve(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) [ 791.679802] erofs: FAULT_INJECTION was not selected [ 791.685205] erofs: root inode @ nid 36 [ 791.690685] erofs: bogus i_mode (0) @ nid 36 [ 791.759742] erofs: read_super, device -> /dev/loop0 [ 791.765128] erofs: options -> [ 791.768796] erofs: read_super, device -> /dev/loop1 [ 791.773826] erofs: options -> fault_injection=0x0000000000000000, [ 791.783535] erofs: cannot find valid erofs superblock [ 791.793694] erofs: FAULT_INJECTION was not selected 19:41:12 executing program 3: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467016000000c", 0xd, 0x400}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000080)={[{@fault_injection}]}) [ 791.827653] erofs: read_super, device -> /dev/loop2 [ 791.842830] erofs: options -> fault_injection=0x0000000000000000, [ 791.863932] erofs: root inode @ nid 36 19:41:12 executing program 0: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e0", 0x4, 0xc0e60100}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000080)) [ 791.875051] erofs: read_super, device -> /dev/loop5 [ 791.880337] erofs: options -> fault_injection=0x0000000000000000, [ 791.889931] erofs: FAULT_INJECTION was not selected [ 791.893467] erofs: read_super, device -> /dev/loop3 [ 791.902296] erofs: FAULT_INJECTION was not selected [ 791.911478] erofs: bogus i_mode (0) @ nid 36 [ 791.915376] erofs: root inode @ nid 36 [ 791.921078] erofs: options -> fault_injection=0x0000000000000000, 19:41:12 executing program 4: r0 = creat(&(0x7f0000000280)='./file0\x00', 0x3) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[@ANYBLOB='!\t'], 0x191) (async) write$binfmt_misc(r0, &(0x7f0000000080)={'syz0'}, 0x4) lremovexattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)=@known='user.incfs.id\x00') (async) close(r0) (async) execve(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) [ 791.922616] erofs: root inode @ nid 36 [ 791.941544] erofs: bogus i_mode (0) @ nid 36 [ 791.943028] erofs: mounted on /dev/loop2 with opts: fault_injection=0x0000000000000000. [ 791.946415] erofs: FAULT_INJECTION was not selected [ 791.959722] erofs: root inode @ nid 0 [ 791.963720] erofs: bogus i_mode (0) @ nid 0 19:41:13 executing program 1: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c0024", 0xf, 0x400}, {&(0x7f0000000280), 0x0, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000080)={[{@fault_injection}]}) 19:41:13 executing program 4: r0 = creat(&(0x7f0000000280)='./file0\x00', 0x3) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[@ANYBLOB='!\t'], 0x191) (async) write$binfmt_misc(r0, &(0x7f0000000080)={'syz0'}, 0x4) (async, rerun: 64) lremovexattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)=@known='user.incfs.id\x00') (async, rerun: 64) close(r0) (async, rerun: 64) execve(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) (rerun: 64) [ 791.978181] erofs: read_super, device -> /dev/loop0 [ 791.996172] erofs: options -> [ 792.002721] erofs: cannot find valid erofs superblock 19:41:13 executing program 0: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e0", 0x4, 0xc0e70100}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000080)) 19:41:13 executing program 5: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00449010000000c0024", 0xf, 0x400}, {&(0x7f0000000280)="05", 0x1, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000080)={[{@fault_injection}]}) 19:41:13 executing program 2: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c0024", 0xf, 0x400}, {&(0x7f0000000280)="05000700c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000080)={[{@fault_injection}]}) 19:41:13 executing program 3: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467018201000c", 0xd, 0x400}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000080)={[{@fault_injection}]}) [ 792.111917] erofs: read_super, device -> /dev/loop1 [ 792.116970] erofs: options -> fault_injection=0x0000000000000000, [ 792.148808] erofs: unmounted for /dev/loop2 [ 792.152753] erofs: FAULT_INJECTION was not selected [ 792.158265] erofs: root inode @ nid 36 [ 792.173932] erofs: bogus i_mode (0) @ nid 36 [ 792.297917] erofs: read_super, device -> /dev/loop5 [ 792.308731] erofs: read_super, device -> /dev/loop2 [ 792.314061] erofs: options -> fault_injection=0x0000000000000000, [ 792.327535] erofs: read_super, device -> /dev/loop3 [ 792.335729] erofs: FAULT_INJECTION was not selected [ 792.342970] erofs: read_super, device -> /dev/loop0 19:41:13 executing program 1: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c0024", 0xf, 0x400}, {&(0x7f0000000280), 0x0, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000080)={[{@fault_injection}]}) [ 792.352796] erofs: options -> fault_injection=0x0000000000000000, [ 792.366239] erofs: root inode @ nid 36 [ 792.370512] erofs: mounted on /dev/loop2 with opts: fault_injection=0x0000000000000000. [ 792.407819] erofs: FAULT_INJECTION was not selected [ 792.426741] erofs: options -> fault_injection=0x0000000000000000, [ 792.434426] erofs: options -> [ 792.438961] erofs: cannot find valid erofs superblock [ 792.446389] erofs: root inode @ nid 36 19:41:13 executing program 2: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c0024", 0xf, 0x400}, {&(0x7f0000000280)="05000800c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000080)={[{@fault_injection}]}) 19:41:13 executing program 0: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e0", 0x4, 0xc0e80100}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000080)) [ 792.467368] erofs: read_super, device -> /dev/loop1 [ 792.474455] erofs: bogus i_mode (0) @ nid 36 [ 792.480590] erofs: unmounted for /dev/loop2 [ 792.482896] erofs: FAULT_INJECTION was not selected [ 792.496073] erofs: options -> fault_injection=0x0000000000000000, [ 792.503810] erofs: FAULT_INJECTION was not selected [ 792.507962] erofs: root inode @ nid 0 [ 792.510738] erofs: root inode @ nid 36 19:41:13 executing program 3: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467013c02000c", 0xd, 0x400}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000080)={[{@fault_injection}]}) [ 792.514612] erofs: bogus i_mode (0) @ nid 0 [ 792.526716] erofs: bogus i_mode (0) @ nid 36 19:41:13 executing program 1: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c0024", 0xf, 0x400}, {&(0x7f0000000280), 0x0, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000080)={[{@fault_injection}]}) 19:41:13 executing program 5: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b0044b010000000c0024", 0xf, 0x400}, {&(0x7f0000000280)="05", 0x1, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000080)={[{@fault_injection}]}) [ 792.710743] erofs: read_super, device -> /dev/loop0 [ 792.715787] erofs: options -> [ 792.718595] erofs: read_super, device -> /dev/loop3 [ 792.723999] erofs: options -> fault_injection=0x0000000000000000, [ 792.731819] erofs: cannot find valid erofs superblock 19:41:13 executing program 3: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010003000c", 0xd, 0x400}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000080)={[{@fault_injection}]}) [ 792.772507] erofs: FAULT_INJECTION was not selected [ 792.788098] erofs: root inode @ nid 0 [ 792.797659] erofs: bogus i_mode (0) @ nid 0 [ 792.879011] erofs: read_super, device -> /dev/loop1 [ 792.884054] erofs: options -> fault_injection=0x0000000000000000, [ 792.894860] erofs: read_super, device -> /dev/loop3 [ 792.900033] erofs: options -> fault_injection=0x0000000000000000, [ 792.909490] erofs: read_super, device -> /dev/loop2 [ 792.920308] erofs: read_super, device -> /dev/loop5 [ 792.927564] erofs: options -> fault_injection=0x0000000000000000, [ 792.945618] erofs: options -> fault_injection=0x0000000000000000, [ 792.948315] erofs: FAULT_INJECTION was not selected [ 792.962790] erofs: root inode @ nid 0 [ 792.970567] erofs: FAULT_INJECTION was not selected 19:41:14 executing program 4: r0 = creat(&(0x7f0000000280)='./file0\x00', 0x3) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[@ANYBLOB=' \t'], 0x191) close(r0) execve(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) sendmsg(r0, &(0x7f0000001680)={&(0x7f0000000080)=@rxrpc=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x1f, 0x9, @dev={0xfe, 0x80, '\x00', 0x36}, 0x9}}, 0x80, &(0x7f00000012c0)=[{&(0x7f0000000100)="64ea2a279e062f08cbfeadf3f1669764dfcbc28353c2c7079a3b6f561d46cbcbcc5b9efb9a3d85032a5e7bdd6bae0abf6e714be03889c99dd1ebc41eca047f88dcc41a6728dfbfac287dfe57fc90c9cb057e500c90b3433c5fa1d6838a5fd912d9cc85c361e74ed0429914179602d60743d62702cc60fcca4e3b5d15acec747c661b5913820757cf", 0x88}, {&(0x7f00000001c0)="dd2b1580014e0aada3cb6bc87a3a04de7ae20c9529877e1d507dcdd87595352528d2e6ceb000ca9ce9f049fe24f382bce23f7032b15f", 0x36}, {&(0x7f00000002c0)="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", 0x1000}, {&(0x7f0000000200)="5b1ac4f45059cd82b2f668833395a5e1d5a516e4a87e31bff9e6da84bf00199927bcba94778e1e1698774a4e65610c17946d858ac9445e3fc351b2ecb6c4c71e544ca096cc", 0x45}], 0x4, &(0x7f0000001300)=[{0x100, 0x36, 0xfc5, "ebb62d84e9bc959fcc523ea73f7ba65ed713bc2b499b4ed12dcc5116288304f9ab2986f6ef91037438bd0f53a76b8fe031c823f9e5ac8970d891216d847015b387d7b379661a34df8d62c371b17d5907b37f173dc205b8ae5df45c9998208a96c97df4bfa2da2c04ea4c4831a6b9070c5839035fe46d9a9f8e2de36d8d2245e26ea6d2d4d77d064a8ff8b1efbce9e7cedbd6630f75f868bc692288aa543ad4d498839461334623a856e5065523a0d70983e09a06eb9e620bcf4be3b653ae96caa76d34b3b251b49bab6942d80c175f253e20d1a0633e26d19fbd9e58d831d36d98184e497991bd05830c94b9fd4208"}, {0xb0, 0x10a, 0x5, "bd470f6a868b1b466b100fd9b85ea57958dc336958898da930035adacad367a9ecce651cb14ab3ece4b739dd867f59b99cce744eaebbe1d59063c8fec3c300287fd2bbcd818b3695c059e3c8b4a88ddb38913b89fb9d3faa5b67f8a12d33f9f1cf9ce7105af081eab2b7d2609f30d4cd1dc08477719e166b75a2c6417242cfcf42835c3e49d10e513413dea9835b0e32967068a73d5493fd214c5a67ed5beae4"}, {0xb8, 0x10e, 0xb547, "1128859d64c2692128ad28b6c0f8e0a5871f8507031e934cd9c0c1e0024b6c658530823d45f784077fc9fc694111fabbe2b7faf84230de05e67a0721fd6ddd0441493eb327718b907577c8602c6c72de7c7341429d22546423adb6dd3bc75e241896459e1db5816b349a782a09f6b43c1da693f203f023ed001cc8479cd2251838c9b60462d2a13b14f74b237a8a8f73351d81bb23c0ee45871d1f5164813c8f9404539f"}, {0x60, 0x84, 0x4, "aa11b385e83581273f28222867f007c5f36cdb396c75fbbe24171cca860188ff2cf146fd5121b92fa1f79506fc7916fffe8195773ad2648d076dcaf4fdbd83b73ba4c893a2ab24ef7ef1cd"}, {0xb8, 0x112, 0x1397, "a87f008d04d977b12b3eaa4810332e405de0cb8854baab4529d62ed98c135b5897abbd2e5c8091794fd31353c820b49d57dc574603b4d00aacab9fa0e2c71e0741155c7370de668f65af96831388bff51ff1a8beeb0883527833a014184b2103ef6a0e4c19e80a1241da6c45db69c423b61fe6ec2cc5b55ff7152abef2174211f58e645aee183b8fc37011fb8971faebf0848d880829fd96242c3260894b9293412de3"}], 0x380}, 0x4) 19:41:14 executing program 0: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e0", 0x4, 0xc0e90100}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000080)) [ 792.981509] erofs: FAULT_INJECTION was not selected [ 792.995521] erofs: bogus i_mode (0) @ nid 0 [ 792.995707] erofs: FAULT_INJECTION was not selected [ 793.005971] erofs: root inode @ nid 36 [ 793.017169] erofs: mounted on /dev/loop2 with opts: fault_injection=0x0000000000000000. [ 793.027590] erofs: root inode @ nid 36 [ 793.034129] erofs: root inode @ nid 36 [ 793.040491] erofs: bogus i_mode (0) @ nid 36 [ 793.062596] erofs: bogus i_mode (0) @ nid 36 19:41:14 executing program 3: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467018203000c", 0xd, 0x400}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000080)={[{@fault_injection}]}) 19:41:14 executing program 2: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c0024", 0xf, 0x400}, {&(0x7f0000000280)="05003c02c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000080)={[{@fault_injection}]}) 19:41:14 executing program 4: r0 = creat(&(0x7f0000000280)='./file0\x00', 0x3) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[@ANYBLOB=' \t'], 0x191) (async) close(r0) (async) execve(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) sendmsg(r0, &(0x7f0000001680)={&(0x7f0000000080)=@rxrpc=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x1f, 0x9, @dev={0xfe, 0x80, '\x00', 0x36}, 0x9}}, 0x80, &(0x7f00000012c0)=[{&(0x7f0000000100)="64ea2a279e062f08cbfeadf3f1669764dfcbc28353c2c7079a3b6f561d46cbcbcc5b9efb9a3d85032a5e7bdd6bae0abf6e714be03889c99dd1ebc41eca047f88dcc41a6728dfbfac287dfe57fc90c9cb057e500c90b3433c5fa1d6838a5fd912d9cc85c361e74ed0429914179602d60743d62702cc60fcca4e3b5d15acec747c661b5913820757cf", 0x88}, {&(0x7f00000001c0)="dd2b1580014e0aada3cb6bc87a3a04de7ae20c9529877e1d507dcdd87595352528d2e6ceb000ca9ce9f049fe24f382bce23f7032b15f", 0x36}, {&(0x7f00000002c0)="31537a38dc80bfdef7a81cf97be2f65081672fabc93e2a3fc443cb9d8aa9e4ac1ea412567e0ad5c732076f2f3b799d77a9aed4ed4316c413564c47502c98d1ddb8a4adf7532abac976d9daf0d7eaeb4fc7b008ff1f70e391fdfabd5dff0718d35949b55729a67147eab1c25046d2ff24fb910130704144762bdab0d6946efa04924a51826bf544ac75793ce31eb4eb8f9bfc06da134a95d0f2bed14902b90987fc57b9102859c35df8b2d210c886e5c75d7858195072cb43592ae01710ce94d8c9636b235732f278e2c7b99b247d4af9b9c3307aee57a50c1cb00ebc969a5756093b5a1b852ab52b13fcb4ba19c524084af07d4be069afec4dad11973310648e9d9cb071e1f2de91296ca2ddc9a5fabf454dae05698e363540021cea536ded45fa7cfc16c1ab8a3e71b20467f23b91d7e18276b14594a687eae243c380807c9035cfbf7319f5af51ce3b1389a400979f4b251a74918952547d728129f788bd5cf9c16654b4f39b0a0ab4f2f9db9a33af5f07ac5b9bcb729fd638d3f55bad8dc73ca7faf3fefe0acfab4870e367791b632af3b695d842200cd5b201a1ce48db8a95ca04d1d9c03d87378922b015c43c5c4ac35f544c97b0e1a3c47e9f6c67827f04e37c8278cc4f37f264ea4f885cafcd6292003c0f1b50bc7d624f965f3fe572d9797058f7edaea29ce57c133ae7a7e8094d77babd5bae408aed0e8d869e8985ef99c1c0e4f58145ef24b5546d5b1230ef9a67feac3f088b7e9ee908f922b97cc69d1c01799f6c614ac1036bf50010b9b1c2f7361a9f266c4b07dc8ce50f8b0fa5b9f70be76bbc796db892438d1c696dd934f4b2f6d6d8efc101ed738f3993c8f2c65ef6f550674afc9a6cfd0beed83ec3296d3092df335f4dd5527da3bf465253725d2b667093a4a745670e6ef824367510943d0ac312601bf3989c7c3957d408d8ea09bf920c97e5afa2d98bba98a33a9dc92342bc513b81f5e622b82e9895a6ff1b88fabddf9b936514c4716b8b7e110614ecc3bd427b12a33a7ebd83604117b4156c3253c8c636b9456d4a4bce806edf5383a38dbda0606d2e7ecd446fa340c35ea01480b9a6f25cfdd7136c65e7fe48b21132b038db70cf3bc5230234dc945abdbf319fb7eb5237390d85431c723ff6170a581fab8812587e9a064c571af40bdd7c60d0ca3a69ffc1f5510a18d5ff2205d87597570a267e50c554f2ab07098aa5d5a4d467015b63deb61889f8d815a1cbc7852b86a84d1985bf6af933d2bbbf3f2edc1c1da511513d45b8359728d5ca23a3c00cf77e86eb08e78eeb895a063484ad33b914e09c2f7c3d9c14d8a3fa224d7c9312e78a0967d89a6148169165a1f17e17ddc65cef74eec2bcecddf79c525bb6546d5db5d3665b6f72ff32c7250bf913ebcd8ceec48287a2f8d9e78b34cd49edaf525f9d78375a14b626d6634b72b12c44e014f52a831d444309a1b9679f17aa37c4625c6a70fc693e96ec6aca7aca2bdd82e72b3f5a1ec422d2cf966f9596ccdb825b344da1ce994c6ab5f6ecaf4f0ef807c1486d8e6cb982ae3461686cc69ad80e115527788c4894db90086ec0e3eacdf6dc462fdbd3be2067239aa271895214ad60e5a0446cd8d9d106bf7531a34567f28dd16a51857ac07bb2e495b3f55acd028969aceddd235444443ce2ccd60b0e7d856537182f9604f858628efae67a830ba8d5e289a30c7630dccb69581942ccfa5de3257664e4883a87dabad2d1835d4b3c143242f19281033e3169fa7ec127e81104fa3a75c9689736a8d8b94803d6fd2ea8e15d1e04db50adef641fd60980bce9454d1b11e6ce4ec910001596f3e9951b95ea11a5d673db9f48b9822712681660f5c27f356dd5c914fd71df678ee81ffdf9ce7ad9dc488214e64a8401c820a34892ee930f18e51beb24d63f33f29cb6a822b69c0d39fef1517424c60cda1b91b503b2254fa0b4f9c28e5021d1159a06d14c156aa1f7c05543b7f46030baf1cc98b21dd952f11bf64445b58d3cfc65137aa02ae8eb8bc61795a7f07230562b983df2686ee32f2d6d19435fe8a54ba26687abe488dd8389af0062ec34cf8b4feb0d0439c140bc966f08f26d351f9e6e53a3aafdaa35cedebc0d4399fa01ada07bf14e656f87aac7192c13fc8d9e3ecd1f6697ef032204b5f1f23cdc5c667cbdeadecad85e9abb18b3f3a711b19b6a1b6746f3ad26b5732fe5df2eb2f293aed0b0f20b0ad8d361c250d23c9b14397c7fc5cc335c1eefa76c079139086af2525b750dc17b561cd1b52f0e48b49471b11b8041c1ca49a7c53fbb7e3696876c77d3b0abd2a5d3e05043a0aab9133c71449f7eee2074ae8f8d37a0648d081b4dae97823111a7342fc3c990ebb24c8b2c0b3c4d01e554ec729f5cd1ec30f5059c3503275be82f96a26d39fb79fd13b60d09653ced646af5b6770abd75880342d272427facb787b746feebac49a2d47686e438afd1ad48a599198d9c2e7e24107b8791fb240dfb8224f64991a0a3f68f55cfb02ae49e3c4393dcee0b550ee0d299acbb52849eaf1f9926fc0e548036c3d7ea8766c0c0547b6a11ebf47f5d002bf36865784b6b6a110b3dadb6c09a018375f1f90dc4244dfb6a546400823c3719d6616491cac66ed2e8573fa3af69f2516ec94f8a1def1f9a5af722621e72688b9df26d05c68edcdb30761308cc7f4b2d7a550def4695e34aaa542be2e8633c3b4fd95bff74b19fa91b64564b9dd56c70a935ce957c008b80107746de7736374e544daf84dff078630557ba47f5c27028f838ebab4911843ccfa05f8b709ec42090299b1b40a08ab9966a71cc4cc6a9d5586d7813cbc22129af06532e643e02043078b1d162ef869b97b50fd2e1e40b610de09a0b9c4ef6e70eeb0edf38911527e68067ed1d4d0c1f73c049084eb4f6851e3b1343fe68268da223d6fd7141b5064f26d6956af98194380180f4e6ed9320ca61bc08234915a0e0e9f9bbf95a950231166dea5c2a94d5a6326d90147ec9d557a380cb28baca91d69d4931df8cc559cd2cb32d54f64db95672ab150a302304f5b959b3f973b5924e5f5cf3377e71dfdb4b06fffb506eb6ac6ca5fe1f847875b8cf9f2733d0cf8e51886ce784a5405fc205abdc57f856a752c5a754262bcba9006fcef045a93a20284413387d8c4adc9fcbe8967eefe5658d12410a4484da356430a8893bb44e1946cd0bd55a55e1f684eff0aa2472f751ed79973fe1b1c92f106cc6b3b6b6dbf93af386fc02d7e9a7961008f6f3cbe5995548e787dd4c4823304cbc55528842c3977d7ebf9052f6c8f760bac0fa86206c8c8dcf209f45b73beb88d6a742b39f1badc69dae720bfe0ea75b5de0161fcb3a96297a9a5ef0e9ead1e1415188986e27b1953dc39ff551638212f6046ad8d964b7d3ab9db116509d44559274eda872b8cb42662a730a5c176c5a32a51f6385c0d0fc151c8e3802e7d0d559ca24494cd90b116c273b569d4ed61d606aeea1a2b7e6902b1c5077f7af29118fc8cb7693b09e7428c6c68fb6689b6d74947e22856a963c4cdfb8c9b9c532adbb2f2c613a8fb9b8f52a6e81bf2a0fbf2f1c3bda5e6a7e9d18a9abc7c58a2c52856caab0f308c934570e7619ff1d7dbff1a5a32f19e051f53a7bbf72ffe1df82bc51077807b43ab5d45725a16cd94dcb67fcf5dc41d82e084aca853a284e36707486831cb0cf73e0bc335ea249e7b49c593896c94f36d0bd987f927e6c0bef4167fa2f0c07da25a409b32c7417d06b38cf5e9e95b8e1e7fb9e8c78967a6f9e9556f56d90667c878ed01ddf671c9fc31aeafd6e6f3daab94b374d17062a2679286356ee350365aacab80f76233a33fd3dc0b5f5b81ef30b79a281a6052bf4f257e98924b83279552fc10ba916d1c4dbdd3ee3bf1930ea23498a33f7ea93ac22f4216e0834b4d3c9f22f835e29a9941138acb67f9a18e6fb5eb714aee6f678faafe662ed0b69aff3ea859d4eeb27878fd72edd65015745cd71887e3a41c2008d4baf374fdd4f4124642eb807094f9fadc8183b41eddd94c77bbf18db00d6d109f555a2b144f688a539dea51f6631ac3e261a99f97a6d9d480a1f9ee527d15a547a5010ee72c38a2956b99b567c25031cf7375ac514a55d230d2be6ff7498471c288e21e6e158505e66ba2fde6f5f72d05955507b8dfdf20a57ae706296a208289ac22db10d8aea7057faaa591514d181d7097975ba6f998f256416005f0e0b153e8f494d63dfd088483c4276f868ad07e95b5362fe1cea4c01cd7321f9b4151a6e512c8c31d2fb2c8974fd3d53020006549941d18df584d0de0fbebb60107a6a6a03d0ffcb7423f86886f36a4b35cd955a19d50390c34f3f1f06d614469a50981ea0fa53f9b1f5b9f6374f0df0aa5d6d02df2e59d547e57d7144e682c1cf824c68f7459c7b7d964dbda52d999b2ae6913812907c0fae7426bee28a6ce4f15effc493c549ec8237d19f1996b7e5454e194620f33f0752147f64d2790e565e0585d9493fd3cdc9df12f76451876c4de613832583fe28b98758a930406907be95e344e0d86c2b5d70d3c78a0c12ac7e56a581d258f700445aa808d68d28c5210413e8d139867d94953e98d9918b17307944e49d2ede0644c7cb26d4b5d8f16706425ddfc8e3c97aa4781d1eacda3e997730056bbf9bc9dc8c4763d78c0368797c2969aa8876d4f29f4e88ee85e2f5930eb82a1ff8891ebe7f9c9aea2cf8954028247ee43e8d3609187f012aafece60a762dd702601384e3d43f43292e3aa19ccc528f70e8620ea811d8adf4a20f2b56e0bbf91f76dfb46179f505d2531390132495789aff9be6bea25eab5b3175936c81362ea1f8c6a03250a85a1d53d779e5d399c97d6fd18e497779ad1dda835df60bce9d148a2db061915bd1103f515e3e57dc6825d6c8f4b05fc0374e50a79bb4fcbbfeded953dac9a57bf2657034e306d3d1f592c0cbba8a6db062a42c0a4ec83dfc4b43964e2bdab7a2697ed905235f4ca2d206830f3756a32d8555b3243763386098ae5b56e1bc85fb278d80437d46c112f2321dcc26b44ce3420d31a2183afb5432e22042e66e81c5b39eeee5f001a94d47736d5b68ee47c8d9dc61246043481180d1473caa2156194d744ca9a0fc25e47e048f91e67f105eb34067823da1a321ecd04175589378f0e76bb00220a6c04abeca1f4253d85ae27bf83c9f495ea97faf4d9e8f5f36fec16581707710e3059fd629f5f27896eb47e0a92b4482d653d579f8d7441874c6e8bd939f9b52df4374c5e3b005aa47af4e00feaadb7b45d08feef9a2e57668d71ea3c1ba3598fab4c14ec327c6d5119b4595891d557a322019f1e8d1c81dcf09d283dbb28368544d16468b1664170becaf07ba0645530a72cfc75504abc9beaf4d5ec6bfbbe2cc477d40711a86b3518f4c86349f2cc2d4ec43e44b291d11805d55b9d036f6c31d4ee4256c689dd77cac199e442a06156a458eea765273a030b96d9d8eb5528c6786a6f149b510b74f997337fa4e8a42182c2a503da0596d72c773363f44d0fcb9ca0dcb74471668f7e100de6c4da6962e5eea6ab7533d01d374f4cca7f1d2e071832764eddbd59977b6ffec146e57828610dca2373d79d54dd52f710fe4cce14e29e245615be5ed2a4d74dd60a3cbf1339b3c943cc36567233db52154123aefa0db482aed9488a418c7827ad5374ea11930e362478ac8f826baf563e860963a4dccea9661b960119448b7ef5d5f0f797422eb2ad0b8c7c6a967bdbf470c6584aae6dbf59d1df85c287fe69baf6d5b6f", 0x1000}, {&(0x7f0000000200)="5b1ac4f45059cd82b2f668833395a5e1d5a516e4a87e31bff9e6da84bf00199927bcba94778e1e1698774a4e65610c17946d858ac9445e3fc351b2ecb6c4c71e544ca096cc", 0x45}], 0x4, &(0x7f0000001300)=[{0x100, 0x36, 0xfc5, "ebb62d84e9bc959fcc523ea73f7ba65ed713bc2b499b4ed12dcc5116288304f9ab2986f6ef91037438bd0f53a76b8fe031c823f9e5ac8970d891216d847015b387d7b379661a34df8d62c371b17d5907b37f173dc205b8ae5df45c9998208a96c97df4bfa2da2c04ea4c4831a6b9070c5839035fe46d9a9f8e2de36d8d2245e26ea6d2d4d77d064a8ff8b1efbce9e7cedbd6630f75f868bc692288aa543ad4d498839461334623a856e5065523a0d70983e09a06eb9e620bcf4be3b653ae96caa76d34b3b251b49bab6942d80c175f253e20d1a0633e26d19fbd9e58d831d36d98184e497991bd05830c94b9fd4208"}, {0xb0, 0x10a, 0x5, "bd470f6a868b1b466b100fd9b85ea57958dc336958898da930035adacad367a9ecce651cb14ab3ece4b739dd867f59b99cce744eaebbe1d59063c8fec3c300287fd2bbcd818b3695c059e3c8b4a88ddb38913b89fb9d3faa5b67f8a12d33f9f1cf9ce7105af081eab2b7d2609f30d4cd1dc08477719e166b75a2c6417242cfcf42835c3e49d10e513413dea9835b0e32967068a73d5493fd214c5a67ed5beae4"}, {0xb8, 0x10e, 0xb547, "1128859d64c2692128ad28b6c0f8e0a5871f8507031e934cd9c0c1e0024b6c658530823d45f784077fc9fc694111fabbe2b7faf84230de05e67a0721fd6ddd0441493eb327718b907577c8602c6c72de7c7341429d22546423adb6dd3bc75e241896459e1db5816b349a782a09f6b43c1da693f203f023ed001cc8479cd2251838c9b60462d2a13b14f74b237a8a8f73351d81bb23c0ee45871d1f5164813c8f9404539f"}, {0x60, 0x84, 0x4, "aa11b385e83581273f28222867f007c5f36cdb396c75fbbe24171cca860188ff2cf146fd5121b92fa1f79506fc7916fffe8195773ad2648d076dcaf4fdbd83b73ba4c893a2ab24ef7ef1cd"}, {0xb8, 0x112, 0x1397, "a87f008d04d977b12b3eaa4810332e405de0cb8854baab4529d62ed98c135b5897abbd2e5c8091794fd31353c820b49d57dc574603b4d00aacab9fa0e2c71e0741155c7370de668f65af96831388bff51ff1a8beeb0883527833a014184b2103ef6a0e4c19e80a1241da6c45db69c423b61fe6ec2cc5b55ff7152abef2174211f58e645aee183b8fc37011fb8971faebf0848d880829fd96242c3260894b9293412de3"}], 0x380}, 0x4) [ 793.095675] erofs: unmounted for /dev/loop2 19:41:14 executing program 1: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c0024", 0xf, 0x400}, {&(0x7f0000000280)="050000", 0x3, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000080)={[{@fault_injection}]}) 19:41:14 executing program 5: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b0044d010000000c0024", 0xf, 0x400}, {&(0x7f0000000280)="05", 0x1, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000080)={[{@fault_injection}]}) [ 793.198613] erofs: read_super, device -> /dev/loop0 [ 793.203675] erofs: options -> [ 793.225156] erofs: read_super, device -> /dev/loop2 [ 793.242311] erofs: read_super, device -> /dev/loop3 19:41:14 executing program 4: r0 = creat(&(0x7f0000000280)='./file0\x00', 0x3) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[@ANYBLOB=' \t'], 0x191) (async) close(r0) execve(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) (async, rerun: 64) sendmsg(r0, &(0x7f0000001680)={&(0x7f0000000080)=@rxrpc=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x1f, 0x9, @dev={0xfe, 0x80, '\x00', 0x36}, 0x9}}, 0x80, &(0x7f00000012c0)=[{&(0x7f0000000100)="64ea2a279e062f08cbfeadf3f1669764dfcbc28353c2c7079a3b6f561d46cbcbcc5b9efb9a3d85032a5e7bdd6bae0abf6e714be03889c99dd1ebc41eca047f88dcc41a6728dfbfac287dfe57fc90c9cb057e500c90b3433c5fa1d6838a5fd912d9cc85c361e74ed0429914179602d60743d62702cc60fcca4e3b5d15acec747c661b5913820757cf", 0x88}, {&(0x7f00000001c0)="dd2b1580014e0aada3cb6bc87a3a04de7ae20c9529877e1d507dcdd87595352528d2e6ceb000ca9ce9f049fe24f382bce23f7032b15f", 0x36}, {&(0x7f00000002c0)="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", 0x1000}, {&(0x7f0000000200)="5b1ac4f45059cd82b2f668833395a5e1d5a516e4a87e31bff9e6da84bf00199927bcba94778e1e1698774a4e65610c17946d858ac9445e3fc351b2ecb6c4c71e544ca096cc", 0x45}], 0x4, &(0x7f0000001300)=[{0x100, 0x36, 0xfc5, "ebb62d84e9bc959fcc523ea73f7ba65ed713bc2b499b4ed12dcc5116288304f9ab2986f6ef91037438bd0f53a76b8fe031c823f9e5ac8970d891216d847015b387d7b379661a34df8d62c371b17d5907b37f173dc205b8ae5df45c9998208a96c97df4bfa2da2c04ea4c4831a6b9070c5839035fe46d9a9f8e2de36d8d2245e26ea6d2d4d77d064a8ff8b1efbce9e7cedbd6630f75f868bc692288aa543ad4d498839461334623a856e5065523a0d70983e09a06eb9e620bcf4be3b653ae96caa76d34b3b251b49bab6942d80c175f253e20d1a0633e26d19fbd9e58d831d36d98184e497991bd05830c94b9fd4208"}, {0xb0, 0x10a, 0x5, "bd470f6a868b1b466b100fd9b85ea57958dc336958898da930035adacad367a9ecce651cb14ab3ece4b739dd867f59b99cce744eaebbe1d59063c8fec3c300287fd2bbcd818b3695c059e3c8b4a88ddb38913b89fb9d3faa5b67f8a12d33f9f1cf9ce7105af081eab2b7d2609f30d4cd1dc08477719e166b75a2c6417242cfcf42835c3e49d10e513413dea9835b0e32967068a73d5493fd214c5a67ed5beae4"}, {0xb8, 0x10e, 0xb547, "1128859d64c2692128ad28b6c0f8e0a5871f8507031e934cd9c0c1e0024b6c658530823d45f784077fc9fc694111fabbe2b7faf84230de05e67a0721fd6ddd0441493eb327718b907577c8602c6c72de7c7341429d22546423adb6dd3bc75e241896459e1db5816b349a782a09f6b43c1da693f203f023ed001cc8479cd2251838c9b60462d2a13b14f74b237a8a8f73351d81bb23c0ee45871d1f5164813c8f9404539f"}, {0x60, 0x84, 0x4, "aa11b385e83581273f28222867f007c5f36cdb396c75fbbe24171cca860188ff2cf146fd5121b92fa1f79506fc7916fffe8195773ad2648d076dcaf4fdbd83b73ba4c893a2ab24ef7ef1cd"}, {0xb8, 0x112, 0x1397, "a87f008d04d977b12b3eaa4810332e405de0cb8854baab4529d62ed98c135b5897abbd2e5c8091794fd31353c820b49d57dc574603b4d00aacab9fa0e2c71e0741155c7370de668f65af96831388bff51ff1a8beeb0883527833a014184b2103ef6a0e4c19e80a1241da6c45db69c423b61fe6ec2cc5b55ff7152abef2174211f58e645aee183b8fc37011fb8971faebf0848d880829fd96242c3260894b9293412de3"}], 0x380}, 0x4) (rerun: 64) [ 793.250869] erofs: cannot find valid erofs superblock [ 793.257312] erofs: options -> fault_injection=0x0000000000000000, [ 793.283117] erofs: options -> fault_injection=0x0000000000000000, [ 793.305872] erofs: FAULT_INJECTION was not selected [ 793.311482] erofs: root inode @ nid 36 [ 793.315663] erofs: mounted on /dev/loop2 with opts: fault_injection=0x0000000000000000. [ 793.324461] erofs: FAULT_INJECTION was not selected [ 793.329774] erofs: root inode @ nid 0 [ 793.333821] erofs: bogus i_mode (0) @ nid 0 19:41:14 executing program 2: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c0024", 0xf, 0x400}, {&(0x7f0000000280)="05000003c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000080)={[{@fault_injection}]}) 19:41:14 executing program 0: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e0", 0x4, 0xc0ea0100}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000080)) 19:41:14 executing program 3: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467019303000c", 0xd, 0x400}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000080)={[{@fault_injection}]}) [ 793.358715] erofs: read_super, device -> /dev/loop1 [ 793.364092] erofs: options -> fault_injection=0x0000000000000000, [ 793.379514] erofs: FAULT_INJECTION was not selected [ 793.387157] erofs: unmounted for /dev/loop2 [ 793.392164] erofs: root inode @ nid 36 [ 793.396384] erofs: bogus i_mode (0) @ nid 36 [ 793.434550] erofs: read_super, device -> /dev/loop5 [ 793.439697] erofs: options -> fault_injection=0x0000000000000000, [ 793.446328] erofs: FAULT_INJECTION was not selected [ 793.453216] erofs: root inode @ nid 36 [ 793.457368] erofs: bogus i_mode (0) @ nid 36 19:41:14 executing program 1: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c0024", 0xf, 0x400}, {&(0x7f0000000280)="050000", 0x3, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000080)={[{@fault_injection}]}) 19:41:14 executing program 5: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b0044e010000000c0024", 0xf, 0x400}, {&(0x7f0000000280)="05", 0x1, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000080)={[{@fault_injection}]}) [ 793.546301] erofs: read_super, device -> /dev/loop3 [ 793.555661] erofs: options -> fault_injection=0x0000000000000000, [ 793.568561] erofs: read_super, device -> /dev/loop0 [ 793.573915] erofs: read_super, device -> /dev/loop2 [ 793.582094] erofs: options -> [ 793.585590] erofs: options -> fault_injection=0x0000000000000000, 19:41:14 executing program 0: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e0", 0x4, 0xc0eb0100}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000080)) [ 793.592771] erofs: cannot find valid erofs superblock [ 793.598533] erofs: FAULT_INJECTION was not selected [ 793.604195] erofs: root inode @ nid 36 [ 793.619944] erofs: mounted on /dev/loop2 with opts: fault_injection=0x0000000000000000. [ 793.655750] erofs: FAULT_INJECTION was not selected 19:41:14 executing program 2: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c0024", 0xf, 0x400}, {&(0x7f0000000280)="05000005c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000080)={[{@fault_injection}]}) 19:41:14 executing program 0: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e0", 0x4, 0x400}, {0x0, 0x2, 0x1000}], 0x0, &(0x7f0000000080)) [ 793.698238] erofs: root inode @ nid 0 [ 793.709569] erofs: bogus i_mode (0) @ nid 0 [ 793.714159] erofs: unmounted for /dev/loop2 [ 793.771581] erofs: read_super, device -> /dev/loop5 [ 793.776895] erofs: options -> fault_injection=0x0000000000000000, [ 793.783699] erofs: FAULT_INJECTION was not selected [ 793.788960] erofs: root inode @ nid 36 [ 793.793052] erofs: bogus i_mode (0) @ nid 36 19:41:14 executing program 3: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467019403000c", 0xd, 0x400}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000080)={[{@fault_injection}]}) [ 793.828670] erofs: read_super, device -> /dev/loop1 [ 793.833717] erofs: options -> fault_injection=0x0000000000000000, [ 793.854879] erofs: FAULT_INJECTION was not selected [ 793.868600] erofs: read_super, device -> /dev/loop0 [ 793.873645] erofs: options -> 19:41:14 executing program 5: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b0044f010000000c0024", 0xf, 0x400}, {&(0x7f0000000280)="05", 0x1, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000080)={[{@fault_injection}]}) [ 793.876888] erofs: blksize 1 isn't supported on this platform 19:41:15 executing program 0: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e0", 0x4, 0x400}, {0x0, 0x3, 0x1000}], 0x0, &(0x7f0000000080)) [ 793.918644] erofs: root inode @ nid 36 [ 793.923892] erofs: read_super, device -> /dev/loop2 [ 793.930507] erofs: bogus i_mode (0) @ nid 36 [ 793.944957] erofs: options -> fault_injection=0x0000000000000000, [ 793.966325] erofs: FAULT_INJECTION was not selected [ 793.986466] erofs: root inode @ nid 36 [ 793.997321] erofs: mounted on /dev/loop2 with opts: fault_injection=0x0000000000000000. [ 794.009554] erofs: read_super, device -> /dev/loop3 [ 794.014748] erofs: options -> fault_injection=0x0000000000000000, [ 794.035300] erofs: FAULT_INJECTION was not selected [ 794.046615] erofs: root inode @ nid 0 [ 794.053021] erofs: read_super, device -> /dev/loop5 [ 794.061938] erofs: bogus i_mode (0) @ nid 0 [ 794.096705] erofs: options -> fault_injection=0x0000000000000000, [ 794.131625] erofs: unmounted for /dev/loop2 19:41:15 executing program 4: r0 = creat(&(0x7f0000000280)='./file0\x00', 0x3) name_to_handle_at(r0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)=@FILEID_INO32_GEN={0x8, 0x1, {0x1, 0xa3}}, &(0x7f0000000100), 0x1000) write$binfmt_script(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="0125dd351f8dbe9c286124e5"], 0x191) close(r0) r1 = openat(r0, &(0x7f0000000040)='./file0\x00', 0x200, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$F2FS_IOC_RESERVE_COMPRESS_BLOCKS(r2, 0x8008f513, &(0x7f00000001c0)) setsockopt$TIPC_GROUP_JOIN(r1, 0x10f, 0x87, &(0x7f0000000180)={0x42, 0x0, 0x2}, 0x10) execve(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) 19:41:15 executing program 1: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c0024", 0xf, 0x400}, {&(0x7f0000000280)="050000", 0x3, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000080)={[{@fault_injection}]}) 19:41:15 executing program 3: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467019503000c", 0xd, 0x400}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000080)={[{@fault_injection}]}) 19:41:15 executing program 2: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c0024", 0xf, 0x400}, {&(0x7f0000000280)="05000006c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000080)={[{@fault_injection}]}) [ 794.152835] erofs: FAULT_INJECTION was not selected [ 794.159896] erofs: read_super, device -> /dev/loop0 [ 794.164935] erofs: options -> [ 794.168175] erofs: blksize 1 isn't supported on this platform [ 794.179223] erofs: root inode @ nid 36 [ 794.212238] erofs: bogus i_mode (0) @ nid 36 19:41:15 executing program 5: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00452010000000c0024", 0xf, 0x400}, {&(0x7f0000000280)="05", 0x1, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000080)={[{@fault_injection}]}) 19:41:15 executing program 4: r0 = creat(&(0x7f0000000280)='./file0\x00', 0x3) name_to_handle_at(r0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)=@FILEID_INO32_GEN={0x8, 0x1, {0x1, 0xa3}}, &(0x7f0000000100), 0x1000) (async, rerun: 64) write$binfmt_script(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="0125dd351f8dbe9c286124e5"], 0x191) (async, rerun: 64) close(r0) (async, rerun: 32) r1 = openat(r0, &(0x7f0000000040)='./file0\x00', 0x200, 0x0) (async, rerun: 32) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$F2FS_IOC_RESERVE_COMPRESS_BLOCKS(r2, 0x8008f513, &(0x7f00000001c0)) setsockopt$TIPC_GROUP_JOIN(r1, 0x10f, 0x87, &(0x7f0000000180)={0x42, 0x0, 0x2}, 0x10) (async, rerun: 64) execve(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) (rerun: 64) 19:41:15 executing program 0: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e0", 0x4, 0x400}, {0x0, 0x4, 0x1000}], 0x0, &(0x7f0000000080)) [ 794.324055] erofs: read_super, device -> /dev/loop1 [ 794.339133] erofs: options -> fault_injection=0x0000000000000000, [ 794.352205] erofs: read_super, device -> /dev/loop3 [ 794.366730] erofs: options -> fault_injection=0x0000000000000000, [ 794.371535] erofs: read_super, device -> /dev/loop2 [ 794.391787] erofs: options -> fault_injection=0x0000000000000000, [ 794.393318] erofs: FAULT_INJECTION was not selected [ 794.403256] erofs: FAULT_INJECTION was not selected [ 794.412326] erofs: FAULT_INJECTION was not selected [ 794.423921] erofs: root inode @ nid 36 [ 794.436865] erofs: root inode @ nid 0 [ 794.451741] erofs: bogus i_mode (0) @ nid 0 [ 794.455619] erofs: bogus i_mode (0) @ nid 36 [ 794.469956] erofs: read_super, device -> /dev/loop5 [ 794.475210] erofs: options -> fault_injection=0x0000000000000000, [ 794.482118] erofs: FAULT_INJECTION was not selected [ 794.487669] erofs: root inode @ nid 36 [ 794.492175] erofs: bogus i_mode (0) @ nid 36 [ 794.515999] erofs: root inode @ nid 36 [ 794.525846] erofs: mounted on /dev/loop2 with opts: fault_injection=0x0000000000000000. 19:41:15 executing program 5: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00453010000000c0024", 0xf, 0x400}, {&(0x7f0000000280)="05", 0x1, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000080)={[{@fault_injection}]}) 19:41:15 executing program 3: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467019603000c", 0xd, 0x400}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000080)={[{@fault_injection}]}) 19:41:15 executing program 2: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c0024", 0xf, 0x400}, {&(0x7f0000000280)="05000007c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000080)={[{@fault_injection}]}) 19:41:15 executing program 1: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c0024", 0xf, 0x400}, {&(0x7f0000000280)="0500000400", 0x5, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000080)={[{@fault_injection}]}) [ 794.614231] erofs: unmounted for /dev/loop2 [ 794.620098] erofs: read_super, device -> /dev/loop0 [ 794.638383] erofs: options -> 19:41:15 executing program 4: r0 = creat(&(0x7f0000000280)='./file0\x00', 0x3) name_to_handle_at(r0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)=@FILEID_INO32_GEN={0x8, 0x1, {0x1, 0xa3}}, &(0x7f0000000100), 0x1000) write$binfmt_script(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="0125dd351f8dbe9c286124e5"], 0x191) close(r0) r1 = openat(r0, &(0x7f0000000040)='./file0\x00', 0x200, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$F2FS_IOC_RESERVE_COMPRESS_BLOCKS(r2, 0x8008f513, &(0x7f00000001c0)) setsockopt$TIPC_GROUP_JOIN(r1, 0x10f, 0x87, &(0x7f0000000180)={0x42, 0x0, 0x2}, 0x10) execve(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) creat(&(0x7f0000000280)='./file0\x00', 0x3) (async) name_to_handle_at(r0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)=@FILEID_INO32_GEN={0x8, 0x1, {0x1, 0xa3}}, &(0x7f0000000100), 0x1000) (async) write$binfmt_script(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="0125dd351f8dbe9c286124e5"], 0x191) (async) close(r0) (async) openat(r0, &(0x7f0000000040)='./file0\x00', 0x200, 0x0) (async) socket$nl_netfilter(0x10, 0x3, 0xc) (async) ioctl$F2FS_IOC_RESERVE_COMPRESS_BLOCKS(r2, 0x8008f513, &(0x7f00000001c0)) (async) setsockopt$TIPC_GROUP_JOIN(r1, 0x10f, 0x87, &(0x7f0000000180)={0x42, 0x0, 0x2}, 0x10) (async) execve(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) (async) [ 794.665603] erofs: blksize 1 isn't supported on this platform [ 794.689559] erofs: read_super, device -> /dev/loop5 [ 794.708750] erofs: options -> fault_injection=0x0000000000000000, 19:41:15 executing program 4: r0 = creat(&(0x7f0000000280)='./file0\x00', 0x3) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[@ANYBLOB='!\t'], 0x191) close(r0) execve(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) execve(&(0x7f0000000080)='./file0\x00', &(0x7f0000000180)=[&(0x7f00000000c0)='^-\x00', &(0x7f0000000100)='\x00', &(0x7f0000000140)='\x00'], &(0x7f0000000480)=[&(0x7f00000001c0)=']@\x00', &(0x7f0000000200)='#%*#-..\x00', &(0x7f0000000240)=')\x00', &(0x7f00000002c0)='\x00', &(0x7f0000000300)='%&\x00', &(0x7f0000000340)='-.!\\\x00', &(0x7f0000000380)='$\'{\x00', &(0x7f00000003c0)='\x00', &(0x7f0000000400)='/([,:-,*@\x00', &(0x7f0000000440)='\\%])]{]\\\']:\'\x00']) 19:41:15 executing program 0: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e0", 0x4, 0x400}, {0x0, 0x5, 0x1000}], 0x0, &(0x7f0000000080)) [ 794.727838] erofs: FAULT_INJECTION was not selected [ 794.734011] erofs: root inode @ nid 36 [ 794.742983] erofs: bogus i_mode (0) @ nid 36 19:41:15 executing program 5: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00455010000000c0024", 0xf, 0x400}, {&(0x7f0000000280)="05", 0x1, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000080)={[{@fault_injection}]}) [ 794.795381] erofs: read_super, device -> /dev/loop3 [ 794.798512] erofs: read_super, device -> /dev/loop1 [ 794.800788] erofs: read_super, device -> /dev/loop2 [ 794.806350] erofs: options -> fault_injection=0x0000000000000000, [ 794.820456] erofs: options -> fault_injection=0x0000000000000000, [ 794.827605] erofs: FAULT_INJECTION was not selected [ 794.838824] erofs: options -> fault_injection=0x0000000000000000, 19:41:15 executing program 4: r0 = creat(&(0x7f0000000280)='./file0\x00', 0x3) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[@ANYBLOB='!\t'], 0x191) (async) close(r0) (async) execve(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) execve(&(0x7f0000000080)='./file0\x00', &(0x7f0000000180)=[&(0x7f00000000c0)='^-\x00', &(0x7f0000000100)='\x00', &(0x7f0000000140)='\x00'], &(0x7f0000000480)=[&(0x7f00000001c0)=']@\x00', &(0x7f0000000200)='#%*#-..\x00', &(0x7f0000000240)=')\x00', &(0x7f00000002c0)='\x00', &(0x7f0000000300)='%&\x00', &(0x7f0000000340)='-.!\\\x00', &(0x7f0000000380)='$\'{\x00', &(0x7f00000003c0)='\x00', &(0x7f0000000400)='/([,:-,*@\x00', &(0x7f0000000440)='\\%])]{]\\\']:\'\x00']) [ 794.855561] erofs: FAULT_INJECTION was not selected [ 794.861283] erofs: root inode @ nid 36 [ 794.869168] erofs: bogus i_mode (0) @ nid 36 [ 794.873863] erofs: FAULT_INJECTION was not selected [ 794.877428] erofs: root inode @ nid 0 [ 794.885795] erofs: bogus i_mode (0) @ nid 0 [ 794.895288] erofs: read_super, device -> /dev/loop0 19:41:16 executing program 2: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c0024", 0xf, 0x400}, {&(0x7f0000000280)="05000020c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000080)={[{@fault_injection}]}) [ 794.906717] erofs: root inode @ nid 36 [ 794.912189] erofs: options -> [ 794.915785] erofs: blksize 1 isn't supported on this platform [ 794.916654] erofs: mounted on /dev/loop2 with opts: fault_injection=0x0000000000000000. 19:41:16 executing program 1: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c0024", 0xf, 0x400}, {&(0x7f0000000280)="0500000400", 0x5, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000080)={[{@fault_injection}]}) 19:41:16 executing program 4: r0 = creat(&(0x7f0000000280)='./file0\x00', 0x3) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[@ANYBLOB='!\t'], 0x191) close(r0) execve(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) execve(&(0x7f0000000080)='./file0\x00', &(0x7f0000000180)=[&(0x7f00000000c0)='^-\x00', &(0x7f0000000100)='\x00', &(0x7f0000000140)='\x00'], &(0x7f0000000480)=[&(0x7f00000001c0)=']@\x00', &(0x7f0000000200)='#%*#-..\x00', &(0x7f0000000240)=')\x00', &(0x7f00000002c0)='\x00', &(0x7f0000000300)='%&\x00', &(0x7f0000000340)='-.!\\\x00', &(0x7f0000000380)='$\'{\x00', &(0x7f00000003c0)='\x00', &(0x7f0000000400)='/([,:-,*@\x00', &(0x7f0000000440)='\\%])]{]\\\']:\'\x00']) creat(&(0x7f0000000280)='./file0\x00', 0x3) (async) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[@ANYBLOB='!\t'], 0x191) (async) close(r0) (async) execve(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) (async) execve(&(0x7f0000000080)='./file0\x00', &(0x7f0000000180)=[&(0x7f00000000c0)='^-\x00', &(0x7f0000000100)='\x00', &(0x7f0000000140)='\x00'], &(0x7f0000000480)=[&(0x7f00000001c0)=']@\x00', &(0x7f0000000200)='#%*#-..\x00', &(0x7f0000000240)=')\x00', &(0x7f00000002c0)='\x00', &(0x7f0000000300)='%&\x00', &(0x7f0000000340)='-.!\\\x00', &(0x7f0000000380)='$\'{\x00', &(0x7f00000003c0)='\x00', &(0x7f0000000400)='/([,:-,*@\x00', &(0x7f0000000440)='\\%])]{]\\\']:\'\x00']) (async) [ 794.947445] erofs: unmounted for /dev/loop2 19:41:16 executing program 4: r0 = creat(&(0x7f0000000280)='./file0\x00', 0x3) write$binfmt_script(r0, &(0x7f0000000080)=ANY=[@ANYRESDEC=r0], 0x191) close(r0) write$binfmt_misc(r0, &(0x7f00000002c0)={'syz1', "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"}, 0x1004) execve(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) 19:41:16 executing program 3: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467019703000c", 0xd, 0x400}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000080)={[{@fault_injection}]}) 19:41:16 executing program 0: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e0", 0x4, 0x400}, {0x0, 0x6, 0x1000}], 0x0, &(0x7f0000000080)) [ 795.068676] erofs: read_super, device -> /dev/loop5 [ 795.073810] erofs: options -> fault_injection=0x0000000000000000, [ 795.106263] erofs: FAULT_INJECTION was not selected [ 795.131167] erofs: root inode @ nid 36 [ 795.141972] erofs: read_super, device -> /dev/loop2 [ 795.151229] erofs: bogus i_mode (0) @ nid 36 [ 795.163012] erofs: options -> fault_injection=0x0000000000000000, [ 795.173457] erofs: read_super, device -> /dev/loop1 19:41:16 executing program 4: r0 = creat(&(0x7f0000000280)='./file0\x00', 0x3) write$binfmt_script(r0, &(0x7f0000000080)=ANY=[@ANYRESDEC=r0], 0x191) close(r0) (async) write$binfmt_misc(r0, &(0x7f00000002c0)={'syz1', "1934405f916aee824b7d24fc299c625dc5ce844e94af838c33eb16c3d2caf85be69e54c541a8b51b2316a7acef4fd62b6b54cf883452f890f31b9a4faa01df4656656203ddd9484cd6456616164ec0e8556e1a2a2912ff077145bb728f761999de886fdfdda444abc624ca3f7044a8f9c62004fd486c1de24ff3e91e2a375d54e30663beeb5af06790c34de1f01c7d092639f639c8140fb3ac86c01faf8f61c53afda9edcae602eb1850592e3b4240d07b32f5c1514fe5f1b41115a81db857154389b20423b45ae31f553d6490246dab57584df9e093aee803b5ea821a9fdb5547ddbed2adf098a94f60bf2ed56bbbb630eafabcd682d41fb185d682b6421a0213c6e43a6d46dcbf04e0a4e112f1773f70d9124fdf1715d14e11ed8ce6ab6988c78b465e11935998d52a8afcdc0fcd83a9c7248d250a28b640014bc639adebfe8d7b4b29a4f8f494c93d11f672cf9511feb6cadbaa63d2a4b6a3cd0be46c171656a40447183d0b19b9a71018a0f65ef96aec8e73cc6525ae2f82942847a298a59c678aa5293dfd547b6df9427e7000bedc703311c88de8259a78993fc10ee99769a51de062a1acc85ac4be9f8d8c3f8eb58962fe5d63595f94a32347faddc15d20a870b53393fdf614b5340bf01529ee9a9be5a745f4c10aa842513aeff08dba990dcde9d5f32b1c5d02618a78d18ebf16299563fb2cc30d9ab8794b50bffbc1e53cdb528c9e78f21d1691994b672bb59ddc5ad5243e6ba88b6e84d9c931c0c7646c2381d294bb416f3e984b3a594c560095d2fac76897574d4e4a02298e3ebcd9d2f456d6385991ede806c00ee994ef17f75037f09bf502a7fe462b69b0beae463f155c4698e61d21da9ff6a746cadde5daf399f69cc93f04d06ae2e398524598bfb1cf1b818048c4d72e84771ece04f96befbff721cef06f15bda4445eb756243e7311ea11d9bf6a018faf8e82f63f0683d046f361a91e0d16374d15a7261e1625693fa2a10e1f845fe2948ba2d7877d24a6b92250754de9fed45f424d6a0df5fe59d102355c51cef62341566dfab3f3904695fde4a7d8a31e21111ada97c9bdc016604afe17db5df3e6b48d918f76f3dbfd2ca172902d0432bfae52a27d6f3e4fe17e897f228bfec8d214fd36dc181fb2660314817dbff659c0b2eb16af9333be677fea5f11e6b70c7d206ee4456fa7d38ecbd8ab580a16c36abd0228eca8b5fc31bd7dcc5afae24cdf591ce0f02e88588ef5735b6a342f0f6786a211cf91682b39042d4f349f698fcc47f2b11cfb0cbd4cd6d94438c149109e6831621c5c7f459594b7ebb6982e810b2f73d970b60cef1a1e75bdb69063370c731ca5984de40bcae984fe7a63c51e2ed74474a1910aa49835a5c8503ea219872a37244873ef08cad0f71fa5f1bae34152d0420c477d280f225eeb5af6ca6736e54f400463591070a937aaac019c61bdaf9e59684d531fbf74c3a35eac7f813be1924feeb01f649030c09f68a5e3383dafc47c91180b23f727734a8acacd5002c2058bf17626ed9b3bf7409ddac158e439847ad5c5bcc92263acae6cab9f3157cde069a52bab83261b69519e7521a75db5252edd89850fd156fce975e5686725a98adda8549aabd9618a2e9cd973c75aa1dfee67d0263a25006dc5a682eeb492f5d6316ef6ce0113230f33d526a950d0ac52c6513453cf7d852fadee5d9675ac75e03188b6f5224b60b75bdad76b022db4bae6827d27d7a4c0854e3d7f333001126f96b93950bb74b4b625111415d19dfe48052942dfdec7c1f1c5101407788786b087983186f13afa3438aac5f85a17c468467f0ae62a57630ae1c8ba18d3afd357c4777f72bc5f6216d2c3e20b6115c68369d76bd4c61eb28136ec51a3b79880fd2e89861665f5f95ccf9b58c1f192592f003ee4066d8399209e1841f8e36afe141c449386d3296c62c48aca9f86e5e55e70e09906a9b0c88df97fa2a8e056af58a29e1cd8668e5ad61e7474ae3b7c23df67f5c70600aeeee207ed9333337a46b78e819a8f8eba105f7fac5e8f6bd500d91ba115c95dcceccf673eecea130dd3d53e6e0731848dfa528aa7d1a975cec856d05f100e8317bfbb218f0ae7d289d0c58a78eba960dbd210baeda70fff78f4c38c92c6f69d914ef8efe75a24b339ce616561a88775737fada75d3e9612a8fa60213da420a00fafb7eac90efc05ce346a01936316b113db6285448ed946aaf348f85581230af1042a661066fb938c4debcbddc6749e9615d22627a734e50a68c20a7507ae268754e5b7c666c0f7d7e199346398f57716bb43cca0b4a2b69308587c6997b24648ec10c070094bda6778344d20fffd97da7068f59e62dbe6901b2ce9baa940d08d01a560e941c4b1fe82aed1dd1bb5a23ca62e7fe2afec176cffc08d543e63b1f266becc2b4b8fe738b56a7f464d98f078363e6ddd609447c93202b3c7f31702db8ae3c8701038ce1f59a5fe24fabce8e4a1ed58fb02d1417469be2c5a9e25ce614897b73cdb5ca1f44e26318261c70ac1a181ce1590abf5608b94b399b47805faa22c9c05f3b44288882be8d732c76c00c60a92c235112ab9881bed7fbb3bbb7298299f0577bfdb591a8a0232a53d97bfa82a3b7b26379891d452140dbda53b6087dae23b2e1fbc6bbbef5a3bfbf8e920bb8d907cbec0d8bc3f28193f4ac24ddb209c0c87b888518aeaccd0fbdb5311a95ebed4a27c6b61a1ebe20bb9f5c51b495ba65547421973668d49b56fd10e35c9ead041b9ab33560b2e82edb6e488383b5c4446c0db925616801b0420db128d1e542a4996cad275cc97264a184df648b8052fbd108541eaf721d5a0cfa05aa55db1a9583c1e4bb5f2ffc09bc62bfb6ad7c7a9dbec2e364c872cf740c7e92ddfdfc0c74316cc4731a1ce69c7474cbe94f69009c0baffa4b9c836ca02baca3906ff4c2cd46daf69820bde588bf9e6b6de2bbce89a9ca9089afa7f1293d8281c168d83531747147637d01da61dc82843cfe5b8971196a0da7167f339b4bd953218bb0e2f3821d141c7b7ccdc2dff5c9c0798d8a6569e78c38e0c2640bc7c55fcd5283da6e09b61ff3345d2e321521fe64415d4c5cf3a9e0ff7ae8db6bfd12d935c311c82cefc7c2823db2897bfbc1ef89689aea196a779a30a38a462e685ac5c9ef37f29e5fb6392255f6ffd849bd3215a792f149b53e1a53aee00e5464a15e4d0b820fbce1feb6bd106230a8f4a1070e8a60211929900d04a37a0d09eb67bcd371105478b8bd846a34b48b94c7e2b9b1f459d8df28fa6b37fe70c4db015df3c37ca34fee6204e466debcbe992f6d1cd1491e3149de4a67e88dbb0dc7d85b5ce9b801915e39d6eeb7c03b9ac6d32fdf77d5f253a90f3a3b56b86f64f297e903304706786aca242963afcfba6d368359a2cbae8aa342cd513c950e3b4b35fc7c99ccea26a688bafa37d172713bf77b8106e6e52ddab585a3c584dd0d415c78fb7a6ec401041f57136a1cb00a1c47c7669f4e30cfebdfc1c3893decb83d3bbb4071952163f1d5568525f4961bda13147f937bf908bb19d83b51c102b3ff960efe4cab93803b717be424725d00c9e3b10312e2c5f754211395fd15e4fd8796159463ad27743cb3ecc57db78b98d86833fb40893564c08671d2f5d24664cda2790b9b97470e723bd621b7f170d5765fe0b27f43cfaf20e6b61393e8ec16bb93250772ac63a3c51bb305b70879c4ca2a88120a66229f50111d3ba73a8fbf974565fddd63e2769515c3ad45739efbe96753d2529957a2741ab46fb5e70c7fe619ea23c9a79e7bc18e396581ea8a96eae9916a5f559b63d061193499dfd2abaece894ce9ef1c26a24c0ce920d76f4ed9d3e0b5e9d5e8352a6e1cfe29d9405b45e59af8f24021344208f3ee4ef60bbf8833057bc9ff1f86ddd9619f75e858a1d3af72d1d2274667027129db6fbeef34d91194733fa9e7e083e5527b6f1d4dc90decccf6c624aae2d72be395d3bf9f60f959759f0cfe9740eeb44e1d78f80daa01232dfdea788bc3b476bf9438ecc21ebe8ad49eb32e8890b3a04639c0a80fc54a17be3dce01537c812fad73240619950b6caa3391e2dd8cdd5528c7a9310583b031e76b832aba9b580da587605bb624777a0f17f2374cb1af8f70fbabc6487a0d376b174ef5e93604890f2b3e62a5a59f5326bb7cd7e8e84a1be611e34cf8426f46468b1250e6f99da74fc104d56a997edeadf122ec32c525dc8753a1803c51d6c2d710fcf05e430f4e8770adf993bd81d94f4dc4a0dad4770f5a20834d3156e584afaf48a425b60f98c39970e85994a95f2079b8c755212c8814ff604cbc3091521d1ed203baec0feb08cc882f276a00d5535c4506f496c2a8ff6cd3c077dcaca4a9f7342e628926453964021f03e7cd15a2c179d38146ed9cb211654ba0b1b4bd79114a46bec4023f847aac1da8d9b90b2ad11093f8b79d94c5aa891903a13b21010dd0b9571a30ba2a968f24d9ddebe42d27f4c88f8b11d9e09b59a6c083c6f0859abf3935beed85a138fd1cabbed9fdf9da6b1ea51a1cca9ca3041a795148b46a9967d08bae040d11ad1a6d01b27cf75850e144f0471abad2f70b9484f1eee4dc7b551562c7dae979dcd7408c25c93aa539ba4492c26db3ae4d67ba6989c77bfd18f5532c9c52b064dc1b0de41c3076eefef4d407f62728dd6d7943940863229c1a58d4edf76d297145c6cf9b9604820806e4ba48d55a1ce93295d87a7d4fabce45ac763b369fb6873e62df7ff00fb21063e643a5406287d4bf5c6ab0e7974fe784e8c04a93b8077821c0448089d34930b8cb323732a964aae397f9e6a6b675f1e105cb76dfd3812a995a2889fd0aa0c00e0c780a45ce8ed7939e8cdedb0119e217a0709c43f1d16e29782bc57f1eab8f48c947c9f95f33bf71d0fce1e5c6882bc7ebbe9b2639ca3dc0a91dbf84cde2f7fc7c355d59032cd4bade2ff0b1e45452eb7babd05854b0324342b1b90c7bee0cceb291c702575be525931fba995d2441f43fa37aa75b6cdeeca00d5ff8dcfe2779e0de4b66b848d25819135053628702015febdd959d76f9e242d3dd02e70113cf069b9a13d3e48d22d603217268eb9304f732fd4813e19d872c39860c469ef982e6774ab245e9e70a8b94266584af5159080c09b4e936214597b60f5a36b7b9a04c3de1672bdcf6d87e7c8511dbf05802cc762e372db2212302bf53e78c09d246f7fa524978c2ee0e69c1f53691a497f42c6ef1208b07f2d9b2a2749be0b3db5beb21b779d0b3e2c36528ed7a3c87ccd98f780bdc28e3be6b9f89c6aae0e1593c5be47628cb0f64c6e9acceeab5cee0c8b5d34f9e133dc353efa80deca6117c47a40b26f222354b9bea03457ffd0178bc07f840b497f884d2323ece8487570ead02d4cd9771f80fe307296ea8bd37979f4a7c8c4f73c9e5ecc52ad5cd4acae7f3465022e850606df576d7d5cbf7b37c78d46953750d4db154636228eaad0e155d599a056b0bc22f054195b35d7843a7eee60313ad62aac602086fb066ec73ae563d0ff220ddb6939a892bce628cd2d212753a355e809d12cda81a028993e3f74cbd054b785406e4c6fb8d2ca3934a5f8ebd2320e1f0000150dde9c1f4f8b2088e37d1bf53a86fb74f44638a0bdbc838c41c25b56f7158d5a317e5a2b0c36d40880bc6bab530c3d7466576308d20e2d26f07d2b449a9f598beff73a9c99b75cced40b0291e1cead151e0be730ef688291cc8304f28c3805ec3b7bf82542b8c4a4203d1e1aff8577a65df2414951ca32ee"}, 0x1004) execve(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) [ 795.180489] erofs: FAULT_INJECTION was not selected [ 795.195014] erofs: options -> fault_injection=0x0000000000000000, [ 795.196746] erofs: root inode @ nid 36 [ 795.202367] erofs: FAULT_INJECTION was not selected [ 795.211254] erofs: mounted on /dev/loop2 with opts: fault_injection=0x0000000000000000. [ 795.215686] erofs: root inode @ nid 36 19:41:16 executing program 5: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00456010000000c0024", 0xf, 0x400}, {&(0x7f0000000280)="05", 0x1, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000080)={[{@fault_injection}]}) 19:41:16 executing program 2: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c0024", 0xf, 0x400}, {&(0x7f0000000280)="0500023cc041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000080)={[{@fault_injection}]}) [ 795.233756] erofs: bogus i_mode (0) @ nid 36 [ 795.247484] erofs: read_super, device -> /dev/loop3 [ 795.264481] erofs: options -> fault_injection=0x0000000000000000, [ 795.272342] erofs: FAULT_INJECTION was not selected 19:41:16 executing program 4: r0 = creat(&(0x7f0000000280)='./file0\x00', 0x3) write$binfmt_script(r0, &(0x7f0000000080)=ANY=[@ANYRESDEC=r0], 0x191) close(r0) write$binfmt_misc(r0, &(0x7f00000002c0)={'syz1', "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"}, 0x1004) execve(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) [ 795.282152] erofs: root inode @ nid 0 [ 795.286110] erofs: unmounted for /dev/loop2 [ 795.290795] erofs: bogus i_mode (0) @ nid 0 [ 795.295183] erofs: read_super, device -> /dev/loop0 [ 795.300817] erofs: options -> [ 795.305292] erofs: blksize 1 isn't supported on this platform 19:41:16 executing program 0: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e0", 0x4, 0x400}, {0x0, 0x7, 0x1000}], 0x0, &(0x7f0000000080)) 19:41:16 executing program 1: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c0024", 0xf, 0x400}, {&(0x7f0000000280)="0500000400", 0x5, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000080)={[{@fault_injection}]}) [ 795.419168] erofs: read_super, device -> /dev/loop5 [ 795.433451] erofs: options -> fault_injection=0x0000000000000000, 19:41:16 executing program 3: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467019803000c", 0xd, 0x400}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000080)={[{@fault_injection}]}) 19:41:16 executing program 4: r0 = creat(&(0x7f0000000280)='./file0\x00', 0x3) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[@ANYBLOB='!\t'], 0x191) close(r0) ioctl$FIBMAP(r0, 0x1, &(0x7f0000000080)=0x3) execve(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) [ 795.498918] erofs: FAULT_INJECTION was not selected [ 795.504500] erofs: read_super, device -> /dev/loop2 [ 795.527340] erofs: options -> fault_injection=0x0000000000000000, [ 795.529607] erofs: root inode @ nid 36 [ 795.546594] erofs: FAULT_INJECTION was not selected [ 795.555663] erofs: read_super, device -> /dev/loop1 [ 795.559520] erofs: bogus i_mode (0) @ nid 36 [ 795.565465] erofs: root inode @ nid 36 [ 795.571862] erofs: options -> fault_injection=0x0000000000000000, [ 795.578922] erofs: read_super, device -> /dev/loop0 [ 795.588739] erofs: options -> 19:41:16 executing program 5: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00461010000000c0024", 0xf, 0x400}, {&(0x7f0000000280)="05", 0x1, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000080)={[{@fault_injection}]}) 19:41:16 executing program 4: r0 = creat(&(0x7f0000000280)='./file0\x00', 0x3) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[@ANYBLOB='!\t'], 0x191) close(r0) ioctl$FIBMAP(r0, 0x1, &(0x7f0000000080)=0x3) execve(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) creat(&(0x7f0000000280)='./file0\x00', 0x3) (async) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[@ANYBLOB='!\t'], 0x191) (async) close(r0) (async) ioctl$FIBMAP(r0, 0x1, &(0x7f0000000080)=0x3) (async) execve(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) (async) [ 795.594199] erofs: mounted on /dev/loop2 with opts: fault_injection=0x0000000000000000. [ 795.603050] erofs: blksize 1 isn't supported on this platform [ 795.611833] erofs: FAULT_INJECTION was not selected [ 795.617151] erofs: root inode @ nid 36 [ 795.622044] erofs: bogus i_mode (0) @ nid 36 [ 795.627021] erofs: read_super, device -> /dev/loop3 [ 795.633235] erofs: options -> fault_injection=0x0000000000000000, 19:41:16 executing program 2: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c0024", 0xf, 0x400}, {&(0x7f0000000280)="0500003fc041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000080)={[{@fault_injection}]}) [ 795.659202] erofs: FAULT_INJECTION was not selected [ 795.665672] erofs: root inode @ nid 0 [ 795.670794] erofs: unmounted for /dev/loop2 [ 795.678047] erofs: bogus i_mode (0) @ nid 0 [ 795.685466] erofs: read_super, device -> /dev/loop5 [ 795.691174] erofs: options -> fault_injection=0x0000000000000000, 19:41:16 executing program 1: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c0024", 0xf, 0x400}, {&(0x7f0000000280)="050000040041", 0x6}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000080)={[{@fault_injection}]}) 19:41:16 executing program 0: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e0", 0x4, 0x400}, {0x0, 0x8, 0x1000}], 0x0, &(0x7f0000000080)) 19:41:16 executing program 3: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467019903000c", 0xd, 0x400}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000080)={[{@fault_injection}]}) [ 795.710496] erofs: FAULT_INJECTION was not selected [ 795.715632] erofs: root inode @ nid 36 [ 795.720829] erofs: bogus i_mode (0) @ nid 36 19:41:16 executing program 4: r0 = creat(&(0x7f0000000280)='./file0\x00', 0x3) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[@ANYBLOB='!\t'], 0x191) close(r0) ioctl$FIBMAP(r0, 0x1, &(0x7f0000000080)=0x3) execve(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) creat(&(0x7f0000000280)='./file0\x00', 0x3) (async) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[@ANYBLOB='!\t'], 0x191) (async) close(r0) (async) ioctl$FIBMAP(r0, 0x1, &(0x7f0000000080)=0x3) (async) execve(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) (async) 19:41:16 executing program 1: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c0024", 0xf, 0x400}, {&(0x7f0000000280)="050000040041", 0x6}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000080)={[{@fault_injection}]}) 19:41:16 executing program 5: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00462010000000c0024", 0xf, 0x400}, {&(0x7f0000000280)="05", 0x1, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000080)={[{@fault_injection}]}) [ 795.846348] erofs: read_super, device -> /dev/loop0 [ 795.860696] erofs: options -> [ 795.871529] erofs: blksize 1 isn't supported on this platform [ 795.882184] erofs: read_super, device -> /dev/loop3 [ 795.891061] erofs: read_super, device -> /dev/loop2 19:41:16 executing program 0: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e0", 0x4, 0x400}, {0x0, 0x9, 0x1000}], 0x0, &(0x7f0000000080)) [ 795.896427] erofs: options -> fault_injection=0x0000000000000000, [ 795.905831] erofs: options -> fault_injection=0x0000000000000000, [ 795.913151] erofs: FAULT_INJECTION was not selected [ 795.920285] erofs: FAULT_INJECTION was not selected [ 795.932161] erofs: root inode @ nid 0 [ 795.953821] erofs: bogus i_mode (0) @ nid 0 [ 795.959042] erofs: root inode @ nid 36 [ 795.965589] erofs: read_super, device -> /dev/loop1 [ 795.977123] erofs: mounted on /dev/loop2 with opts: fault_injection=0x0000000000000000. [ 795.995453] erofs: read_super, device -> /dev/loop5 19:41:17 executing program 4: r0 = creat(&(0x7f0000000280)='./file0\x00', 0x3) lsetxattr$trusted_overlay_origin(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0), &(0x7f0000000100), 0x2, 0x3) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[@ANYBLOB='\x00\x00'], 0x191) close(r0) execve(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) 19:41:17 executing program 2: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c0024", 0xf, 0x400}, {&(0x7f0000000280)="05000fffc041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000080)={[{@fault_injection}]}) 19:41:17 executing program 3: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467019a03000c", 0xd, 0x400}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000080)={[{@fault_injection}]}) [ 796.001055] erofs: options -> fault_injection=0x0000000000000000, [ 796.010708] erofs: FAULT_INJECTION was not selected [ 796.014096] erofs: options -> fault_injection=0x0000000000000000, [ 796.023048] erofs: FAULT_INJECTION was not selected [ 796.031798] erofs: root inode @ nid 36 [ 796.032197] erofs: root inode @ nid 36 [ 796.036450] erofs: bogus i_mode (0) @ nid 36 19:41:17 executing program 1: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c0024", 0xf, 0x400}, {&(0x7f0000000280)="050000040041", 0x6}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000080)={[{@fault_injection}]}) 19:41:17 executing program 4: r0 = creat(&(0x7f0000000280)='./file0\x00', 0x3) lsetxattr$trusted_overlay_origin(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0), &(0x7f0000000100), 0x2, 0x3) (async) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[@ANYBLOB='\x00\x00'], 0x191) (async) close(r0) execve(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) 19:41:17 executing program 5: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00464010000000c0024", 0xf, 0x400}, {&(0x7f0000000280)="05", 0x1, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000080)={[{@fault_injection}]}) [ 796.078737] erofs: bogus i_mode (0) @ nid 36 [ 796.084103] erofs: unmounted for /dev/loop2 [ 796.084612] erofs: read_super, device -> /dev/loop0 [ 796.097839] erofs: options -> [ 796.105162] erofs: blksize 1 isn't supported on this platform 19:41:17 executing program 0: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e0", 0x4, 0x400}, {0x0, 0xa, 0x1000}], 0x0, &(0x7f0000000080)) [ 796.256558] erofs: read_super, device -> /dev/loop3 [ 796.258498] erofs: read_super, device -> /dev/loop2 [ 796.266625] erofs: options -> fault_injection=0x0000000000000000, [ 796.276395] erofs: FAULT_INJECTION was not selected [ 796.282144] erofs: root inode @ nid 36 [ 796.287145] erofs: mounted on /dev/loop2 with opts: fault_injection=0x0000000000000000. [ 796.293332] erofs: read_super, device -> /dev/loop5 19:41:17 executing program 2: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c0024", 0xf, 0x400}, {&(0x7f0000000280)="050000040041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000080)={[{@fault_injection}]}) [ 796.303054] erofs: read_super, device -> /dev/loop1 [ 796.312828] erofs: options -> fault_injection=0x0000000000000000, [ 796.314628] erofs: options -> fault_injection=0x0000000000000000, [ 796.325558] erofs: unmounted for /dev/loop2 [ 796.330404] erofs: FAULT_INJECTION was not selected [ 796.335544] erofs: root inode @ nid 36 [ 796.343643] erofs: bogus i_mode (0) @ nid 36 19:41:17 executing program 4: r0 = creat(&(0x7f0000000280)='./file0\x00', 0x3) lsetxattr$trusted_overlay_origin(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0), &(0x7f0000000100), 0x2, 0x3) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[@ANYBLOB='\x00\x00'], 0x191) close(r0) execve(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) creat(&(0x7f0000000280)='./file0\x00', 0x3) (async) lsetxattr$trusted_overlay_origin(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0), &(0x7f0000000100), 0x2, 0x3) (async) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[@ANYBLOB='\x00\x00'], 0x191) (async) close(r0) (async) execve(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) (async) 19:41:17 executing program 1: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000280)="050000040041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000080)={[{@fault_injection}]}) [ 796.353168] erofs: options -> fault_injection=0x0000000000000000, [ 796.361133] erofs: FAULT_INJECTION was not selected [ 796.364711] erofs: FAULT_INJECTION was not selected [ 796.366236] erofs: root inode @ nid 36 [ 796.377971] erofs: bogus i_mode (0) @ nid 36 [ 796.378194] erofs: root inode @ nid 0 [ 796.391036] erofs: bogus i_mode (0) @ nid 0 19:41:17 executing program 5: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00466010000000c0024", 0xf, 0x400}, {&(0x7f0000000280)="05", 0x1, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000080)={[{@fault_injection}]}) [ 796.435942] erofs: read_super, device -> /dev/loop0 [ 796.441282] erofs: options -> [ 796.444940] erofs: blksize 1 isn't supported on this platform 19:41:17 executing program 4: r0 = creat(&(0x7f0000000080)='./file0/file0\x00', 0x3) write$binfmt_script(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB], 0x191) close(r0) execve(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) 19:41:17 executing program 3: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467019b03000c", 0xd, 0x400}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000080)={[{@fault_injection}]}) 19:41:17 executing program 0: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e0", 0x4, 0x400}, {0x0, 0xc, 0x1000}], 0x0, &(0x7f0000000080)) [ 796.507576] erofs: read_super, device -> /dev/loop1 [ 796.512961] erofs: read_super, device -> /dev/loop2 [ 796.517990] erofs: options -> fault_injection=0x0000000000000000, [ 796.531457] erofs: options -> fault_injection=0x0000000000000000, [ 796.545671] erofs: FAULT_INJECTION was not selected 19:41:17 executing program 4: r0 = creat(&(0x7f0000000080)='./file0/file0\x00', 0x3) write$binfmt_script(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB], 0x191) close(r0) execve(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) creat(&(0x7f0000000080)='./file0/file0\x00', 0x3) (async) write$binfmt_script(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB], 0x191) (async) close(r0) (async) execve(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) (async) [ 796.555184] erofs: cannot find valid erofs superblock [ 796.566574] erofs: root inode @ nid 36 [ 796.579791] erofs: mounted on /dev/loop2 with opts: fault_injection=0x0000000000000000. [ 796.593773] erofs: read_super, device -> /dev/loop5 [ 796.608295] erofs: options -> fault_injection=0x0000000000000000, [ 796.614851] erofs: FAULT_INJECTION was not selected [ 796.623332] erofs: root inode @ nid 36 [ 796.627571] erofs: bogus i_mode (0) @ nid 36 19:41:17 executing program 1: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000280)="050000040041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000080)={[{@fault_injection}]}) 19:41:17 executing program 2: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c0024", 0xf, 0x400}, {&(0x7f0000000280)="05000002c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000080)={[{@fault_injection}]}) [ 796.655035] erofs: read_super, device -> /dev/loop0 [ 796.663185] erofs: read_super, device -> /dev/loop3 [ 796.678732] erofs: options -> fault_injection=0x0000000000000000, [ 796.684111] erofs: options -> [ 796.688653] erofs: unmounted for /dev/loop2 [ 796.694236] erofs: blksize 1 isn't supported on this platform 19:41:17 executing program 4: r0 = creat(&(0x7f0000000080)='./file0/file0\x00', 0x3) write$binfmt_script(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB], 0x191) close(r0) execve(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) creat(&(0x7f0000000080)='./file0/file0\x00', 0x3) (async) write$binfmt_script(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB], 0x191) (async) close(r0) (async) execve(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) (async) 19:41:17 executing program 0: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e0", 0x4, 0x400}, {0x0, 0x10, 0x1000}], 0x0, &(0x7f0000000080)) [ 796.707238] erofs: FAULT_INJECTION was not selected [ 796.712986] erofs: root inode @ nid 0 [ 796.717633] erofs: bogus i_mode (0) @ nid 0 19:41:17 executing program 5: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00468010000000c0024", 0xf, 0x400}, {&(0x7f0000000280)="05", 0x1, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000080)={[{@fault_injection}]}) 19:41:17 executing program 4: r0 = creat(&(0x7f0000000280)='./file0\x00', 0x3) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[@ANYBLOB='\x00\x00'], 0x191) mmap(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x1000001, 0x10, r0, 0xc96bc000) close(r0) execve(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) r1 = syz_open_dev$vcsa(&(0x7f0000000080), 0x9d6, 0x80) ioctl$SG_SET_TIMEOUT(r1, 0x2201, &(0x7f00000000c0)) chdir(&(0x7f0000000100)='./file0\x00') 19:41:17 executing program 3: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467019c03000c", 0xd, 0x400}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000080)={[{@fault_injection}]}) [ 796.783434] erofs: read_super, device -> /dev/loop1 [ 796.798271] erofs: options -> fault_injection=0x0000000000000000, [ 796.816676] erofs: cannot find valid erofs superblock 19:41:17 executing program 4: r0 = creat(&(0x7f0000000280)='./file0\x00', 0x3) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[@ANYBLOB='\x00\x00'], 0x191) mmap(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x1000001, 0x10, r0, 0xc96bc000) close(r0) execve(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) r1 = syz_open_dev$vcsa(&(0x7f0000000080), 0x9d6, 0x80) ioctl$SG_SET_TIMEOUT(r1, 0x2201, &(0x7f00000000c0)) chdir(&(0x7f0000000100)='./file0\x00') creat(&(0x7f0000000280)='./file0\x00', 0x3) (async) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[@ANYBLOB='\x00\x00'], 0x191) (async) mmap(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x1000001, 0x10, r0, 0xc96bc000) (async) close(r0) (async) execve(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) (async) syz_open_dev$vcsa(&(0x7f0000000080), 0x9d6, 0x80) (async) ioctl$SG_SET_TIMEOUT(r1, 0x2201, &(0x7f00000000c0)) (async) chdir(&(0x7f0000000100)='./file0\x00') (async) [ 796.890429] erofs: read_super, device -> /dev/loop5 [ 796.890433] erofs: read_super, device -> /dev/loop2 [ 796.890444] erofs: options -> fault_injection=0x0000000000000000, [ 796.895481] erofs: options -> fault_injection=0x0000000000000000, [ 796.914958] erofs: FAULT_INJECTION was not selected [ 796.920461] erofs: read_super, device -> /dev/loop0 [ 796.925555] erofs: options -> 19:41:18 executing program 1: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000280)="050000040041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000080)={[{@fault_injection}]}) [ 796.935623] erofs: blksize 1 isn't supported on this platform [ 796.939538] erofs: root inode @ nid 36 19:41:18 executing program 0: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e0", 0x4, 0x400}, {0x0, 0x21, 0x1000}], 0x0, &(0x7f0000000080)) 19:41:18 executing program 2: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c0024", 0xf, 0x400}, {&(0x7f0000000280)="05000003c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000080)={[{@fault_injection}]}) [ 796.981577] erofs: mounted on /dev/loop2 with opts: fault_injection=0x0000000000000000. [ 796.993375] erofs: FAULT_INJECTION was not selected [ 797.008195] erofs: root inode @ nid 36 [ 797.015962] erofs: bogus i_mode (0) @ nid 36 19:41:18 executing program 4: r0 = creat(&(0x7f0000000280)='./file0\x00', 0x3) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[@ANYBLOB='\x00\x00'], 0x191) mmap(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x1000001, 0x10, r0, 0xc96bc000) (async) close(r0) (async) execve(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) (async) r1 = syz_open_dev$vcsa(&(0x7f0000000080), 0x9d6, 0x80) ioctl$SG_SET_TIMEOUT(r1, 0x2201, &(0x7f00000000c0)) (async) chdir(&(0x7f0000000100)='./file0\x00') [ 797.059473] erofs: unmounted for /dev/loop2 19:41:18 executing program 5: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00469010000000c0024", 0xf, 0x400}, {&(0x7f0000000280)="05", 0x1, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000080)={[{@fault_injection}]}) 19:41:18 executing program 4: r0 = creat(&(0x7f0000000280)='./file0\x00', 0x3) r1 = open(&(0x7f0000000100)='./bus\x00', 0x141042, 0x0) pwritev(r1, &(0x7f0000000080)=[{&(0x7f0000000340)="d4", 0x1}], 0x1, 0x40000c9, 0x0) r2 = openat$tcp_mem(0xffffffffffffff9c, &(0x7f0000000100)='/proc/sys/net/ipv4/tcp_wmem\x00', 0x1, 0x0) mount$9p_fd(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0), 0x70404, &(0x7f0000000140)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r2}, 0x2c, {[{@access_user}, {@version_L}, {@cache_none}, {@access_user}, {@dfltgid}, {@posixacl}, {@dfltuid={'dfltuid', 0x3d, 0xee01}}]}}) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[@ANYBLOB='!\t'], 0x191) close(r0) execve(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) [ 797.080443] erofs: read_super, device -> /dev/loop3 [ 797.087602] erofs: options -> fault_injection=0x0000000000000000, [ 797.094312] erofs: FAULT_INJECTION was not selected [ 797.102420] erofs: root inode @ nid 0 [ 797.106450] erofs: bogus i_mode (0) @ nid 0 [ 797.165664] erofs: read_super, device -> /dev/loop1 [ 797.171101] erofs: read_super, device -> /dev/loop0 [ 797.176623] erofs: options -> [ 797.196732] erofs: read_super, device -> /dev/loop5 [ 797.207629] erofs: options -> fault_injection=0x0000000000000000, 19:41:18 executing program 3: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467019d03000c", 0xd, 0x400}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000080)={[{@fault_injection}]}) [ 797.215025] erofs: options -> fault_injection=0x0000000000000000, [ 797.237787] erofs: FAULT_INJECTION was not selected [ 797.237895] erofs: blksize 1 isn't supported on this platform [ 797.255927] erofs: cannot find valid erofs superblock [ 797.260684] erofs: root inode @ nid 36 19:41:18 executing program 4: r0 = creat(&(0x7f0000000280)='./file0\x00', 0x3) (async) r1 = open(&(0x7f0000000100)='./bus\x00', 0x141042, 0x0) pwritev(r1, &(0x7f0000000080)=[{&(0x7f0000000340)="d4", 0x1}], 0x1, 0x40000c9, 0x0) (async) r2 = openat$tcp_mem(0xffffffffffffff9c, &(0x7f0000000100)='/proc/sys/net/ipv4/tcp_wmem\x00', 0x1, 0x0) mount$9p_fd(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0), 0x70404, &(0x7f0000000140)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r2}, 0x2c, {[{@access_user}, {@version_L}, {@cache_none}, {@access_user}, {@dfltgid}, {@posixacl}, {@dfltuid={'dfltuid', 0x3d, 0xee01}}]}}) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[@ANYBLOB='!\t'], 0x191) (async) close(r0) (async) execve(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) [ 797.280096] erofs: bogus i_mode (0) @ nid 36 [ 797.292624] erofs: read_super, device -> /dev/loop2 [ 797.306619] erofs: options -> fault_injection=0x0000000000000000, [ 797.314979] erofs: FAULT_INJECTION was not selected [ 797.322208] erofs: root inode @ nid 36 19:41:18 executing program 4: r0 = creat(&(0x7f0000000280)='./file0\x00', 0x3) r1 = open(&(0x7f0000000100)='./bus\x00', 0x141042, 0x0) pwritev(r1, &(0x7f0000000080)=[{&(0x7f0000000340)="d4", 0x1}], 0x1, 0x40000c9, 0x0) r2 = openat$tcp_mem(0xffffffffffffff9c, &(0x7f0000000100)='/proc/sys/net/ipv4/tcp_wmem\x00', 0x1, 0x0) mount$9p_fd(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0), 0x70404, &(0x7f0000000140)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r2}, 0x2c, {[{@access_user}, {@version_L}, {@cache_none}, {@access_user}, {@dfltgid}, {@posixacl}, {@dfltuid={'dfltuid', 0x3d, 0xee01}}]}}) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[@ANYBLOB='!\t'], 0x191) close(r0) execve(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) creat(&(0x7f0000000280)='./file0\x00', 0x3) (async) open(&(0x7f0000000100)='./bus\x00', 0x141042, 0x0) (async) pwritev(r1, &(0x7f0000000080)=[{&(0x7f0000000340)="d4", 0x1}], 0x1, 0x40000c9, 0x0) (async) openat$tcp_mem(0xffffffffffffff9c, &(0x7f0000000100)='/proc/sys/net/ipv4/tcp_wmem\x00', 0x1, 0x0) (async) mount$9p_fd(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0), 0x70404, &(0x7f0000000140)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r2}, 0x2c, {[{@access_user}, {@version_L}, {@cache_none}, {@access_user}, {@dfltgid}, {@posixacl}, {@dfltuid={'dfltuid', 0x3d, 0xee01}}]}}) (async) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[@ANYBLOB='!\t'], 0x191) (async) close(r0) (async) execve(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) (async) [ 797.327225] erofs: mounted on /dev/loop2 with opts: fault_injection=0x0000000000000000. 19:41:18 executing program 5: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b0046d010000000c0024", 0xf, 0x400}, {&(0x7f0000000280)="05", 0x1, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000080)={[{@fault_injection}]}) 19:41:18 executing program 1: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{0x0, 0x0, 0x400}, {&(0x7f0000000280)="050000040041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000080)={[{@fault_injection}]}) 19:41:18 executing program 2: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c0024", 0xf, 0x400}, {&(0x7f0000000280)="05000004c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000080)={[{@fault_injection}]}) [ 797.402097] erofs: read_super, device -> /dev/loop3 [ 797.407176] erofs: options -> fault_injection=0x0000000000000000, 19:41:18 executing program 0: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e0", 0x4, 0x400}, {0x0, 0x23, 0x1000}], 0x0, &(0x7f0000000080)) 19:41:18 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000a00)={0x0, 0x0, &(0x7f00000009c0)={&(0x7f0000000880)=@deltfilter={0x24}, 0x24}}, 0x0) getsockname$packet(r1, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000000c0)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r2, @ANYBLOB="0000000000000000280012000900010076657468"], 0x48}}, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_NEW_KEY(r3, &(0x7f00000003c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000300)={&(0x7f0000000400)=ANY=[@ANYRES16=0x0, @ANYBLOB='\b'], 0x3c}, 0x1, 0x0, 0x0, 0x80}, 0x100d0) r4 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000200), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(r3, 0x8933, &(0x7f0000000700)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_SET_INTERFACE(r3, &(0x7f0000000340)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)={0x24, r4, 0x5, 0x0, 0x0, {{}, {@val={0x8, 0x3, r5}, @void}}, [@NL80211_ATTR_IFTYPE={0x8, 0x5, 0x3}]}, 0x24}}, 0x0) sendmsg$NL80211_CMD_SET_STATION(r0, &(0x7f00000001c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000180)={&(0x7f00000000c0)={0xb4, r4, 0x8, 0x70bd28, 0x25dfdbfd, {{}, {@void, @val={0xc, 0x99, {0x9, 0x3d}}}}, [@NL80211_ATTR_STA_SUPPORTED_RATES={0x8, 0x13, [{0x36}, {0x2}, {0x1, 0x1}, {0x5}]}, @NL80211_ATTR_STA_SUPPORTED_OPER_CLASSES={0x70, 0xbe, "93f57c15bc9e10635763eca78205348d2c4aa025d798e628dbbe8c953adc39f5ea35dd5985794de0d8cea703c0404c430f29d64844b8ef3078ae87a2a2de5dd046dc59d5448c317824f92bf7b5ab46114ca4038bd0541eb14ac96495bc97b6b0dd7a97dc6d95440b4aa998f3"}, @NL80211_ATTR_STA_LISTEN_INTERVAL={0x6, 0x12, 0xfffa}, @NL80211_ATTR_STA_AID={0x6, 0x10, 0x586}, @NL80211_ATTR_STA_FLAGS2={0xc, 0x43, {0x9b, 0x3}}]}, 0xb4}, 0x1, 0x0, 0x0, 0x4000000}, 0x41) r6 = creat(&(0x7f0000000280)='./file0\x00', 0x3) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000380)={&(0x7f00000002c0)=@getchain={0x24, 0x66, 0x300, 0x70bd27, 0x25dfdbfc, {0x0, 0x0, 0x0, r2, {0x7, 0x15}, {0xfff8, 0x2}, {0xd, 0xc}}}, 0x24}}, 0x4000000) write$binfmt_script(r6, &(0x7f0000000040)=ANY=[@ANYBLOB='!\t'], 0x191) close(r6) execve(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) [ 797.445991] erofs: unmounted for /dev/loop2 [ 797.454108] erofs: FAULT_INJECTION was not selected [ 797.463743] erofs: root inode @ nid 0 [ 797.467894] erofs: bogus i_mode (0) @ nid 0 [ 797.536556] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.4'. [ 797.547845] erofs: read_super, device -> /dev/loop5 [ 797.553352] erofs: read_super, device -> /dev/loop1 [ 797.572730] erofs: options -> fault_injection=0x0000000000000000, 19:41:18 executing program 3: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467019e03000c", 0xd, 0x400}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000080)={[{@fault_injection}]}) [ 797.595531] erofs: options -> fault_injection=0x0000000000000000, [ 797.597253] erofs: read_super, device -> /dev/loop2 [ 797.614275] erofs: read_super, device -> /dev/loop0 [ 797.619886] erofs: options -> [ 797.623508] erofs: blksize 1 isn't supported on this platform [ 797.624261] erofs: cannot find valid erofs superblock [ 797.639160] erofs: FAULT_INJECTION was not selected 19:41:18 executing program 0: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e0", 0x4, 0x400}, {0x0, 0x48, 0x1000}], 0x0, &(0x7f0000000080)) 19:41:18 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) (async) r1 = socket(0x10, 0x803, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000a00)={0x0, 0x0, &(0x7f00000009c0)={&(0x7f0000000880)=@deltfilter={0x24}, 0x24}}, 0x0) (async, rerun: 32) getsockname$packet(r1, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000000c0)=0x14) (rerun: 32) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r2, @ANYBLOB="0000000000000000280012000900010076657468"], 0x48}}, 0x0) (async) r3 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_NEW_KEY(r3, &(0x7f00000003c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000300)={&(0x7f0000000400)=ANY=[@ANYRES16=0x0, @ANYBLOB='\b'], 0x3c}, 0x1, 0x0, 0x0, 0x80}, 0x100d0) (async, rerun: 32) r4 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000200), 0xffffffffffffffff) (async, rerun: 32) ioctl$sock_SIOCGIFINDEX_80211(r3, 0x8933, &(0x7f0000000700)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_SET_INTERFACE(r3, &(0x7f0000000340)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)={0x24, r4, 0x5, 0x0, 0x0, {{}, {@val={0x8, 0x3, r5}, @void}}, [@NL80211_ATTR_IFTYPE={0x8, 0x5, 0x3}]}, 0x24}}, 0x0) sendmsg$NL80211_CMD_SET_STATION(r0, &(0x7f00000001c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000180)={&(0x7f00000000c0)={0xb4, r4, 0x8, 0x70bd28, 0x25dfdbfd, {{}, {@void, @val={0xc, 0x99, {0x9, 0x3d}}}}, [@NL80211_ATTR_STA_SUPPORTED_RATES={0x8, 0x13, [{0x36}, {0x2}, {0x1, 0x1}, {0x5}]}, @NL80211_ATTR_STA_SUPPORTED_OPER_CLASSES={0x70, 0xbe, "93f57c15bc9e10635763eca78205348d2c4aa025d798e628dbbe8c953adc39f5ea35dd5985794de0d8cea703c0404c430f29d64844b8ef3078ae87a2a2de5dd046dc59d5448c317824f92bf7b5ab46114ca4038bd0541eb14ac96495bc97b6b0dd7a97dc6d95440b4aa998f3"}, @NL80211_ATTR_STA_LISTEN_INTERVAL={0x6, 0x12, 0xfffa}, @NL80211_ATTR_STA_AID={0x6, 0x10, 0x586}, @NL80211_ATTR_STA_FLAGS2={0xc, 0x43, {0x9b, 0x3}}]}, 0xb4}, 0x1, 0x0, 0x0, 0x4000000}, 0x41) r6 = creat(&(0x7f0000000280)='./file0\x00', 0x3) (async) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000380)={&(0x7f00000002c0)=@getchain={0x24, 0x66, 0x300, 0x70bd27, 0x25dfdbfc, {0x0, 0x0, 0x0, r2, {0x7, 0x15}, {0xfff8, 0x2}, {0xd, 0xc}}}, 0x24}}, 0x4000000) write$binfmt_script(r6, &(0x7f0000000040)=ANY=[@ANYBLOB='!\t'], 0x191) (async) close(r6) execve(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) [ 797.646246] erofs: options -> fault_injection=0x0000000000000000, [ 797.656284] erofs: root inode @ nid 36 [ 797.673947] erofs: FAULT_INJECTION was not selected [ 797.690490] erofs: bogus i_mode (0) @ nid 36 19:41:18 executing program 1: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{0x0, 0x0, 0x400}, {&(0x7f0000000280)="050000040041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000080)={[{@fault_injection}]}) [ 797.695679] erofs: root inode @ nid 36 [ 797.702020] erofs: mounted on /dev/loop2 with opts: fault_injection=0x0000000000000000. [ 797.713537] erofs: read_super, device -> /dev/loop3 [ 797.721850] erofs: options -> fault_injection=0x0000000000000000, [ 797.730073] erofs: FAULT_INJECTION was not selected [ 797.735755] erofs: root inode @ nid 0 [ 797.742402] erofs: bogus i_mode (0) @ nid 0 [ 797.774782] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.4'. [ 797.808130] erofs: read_super, device -> /dev/loop1 [ 797.818488] erofs: read_super, device -> /dev/loop0 19:41:18 executing program 5: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00472010000000c0024", 0xf, 0x400}, {&(0x7f0000000280)="05", 0x1, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000080)={[{@fault_injection}]}) 19:41:18 executing program 2: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c0024", 0xf, 0x400}, {&(0x7f0000000280)="05000005c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000080)={[{@fault_injection}]}) 19:41:18 executing program 3: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467019f03000c", 0xd, 0x400}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000080)={[{@fault_injection}]}) 19:41:18 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) (async) r1 = socket(0x10, 0x803, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000a00)={0x0, 0x0, &(0x7f00000009c0)={&(0x7f0000000880)=@deltfilter={0x24}, 0x24}}, 0x0) (async) getsockname$packet(r1, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000000c0)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r2, @ANYBLOB="0000000000000000280012000900010076657468"], 0x48}}, 0x0) (async) r3 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_NEW_KEY(r3, &(0x7f00000003c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000300)={&(0x7f0000000400)=ANY=[@ANYRES16=0x0, @ANYBLOB='\b'], 0x3c}, 0x1, 0x0, 0x0, 0x80}, 0x100d0) (async) r4 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000200), 0xffffffffffffffff) (async) ioctl$sock_SIOCGIFINDEX_80211(r3, 0x8933, &(0x7f0000000700)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_SET_INTERFACE(r3, &(0x7f0000000340)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)={0x24, r4, 0x5, 0x0, 0x0, {{}, {@val={0x8, 0x3, r5}, @void}}, [@NL80211_ATTR_IFTYPE={0x8, 0x5, 0x3}]}, 0x24}}, 0x0) sendmsg$NL80211_CMD_SET_STATION(r0, &(0x7f00000001c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000180)={&(0x7f00000000c0)={0xb4, r4, 0x8, 0x70bd28, 0x25dfdbfd, {{}, {@void, @val={0xc, 0x99, {0x9, 0x3d}}}}, [@NL80211_ATTR_STA_SUPPORTED_RATES={0x8, 0x13, [{0x36}, {0x2}, {0x1, 0x1}, {0x5}]}, @NL80211_ATTR_STA_SUPPORTED_OPER_CLASSES={0x70, 0xbe, "93f57c15bc9e10635763eca78205348d2c4aa025d798e628dbbe8c953adc39f5ea35dd5985794de0d8cea703c0404c430f29d64844b8ef3078ae87a2a2de5dd046dc59d5448c317824f92bf7b5ab46114ca4038bd0541eb14ac96495bc97b6b0dd7a97dc6d95440b4aa998f3"}, @NL80211_ATTR_STA_LISTEN_INTERVAL={0x6, 0x12, 0xfffa}, @NL80211_ATTR_STA_AID={0x6, 0x10, 0x586}, @NL80211_ATTR_STA_FLAGS2={0xc, 0x43, {0x9b, 0x3}}]}, 0xb4}, 0x1, 0x0, 0x0, 0x4000000}, 0x41) r6 = creat(&(0x7f0000000280)='./file0\x00', 0x3) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000380)={&(0x7f00000002c0)=@getchain={0x24, 0x66, 0x300, 0x70bd27, 0x25dfdbfc, {0x0, 0x0, 0x0, r2, {0x7, 0x15}, {0xfff8, 0x2}, {0xd, 0xc}}}, 0x24}}, 0x4000000) (async) write$binfmt_script(r6, &(0x7f0000000040)=ANY=[@ANYBLOB='!\t'], 0x191) (async) close(r6) execve(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) [ 797.827847] erofs: options -> [ 797.837275] erofs: options -> fault_injection=0x0000000000000000, [ 797.846186] erofs: unmounted for /dev/loop2 [ 797.859281] erofs: blksize 1 isn't supported on this platform [ 797.872386] erofs: cannot find valid erofs superblock 19:41:19 executing program 4: r0 = creat(&(0x7f0000000280)='./file0\x00', 0x3) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[@ANYBLOB='!\t'], 0x191) close(r0) syz_mount_image$vfat(&(0x7f0000000100), &(0x7f0000000140)='./file0\x00', 0x2, 0x2, &(0x7f0000000240)=[{&(0x7f0000000180)="c13378afba5710eb6283c218243016dac01b950ba4a8116dcb560eebaad01e924f63f115ef1ef332ee3d5d33a629e4f01820f53075f6301b629f1f0aede47b1621d6dc5f3cab02425f55739b37cfa0cfe8d67e7781911d046c831db6b2f802f8ab46c15342df70b9ec66c01bf5a32a774eb2ca278812a6eb29ceca4a6d7a3e7542f2b7430c8a929fb544c242f045b617c58549e31e5b9b987a0b61d4", 0x9c, 0x5f4}, {&(0x7f0000000340)="e8810e3f5037c9c15ef815cf0a4673590ef2c103b891a8472779b15be0835e8e00c5b1ad81665b73a775f32c25a8846f57a0cc8a1b54b47661dfcbb0ab8b142323ed53fedf226fce3bcc664643e3d1166b7a68583b3e838b2eabacc30d45880d1f3d25864bfb605af350fb554426d2e7ba495d0e75326f01f0054628542dbafbe5f2fe7845", 0x85, 0x2}], 0x2404, &(0x7f0000000400)={[{@uni_xlate}, {@nonumtail}, {@uni_xlate}, {@numtail}, {@fat=@dos1xfloppy}], [{@subj_user={'subj_user', 0x3d, '+5'}}, {@hash}, {@uid_gt={'uid>', 0xffffffffffffffff}}, {@obj_user={'obj_user', 0x3d, '--&)[(*^!'}}]}) execve(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) r1 = creat(&(0x7f0000000300)='./bus\x00', 0x0) fcntl$setstatus(r1, 0x4, 0x4002) io_setup(0x5, &(0x7f00000002c0)=0x0) io_submit(r2, 0x8, &(0x7f0000000540)=[&(0x7f00000000c0)={0x19, 0x0, 0x8, 0x1, 0x0, r1, &(0x7f0000000000), 0x200a00}]) chdir(&(0x7f0000000480)='./bus\x00') ioctl$AUTOFS_DEV_IOCTL_VERSION(r1, 0xc0189371, &(0x7f0000000080)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) [ 797.917994] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.4'. [ 797.943705] erofs: read_super, device -> /dev/loop5 [ 797.948992] erofs: options -> fault_injection=0x0000000000000000, [ 797.961910] erofs: FAULT_INJECTION was not selected 19:41:19 executing program 0: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e0", 0x4, 0x400}, {0x0, 0x4c, 0x1000}], 0x0, &(0x7f0000000080)) [ 797.972556] erofs: root inode @ nid 36 [ 797.980899] erofs: bogus i_mode (0) @ nid 36 [ 797.980914] erofs: read_super, device -> /dev/loop3 [ 797.995987] erofs: options -> fault_injection=0x0000000000000000, [ 798.004653] erofs: FAULT_INJECTION was not selected [ 798.010239] erofs: root inode @ nid 0 [ 798.014277] erofs: bogus i_mode (0) @ nid 0 19:41:19 executing program 1: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{0x0, 0x0, 0x400}, {&(0x7f0000000280)="050000040041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000080)={[{@fault_injection}]}) 19:41:19 executing program 5: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00473010000000c0024", 0xf, 0x400}, {&(0x7f0000000280)="05", 0x1, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000080)={[{@fault_injection}]}) [ 798.065574] erofs: read_super, device -> /dev/loop2 [ 798.077868] erofs: options -> fault_injection=0x0000000000000000, 19:41:19 executing program 3: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b0046701a003000c", 0xd, 0x400}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000080)={[{@fault_injection}]}) [ 798.107356] erofs: FAULT_INJECTION was not selected [ 798.117541] erofs: read_super, device -> /dev/loop0 [ 798.126586] erofs: read_super, device -> /dev/loop1 [ 798.132794] erofs: options -> fault_injection=0x0000000000000000, [ 798.142939] erofs: read_super, device -> /dev/loop5 [ 798.145224] erofs: root inode @ nid 36 19:41:19 executing program 1: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000), 0x0, 0x400}, {&(0x7f0000000280)="050000040041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000080)={[{@fault_injection}]}) [ 798.153995] erofs: options -> fault_injection=0x0000000000000000, [ 798.159961] erofs: options -> [ 798.161490] erofs: cannot find valid erofs superblock [ 798.174529] erofs: FAULT_INJECTION was not selected [ 798.182710] erofs: root inode @ nid 36 [ 798.184071] erofs: blksize 1 isn't supported on this platform [ 798.186890] erofs: bogus i_mode (0) @ nid 36 [ 798.194063] erofs: mounted on /dev/loop2 with opts: fault_injection=0x0000000000000000. 19:41:19 executing program 4: r0 = creat(&(0x7f0000000280)='./file0\x00', 0x3) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[@ANYBLOB='!\t'], 0x191) close(r0) (async) syz_mount_image$vfat(&(0x7f0000000100), &(0x7f0000000140)='./file0\x00', 0x2, 0x2, &(0x7f0000000240)=[{&(0x7f0000000180)="c13378afba5710eb6283c218243016dac01b950ba4a8116dcb560eebaad01e924f63f115ef1ef332ee3d5d33a629e4f01820f53075f6301b629f1f0aede47b1621d6dc5f3cab02425f55739b37cfa0cfe8d67e7781911d046c831db6b2f802f8ab46c15342df70b9ec66c01bf5a32a774eb2ca278812a6eb29ceca4a6d7a3e7542f2b7430c8a929fb544c242f045b617c58549e31e5b9b987a0b61d4", 0x9c, 0x5f4}, {&(0x7f0000000340)="e8810e3f5037c9c15ef815cf0a4673590ef2c103b891a8472779b15be0835e8e00c5b1ad81665b73a775f32c25a8846f57a0cc8a1b54b47661dfcbb0ab8b142323ed53fedf226fce3bcc664643e3d1166b7a68583b3e838b2eabacc30d45880d1f3d25864bfb605af350fb554426d2e7ba495d0e75326f01f0054628542dbafbe5f2fe7845", 0x85, 0x2}], 0x2404, &(0x7f0000000400)={[{@uni_xlate}, {@nonumtail}, {@uni_xlate}, {@numtail}, {@fat=@dos1xfloppy}], [{@subj_user={'subj_user', 0x3d, '+5'}}, {@hash}, {@uid_gt={'uid>', 0xffffffffffffffff}}, {@obj_user={'obj_user', 0x3d, '--&)[(*^!'}}]}) (async) execve(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) (async) r1 = creat(&(0x7f0000000300)='./bus\x00', 0x0) fcntl$setstatus(r1, 0x4, 0x4002) (async) io_setup(0x5, &(0x7f00000002c0)=0x0) io_submit(r2, 0x8, &(0x7f0000000540)=[&(0x7f00000000c0)={0x19, 0x0, 0x8, 0x1, 0x0, r1, &(0x7f0000000000), 0x200a00}]) (async) chdir(&(0x7f0000000480)='./bus\x00') (async) ioctl$AUTOFS_DEV_IOCTL_VERSION(r1, 0xc0189371, &(0x7f0000000080)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) 19:41:19 executing program 2: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c0024", 0xf, 0x400}, {&(0x7f0000000280)="05000006c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000080)={[{@fault_injection}]}) [ 798.280512] erofs: read_super, device -> /dev/loop3 19:41:19 executing program 0: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e0", 0x4, 0x400}, {0x0, 0x60, 0x1000}], 0x0, &(0x7f0000000080)) 19:41:19 executing program 5: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00478010000000c0024", 0xf, 0x400}, {&(0x7f0000000280)="05", 0x1, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000080)={[{@fault_injection}]}) [ 798.304044] erofs: unmounted for /dev/loop2 [ 798.304157] erofs: options -> fault_injection=0x0000000000000000, [ 798.330330] erofs: FAULT_INJECTION was not selected [ 798.336724] erofs: root inode @ nid 0 [ 798.344774] erofs: bogus i_mode (0) @ nid 0 19:41:19 executing program 3: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010005000c", 0xd, 0x400}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000080)={[{@fault_injection}]}) [ 798.379228] erofs: read_super, device -> /dev/loop1 [ 798.384895] erofs: options -> fault_injection=0x0000000000000000, [ 798.392964] erofs: read_super, device -> /dev/loop5 [ 798.408777] erofs: options -> fault_injection=0x0000000000000000, [ 798.423315] erofs: cannot find valid erofs superblock 19:41:19 executing program 4: r0 = creat(&(0x7f0000000280)='./file0\x00', 0x3) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[@ANYBLOB='!\t'], 0x191) (async) close(r0) (async) syz_mount_image$vfat(&(0x7f0000000100), &(0x7f0000000140)='./file0\x00', 0x2, 0x2, &(0x7f0000000240)=[{&(0x7f0000000180)="c13378afba5710eb6283c218243016dac01b950ba4a8116dcb560eebaad01e924f63f115ef1ef332ee3d5d33a629e4f01820f53075f6301b629f1f0aede47b1621d6dc5f3cab02425f55739b37cfa0cfe8d67e7781911d046c831db6b2f802f8ab46c15342df70b9ec66c01bf5a32a774eb2ca278812a6eb29ceca4a6d7a3e7542f2b7430c8a929fb544c242f045b617c58549e31e5b9b987a0b61d4", 0x9c, 0x5f4}, {&(0x7f0000000340)="e8810e3f5037c9c15ef815cf0a4673590ef2c103b891a8472779b15be0835e8e00c5b1ad81665b73a775f32c25a8846f57a0cc8a1b54b47661dfcbb0ab8b142323ed53fedf226fce3bcc664643e3d1166b7a68583b3e838b2eabacc30d45880d1f3d25864bfb605af350fb554426d2e7ba495d0e75326f01f0054628542dbafbe5f2fe7845", 0x85, 0x2}], 0x2404, &(0x7f0000000400)={[{@uni_xlate}, {@nonumtail}, {@uni_xlate}, {@numtail}, {@fat=@dos1xfloppy}], [{@subj_user={'subj_user', 0x3d, '+5'}}, {@hash}, {@uid_gt={'uid>', 0xffffffffffffffff}}, {@obj_user={'obj_user', 0x3d, '--&)[(*^!'}}]}) execve(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) r1 = creat(&(0x7f0000000300)='./bus\x00', 0x0) fcntl$setstatus(r1, 0x4, 0x4002) io_setup(0x5, &(0x7f00000002c0)=0x0) io_submit(r2, 0x8, &(0x7f0000000540)=[&(0x7f00000000c0)={0x19, 0x0, 0x8, 0x1, 0x0, r1, &(0x7f0000000000), 0x200a00}]) chdir(&(0x7f0000000480)='./bus\x00') ioctl$AUTOFS_DEV_IOCTL_VERSION(r1, 0xc0189371, &(0x7f0000000080)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) [ 798.432603] erofs: FAULT_INJECTION was not selected [ 798.448008] erofs: read_super, device -> /dev/loop2 [ 798.458633] erofs: options -> fault_injection=0x0000000000000000, [ 798.465200] erofs: FAULT_INJECTION was not selected [ 798.469424] erofs: root inode @ nid 36 [ 798.477090] erofs: read_super, device -> /dev/loop0 19:41:19 executing program 1: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000), 0x0, 0x400}, {&(0x7f0000000280)="050000040041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000080)={[{@fault_injection}]}) [ 798.481454] erofs: read_super, device -> /dev/loop3 [ 798.487143] erofs: options -> fault_injection=0x0000000000000000, [ 798.488714] erofs: options -> [ 798.496343] erofs: root inode @ nid 36 [ 798.509174] erofs: bogus i_mode (0) @ nid 36 [ 798.514028] erofs: mounted on /dev/loop2 with opts: fault_injection=0x0000000000000000. [ 798.521030] erofs: blksize 1 isn't supported on this platform [ 798.526338] erofs: FAULT_INJECTION was not selected 19:41:19 executing program 2: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c0024", 0xf, 0x400}, {&(0x7f0000000280)="05000007c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000080)={[{@fault_injection}]}) 19:41:19 executing program 5: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467020000000c0024", 0xf, 0x400}, {&(0x7f0000000280)="05", 0x1, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000080)={[{@fault_injection}]}) [ 798.534072] erofs: root inode @ nid 0 [ 798.539267] erofs: bogus i_mode (0) @ nid 0 [ 798.582658] erofs: unmounted for /dev/loop2 19:41:19 executing program 3: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010006000c", 0xd, 0x400}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000080)={[{@fault_injection}]}) [ 798.669239] erofs: read_super, device -> /dev/loop1 [ 798.686261] erofs: options -> fault_injection=0x0000000000000000, 19:41:19 executing program 0: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e0", 0x4, 0x400}, {0x0, 0x68, 0x1000}], 0x0, &(0x7f0000000080)) 19:41:19 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x40, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x100, 0x0, 0x100, 0x0, 0x10001}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000003400)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41ba, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x49000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) syz_fuse_handle_req(0xffffffffffffffff, 0x0, 0x0, 0x0) creat(0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b00000000020000280200000284", 0x62, 0x400}, {&(0x7f0000010400)="02000000030000000400000030000f", 0xf, 0x1000}, {&(0x7f0000010500)="ffff000000000000ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x1002, 0x2000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000013a00)) chown(0x0, 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) chown(&(0x7f0000000000)='./control\x00', 0x0, 0x0) setxattr$trusted_overlay_upper(&(0x7f0000000140)='./file0\x00', &(0x7f00000002c0), &(0x7f0000001280)=ANY=[], 0x638, 0x0) lsetxattr$trusted_overlay_opaque(&(0x7f0000000340)='./file0\x00', &(0x7f0000001280), &(0x7f00000012c0), 0x2, 0x3) setxattr$trusted_overlay_upper(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0), &(0x7f0000000380)={0x6, 0xfb, 0xe01, 0x0, 0x0, "b145e3180bb48426b58ee26ae64909d4", "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"}, 0xc001, 0x0) perf_event_open(&(0x7f0000001300)={0x4, 0x80, 0x0, 0x9, 0x8, 0x6, 0x0, 0x0, 0x20, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x2, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x3326, 0x1, @perf_config_ext={0xcca, 0x9}, 0x42404, 0x1, 0x5, 0x1, 0x9, 0x2, 0x0, 0x0, 0x6, 0x0, 0x6}, 0x0, 0x10, r0, 0x0) r1 = openat$tcp_congestion(0xffffffffffffff9c, &(0x7f0000000080), 0x1, 0x0) fcntl$F_SET_FILE_RW_HINT(0xffffffffffffffff, 0x40e, &(0x7f0000000040)) write$tcp_congestion(r1, &(0x7f0000000000)='cubic\x00', 0x5) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f00000011c0)={0x4, 0x80, 0x6, 0x6, 0x7, 0x2, 0x0, 0x83, 0x0, 0x2, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x2, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x9, 0x4, @perf_bp={&(0x7f0000000240)}, 0x4500, 0x5, 0x639, 0x3, 0x7f, 0x2, 0xfffe, 0x0, 0xffff4502, 0x0, 0x3}, 0x0, 0x10, 0xffffffffffffffff, 0x0) [ 798.721239] erofs: read_super, device -> /dev/loop2 [ 798.726352] erofs: options -> fault_injection=0x0000000000000000, [ 798.734762] erofs: FAULT_INJECTION was not selected [ 798.743115] erofs: read_super, device -> /dev/loop5 [ 798.749576] erofs: root inode @ nid 36 [ 798.766940] erofs: cannot find valid erofs superblock [ 798.774816] erofs: mounted on /dev/loop2 with opts: fault_injection=0x0000000000000000. [ 798.784451] erofs: options -> fault_injection=0x0000000000000000, [ 798.799733] erofs: FAULT_INJECTION was not selected [ 798.812392] erofs: root inode @ nid 36 19:41:19 executing program 2: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c0024", 0xf, 0x400}, {&(0x7f0000000280)="05000008c041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000080)={[{@fault_injection}]}) 19:41:19 executing program 1: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000), 0x0, 0x400}, {&(0x7f0000000280)="050000040041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000080)={[{@fault_injection}]}) [ 798.825235] erofs: bogus i_mode (0) @ nid 36 [ 798.831834] erofs: read_super, device -> /dev/loop0 [ 798.837246] erofs: read_super, device -> /dev/loop3 [ 798.842852] erofs: options -> fault_injection=0x0000000000000000, [ 798.858567] erofs: options -> [ 798.869726] erofs: unmounted for /dev/loop2 19:41:19 executing program 5: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467030000000c0024", 0xf, 0x400}, {&(0x7f0000000280)="05", 0x1, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000080)={[{@fault_injection}]}) [ 798.878626] erofs: blksize 1 isn't supported on this platform [ 798.884047] erofs: FAULT_INJECTION was not selected [ 798.895600] erofs: root inode @ nid 0 [ 798.915466] erofs: bogus i_mode (0) @ nid 0 19:41:20 executing program 3: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010007000c", 0xd, 0x400}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000080)={[{@fault_injection}]}) 19:41:20 executing program 0: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e0", 0x4, 0x400}, {0x0, 0x6c, 0x1000}], 0x0, &(0x7f0000000080)) 19:41:20 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x40, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x100, 0x0, 0x100, 0x0, 0x10001}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000003400)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41ba, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x49000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) syz_fuse_handle_req(0xffffffffffffffff, 0x0, 0x0, 0x0) creat(0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b00000000020000280200000284", 0x62, 0x400}, {&(0x7f0000010400)="02000000030000000400000030000f", 0xf, 0x1000}, {&(0x7f0000010500)="ffff000000000000ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x1002, 0x2000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000013a00)) chown(0x0, 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) chown(&(0x7f0000000000)='./control\x00', 0x0, 0x0) setxattr$trusted_overlay_upper(&(0x7f0000000140)='./file0\x00', &(0x7f00000002c0), &(0x7f0000001280)=ANY=[], 0x638, 0x0) lsetxattr$trusted_overlay_opaque(&(0x7f0000000340)='./file0\x00', &(0x7f0000001280), &(0x7f00000012c0), 0x2, 0x3) setxattr$trusted_overlay_upper(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0), &(0x7f0000000380)={0x6, 0xfb, 0xe01, 0x0, 0x0, "b145e3180bb48426b58ee26ae64909d4", "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"}, 0xc001, 0x0) perf_event_open(&(0x7f0000001300)={0x4, 0x80, 0x0, 0x9, 0x8, 0x6, 0x0, 0x0, 0x20, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x2, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x3326, 0x1, @perf_config_ext={0xcca, 0x9}, 0x42404, 0x1, 0x5, 0x1, 0x9, 0x2, 0x0, 0x0, 0x6, 0x0, 0x6}, 0x0, 0x10, r0, 0x0) r1 = openat$tcp_congestion(0xffffffffffffff9c, &(0x7f0000000080), 0x1, 0x0) fcntl$F_SET_FILE_RW_HINT(0xffffffffffffffff, 0x40e, &(0x7f0000000040)) write$tcp_congestion(r1, &(0x7f0000000000)='cubic\x00', 0x5) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f00000011c0)={0x4, 0x80, 0x6, 0x6, 0x7, 0x2, 0x0, 0x83, 0x0, 0x2, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x2, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x9, 0x4, @perf_bp={&(0x7f0000000240)}, 0x4500, 0x5, 0x639, 0x3, 0x7f, 0x2, 0xfffe, 0x0, 0xffff4502, 0x0, 0x3}, 0x0, 0x10, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x40, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x100, 0x0, 0x100, 0x0, 0x10001}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async) pipe(&(0x7f0000003400)) (async) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41ba, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x49000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) (async) syz_fuse_handle_req(0xffffffffffffffff, 0x0, 0x0, 0x0) (async) creat(0x0, 0x0) (async) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b00000000020000280200000284", 0x62, 0x400}, {&(0x7f0000010400)="02000000030000000400000030000f", 0xf, 0x1000}, {&(0x7f0000010500)="ffff000000000000ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x1002, 0x2000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000013a00)) (async) chown(0x0, 0x0, 0x0) (async) socket$nl_route(0x10, 0x3, 0x0) (async) chown(&(0x7f0000000000)='./control\x00', 0x0, 0x0) (async) setxattr$trusted_overlay_upper(&(0x7f0000000140)='./file0\x00', &(0x7f00000002c0), &(0x7f0000001280)=ANY=[], 0x638, 0x0) (async) lsetxattr$trusted_overlay_opaque(&(0x7f0000000340)='./file0\x00', &(0x7f0000001280), &(0x7f00000012c0), 0x2, 0x3) (async) setxattr$trusted_overlay_upper(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0), &(0x7f0000000380)={0x6, 0xfb, 0xe01, 0x0, 0x0, "b145e3180bb48426b58ee26ae64909d4", "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"}, 0xc001, 0x0) (async) perf_event_open(&(0x7f0000001300)={0x4, 0x80, 0x0, 0x9, 0x8, 0x6, 0x0, 0x0, 0x20, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x2, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x3326, 0x1, @perf_config_ext={0xcca, 0x9}, 0x42404, 0x1, 0x5, 0x1, 0x9, 0x2, 0x0, 0x0, 0x6, 0x0, 0x6}, 0x0, 0x10, r0, 0x0) (async) openat$tcp_congestion(0xffffffffffffff9c, &(0x7f0000000080), 0x1, 0x0) (async) fcntl$F_SET_FILE_RW_HINT(0xffffffffffffffff, 0x40e, &(0x7f0000000040)) (async) write$tcp_congestion(r1, &(0x7f0000000000)='cubic\x00', 0x5) (async) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) (async) perf_event_open(&(0x7f00000011c0)={0x4, 0x80, 0x6, 0x6, 0x7, 0x2, 0x0, 0x83, 0x0, 0x2, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x2, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x9, 0x4, @perf_bp={&(0x7f0000000240)}, 0x4500, 0x5, 0x639, 0x3, 0x7f, 0x2, 0xfffe, 0x0, 0xffff4502, 0x0, 0x3}, 0x0, 0x10, 0xffffffffffffffff, 0x0) (async) [ 799.045256] erofs: read_super, device -> /dev/loop1 [ 799.053022] erofs: read_super, device -> /dev/loop5 [ 799.061626] erofs: options -> fault_injection=0x0000000000000000, [ 799.067950] erofs: options -> fault_injection=0x0000000000000000, [ 799.077504] erofs: cannot find valid erofs superblock [ 799.087269] erofs: FAULT_INJECTION was not selected 19:41:20 executing program 1: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467", 0x8, 0x400}, {&(0x7f0000000280)="050000040041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000080)={[{@fault_injection}]}) [ 799.110653] erofs: root inode @ nid 36 [ 799.111499] erofs: read_super, device -> /dev/loop2 [ 799.127751] erofs: bogus i_mode (0) @ nid 36 [ 799.135724] erofs: options -> fault_injection=0x0000000000000000, [ 799.143612] erofs: FAULT_INJECTION was not selected [ 799.149643] erofs: root inode @ nid 36 [ 799.171355] erofs: mounted on /dev/loop2 with opts: fault_injection=0x0000000000000000. [ 799.204380] erofs: read_super, device -> /dev/loop3 [ 799.208006] erofs: read_super, device -> /dev/loop0 [ 799.211008] erofs: options -> fault_injection=0x0000000000000000, 19:41:20 executing program 5: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467040000000c0024", 0xf, 0x400}, {&(0x7f0000000280)="05", 0x1, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000080)={[{@fault_injection}]}) 19:41:20 executing program 2: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c0024", 0xf, 0x400}, {&(0x7f0000000280)="05000000c041", 0x14, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000080)={[{@fault_injection}]}) [ 799.218171] erofs: options -> [ 799.221567] erofs: FAULT_INJECTION was not selected [ 799.241157] erofs: blksize 1 isn't supported on this platform [ 799.248247] erofs: root inode @ nid 0 [ 799.261483] erofs: unmounted for /dev/loop2 19:41:20 executing program 0: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e0", 0x4, 0x400}, {0x0, 0x74, 0x1000}], 0x0, &(0x7f0000000080)) [ 799.288809] erofs: bogus i_mode (0) @ nid 0 19:41:20 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x40, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x100, 0x0, 0x100, 0x0, 0x10001}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000003400)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41ba, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x49000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) syz_fuse_handle_req(0xffffffffffffffff, 0x0, 0x0, 0x0) creat(0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b00000000020000280200000284", 0x62, 0x400}, {&(0x7f0000010400)="02000000030000000400000030000f", 0xf, 0x1000}, {&(0x7f0000010500)="ffff000000000000ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x1002, 0x2000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000013a00)) chown(0x0, 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) chown(&(0x7f0000000000)='./control\x00', 0x0, 0x0) setxattr$trusted_overlay_upper(&(0x7f0000000140)='./file0\x00', &(0x7f00000002c0), &(0x7f0000001280)=ANY=[], 0x638, 0x0) lsetxattr$trusted_overlay_opaque(&(0x7f0000000340)='./file0\x00', &(0x7f0000001280), &(0x7f00000012c0), 0x2, 0x3) setxattr$trusted_overlay_upper(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0), &(0x7f0000000380)={0x6, 0xfb, 0xe01, 0x0, 0x0, "b145e3180bb48426b58ee26ae64909d4", "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"}, 0xc001, 0x0) perf_event_open(&(0x7f0000001300)={0x4, 0x80, 0x0, 0x9, 0x8, 0x6, 0x0, 0x0, 0x20, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x2, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x3326, 0x1, @perf_config_ext={0xcca, 0x9}, 0x42404, 0x1, 0x5, 0x1, 0x9, 0x2, 0x0, 0x0, 0x6, 0x0, 0x6}, 0x0, 0x10, r0, 0x0) r1 = openat$tcp_congestion(0xffffffffffffff9c, &(0x7f0000000080), 0x1, 0x0) fcntl$F_SET_FILE_RW_HINT(0xffffffffffffffff, 0x40e, &(0x7f0000000040)) write$tcp_congestion(r1, &(0x7f0000000000)='cubic\x00', 0x5) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f00000011c0)={0x4, 0x80, 0x6, 0x6, 0x7, 0x2, 0x0, 0x83, 0x0, 0x2, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x2, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x9, 0x4, @perf_bp={&(0x7f0000000240)}, 0x4500, 0x5, 0x639, 0x3, 0x7f, 0x2, 0xfffe, 0x0, 0xffff4502, 0x0, 0x3}, 0x0, 0x10, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x40, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x100, 0x0, 0x100, 0x0, 0x10001}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async) pipe(&(0x7f0000003400)) (async) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41ba, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x49000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) (async) syz_fuse_handle_req(0xffffffffffffffff, 0x0, 0x0, 0x0) (async) creat(0x0, 0x0) (async) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b00000000020000280200000284", 0x62, 0x400}, {&(0x7f0000010400)="02000000030000000400000030000f", 0xf, 0x1000}, {&(0x7f0000010500)="ffff000000000000ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x1002, 0x2000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000013a00)) (async) chown(0x0, 0x0, 0x0) (async) socket$nl_route(0x10, 0x3, 0x0) (async) chown(&(0x7f0000000000)='./control\x00', 0x0, 0x0) (async) setxattr$trusted_overlay_upper(&(0x7f0000000140)='./file0\x00', &(0x7f00000002c0), &(0x7f0000001280)=ANY=[], 0x638, 0x0) (async) lsetxattr$trusted_overlay_opaque(&(0x7f0000000340)='./file0\x00', &(0x7f0000001280), &(0x7f00000012c0), 0x2, 0x3) (async) setxattr$trusted_overlay_upper(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0), &(0x7f0000000380)={0x6, 0xfb, 0xe01, 0x0, 0x0, "b145e3180bb48426b58ee26ae64909d4", "8dfa95f490b5c29ff9389f224c1d0f8d82b5401c68b18752f1f24810951641b2d28aa470a5fec7cc1cabfbdc679b6581b170cb2963e4d4421cf7cf61bf2e91106a5ccf86ced704dd5a91ce8fb6fa3bd4f0264986d9029c368058c1e293fdeab2ecadd3a1ccd738982be05e6527994f4d77691586962fb2ae58e80d061dbba03c9a595ffd4fb2788cd2a8e6147bf811fed93b0583e9ccd11df48aff0b5e0fc187392aa58728bbb313b8de8064e11cf658d4bb435e975574075faaae14529f47d687b1178c084e23c07574ca6d52155b5710231f80b96d6e3f99a05008ff65fc5a88242e8c12cf627442215a5eac9c07457af4980fb3cff8e999c94b6a95bb86457a9d71f139c054c26c88591fefa00524a080ffea5e29a99539b2beacc330b9c4c787e8adb5cf3e1dc30e877e2df587d44e9f2b204a99d914651fb183f816760ae3075916630905f52ddea2dad60a27da4650af5d05443215f78a826fd0599d12a4d9fabe4a3778ea20893b1afa01b78753cd758899b74aaad16b3f573eb2f39153b8c5cd0cbcd06274a462773e3f52bafe685084f9e482a3258cd3aedb1504cc0dcd567917600e564ff2d2fe8fb4afcd235db6db4fcda2b8f53798039f73dbd10b8c2f99697743a5b78a141f18a831aa794dd9430e2ab8b596e3d78e59d6763a86b0885e8f627002a5d77eac470fb685a4f7814b130fa4a7e5e66b3e6e3fae7bf31321c9f8858d8996c56391e41ed62fa28b4db74582f7578bc22266a64476654a23aa3878cc4e4b1c2d961f6e223498e0937572c7db8e6265063101cab017a65a7c77a503fec556060f8102caa95c5a23eebcdd3d1897f05f1328acae7446b5d5db454013c7e42c4d96accf8ddfe71fc7e5f56370d18a69dc699ad1303cb38a11f83d1a8660846755cd47a7f3a433a4011ee128b1e1ffec5a440621a6d044bd17ceee1f5cfec1dd35f41b89a816eaf5f25754307cb3968eae10d566fb79679c7af6ff82b28766cd99539dc09cefc0523a2112c5c81b269c8ec59131dbb9e5cb04d94b28f586b68b5d7df852866ad550768b34712a6080648ca5e3ddbb0996f0b0497ea907c6225d86664a4d5a659782373672b91e6c8ded3445dab6302bf55de0ba17560668426dcc562f757b019c878969a364a5e60be8eb6c3595846b7cbdbd0e1f88422a50d083bf65dd9dd2f5919bf38c2a74fce75f20517a17be51efd6f794e0f59e91da0478b833184db399e635d5c6a469bd5d1dde0c426fff46a4aea7af93ab32afef4d7864e7c7c6b81001293d1888b45f75e98707513fbd69ae16ac5b344532b7d62dcbfc1edc2bceab8a0ec62bf4638f13b968b764ece346288fceec159e68f49db618ea2ad067b301bb69ef7f983afd323738d9abdc729080130b00ee1e82997e9a41f03dd0712d73e334555e440d782adc17302bd3688b37e21dcc044cd139b7cf575ea372916ad6b94e6624cd77a97f18941e69eac13636a30e66cfdb31621145784864f25e61d66eabbafd2580bf1dd950a3e4884bf23c223711c833c715e8b1bf6a187da53bf021b53e5a3297e6d235b6effdd41c4b4de8a5bdbc84b002857e2483e35f3594809261454b257896e966c69b1fd95cc319e309e00e3f70b708794b742bb19234df85411c225b86c0115454a965b278dd5f6a7ea0e21c8679b57bf9090a1ce919c4d1056839725dcaa73640f3a9cc517284806653063fbb48bb614f1587f1cccb65f074c4508670f25e7a1fb3bb5b0c1a3d13b3a70a05f9be65880580809e80a5358132ed29a0ff8286d8de4812e4a0b5eb8bb12374ba43cf555fd033b9d4e95280293971fc81ff68c866df2cc49fecf90651b04de9d755dd77186b31de06d9828971c4202b98f757ffa00b0a7a3fab432dda48f6e3f2ac364a7a5749f56bf32142b2ad6c82f394477a7556a247d4863b2ba06b33e862f9ba43599c013d5739b3ce841e1776dbf03ef0b9c3fe3a138b2af1604c789b528dba03b5bdf6109adaf94aa24dad44b3257ca0f4e6800aaf1c0ef19c9461a56486d6909514b98603846d6ffb5d0acb57186dd9d6cd7420c86dd9f0bb66e55dd70438cf20ee740cf780ea58b9562df870fc18659a6d9185873870790c9f087082365f40d7de077b81131d1b6651cc2fbe656fa7ed8f56c03d082fbce1dc67325c57d5af51d5fd243eb34b3ff952dd17d84a5688be17341f9d1a12e14f164f1065769d1ee1500afd2b52eeb470412fe623d58815b0f1170d519659959471b23fae3175f1409148daeb6d1f27622fa63bf06ad61362aa831c5ef62a03607eb2b8542c4b17d1d3f915d93f5df579068f015f0c78d2d87805ebfe8e6f57ddeaeef2a73e0283680227f1987561999d1a4a9e1b11ab945458a17f5c8d161b82b416e00bc90d2d5f5efffeafea0c30a6dbef943d4a580c4785118da34fd15514b81a8e7b5a9eebfe59b0d3565ded6c5200b20bd56eed9f95bb0e4d68bb99ce629a646c69270492b00e984317bb17f6bb29c264f64347b4948044b9f35f72889a0733e9b5381beaa1f69a72aa57cc00c24916d98f26fe0cf0457ec975b037cca64d581dd32005b7d7d39f26eb688002561366d68057d4183e940b6509468f0268174b35e0e13a101a3071b58df7cbdbc7819b523e30b74ed088a32c7ba159abd986a4607ebfc036e396645705b076543dd27b33b7bcf5b2f7fe989902d346aea6c7ef67573c83903e09570bc48017e01bfe1686e9fe3da28e727d679ddca33ce193fd3c4a525c25eb9d4e0d727dd0c9c9ee3709755344828402a6d384ea16ad9bdac4518df78eb1a848c269c7571d56742c2ff67fba4a57aefc93c45f814e4eb8cb9c04989072a25c8ccca82862053c1c0fde1891e5c8f8783118485f25adb48a1dce26eacdd4ddc84d07473d61cf6ee6a4d28b022311f1b7151763e083488866a8a7edddc8f61ffb6451764a6008f022d346c819ec86a0256958265e5ce28da25f84e90cdf97abf746108d782661f5533547099a4f8928a071f0afbebcb4acb82eb3f8aa14df0823ceade1dfc7e052fdb79d7dabd5477f4d18b602721892c56a8de2e0a955dbd60201fbc4ebf088b6efd6ad133cdf5134825517a8a21e16ab52ce3dc4b75ff07e33d74d68d5bd04056c88cfeea72065bed06eb9ac039d8130477ca68b36c06a15567e178012e2e090b42bdc235e05ca662aae33c1f736aefb41621ed734813db359d6ee2c3ac01aec680369b7164325c6fbfe0b28363f7d88f132f0eae29f132757772fc7336c5554907ab10b7143da1b62d9dbaa960fb7e32700334ee6a00f0f4b68e86dc0cdf09a8919b37d5cca678cdb09b1ba31e32e6a8a873faff01e7e37aebdac6fe276539eb764c37b2c54942b2c3bff04ecebaffbfd871efd41b6392a1e3be49a078abd76f6ce08431ea920d04ea2972291169487a056d4719eb08c1f52ed3ea26af31ae9d9d16463387e6e1a6b0d66040a7af2f0ce3a0b8df477f06c64f30ba59f6dfade2cee217cf56fadc107d603c80a2e68dd8b11e84dad6857495435c6bf5d7af2bf02c3b05e472b736114ef171a5358908657a4923460e295097081baf8410e17c9fa58e908d67124cc25d73e8c09ddfdfc7f663fb40a72691164490b7ea506084777283b653d2622972afe4ab4b24919f12f54cb3e03fff483632543a202b4662b1056f6b20830f8bd0cdf2c48ee0f1ca966251d4c0ece6dc318a7b2da1c37204b7a699fd195b817f669c7060c958f2bddbb868aae4801325c7933833d65bc5a95a0cf12212053a7f140359ec41e4f13241f9dbce60b15c81b349f18e2839907b75ae71fed5d2551b289ab139cfe4d80bc495dba7142cf2a65607b9bdf2b6c7045251544a6dc7e9f91dd55a3c962531ab30ddfe6cb91d578d08fb4b8e390ea816694298f9422f5e7a4610a3739d7ef3f5d4de5a45ab4220275620fb3020adb0f805d05b7cf14b216185f88295c1758ba6a98381da167c6ef57a3724013490de36a844f54e7d46f303a7f1ef50f1c273650c31eb37226a83c7915417e5d9692dace1c0c782a44ce661f3197e63bd9b0b0a78e2e2d2b3346e35294fb0b660909fb84acd0dd3390339568c223cfe8199abf117d6a548171a8e06f6d988f3979ebe4bb576d92fcf1231d943654de1a4d1ca08195d31ef8c12f62f25929a35e920eea9c3dd21b19b173a1a324e65949c5b204923e9a96100cdb5cff70351af51351ec38200cd8e7c5d6fb56a1607f88cbda686dcd4412855c16a9beccc2f0aa5420ca108115230574b1a5c67227d749fa247121bc689a2d44af153a929faca22cf1d9192eb148dcd8223c6d83c914be7cfdcbddbb6992ac47041e7b0b6a2dc8c91136e659b9b412101588f72ea73b4a41b2eb6f7b6d9d02502bb9856f46dd52890ee63913737cfb9e990950682c5bd1b627193272ae40d80cdad7d7a0ec90284af17aaaff7837039c58120929d287154406067bebec84e7a6fa44fab2cda175ee21e13739b9d092a893400a6db84d428393dc131023ab96fce6a681ba79f7e0ceb348b0d88c862629b9ed6ed18671926eaeb750c15b1f29e81e37b94ad7c07680e6fd7efcde6c2cc923d1c5c77642b0853e2fa7beabba21e8f733748a249de444266f083cdf6533d80407e9f46a870ff96745e9ae3efc2f1a3dcdd9668b095ae302dbcc08dc56f85295619ee5a53cabf0adae2277e8238bac02879ce81ea9402aec43f1f2ff0f6f2ae795fcd1af34901ce4c444c63f8445e788e518abe68acb34c31980980a01c0f838d01a8fa77fb542c96b341fb8ce311da00f6c601c2e66adc5a87637297e548a22f2365fc948a780045b12e21c199fca8cafb67c69e6d12327718bca40d35957d734c418a7ddbd9d2572a555ed2bf73ae50c554cec16e3d55d61f81f884df0646205d818a0b5d1917e5ad7df05b7ba6d0d0b816addec7a9b693363209e8faf5c7e87f9dd1abfda1040f77be95060ddd4a9933f5e56b0bb9b69fa871450a7ab44058c69c9683eeb01e4a705db5ad827623bf7611398c9191e"}, 0xc001, 0x0) (async) perf_event_open(&(0x7f0000001300)={0x4, 0x80, 0x0, 0x9, 0x8, 0x6, 0x0, 0x0, 0x20, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x2, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x3326, 0x1, @perf_config_ext={0xcca, 0x9}, 0x42404, 0x1, 0x5, 0x1, 0x9, 0x2, 0x0, 0x0, 0x6, 0x0, 0x6}, 0x0, 0x10, r0, 0x0) (async) openat$tcp_congestion(0xffffffffffffff9c, &(0x7f0000000080), 0x1, 0x0) (async) fcntl$F_SET_FILE_RW_HINT(0xffffffffffffffff, 0x40e, &(0x7f0000000040)) (async) write$tcp_congestion(r1, &(0x7f0000000000)='cubic\x00', 0x5) (async) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) (async) perf_event_open(&(0x7f00000011c0)={0x4, 0x80, 0x6, 0x6, 0x7, 0x2, 0x0, 0x83, 0x0, 0x2, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x2, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x9, 0x4, @perf_bp={&(0x7f0000000240)}, 0x4500, 0x5, 0x639, 0x3, 0x7f, 0x2, 0xfffe, 0x0, 0xffff4502, 0x0, 0x3}, 0x0, 0x10, 0xffffffffffffffff, 0x0) (async) [ 799.361193] erofs: read_super, device -> /dev/loop5 [ 799.362663] erofs: read_super, device -> /dev/loop1 [ 799.370806] erofs: options -> fault_injection=0x0000000000000000, [ 799.371721] erofs: options -> fault_injection=0x0000000000000000, [ 799.394160] erofs: FAULT_INJECTION was not selected 19:41:20 executing program 3: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010009000c", 0xd, 0x400}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000080)={[{@fault_injection}]}) [ 799.416664] erofs: root inode @ nid 36 [ 799.438308] erofs: bogus i_mode (0) @ nid 36 [ 799.439956] erofs: blksize 1 isn't supported on this platform 19:41:20 executing program 5: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467050000000c0024", 0xf, 0x400}, {&(0x7f0000000280)="05", 0x1, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000080)={[{@fault_injection}]}) [ 799.517934] erofs: read_super, device -> /dev/loop0 [ 799.528372] erofs: read_super, device -> /dev/loop3 [ 799.531195] erofs: options -> [ 799.537240] erofs: blksize 1 isn't supported on this platform [ 799.538734] erofs: options -> fault_injection=0x0000000000000000, [ 799.544079] erofs: read_super, device -> /dev/loop2 [ 799.558193] erofs: options -> fault_injection=0x0000000000000000, 19:41:20 executing program 1: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467", 0x8, 0x400}, {&(0x7f0000000280)="050000040041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000080)={[{@fault_injection}]}) 19:41:20 executing program 0: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e0", 0x4, 0x400}, {0x0, 0x7a, 0x1000}], 0x0, &(0x7f0000000080)) [ 799.565930] erofs: FAULT_INJECTION was not selected [ 799.572867] erofs: root inode @ nid 36 [ 799.577328] erofs: FAULT_INJECTION was not selected [ 799.588297] erofs: mounted on /dev/loop2 with opts: fault_injection=0x0000000000000000. [ 799.598870] erofs: root inode @ nid 0 19:41:20 executing program 2: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c0024", 0xf, 0x400}, {&(0x7f0000000280)="05000000c041", 0x20000006, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000080)={[{@fault_injection}]}) [ 799.631333] erofs: bogus i_mode (0) @ nid 0 19:41:20 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x1dd) r0 = creat(&(0x7f0000000140)='./bus\x00', 0x0) lseek(r0, 0xffff, 0x0) io_setup(0x81, &(0x7f0000000100)=0x0) r2 = open(0x0, 0x400141042, 0x0) write$FUSE_ATTR(r0, &(0x7f0000000340)={0x78}, 0x78) fcntl$setstatus(r0, 0x4, 0x6800) sendmmsg$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x505, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfdffffffffffffff, 0xffffffffffffffff, 0x0) io_submit(r1, 0x8, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r0, &(0x7f0000000000), 0x200a00}]) openat$cgroup_type(r2, &(0x7f0000000080), 0x2, 0x0) r3 = syz_open_dev$loop(&(0x7f00000001c0), 0x0, 0x0) ioctl$LOOP_SET_STATUS(0xffffffffffffffff, 0x4c02, &(0x7f0000000780)={0x0, {}, 0x0, {}, 0x0, 0x0, 0x0, 0x9, "2bbb19e5631df896ba98674d0b4703551f0d03e2ed186049da15bffbdd1a3e02c2dda1e04e6fcd5ce9801d897649292487be6979a0b60bafc062c41c7373af99", "fd623e81b1486a5e6fab919c545f72d339f1538f1d1c4b68318117e2a6badf49"}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000001500)) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r3, 0xc0709411, &(0x7f0000000580)=ANY=[@ANYRES64=0x0, @ANYBLOB="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"]) write$binfmt_script(0xffffffffffffffff, 0x0, 0x0) io_setup(0x0, &(0x7f0000000040)) sendmsg$TIPC_NL_BEARER_SET(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f0000000300)={0x28, 0x0, 0x1, 0x0, 0x0, {}, [@TIPC_NLA_BEARER={0x14, 0x1, 0x0, 0x1, [@TIPC_NLA_BEARER_NAME={0xd, 0x1, @udp='udp:syz2\x00'}]}]}, 0x28}}, 0x0) sendmsg$TIPC_NL_MON_SET(r0, &(0x7f0000000240)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0xf73cb48c292f13f9}, 0xc, &(0x7f0000000200)={&(0x7f00000003c0)={0x158, 0x0, 0x300, 0x70bd2c, 0x25dfdbfb, {}, [@TIPC_NLA_NET={0x4c, 0x7, 0x0, 0x1, [@TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x4df}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x1000}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x20}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x1}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x4}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x9}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x10001}]}, @TIPC_NLA_MON={0x34, 0x9, 0x0, 0x1, [@TIPC_NLA_MON_REF={0x8, 0x2, 0x7fffffff}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x833}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x20563bcd}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x7}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x11d}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x8000}]}, @TIPC_NLA_BEARER={0xb4, 0x1, 0x0, 0x1, [@TIPC_NLA_BEARER_PROP={0xc, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x20}]}, @TIPC_NLA_BEARER_UDP_OPTS={0x38, 0x4, {{0x14, 0x1, @in={0x2, 0x4e22, @multicast1}}, {0x20, 0x2, @in6={0xa, 0x4e21, 0x2, @remote, 0x4}}}}, @TIPC_NLA_BEARER_NAME={0xd, 0x1, @udp='udp:syz2\x00'}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x7fff}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x9}, @TIPC_NLA_BEARER_PROP={0x4c, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0xfffffff8}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x7f}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x9}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x1}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x5}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x4}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x6}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x3}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x2}]}]}, @TIPC_NLA_MEDIA={0x10, 0x5, 0x0, 0x1, [@TIPC_NLA_MEDIA_PROP={0xc, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x5}]}]}]}, 0x158}, 0x1, 0x0, 0x0, 0x1}, 0x800) [ 799.652809] erofs: unmounted for /dev/loop2 [ 799.667750] erofs: read_super, device -> /dev/loop5 [ 799.673180] erofs: options -> fault_injection=0x0000000000000000, [ 799.687530] erofs: FAULT_INJECTION was not selected [ 799.693123] erofs: root inode @ nid 36 [ 799.697688] erofs: bogus i_mode (0) @ nid 36 19:41:20 executing program 3: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010020000c", 0xd, 0x400}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000080)={[{@fault_injection}]}) [ 799.719017] erofs: read_super, device -> /dev/loop1 [ 799.724068] erofs: options -> fault_injection=0x0000000000000000, [ 799.746562] erofs: blksize 1 isn't supported on this platform 19:41:20 executing program 5: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467080000000c0024", 0xf, 0x400}, {&(0x7f0000000280)="05", 0x1, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000080)={[{@fault_injection}]}) 19:41:20 executing program 1: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467", 0x8, 0x400}, {&(0x7f0000000280)="050000040041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000080)={[{@fault_injection}]}) [ 799.793915] erofs: read_super, device -> /dev/loop0 [ 799.799571] erofs: options -> [ 799.814272] erofs: blksize 1 isn't supported on this platform 19:41:21 executing program 0: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e0", 0x4, 0x400}, {0x0, 0x182, 0x1000}], 0x0, &(0x7f0000000080)) [ 799.908512] erofs: read_super, device -> /dev/loop3 [ 799.919925] erofs: options -> fault_injection=0x0000000000000000, [ 799.953049] erofs: FAULT_INJECTION was not selected [ 799.960198] erofs: read_super, device -> /dev/loop5 [ 799.972573] erofs: options -> fault_injection=0x0000000000000000, [ 800.006978] erofs: root inode @ nid 0 [ 800.022809] erofs: FAULT_INJECTION was not selected [ 800.037125] erofs: bogus i_mode (0) @ nid 0 [ 800.064251] erofs: root inode @ nid 36 19:41:21 executing program 3: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010021000c", 0xd, 0x400}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000080)={[{@fault_injection}]}) [ 800.093912] erofs: bogus i_mode (0) @ nid 36 19:41:21 executing program 0: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e0", 0x4, 0x400}, {0x0, 0x23c, 0x1000}], 0x0, &(0x7f0000000080)) [ 800.116038] erofs: read_super, device -> /dev/loop0 [ 800.121814] erofs: options -> [ 800.125416] erofs: blksize 1 isn't supported on this platform 19:41:21 executing program 5: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467100000000c0024", 0xf, 0x400}, {&(0x7f0000000280)="05", 0x1, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000080)={[{@fault_injection}]}) [ 800.227637] erofs: read_super, device -> /dev/loop1 [ 800.233370] erofs: options -> fault_injection=0x0000000000000000, [ 800.241169] erofs: blksize 1 isn't supported on this platform [ 800.247680] erofs: read_super, device -> /dev/loop3 [ 800.254121] erofs: options -> fault_injection=0x0000000000000000, [ 800.272767] erofs: read_super, device -> /dev/loop0 19:41:21 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x1dd) r0 = creat(&(0x7f0000000140)='./bus\x00', 0x0) lseek(r0, 0xffff, 0x0) io_setup(0x81, &(0x7f0000000100)=0x0) r2 = open(0x0, 0x400141042, 0x0) write$FUSE_ATTR(r0, &(0x7f0000000340)={0x78}, 0x78) fcntl$setstatus(r0, 0x4, 0x6800) sendmmsg$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x505, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfdffffffffffffff, 0xffffffffffffffff, 0x0) io_submit(r1, 0x8, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r0, &(0x7f0000000000), 0x200a00}]) openat$cgroup_type(r2, &(0x7f0000000080), 0x2, 0x0) r3 = syz_open_dev$loop(&(0x7f00000001c0), 0x0, 0x0) ioctl$LOOP_SET_STATUS(0xffffffffffffffff, 0x4c02, &(0x7f0000000780)={0x0, {}, 0x0, {}, 0x0, 0x0, 0x0, 0x9, "2bbb19e5631df896ba98674d0b4703551f0d03e2ed186049da15bffbdd1a3e02c2dda1e04e6fcd5ce9801d897649292487be6979a0b60bafc062c41c7373af99", "fd623e81b1486a5e6fab919c545f72d339f1538f1d1c4b68318117e2a6badf49"}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000001500)) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r3, 0xc0709411, &(0x7f0000000580)=ANY=[@ANYRES64=0x0, @ANYBLOB="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"]) write$binfmt_script(0xffffffffffffffff, 0x0, 0x0) io_setup(0x0, &(0x7f0000000040)) sendmsg$TIPC_NL_BEARER_SET(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f0000000300)={0x28, 0x0, 0x1, 0x0, 0x0, {}, [@TIPC_NLA_BEARER={0x14, 0x1, 0x0, 0x1, [@TIPC_NLA_BEARER_NAME={0xd, 0x1, @udp='udp:syz2\x00'}]}]}, 0x28}}, 0x0) sendmsg$TIPC_NL_MON_SET(r0, &(0x7f0000000240)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0xf73cb48c292f13f9}, 0xc, &(0x7f0000000200)={&(0x7f00000003c0)={0x158, 0x0, 0x300, 0x70bd2c, 0x25dfdbfb, {}, [@TIPC_NLA_NET={0x4c, 0x7, 0x0, 0x1, [@TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x4df}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x1000}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x20}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x1}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x4}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x9}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x10001}]}, @TIPC_NLA_MON={0x34, 0x9, 0x0, 0x1, [@TIPC_NLA_MON_REF={0x8, 0x2, 0x7fffffff}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x833}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x20563bcd}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x7}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x11d}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x8000}]}, @TIPC_NLA_BEARER={0xb4, 0x1, 0x0, 0x1, [@TIPC_NLA_BEARER_PROP={0xc, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x20}]}, @TIPC_NLA_BEARER_UDP_OPTS={0x38, 0x4, {{0x14, 0x1, @in={0x2, 0x4e22, @multicast1}}, {0x20, 0x2, @in6={0xa, 0x4e21, 0x2, @remote, 0x4}}}}, @TIPC_NLA_BEARER_NAME={0xd, 0x1, @udp='udp:syz2\x00'}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x7fff}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x9}, @TIPC_NLA_BEARER_PROP={0x4c, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0xfffffff8}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x7f}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x9}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x1}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x5}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x4}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x6}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x3}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x2}]}]}, @TIPC_NLA_MEDIA={0x10, 0x5, 0x0, 0x1, [@TIPC_NLA_MEDIA_PROP={0xc, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x5}]}]}]}, 0x158}, 0x1, 0x0, 0x0, 0x1}, 0x800) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x1dd) (async) creat(&(0x7f0000000140)='./bus\x00', 0x0) (async) lseek(r0, 0xffff, 0x0) (async) io_setup(0x81, &(0x7f0000000100)) (async) open(0x0, 0x400141042, 0x0) (async) write$FUSE_ATTR(r0, &(0x7f0000000340)={0x78}, 0x78) (async) fcntl$setstatus(r0, 0x4, 0x6800) (async) sendmmsg$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) (async) perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x505, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfdffffffffffffff, 0xffffffffffffffff, 0x0) (async) io_submit(r1, 0x8, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r0, &(0x7f0000000000), 0x200a00}]) (async) openat$cgroup_type(r2, &(0x7f0000000080), 0x2, 0x0) (async) syz_open_dev$loop(&(0x7f00000001c0), 0x0, 0x0) (async) ioctl$LOOP_SET_STATUS(0xffffffffffffffff, 0x4c02, &(0x7f0000000780)={0x0, {}, 0x0, {}, 0x0, 0x0, 0x0, 0x9, "2bbb19e5631df896ba98674d0b4703551f0d03e2ed186049da15bffbdd1a3e02c2dda1e04e6fcd5ce9801d897649292487be6979a0b60bafc062c41c7373af99", "fd623e81b1486a5e6fab919c545f72d339f1538f1d1c4b68318117e2a6badf49"}) (async) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000001500)) (async) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) (async) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r3, 0xc0709411, &(0x7f0000000580)=ANY=[@ANYRES64=0x0, @ANYBLOB="004002000000000003000000000000000000000000000000070000000000000006000000000000000600000000000000000400000400000001000080200000000500000000000000444100000000000002000000000000000700000000000000200000000000000000000000000000000000000000000000000000000000000000000000000000006f213eae2e6deae6899fd7da142f008ae6a345518071e544eb71cf5e3e575a9d060c000000000000449dba24b6d77c807aac01ca8452c305e3dae17eedf8fb6b722114d185aa09baa66095eb70a2083a9ecec6f1e251a37a7778e1369a61bf7e9f4dbb582858fbce0cc74e2c3980b0025c2ba0beb00204e53b750d8d54"]) (async) write$binfmt_script(0xffffffffffffffff, 0x0, 0x0) (async) io_setup(0x0, &(0x7f0000000040)) (async) sendmsg$TIPC_NL_BEARER_SET(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f0000000300)={0x28, 0x0, 0x1, 0x0, 0x0, {}, [@TIPC_NLA_BEARER={0x14, 0x1, 0x0, 0x1, [@TIPC_NLA_BEARER_NAME={0xd, 0x1, @udp='udp:syz2\x00'}]}]}, 0x28}}, 0x0) (async) sendmsg$TIPC_NL_MON_SET(r0, &(0x7f0000000240)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0xf73cb48c292f13f9}, 0xc, &(0x7f0000000200)={&(0x7f00000003c0)={0x158, 0x0, 0x300, 0x70bd2c, 0x25dfdbfb, {}, [@TIPC_NLA_NET={0x4c, 0x7, 0x0, 0x1, [@TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x4df}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x1000}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x20}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x1}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x4}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x9}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x10001}]}, @TIPC_NLA_MON={0x34, 0x9, 0x0, 0x1, [@TIPC_NLA_MON_REF={0x8, 0x2, 0x7fffffff}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x833}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x20563bcd}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x7}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x11d}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x8000}]}, @TIPC_NLA_BEARER={0xb4, 0x1, 0x0, 0x1, [@TIPC_NLA_BEARER_PROP={0xc, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x20}]}, @TIPC_NLA_BEARER_UDP_OPTS={0x38, 0x4, {{0x14, 0x1, @in={0x2, 0x4e22, @multicast1}}, {0x20, 0x2, @in6={0xa, 0x4e21, 0x2, @remote, 0x4}}}}, @TIPC_NLA_BEARER_NAME={0xd, 0x1, @udp='udp:syz2\x00'}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x7fff}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x9}, @TIPC_NLA_BEARER_PROP={0x4c, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0xfffffff8}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x7f}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x9}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x1}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x5}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x4}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x6}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x3}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x2}]}]}, @TIPC_NLA_MEDIA={0x10, 0x5, 0x0, 0x1, [@TIPC_NLA_MEDIA_PROP={0xc, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x5}]}]}]}, 0x158}, 0x1, 0x0, 0x0, 0x1}, 0x800) (async) [ 800.275234] erofs: read_super, device -> /dev/loop2 [ 800.277807] erofs: options -> [ 800.279667] erofs: blksize 1 isn't supported on this platform [ 800.292852] erofs: options -> fault_injection=0x0000000000000000, [ 800.296934] erofs: FAULT_INJECTION was not selected [ 800.306551] erofs: cannot find valid erofs superblock [ 800.319395] erofs: root inode @ nid 0 [ 800.327002] erofs: bogus i_mode (0) @ nid 0 [ 800.453825] erofs: read_super, device -> /dev/loop5 19:41:21 executing program 0: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e0", 0x4, 0x400}, {0x0, 0x300, 0x1000}], 0x0, &(0x7f0000000080)) 19:41:21 executing program 1: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b0046701000000", 0xc, 0x400}, {&(0x7f0000000280)="050000040041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000080)={[{@fault_injection}]}) [ 800.502628] erofs: options -> fault_injection=0x0000000000000000, [ 800.541672] erofs: FAULT_INJECTION was not selected [ 800.564906] erofs: root inode @ nid 36 [ 800.585874] erofs: bogus i_mode (0) @ nid 36 [ 800.610051] erofs: read_super, device -> /dev/loop1 [ 800.627169] erofs: options -> fault_injection=0x0000000000000000, [ 800.640603] erofs: read_super, device -> /dev/loop0 [ 800.649441] erofs: blksize 1 isn't supported on this platform 19:41:21 executing program 2: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c0024", 0xf, 0x400}, {&(0x7f0000000280)="05000000c041", 0x6, 0x47d}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000080)={[{@fault_injection}]}) 19:41:21 executing program 3: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010023000c", 0xd, 0x400}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000080)={[{@fault_injection}]}) 19:41:21 executing program 5: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467140000000c0024", 0xf, 0x400}, {&(0x7f0000000280)="05", 0x1, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000080)={[{@fault_injection}]}) [ 800.670031] erofs: options -> [ 800.673666] erofs: blksize 1 isn't supported on this platform 19:41:21 executing program 1: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b0046701000000", 0xc, 0x400}, {&(0x7f0000000280)="050000040041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000080)={[{@fault_injection}]}) 19:41:21 executing program 0: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e0", 0x4, 0x400}, {0x0, 0x500, 0x1000}], 0x0, &(0x7f0000000080)) [ 800.770168] erofs: read_super, device -> /dev/loop3 [ 800.775220] erofs: options -> fault_injection=0x0000000000000000, [ 800.775224] erofs: read_super, device -> /dev/loop2 [ 800.775235] erofs: options -> fault_injection=0x0000000000000000, [ 800.787071] erofs: read_super, device -> /dev/loop5 [ 800.806360] erofs: FAULT_INJECTION was not selected [ 800.814366] erofs: root inode @ nid 0 19:41:21 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x1dd) r0 = creat(&(0x7f0000000140)='./bus\x00', 0x0) lseek(r0, 0xffff, 0x0) io_setup(0x81, &(0x7f0000000100)=0x0) r2 = open(0x0, 0x400141042, 0x0) write$FUSE_ATTR(r0, &(0x7f0000000340)={0x78}, 0x78) (async) fcntl$setstatus(r0, 0x4, 0x6800) (async) sendmmsg$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) (async) perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x505, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfdffffffffffffff, 0xffffffffffffffff, 0x0) (async, rerun: 32) io_submit(r1, 0x8, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r0, &(0x7f0000000000), 0x200a00}]) (async, rerun: 32) openat$cgroup_type(r2, &(0x7f0000000080), 0x2, 0x0) (async) r3 = syz_open_dev$loop(&(0x7f00000001c0), 0x0, 0x0) (async) ioctl$LOOP_SET_STATUS(0xffffffffffffffff, 0x4c02, &(0x7f0000000780)={0x0, {}, 0x0, {}, 0x0, 0x0, 0x0, 0x9, "2bbb19e5631df896ba98674d0b4703551f0d03e2ed186049da15bffbdd1a3e02c2dda1e04e6fcd5ce9801d897649292487be6979a0b60bafc062c41c7373af99", "fd623e81b1486a5e6fab919c545f72d339f1538f1d1c4b68318117e2a6badf49"}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000001500)) (async) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) (async) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r3, 0xc0709411, &(0x7f0000000580)=ANY=[@ANYRES64=0x0, @ANYBLOB="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"]) (async) write$binfmt_script(0xffffffffffffffff, 0x0, 0x0) io_setup(0x0, &(0x7f0000000040)) (async) sendmsg$TIPC_NL_BEARER_SET(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f0000000300)={0x28, 0x0, 0x1, 0x0, 0x0, {}, [@TIPC_NLA_BEARER={0x14, 0x1, 0x0, 0x1, [@TIPC_NLA_BEARER_NAME={0xd, 0x1, @udp='udp:syz2\x00'}]}]}, 0x28}}, 0x0) sendmsg$TIPC_NL_MON_SET(r0, &(0x7f0000000240)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0xf73cb48c292f13f9}, 0xc, &(0x7f0000000200)={&(0x7f00000003c0)={0x158, 0x0, 0x300, 0x70bd2c, 0x25dfdbfb, {}, [@TIPC_NLA_NET={0x4c, 0x7, 0x0, 0x1, [@TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x4df}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x1000}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x20}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x1}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x4}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x9}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x10001}]}, @TIPC_NLA_MON={0x34, 0x9, 0x0, 0x1, [@TIPC_NLA_MON_REF={0x8, 0x2, 0x7fffffff}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x833}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x20563bcd}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x7}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x11d}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x8000}]}, @TIPC_NLA_BEARER={0xb4, 0x1, 0x0, 0x1, [@TIPC_NLA_BEARER_PROP={0xc, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x20}]}, @TIPC_NLA_BEARER_UDP_OPTS={0x38, 0x4, {{0x14, 0x1, @in={0x2, 0x4e22, @multicast1}}, {0x20, 0x2, @in6={0xa, 0x4e21, 0x2, @remote, 0x4}}}}, @TIPC_NLA_BEARER_NAME={0xd, 0x1, @udp='udp:syz2\x00'}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x7fff}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x9}, @TIPC_NLA_BEARER_PROP={0x4c, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0xfffffff8}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x7f}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x9}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x1}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x5}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x4}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x6}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x3}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x2}]}]}, @TIPC_NLA_MEDIA={0x10, 0x5, 0x0, 0x1, [@TIPC_NLA_MEDIA_PROP={0xc, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x5}]}]}]}, 0x158}, 0x1, 0x0, 0x0, 0x1}, 0x800) [ 800.814775] erofs: options -> fault_injection=0x0000000000000000, [ 800.818796] erofs: bogus i_mode (0) @ nid 0 [ 800.830452] erofs: FAULT_INJECTION was not selected [ 800.831827] erofs: FAULT_INJECTION was not selected [ 800.841074] erofs: root inode @ nid 36 [ 800.844108] erofs: root inode @ nid 36 [ 800.851705] erofs: unsupported i_format 49152 of nid 36 19:41:21 executing program 3: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467019126000c", 0xd, 0x400}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000080)={[{@fault_injection}]}) [ 800.877527] erofs: read_super, device -> /dev/loop1 [ 800.892763] erofs: options -> fault_injection=0x0000000000000000, [ 800.905860] erofs: blksize 1 isn't supported on this platform [ 800.913349] erofs: bogus i_mode (0) @ nid 36 [ 800.922339] erofs: read_super, device -> /dev/loop0 19:41:22 executing program 1: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b0046701000000", 0xc, 0x400}, {&(0x7f0000000280)="050000040041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000080)={[{@fault_injection}]}) [ 800.932410] erofs: options -> [ 800.940950] erofs: blksize 1 isn't supported on this platform 19:41:22 executing program 4: r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000100)={'vxcan1\x00', 0x0}) r2 = perf_event_open(&(0x7f0000000040)={0x7, 0x80, 0xf5, 0x40, 0x0, 0x0, 0x0, 0x9, 0x51204, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x3, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x2, @perf_bp={&(0x7f0000000000), 0xc}, 0x0, 0x6, 0x80, 0x4, 0x4, 0x2, 0x98, 0x0, 0x5a5e}, 0x0, 0xc, 0xffffffffffffffff, 0x8) r3 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/udp\x00') preadv(r3, &(0x7f0000000840)=[{0x0}, {&(0x7f00000002c0)=""/101, 0x65}, {&(0x7f0000001140)=""/149, 0x44}, {&(0x7f0000001080)=""/165, 0xa5}, {&(0x7f00000004c0)=""/183, 0xb7}, {&(0x7f00000008c0)=""/95, 0x5f}, {&(0x7f0000000780)=""/133, 0x85}], 0x7, 0x10, 0x3) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f0000001200)=ANY=[@ANYBLOB="d900000001000000180000008b607704c915e0722091927c3b214608872a657a536a5b21c65d2b4df6c61ae595fc1e27ec50613d469b678aa1a413af9bc485ec2b66a9ec37e26cb8c1853b4a9289262e22a8fd3a5aef3ce8d2bee376162bc8d40910baf130c9c53010697b11b2c6a023408a1773cf4651c50da5307da2e03cb83c85a29e3996f884f3aed6b897e85c404e2c726484189b61dfc8320f9732484bf3312a021cd52fc0766f501221da2953d9ed438d0c78f9b923afbb37fbf1147906e87b1e945fec329cfdcb2ea0bc1cd7db885d471f7f18bbda8c89d3b1d6458d4a63a4f294723d29427d01be2b5f5c02e5d89b7d0203a0", @ANYRES32=0xffffffffffffffff, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file0\x00']) r5 = perf_event_open(&(0x7f0000000640)={0x0, 0x80, 0x20, 0x6f, 0x40, 0x1, 0x0, 0x10001, 0x28082, 0x4, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x9, 0x2, @perf_config_ext={0x2, 0xf1}, 0x0, 0x5, 0xc91, 0x0, 0x5, 0xffffffff, 0xffff, 0x0, 0xe5b8, 0x0, 0xd3}, 0x0, 0x8, 0xffffffffffffffff, 0x9) r6 = socket$inet(0x2, 0x3, 0x2) setsockopt$IP_VS_SO_SET_STARTDAEMON(r6, 0x0, 0x48b, &(0x7f0000000200)={0x1, 'macvlan1\x00', 0x3}, 0x18) setsockopt$IP_VS_SO_SET_STOPDAEMON(r6, 0x0, 0x48c, &(0x7f0000000580)={0x2, 'sit0\x00', 0x2}, 0x18) ioctl$BTRFS_IOC_GET_FEATURES(r4, 0x80189439, &(0x7f0000000d40)) r7 = dup3(r5, 0xffffffffffffffff, 0x0) sendto$inet(r7, &(0x7f00000000c0)="fb08131f6c2e9f24d4f78de1815042e8a88d8a90d5b1e6c679076d1de385743331b3486180a82bab9b649ac85b903adf9a35cc1af27c520a42447c116033", 0x3e, 0x0, 0x0, 0x0) setsockopt$inet_int(r6, 0x0, 0xd, &(0x7f0000000d00)=0x10001, 0x50) r8 = openat$dlm_control(0xffffffffffffff9c, &(0x7f00000006c0), 0x200, 0x0) io_submit(0x0, 0x7, &(0x7f00000003c0)=[&(0x7f0000000240)={0x0, 0x0, 0x0, 0x2, 0x3, r0, &(0x7f0000000180)="ddf755a563b92e0e2a6385b39d11718f2810347e744cc8d2657c7beda166c77b679a1ace6c5586faafa4e46397d66584429690a076211ee8193abb85c7a2d3d1cc25fe292c8ba0d5995cdb9453d580d30be240a356b595f36a6528ee865b478cb631a94cb2975da7b5160a3b3355044214a099d2954c787f57d4789a4895b46e72ee7d1a8c4888f2942890438c26c67cc892f00e6557", 0x96, 0x40, 0x0, 0x1, r3}, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x3, 0x2, r4, &(0x7f00000002c0)="d763722cdfbf2b716b5d2ce0175157cd43d5608f21fda967b043facac2d4774ae220c93401a263063bd41f3c26ffe4fb4b", 0x31, 0x80000000, 0x0, 0x2}, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x8, 0x3f, r0, &(0x7f0000000a00)="39c4c090bc6d01face19e23fcd1cd0079d243479a6ebe0919561267366f94054ed85f898739bdb6c93d06824cba386d3d515836481bc618702200650a67469504c2361673577cd0acef28d769b85a78448a2d1e2f4a915874d70a2d78b175ba6d2cff08ead037f69811b3e2f05b74721df7c64e16da008f43e2d878ccd412c3f73985c843c4d04b1c227c2fa74e5e797e267693d33b48f5b7455bc3ccc463676a72b44b064be98fdf4e1a86f99fd6610ae49e99b7da0a42816bef5e1395a1ff9b95adfc9b004d80c753a59b4442a5a", 0xcf, 0x32, 0x0, 0x0, r8}, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0xf5c3, r2, &(0x7f0000000480)="3eb44f5393fa0c348f36a1d1183e27257d60c97cc19ea5c984f8c0b5a7f266ba4b42b62cdf88fa5a0ea1fae6cc6e44983d1836a5c8196c60e4faf10a650b6008bee69ccb5fd88ae982e6eccfc028dca80a0705684e7e8c0ae0b297bd0e7933b8642ac8519b33ad464b617d95b19e74e35a0f1ef50dcf466378458287233f1c", 0x7f, 0x3, 0x0, 0x3, r7}, &(0x7f00000005c0)={0x0, 0x0, 0x0, 0x8, 0x0, r2, &(0x7f0000000540)="96dade146d660d9470d00baa3a7c6015dd5c185f83a31b771608790695b98bcd264456a7ed337bd453db30ba8c6aadcf3ed51169a26dc179e56b6081fee3a5d9cf41af17d63155b4868ec260359f5048d1337940980f0f656dab2c55299de548d082e75f19e00670fd", 0x69, 0x119, 0x0, 0x3}, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x8, 0x5, 0xffffffffffffffff, &(0x7f0000000b00)="a4a7635f9b9da43fa1d3aa8920f54ad17d269b0f6df66ebd3e2e27f0f93dd25dbc3b87e19830564fc921a75e4bdf05a3cbf3f75215e060e686f7ad3f3f0356b2c74e3ac15499d70a4e0168312b291934e7eeed8f4d7ec3ab9ff014e78bb1b10977162dce4ed6f58b0bcb574b0c8007a0145ae7b5511c439202fe1540afcfdd6e2aab5c28adcdc5c4e3314316a2f3f1fceda8fde9da17ba04483d40dc9bd3830bbb5253a5122f38b07add0aa05c202a72d4a16a288456ce26fb45f0ec1e3a95a94c525ac59fbe1490517dc79450078d0d8b02dc92fad12f4d06", 0xd9, 0x101, 0x0, 0x2, r3}, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x8, 0x7, 0xffffffffffffffff, &(0x7f0000000c00)="b4349eedb2ea511b371d7a33e24f853db58d86c7fc44d13d348384b9f58159a3e3e62c6bf7af8d3c7374d17ab2d6fd85676c007bb0c6250e610f412e72408faa3b500407db7dd410bb0ca99b8fbf62c5776295ae2c6cc3d64f4b5627ca8eec2525d59f6fb63c7ad39b8588daee1803c151f01ebf155cdc77efb902716a288f1f0ec43902a4f7f6d65c06c4bea7a7d46568b7165db966f51a6f34db1c20d13a1b5c8b8011d9c92ddf66ac3b885da8ef6767e68b851e7de0835dcddf493289e494068d4eb71165d5b974bddd956371c2ff7c4cc4d40fc9abf2de10a8254a2adecb1646097466dd26ad0bcefc3a2b6c50f135c275a4a2d6", 0xf6, 0x100000001}]) syz_mount_image$befs(&(0x7f0000000140), &(0x7f0000000d80)='./file0\x00', 0x44e5, 0x2, &(0x7f0000000fc0)=[{&(0x7f0000000dc0)="04ae51bc7adfe60e586f8254da40a037f62750154eb6c218ad7173f719d329b47f49f9a759ad80b9d3f902bb89eb5143e043bc11039deebf11626ad4830dc130364d0c21d699d6a36de76aa12d01dcbe14597c5c98f68ffdf2e1e8c122a1322a6f06a9fa6a845c25b6346840265dc2ec1e1bceffa49a4448e87ed587948872da5c4e55c47d1d06ee09c49f6e4ec61c97fb4f9a1d40b770958c1751a6b96ae0e7759733cd953b7fd95094bf4ab30868e3f30302204e78cb4b3612b6cf60da20491182c30a96fc2eb07e10d04a09fbfac79cccf019", 0xd4}, {&(0x7f0000000ec0)="0069fae3b32f788d3df3ef4251a2c414001ca99c1ae4f8c40ebeb6255972a7c7610a2b6ae7cf5eee13b00406e582643e87b7ba0ac16149ee9045c0df8c5be2d648a2396a3f6b5572febdf823a58e355d07d0d5e837ec7db11d2040c627c917a9ef0659b3d9bc7c6d23bfc711e3f2fba555c017754ce35c892db37dad41080c9dc429dee94bcf7c43c57808989714334ba629b5dcd7cdb6d1a0760c47ec9241943b9b0c81f98a8a64ecb3e4014c31f002df6a36739f2bc1961febe2ce6227e7f82c46e9e9e1dd92a3f243c0f1942e69a633d6e64bea86ce5bacb443c4dc4a8679bbf09ef8570147ad2ac95c47ffcc58a730caab4650e4d17b67ecbf", 0xfb, 0x5}], 0x888050, &(0x7f0000001000)=ANY=[@ANYBLOB='net/udp\x00,@*#.,fscontexT=staff_se_type=imasig,\x00\x00\x00\x00\x00\x00\x00\x00\x00']) perf_event_open(&(0x7f0000000980)={0x4, 0x80, 0x2, 0x24, 0x7, 0x6, 0x0, 0x6, 0x80, 0xc, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x2, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x3, 0x1, @perf_config_ext={0x6, 0x40}, 0x200, 0x17e, 0x9, 0x0, 0x7, 0x1, 0x1, 0x0, 0x0, 0x0, 0xfffffffffffff800}, 0x0, 0x9, r7, 0x2) bind$packet(r0, &(0x7f00000000c0)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @local}, 0x14) sendmmsg(r0, &(0x7f0000000d00), 0x1bdd307, 0x0) 19:41:22 executing program 0: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e0", 0x4, 0x400}, {0x0, 0x600, 0x1000}], 0x0, &(0x7f0000000080)) 19:41:22 executing program 2: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c0024", 0xf, 0x400}, {&(0x7f0000000280)="05000000c041", 0x6, 0x47e}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000080)={[{@fault_injection}]}) [ 801.094930] erofs: read_super, device -> /dev/loop3 [ 801.108010] erofs: read_super, device -> /dev/loop1 [ 801.116535] erofs: options -> fault_injection=0x0000000000000000, [ 801.120079] erofs: options -> fault_injection=0x0000000000000000, [ 801.126656] IPVS: sync thread started: state = MASTER, mcast_ifn = macvlan1, syncid = 3, id = 0 19:41:22 executing program 5: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467250000000c0024", 0xf, 0x400}, {&(0x7f0000000280)="05", 0x1, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000080)={[{@fault_injection}]}) 19:41:22 executing program 4: r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000100)={'vxcan1\x00', 0x0}) (async) r2 = perf_event_open(&(0x7f0000000040)={0x7, 0x80, 0xf5, 0x40, 0x0, 0x0, 0x0, 0x9, 0x51204, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x3, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x2, @perf_bp={&(0x7f0000000000), 0xc}, 0x0, 0x6, 0x80, 0x4, 0x4, 0x2, 0x98, 0x0, 0x5a5e}, 0x0, 0xc, 0xffffffffffffffff, 0x8) (async) r3 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/udp\x00') preadv(r3, &(0x7f0000000840)=[{0x0}, {&(0x7f00000002c0)=""/101, 0x65}, {&(0x7f0000001140)=""/149, 0x44}, {&(0x7f0000001080)=""/165, 0xa5}, {&(0x7f00000004c0)=""/183, 0xb7}, {&(0x7f00000008c0)=""/95, 0x5f}, {&(0x7f0000000780)=""/133, 0x85}], 0x7, 0x10, 0x3) (async, rerun: 32) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f0000001200)=ANY=[@ANYBLOB="d900000001000000180000008b607704c915e0722091927c3b214608872a657a536a5b21c65d2b4df6c61ae595fc1e27ec50613d469b678aa1a413af9bc485ec2b66a9ec37e26cb8c1853b4a9289262e22a8fd3a5aef3ce8d2bee376162bc8d40910baf130c9c53010697b11b2c6a023408a1773cf4651c50da5307da2e03cb83c85a29e3996f884f3aed6b897e85c404e2c726484189b61dfc8320f9732484bf3312a021cd52fc0766f501221da2953d9ed438d0c78f9b923afbb37fbf1147906e87b1e945fec329cfdcb2ea0bc1cd7db885d471f7f18bbda8c89d3b1d6458d4a63a4f294723d29427d01be2b5f5c02e5d89b7d0203a0", @ANYRES32=0xffffffffffffffff, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file0\x00']) (async, rerun: 32) r5 = perf_event_open(&(0x7f0000000640)={0x0, 0x80, 0x20, 0x6f, 0x40, 0x1, 0x0, 0x10001, 0x28082, 0x4, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x9, 0x2, @perf_config_ext={0x2, 0xf1}, 0x0, 0x5, 0xc91, 0x0, 0x5, 0xffffffff, 0xffff, 0x0, 0xe5b8, 0x0, 0xd3}, 0x0, 0x8, 0xffffffffffffffff, 0x9) r6 = socket$inet(0x2, 0x3, 0x2) setsockopt$IP_VS_SO_SET_STARTDAEMON(r6, 0x0, 0x48b, &(0x7f0000000200)={0x1, 'macvlan1\x00', 0x3}, 0x18) (async, rerun: 64) setsockopt$IP_VS_SO_SET_STOPDAEMON(r6, 0x0, 0x48c, &(0x7f0000000580)={0x2, 'sit0\x00', 0x2}, 0x18) (rerun: 64) ioctl$BTRFS_IOC_GET_FEATURES(r4, 0x80189439, &(0x7f0000000d40)) (async) r7 = dup3(r5, 0xffffffffffffffff, 0x0) sendto$inet(r7, &(0x7f00000000c0)="fb08131f6c2e9f24d4f78de1815042e8a88d8a90d5b1e6c679076d1de385743331b3486180a82bab9b649ac85b903adf9a35cc1af27c520a42447c116033", 0x3e, 0x0, 0x0, 0x0) (async) setsockopt$inet_int(r6, 0x0, 0xd, &(0x7f0000000d00)=0x10001, 0x50) (async) r8 = openat$dlm_control(0xffffffffffffff9c, &(0x7f00000006c0), 0x200, 0x0) io_submit(0x0, 0x7, &(0x7f00000003c0)=[&(0x7f0000000240)={0x0, 0x0, 0x0, 0x2, 0x3, r0, &(0x7f0000000180)="ddf755a563b92e0e2a6385b39d11718f2810347e744cc8d2657c7beda166c77b679a1ace6c5586faafa4e46397d66584429690a076211ee8193abb85c7a2d3d1cc25fe292c8ba0d5995cdb9453d580d30be240a356b595f36a6528ee865b478cb631a94cb2975da7b5160a3b3355044214a099d2954c787f57d4789a4895b46e72ee7d1a8c4888f2942890438c26c67cc892f00e6557", 0x96, 0x40, 0x0, 0x1, r3}, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x3, 0x2, r4, &(0x7f00000002c0)="d763722cdfbf2b716b5d2ce0175157cd43d5608f21fda967b043facac2d4774ae220c93401a263063bd41f3c26ffe4fb4b", 0x31, 0x80000000, 0x0, 0x2}, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x8, 0x3f, r0, &(0x7f0000000a00)="39c4c090bc6d01face19e23fcd1cd0079d243479a6ebe0919561267366f94054ed85f898739bdb6c93d06824cba386d3d515836481bc618702200650a67469504c2361673577cd0acef28d769b85a78448a2d1e2f4a915874d70a2d78b175ba6d2cff08ead037f69811b3e2f05b74721df7c64e16da008f43e2d878ccd412c3f73985c843c4d04b1c227c2fa74e5e797e267693d33b48f5b7455bc3ccc463676a72b44b064be98fdf4e1a86f99fd6610ae49e99b7da0a42816bef5e1395a1ff9b95adfc9b004d80c753a59b4442a5a", 0xcf, 0x32, 0x0, 0x0, r8}, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0xf5c3, r2, &(0x7f0000000480)="3eb44f5393fa0c348f36a1d1183e27257d60c97cc19ea5c984f8c0b5a7f266ba4b42b62cdf88fa5a0ea1fae6cc6e44983d1836a5c8196c60e4faf10a650b6008bee69ccb5fd88ae982e6eccfc028dca80a0705684e7e8c0ae0b297bd0e7933b8642ac8519b33ad464b617d95b19e74e35a0f1ef50dcf466378458287233f1c", 0x7f, 0x3, 0x0, 0x3, r7}, &(0x7f00000005c0)={0x0, 0x0, 0x0, 0x8, 0x0, r2, &(0x7f0000000540)="96dade146d660d9470d00baa3a7c6015dd5c185f83a31b771608790695b98bcd264456a7ed337bd453db30ba8c6aadcf3ed51169a26dc179e56b6081fee3a5d9cf41af17d63155b4868ec260359f5048d1337940980f0f656dab2c55299de548d082e75f19e00670fd", 0x69, 0x119, 0x0, 0x3}, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x8, 0x5, 0xffffffffffffffff, &(0x7f0000000b00)="a4a7635f9b9da43fa1d3aa8920f54ad17d269b0f6df66ebd3e2e27f0f93dd25dbc3b87e19830564fc921a75e4bdf05a3cbf3f75215e060e686f7ad3f3f0356b2c74e3ac15499d70a4e0168312b291934e7eeed8f4d7ec3ab9ff014e78bb1b10977162dce4ed6f58b0bcb574b0c8007a0145ae7b5511c439202fe1540afcfdd6e2aab5c28adcdc5c4e3314316a2f3f1fceda8fde9da17ba04483d40dc9bd3830bbb5253a5122f38b07add0aa05c202a72d4a16a288456ce26fb45f0ec1e3a95a94c525ac59fbe1490517dc79450078d0d8b02dc92fad12f4d06", 0xd9, 0x101, 0x0, 0x2, r3}, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x8, 0x7, 0xffffffffffffffff, &(0x7f0000000c00)="b4349eedb2ea511b371d7a33e24f853db58d86c7fc44d13d348384b9f58159a3e3e62c6bf7af8d3c7374d17ab2d6fd85676c007bb0c6250e610f412e72408faa3b500407db7dd410bb0ca99b8fbf62c5776295ae2c6cc3d64f4b5627ca8eec2525d59f6fb63c7ad39b8588daee1803c151f01ebf155cdc77efb902716a288f1f0ec43902a4f7f6d65c06c4bea7a7d46568b7165db966f51a6f34db1c20d13a1b5c8b8011d9c92ddf66ac3b885da8ef6767e68b851e7de0835dcddf493289e494068d4eb71165d5b974bddd956371c2ff7c4cc4d40fc9abf2de10a8254a2adecb1646097466dd26ad0bcefc3a2b6c50f135c275a4a2d6", 0xf6, 0x100000001}]) syz_mount_image$befs(&(0x7f0000000140), &(0x7f0000000d80)='./file0\x00', 0x44e5, 0x2, &(0x7f0000000fc0)=[{&(0x7f0000000dc0)="04ae51bc7adfe60e586f8254da40a037f62750154eb6c218ad7173f719d329b47f49f9a759ad80b9d3f902bb89eb5143e043bc11039deebf11626ad4830dc130364d0c21d699d6a36de76aa12d01dcbe14597c5c98f68ffdf2e1e8c122a1322a6f06a9fa6a845c25b6346840265dc2ec1e1bceffa49a4448e87ed587948872da5c4e55c47d1d06ee09c49f6e4ec61c97fb4f9a1d40b770958c1751a6b96ae0e7759733cd953b7fd95094bf4ab30868e3f30302204e78cb4b3612b6cf60da20491182c30a96fc2eb07e10d04a09fbfac79cccf019", 0xd4}, {&(0x7f0000000ec0)="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", 0xfb, 0x5}], 0x888050, &(0x7f0000001000)=ANY=[@ANYBLOB='net/udp\x00,@*#.,fscontexT=staff_se_type=imasig,\x00\x00\x00\x00\x00\x00\x00\x00\x00']) (async) perf_event_open(&(0x7f0000000980)={0x4, 0x80, 0x2, 0x24, 0x7, 0x6, 0x0, 0x6, 0x80, 0xc, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x2, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x3, 0x1, @perf_config_ext={0x6, 0x40}, 0x200, 0x17e, 0x9, 0x0, 0x7, 0x1, 0x1, 0x0, 0x0, 0x0, 0xfffffffffffff800}, 0x0, 0x9, r7, 0x2) bind$packet(r0, &(0x7f00000000c0)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @local}, 0x14) (async) sendmmsg(r0, &(0x7f0000000d00), 0x1bdd307, 0x0) [ 801.145642] erofs: blksize 1 isn't supported on this platform [ 801.186996] erofs: FAULT_INJECTION was not selected [ 801.196476] erofs: root inode @ nid 0 [ 801.202802] erofs: bogus i_mode (0) @ nid 0 19:41:22 executing program 3: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b0046701023c000c", 0xd, 0x400}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000080)={[{@fault_injection}]}) 19:41:22 executing program 4: r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000100)={'vxcan1\x00', 0x0}) r2 = perf_event_open(&(0x7f0000000040)={0x7, 0x80, 0xf5, 0x40, 0x0, 0x0, 0x0, 0x9, 0x51204, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x3, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x2, @perf_bp={&(0x7f0000000000), 0xc}, 0x0, 0x6, 0x80, 0x4, 0x4, 0x2, 0x98, 0x0, 0x5a5e}, 0x0, 0xc, 0xffffffffffffffff, 0x8) (async) r3 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/udp\x00') preadv(r3, &(0x7f0000000840)=[{0x0}, {&(0x7f00000002c0)=""/101, 0x65}, {&(0x7f0000001140)=""/149, 0x44}, {&(0x7f0000001080)=""/165, 0xa5}, {&(0x7f00000004c0)=""/183, 0xb7}, {&(0x7f00000008c0)=""/95, 0x5f}, {&(0x7f0000000780)=""/133, 0x85}], 0x7, 0x10, 0x3) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f0000001200)=ANY=[@ANYBLOB="d900000001000000180000008b607704c915e0722091927c3b214608872a657a536a5b21c65d2b4df6c61ae595fc1e27ec50613d469b678aa1a413af9bc485ec2b66a9ec37e26cb8c1853b4a9289262e22a8fd3a5aef3ce8d2bee376162bc8d40910baf130c9c53010697b11b2c6a023408a1773cf4651c50da5307da2e03cb83c85a29e3996f884f3aed6b897e85c404e2c726484189b61dfc8320f9732484bf3312a021cd52fc0766f501221da2953d9ed438d0c78f9b923afbb37fbf1147906e87b1e945fec329cfdcb2ea0bc1cd7db885d471f7f18bbda8c89d3b1d6458d4a63a4f294723d29427d01be2b5f5c02e5d89b7d0203a0", @ANYRES32=0xffffffffffffffff, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file0\x00']) (async) r5 = perf_event_open(&(0x7f0000000640)={0x0, 0x80, 0x20, 0x6f, 0x40, 0x1, 0x0, 0x10001, 0x28082, 0x4, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x9, 0x2, @perf_config_ext={0x2, 0xf1}, 0x0, 0x5, 0xc91, 0x0, 0x5, 0xffffffff, 0xffff, 0x0, 0xe5b8, 0x0, 0xd3}, 0x0, 0x8, 0xffffffffffffffff, 0x9) (async) r6 = socket$inet(0x2, 0x3, 0x2) setsockopt$IP_VS_SO_SET_STARTDAEMON(r6, 0x0, 0x48b, &(0x7f0000000200)={0x1, 'macvlan1\x00', 0x3}, 0x18) (async) setsockopt$IP_VS_SO_SET_STOPDAEMON(r6, 0x0, 0x48c, &(0x7f0000000580)={0x2, 'sit0\x00', 0x2}, 0x18) ioctl$BTRFS_IOC_GET_FEATURES(r4, 0x80189439, &(0x7f0000000d40)) (async) r7 = dup3(r5, 0xffffffffffffffff, 0x0) sendto$inet(r7, &(0x7f00000000c0)="fb08131f6c2e9f24d4f78de1815042e8a88d8a90d5b1e6c679076d1de385743331b3486180a82bab9b649ac85b903adf9a35cc1af27c520a42447c116033", 0x3e, 0x0, 0x0, 0x0) setsockopt$inet_int(r6, 0x0, 0xd, &(0x7f0000000d00)=0x10001, 0x50) r8 = openat$dlm_control(0xffffffffffffff9c, &(0x7f00000006c0), 0x200, 0x0) io_submit(0x0, 0x7, &(0x7f00000003c0)=[&(0x7f0000000240)={0x0, 0x0, 0x0, 0x2, 0x3, r0, &(0x7f0000000180)="ddf755a563b92e0e2a6385b39d11718f2810347e744cc8d2657c7beda166c77b679a1ace6c5586faafa4e46397d66584429690a076211ee8193abb85c7a2d3d1cc25fe292c8ba0d5995cdb9453d580d30be240a356b595f36a6528ee865b478cb631a94cb2975da7b5160a3b3355044214a099d2954c787f57d4789a4895b46e72ee7d1a8c4888f2942890438c26c67cc892f00e6557", 0x96, 0x40, 0x0, 0x1, r3}, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x3, 0x2, r4, &(0x7f00000002c0)="d763722cdfbf2b716b5d2ce0175157cd43d5608f21fda967b043facac2d4774ae220c93401a263063bd41f3c26ffe4fb4b", 0x31, 0x80000000, 0x0, 0x2}, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x8, 0x3f, r0, &(0x7f0000000a00)="39c4c090bc6d01face19e23fcd1cd0079d243479a6ebe0919561267366f94054ed85f898739bdb6c93d06824cba386d3d515836481bc618702200650a67469504c2361673577cd0acef28d769b85a78448a2d1e2f4a915874d70a2d78b175ba6d2cff08ead037f69811b3e2f05b74721df7c64e16da008f43e2d878ccd412c3f73985c843c4d04b1c227c2fa74e5e797e267693d33b48f5b7455bc3ccc463676a72b44b064be98fdf4e1a86f99fd6610ae49e99b7da0a42816bef5e1395a1ff9b95adfc9b004d80c753a59b4442a5a", 0xcf, 0x32, 0x0, 0x0, r8}, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0xf5c3, r2, &(0x7f0000000480)="3eb44f5393fa0c348f36a1d1183e27257d60c97cc19ea5c984f8c0b5a7f266ba4b42b62cdf88fa5a0ea1fae6cc6e44983d1836a5c8196c60e4faf10a650b6008bee69ccb5fd88ae982e6eccfc028dca80a0705684e7e8c0ae0b297bd0e7933b8642ac8519b33ad464b617d95b19e74e35a0f1ef50dcf466378458287233f1c", 0x7f, 0x3, 0x0, 0x3, r7}, &(0x7f00000005c0)={0x0, 0x0, 0x0, 0x8, 0x0, r2, &(0x7f0000000540)="96dade146d660d9470d00baa3a7c6015dd5c185f83a31b771608790695b98bcd264456a7ed337bd453db30ba8c6aadcf3ed51169a26dc179e56b6081fee3a5d9cf41af17d63155b4868ec260359f5048d1337940980f0f656dab2c55299de548d082e75f19e00670fd", 0x69, 0x119, 0x0, 0x3}, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x8, 0x5, 0xffffffffffffffff, &(0x7f0000000b00)="a4a7635f9b9da43fa1d3aa8920f54ad17d269b0f6df66ebd3e2e27f0f93dd25dbc3b87e19830564fc921a75e4bdf05a3cbf3f75215e060e686f7ad3f3f0356b2c74e3ac15499d70a4e0168312b291934e7eeed8f4d7ec3ab9ff014e78bb1b10977162dce4ed6f58b0bcb574b0c8007a0145ae7b5511c439202fe1540afcfdd6e2aab5c28adcdc5c4e3314316a2f3f1fceda8fde9da17ba04483d40dc9bd3830bbb5253a5122f38b07add0aa05c202a72d4a16a288456ce26fb45f0ec1e3a95a94c525ac59fbe1490517dc79450078d0d8b02dc92fad12f4d06", 0xd9, 0x101, 0x0, 0x2, r3}, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x8, 0x7, 0xffffffffffffffff, &(0x7f0000000c00)="b4349eedb2ea511b371d7a33e24f853db58d86c7fc44d13d348384b9f58159a3e3e62c6bf7af8d3c7374d17ab2d6fd85676c007bb0c6250e610f412e72408faa3b500407db7dd410bb0ca99b8fbf62c5776295ae2c6cc3d64f4b5627ca8eec2525d59f6fb63c7ad39b8588daee1803c151f01ebf155cdc77efb902716a288f1f0ec43902a4f7f6d65c06c4bea7a7d46568b7165db966f51a6f34db1c20d13a1b5c8b8011d9c92ddf66ac3b885da8ef6767e68b851e7de0835dcddf493289e494068d4eb71165d5b974bddd956371c2ff7c4cc4d40fc9abf2de10a8254a2adecb1646097466dd26ad0bcefc3a2b6c50f135c275a4a2d6", 0xf6, 0x100000001}]) syz_mount_image$befs(&(0x7f0000000140), &(0x7f0000000d80)='./file0\x00', 0x44e5, 0x2, &(0x7f0000000fc0)=[{&(0x7f0000000dc0)="04ae51bc7adfe60e586f8254da40a037f62750154eb6c218ad7173f719d329b47f49f9a759ad80b9d3f902bb89eb5143e043bc11039deebf11626ad4830dc130364d0c21d699d6a36de76aa12d01dcbe14597c5c98f68ffdf2e1e8c122a1322a6f06a9fa6a845c25b6346840265dc2ec1e1bceffa49a4448e87ed587948872da5c4e55c47d1d06ee09c49f6e4ec61c97fb4f9a1d40b770958c1751a6b96ae0e7759733cd953b7fd95094bf4ab30868e3f30302204e78cb4b3612b6cf60da20491182c30a96fc2eb07e10d04a09fbfac79cccf019", 0xd4}, {&(0x7f0000000ec0)="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", 0xfb, 0x5}], 0x888050, &(0x7f0000001000)=ANY=[@ANYBLOB='net/udp\x00,@*#.,fscontexT=staff_se_type=imasig,\x00\x00\x00\x00\x00\x00\x00\x00\x00']) perf_event_open(&(0x7f0000000980)={0x4, 0x80, 0x2, 0x24, 0x7, 0x6, 0x0, 0x6, 0x80, 0xc, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x2, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x3, 0x1, @perf_config_ext={0x6, 0x40}, 0x200, 0x17e, 0x9, 0x0, 0x7, 0x1, 0x1, 0x0, 0x0, 0x0, 0xfffffffffffff800}, 0x0, 0x9, r7, 0x2) (async) bind$packet(r0, &(0x7f00000000c0)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @local}, 0x14) sendmmsg(r0, &(0x7f0000000d00), 0x1bdd307, 0x0) 19:41:22 executing program 1: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c00", 0xe, 0x400}, {&(0x7f0000000280)="050000040041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000080)={[{@fault_injection}]}) [ 801.285886] erofs: read_super, device -> /dev/loop0 [ 801.285983] erofs: read_super, device -> /dev/loop2 [ 801.298254] erofs: read_super, device -> /dev/loop5 [ 801.306649] erofs: options -> [ 801.311071] erofs: options -> fault_injection=0x0000000000000000, [ 801.322141] erofs: blksize 1 isn't supported on this platform [ 801.337464] erofs: FAULT_INJECTION was not selected [ 801.344165] erofs: options -> fault_injection=0x0000000000000000, [ 801.353267] erofs: root inode @ nid 36 [ 801.366603] erofs: FAULT_INJECTION was not selected [ 801.366762] erofs: bogus i_mode (0) @ nid 36 19:41:22 executing program 0: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e0", 0x4, 0x400}, {0x0, 0x700, 0x1000}], 0x0, &(0x7f0000000080)) [ 801.385376] erofs: root inode @ nid 36 [ 801.398663] erofs: read_super, device -> /dev/loop3 [ 801.417987] erofs: options -> fault_injection=0x0000000000000000, [ 801.418753] erofs: bogus i_mode (0) @ nid 36 [ 801.426484] erofs: FAULT_INJECTION was not selected 19:41:22 executing program 5: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b004672a0000000c0024", 0xf, 0x400}, {&(0x7f0000000280)="05", 0x1, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000080)={[{@fault_injection}]}) [ 801.434821] erofs: root inode @ nid 0 [ 801.439559] erofs: bogus i_mode (0) @ nid 0 [ 801.452040] erofs: read_super, device -> /dev/loop1 [ 801.457085] erofs: options -> fault_injection=0x0000000000000000, [ 801.485990] erofs: FAULT_INJECTION was not selected [ 801.491994] erofs: root inode @ nid 0 [ 801.496070] erofs: bogus i_mode (0) @ nid 0 19:41:22 executing program 4: perf_event_open(&(0x7f0000000880)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x49c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x68, &(0x7f0000000140)={@local, @dev, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x5a, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @local}, {{0x0, 0x4e23, 0x41424344, 0x41424344, 0x0, 0x6, 0x6, 0x80, 0x0, 0x0, 0x0, {[@mptcp=@mp_join={0x1e, 0x3}]}}, {"40f188755bf7a30907d6247b6027dd322060ce577543c84b618a55b1fbd87a32d885f6114fc45c0215d856e49759"}}}}}}, 0x0) perf_event_open(&(0x7f0000000040)={0x5, 0x80, 0x0, 0x22, 0xf1, 0x0, 0x0, 0x81, 0x4, 0x4, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x4}, 0x0, 0xb1, 0x7, 0x8, 0x9581, 0x4, 0x7, 0x0, 0x1, 0x0, 0x1f}, 0x0, 0x4, 0xffffffffffffffff, 0x8) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$BTRFS_IOC_INO_LOOKUP_USER(0xffffffffffffffff, 0xd000943e, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xb) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000200)={0x0, 0x80, 0x3, 0x4a, 0x11, 0x1, 0x0, 0x28, 0x10000, 0x4, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x2, 0x1, @perf_config_ext={0x5b7b88e7, 0x1}, 0x2000, 0x0, 0x20, 0x5, 0x7f, 0x1000, 0x0, 0x0, 0x3, 0x0, 0x2}, 0xffffffffffffffff, 0x0, r1, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0xb) syz_emit_ethernet(0xd8, &(0x7f0000000280)={@broadcast, @broadcast, @void, {@llc_tr={0x11, {@snap={0x1, 0xaa, "ef83", "009fe2", 0x2f8, "f534586acf94081cfbef95a3d541b87292146d673af6532a60fa29c11fca70109d7f691ffbe7c6376e92f7daac87b0cf2a5e87dd6ab7157b0734664294a41ae2552d3941635719d9c0b701b853f0b9e2c82fd43392215ef6cc2f801311859017c813b85b880c7eebcf6437475a521f8b14515c0f8635bde727a06f4cc668f2b8f2ab1296d16e8d7e0a3839229b42e8ccce0156f96ee45887b0f1a8141efeafa69d996cc6947ee83bcd53af84fd0d49526da25f07018c41c55e1c8d1c3a2315e1d9"}}}}}, &(0x7f00000000c0)={0x0, 0x3, [0xaa7, 0xf80, 0xfe1, 0x7dd]}) syz_emit_ethernet(0x156, 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) 19:41:22 executing program 2: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c0024", 0xf, 0x400}, {&(0x7f0000000280)="05000000c041", 0x6, 0x480}, {0x0, 0x2, 0x1000}], 0x0, &(0x7f0000000080)={[{@fault_injection}]}) 19:41:22 executing program 3: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b0046701003f000c", 0xd, 0x400}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000080)={[{@fault_injection}]}) 19:41:22 executing program 1: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c00", 0xe, 0x400}, {&(0x7f0000000280)="050000040041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000080)={[{@fault_injection}]}) [ 801.583503] erofs: read_super, device -> /dev/loop0 [ 801.598406] erofs: options -> [ 801.609223] erofs: blksize 1 isn't supported on this platform 19:41:22 executing program 0: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e0", 0x4, 0x400}, {0x0, 0x900, 0x1000}], 0x0, &(0x7f0000000080)) [ 801.688628] erofs: read_super, device -> /dev/loop2 [ 801.693985] erofs: options -> fault_injection=0x0000000000000000, [ 801.702513] erofs: FAULT_INJECTION was not selected [ 801.705069] erofs: read_super, device -> /dev/loop5 [ 801.713568] erofs: root inode @ nid 36 [ 801.723451] erofs: mounted on /dev/loop2 with opts: fault_injection=0x0000000000000000. [ 801.740726] erofs: options -> fault_injection=0x0000000000000000, [ 801.754943] erofs: FAULT_INJECTION was not selected [ 801.764223] erofs: root inode @ nid 36 [ 801.768420] erofs: read_super, device -> /dev/loop3 [ 801.768429] erofs: options -> fault_injection=0x0000000000000000, [ 801.769192] erofs: FAULT_INJECTION was not selected [ 801.781557] erofs: bogus i_mode (0) @ nid 36 19:41:22 executing program 4: perf_event_open(&(0x7f0000000880)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x49c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) syz_emit_ethernet(0x68, &(0x7f0000000140)={@local, @dev, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x5a, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @local}, {{0x0, 0x4e23, 0x41424344, 0x41424344, 0x0, 0x6, 0x6, 0x80, 0x0, 0x0, 0x0, {[@mptcp=@mp_join={0x1e, 0x3}]}}, {"40f188755bf7a30907d6247b6027dd322060ce577543c84b618a55b1fbd87a32d885f6114fc45c0215d856e49759"}}}}}}, 0x0) (async) perf_event_open(&(0x7f0000000040)={0x5, 0x80, 0x0, 0x22, 0xf1, 0x0, 0x0, 0x81, 0x4, 0x4, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x4}, 0x0, 0xb1, 0x7, 0x8, 0x9581, 0x4, 0x7, 0x0, 0x1, 0x0, 0x1f}, 0x0, 0x4, 0xffffffffffffffff, 0x8) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$BTRFS_IOC_INO_LOOKUP_USER(0xffffffffffffffff, 0xd000943e, 0x0) (async) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xb) (async) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, 0x0, 0x0, 0x0) (async) perf_event_open(&(0x7f0000000200)={0x0, 0x80, 0x3, 0x4a, 0x11, 0x1, 0x0, 0x28, 0x10000, 0x4, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x2, 0x1, @perf_config_ext={0x5b7b88e7, 0x1}, 0x2000, 0x0, 0x20, 0x5, 0x7f, 0x1000, 0x0, 0x0, 0x3, 0x0, 0x2}, 0xffffffffffffffff, 0x0, r1, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0xb) (async) syz_emit_ethernet(0xd8, &(0x7f0000000280)={@broadcast, @broadcast, @void, {@llc_tr={0x11, {@snap={0x1, 0xaa, "ef83", "009fe2", 0x2f8, "f534586acf94081cfbef95a3d541b87292146d673af6532a60fa29c11fca70109d7f691ffbe7c6376e92f7daac87b0cf2a5e87dd6ab7157b0734664294a41ae2552d3941635719d9c0b701b853f0b9e2c82fd43392215ef6cc2f801311859017c813b85b880c7eebcf6437475a521f8b14515c0f8635bde727a06f4cc668f2b8f2ab1296d16e8d7e0a3839229b42e8ccce0156f96ee45887b0f1a8141efeafa69d996cc6947ee83bcd53af84fd0d49526da25f07018c41c55e1c8d1c3a2315e1d9"}}}}}, &(0x7f00000000c0)={0x0, 0x3, [0xaa7, 0xf80, 0xfe1, 0x7dd]}) (async) syz_emit_ethernet(0x156, 0x0, 0x0) (async) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) 19:41:22 executing program 2: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c0024", 0xf, 0x400}, {&(0x7f0000000280)="05000000c041", 0x6, 0x480}, {0x0, 0x3, 0x1000}], 0x0, &(0x7f0000000080)={[{@fault_injection}]}) [ 801.785440] erofs: root inode @ nid 0 [ 801.794026] erofs: bogus i_mode (0) @ nid 0 [ 801.832966] erofs: unmounted for /dev/loop2 [ 801.850359] erofs: read_super, device -> /dev/loop1 [ 801.857920] erofs: read_super, device -> /dev/loop0 [ 801.872790] erofs: options -> 19:41:22 executing program 5: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467370000000c0024", 0xf, 0x400}, {&(0x7f0000000280)="05", 0x1, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000080)={[{@fault_injection}]}) 19:41:23 executing program 4: perf_event_open(&(0x7f0000000880)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x49c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x68, &(0x7f0000000140)={@local, @dev, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x5a, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @local}, {{0x0, 0x4e23, 0x41424344, 0x41424344, 0x0, 0x6, 0x6, 0x80, 0x0, 0x0, 0x0, {[@mptcp=@mp_join={0x1e, 0x3}]}}, {"40f188755bf7a30907d6247b6027dd322060ce577543c84b618a55b1fbd87a32d885f6114fc45c0215d856e49759"}}}}}}, 0x0) perf_event_open(&(0x7f0000000040)={0x5, 0x80, 0x0, 0x22, 0xf1, 0x0, 0x0, 0x81, 0x4, 0x4, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x4}, 0x0, 0xb1, 0x7, 0x8, 0x9581, 0x4, 0x7, 0x0, 0x1, 0x0, 0x1f}, 0x0, 0x4, 0xffffffffffffffff, 0x8) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$BTRFS_IOC_INO_LOOKUP_USER(0xffffffffffffffff, 0xd000943e, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xb) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000200)={0x0, 0x80, 0x3, 0x4a, 0x11, 0x1, 0x0, 0x28, 0x10000, 0x4, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x2, 0x1, @perf_config_ext={0x5b7b88e7, 0x1}, 0x2000, 0x0, 0x20, 0x5, 0x7f, 0x1000, 0x0, 0x0, 0x3, 0x0, 0x2}, 0xffffffffffffffff, 0x0, r1, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0xb) syz_emit_ethernet(0xd8, &(0x7f0000000280)={@broadcast, @broadcast, @void, {@llc_tr={0x11, {@snap={0x1, 0xaa, "ef83", "009fe2", 0x2f8, "f534586acf94081cfbef95a3d541b87292146d673af6532a60fa29c11fca70109d7f691ffbe7c6376e92f7daac87b0cf2a5e87dd6ab7157b0734664294a41ae2552d3941635719d9c0b701b853f0b9e2c82fd43392215ef6cc2f801311859017c813b85b880c7eebcf6437475a521f8b14515c0f8635bde727a06f4cc668f2b8f2ab1296d16e8d7e0a3839229b42e8ccce0156f96ee45887b0f1a8141efeafa69d996cc6947ee83bcd53af84fd0d49526da25f07018c41c55e1c8d1c3a2315e1d9"}}}}}, &(0x7f00000000c0)={0x0, 0x3, [0xaa7, 0xf80, 0xfe1, 0x7dd]}) syz_emit_ethernet(0x156, 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) perf_event_open(&(0x7f0000000880)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x49c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) syz_emit_ethernet(0x68, &(0x7f0000000140)={@local, @dev, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x5a, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @local}, {{0x0, 0x4e23, 0x41424344, 0x41424344, 0x0, 0x6, 0x6, 0x80, 0x0, 0x0, 0x0, {[@mptcp=@mp_join={0x1e, 0x3}]}}, {"40f188755bf7a30907d6247b6027dd322060ce577543c84b618a55b1fbd87a32d885f6114fc45c0215d856e49759"}}}}}}, 0x0) (async) perf_event_open(&(0x7f0000000040)={0x5, 0x80, 0x0, 0x22, 0xf1, 0x0, 0x0, 0x81, 0x4, 0x4, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x4}, 0x0, 0xb1, 0x7, 0x8, 0x9581, 0x4, 0x7, 0x0, 0x1, 0x0, 0x1f}, 0x0, 0x4, 0xffffffffffffffff, 0x8) (async) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) (async) ioctl$BTRFS_IOC_INO_LOOKUP_USER(0xffffffffffffffff, 0xd000943e, 0x0) (async) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xb) (async) pipe(&(0x7f0000000000)) (async) vmsplice(r1, 0x0, 0x0, 0x0) (async) perf_event_open(&(0x7f0000000200)={0x0, 0x80, 0x3, 0x4a, 0x11, 0x1, 0x0, 0x28, 0x10000, 0x4, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x2, 0x1, @perf_config_ext={0x5b7b88e7, 0x1}, 0x2000, 0x0, 0x20, 0x5, 0x7f, 0x1000, 0x0, 0x0, 0x3, 0x0, 0x2}, 0xffffffffffffffff, 0x0, r1, 0x0) (async) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0xb) (async) syz_emit_ethernet(0xd8, &(0x7f0000000280)={@broadcast, @broadcast, @void, {@llc_tr={0x11, {@snap={0x1, 0xaa, "ef83", "009fe2", 0x2f8, "f534586acf94081cfbef95a3d541b87292146d673af6532a60fa29c11fca70109d7f691ffbe7c6376e92f7daac87b0cf2a5e87dd6ab7157b0734664294a41ae2552d3941635719d9c0b701b853f0b9e2c82fd43392215ef6cc2f801311859017c813b85b880c7eebcf6437475a521f8b14515c0f8635bde727a06f4cc668f2b8f2ab1296d16e8d7e0a3839229b42e8ccce0156f96ee45887b0f1a8141efeafa69d996cc6947ee83bcd53af84fd0d49526da25f07018c41c55e1c8d1c3a2315e1d9"}}}}}, &(0x7f00000000c0)={0x0, 0x3, [0xaa7, 0xf80, 0xfe1, 0x7dd]}) (async) syz_emit_ethernet(0x156, 0x0, 0x0) (async) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) (async) [ 801.879357] erofs: blksize 1 isn't supported on this platform [ 801.902511] erofs: options -> fault_injection=0x0000000000000000, [ 801.912883] erofs: FAULT_INJECTION was not selected [ 801.919006] erofs: root inode @ nid 0 [ 801.923048] erofs: bogus i_mode (0) @ nid 0 19:41:23 executing program 1: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c00", 0xe, 0x400}, {&(0x7f0000000280)="050000040041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000080)={[{@fault_injection}]}) 19:41:23 executing program 3: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010060000c", 0xd, 0x400}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000080)={[{@fault_injection}]}) 19:41:23 executing program 0: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e0", 0x4, 0x400}, {0x0, 0xa00, 0x1000}], 0x0, &(0x7f0000000080)) 19:41:23 executing program 4: r0 = gettid() r1 = creat(&(0x7f0000000280)='./file0\x00', 0xecf86c37d53049cc) write$binfmt_script(r1, &(0x7f0000001b00)=ANY=[@ANYBLOB="2321202e2f66696c653020cde4b352b7a0e0617105f8e29e23db42507b87b9ec0431bb18e482db4653f8ce89f2dcfea001aa469fa07baf17ccbea936872ae8edab7acaaa552ac0e390682c624210e8c5a689d19f3765a51206009f06299edba788a0b235049c6c704589efbf023d87005392ab5fa708681aa9030368808c7122c4780ffd5c378325cf24b192e6e9fefe0cbed9be74"], 0x191) r2 = perf_event_open(&(0x7f0000000340)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x70d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r1) getpriority(0x1, 0x0) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000100)={0x18, 0x3, &(0x7f0000000000)=ANY=[@ANYBLOB="000000000001000000000095"], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='tick_stop\x00', r3}, 0x10) setpgid(0x0, 0x0) sendmsg$unix(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f00000002c0)}, {&(0x7f00000003c0)}, {0x0}], 0x3, &(0x7f0000000440)=ANY=[@ANYRES32, @ANYRES32, @ANYBLOB="2523137e4c10a1e1d2fd363ff2706310a09cb33407af85521b0013de2a48e9f12856edab9d072ed5536359", @ANYRES32, @ANYRES32, @ANYRES64=r2, @ANYRES32, @ANYRES32], 0x80, 0x24008840}, 0x4040004) lsetxattr$system_posix_acl(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000540)={{}, {0x1, 0x7}, [{0x2, 0x0, 0xffffffffffffffff}], {0x4, 0x2}, [{}, {0x8, 0x1, 0xffffffffffffffff}, {0x8, 0x2}, {0x8, 0x0, 0xffffffffffffffff}, {0x8, 0x0, 0xee01}], {0x10, 0x5}, {0x20, 0x2}}, 0x54, 0x3) setxattr$security_capability(0x0, &(0x7f0000000200), &(0x7f0000000180)=@v3={0x3000000, [{0x4}, {0x1, 0x5}]}, 0x18, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) preadv(0xffffffffffffffff, &(0x7f0000000500)=[{&(0x7f00000004c0)=""/51, 0x33}, {&(0x7f0000000680)=""/177, 0xb1}, {&(0x7f0000000740)=""/137, 0x89}], 0x3, 0x200, 0x0) perf_event_open(&(0x7f00000005c0)={0x1, 0x80, 0xf3, 0x0, 0x2, 0x4, 0x0, 0xffff, 0xa, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x7, 0x0, @perf_config_ext={0x6, 0x549}, 0x54980, 0x0, 0xffff, 0x4, 0x6, 0x8, 0x9, 0x0, 0x0, 0x0, 0x1}, r0, 0xf, 0xffffffffffffffff, 0x0) sendmsg$nl_route(r1, &(0x7f00000003c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)=ANY=[@ANYBLOB="1c0000005e00000327957000ffdbdf2500000000", @ANYRES32=0x0, @ANYBLOB="05000000"], 0x1c}, 0x1, 0x0, 0x0, 0x10}, 0x20004040) execve(&(0x7f0000000400)='./file0\x00', 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) [ 802.144397] erofs: read_super, device -> /dev/loop5 19:41:23 executing program 2: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c0024", 0xf, 0x400}, {&(0x7f0000000280)="05000000c041", 0x6, 0x480}, {0x0, 0x4, 0x1000}], 0x0, &(0x7f0000000080)={[{@fault_injection}]}) [ 802.182044] erofs: read_super, device -> /dev/loop1 [ 802.191476] erofs: options -> fault_injection=0x0000000000000000, [ 802.233585] erofs: FAULT_INJECTION was not selected [ 802.241968] erofs: root inode @ nid 36 [ 802.243881] erofs: options -> fault_injection=0x0000000000000000, [ 802.301021] erofs: FAULT_INJECTION was not selected [ 802.326097] erofs: bogus i_mode (0) @ nid 36 [ 802.328429] erofs: root inode @ nid 0 [ 802.372614] erofs: read_super, device -> /dev/loop2 [ 802.377833] erofs: options -> fault_injection=0x0000000000000000, [ 802.379365] erofs: bogus i_mode (0) @ nid 0 [ 802.391812] erofs: FAULT_INJECTION was not selected [ 802.398833] erofs: root inode @ nid 36 [ 802.398941] erofs: read_super, device -> /dev/loop3 [ 802.403422] erofs: mounted on /dev/loop2 with opts: fault_injection=0x0000000000000000. [ 802.430517] erofs: read_super, device -> /dev/loop0 19:41:23 executing program 4: r0 = gettid() (async) r1 = creat(&(0x7f0000000280)='./file0\x00', 0xecf86c37d53049cc) write$binfmt_script(r1, &(0x7f0000001b00)=ANY=[@ANYBLOB="2321202e2f66696c653020cde4b352b7a0e0617105f8e29e23db42507b87b9ec0431bb18e482db4653f8ce89f2dcfea001aa469fa07baf17ccbea936872ae8edab7acaaa552ac0e390682c624210e8c5a689d19f3765a51206009f06299edba788a0b235049c6c704589efbf023d87005392ab5fa708681aa9030368808c7122c4780ffd5c378325cf24b192e6e9fefe0cbed9be74"], 0x191) (async) r2 = perf_event_open(&(0x7f0000000340)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x70d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async, rerun: 32) close(r1) (async, rerun: 32) getpriority(0x1, 0x0) (async, rerun: 64) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000100)={0x18, 0x3, &(0x7f0000000000)=ANY=[@ANYBLOB="000000000001000000000095"], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) (rerun: 64) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='tick_stop\x00', r3}, 0x10) (async) setpgid(0x0, 0x0) (async) sendmsg$unix(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f00000002c0)}, {&(0x7f00000003c0)}, {0x0}], 0x3, &(0x7f0000000440)=ANY=[@ANYRES32, @ANYRES32, @ANYBLOB="2523137e4c10a1e1d2fd363ff2706310a09cb33407af85521b0013de2a48e9f12856edab9d072ed5536359", @ANYRES32, @ANYRES32, @ANYRES64=r2, @ANYRES32, @ANYRES32], 0x80, 0x24008840}, 0x4040004) (async) lsetxattr$system_posix_acl(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000540)={{}, {0x1, 0x7}, [{0x2, 0x0, 0xffffffffffffffff}], {0x4, 0x2}, [{}, {0x8, 0x1, 0xffffffffffffffff}, {0x8, 0x2}, {0x8, 0x0, 0xffffffffffffffff}, {0x8, 0x0, 0xee01}], {0x10, 0x5}, {0x20, 0x2}}, 0x54, 0x3) setxattr$security_capability(0x0, &(0x7f0000000200), &(0x7f0000000180)=@v3={0x3000000, [{0x4}, {0x1, 0x5}]}, 0x18, 0x0) (async) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) (async, rerun: 64) preadv(0xffffffffffffffff, &(0x7f0000000500)=[{&(0x7f00000004c0)=""/51, 0x33}, {&(0x7f0000000680)=""/177, 0xb1}, {&(0x7f0000000740)=""/137, 0x89}], 0x3, 0x200, 0x0) (async, rerun: 64) perf_event_open(&(0x7f00000005c0)={0x1, 0x80, 0xf3, 0x0, 0x2, 0x4, 0x0, 0xffff, 0xa, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x7, 0x0, @perf_config_ext={0x6, 0x549}, 0x54980, 0x0, 0xffff, 0x4, 0x6, 0x8, 0x9, 0x0, 0x0, 0x0, 0x1}, r0, 0xf, 0xffffffffffffffff, 0x0) sendmsg$nl_route(r1, &(0x7f00000003c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)=ANY=[@ANYBLOB="1c0000005e00000327957000ffdbdf2500000000", @ANYRES32=0x0, @ANYBLOB="05000000"], 0x1c}, 0x1, 0x0, 0x0, 0x10}, 0x20004040) (async) execve(&(0x7f0000000400)='./file0\x00', 0x0, 0x0) (async, rerun: 64) ptrace$setopts(0x4206, r0, 0x0, 0x0) (rerun: 64) 19:41:23 executing program 2: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c0024", 0xf, 0x400}, {&(0x7f0000000280)="05000000c041", 0x6, 0x480}, {0x0, 0x5, 0x1000}], 0x0, &(0x7f0000000080)={[{@fault_injection}]}) 19:41:23 executing program 5: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467450000000c0024", 0xf, 0x400}, {&(0x7f0000000280)="05", 0x1, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000080)={[{@fault_injection}]}) 19:41:23 executing program 1: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c0024", 0xf}, {&(0x7f0000000280)="050000040041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000080)={[{@fault_injection}]}) [ 802.463237] erofs: options -> fault_injection=0x0000000000000000, [ 802.485926] erofs: unmounted for /dev/loop2 [ 802.490119] erofs: options -> [ 802.496526] erofs: FAULT_INJECTION was not selected [ 802.505330] erofs: blksize 1 isn't supported on this platform [ 802.514857] erofs: root inode @ nid 0 [ 802.531193] erofs: bogus i_mode (0) @ nid 0 19:41:23 executing program 0: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e0", 0x4, 0x400}, {0x0, 0xc00, 0x1000}], 0x0, &(0x7f0000000080)) 19:41:23 executing program 3: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010182000c", 0xd, 0x400}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000080)={[{@fault_injection}]}) [ 802.664238] erofs: read_super, device -> /dev/loop5 [ 802.682088] erofs: options -> fault_injection=0x0000000000000000, [ 802.699915] erofs: FAULT_INJECTION was not selected [ 802.707536] erofs: root inode @ nid 36 19:41:23 executing program 4: r0 = gettid() r1 = creat(&(0x7f0000000280)='./file0\x00', 0xecf86c37d53049cc) write$binfmt_script(r1, &(0x7f0000001b00)=ANY=[@ANYBLOB="2321202e2f66696c653020cde4b352b7a0e0617105f8e29e23db42507b87b9ec0431bb18e482db4653f8ce89f2dcfea001aa469fa07baf17ccbea936872ae8edab7acaaa552ac0e390682c624210e8c5a689d19f3765a51206009f06299edba788a0b235049c6c704589efbf023d87005392ab5fa708681aa9030368808c7122c4780ffd5c378325cf24b192e6e9fefe0cbed9be74"], 0x191) (async) r2 = perf_event_open(&(0x7f0000000340)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x70d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r1) (async) getpriority(0x1, 0x0) (async) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000100)={0x18, 0x3, &(0x7f0000000000)=ANY=[@ANYBLOB="000000000001000000000095"], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='tick_stop\x00', r3}, 0x10) (async) setpgid(0x0, 0x0) (async) sendmsg$unix(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f00000002c0)}, {&(0x7f00000003c0)}, {0x0}], 0x3, &(0x7f0000000440)=ANY=[@ANYRES32, @ANYRES32, @ANYBLOB="2523137e4c10a1e1d2fd363ff2706310a09cb33407af85521b0013de2a48e9f12856edab9d072ed5536359", @ANYRES32, @ANYRES32, @ANYRES64=r2, @ANYRES32, @ANYRES32], 0x80, 0x24008840}, 0x4040004) (async) lsetxattr$system_posix_acl(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000540)={{}, {0x1, 0x7}, [{0x2, 0x0, 0xffffffffffffffff}], {0x4, 0x2}, [{}, {0x8, 0x1, 0xffffffffffffffff}, {0x8, 0x2}, {0x8, 0x0, 0xffffffffffffffff}, {0x8, 0x0, 0xee01}], {0x10, 0x5}, {0x20, 0x2}}, 0x54, 0x3) (async) setxattr$security_capability(0x0, &(0x7f0000000200), &(0x7f0000000180)=@v3={0x3000000, [{0x4}, {0x1, 0x5}]}, 0x18, 0x0) (async) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) (async) preadv(0xffffffffffffffff, &(0x7f0000000500)=[{&(0x7f00000004c0)=""/51, 0x33}, {&(0x7f0000000680)=""/177, 0xb1}, {&(0x7f0000000740)=""/137, 0x89}], 0x3, 0x200, 0x0) perf_event_open(&(0x7f00000005c0)={0x1, 0x80, 0xf3, 0x0, 0x2, 0x4, 0x0, 0xffff, 0xa, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x7, 0x0, @perf_config_ext={0x6, 0x549}, 0x54980, 0x0, 0xffff, 0x4, 0x6, 0x8, 0x9, 0x0, 0x0, 0x0, 0x1}, r0, 0xf, 0xffffffffffffffff, 0x0) (async) sendmsg$nl_route(r1, &(0x7f00000003c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)=ANY=[@ANYBLOB="1c0000005e00000327957000ffdbdf2500000000", @ANYRES32=0x0, @ANYBLOB="05000000"], 0x1c}, 0x1, 0x0, 0x0, 0x10}, 0x20004040) (async) execve(&(0x7f0000000400)='./file0\x00', 0x0, 0x0) (async) ptrace$setopts(0x4206, r0, 0x0, 0x0) [ 802.715406] erofs: bogus i_mode (0) @ nid 36 [ 802.718981] erofs: read_super, device -> /dev/loop2 [ 802.724846] erofs: options -> fault_injection=0x0000000000000000, [ 802.734484] erofs: read_super, device -> /dev/loop1 [ 802.746623] erofs: options -> fault_injection=0x0000000000000000, 19:41:23 executing program 5: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467a90300000c0024", 0xf, 0x400}, {&(0x7f0000000280)="05", 0x1, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000080)={[{@fault_injection}]}) [ 802.773974] erofs: cannot find valid erofs superblock [ 802.834607] erofs: FAULT_INJECTION was not selected 19:41:23 executing program 1: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c0024", 0xf}, {&(0x7f0000000280)="050000040041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000080)={[{@fault_injection}]}) [ 802.854797] erofs: root inode @ nid 36 [ 802.883135] erofs: read_super, device -> /dev/loop3 [ 802.893087] erofs: mounted on /dev/loop2 with opts: fault_injection=0x0000000000000000. [ 802.922963] erofs: options -> fault_injection=0x0000000000000000, 19:41:24 executing program 2: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c0024", 0xf, 0x400}, {&(0x7f0000000280)="05000000c041", 0x6, 0x480}, {0x0, 0x6, 0x1000}], 0x0, &(0x7f0000000080)={[{@fault_injection}]}) 19:41:24 executing program 0: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e0", 0x4, 0x400}, {0x0, 0x1f00, 0x1000}], 0x0, &(0x7f0000000080)) [ 802.939271] erofs: read_super, device -> /dev/loop0 [ 802.951483] erofs: options -> [ 802.954840] erofs: blksize 1 isn't supported on this platform [ 802.965553] erofs: FAULT_INJECTION was not selected [ 802.974741] erofs: root inode @ nid 0 [ 802.978189] erofs: unmounted for /dev/loop2 [ 802.979000] erofs: bogus i_mode (0) @ nid 0 19:41:24 executing program 4: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r1 = openat$audio(0xffffffffffffff9c, &(0x7f00000001c0), 0x0, 0x0) openat$vim2m(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) ioctl$int_in(r1, 0x0, &(0x7f0000000300)) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffff7fffffffffff, 0xffffffffffffffff, 0x0) r3 = gettid() tkill(r3, 0x38) perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x0, 0x0, 0x81, 0x1f, 0x0, 0x7, 0x31400, 0x6, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x4, 0x1, @perf_bp={&(0x7f0000000000), 0xa}, 0x4200, 0x74, 0x30, 0x9, 0x1f, 0x9, 0x9, 0x0, 0x9, 0x0, 0x9}, r3, 0xb, r2, 0x1) clock_gettime(0x0, &(0x7f00000000c0)={0x0, 0x0}) ioctl$SNDCTL_SEQ_OUTOFBAND(r0, 0x40085112, &(0x7f0000000380)=@v={0x93, 0xe, 0xa0, 0x14, @generic=0x4, 0xaf, 0xffff}) r5 = open(&(0x7f0000000100)='./bus\x00', 0x141042, 0x0) pwritev(r5, &(0x7f0000000080)=[{&(0x7f0000000340)="d4", 0x1}], 0x1, 0x40000c9, 0x0) ioctl$SNDCTL_DSP_SPEED(r5, 0xc0045002, &(0x7f0000000100)=0x3a18) r6 = creat(&(0x7f0000000300)='./bus\x00', 0x0) fcntl$setstatus(r6, 0x4, 0x4002) io_setup(0x20b0db61, &(0x7f0000000000)=0x0) io_submit(r7, 0x8, &(0x7f0000000540)=[&(0x7f00000000c0)={0x19, 0x0, 0x8, 0x1, 0x0, r6, &(0x7f0000000000), 0x200a00}]) ioctl$SNDCTL_MIDI_PRETIME(r6, 0xc0046d00, &(0x7f00000002c0)=0xb5) pselect6(0x40, &(0x7f0000000180), 0x0, &(0x7f0000000140)={0x1ff}, &(0x7f0000000280)={0x0, r4+30000000}, 0x0) [ 803.038861] erofs: read_super, device -> /dev/loop5 [ 803.043601] erofs: read_super, device -> /dev/loop1 [ 803.051884] erofs: options -> fault_injection=0x0000000000000000, [ 803.055592] erofs: options -> fault_injection=0x0000000000000000, [ 803.065216] erofs: cannot find valid erofs superblock [ 803.067488] erofs: FAULT_INJECTION was not selected [ 803.077264] erofs: root inode @ nid 36 19:41:24 executing program 3: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010382000c", 0xd, 0x400}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000080)={[{@fault_injection}]}) [ 803.121215] erofs: bogus i_mode (0) @ nid 36 19:41:24 executing program 1: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c0024", 0xf}, {&(0x7f0000000280)="050000040041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000080)={[{@fault_injection}]}) 19:41:24 executing program 5: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467b70300000c0024", 0xf, 0x400}, {&(0x7f0000000280)="05", 0x1, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000080)={[{@fault_injection}]}) [ 803.181299] erofs: read_super, device -> /dev/loop0 [ 803.190276] erofs: options -> [ 803.198842] erofs: read_super, device -> /dev/loop2 [ 803.206319] erofs: blksize 1 isn't supported on this platform [ 803.217081] erofs: options -> fault_injection=0x0000000000000000, 19:41:24 executing program 0: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e0", 0x4, 0x400}, {0x0, 0x2000, 0x1000}], 0x0, &(0x7f0000000080)) [ 803.289137] erofs: FAULT_INJECTION was not selected 19:41:24 executing program 4: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r1 = openat$audio(0xffffffffffffff9c, &(0x7f00000001c0), 0x0, 0x0) openat$vim2m(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) ioctl$int_in(r1, 0x0, &(0x7f0000000300)) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffff7fffffffffff, 0xffffffffffffffff, 0x0) r3 = gettid() tkill(r3, 0x38) perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x0, 0x0, 0x81, 0x1f, 0x0, 0x7, 0x31400, 0x6, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x4, 0x1, @perf_bp={&(0x7f0000000000), 0xa}, 0x4200, 0x74, 0x30, 0x9, 0x1f, 0x9, 0x9, 0x0, 0x9, 0x0, 0x9}, r3, 0xb, r2, 0x1) clock_gettime(0x0, &(0x7f00000000c0)={0x0, 0x0}) ioctl$SNDCTL_SEQ_OUTOFBAND(r0, 0x40085112, &(0x7f0000000380)=@v={0x93, 0xe, 0xa0, 0x14, @generic=0x4, 0xaf, 0xffff}) r5 = open(&(0x7f0000000100)='./bus\x00', 0x141042, 0x0) pwritev(r5, &(0x7f0000000080)=[{&(0x7f0000000340)="d4", 0x1}], 0x1, 0x40000c9, 0x0) ioctl$SNDCTL_DSP_SPEED(r5, 0xc0045002, &(0x7f0000000100)=0x3a18) r6 = creat(&(0x7f0000000300)='./bus\x00', 0x0) fcntl$setstatus(r6, 0x4, 0x4002) io_setup(0x20b0db61, &(0x7f0000000000)=0x0) io_submit(r7, 0x8, &(0x7f0000000540)=[&(0x7f00000000c0)={0x19, 0x0, 0x8, 0x1, 0x0, r6, &(0x7f0000000000), 0x200a00}]) ioctl$SNDCTL_MIDI_PRETIME(r6, 0xc0046d00, &(0x7f00000002c0)=0xb5) pselect6(0x40, &(0x7f0000000180), 0x0, &(0x7f0000000140)={0x1ff}, &(0x7f0000000280)={0x0, r4+30000000}, 0x0) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) (async) openat$audio(0xffffffffffffff9c, &(0x7f00000001c0), 0x0, 0x0) (async) openat$vim2m(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) (async) ioctl$int_in(r1, 0x0, &(0x7f0000000300)) (async) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffff7fffffffffff, 0xffffffffffffffff, 0x0) (async) gettid() (async) tkill(r3, 0x38) (async) perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x0, 0x0, 0x81, 0x1f, 0x0, 0x7, 0x31400, 0x6, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x4, 0x1, @perf_bp={&(0x7f0000000000), 0xa}, 0x4200, 0x74, 0x30, 0x9, 0x1f, 0x9, 0x9, 0x0, 0x9, 0x0, 0x9}, r3, 0xb, r2, 0x1) (async) clock_gettime(0x0, &(0x7f00000000c0)) (async) ioctl$SNDCTL_SEQ_OUTOFBAND(r0, 0x40085112, &(0x7f0000000380)=@v={0x93, 0xe, 0xa0, 0x14, @generic=0x4, 0xaf, 0xffff}) (async) open(&(0x7f0000000100)='./bus\x00', 0x141042, 0x0) (async) pwritev(r5, &(0x7f0000000080)=[{&(0x7f0000000340)="d4", 0x1}], 0x1, 0x40000c9, 0x0) (async) ioctl$SNDCTL_DSP_SPEED(r5, 0xc0045002, &(0x7f0000000100)=0x3a18) (async) creat(&(0x7f0000000300)='./bus\x00', 0x0) (async) fcntl$setstatus(r6, 0x4, 0x4002) (async) io_setup(0x20b0db61, &(0x7f0000000000)) (async) io_submit(r7, 0x8, &(0x7f0000000540)=[&(0x7f00000000c0)={0x19, 0x0, 0x8, 0x1, 0x0, r6, &(0x7f0000000000), 0x200a00}]) (async) ioctl$SNDCTL_MIDI_PRETIME(r6, 0xc0046d00, &(0x7f00000002c0)=0xb5) (async) pselect6(0x40, &(0x7f0000000180), 0x0, &(0x7f0000000140)={0x1ff}, &(0x7f0000000280)={0x0, r4+30000000}, 0x0) (async) [ 803.322701] erofs: root inode @ nid 36 [ 803.330623] erofs: read_super, device -> /dev/loop3 [ 803.360782] erofs: mounted on /dev/loop2 with opts: fault_injection=0x0000000000000000. [ 803.390268] erofs: read_super, device -> /dev/loop5 [ 803.410009] erofs: read_super, device -> /dev/loop1 [ 803.426345] erofs: options -> fault_injection=0x0000000000000000, [ 803.432122] erofs: options -> fault_injection=0x0000000000000000, 19:41:24 executing program 2: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c0024", 0xf, 0x400}, {&(0x7f0000000280)="05000000c041", 0x6, 0x480}, {0x0, 0x7, 0x1000}], 0x0, &(0x7f0000000080)={[{@fault_injection}]}) [ 803.444722] erofs: options -> fault_injection=0x0000000000000000, [ 803.463879] erofs: FAULT_INJECTION was not selected [ 803.466766] erofs: cannot find valid erofs superblock [ 803.472468] erofs: FAULT_INJECTION was not selected [ 803.474732] erofs: unmounted for /dev/loop2 [ 803.491108] erofs: root inode @ nid 0 19:41:24 executing program 4: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r1 = openat$audio(0xffffffffffffff9c, &(0x7f00000001c0), 0x0, 0x0) openat$vim2m(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) (async) ioctl$int_in(r1, 0x0, &(0x7f0000000300)) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffff7fffffffffff, 0xffffffffffffffff, 0x0) (async) r3 = gettid() tkill(r3, 0x38) perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x0, 0x0, 0x81, 0x1f, 0x0, 0x7, 0x31400, 0x6, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x4, 0x1, @perf_bp={&(0x7f0000000000), 0xa}, 0x4200, 0x74, 0x30, 0x9, 0x1f, 0x9, 0x9, 0x0, 0x9, 0x0, 0x9}, r3, 0xb, r2, 0x1) clock_gettime(0x0, &(0x7f00000000c0)={0x0, 0x0}) (async) ioctl$SNDCTL_SEQ_OUTOFBAND(r0, 0x40085112, &(0x7f0000000380)=@v={0x93, 0xe, 0xa0, 0x14, @generic=0x4, 0xaf, 0xffff}) (async) r5 = open(&(0x7f0000000100)='./bus\x00', 0x141042, 0x0) pwritev(r5, &(0x7f0000000080)=[{&(0x7f0000000340)="d4", 0x1}], 0x1, 0x40000c9, 0x0) (async) ioctl$SNDCTL_DSP_SPEED(r5, 0xc0045002, &(0x7f0000000100)=0x3a18) (async) r6 = creat(&(0x7f0000000300)='./bus\x00', 0x0) fcntl$setstatus(r6, 0x4, 0x4002) io_setup(0x20b0db61, &(0x7f0000000000)=0x0) io_submit(r7, 0x8, &(0x7f0000000540)=[&(0x7f00000000c0)={0x19, 0x0, 0x8, 0x1, 0x0, r6, &(0x7f0000000000), 0x200a00}]) (async) ioctl$SNDCTL_MIDI_PRETIME(r6, 0xc0046d00, &(0x7f00000002c0)=0xb5) (async) pselect6(0x40, &(0x7f0000000180), 0x0, &(0x7f0000000140)={0x1ff}, &(0x7f0000000280)={0x0, r4+30000000}, 0x0) 19:41:24 executing program 1: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c0024", 0xf, 0x400}, {&(0x7f0000000280)="050000040041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, 0x0) [ 803.500224] erofs: root inode @ nid 36 [ 803.504408] erofs: bogus i_mode (0) @ nid 0 [ 803.512464] erofs: bogus i_mode (0) @ nid 36 [ 803.534221] erofs: read_super, device -> /dev/loop0 19:41:24 executing program 5: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467be0300000c0024", 0xf, 0x400}, {&(0x7f0000000280)="05", 0x1, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000080)={[{@fault_injection}]}) [ 803.566752] erofs: options -> [ 803.571950] erofs: blksize 1 isn't supported on this platform 19:41:24 executing program 4: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="73623d30786666666666666666666666666661e81d7d2a"]) unlinkat(r0, &(0x7f00000002c0)='./file1\x00', 0x0) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f0000000140)={'syztnl2\x00', &(0x7f00000000c0)={'syztnl2\x00', 0x0, 0x80, 0x80, 0x5, 0xd7, {{0x18, 0x4, 0x1, 0x9, 0x60, 0x67, 0x0, 0x40, 0x2f, 0x0, @broadcast, @multicast1, {[@timestamp_prespec={0x44, 0x4c, 0x61, 0x3, 0x1, [{@multicast1, 0xfb3}, {@private=0xa010101, 0xff}, {@broadcast, 0x40000000}, {@empty, 0x8}, {@multicast1, 0x5}, {@multicast1, 0x5}, {@empty, 0x5}, {@remote, 0x1d8}, {@dev={0xac, 0x14, 0x14, 0xc}, 0x3}]}]}}}}}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000200)={&(0x7f0000000180)=@newchain={0x78, 0x64, 0x20, 0x70bd2a, 0x25dfdbfe, {0x0, 0x0, 0x0, r1, {0x4}, {0x4, 0xe}, {0x8, 0xc}}, [@TCA_CHAIN={0x8}, @TCA_RATE={0x6, 0x5, {0xe1, 0x8}}, @TCA_CHAIN={0x8, 0xb, 0x7fff}, @TCA_CHAIN={0x8, 0xb, 0x40}, @TCA_CHAIN={0x8, 0xb, 0x100}, @filter_kind_options=@f_route={{0xa}, {0x18, 0x2, [@TCA_ROUTE4_ACT={0x4}, @TCA_ROUTE4_TO={0x8, 0x2, 0xbe}, @TCA_ROUTE4_CLASSID={0x8, 0x1, {0x0, 0xa}}]}}, @TCA_CHAIN={0x8, 0xb, 0xfff}]}, 0x78}, 0x1, 0x0, 0x0, 0x40}, 0xc01) r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) bind$bt_l2cap(r2, &(0x7f0000000000), 0x58) listen(r2, 0x0) ioctl$AUTOFS_IOC_READY(r2, 0x9360, 0x3) 19:41:24 executing program 0: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e0", 0x4, 0x400}, {0x0, 0x2100, 0x1000}], 0x0, &(0x7f0000000080)) 19:41:24 executing program 3: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467012691000c", 0xd, 0x400}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000080)={[{@fault_injection}]}) [ 803.721312] erofs: read_super, device -> /dev/loop2 [ 803.726363] erofs: options -> fault_injection=0x0000000000000000, [ 803.757598] erofs: FAULT_INJECTION was not selected 19:41:24 executing program 4: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="73623d30786666666666666666666666666661e81d7d2a"]) unlinkat(r0, &(0x7f00000002c0)='./file1\x00', 0x0) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f0000000140)={'syztnl2\x00', &(0x7f00000000c0)={'syztnl2\x00', 0x0, 0x80, 0x80, 0x5, 0xd7, {{0x18, 0x4, 0x1, 0x9, 0x60, 0x67, 0x0, 0x40, 0x2f, 0x0, @broadcast, @multicast1, {[@timestamp_prespec={0x44, 0x4c, 0x61, 0x3, 0x1, [{@multicast1, 0xfb3}, {@private=0xa010101, 0xff}, {@broadcast, 0x40000000}, {@empty, 0x8}, {@multicast1, 0x5}, {@multicast1, 0x5}, {@empty, 0x5}, {@remote, 0x1d8}, {@dev={0xac, 0x14, 0x14, 0xc}, 0x3}]}]}}}}}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000200)={&(0x7f0000000180)=@newchain={0x78, 0x64, 0x20, 0x70bd2a, 0x25dfdbfe, {0x0, 0x0, 0x0, r1, {0x4}, {0x4, 0xe}, {0x8, 0xc}}, [@TCA_CHAIN={0x8}, @TCA_RATE={0x6, 0x5, {0xe1, 0x8}}, @TCA_CHAIN={0x8, 0xb, 0x7fff}, @TCA_CHAIN={0x8, 0xb, 0x40}, @TCA_CHAIN={0x8, 0xb, 0x100}, @filter_kind_options=@f_route={{0xa}, {0x18, 0x2, [@TCA_ROUTE4_ACT={0x4}, @TCA_ROUTE4_TO={0x8, 0x2, 0xbe}, @TCA_ROUTE4_CLASSID={0x8, 0x1, {0x0, 0xa}}]}}, @TCA_CHAIN={0x8, 0xb, 0xfff}]}, 0x78}, 0x1, 0x0, 0x0, 0x40}, 0xc01) r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) bind$bt_l2cap(r2, &(0x7f0000000000), 0x58) listen(r2, 0x0) ioctl$AUTOFS_IOC_READY(r2, 0x9360, 0x3) syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="73623d30786666666666666666666666666661e81d7d2a"]) (async) unlinkat(r0, &(0x7f00000002c0)='./file1\x00', 0x0) (async) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f0000000140)={'syztnl2\x00', &(0x7f00000000c0)={'syztnl2\x00', 0x0, 0x80, 0x80, 0x5, 0xd7, {{0x18, 0x4, 0x1, 0x9, 0x60, 0x67, 0x0, 0x40, 0x2f, 0x0, @broadcast, @multicast1, {[@timestamp_prespec={0x44, 0x4c, 0x61, 0x3, 0x1, [{@multicast1, 0xfb3}, {@private=0xa010101, 0xff}, {@broadcast, 0x40000000}, {@empty, 0x8}, {@multicast1, 0x5}, {@multicast1, 0x5}, {@empty, 0x5}, {@remote, 0x1d8}, {@dev={0xac, 0x14, 0x14, 0xc}, 0x3}]}]}}}}}) (async) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000200)={&(0x7f0000000180)=@newchain={0x78, 0x64, 0x20, 0x70bd2a, 0x25dfdbfe, {0x0, 0x0, 0x0, r1, {0x4}, {0x4, 0xe}, {0x8, 0xc}}, [@TCA_CHAIN={0x8}, @TCA_RATE={0x6, 0x5, {0xe1, 0x8}}, @TCA_CHAIN={0x8, 0xb, 0x7fff}, @TCA_CHAIN={0x8, 0xb, 0x40}, @TCA_CHAIN={0x8, 0xb, 0x100}, @filter_kind_options=@f_route={{0xa}, {0x18, 0x2, [@TCA_ROUTE4_ACT={0x4}, @TCA_ROUTE4_TO={0x8, 0x2, 0xbe}, @TCA_ROUTE4_CLASSID={0x8, 0x1, {0x0, 0xa}}]}}, @TCA_CHAIN={0x8, 0xb, 0xfff}]}, 0x78}, 0x1, 0x0, 0x0, 0x40}, 0xc01) (async) syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) (async) bind$bt_l2cap(r2, &(0x7f0000000000), 0x58) (async) listen(r2, 0x0) (async) ioctl$AUTOFS_IOC_READY(r2, 0x9360, 0x3) (async) 19:41:24 executing program 1: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c0024", 0xf, 0x400}, {&(0x7f0000000280)="050000040041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, 0x0) [ 803.783875] erofs: root inode @ nid 36 [ 803.803773] erofs: mounted on /dev/loop2 with opts: fault_injection=0x0000000000000000. [ 803.889276] erofs: read_super, device -> /dev/loop5 [ 803.894331] erofs: options -> fault_injection=0x0000000000000000, [ 803.917279] erofs: read_super, device -> /dev/loop0 [ 803.918688] erofs: read_super, device -> /dev/loop3 [ 803.927503] erofs: options -> fault_injection=0x0000000000000000, [ 803.928438] erofs: options -> 19:41:25 executing program 2: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c0024", 0xf, 0x400}, {&(0x7f0000000280)="05000000c041", 0x6, 0x480}, {0x0, 0x8, 0x1000}], 0x0, &(0x7f0000000080)={[{@fault_injection}]}) [ 803.942276] erofs: FAULT_INJECTION was not selected [ 803.949164] erofs: root inode @ nid 0 [ 803.950468] erofs: unmounted for /dev/loop2 [ 803.969604] erofs: bogus i_mode (0) @ nid 0 [ 803.974422] erofs: blksize 1 isn't supported on this platform [ 803.980653] erofs: FAULT_INJECTION was not selected 19:41:25 executing program 4: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="73623d30786666666666666666666666666661e81d7d2a"]) unlinkat(r0, &(0x7f00000002c0)='./file1\x00', 0x0) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f0000000140)={'syztnl2\x00', &(0x7f00000000c0)={'syztnl2\x00', 0x0, 0x80, 0x80, 0x5, 0xd7, {{0x18, 0x4, 0x1, 0x9, 0x60, 0x67, 0x0, 0x40, 0x2f, 0x0, @broadcast, @multicast1, {[@timestamp_prespec={0x44, 0x4c, 0x61, 0x3, 0x1, [{@multicast1, 0xfb3}, {@private=0xa010101, 0xff}, {@broadcast, 0x40000000}, {@empty, 0x8}, {@multicast1, 0x5}, {@multicast1, 0x5}, {@empty, 0x5}, {@remote, 0x1d8}, {@dev={0xac, 0x14, 0x14, 0xc}, 0x3}]}]}}}}}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000200)={&(0x7f0000000180)=@newchain={0x78, 0x64, 0x20, 0x70bd2a, 0x25dfdbfe, {0x0, 0x0, 0x0, r1, {0x4}, {0x4, 0xe}, {0x8, 0xc}}, [@TCA_CHAIN={0x8}, @TCA_RATE={0x6, 0x5, {0xe1, 0x8}}, @TCA_CHAIN={0x8, 0xb, 0x7fff}, @TCA_CHAIN={0x8, 0xb, 0x40}, @TCA_CHAIN={0x8, 0xb, 0x100}, @filter_kind_options=@f_route={{0xa}, {0x18, 0x2, [@TCA_ROUTE4_ACT={0x4}, @TCA_ROUTE4_TO={0x8, 0x2, 0xbe}, @TCA_ROUTE4_CLASSID={0x8, 0x1, {0x0, 0xa}}]}}, @TCA_CHAIN={0x8, 0xb, 0xfff}]}, 0x78}, 0x1, 0x0, 0x0, 0x40}, 0xc01) r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) bind$bt_l2cap(r2, &(0x7f0000000000), 0x58) listen(r2, 0x0) (async) ioctl$AUTOFS_IOC_READY(r2, 0x9360, 0x3) [ 803.989015] erofs: root inode @ nid 36 19:41:25 executing program 1: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c0024", 0xf, 0x400}, {&(0x7f0000000280)="050000040041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, 0x0) [ 804.017802] erofs: bogus i_mode (0) @ nid 36 19:41:25 executing program 3: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010393000c", 0xd, 0x400}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000080)={[{@fault_injection}]}) 19:41:25 executing program 0: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e0", 0x4, 0x400}, {0x0, 0x2300, 0x1000}], 0x0, &(0x7f0000000080)) 19:41:25 executing program 5: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467c40300000c0024", 0xf, 0x400}, {&(0x7f0000000280)="05", 0x1, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000080)={[{@fault_injection}]}) 19:41:25 executing program 4: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467be0300000c0024", 0xf, 0x400}, {&(0x7f0000000280)="05", 0x1, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000080)={[{@fault_injection}]}) [ 804.229665] erofs: read_super, device -> /dev/loop2 [ 804.245233] erofs: options -> fault_injection=0x0000000000000000, [ 804.278592] erofs: FAULT_INJECTION was not selected [ 804.311885] erofs: root inode @ nid 36 [ 804.321258] erofs: read_super, device -> /dev/loop3 [ 804.332711] erofs: mounted on /dev/loop2 with opts: fault_injection=0x0000000000000000. [ 804.345575] erofs: options -> fault_injection=0x0000000000000000, [ 804.361791] erofs: FAULT_INJECTION was not selected [ 804.373872] erofs: root inode @ nid 0 [ 804.384023] erofs: read_super, device -> /dev/loop0 [ 804.391834] erofs: options -> [ 804.393437] erofs: bogus i_mode (0) @ nid 0 [ 804.395615] erofs: blksize 1 isn't supported on this platform 19:41:25 executing program 1: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c0024", 0xf, 0x400}, {&(0x7f0000000280)="050000040041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000080)) 19:41:25 executing program 2: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c0024", 0xf, 0x400}, {&(0x7f0000000280)="05000000c041", 0x6, 0x480}, {0x0, 0x23c, 0x1000}], 0x0, &(0x7f0000000080)={[{@fault_injection}]}) 19:41:25 executing program 4: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e0", 0x4, 0x400}, {0x0, 0x2000, 0x1000}], 0x0, &(0x7f0000000080)) [ 804.431470] erofs: read_super, device -> /dev/loop5 [ 804.450068] erofs: options -> fault_injection=0x0000000000000000, [ 804.470826] erofs: FAULT_INJECTION was not selected [ 804.476830] erofs: root inode @ nid 36 19:41:25 executing program 0: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e0", 0x4, 0x400}, {0x0, 0x3c02, 0x1000}], 0x0, &(0x7f0000000080)) [ 804.481627] erofs: bogus i_mode (0) @ nid 36 [ 804.482077] erofs: unmounted for /dev/loop2 19:41:25 executing program 5: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467060500000c0024", 0xf, 0x400}, {&(0x7f0000000280)="05", 0x1, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000080)={[{@fault_injection}]}) 19:41:25 executing program 4: ioctl$BTRFS_IOC_INO_LOOKUP_USER(0xffffffffffffffff, 0xd000943e, 0x0) ioctl$BTRFS_IOC_INO_LOOKUP_USER(0xffffffffffffffff, 0xd000943e, 0x0) ioctl$BTRFS_IOC_INO_LOOKUP(0xffffffffffffffff, 0xd0009412, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000005b100)={0x0, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}], 0x0, "e938c263edae7d"}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000016000/0x18000)=nil, &(0x7f00000000c0)=[@textreal={0x8, &(0x7f0000000080)="baa100b000eef36cba2100ec66b9800000c00f326635001000000f30bad104ecc80080d267d9f8f30f1bb429000f20c06635200000000f22c067f3af", 0x3c}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_PPC_ALLOCATE_HTAB(r1, 0xc004aea7, &(0x7f0000000040)=0x9) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r4, 0x81e8943c, &(0x7f0000000280)) ioctl$KVM_SET_REGS(r4, 0x4090ae82, &(0x7f00000001c0)={[0x0, 0x0, 0x7f4, 0x0, 0x0, 0x80000000000800, 0x10000020000000f9], 0x100000, 0x200400}) ioctl$KVM_RUN(r4, 0xae80, 0x0) r5 = accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x80800) ioctl$BTRFS_IOC_INO_LOOKUP_USER(r5, 0xd000943e, &(0x7f0000000780)={r3, r2, "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", "97743a40578619c0ddfe20712ed860744e3090b23d6b2793b8e8e234a4bbcfde563cc33f72a481c977f18458dd39d502f7453f82525a6040383817a1d1a376fbd6b6ca44527cfa3fab53f3fd8e886898614393c1595f358d3eb951b16dde78e771eff6f3b16c86582df36edae68bb45ee570e501adf046465102e34eb580351c3598d3c0a6dac7fdf13f691bcc9d7128b4c34fa5834577cae145d137bbce57a3aa00dbb60e82717d97032a78e3259802f65211bf4efcb82e2b7db0a6a802287d3dd401fcc2bee876669537197112fe7c429fe7cd48fe78a414dc041b9b02e73be1ee968024d481a77e954fed361982fb2184001bf72d515106579018815d7a58b731a8b46cb8fac57f710d730cb0654d1af07e136bfec707476dac4f2652c2025b551f86a863d77db0d643139e310b5ec0ddd508af2bc186662773db5f823965160a2528f7112c4d283d682d7e5d04c4543442e03fae895e2c7226295916d0e6bbe572c920b868fcc1022ff116cc3113439dc22483712b654e7761a1afa4954878853497c4aa680cd6cc0476563ee9d2ae992168aaada90f0b83907be1da49b4fe051c33fcc6d591851f933bb2bde72d79692e37db6cde0f00e11ddcaad47d0596694c4ad0c43e8626e4006b2704866ac7da4c149140f891665902afd9e213c79f109bb490119b33448efc27e02566dc027ea6ff6c3f6496cdf4a4a69e8d5b446ebd52322c809840f965b8fcb04aeaf5208e3aae73399fa14dce4dc3d87530296799aa74c81423d289bf7c814ed5f67c1557871b44cf1d6f79ec1b907811848151b6df878f05c65217e928fd7b7d4a5dbfe76364337afa7859a1043c3605aa9c398f749967586f675d4ce35402ba8a1e164c97af34484b21e5a436d4ade5ab874f07dc34c8053ba257d2cf3eda85a68c8db70886f224eaa145ed6ed51acd3abf8878dd74e4a4ec5462ff801e034972aaf892c776923154144bd6d000192ba5581c6f5ce0a362c50c026fbc04685f3363757b6bfa3b160b8f890932b6eb5d21bb039b9bf2ee583dead0d074cf4c4b0ac88aefb51ff908dc7c7915c6b8f537c811ddde35b481ddbcfb99f76d87cc379051967f7da12fe4aec4bda90c61ffd9c828ca228afd6d5caf063685e7bed6d7f172c84f66f27240b938ae8edb18843511d76babd8acf0c6769b05c9d952a9fa0ca50551d2d6b4e057cda9a701a95bf6d5018e679ccf1d2e4079e9661510ec9c52c58cb7a3e0972f60b6d4099c0aa7c5bde57336d240120cc5fcf728b7d505b8436b6525108c60898ca1c9caad2ec014eabc97b3e0ff981f7213dead1bed331e918ff3cb591c226e0319c78929da34d4302d906a5be72ffb2e15167ac8e6cd4a3ee8f6df94e051cec7138364106ca8fda8abe8a9132fa4a323e25c8d8089f5d42fcf55250345a09867496d614c56a996ff09cda722b1e5ce99619b0c507975dc65427a0c15112060edbdddb7d3175c493c26bbe3ca4d656d6bd4a9be1433668543900316361b3e65ee16603934c1a1ea9e91826403f7040e74fdc6abb5bb3deb12145611ab44ec555d438fa96f78df043f7a625884fe564d21503262a4b1f446ebf690c9160f09bdcf8e47372aed851dc5ba5e362b6bf4bb01ea76518aeae09e41d23dfb52170f307c3fe913b830e6893a942244ac9f9227dca38af1c729ac0a72aaa4fa18137a9297cbb5e2ea52f2debaca1e6864c07592d56066aade2b95bff2477a2719902f7b1d13b94c4e75cc78d28eefd3145ce68c711ee652a2ebf14f8a3563f13005548f4568d0ca639a572f94b8473299e8ea8cecca49ee804f9f1b41f79b941eb5e33ae3e4386c0c6aa41a3581b2d6ecb973e56cef2c9abb3c768fadb1a126dd056471fdf5dddc7400908741472b9e0924747b50bfe7d508810dabb229813883fdffe18bed128c63abf306fcf0f28bc52c22a851f63bfd313baf7056d6fadff9b3e30512defa3ec4a38bbc6eb6181bc7836cb9c305132ff601c5778f8e09c4299eacadf4b07852690f20f175ac7e15a843de86cc8108c365622bf32f40e6f41a6180eaf4864b8b9b2320820c011140ca3641ba0c8032caf2d6ee45a34782c148fcf0d548aa6902b585f052a4667e4d682c9df578153c7122542e10e437b3ff5f75e6722d3ae894816300dc0b21e943f0c924c6a32316ebb797b9e9be8783a14fbc56eea5b45372c8b524d049d161f77c4db1114ff95f0053d9b4e2032b6146b63e883af9ef533d0664391e3b955bb55682a987535a835e6569d4c056966c2fe4a9bddbc5bd20332bb1170cb580d1a3ea69cc994327f96306d987584976fc079ce68d0f662eae0f148d85eb9611b9c52d5f214fd9bb9d0e722a29cf4d71cc4e3605e95ad0233e48f197eb630912f20dbb2eac20abba5b2e0da7fa3306cbbd2a5a94983bc95b2b773b45676a6e92986af371afa23a26e8ef3d90690c789ccb2850d3f3104854b85cb878f3b4ff017dad2c3db8f1bfbffbf4ed95243225e261d064775c19346128f5a108dd68a5067b5f9ff29cc316b82cb0be2d6e7286af1c02576b5bbb925806003eaa7574b4dcf0e862c44e2c4e0b5e319d5e741617c4f97b87acc8ce250946ad761f528770f3ff75a39ccbf959e042f628f8b3c3549e878cbaaa11eef02324e7f8bd9969789ec90518ce35aaa50eaba083cbcd58035014ef59cda3af7d7b9306ceaaf3bddafb4de8c110ccfaff93c96a4b8a1c329d383897cb91d11f44b797110f02b16a167810d573aa813919b7f946cafe439d8d8a4a760abb10370dbe47bed901aef623f85783567c3de93105595cb3ebb5bd416972921dd677c1803465ac92c94dd7c290b892acbc8cb7165c83ae5d7def834209c6a74bd8ebaca2381165030e8799dfa4f70a1342fd289b3c248e57ccfc0da98bfb96c120dc90496144c8d3deaf7b7398efe6389826673cc422f9d72cef19bb369e38e5529a97d6b80e14b78eb0197d961161a724a140e4617b6802a43037be24f35fea8a0ff8344275c35a28d4bfe53ee27755df71b412070fdc7eb2a657f0fb3f18c26fbddb5ef8817455a79b162a6547913c0adff3a8dd7ce7e0828cf7e93b420427494bc6ea53d0cfce85a957c8f9ee8f1974192579c815fd7be4c2080182a8f57e308646f739ea24f7e20bf81d5e2e35dfd654535f07214d98615af76d1f00f469e48ca318df156de939d74ccffa2e9ff13f26507c1d43d8d7bc989a498edfef9796175cdb54a5754548e1f996351682d6f8f99667fd671f0dfe418d659dce529eac7ec784c7b45fd4be376a9f42f5ee0870c217b7315082583cea27183fc03fb92ca96ebbf421db71cbe0ef1a39e3ca769d435a57d2adfbaadbc1d5fbdf6676d8033ed6a10d571d71df0dd53d3a849351864d25b160f234f1c89b5b6e014039e3b09b030d18084d86f4265a33e1e4a1dd119b0be7bc2a1ed2cabeb3da23e0cf3e04d904fdee8bf207320afdebe8b0e5a0f243a4a62c4af8c88249fdf64f85a8392b6309499daf0eba144d3ba7ca88c1c4b4da2b55a3da6defc53b0f49324d87038386d2cff20deff88b1f34f3bb08c10435de8b36e14960f8066b75850891f931c35e6b08142f53db8826ae135a64539918d03013d49b707488e66e83e1ab213de6300654aebc4020bcf56486bd2025cfdc95b0cddd23684b897c78d311d413c57f31434c1cdee34ba514acb8d0d16dfc45e4c0cb3fa27f58614f23f8e0e12fa36249e6926837b1093175a079f3e97ab9d62cda13c69bafea6decb76039d045b32d169686f528c612a0430ff35ee879d20918d7c83011df7a750de190d11ac9f478a971c4f5d1e1ad83e33b49ec8487f3e045bd6678568d973769c822de479b70afeb77e61cf0a4219d422e3cd9c7da88aae07511587a2dc0606c3e37e7e34b3081903924d61730158adb657491c38a92e2772eaf4bdaed728583087035bf2f0b50fbc8df07b118e6a15e336e7397ab6e4ae8d7331d11ab379e912730bb4fe383205fc76afef893527f8103cdb1168bf8923a8f0e76fc55a27ab3638486b18a095b7fae8fe24a0da122d64c7302b0c653ebd0ae618ff5b59fe33f5d3b98bf680313a2c01571b5e8c8395ae5580f63b7279df8b1e4f98745af4bbfdb3d48458826379eb0a1c7266f6d21d88cf95627d9b57644cdc8d7778102fdc85b4eb49ea1a67b78d4cce90b83ab5b65271a749c906738d2004371f17bbd6e58de1ab0625d8b32b6e6cbbe95c86ca50ca702a6719921bdd59cd7d950e26cbdf8b0307c12aa8b23aeed8e19a60021e6bba01f1b89c15ccc8d77f64ff5eafad33eb6885560028f6ce7741d3a3de1207d826ef1211a5f224ef4a2f52900799b2f9f5583f41cd1d6d2543175e22bccc084d939f2b97d13985e4cb46a456ce8588d8eca361a39190e7e6409821b66f4e0c1afa61e8d48b6bfe8e7b68fd94343140c975b5405fbe289b156d8c291e3d03ec69153b7a0eb5980d344b694b0e12971aea8dec60330a19e58a44d60a13aa801a5b046985e6d1464bbe76b8ec53071f9ea9aac9dce6aec58e7b990eaa7bac22617aa812c1f219be78a3b44146f6864e5fa7e5d08fba440f2b11e65687b23fbad320ed2d2032a1b33b70ccaad666d7f35595c6de1d3eb25c638535b92009f6382b0ccec0f18f6e4b3a4fb761da0f920762ec84b7239e57d39053d516dc731a26ddd0e87a20ddd54e2d42a4eec74c7d5188a45a44d38bc8a0f0dc5dbbfe6cd2216dd5ddb2e4acea47cb648658aef10ec2c2dc21020d504ad942897718b8275817334f2035cf9a5ccfb86ad14555c09d97a64c920dbddbd5306bbb1c6bd40f229e4724005cfecb06a2c728889f5d43d1a6ed0edc20f07836f79df9baeb48d4433a9f2b27590dc8e2933d9e7b2c45cf6dc23b40834cc4ae87670e46a774dd9d2d193d0360eae4e95bdd828951a20df5d59a66674e619eb8825ae8a4a51b5c958309e3fe0d66d6bb3ccddeb62025ef0c0d3466c0d4c1a178c5053d268ad91d3d6dba10de656c308aca19b0a051c320a82a2614b0c1ba1adb99c602c79c85f2923a47bdb56e3c00fca4cb50b0581c35f42ee11c6bc2937056a698698bbf50c823c347a2532484bbfd1de48e5a99db40fc83adf0f8e8d5840f55ac82aa3d67e30ef32d2e7cde22caa966179219f8dc0806d6f55b1ea7b59bcfb3438e3faca4e923d2956fdd2ba41f63ddfa1fb5ea6f0beba8d5884c7c4f9ebbe863c81a3fe6c21a0fd9e4709e07c8c1a1bcdc59406f421769cc137bde890c9f59da797e369cd2a51d79ed35b26c21400a85f579bf951901ce7de2b2b8b13aa301e6f2e0058ab03af9c1f37ba2c86054409f9f340df0197f2c9df461ea6da9e0d52248139c2a49999c278f6b3a6aa882cf00c3a3df672c144d0c53bba83242e"}) 19:41:25 executing program 3: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010394000c", 0xd, 0x400}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000080)={[{@fault_injection}]}) [ 804.631960] erofs: read_super, device -> /dev/loop1 [ 804.637029] erofs: options -> [ 804.663557] erofs: read_super, device -> /dev/loop0 [ 804.669960] erofs: options -> [ 804.673994] erofs: blksize 1 isn't supported on this platform [ 804.678199] erofs: root inode @ nid 36 [ 804.696685] erofs: mounted on /dev/loop1 with opts: . 19:41:25 executing program 0: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e0", 0x4, 0x400}, {0x0, 0x3f00, 0x1000}], 0x0, &(0x7f0000000080)) 19:41:25 executing program 1: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c0024", 0xf, 0x400}, {&(0x7f0000000280)="050000040041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000080)) (fail_nth: 1) [ 804.769315] erofs: read_super, device -> /dev/loop3 [ 804.774469] erofs: read_super, device -> /dev/loop5 [ 804.790134] erofs: options -> fault_injection=0x0000000000000000, [ 804.798368] erofs: unmounted for /dev/loop1 [ 804.827327] erofs: options -> fault_injection=0x0000000000000000, [ 804.837201] erofs: FAULT_INJECTION was not selected [ 804.848184] erofs: read_super, device -> /dev/loop2 [ 804.851845] erofs: FAULT_INJECTION was not selected [ 804.864936] erofs: root inode @ nid 0 19:41:25 executing program 4: ioctl$BTRFS_IOC_INO_LOOKUP_USER(0xffffffffffffffff, 0xd000943e, 0x0) (async, rerun: 32) ioctl$BTRFS_IOC_INO_LOOKUP_USER(0xffffffffffffffff, 0xd000943e, 0x0) (async, rerun: 32) ioctl$BTRFS_IOC_INO_LOOKUP(0xffffffffffffffff, 0xd0009412, 0x0) (async) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) (async) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000005b100)={0x0, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}], 0x0, "e938c263edae7d"}) (async, rerun: 64) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000016000/0x18000)=nil, &(0x7f00000000c0)=[@textreal={0x8, &(0x7f0000000080)="baa100b000eef36cba2100ec66b9800000c00f326635001000000f30bad104ecc80080d267d9f8f30f1bb429000f20c06635200000000f22c067f3af", 0x3c}], 0x1, 0x0, 0x0, 0x0) (async, rerun: 64) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) (async, rerun: 64) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async, rerun: 64) r4 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) (async) ioctl$KVM_PPC_ALLOCATE_HTAB(r1, 0xc004aea7, &(0x7f0000000040)=0x9) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r4, 0x81e8943c, &(0x7f0000000280)) ioctl$KVM_SET_REGS(r4, 0x4090ae82, &(0x7f00000001c0)={[0x0, 0x0, 0x7f4, 0x0, 0x0, 0x80000000000800, 0x10000020000000f9], 0x100000, 0x200400}) (async) ioctl$KVM_RUN(r4, 0xae80, 0x0) (async) r5 = accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x80800) ioctl$BTRFS_IOC_INO_LOOKUP_USER(r5, 0xd000943e, &(0x7f0000000780)={r3, r2, "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", "97743a40578619c0ddfe20712ed860744e3090b23d6b2793b8e8e234a4bbcfde563cc33f72a481c977f18458dd39d502f7453f82525a6040383817a1d1a376fbd6b6ca44527cfa3fab53f3fd8e886898614393c1595f358d3eb951b16dde78e771eff6f3b16c86582df36edae68bb45ee570e501adf046465102e34eb580351c3598d3c0a6dac7fdf13f691bcc9d7128b4c34fa5834577cae145d137bbce57a3aa00dbb60e82717d97032a78e3259802f65211bf4efcb82e2b7db0a6a802287d3dd401fcc2bee876669537197112fe7c429fe7cd48fe78a414dc041b9b02e73be1ee968024d481a77e954fed361982fb2184001bf72d515106579018815d7a58b731a8b46cb8fac57f710d730cb0654d1af07e136bfec707476dac4f2652c2025b551f86a863d77db0d643139e310b5ec0ddd508af2bc186662773db5f823965160a2528f7112c4d283d682d7e5d04c4543442e03fae895e2c7226295916d0e6bbe572c920b868fcc1022ff116cc3113439dc22483712b654e7761a1afa4954878853497c4aa680cd6cc0476563ee9d2ae992168aaada90f0b83907be1da49b4fe051c33fcc6d591851f933bb2bde72d79692e37db6cde0f00e11ddcaad47d0596694c4ad0c43e8626e4006b2704866ac7da4c149140f891665902afd9e213c79f109bb490119b33448efc27e02566dc027ea6ff6c3f6496cdf4a4a69e8d5b446ebd52322c809840f965b8fcb04aeaf5208e3aae73399fa14dce4dc3d87530296799aa74c81423d289bf7c814ed5f67c1557871b44cf1d6f79ec1b907811848151b6df878f05c65217e928fd7b7d4a5dbfe76364337afa7859a1043c3605aa9c398f749967586f675d4ce35402ba8a1e164c97af34484b21e5a436d4ade5ab874f07dc34c8053ba257d2cf3eda85a68c8db70886f224eaa145ed6ed51acd3abf8878dd74e4a4ec5462ff801e034972aaf892c776923154144bd6d000192ba5581c6f5ce0a362c50c026fbc04685f3363757b6bfa3b160b8f890932b6eb5d21bb039b9bf2ee583dead0d074cf4c4b0ac88aefb51ff908dc7c7915c6b8f537c811ddde35b481ddbcfb99f76d87cc379051967f7da12fe4aec4bda90c61ffd9c828ca228afd6d5caf063685e7bed6d7f172c84f66f27240b938ae8edb18843511d76babd8acf0c6769b05c9d952a9fa0ca50551d2d6b4e057cda9a701a95bf6d5018e679ccf1d2e4079e9661510ec9c52c58cb7a3e0972f60b6d4099c0aa7c5bde57336d240120cc5fcf728b7d505b8436b6525108c60898ca1c9caad2ec014eabc97b3e0ff981f7213dead1bed331e918ff3cb591c226e0319c78929da34d4302d906a5be72ffb2e15167ac8e6cd4a3ee8f6df94e051cec7138364106ca8fda8abe8a9132fa4a323e25c8d8089f5d42fcf55250345a09867496d614c56a996ff09cda722b1e5ce99619b0c507975dc65427a0c15112060edbdddb7d3175c493c26bbe3ca4d656d6bd4a9be1433668543900316361b3e65ee16603934c1a1ea9e91826403f7040e74fdc6abb5bb3deb12145611ab44ec555d438fa96f78df043f7a625884fe564d21503262a4b1f446ebf690c9160f09bdcf8e47372aed851dc5ba5e362b6bf4bb01ea76518aeae09e41d23dfb52170f307c3fe913b830e6893a942244ac9f9227dca38af1c729ac0a72aaa4fa18137a9297cbb5e2ea52f2debaca1e6864c07592d56066aade2b95bff2477a2719902f7b1d13b94c4e75cc78d28eefd3145ce68c711ee652a2ebf14f8a3563f13005548f4568d0ca639a572f94b8473299e8ea8cecca49ee804f9f1b41f79b941eb5e33ae3e4386c0c6aa41a3581b2d6ecb973e56cef2c9abb3c768fadb1a126dd056471fdf5dddc7400908741472b9e0924747b50bfe7d508810dabb229813883fdffe18bed128c63abf306fcf0f28bc52c22a851f63bfd313baf7056d6fadff9b3e30512defa3ec4a38bbc6eb6181bc7836cb9c305132ff601c5778f8e09c4299eacadf4b07852690f20f175ac7e15a843de86cc8108c365622bf32f40e6f41a6180eaf4864b8b9b2320820c011140ca3641ba0c8032caf2d6ee45a34782c148fcf0d548aa6902b585f052a4667e4d682c9df578153c7122542e10e437b3ff5f75e6722d3ae894816300dc0b21e943f0c924c6a32316ebb797b9e9be8783a14fbc56eea5b45372c8b524d049d161f77c4db1114ff95f0053d9b4e2032b6146b63e883af9ef533d0664391e3b955bb55682a987535a835e6569d4c056966c2fe4a9bddbc5bd20332bb1170cb580d1a3ea69cc994327f96306d987584976fc079ce68d0f662eae0f148d85eb9611b9c52d5f214fd9bb9d0e722a29cf4d71cc4e3605e95ad0233e48f197eb630912f20dbb2eac20abba5b2e0da7fa3306cbbd2a5a94983bc95b2b773b45676a6e92986af371afa23a26e8ef3d90690c789ccb2850d3f3104854b85cb878f3b4ff017dad2c3db8f1bfbffbf4ed95243225e261d064775c19346128f5a108dd68a5067b5f9ff29cc316b82cb0be2d6e7286af1c02576b5bbb925806003eaa7574b4dcf0e862c44e2c4e0b5e319d5e741617c4f97b87acc8ce250946ad761f528770f3ff75a39ccbf959e042f628f8b3c3549e878cbaaa11eef02324e7f8bd9969789ec90518ce35aaa50eaba083cbcd58035014ef59cda3af7d7b9306ceaaf3bddafb4de8c110ccfaff93c96a4b8a1c329d383897cb91d11f44b797110f02b16a167810d573aa813919b7f946cafe439d8d8a4a760abb10370dbe47bed901aef623f85783567c3de93105595cb3ebb5bd416972921dd677c1803465ac92c94dd7c290b892acbc8cb7165c83ae5d7def834209c6a74bd8ebaca2381165030e8799dfa4f70a1342fd289b3c248e57ccfc0da98bfb96c120dc90496144c8d3deaf7b7398efe6389826673cc422f9d72cef19bb369e38e5529a97d6b80e14b78eb0197d961161a724a140e4617b6802a43037be24f35fea8a0ff8344275c35a28d4bfe53ee27755df71b412070fdc7eb2a657f0fb3f18c26fbddb5ef8817455a79b162a6547913c0adff3a8dd7ce7e0828cf7e93b420427494bc6ea53d0cfce85a957c8f9ee8f1974192579c815fd7be4c2080182a8f57e308646f739ea24f7e20bf81d5e2e35dfd654535f07214d98615af76d1f00f469e48ca318df156de939d74ccffa2e9ff13f26507c1d43d8d7bc989a498edfef9796175cdb54a5754548e1f996351682d6f8f99667fd671f0dfe418d659dce529eac7ec784c7b45fd4be376a9f42f5ee0870c217b7315082583cea27183fc03fb92ca96ebbf421db71cbe0ef1a39e3ca769d435a57d2adfbaadbc1d5fbdf6676d8033ed6a10d571d71df0dd53d3a849351864d25b160f234f1c89b5b6e014039e3b09b030d18084d86f4265a33e1e4a1dd119b0be7bc2a1ed2cabeb3da23e0cf3e04d904fdee8bf207320afdebe8b0e5a0f243a4a62c4af8c88249fdf64f85a8392b6309499daf0eba144d3ba7ca88c1c4b4da2b55a3da6defc53b0f49324d87038386d2cff20deff88b1f34f3bb08c10435de8b36e14960f8066b75850891f931c35e6b08142f53db8826ae135a64539918d03013d49b707488e66e83e1ab213de6300654aebc4020bcf56486bd2025cfdc95b0cddd23684b897c78d311d413c57f31434c1cdee34ba514acb8d0d16dfc45e4c0cb3fa27f58614f23f8e0e12fa36249e6926837b1093175a079f3e97ab9d62cda13c69bafea6decb76039d045b32d169686f528c612a0430ff35ee879d20918d7c83011df7a750de190d11ac9f478a971c4f5d1e1ad83e33b49ec8487f3e045bd6678568d973769c822de479b70afeb77e61cf0a4219d422e3cd9c7da88aae07511587a2dc0606c3e37e7e34b3081903924d61730158adb657491c38a92e2772eaf4bdaed728583087035bf2f0b50fbc8df07b118e6a15e336e7397ab6e4ae8d7331d11ab379e912730bb4fe383205fc76afef893527f8103cdb1168bf8923a8f0e76fc55a27ab3638486b18a095b7fae8fe24a0da122d64c7302b0c653ebd0ae618ff5b59fe33f5d3b98bf680313a2c01571b5e8c8395ae5580f63b7279df8b1e4f98745af4bbfdb3d48458826379eb0a1c7266f6d21d88cf95627d9b57644cdc8d7778102fdc85b4eb49ea1a67b78d4cce90b83ab5b65271a749c906738d2004371f17bbd6e58de1ab0625d8b32b6e6cbbe95c86ca50ca702a6719921bdd59cd7d950e26cbdf8b0307c12aa8b23aeed8e19a60021e6bba01f1b89c15ccc8d77f64ff5eafad33eb6885560028f6ce7741d3a3de1207d826ef1211a5f224ef4a2f52900799b2f9f5583f41cd1d6d2543175e22bccc084d939f2b97d13985e4cb46a456ce8588d8eca361a39190e7e6409821b66f4e0c1afa61e8d48b6bfe8e7b68fd94343140c975b5405fbe289b156d8c291e3d03ec69153b7a0eb5980d344b694b0e12971aea8dec60330a19e58a44d60a13aa801a5b046985e6d1464bbe76b8ec53071f9ea9aac9dce6aec58e7b990eaa7bac22617aa812c1f219be78a3b44146f6864e5fa7e5d08fba440f2b11e65687b23fbad320ed2d2032a1b33b70ccaad666d7f35595c6de1d3eb25c638535b92009f6382b0ccec0f18f6e4b3a4fb761da0f920762ec84b7239e57d39053d516dc731a26ddd0e87a20ddd54e2d42a4eec74c7d5188a45a44d38bc8a0f0dc5dbbfe6cd2216dd5ddb2e4acea47cb648658aef10ec2c2dc21020d504ad942897718b8275817334f2035cf9a5ccfb86ad14555c09d97a64c920dbddbd5306bbb1c6bd40f229e4724005cfecb06a2c728889f5d43d1a6ed0edc20f07836f79df9baeb48d4433a9f2b27590dc8e2933d9e7b2c45cf6dc23b40834cc4ae87670e46a774dd9d2d193d0360eae4e95bdd828951a20df5d59a66674e619eb8825ae8a4a51b5c958309e3fe0d66d6bb3ccddeb62025ef0c0d3466c0d4c1a178c5053d268ad91d3d6dba10de656c308aca19b0a051c320a82a2614b0c1ba1adb99c602c79c85f2923a47bdb56e3c00fca4cb50b0581c35f42ee11c6bc2937056a698698bbf50c823c347a2532484bbfd1de48e5a99db40fc83adf0f8e8d5840f55ac82aa3d67e30ef32d2e7cde22caa966179219f8dc0806d6f55b1ea7b59bcfb3438e3faca4e923d2956fdd2ba41f63ddfa1fb5ea6f0beba8d5884c7c4f9ebbe863c81a3fe6c21a0fd9e4709e07c8c1a1bcdc59406f421769cc137bde890c9f59da797e369cd2a51d79ed35b26c21400a85f579bf951901ce7de2b2b8b13aa301e6f2e0058ab03af9c1f37ba2c86054409f9f340df0197f2c9df461ea6da9e0d52248139c2a49999c278f6b3a6aa882cf00c3a3df672c144d0c53bba83242e"}) [ 804.871851] erofs: options -> fault_injection=0x0000000000000000, [ 804.883125] erofs: root inode @ nid 36 [ 804.891087] erofs: bogus i_mode (0) @ nid 0 [ 804.894876] erofs: read_super, device -> /dev/loop0 [ 804.905821] erofs: bogus i_mode (0) @ nid 36 [ 804.922162] erofs: options -> [ 804.930046] erofs: blksize 1 isn't supported on this platform [ 804.936100] erofs: FAULT_INJECTION was not selected [ 804.940357] FAULT_INJECTION: forcing a failure. [ 804.940357] name failslab, interval 1, probability 0, space 0, times 0 [ 804.954303] erofs: root inode @ nid 36 [ 804.958741] CPU: 0 PID: 6937 Comm: syz-executor.1 Not tainted 4.19.211-syzkaller #0 [ 804.966644] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 804.976010] Call Trace: [ 804.978614] dump_stack+0x1fc/0x2ef [ 804.982241] should_fail.cold+0xa/0xf [ 804.986032] ? setup_fault_attr+0x200/0x200 [ 804.990343] ? lock_acquire+0x170/0x3c0 [ 804.994312] __should_failslab+0x115/0x180 [ 804.998543] should_failslab+0x5/0x10 [ 805.002334] __kmalloc+0x2ab/0x3c0 [ 805.005866] ? __se_sys_memfd_create+0xf8/0x440 [ 805.010527] __se_sys_memfd_create+0xf8/0x440 [ 805.015011] ? memfd_file_seals_ptr+0x150/0x150 [ 805.019677] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 805.025030] ? trace_hardirqs_off_caller+0x6e/0x210 [ 805.030036] ? do_syscall_64+0x21/0x620 [ 805.034003] do_syscall_64+0xf9/0x620 [ 805.037797] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 805.042994] RIP: 0033:0x7ff03e650eb9 [ 805.046697] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 805.065602] RSP: 002b:00007ff03cfc5f28 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 805.073301] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007ff03e650eb9 19:41:26 executing program 5: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467006600000c0024", 0xf, 0x400}, {&(0x7f0000000280)="05", 0x1, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000080)={[{@fault_injection}]}) [ 805.080561] RDX: 0000000000002000 RSI: 0000000000000000 RDI: 00007ff03e6aa1e0 [ 805.087823] RBP: 0000000000000003 R08: 0000000000001000 R09: 00007ff03cfc61d0 [ 805.095080] R10: 0000000000000003 R11: 0000000000000246 R12: 0000000008100000 [ 805.102334] R13: 0000000020000100 R14: 0000000000002000 R15: 0000000020000080 [ 805.110526] erofs: mounted on /dev/loop2 with opts: fault_injection=0x0000000000000000. 19:41:26 executing program 4: ioctl$BTRFS_IOC_INO_LOOKUP_USER(0xffffffffffffffff, 0xd000943e, 0x0) (async) ioctl$BTRFS_IOC_INO_LOOKUP_USER(0xffffffffffffffff, 0xd000943e, 0x0) ioctl$BTRFS_IOC_INO_LOOKUP(0xffffffffffffffff, 0xd0009412, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) (async) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) (async) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) (async) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) (async) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000005b100)={0x0, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}], 0x0, "e938c263edae7d"}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000016000/0x18000)=nil, &(0x7f00000000c0)=[@textreal={0x8, &(0x7f0000000080)="baa100b000eef36cba2100ec66b9800000c00f326635001000000f30bad104ecc80080d267d9f8f30f1bb429000f20c06635200000000f22c067f3af", 0x3c}], 0x1, 0x0, 0x0, 0x0) (async) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) (async) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) r4 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) (async) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) (async) ioctl$KVM_PPC_ALLOCATE_HTAB(r1, 0xc004aea7, &(0x7f0000000040)=0x9) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r4, 0x81e8943c, &(0x7f0000000280)) ioctl$KVM_SET_REGS(r4, 0x4090ae82, &(0x7f00000001c0)={[0x0, 0x0, 0x7f4, 0x0, 0x0, 0x80000000000800, 0x10000020000000f9], 0x100000, 0x200400}) (async) ioctl$KVM_RUN(r4, 0xae80, 0x0) r5 = accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x80800) ioctl$BTRFS_IOC_INO_LOOKUP_USER(r5, 0xd000943e, &(0x7f0000000780)={r3, r2, "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", "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"}) 19:41:26 executing program 1: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c0024", 0xf, 0x400}, {&(0x7f0000000280)="050000040041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000080)) (fail_nth: 2) 19:41:26 executing program 2: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c0024", 0xf, 0x400}, {&(0x7f0000000280)="05000000c041", 0x6, 0x480}, {0x0, 0x300, 0x1000}], 0x0, &(0x7f0000000080)={[{@fault_injection}]}) 19:41:26 executing program 0: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e0", 0x4, 0x400}, {0x0, 0x4000, 0x1000}], 0x0, &(0x7f0000000080)) 19:41:26 executing program 3: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010395000c", 0xd, 0x400}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000080)={[{@fault_injection}]}) [ 805.240189] erofs: unmounted for /dev/loop2 [ 805.279193] FAULT_INJECTION: forcing a failure. [ 805.279193] name failslab, interval 1, probability 0, space 0, times 0 [ 805.289739] erofs: read_super, device -> /dev/loop5 [ 805.315923] CPU: 0 PID: 6957 Comm: syz-executor.1 Not tainted 4.19.211-syzkaller #0 [ 805.318767] erofs: options -> fault_injection=0x0000000000000000, [ 805.323754] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 805.323761] Call Trace: [ 805.323786] dump_stack+0x1fc/0x2ef [ 805.323805] should_fail.cold+0xa/0xf [ 805.323824] ? setup_fault_attr+0x200/0x200 [ 805.353721] ? lock_acquire+0x170/0x3c0 [ 805.357720] __should_failslab+0x115/0x180 [ 805.361970] should_failslab+0x5/0x10 [ 805.365786] kmem_cache_alloc+0x277/0x370 [ 805.369946] ? shmem_destroy_callback+0xb0/0xb0 [ 805.374633] shmem_alloc_inode+0x18/0x40 [ 805.378705] ? shmem_destroy_callback+0xb0/0xb0 [ 805.383130] erofs: read_super, device -> /dev/loop0 [ 805.383383] alloc_inode+0x5d/0x180 [ 805.392046] new_inode+0x1d/0xf0 [ 805.395427] shmem_get_inode+0x96/0x8d0 [ 805.399417] __shmem_file_setup.part.0+0x7a/0x2b0 [ 805.401666] erofs: read_super, device -> /dev/loop2 [ 805.404268] shmem_file_setup+0x61/0x90 [ 805.404286] __se_sys_memfd_create+0x26b/0x440 [ 805.404301] ? memfd_file_seals_ptr+0x150/0x150 [ 805.404321] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 805.409539] erofs: options -> [ 805.413319] ? trace_hardirqs_off_caller+0x6e/0x210 [ 805.413336] ? do_syscall_64+0x21/0x620 [ 805.413354] do_syscall_64+0xf9/0x620 [ 805.413372] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 805.413386] RIP: 0033:0x7ff03e650eb9 [ 805.443745] erofs: options -> fault_injection=0x0000000000000000, [ 805.444070] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 805.450273] erofs: blksize 1 isn't supported on this platform [ 805.452939] RSP: 002b:00007ff03cfc5f28 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 805.452955] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007ff03e650eb9 [ 805.452963] RDX: 0000000000002000 RSI: 0000000000000000 RDI: 00007ff03e6aa1e0 [ 805.453008] RBP: 0000000000000003 R08: 0000000000001000 R09: 00007ff03cfc61d0 [ 805.453020] R10: 0000000000000003 R11: 0000000000000246 R12: 0000000008100000 [ 805.469093] erofs: FAULT_INJECTION was not selected 19:41:26 executing program 4: syz_mount_image$f2fs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0xd, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}, {&(0x7f0000010a00)="1797f96f00000000001000000000000002000000000000000d0000001000000012000000000000000100000002000000ffffffffffffffffffffffffffffffffffffffff01000000000000000000000000000000030000000b00000005000000ffffffffffffffffffffffffffffffffffffffff010000000000000000000000000000008501000006000000010000000100000001000000040000004000000040000000fc0f", 0xa6, 0x200000}, {&(0x7f0000010b00)="0000000000000000000000000000000000000000000000000000000080d87d5a01000300000000030000000010", 0x2d, 0x200fe0}, {&(0x7f0000010c00)="000000000000000000000000000000000000000000000000000000060000000000010c80", 0x24, 0x2011e0}, {&(0x7f0000010d00)="000000000000000000000001", 0xc, 0x201240}, {&(0x7f0000010e00)="0000000000000000000000000000000000000000000000000002", 0x1a, 0x201280}, {&(0x7f0000010f00)="0000000000000003", 0x8, 0x2012e0}, {&(0x7f0000011000)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\v', 0x16, 0x201320}, {&(0x7f0000011100)="00000005", 0x4, 0x201380}, {&(0x7f0000011600)="00000000000000000000000000000000000000000000000000000001000000001797f96f00000000001000000000000002000000000000000d0000001000000012000000000000000100000002000000ffffffffffffffffffffffffffffffffffffffff01000000000000000000000000000000030000000b00000005000000ffffffffffffffffffffffffffffffffffffffff010000000000000000000000000000008501000006000000010000000100000001000000040000004000000040000000fc0f", 0xc6, 0x204fe0}, {&(0x7f0000011700)="0000000000000000000000000000000000000000000000000000000080d87d5a", 0x20, 0x205fe0}, {&(0x7f0000011f00)="ed4100005cf90100535f010002000000001000000000000002", 0x19, 0x1000000}, {&(0x7f0000012100)="00000000000000000300000003", 0xd, 0x1000fe0}], 0x0, &(0x7f0000000040)={[{@data_flush}]}) syz_mount_image$erofs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x5, 0x8, &(0x7f0000000880)=[{&(0x7f0000000140)="54734beaacfb9da64e25a9ffc3a1c176775166609b333f1b1127d066b7730d54f123db4d64398d883610de086231e73f166856b49ca120f3fd814dec67d61e8dbde0d16bb560f50fc88f3b3d85e62ded7c0dcd2a61572ab58039af4465361f8869a2e9d0b43b19e23596f12355ac38c6d703cc3b68f3370380680764101e593a43b901591f30fa78c3145d90f8b8f52ce81d1d6c0dfac9340a74bee894a2", 0x9e}, {&(0x7f0000000340)="bcae8369c7402b0c33fd1f9a76bd77802b7ff092ff9cd576b18acf4593d8a0fc4968d2b9eccd2d1d6fbbcf2047730f2ef2e623c3e8f72b72ed255790f92b487fd1a6cb92302da860d6cf5fbebaa15c2f6cb4a6b9b27370893ff43b3254a37f752d561bc8d780a31cb8734520f6d497f7c79c4a60eb85d5788b01ea9a1ccd41b77ef44ee55edddc6c39376c97e034a20a8d", 0x91, 0x5}, {&(0x7f0000000400)="573d697b4be27ce6e4ecdfc5dcc93296058b2e55f8bfe0f943b83604235766e05b655dddaee0b5f84384d44ce1b3d1e4f3f7a0f6d9f89abb2f94d6de69ced41e20facb040159c90e23342e415f0a02c3b70e17f4d1128521e32ae6374a51df34f62417cde6bc6476ee76554e2642837d9a9616e4e28cd3797a4c7879066fd80e76012771711490d2a7ee94f03b5ef37070021bec2c7103cc885d1203d85bfc2d761bbf7fbc67abc95b78eb68cce1ea6b52efbc4a59d9726626ab45d8e555afe1227a68", 0xc3, 0x7}, {&(0x7f0000000500)="3dd3a9bfaead80b2b6800219df3af8518411cd5fd53e", 0x16, 0x8}, {&(0x7f0000000540)="642f025f930112224506c3ca78a3bbc77b165d599ea25bb14cdb371ec78602543c99bad2b391c129d92cb3b66beddab90ef90123c45ef26573d2a4dfa1a1e26bdc96ea075bad221b07a1d2ddaf430f7be9375e95fc1d486b45f148e8c3d1265cd349b7cbe6bc723006055f11335bb5f66b2e1732af8e4c72d9e144cbf7c53cc8e617f2f3767287d7c661e3a1249a111dbca0a3f78ffe6aa7ba9c23ffb8cdb3400f935c810e6a2ac484473cd92b3dad7d840aab6efdf89f6e11c9aa46d5ed869033c7012127616953b523a304dd9c2975a5938f836026b4768c60c03587e6166a", 0xe0, 0x40}, {&(0x7f0000000640)="de4215dfb6f7b3c38fc6a93c6f7e35603850f74a58a31628a2cb0b71dffb7d45fadb9da886d9ded24a53c5488a2d840f6a5d54c3a3ec3b9821e1f089cb4bbb871c3bf5d868e231c0f040738527014b69ce68e60a0e6d4fe66515c9fb44010e1ee718c4d67638da3379e14af3e1839ba7098c6df97c84c7fadd8644f3d9f9b5a47c5edfc9f87431e944dcaa6b7d333588436eda5c15d79bda570ddc0f78c0e277640f9ac3b6a6360b9f4ef616cdd868332bbfc050055009614175f0d843d04e9ab13d1ad8b1686f70a4693aebdc3f48e47f1240da8506bba0b938ecce07fb622520e09f", 0xe3, 0x6}, {&(0x7f0000000740)="386b79409d49d93b70eb99019f631ce8deaaa2aa32112276a41713ba8fe57b8d221b7bf020d7e406b386f447ca5ab123b6e49a63efa563543c24bb5b6f9e86b5cee4ccdc29f460b95b5a0f31a23a4b36bc912a7599d7ff27a7ad9d1652614467bad6df7b2cde028534760a00f207d62d141d44d6aecc1b85e8e924eda74838ea26975a1a401a9a482b8d86569c0a35d9754c0503c8a16bd30411b543ffde583624e74f8b4690db9a2665cb4db0", 0xad, 0x10000}, {&(0x7f0000000800)="3cfad9c837cfe594db7bd23b01de33b51b44b13ba62282cdf6a6a9a439e9e00a06086e035f803941c0d6710e21ae1540e39a01ebff0d3cb8287050f65d0d454d4390469c8f7b71eab7ece77a1a79d44469ebd86454b059bf665123aaf35006ff2d7b", 0x62, 0xffffffff7fffffff}], 0x1034001, &(0x7f0000000940)={[{@noacl}, {@nouser_xattr}, {@acl}], [{@smackfstransmute={'smackfstransmute', 0x3d, 'data_flush'}}, {@subj_user={'subj_user', 0x3d, 'f2fs\x00'}}, {@fscontext={'fscontext', 0x3d, 'sysadm_u'}}, {@fsuuid={'fsuuid', 0x3d, {[0x30, 0x64, 0x37, 0x0, 0x65, 0x30, 0x34, 0x38], 0x2d, [0x33, 0x65, 0x34, 0x34], 0x2d, [0x33, 0x37, 0x30, 0x61], 0x2d, [0x32, 0x36, 0x36, 0x65], 0x2d, [0x61, 0x66, 0x30, 0x39, 0x62, 0x31, 0x64, 0x36]}}}]}) mount$9p_xen(&(0x7f00000009c0), &(0x7f0000000a00)='./file0\x00', &(0x7f0000000a40), 0x4, &(0x7f0000000a80)={'trans=xen,', {[{@version_9p2000}, {@debug={'debug', 0x3d, 0x9}}, {@fscache}, {@cache_mmap}, {@debug={'debug', 0x3d, 0xfffffffffffffff9}}, {@cache_loose}, {@noextend}, {}], [{@fscontext={'fscontext', 0x3d, 'sysadm_u'}}, {@fsname={'fsname', 0x3d, ',/--,'}}, {@appraise_type}]}}) 19:41:26 executing program 1: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c0024", 0xf, 0x400}, {&(0x7f0000000280)="050000040041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000080)) (fail_nth: 3) 19:41:26 executing program 5: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467007600000c0024", 0xf, 0x400}, {&(0x7f0000000280)="05", 0x1, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000080)={[{@fault_injection}]}) [ 805.478129] R13: 0000000020000100 R14: 0000000000002000 R15: 0000000020000080 [ 805.534594] erofs: FAULT_INJECTION was not selected [ 805.540136] erofs: root inode @ nid 36 [ 805.544328] erofs: bogus i_mode (0) @ nid 36 [ 805.555059] erofs: root inode @ nid 36 [ 805.561253] erofs: mounted on /dev/loop2 with opts: fault_injection=0x0000000000000000. [ 805.618993] erofs: read_super, device -> /dev/loop3 [ 805.624039] erofs: options -> fault_injection=0x0000000000000000, 19:41:26 executing program 0: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e0", 0x4, 0x400}, {0x0, 0x4800, 0x1000}], 0x0, &(0x7f0000000080)) 19:41:26 executing program 2: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c0024", 0xf, 0x400}, {&(0x7f0000000280)="05000000c041", 0x6, 0x480}, {0x0, 0x500, 0x1000}], 0x0, &(0x7f0000000080)={[{@fault_injection}]}) [ 805.681972] erofs: read_super, device -> /dev/loop5 [ 805.702257] erofs: unmounted for /dev/loop2 [ 805.706553] erofs: options -> fault_injection=0x0000000000000000, [ 805.716086] erofs: FAULT_INJECTION was not selected [ 805.720394] erofs: FAULT_INJECTION was not selected [ 805.726261] erofs: root inode @ nid 36 [ 805.734398] erofs: root inode @ nid 0 [ 805.735699] FAULT_INJECTION: forcing a failure. [ 805.735699] name failslab, interval 1, probability 0, space 0, times 0 [ 805.744579] erofs: bogus i_mode (0) @ nid 0 [ 805.755996] erofs: bogus i_mode (0) @ nid 36 [ 805.760795] CPU: 1 PID: 6996 Comm: syz-executor.1 Not tainted 4.19.211-syzkaller #0 [ 805.768605] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 805.777960] Call Trace: [ 805.780557] dump_stack+0x1fc/0x2ef [ 805.784200] should_fail.cold+0xa/0xf [ 805.788010] ? setup_fault_attr+0x200/0x200 [ 805.792338] ? lock_acquire+0x170/0x3c0 [ 805.796329] __should_failslab+0x115/0x180 [ 805.800574] should_failslab+0x5/0x10 [ 805.804386] kmem_cache_alloc+0x277/0x370 [ 805.808546] __d_alloc+0x2b/0xa10 [ 805.812106] d_alloc_pseudo+0x19/0x70 [ 805.815903] alloc_file_pseudo+0xc6/0x250 [ 805.820148] ? alloc_file+0x4d0/0x4d0 [ 805.823939] ? lockdep_annotate_inode_mutex_key+0x43/0x130 [ 805.829547] ? shmem_get_inode+0x44c/0x8d0 [ 805.833771] __shmem_file_setup.part.0+0x102/0x2b0 [ 805.838736] shmem_file_setup+0x61/0x90 [ 805.842698] __se_sys_memfd_create+0x26b/0x440 [ 805.847265] ? memfd_file_seals_ptr+0x150/0x150 [ 805.851920] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 805.857265] ? trace_hardirqs_off_caller+0x6e/0x210 [ 805.862262] ? do_syscall_64+0x21/0x620 [ 805.866268] do_syscall_64+0xf9/0x620 [ 805.870055] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 805.875230] RIP: 0033:0x7ff03e650eb9 [ 805.878928] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 19:41:27 executing program 1: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c0024", 0xf, 0x400}, {&(0x7f0000000280)="050000040041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000080)) (fail_nth: 4) [ 805.897820] RSP: 002b:00007ff03cfc5f28 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 805.905526] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007ff03e650eb9 [ 805.912781] RDX: 0000000000002000 RSI: 0000000000000000 RDI: 00007ff03e6aa1e0 [ 805.920039] RBP: 0000000000000003 R08: 0000000000001000 R09: 00007ff03cfc61d0 [ 805.927290] R10: 0000000000000003 R11: 0000000000000246 R12: 0000000008100000 [ 805.934557] R13: 0000000020000100 R14: 0000000000002000 R15: 0000000020000080 [ 806.039845] FAULT_INJECTION: forcing a failure. [ 806.039845] name failslab, interval 1, probability 0, space 0, times 0 [ 806.046647] erofs: read_super, device -> /dev/loop2 [ 806.056678] erofs: read_super, device -> /dev/loop0 [ 806.057147] CPU: 0 PID: 7010 Comm: syz-executor.1 Not tainted 4.19.211-syzkaller #0 [ 806.069502] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 806.078855] Call Trace: [ 806.081202] erofs: options -> [ 806.081459] dump_stack+0x1fc/0x2ef [ 806.081479] should_fail.cold+0xa/0xf [ 806.081498] ? setup_fault_attr+0x200/0x200 [ 806.085950] erofs: options -> fault_injection=0x0000000000000000, [ 806.088293] ? lock_acquire+0x170/0x3c0 [ 806.088316] __should_failslab+0x115/0x180 [ 806.088334] should_failslab+0x5/0x10 [ 806.088347] kmem_cache_alloc+0x277/0x370 [ 806.088365] __alloc_file+0x21/0x340 [ 806.088385] alloc_empty_file+0x6d/0x170 [ 806.088401] alloc_file+0x5e/0x4d0 [ 806.094780] erofs: blksize 1 isn't supported on this platform [ 806.096512] alloc_file_pseudo+0x165/0x250 [ 806.096531] ? alloc_file+0x4d0/0x4d0 [ 806.096546] ? lockdep_annotate_inode_mutex_key+0x43/0x130 [ 806.096567] ? shmem_get_inode+0x44c/0x8d0 [ 806.154108] __shmem_file_setup.part.0+0x102/0x2b0 [ 806.159050] shmem_file_setup+0x61/0x90 [ 806.163038] __se_sys_memfd_create+0x26b/0x440 [ 806.167631] ? memfd_file_seals_ptr+0x150/0x150 [ 806.172310] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 806.177688] ? trace_hardirqs_off_caller+0x6e/0x210 [ 806.182717] ? do_syscall_64+0x21/0x620 [ 806.186707] do_syscall_64+0xf9/0x620 [ 806.190521] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 806.195712] RIP: 0033:0x7ff03e650eb9 [ 806.199418] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 806.218311] RSP: 002b:00007ff03cfc5f28 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 806.226015] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007ff03e650eb9 [ 806.233271] RDX: 0000000000002000 RSI: 0000000000000000 RDI: 00007ff03e6aa1e0 19:41:27 executing program 4: syz_mount_image$f2fs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0xd, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}, {&(0x7f0000010a00)="1797f96f00000000001000000000000002000000000000000d0000001000000012000000000000000100000002000000ffffffffffffffffffffffffffffffffffffffff01000000000000000000000000000000030000000b00000005000000ffffffffffffffffffffffffffffffffffffffff010000000000000000000000000000008501000006000000010000000100000001000000040000004000000040000000fc0f", 0xa6, 0x200000}, {&(0x7f0000010b00)="0000000000000000000000000000000000000000000000000000000080d87d5a01000300000000030000000010", 0x2d, 0x200fe0}, {&(0x7f0000010c00)="000000000000000000000000000000000000000000000000000000060000000000010c80", 0x24, 0x2011e0}, {&(0x7f0000010d00)="000000000000000000000001", 0xc, 0x201240}, {&(0x7f0000010e00)="0000000000000000000000000000000000000000000000000002", 0x1a, 0x201280}, {&(0x7f0000010f00)="0000000000000003", 0x8, 0x2012e0}, {&(0x7f0000011000)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\v', 0x16, 0x201320}, {&(0x7f0000011100)="00000005", 0x4, 0x201380}, {&(0x7f0000011600)="00000000000000000000000000000000000000000000000000000001000000001797f96f00000000001000000000000002000000000000000d0000001000000012000000000000000100000002000000ffffffffffffffffffffffffffffffffffffffff01000000000000000000000000000000030000000b00000005000000ffffffffffffffffffffffffffffffffffffffff010000000000000000000000000000008501000006000000010000000100000001000000040000004000000040000000fc0f", 0xc6, 0x204fe0}, {&(0x7f0000011700)="0000000000000000000000000000000000000000000000000000000080d87d5a", 0x20, 0x205fe0}, {&(0x7f0000011f00)="ed4100005cf90100535f010002000000001000000000000002", 0x19, 0x1000000}, {&(0x7f0000012100)="00000000000000000300000003", 0xd, 0x1000fe0}], 0x0, &(0x7f0000000040)={[{@data_flush}]}) syz_mount_image$erofs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x5, 0x8, &(0x7f0000000880)=[{&(0x7f0000000140)="54734beaacfb9da64e25a9ffc3a1c176775166609b333f1b1127d066b7730d54f123db4d64398d883610de086231e73f166856b49ca120f3fd814dec67d61e8dbde0d16bb560f50fc88f3b3d85e62ded7c0dcd2a61572ab58039af4465361f8869a2e9d0b43b19e23596f12355ac38c6d703cc3b68f3370380680764101e593a43b901591f30fa78c3145d90f8b8f52ce81d1d6c0dfac9340a74bee894a2", 0x9e}, {&(0x7f0000000340)="bcae8369c7402b0c33fd1f9a76bd77802b7ff092ff9cd576b18acf4593d8a0fc4968d2b9eccd2d1d6fbbcf2047730f2ef2e623c3e8f72b72ed255790f92b487fd1a6cb92302da860d6cf5fbebaa15c2f6cb4a6b9b27370893ff43b3254a37f752d561bc8d780a31cb8734520f6d497f7c79c4a60eb85d5788b01ea9a1ccd41b77ef44ee55edddc6c39376c97e034a20a8d", 0x91, 0x5}, {&(0x7f0000000400)="573d697b4be27ce6e4ecdfc5dcc93296058b2e55f8bfe0f943b83604235766e05b655dddaee0b5f84384d44ce1b3d1e4f3f7a0f6d9f89abb2f94d6de69ced41e20facb040159c90e23342e415f0a02c3b70e17f4d1128521e32ae6374a51df34f62417cde6bc6476ee76554e2642837d9a9616e4e28cd3797a4c7879066fd80e76012771711490d2a7ee94f03b5ef37070021bec2c7103cc885d1203d85bfc2d761bbf7fbc67abc95b78eb68cce1ea6b52efbc4a59d9726626ab45d8e555afe1227a68", 0xc3, 0x7}, {&(0x7f0000000500)="3dd3a9bfaead80b2b6800219df3af8518411cd5fd53e", 0x16, 0x8}, {&(0x7f0000000540)="642f025f930112224506c3ca78a3bbc77b165d599ea25bb14cdb371ec78602543c99bad2b391c129d92cb3b66beddab90ef90123c45ef26573d2a4dfa1a1e26bdc96ea075bad221b07a1d2ddaf430f7be9375e95fc1d486b45f148e8c3d1265cd349b7cbe6bc723006055f11335bb5f66b2e1732af8e4c72d9e144cbf7c53cc8e617f2f3767287d7c661e3a1249a111dbca0a3f78ffe6aa7ba9c23ffb8cdb3400f935c810e6a2ac484473cd92b3dad7d840aab6efdf89f6e11c9aa46d5ed869033c7012127616953b523a304dd9c2975a5938f836026b4768c60c03587e6166a", 0xe0, 0x40}, {&(0x7f0000000640)="de4215dfb6f7b3c38fc6a93c6f7e35603850f74a58a31628a2cb0b71dffb7d45fadb9da886d9ded24a53c5488a2d840f6a5d54c3a3ec3b9821e1f089cb4bbb871c3bf5d868e231c0f040738527014b69ce68e60a0e6d4fe66515c9fb44010e1ee718c4d67638da3379e14af3e1839ba7098c6df97c84c7fadd8644f3d9f9b5a47c5edfc9f87431e944dcaa6b7d333588436eda5c15d79bda570ddc0f78c0e277640f9ac3b6a6360b9f4ef616cdd868332bbfc050055009614175f0d843d04e9ab13d1ad8b1686f70a4693aebdc3f48e47f1240da8506bba0b938ecce07fb622520e09f", 0xe3, 0x6}, {&(0x7f0000000740)="386b79409d49d93b70eb99019f631ce8deaaa2aa32112276a41713ba8fe57b8d221b7bf020d7e406b386f447ca5ab123b6e49a63efa563543c24bb5b6f9e86b5cee4ccdc29f460b95b5a0f31a23a4b36bc912a7599d7ff27a7ad9d1652614467bad6df7b2cde028534760a00f207d62d141d44d6aecc1b85e8e924eda74838ea26975a1a401a9a482b8d86569c0a35d9754c0503c8a16bd30411b543ffde583624e74f8b4690db9a2665cb4db0", 0xad, 0x10000}, {&(0x7f0000000800)="3cfad9c837cfe594db7bd23b01de33b51b44b13ba62282cdf6a6a9a439e9e00a06086e035f803941c0d6710e21ae1540e39a01ebff0d3cb8287050f65d0d454d4390469c8f7b71eab7ece77a1a79d44469ebd86454b059bf665123aaf35006ff2d7b", 0x62, 0xffffffff7fffffff}], 0x1034001, &(0x7f0000000940)={[{@noacl}, {@nouser_xattr}, {@acl}], [{@smackfstransmute={'smackfstransmute', 0x3d, 'data_flush'}}, {@subj_user={'subj_user', 0x3d, 'f2fs\x00'}}, {@fscontext={'fscontext', 0x3d, 'sysadm_u'}}, {@fsuuid={'fsuuid', 0x3d, {[0x30, 0x64, 0x37, 0x0, 0x65, 0x30, 0x34, 0x38], 0x2d, [0x33, 0x65, 0x34, 0x34], 0x2d, [0x33, 0x37, 0x30, 0x61], 0x2d, [0x32, 0x36, 0x36, 0x65], 0x2d, [0x61, 0x66, 0x30, 0x39, 0x62, 0x31, 0x64, 0x36]}}}]}) mount$9p_xen(&(0x7f00000009c0), &(0x7f0000000a00)='./file0\x00', &(0x7f0000000a40), 0x4, &(0x7f0000000a80)={'trans=xen,', {[{@version_9p2000}, {@debug={'debug', 0x3d, 0x9}}, {@fscache}, {@cache_mmap}, {@debug={'debug', 0x3d, 0xfffffffffffffff9}}, {@cache_loose}, {@noextend}, {}], [{@fscontext={'fscontext', 0x3d, 'sysadm_u'}}, {@fsname={'fsname', 0x3d, ',/--,'}}, {@appraise_type}]}}) syz_mount_image$f2fs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0xd, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}, {&(0x7f0000010a00)="1797f96f00000000001000000000000002000000000000000d0000001000000012000000000000000100000002000000ffffffffffffffffffffffffffffffffffffffff01000000000000000000000000000000030000000b00000005000000ffffffffffffffffffffffffffffffffffffffff010000000000000000000000000000008501000006000000010000000100000001000000040000004000000040000000fc0f", 0xa6, 0x200000}, {&(0x7f0000010b00)="0000000000000000000000000000000000000000000000000000000080d87d5a01000300000000030000000010", 0x2d, 0x200fe0}, {&(0x7f0000010c00)="000000000000000000000000000000000000000000000000000000060000000000010c80", 0x24, 0x2011e0}, {&(0x7f0000010d00)="000000000000000000000001", 0xc, 0x201240}, {&(0x7f0000010e00)="0000000000000000000000000000000000000000000000000002", 0x1a, 0x201280}, {&(0x7f0000010f00)="0000000000000003", 0x8, 0x2012e0}, {&(0x7f0000011000)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\v', 0x16, 0x201320}, {&(0x7f0000011100)="00000005", 0x4, 0x201380}, {&(0x7f0000011600)="00000000000000000000000000000000000000000000000000000001000000001797f96f00000000001000000000000002000000000000000d0000001000000012000000000000000100000002000000ffffffffffffffffffffffffffffffffffffffff01000000000000000000000000000000030000000b00000005000000ffffffffffffffffffffffffffffffffffffffff010000000000000000000000000000008501000006000000010000000100000001000000040000004000000040000000fc0f", 0xc6, 0x204fe0}, {&(0x7f0000011700)="0000000000000000000000000000000000000000000000000000000080d87d5a", 0x20, 0x205fe0}, {&(0x7f0000011f00)="ed4100005cf90100535f010002000000001000000000000002", 0x19, 0x1000000}, {&(0x7f0000012100)="00000000000000000300000003", 0xd, 0x1000fe0}], 0x0, &(0x7f0000000040)={[{@data_flush}]}) (async) syz_mount_image$erofs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x5, 0x8, &(0x7f0000000880)=[{&(0x7f0000000140)="54734beaacfb9da64e25a9ffc3a1c176775166609b333f1b1127d066b7730d54f123db4d64398d883610de086231e73f166856b49ca120f3fd814dec67d61e8dbde0d16bb560f50fc88f3b3d85e62ded7c0dcd2a61572ab58039af4465361f8869a2e9d0b43b19e23596f12355ac38c6d703cc3b68f3370380680764101e593a43b901591f30fa78c3145d90f8b8f52ce81d1d6c0dfac9340a74bee894a2", 0x9e}, {&(0x7f0000000340)="bcae8369c7402b0c33fd1f9a76bd77802b7ff092ff9cd576b18acf4593d8a0fc4968d2b9eccd2d1d6fbbcf2047730f2ef2e623c3e8f72b72ed255790f92b487fd1a6cb92302da860d6cf5fbebaa15c2f6cb4a6b9b27370893ff43b3254a37f752d561bc8d780a31cb8734520f6d497f7c79c4a60eb85d5788b01ea9a1ccd41b77ef44ee55edddc6c39376c97e034a20a8d", 0x91, 0x5}, {&(0x7f0000000400)="573d697b4be27ce6e4ecdfc5dcc93296058b2e55f8bfe0f943b83604235766e05b655dddaee0b5f84384d44ce1b3d1e4f3f7a0f6d9f89abb2f94d6de69ced41e20facb040159c90e23342e415f0a02c3b70e17f4d1128521e32ae6374a51df34f62417cde6bc6476ee76554e2642837d9a9616e4e28cd3797a4c7879066fd80e76012771711490d2a7ee94f03b5ef37070021bec2c7103cc885d1203d85bfc2d761bbf7fbc67abc95b78eb68cce1ea6b52efbc4a59d9726626ab45d8e555afe1227a68", 0xc3, 0x7}, {&(0x7f0000000500)="3dd3a9bfaead80b2b6800219df3af8518411cd5fd53e", 0x16, 0x8}, {&(0x7f0000000540)="642f025f930112224506c3ca78a3bbc77b165d599ea25bb14cdb371ec78602543c99bad2b391c129d92cb3b66beddab90ef90123c45ef26573d2a4dfa1a1e26bdc96ea075bad221b07a1d2ddaf430f7be9375e95fc1d486b45f148e8c3d1265cd349b7cbe6bc723006055f11335bb5f66b2e1732af8e4c72d9e144cbf7c53cc8e617f2f3767287d7c661e3a1249a111dbca0a3f78ffe6aa7ba9c23ffb8cdb3400f935c810e6a2ac484473cd92b3dad7d840aab6efdf89f6e11c9aa46d5ed869033c7012127616953b523a304dd9c2975a5938f836026b4768c60c03587e6166a", 0xe0, 0x40}, {&(0x7f0000000640)="de4215dfb6f7b3c38fc6a93c6f7e35603850f74a58a31628a2cb0b71dffb7d45fadb9da886d9ded24a53c5488a2d840f6a5d54c3a3ec3b9821e1f089cb4bbb871c3bf5d868e231c0f040738527014b69ce68e60a0e6d4fe66515c9fb44010e1ee718c4d67638da3379e14af3e1839ba7098c6df97c84c7fadd8644f3d9f9b5a47c5edfc9f87431e944dcaa6b7d333588436eda5c15d79bda570ddc0f78c0e277640f9ac3b6a6360b9f4ef616cdd868332bbfc050055009614175f0d843d04e9ab13d1ad8b1686f70a4693aebdc3f48e47f1240da8506bba0b938ecce07fb622520e09f", 0xe3, 0x6}, {&(0x7f0000000740)="386b79409d49d93b70eb99019f631ce8deaaa2aa32112276a41713ba8fe57b8d221b7bf020d7e406b386f447ca5ab123b6e49a63efa563543c24bb5b6f9e86b5cee4ccdc29f460b95b5a0f31a23a4b36bc912a7599d7ff27a7ad9d1652614467bad6df7b2cde028534760a00f207d62d141d44d6aecc1b85e8e924eda74838ea26975a1a401a9a482b8d86569c0a35d9754c0503c8a16bd30411b543ffde583624e74f8b4690db9a2665cb4db0", 0xad, 0x10000}, {&(0x7f0000000800)="3cfad9c837cfe594db7bd23b01de33b51b44b13ba62282cdf6a6a9a439e9e00a06086e035f803941c0d6710e21ae1540e39a01ebff0d3cb8287050f65d0d454d4390469c8f7b71eab7ece77a1a79d44469ebd86454b059bf665123aaf35006ff2d7b", 0x62, 0xffffffff7fffffff}], 0x1034001, &(0x7f0000000940)={[{@noacl}, {@nouser_xattr}, {@acl}], [{@smackfstransmute={'smackfstransmute', 0x3d, 'data_flush'}}, {@subj_user={'subj_user', 0x3d, 'f2fs\x00'}}, {@fscontext={'fscontext', 0x3d, 'sysadm_u'}}, {@fsuuid={'fsuuid', 0x3d, {[0x30, 0x64, 0x37, 0x0, 0x65, 0x30, 0x34, 0x38], 0x2d, [0x33, 0x65, 0x34, 0x34], 0x2d, [0x33, 0x37, 0x30, 0x61], 0x2d, [0x32, 0x36, 0x36, 0x65], 0x2d, [0x61, 0x66, 0x30, 0x39, 0x62, 0x31, 0x64, 0x36]}}}]}) (async) mount$9p_xen(&(0x7f00000009c0), &(0x7f0000000a00)='./file0\x00', &(0x7f0000000a40), 0x4, &(0x7f0000000a80)={'trans=xen,', {[{@version_9p2000}, {@debug={'debug', 0x3d, 0x9}}, {@fscache}, {@cache_mmap}, {@debug={'debug', 0x3d, 0xfffffffffffffff9}}, {@cache_loose}, {@noextend}, {}], [{@fscontext={'fscontext', 0x3d, 'sysadm_u'}}, {@fsname={'fsname', 0x3d, ',/--,'}}, {@appraise_type}]}}) (async) 19:41:27 executing program 5: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467007700000c0024", 0xf, 0x400}, {&(0x7f0000000280)="05", 0x1, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000080)={[{@fault_injection}]}) 19:41:27 executing program 3: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010396000c", 0xd, 0x400}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000080)={[{@fault_injection}]}) 19:41:27 executing program 0: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e0", 0x4, 0x400}, {0x0, 0x4c00, 0x1000}], 0x0, &(0x7f0000000080)) [ 806.240534] RBP: 0000000000000003 R08: 0000000000001000 R09: 00007ff03cfc61d0 [ 806.247792] R10: 0000000000000003 R11: 0000000000000246 R12: 0000000008100000 [ 806.255054] R13: 0000000020000100 R14: 0000000000002000 R15: 0000000020000080 [ 806.273850] erofs: FAULT_INJECTION was not selected [ 806.309800] erofs: read_super, device -> /dev/loop3 [ 806.314852] erofs: options -> fault_injection=0x0000000000000000, [ 806.321684] erofs: root inode @ nid 36 [ 806.322770] erofs: FAULT_INJECTION was not selected [ 806.346298] erofs: root inode @ nid 0 19:41:27 executing program 1: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c0024", 0xf, 0x400}, {&(0x7f0000000280)="050000040041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000080)) (fail_nth: 5) [ 806.367016] erofs: mounted on /dev/loop2 with opts: fault_injection=0x0000000000000000. [ 806.374597] erofs: bogus i_mode (0) @ nid 0 19:41:27 executing program 3: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010397000c", 0xd, 0x400}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000080)={[{@fault_injection}]}) [ 806.443301] FAULT_INJECTION: forcing a failure. [ 806.443301] name failslab, interval 1, probability 0, space 0, times 0 [ 806.455269] CPU: 1 PID: 7030 Comm: syz-executor.1 Not tainted 4.19.211-syzkaller #0 [ 806.463079] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 806.472433] Call Trace: [ 806.475033] dump_stack+0x1fc/0x2ef [ 806.478683] should_fail.cold+0xa/0xf [ 806.482490] ? setup_fault_attr+0x200/0x200 [ 806.486816] ? lock_acquire+0x170/0x3c0 [ 806.490811] __should_failslab+0x115/0x180 [ 806.495233] should_failslab+0x5/0x10 [ 806.499041] kmem_cache_alloc_trace+0x284/0x380 [ 806.503720] apparmor_file_alloc_security+0x394/0xad0 [ 806.508972] ? apparmor_file_receive+0x160/0x160 [ 806.513738] ? __alloc_file+0x21/0x340 [ 806.517637] security_file_alloc+0x40/0x90 [ 806.521999] __alloc_file+0xd8/0x340 [ 806.525725] alloc_empty_file+0x6d/0x170 [ 806.529802] alloc_file+0x5e/0x4d0 [ 806.533354] alloc_file_pseudo+0x165/0x250 [ 806.537597] ? alloc_file+0x4d0/0x4d0 [ 806.541410] ? lockdep_annotate_inode_mutex_key+0x43/0x130 [ 806.547042] ? shmem_get_inode+0x44c/0x8d0 [ 806.551288] __shmem_file_setup.part.0+0x102/0x2b0 [ 806.556230] shmem_file_setup+0x61/0x90 [ 806.560219] __se_sys_memfd_create+0x26b/0x440 [ 806.564806] ? memfd_file_seals_ptr+0x150/0x150 [ 806.569484] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 806.574847] ? trace_hardirqs_off_caller+0x6e/0x210 [ 806.579857] ? do_syscall_64+0x21/0x620 [ 806.583819] do_syscall_64+0xf9/0x620 [ 806.587611] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 806.592798] RIP: 0033:0x7ff03e650eb9 [ 806.596506] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 806.615395] RSP: 002b:00007ff03cfc5f28 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 806.623091] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007ff03e650eb9 [ 806.630354] RDX: 0000000000002000 RSI: 0000000000000000 RDI: 00007ff03e6aa1e0 19:41:27 executing program 2: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c0024", 0xf, 0x400}, {&(0x7f0000000280)="05000000c041", 0x6, 0x480}, {0x0, 0x600, 0x1000}], 0x0, &(0x7f0000000080)={[{@fault_injection}]}) [ 806.637682] RBP: 0000000000000003 R08: 0000000000001000 R09: 00007ff03cfc61d0 [ 806.644938] R10: 0000000000000003 R11: 0000000000000246 R12: 0000000008100000 [ 806.652202] R13: 0000000020000100 R14: 0000000000002000 R15: 0000000020000080 [ 806.662744] erofs: unmounted for /dev/loop2 [ 806.688210] erofs: read_super, device -> /dev/loop5 [ 806.693270] erofs: options -> fault_injection=0x0000000000000000, [ 806.705341] erofs: read_super, device -> /dev/loop3 19:41:27 executing program 1: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c0024", 0xf, 0x400}, {&(0x7f0000000280)="050000040041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000080)) (fail_nth: 6) [ 806.733212] erofs: options -> fault_injection=0x0000000000000000, [ 806.747027] erofs: FAULT_INJECTION was not selected [ 806.747118] erofs: FAULT_INJECTION was not selected [ 806.753643] erofs: root inode @ nid 36 [ 806.765137] erofs: root inode @ nid 0 [ 806.765732] erofs: bogus i_mode (0) @ nid 36 [ 806.775293] erofs: bogus i_mode (0) @ nid 0 19:41:27 executing program 4: syz_mount_image$f2fs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0xd, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}, {&(0x7f0000010a00)="1797f96f00000000001000000000000002000000000000000d0000001000000012000000000000000100000002000000ffffffffffffffffffffffffffffffffffffffff01000000000000000000000000000000030000000b00000005000000ffffffffffffffffffffffffffffffffffffffff010000000000000000000000000000008501000006000000010000000100000001000000040000004000000040000000fc0f", 0xa6, 0x200000}, {&(0x7f0000010b00)="0000000000000000000000000000000000000000000000000000000080d87d5a01000300000000030000000010", 0x2d, 0x200fe0}, {&(0x7f0000010c00)="000000000000000000000000000000000000000000000000000000060000000000010c80", 0x24, 0x2011e0}, {&(0x7f0000010d00)="000000000000000000000001", 0xc, 0x201240}, {&(0x7f0000010e00)="0000000000000000000000000000000000000000000000000002", 0x1a, 0x201280}, {&(0x7f0000010f00)="0000000000000003", 0x8, 0x2012e0}, {&(0x7f0000011000)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\v', 0x16, 0x201320}, {&(0x7f0000011100)="00000005", 0x4, 0x201380}, {&(0x7f0000011600)="00000000000000000000000000000000000000000000000000000001000000001797f96f00000000001000000000000002000000000000000d0000001000000012000000000000000100000002000000ffffffffffffffffffffffffffffffffffffffff01000000000000000000000000000000030000000b00000005000000ffffffffffffffffffffffffffffffffffffffff010000000000000000000000000000008501000006000000010000000100000001000000040000004000000040000000fc0f", 0xc6, 0x204fe0}, {&(0x7f0000011700)="0000000000000000000000000000000000000000000000000000000080d87d5a", 0x20, 0x205fe0}, {&(0x7f0000011f00)="ed4100005cf90100535f010002000000001000000000000002", 0x19, 0x1000000}, {&(0x7f0000012100)="00000000000000000300000003", 0xd, 0x1000fe0}], 0x0, &(0x7f0000000040)={[{@data_flush}]}) syz_mount_image$erofs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x5, 0x8, &(0x7f0000000880)=[{&(0x7f0000000140)="54734beaacfb9da64e25a9ffc3a1c176775166609b333f1b1127d066b7730d54f123db4d64398d883610de086231e73f166856b49ca120f3fd814dec67d61e8dbde0d16bb560f50fc88f3b3d85e62ded7c0dcd2a61572ab58039af4465361f8869a2e9d0b43b19e23596f12355ac38c6d703cc3b68f3370380680764101e593a43b901591f30fa78c3145d90f8b8f52ce81d1d6c0dfac9340a74bee894a2", 0x9e}, {&(0x7f0000000340)="bcae8369c7402b0c33fd1f9a76bd77802b7ff092ff9cd576b18acf4593d8a0fc4968d2b9eccd2d1d6fbbcf2047730f2ef2e623c3e8f72b72ed255790f92b487fd1a6cb92302da860d6cf5fbebaa15c2f6cb4a6b9b27370893ff43b3254a37f752d561bc8d780a31cb8734520f6d497f7c79c4a60eb85d5788b01ea9a1ccd41b77ef44ee55edddc6c39376c97e034a20a8d", 0x91, 0x5}, {&(0x7f0000000400)="573d697b4be27ce6e4ecdfc5dcc93296058b2e55f8bfe0f943b83604235766e05b655dddaee0b5f84384d44ce1b3d1e4f3f7a0f6d9f89abb2f94d6de69ced41e20facb040159c90e23342e415f0a02c3b70e17f4d1128521e32ae6374a51df34f62417cde6bc6476ee76554e2642837d9a9616e4e28cd3797a4c7879066fd80e76012771711490d2a7ee94f03b5ef37070021bec2c7103cc885d1203d85bfc2d761bbf7fbc67abc95b78eb68cce1ea6b52efbc4a59d9726626ab45d8e555afe1227a68", 0xc3, 0x7}, {&(0x7f0000000500)="3dd3a9bfaead80b2b6800219df3af8518411cd5fd53e", 0x16, 0x8}, {&(0x7f0000000540)="642f025f930112224506c3ca78a3bbc77b165d599ea25bb14cdb371ec78602543c99bad2b391c129d92cb3b66beddab90ef90123c45ef26573d2a4dfa1a1e26bdc96ea075bad221b07a1d2ddaf430f7be9375e95fc1d486b45f148e8c3d1265cd349b7cbe6bc723006055f11335bb5f66b2e1732af8e4c72d9e144cbf7c53cc8e617f2f3767287d7c661e3a1249a111dbca0a3f78ffe6aa7ba9c23ffb8cdb3400f935c810e6a2ac484473cd92b3dad7d840aab6efdf89f6e11c9aa46d5ed869033c7012127616953b523a304dd9c2975a5938f836026b4768c60c03587e6166a", 0xe0, 0x40}, {&(0x7f0000000640)="de4215dfb6f7b3c38fc6a93c6f7e35603850f74a58a31628a2cb0b71dffb7d45fadb9da886d9ded24a53c5488a2d840f6a5d54c3a3ec3b9821e1f089cb4bbb871c3bf5d868e231c0f040738527014b69ce68e60a0e6d4fe66515c9fb44010e1ee718c4d67638da3379e14af3e1839ba7098c6df97c84c7fadd8644f3d9f9b5a47c5edfc9f87431e944dcaa6b7d333588436eda5c15d79bda570ddc0f78c0e277640f9ac3b6a6360b9f4ef616cdd868332bbfc050055009614175f0d843d04e9ab13d1ad8b1686f70a4693aebdc3f48e47f1240da8506bba0b938ecce07fb622520e09f", 0xe3, 0x6}, {&(0x7f0000000740)="386b79409d49d93b70eb99019f631ce8deaaa2aa32112276a41713ba8fe57b8d221b7bf020d7e406b386f447ca5ab123b6e49a63efa563543c24bb5b6f9e86b5cee4ccdc29f460b95b5a0f31a23a4b36bc912a7599d7ff27a7ad9d1652614467bad6df7b2cde028534760a00f207d62d141d44d6aecc1b85e8e924eda74838ea26975a1a401a9a482b8d86569c0a35d9754c0503c8a16bd30411b543ffde583624e74f8b4690db9a2665cb4db0", 0xad, 0x10000}, {&(0x7f0000000800)="3cfad9c837cfe594db7bd23b01de33b51b44b13ba62282cdf6a6a9a439e9e00a06086e035f803941c0d6710e21ae1540e39a01ebff0d3cb8287050f65d0d454d4390469c8f7b71eab7ece77a1a79d44469ebd86454b059bf665123aaf35006ff2d7b", 0x62, 0xffffffff7fffffff}], 0x1034001, &(0x7f0000000940)={[{@noacl}, {@nouser_xattr}, {@acl}], [{@smackfstransmute={'smackfstransmute', 0x3d, 'data_flush'}}, {@subj_user={'subj_user', 0x3d, 'f2fs\x00'}}, {@fscontext={'fscontext', 0x3d, 'sysadm_u'}}, {@fsuuid={'fsuuid', 0x3d, {[0x30, 0x64, 0x37, 0x0, 0x65, 0x30, 0x34, 0x38], 0x2d, [0x33, 0x65, 0x34, 0x34], 0x2d, [0x33, 0x37, 0x30, 0x61], 0x2d, [0x32, 0x36, 0x36, 0x65], 0x2d, [0x61, 0x66, 0x30, 0x39, 0x62, 0x31, 0x64, 0x36]}}}]}) mount$9p_xen(&(0x7f00000009c0), &(0x7f0000000a00)='./file0\x00', &(0x7f0000000a40), 0x4, &(0x7f0000000a80)={'trans=xen,', {[{@version_9p2000}, {@debug={'debug', 0x3d, 0x9}}, {@fscache}, {@cache_mmap}, {@debug={'debug', 0x3d, 0xfffffffffffffff9}}, {@cache_loose}, {@noextend}, {}], [{@fscontext={'fscontext', 0x3d, 'sysadm_u'}}, {@fsname={'fsname', 0x3d, ',/--,'}}, {@appraise_type}]}}) syz_mount_image$f2fs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0xd, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}, {&(0x7f0000010a00)="1797f96f00000000001000000000000002000000000000000d0000001000000012000000000000000100000002000000ffffffffffffffffffffffffffffffffffffffff01000000000000000000000000000000030000000b00000005000000ffffffffffffffffffffffffffffffffffffffff010000000000000000000000000000008501000006000000010000000100000001000000040000004000000040000000fc0f", 0xa6, 0x200000}, {&(0x7f0000010b00)="0000000000000000000000000000000000000000000000000000000080d87d5a01000300000000030000000010", 0x2d, 0x200fe0}, {&(0x7f0000010c00)="000000000000000000000000000000000000000000000000000000060000000000010c80", 0x24, 0x2011e0}, {&(0x7f0000010d00)="000000000000000000000001", 0xc, 0x201240}, {&(0x7f0000010e00)="0000000000000000000000000000000000000000000000000002", 0x1a, 0x201280}, {&(0x7f0000010f00)="0000000000000003", 0x8, 0x2012e0}, {&(0x7f0000011000)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\v', 0x16, 0x201320}, {&(0x7f0000011100)="00000005", 0x4, 0x201380}, {&(0x7f0000011600)="00000000000000000000000000000000000000000000000000000001000000001797f96f00000000001000000000000002000000000000000d0000001000000012000000000000000100000002000000ffffffffffffffffffffffffffffffffffffffff01000000000000000000000000000000030000000b00000005000000ffffffffffffffffffffffffffffffffffffffff010000000000000000000000000000008501000006000000010000000100000001000000040000004000000040000000fc0f", 0xc6, 0x204fe0}, {&(0x7f0000011700)="0000000000000000000000000000000000000000000000000000000080d87d5a", 0x20, 0x205fe0}, {&(0x7f0000011f00)="ed4100005cf90100535f010002000000001000000000000002", 0x19, 0x1000000}, {&(0x7f0000012100)="00000000000000000300000003", 0xd, 0x1000fe0}], 0x0, &(0x7f0000000040)={[{@data_flush}]}) (async) syz_mount_image$erofs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x5, 0x8, &(0x7f0000000880)=[{&(0x7f0000000140)="54734beaacfb9da64e25a9ffc3a1c176775166609b333f1b1127d066b7730d54f123db4d64398d883610de086231e73f166856b49ca120f3fd814dec67d61e8dbde0d16bb560f50fc88f3b3d85e62ded7c0dcd2a61572ab58039af4465361f8869a2e9d0b43b19e23596f12355ac38c6d703cc3b68f3370380680764101e593a43b901591f30fa78c3145d90f8b8f52ce81d1d6c0dfac9340a74bee894a2", 0x9e}, {&(0x7f0000000340)="bcae8369c7402b0c33fd1f9a76bd77802b7ff092ff9cd576b18acf4593d8a0fc4968d2b9eccd2d1d6fbbcf2047730f2ef2e623c3e8f72b72ed255790f92b487fd1a6cb92302da860d6cf5fbebaa15c2f6cb4a6b9b27370893ff43b3254a37f752d561bc8d780a31cb8734520f6d497f7c79c4a60eb85d5788b01ea9a1ccd41b77ef44ee55edddc6c39376c97e034a20a8d", 0x91, 0x5}, {&(0x7f0000000400)="573d697b4be27ce6e4ecdfc5dcc93296058b2e55f8bfe0f943b83604235766e05b655dddaee0b5f84384d44ce1b3d1e4f3f7a0f6d9f89abb2f94d6de69ced41e20facb040159c90e23342e415f0a02c3b70e17f4d1128521e32ae6374a51df34f62417cde6bc6476ee76554e2642837d9a9616e4e28cd3797a4c7879066fd80e76012771711490d2a7ee94f03b5ef37070021bec2c7103cc885d1203d85bfc2d761bbf7fbc67abc95b78eb68cce1ea6b52efbc4a59d9726626ab45d8e555afe1227a68", 0xc3, 0x7}, {&(0x7f0000000500)="3dd3a9bfaead80b2b6800219df3af8518411cd5fd53e", 0x16, 0x8}, {&(0x7f0000000540)="642f025f930112224506c3ca78a3bbc77b165d599ea25bb14cdb371ec78602543c99bad2b391c129d92cb3b66beddab90ef90123c45ef26573d2a4dfa1a1e26bdc96ea075bad221b07a1d2ddaf430f7be9375e95fc1d486b45f148e8c3d1265cd349b7cbe6bc723006055f11335bb5f66b2e1732af8e4c72d9e144cbf7c53cc8e617f2f3767287d7c661e3a1249a111dbca0a3f78ffe6aa7ba9c23ffb8cdb3400f935c810e6a2ac484473cd92b3dad7d840aab6efdf89f6e11c9aa46d5ed869033c7012127616953b523a304dd9c2975a5938f836026b4768c60c03587e6166a", 0xe0, 0x40}, {&(0x7f0000000640)="de4215dfb6f7b3c38fc6a93c6f7e35603850f74a58a31628a2cb0b71dffb7d45fadb9da886d9ded24a53c5488a2d840f6a5d54c3a3ec3b9821e1f089cb4bbb871c3bf5d868e231c0f040738527014b69ce68e60a0e6d4fe66515c9fb44010e1ee718c4d67638da3379e14af3e1839ba7098c6df97c84c7fadd8644f3d9f9b5a47c5edfc9f87431e944dcaa6b7d333588436eda5c15d79bda570ddc0f78c0e277640f9ac3b6a6360b9f4ef616cdd868332bbfc050055009614175f0d843d04e9ab13d1ad8b1686f70a4693aebdc3f48e47f1240da8506bba0b938ecce07fb622520e09f", 0xe3, 0x6}, {&(0x7f0000000740)="386b79409d49d93b70eb99019f631ce8deaaa2aa32112276a41713ba8fe57b8d221b7bf020d7e406b386f447ca5ab123b6e49a63efa563543c24bb5b6f9e86b5cee4ccdc29f460b95b5a0f31a23a4b36bc912a7599d7ff27a7ad9d1652614467bad6df7b2cde028534760a00f207d62d141d44d6aecc1b85e8e924eda74838ea26975a1a401a9a482b8d86569c0a35d9754c0503c8a16bd30411b543ffde583624e74f8b4690db9a2665cb4db0", 0xad, 0x10000}, {&(0x7f0000000800)="3cfad9c837cfe594db7bd23b01de33b51b44b13ba62282cdf6a6a9a439e9e00a06086e035f803941c0d6710e21ae1540e39a01ebff0d3cb8287050f65d0d454d4390469c8f7b71eab7ece77a1a79d44469ebd86454b059bf665123aaf35006ff2d7b", 0x62, 0xffffffff7fffffff}], 0x1034001, &(0x7f0000000940)={[{@noacl}, {@nouser_xattr}, {@acl}], [{@smackfstransmute={'smackfstransmute', 0x3d, 'data_flush'}}, {@subj_user={'subj_user', 0x3d, 'f2fs\x00'}}, {@fscontext={'fscontext', 0x3d, 'sysadm_u'}}, {@fsuuid={'fsuuid', 0x3d, {[0x30, 0x64, 0x37, 0x0, 0x65, 0x30, 0x34, 0x38], 0x2d, [0x33, 0x65, 0x34, 0x34], 0x2d, [0x33, 0x37, 0x30, 0x61], 0x2d, [0x32, 0x36, 0x36, 0x65], 0x2d, [0x61, 0x66, 0x30, 0x39, 0x62, 0x31, 0x64, 0x36]}}}]}) (async) mount$9p_xen(&(0x7f00000009c0), &(0x7f0000000a00)='./file0\x00', &(0x7f0000000a40), 0x4, &(0x7f0000000a80)={'trans=xen,', {[{@version_9p2000}, {@debug={'debug', 0x3d, 0x9}}, {@fscache}, {@cache_mmap}, {@debug={'debug', 0x3d, 0xfffffffffffffff9}}, {@cache_loose}, {@noextend}, {}], [{@fscontext={'fscontext', 0x3d, 'sysadm_u'}}, {@fsname={'fsname', 0x3d, ',/--,'}}, {@appraise_type}]}}) (async) [ 806.778694] erofs: read_super, device -> /dev/loop0 [ 806.784682] erofs: options -> [ 806.821824] erofs: blksize 1 isn't supported on this platform [ 806.833742] erofs: read_super, device -> /dev/loop2 [ 806.844552] erofs: options -> fault_injection=0x0000000000000000, [ 806.851498] erofs: FAULT_INJECTION was not selected [ 806.856806] erofs: root inode @ nid 36 [ 806.861613] erofs: mounted on /dev/loop2 with opts: fault_injection=0x0000000000000000. [ 806.870954] FAULT_INJECTION: forcing a failure. [ 806.870954] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 806.884511] CPU: 0 PID: 7056 Comm: syz-executor.1 Not tainted 4.19.211-syzkaller #0 [ 806.892318] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 806.901668] Call Trace: [ 806.904244] dump_stack+0x1fc/0x2ef [ 806.907858] should_fail.cold+0xa/0xf [ 806.911641] ? lock_acquire+0x170/0x3c0 [ 806.915596] ? setup_fault_attr+0x200/0x200 [ 806.919904] __alloc_pages_nodemask+0x239/0x2890 [ 806.924652] ? __lock_acquire+0x6de/0x3ff0 [ 806.928870] ? static_obj+0x50/0x50 [ 806.932485] ? __lock_acquire+0x6de/0x3ff0 [ 806.936715] ? gfp_pfmemalloc_allowed+0x150/0x150 [ 806.941541] ? __lock_acquire+0x6de/0x3ff0 [ 806.945763] ? mark_held_locks+0xf0/0xf0 [ 806.949811] ? unwind_next_frame+0xeee/0x1400 [ 806.954318] ? mark_held_locks+0xf0/0xf0 [ 806.958386] ? deref_stack_reg+0x134/0x1d0 [ 806.962695] ? get_reg+0x176/0x1f0 [ 806.966235] ? __read_once_size_nocheck.constprop.0+0x10/0x10 [ 806.972117] alloc_pages_vma+0xf2/0x780 [ 806.976083] shmem_alloc_page+0x11c/0x1f0 [ 806.980213] ? shmem_swapin+0x220/0x220 [ 806.984196] ? percpu_counter_add_batch+0x126/0x180 [ 806.989196] ? __vm_enough_memory+0x316/0x650 [ 806.993678] shmem_alloc_and_acct_page+0x15a/0x850 [ 806.998602] shmem_getpage_gfp+0x4e9/0x37f0 [ 807.002958] ? shmem_alloc_and_acct_page+0x850/0x850 [ 807.008049] ? mark_held_locks+0xa6/0xf0 [ 807.012092] ? ktime_get_coarse_real_ts64+0x1c7/0x290 [ 807.017274] ? iov_iter_fault_in_readable+0x1fc/0x3f0 [ 807.022458] shmem_write_begin+0xff/0x1e0 [ 807.026593] generic_perform_write+0x1f8/0x4d0 [ 807.031160] ? filemap_page_mkwrite+0x2f0/0x2f0 [ 807.035810] ? current_time+0x1c0/0x1c0 [ 807.039769] ? lock_acquire+0x170/0x3c0 [ 807.043736] __generic_file_write_iter+0x24b/0x610 [ 807.048662] generic_file_write_iter+0x3f8/0x730 [ 807.053405] __vfs_write+0x51b/0x770 [ 807.057104] ? kernel_read+0x110/0x110 [ 807.060977] ? check_preemption_disabled+0x41/0x280 [ 807.065976] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 807.070981] vfs_write+0x1f3/0x540 [ 807.074511] __x64_sys_pwrite64+0x1f7/0x250 [ 807.078816] ? ksys_pwrite64+0x1a0/0x1a0 [ 807.082862] ? trace_hardirqs_off_caller+0x6e/0x210 [ 807.087877] ? do_syscall_64+0x21/0x620 [ 807.091847] do_syscall_64+0xf9/0x620 [ 807.095646] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 807.100835] RIP: 0033:0x7ff03e603e87 [ 807.104532] Code: 08 89 3c 24 48 89 4c 24 18 e8 e5 f8 ff ff 4c 8b 54 24 18 48 8b 54 24 10 41 89 c0 48 8b 74 24 08 8b 3c 24 b8 12 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 31 44 89 c7 48 89 04 24 e8 15 f9 ff ff 48 8b [ 807.123418] RSP: 002b:00007ff03cfc5f00 EFLAGS: 00000293 ORIG_RAX: 0000000000000012 [ 807.131109] RAX: ffffffffffffffda RBX: 00007ff03e69a9c8 RCX: 00007ff03e603e87 [ 807.138362] RDX: 000000000000000f RSI: 0000000020010000 RDI: 0000000000000004 [ 807.145614] RBP: 0000000000000003 R08: 0000000000000000 R09: 00007ff03cfc61d0 [ 807.152862] R10: 0000000000000400 R11: 0000000000000293 R12: 0000000000000004 [ 807.160113] R13: 0000000000000004 R14: 0000000020000200 R15: 0000000000000000 19:41:28 executing program 3: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010398000c", 0xd, 0x400}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000080)={[{@fault_injection}]}) 19:41:28 executing program 0: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e0", 0x4, 0x400}, {0x0, 0x6000, 0x1000}], 0x0, &(0x7f0000000080)) 19:41:28 executing program 4: perf_event_open(&(0x7f000001d000)={0x3, 0x80, 0x0, 0x0, 0x6, 0x0, 0x0, 0x1, 0x20010, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_bp={0x0}, 0x50c82, 0x0, 0x0, 0xba82c67d054b48ea, 0x2, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x8) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) timer_create(0x6, 0x0, 0x0) mount(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x2920824, 0x0) open(0x0, 0x6c6083, 0x0) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) tkill(0x0, 0x40) ptrace$setregs(0xd, 0x0, 0x0, &(0x7f0000000080)) capget(&(0x7f0000000000)={0x19980330}, &(0x7f00000000c0)={0xfffffffa, 0x7, 0x5, 0x40, 0x8, 0x7f}) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000080)=0x3) ioctl$TIOCL_GETKMSGREDIRECT(r1, 0x541c, &(0x7f00000003c0)) bpf$PROG_LOAD(0x5, 0x0, 0x0) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$EVIOCGPROP(r2, 0x40047438, 0x0) pwritev(0xffffffffffffffff, &(0x7f0000000380)=[{&(0x7f00000010c0)}, {&(0x7f0000000400)="3d9c7e9dd799fe2bb80020307877a48044b9f07025b476cc9127b6e1eff4", 0x1e}], 0x2, 0xf1, 0x1) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000280)=0x5) sendmsg$TIPC_CMD_GET_MAX_PORTS(r2, &(0x7f0000000580)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x2000000}, 0xc, 0x0}, 0xf1d3b23ff02d0a71) bpf$MAP_CREATE(0x0, &(0x7f0000000480)=@base={0x1e, 0x4, 0x20000, 0x6, 0x4b2, 0xffffffffffffffff, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x1}, 0x48) [ 807.234367] erofs: read_super, device -> /dev/loop1 [ 807.245308] erofs: options -> 19:41:28 executing program 2: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c0024", 0xf, 0x400}, {&(0x7f0000000280)="05000000c041", 0x6, 0x480}, {0x0, 0x700, 0x1000}], 0x0, &(0x7f0000000080)={[{@fault_injection}]}) 19:41:28 executing program 5: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467007800000c0024", 0xf, 0x400}, {&(0x7f0000000280)="05", 0x1, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000080)={[{@fault_injection}]}) 19:41:28 executing program 1: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c0024", 0xf, 0x400}, {&(0x7f0000000280)="050000040041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000080)) (fail_nth: 7) [ 807.292403] erofs: cannot find valid erofs superblock [ 807.304333] erofs: read_super, device -> /dev/loop0 [ 807.309980] erofs: options -> [ 807.313852] erofs: blksize 1 isn't supported on this platform [ 807.323889] erofs: unmounted for /dev/loop2 [ 807.394587] mkiss: ax0: crc mode is auto. 19:41:28 executing program 0: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e0", 0x4, 0x400}, {0x0, 0x6800, 0x1000}], 0x0, &(0x7f0000000080)) [ 807.443117] FAULT_INJECTION: forcing a failure. [ 807.443117] name failslab, interval 1, probability 0, space 0, times 0 [ 807.454642] erofs: read_super, device -> /dev/loop2 [ 807.461599] erofs: read_super, device -> /dev/loop3 [ 807.466857] erofs: options -> fault_injection=0x0000000000000000, [ 807.473852] erofs: read_super, device -> /dev/loop5 [ 807.478999] erofs: options -> fault_injection=0x0000000000000000, [ 807.486477] erofs: options -> fault_injection=0x0000000000000000, [ 807.493428] erofs: FAULT_INJECTION was not selected [ 807.499180] CPU: 1 PID: 7094 Comm: syz-executor.1 Not tainted 4.19.211-syzkaller #0 [ 807.504143] erofs: read_super, device -> /dev/loop0 [ 807.506984] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 807.506991] Call Trace: [ 807.507014] dump_stack+0x1fc/0x2ef [ 807.507036] should_fail.cold+0xa/0xf [ 807.507054] ? setup_fault_attr+0x200/0x200 [ 807.507072] ? lock_acquire+0x170/0x3c0 [ 807.512478] erofs: FAULT_INJECTION was not selected [ 807.521433] __should_failslab+0x115/0x180 [ 807.521454] should_failslab+0x5/0x10 [ 807.521469] kmem_cache_alloc+0x277/0x370 [ 807.521489] getname_flags+0xce/0x590 [ 807.521506] do_sys_open+0x26c/0x520 [ 807.521518] ? filp_open+0x70/0x70 [ 807.521537] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 807.521552] ? trace_hardirqs_off_caller+0x6e/0x210 [ 807.521570] ? do_syscall_64+0x21/0x620 [ 807.530631] erofs: root inode @ nid 0 [ 807.531620] do_syscall_64+0xf9/0x620 [ 807.531643] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 807.531656] RIP: 0033:0x7ff03e603dd4 [ 807.531670] Code: 84 00 00 00 00 00 44 89 54 24 0c e8 96 f9 ff ff 44 8b 54 24 0c 44 89 e2 48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 89 44 24 0c e8 c8 f9 ff ff 8b 44 [ 807.531678] RSP: 002b:00007ff03cfc5eb0 EFLAGS: 00000293 ORIG_RAX: 0000000000000101 [ 807.531690] RAX: ffffffffffffffda RBX: 00007ff03e69a9c8 RCX: 00007ff03e603dd4 [ 807.531702] RDX: 0000000000000002 RSI: 00007ff03cfc5fe0 RDI: 00000000ffffff9c [ 807.537411] erofs: FAULT_INJECTION was not selected [ 807.539984] RBP: 00007ff03cfc5fe0 R08: 0000000000000000 R09: 00007ff03cfc61d0 [ 807.539992] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000002 [ 807.539999] R13: 0000000000000004 R14: 0000000020000248 R15: 0000000000000003 [ 807.552424] erofs: bogus i_mode (0) @ nid 0 [ 807.594681] erofs: root inode @ nid 36 [ 807.613601] erofs: options -> [ 807.618864] erofs: bogus i_mode (0) @ nid 36 19:41:28 executing program 2: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c0024", 0xf, 0x400}, {&(0x7f0000000280)="05000000c041", 0x6, 0x480}, {0x0, 0x2000, 0x1000}], 0x0, &(0x7f0000000080)={[{@fault_injection}]}) 19:41:28 executing program 0: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e0", 0x4, 0x400}, {0x0, 0x6c00, 0x1000}], 0x0, &(0x7f0000000080)) 19:41:28 executing program 4: perf_event_open(&(0x7f000001d000)={0x3, 0x80, 0x0, 0x0, 0x6, 0x0, 0x0, 0x1, 0x20010, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_bp={0x0}, 0x50c82, 0x0, 0x0, 0xba82c67d054b48ea, 0x2, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x8) (async) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) (async) timer_create(0x6, 0x0, 0x0) (async) mount(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x2920824, 0x0) open(0x0, 0x6c6083, 0x0) (async) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) (async, rerun: 32) tkill(0x0, 0x40) (async, rerun: 32) ptrace$setregs(0xd, 0x0, 0x0, &(0x7f0000000080)) (async) capget(&(0x7f0000000000)={0x19980330}, &(0x7f00000000c0)={0xfffffffa, 0x7, 0x5, 0x40, 0x8, 0x7f}) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000080)=0x3) ioctl$TIOCL_GETKMSGREDIRECT(r1, 0x541c, &(0x7f00000003c0)) (async, rerun: 64) bpf$PROG_LOAD(0x5, 0x0, 0x0) (rerun: 64) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$EVIOCGPROP(r2, 0x40047438, 0x0) (async, rerun: 64) pwritev(0xffffffffffffffff, &(0x7f0000000380)=[{&(0x7f00000010c0)}, {&(0x7f0000000400)="3d9c7e9dd799fe2bb80020307877a48044b9f07025b476cc9127b6e1eff4", 0x1e}], 0x2, 0xf1, 0x1) (async, rerun: 64) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000280)=0x5) (async) sendmsg$TIPC_CMD_GET_MAX_PORTS(r2, &(0x7f0000000580)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x2000000}, 0xc, 0x0}, 0xf1d3b23ff02d0a71) (async) bpf$MAP_CREATE(0x0, &(0x7f0000000480)=@base={0x1e, 0x4, 0x20000, 0x6, 0x4b2, 0xffffffffffffffff, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x1}, 0x48) 19:41:28 executing program 1: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c0024", 0xf, 0x400}, {&(0x7f0000000280)="050000040041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000080)) (fail_nth: 8) [ 807.691148] erofs: root inode @ nid 36 [ 807.695215] erofs: mounted on /dev/loop2 with opts: fault_injection=0x0000000000000000. [ 807.709001] erofs: blksize 1 isn't supported on this platform [ 807.726878] erofs: unmounted for /dev/loop2 19:41:28 executing program 3: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010399000c", 0xd, 0x400}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000080)={[{@fault_injection}]}) 19:41:28 executing program 5: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467007900000c0024", 0xf, 0x400}, {&(0x7f0000000280)="05", 0x1, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000080)={[{@fault_injection}]}) [ 807.822275] mkiss: ax0: crc mode is auto. [ 807.915347] FAULT_INJECTION: forcing a failure. [ 807.915347] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 807.924347] erofs: read_super, device -> /dev/loop0 [ 807.927178] CPU: 1 PID: 7131 Comm: syz-executor.1 Not tainted 4.19.211-syzkaller #0 [ 807.927188] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 807.927193] Call Trace: [ 807.927216] dump_stack+0x1fc/0x2ef [ 807.949302] erofs: options -> [ 807.949397] should_fail.cold+0xa/0xf [ 807.949419] ? setup_fault_attr+0x200/0x200 [ 807.965909] erofs: read_super, device -> /dev/loop5 [ 807.967455] ? do_writepages+0x290/0x290 [ 807.967470] ? unlock_page+0x13d/0x230 [ 807.967489] __alloc_pages_nodemask+0x239/0x2890 [ 807.974275] erofs: options -> fault_injection=0x0000000000000000, [ 807.976551] ? lock_downgrade+0x720/0x720 [ 807.976569] ? check_preemption_disabled+0x41/0x280 [ 807.976587] ? __lock_acquire+0x6de/0x3ff0 [ 807.982702] erofs: FAULT_INJECTION was not selected [ 807.985211] ? gfp_pfmemalloc_allowed+0x150/0x150 [ 807.985230] ? lock_downgrade+0x720/0x720 [ 807.985247] ? lock_acquire+0x170/0x3c0 [ 807.993499] erofs: root inode @ nid 36 [ 807.995621] ? up_write+0x18/0x150 [ 807.995636] ? generic_file_write_iter+0x381/0x730 [ 807.995651] ? iov_iter_init+0xb8/0x1d0 [ 808.002766] erofs: bogus i_mode (0) @ nid 36 [ 808.004886] cache_grow_begin+0xa4/0x8a0 [ 808.004904] ? setup_fault_attr+0x200/0x200 [ 808.004920] ? cache_alloc_pfmemalloc+0x1e/0x140 [ 808.020477] erofs: blksize 1 isn't supported on this platform [ 808.022852] cache_alloc_refill+0x273/0x340 [ 808.022872] kmem_cache_alloc+0x346/0x370 [ 808.022889] getname_flags+0xce/0x590 [ 808.074642] do_sys_open+0x26c/0x520 [ 808.078342] ? filp_open+0x70/0x70 [ 808.081873] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 808.087251] ? trace_hardirqs_off_caller+0x6e/0x210 [ 808.092260] ? do_syscall_64+0x21/0x620 [ 808.096222] do_syscall_64+0xf9/0x620 [ 808.100024] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 808.105199] RIP: 0033:0x7ff03e603dd4 [ 808.108897] Code: 84 00 00 00 00 00 44 89 54 24 0c e8 96 f9 ff ff 44 8b 54 24 0c 44 89 e2 48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 89 44 24 0c e8 c8 f9 ff ff 8b 44 [ 808.127959] RSP: 002b:00007ff03cfc5eb0 EFLAGS: 00000293 ORIG_RAX: 0000000000000101 [ 808.135689] RAX: ffffffffffffffda RBX: 00007ff03e69a9c8 RCX: 00007ff03e603dd4 [ 808.142946] RDX: 0000000000000002 RSI: 00007ff03cfc5fe0 RDI: 00000000ffffff9c [ 808.150199] RBP: 00007ff03cfc5fe0 R08: 0000000000000000 R09: 00007ff03cfc61d0 [ 808.157458] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000002 19:41:29 executing program 5: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467007a00000c0024", 0xf, 0x400}, {&(0x7f0000000280)="05", 0x1, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000080)={[{@fault_injection}]}) [ 808.164744] R13: 0000000000000004 R14: 0000000020000248 R15: 0000000000000003 19:41:29 executing program 4: perf_event_open(&(0x7f000001d000)={0x3, 0x80, 0x0, 0x0, 0x6, 0x0, 0x0, 0x1, 0x20010, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_bp={0x0}, 0x50c82, 0x0, 0x0, 0xba82c67d054b48ea, 0x2, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x8) (async) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) (async, rerun: 32) timer_create(0x6, 0x0, 0x0) (async, rerun: 32) mount(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x2920824, 0x0) open(0x0, 0x6c6083, 0x0) (async) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) (async) tkill(0x0, 0x40) (async) ptrace$setregs(0xd, 0x0, 0x0, &(0x7f0000000080)) (async) capget(&(0x7f0000000000)={0x19980330}, &(0x7f00000000c0)={0xfffffffa, 0x7, 0x5, 0x40, 0x8, 0x7f}) (async) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000080)=0x3) (async, rerun: 64) ioctl$TIOCL_GETKMSGREDIRECT(r1, 0x541c, &(0x7f00000003c0)) (async, rerun: 64) bpf$PROG_LOAD(0x5, 0x0, 0x0) (async) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$EVIOCGPROP(r2, 0x40047438, 0x0) pwritev(0xffffffffffffffff, &(0x7f0000000380)=[{&(0x7f00000010c0)}, {&(0x7f0000000400)="3d9c7e9dd799fe2bb80020307877a48044b9f07025b476cc9127b6e1eff4", 0x1e}], 0x2, 0xf1, 0x1) (async) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000280)=0x5) sendmsg$TIPC_CMD_GET_MAX_PORTS(r2, &(0x7f0000000580)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x2000000}, 0xc, 0x0}, 0xf1d3b23ff02d0a71) (async) bpf$MAP_CREATE(0x0, &(0x7f0000000480)=@base={0x1e, 0x4, 0x20000, 0x6, 0x4b2, 0xffffffffffffffff, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x1}, 0x48) 19:41:29 executing program 0: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e0", 0x4, 0x400}, {0x0, 0x7400, 0x1000}], 0x0, &(0x7f0000000080)) [ 808.221299] erofs: read_super, device -> /dev/loop2 [ 808.226347] erofs: options -> fault_injection=0x0000000000000000, [ 808.238131] erofs: read_super, device -> /dev/loop3 [ 808.243180] erofs: options -> fault_injection=0x0000000000000000, [ 808.273769] erofs: read_super, device -> /dev/loop1 [ 808.282020] erofs: options -> [ 808.285440] erofs: FAULT_INJECTION was not selected [ 808.285866] erofs: FAULT_INJECTION was not selected [ 808.303625] erofs: root inode @ nid 36 [ 808.308169] erofs: root inode @ nid 36 [ 808.312631] erofs: read_super, device -> /dev/loop5 [ 808.312841] erofs: mounted on /dev/loop1 with opts: . 19:41:29 executing program 1: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c0024", 0xf, 0x400}, {&(0x7f0000000280)="050000040041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000080)) (fail_nth: 9) [ 808.317656] erofs: options -> fault_injection=0x0000000000000000, [ 808.318324] erofs: root inode @ nid 0 [ 808.331773] erofs: mounted on /dev/loop2 with opts: fault_injection=0x0000000000000000. [ 808.338049] erofs: FAULT_INJECTION was not selected [ 808.355680] erofs: root inode @ nid 36 [ 808.360942] erofs: bogus i_mode (0) @ nid 0 [ 808.365638] erofs: bogus i_mode (0) @ nid 36 19:41:29 executing program 2: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c0024", 0xf, 0x400}, {&(0x7f0000000280)="05000000c041", 0x6, 0x480}, {0x0, 0x3c02, 0x1000}], 0x0, &(0x7f0000000080)={[{@fault_injection}]}) 19:41:29 executing program 3: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b0046701039a000c", 0xd, 0x400}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000080)={[{@fault_injection}]}) 19:41:29 executing program 4: r0 = creat(&(0x7f0000000100)='./bus\x00', 0x0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x4e141, 0x0) r2 = openat(0xffffffffffffffff, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x110) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$null(0xffffffffffffff9c, &(0x7f0000000540), 0x404000, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000440)=@bloom_filter={0x1e, 0x7fff, 0x7, 0x0, 0x404, 0xffffffffffffffff, 0xfffff4a0, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x0, 0x5}, 0xffffffffffffff89) dup(0xffffffffffffffff) bpf$MAP_UPDATE_ELEM(0x2, 0x0, 0x0) perf_event_open(&(0x7f00000004c0)={0x5, 0x80, 0x0, 0x9, 0xbd, 0x6, 0x0, 0x7, 0x80021, 0x4, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x2, @perf_bp={0x0}, 0x8, 0x100000000, 0x8d5, 0x1, 0x5, 0x4678, 0x101, 0x0, 0x1b, 0x0, 0x3}, 0x0, 0xc, r3, 0x0) r4 = socket$nl_audit(0x10, 0x3, 0x9) fcntl$setstatus(r4, 0x4, 0x400) sendmsg$nl_route(r2, &(0x7f0000000180)={&(0x7f0000000000), 0xc, &(0x7f0000000140)={&(0x7f00000000c0)=@getneightbl={0x14, 0x42, 0x20, 0x70bd29, 0x25dfdbfd, {}, [""]}, 0x14}, 0x1, 0x0, 0x0, 0x1}, 0x4080) sendfile(r1, r2, 0x0, 0x401ffc000) fallocate(r0, 0x100000011, 0x0, 0x80019e) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000200)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x28011, 0xffffffffffffffff, 0x0) preadv(r3, 0x0, 0xfffffffffffffc33, 0x29bb, 0x1) [ 808.371668] erofs: unmounted for /dev/loop1 [ 808.379960] mkiss: ax0: crc mode is auto. [ 808.388928] erofs: unmounted for /dev/loop2 [ 808.470117] erofs: read_super, device -> /dev/loop0 19:41:29 executing program 5: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467007b00000c0024", 0xf, 0x400}, {&(0x7f0000000280)="05", 0x1, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000080)={[{@fault_injection}]}) [ 808.491346] erofs: options -> [ 808.498748] erofs: blksize 1 isn't supported on this platform [ 808.527621] FAULT_INJECTION: forcing a failure. [ 808.527621] name failslab, interval 1, probability 0, space 0, times 0 [ 808.552180] CPU: 1 PID: 7185 Comm: syz-executor.1 Not tainted 4.19.211-syzkaller #0 [ 808.560007] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 808.569366] Call Trace: [ 808.571964] dump_stack+0x1fc/0x2ef [ 808.575602] should_fail.cold+0xa/0xf [ 808.579416] ? setup_fault_attr+0x200/0x200 [ 808.583746] ? lock_acquire+0x170/0x3c0 [ 808.587820] __should_failslab+0x115/0x180 [ 808.592065] should_failslab+0x5/0x10 [ 808.595871] kmem_cache_alloc+0x277/0x370 [ 808.600029] __alloc_file+0x21/0x340 [ 808.603754] alloc_empty_file+0x6d/0x170 [ 808.607832] path_openat+0xe9/0x2df0 [ 808.611552] ? __lock_acquire+0x6de/0x3ff0 [ 808.615816] ? path_lookupat+0x8d0/0x8d0 [ 808.619884] ? mark_held_locks+0xf0/0xf0 [ 808.623962] do_filp_open+0x18c/0x3f0 [ 808.627767] ? may_open_dev+0xf0/0xf0 [ 808.631570] ? __alloc_fd+0x28d/0x570 [ 808.635385] ? lock_downgrade+0x720/0x720 [ 808.639540] ? lock_acquire+0x170/0x3c0 [ 808.643607] ? __alloc_fd+0x34/0x570 [ 808.647337] ? do_raw_spin_unlock+0x171/0x230 [ 808.651850] ? _raw_spin_unlock+0x29/0x40 [ 808.656003] ? __alloc_fd+0x28d/0x570 [ 808.659913] do_sys_open+0x3b3/0x520 [ 808.663665] ? filp_open+0x70/0x70 [ 808.667218] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 808.672590] ? trace_hardirqs_off_caller+0x6e/0x210 [ 808.677617] ? do_syscall_64+0x21/0x620 [ 808.681602] do_syscall_64+0xf9/0x620 [ 808.685433] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 808.690628] RIP: 0033:0x7ff03e603dd4 [ 808.694343] Code: 84 00 00 00 00 00 44 89 54 24 0c e8 96 f9 ff ff 44 8b 54 24 0c 44 89 e2 48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 89 44 24 0c e8 c8 f9 ff ff 8b 44 [ 808.713423] RSP: 002b:00007ff03cfc5eb0 EFLAGS: 00000293 ORIG_RAX: 0000000000000101 [ 808.721154] RAX: ffffffffffffffda RBX: 00007ff03e69a9c8 RCX: 00007ff03e603dd4 [ 808.728433] RDX: 0000000000000002 RSI: 00007ff03cfc5fe0 RDI: 00000000ffffff9c [ 808.735708] RBP: 00007ff03cfc5fe0 R08: 0000000000000000 R09: 00007ff03cfc61d0 [ 808.742989] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000002 19:41:29 executing program 4: r0 = creat(&(0x7f0000000100)='./bus\x00', 0x0) (async) r1 = open(&(0x7f0000000080)='./bus\x00', 0x4e141, 0x0) r2 = openat(0xffffffffffffffff, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x110) (async) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async, rerun: 32) openat$null(0xffffffffffffff9c, &(0x7f0000000540), 0x404000, 0x0) (rerun: 32) bpf$MAP_CREATE(0x0, &(0x7f0000000440)=@bloom_filter={0x1e, 0x7fff, 0x7, 0x0, 0x404, 0xffffffffffffffff, 0xfffff4a0, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x0, 0x5}, 0xffffffffffffff89) dup(0xffffffffffffffff) (async) bpf$MAP_UPDATE_ELEM(0x2, 0x0, 0x0) (async, rerun: 64) perf_event_open(&(0x7f00000004c0)={0x5, 0x80, 0x0, 0x9, 0xbd, 0x6, 0x0, 0x7, 0x80021, 0x4, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x2, @perf_bp={0x0}, 0x8, 0x100000000, 0x8d5, 0x1, 0x5, 0x4678, 0x101, 0x0, 0x1b, 0x0, 0x3}, 0x0, 0xc, r3, 0x0) (rerun: 64) r4 = socket$nl_audit(0x10, 0x3, 0x9) fcntl$setstatus(r4, 0x4, 0x400) (async) sendmsg$nl_route(r2, &(0x7f0000000180)={&(0x7f0000000000), 0xc, &(0x7f0000000140)={&(0x7f00000000c0)=@getneightbl={0x14, 0x42, 0x20, 0x70bd29, 0x25dfdbfd, {}, [""]}, 0x14}, 0x1, 0x0, 0x0, 0x1}, 0x4080) (async, rerun: 64) sendfile(r1, r2, 0x0, 0x401ffc000) (async, rerun: 64) fallocate(r0, 0x100000011, 0x0, 0x80019e) (async) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000200)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x28011, 0xffffffffffffffff, 0x0) (async, rerun: 32) preadv(r3, 0x0, 0xfffffffffffffc33, 0x29bb, 0x1) (rerun: 32) [ 808.750266] R13: 0000000000000004 R14: 0000000020000248 R15: 0000000000000003 19:41:29 executing program 1: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c0024", 0xf, 0x400}, {&(0x7f0000000280)="050000040041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000080)) (fail_nth: 10) 19:41:29 executing program 0: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e0", 0x4, 0x400}, {0x0, 0x7a00, 0x1000}], 0x0, &(0x7f0000000080)) [ 808.814723] erofs: read_super, device -> /dev/loop3 [ 808.824251] erofs: options -> fault_injection=0x0000000000000000, [ 808.836860] erofs: read_super, device -> /dev/loop5 [ 808.849293] erofs: FAULT_INJECTION was not selected [ 808.851380] erofs: read_super, device -> /dev/loop2 [ 808.860634] erofs: options -> fault_injection=0x0000000000000000, [ 808.864489] erofs: root inode @ nid 0 [ 808.882581] erofs: bogus i_mode (0) @ nid 0 [ 808.888472] erofs: FAULT_INJECTION was not selected [ 808.901843] erofs: options -> fault_injection=0x0000000000000000, [ 808.909866] erofs: root inode @ nid 36 [ 808.915457] erofs: bogus i_mode (0) @ nid 36 [ 808.920967] FAULT_INJECTION: forcing a failure. [ 808.920967] name failslab, interval 1, probability 0, space 0, times 0 [ 808.924750] erofs: FAULT_INJECTION was not selected [ 808.935699] CPU: 0 PID: 7205 Comm: syz-executor.1 Not tainted 4.19.211-syzkaller #0 [ 808.945167] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 808.954524] Call Trace: [ 808.957147] dump_stack+0x1fc/0x2ef [ 808.960766] should_fail.cold+0xa/0xf [ 808.964558] ? setup_fault_attr+0x200/0x200 [ 808.968868] ? lock_acquire+0x170/0x3c0 [ 808.972836] __should_failslab+0x115/0x180 [ 808.977062] should_failslab+0x5/0x10 [ 808.980851] kmem_cache_alloc_trace+0x284/0x380 [ 808.985523] apparmor_file_alloc_security+0x394/0xad0 [ 808.990706] ? apparmor_file_receive+0x160/0x160 [ 808.995451] ? __alloc_file+0x21/0x340 [ 808.999332] security_file_alloc+0x40/0x90 [ 809.003556] __alloc_file+0xd8/0x340 [ 809.007259] alloc_empty_file+0x6d/0x170 [ 809.011312] path_openat+0xe9/0x2df0 [ 809.015016] ? __lock_acquire+0x6de/0x3ff0 [ 809.019248] ? path_lookupat+0x8d0/0x8d0 [ 809.023301] ? mark_held_locks+0xf0/0xf0 [ 809.027356] do_filp_open+0x18c/0x3f0 [ 809.031142] ? may_open_dev+0xf0/0xf0 [ 809.034930] ? __alloc_fd+0x28d/0x570 [ 809.038719] ? lock_downgrade+0x720/0x720 [ 809.042852] ? lock_acquire+0x170/0x3c0 [ 809.046815] ? __alloc_fd+0x34/0x570 [ 809.050524] ? do_raw_spin_unlock+0x171/0x230 [ 809.055105] ? _raw_spin_unlock+0x29/0x40 [ 809.059244] ? __alloc_fd+0x28d/0x570 [ 809.063036] do_sys_open+0x3b3/0x520 [ 809.066742] ? filp_open+0x70/0x70 [ 809.070272] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 809.075629] ? trace_hardirqs_off_caller+0x6e/0x210 [ 809.080633] ? do_syscall_64+0x21/0x620 [ 809.084605] do_syscall_64+0xf9/0x620 [ 809.088396] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 809.093657] RIP: 0033:0x7ff03e603dd4 [ 809.097358] Code: 84 00 00 00 00 00 44 89 54 24 0c e8 96 f9 ff ff 44 8b 54 24 0c 44 89 e2 48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 89 44 24 0c e8 c8 f9 ff ff 8b 44 19:41:30 executing program 1: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c0024", 0xf, 0x400}, {&(0x7f0000000280)="050000040041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000080)) (fail_nth: 11) [ 809.116335] RSP: 002b:00007ff03cfc5eb0 EFLAGS: 00000293 ORIG_RAX: 0000000000000101 [ 809.124033] RAX: ffffffffffffffda RBX: 00007ff03e69a9c8 RCX: 00007ff03e603dd4 [ 809.131288] RDX: 0000000000000002 RSI: 00007ff03cfc5fe0 RDI: 00000000ffffff9c [ 809.138541] RBP: 00007ff03cfc5fe0 R08: 0000000000000000 R09: 00007ff03cfc61d0 [ 809.145793] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000002 [ 809.153045] R13: 0000000000000004 R14: 0000000020000248 R15: 0000000000000003 19:41:30 executing program 4: r0 = creat(&(0x7f0000000100)='./bus\x00', 0x0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x4e141, 0x0) (async, rerun: 32) r2 = openat(0xffffffffffffffff, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x110) (async, rerun: 32) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) openat$null(0xffffffffffffff9c, &(0x7f0000000540), 0x404000, 0x0) (async) bpf$MAP_CREATE(0x0, &(0x7f0000000440)=@bloom_filter={0x1e, 0x7fff, 0x7, 0x0, 0x404, 0xffffffffffffffff, 0xfffff4a0, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x0, 0x5}, 0xffffffffffffff89) dup(0xffffffffffffffff) (async) bpf$MAP_UPDATE_ELEM(0x2, 0x0, 0x0) (async, rerun: 64) perf_event_open(&(0x7f00000004c0)={0x5, 0x80, 0x0, 0x9, 0xbd, 0x6, 0x0, 0x7, 0x80021, 0x4, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x2, @perf_bp={0x0}, 0x8, 0x100000000, 0x8d5, 0x1, 0x5, 0x4678, 0x101, 0x0, 0x1b, 0x0, 0x3}, 0x0, 0xc, r3, 0x0) (rerun: 64) r4 = socket$nl_audit(0x10, 0x3, 0x9) fcntl$setstatus(r4, 0x4, 0x400) (async) sendmsg$nl_route(r2, &(0x7f0000000180)={&(0x7f0000000000), 0xc, &(0x7f0000000140)={&(0x7f00000000c0)=@getneightbl={0x14, 0x42, 0x20, 0x70bd29, 0x25dfdbfd, {}, [""]}, 0x14}, 0x1, 0x0, 0x0, 0x1}, 0x4080) (async, rerun: 32) sendfile(r1, r2, 0x0, 0x401ffc000) (async, rerun: 32) fallocate(r0, 0x100000011, 0x0, 0x80019e) (async) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000200)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x28011, 0xffffffffffffffff, 0x0) (async) preadv(r3, 0x0, 0xfffffffffffffc33, 0x29bb, 0x1) 19:41:30 executing program 5: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467007c00000c0024", 0xf, 0x400}, {&(0x7f0000000280)="05", 0x1, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000080)={[{@fault_injection}]}) 19:41:30 executing program 3: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b0046701039b000c", 0xd, 0x400}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000080)={[{@fault_injection}]}) [ 809.217597] erofs: root inode @ nid 36 [ 809.225554] erofs: read_super, device -> /dev/loop0 [ 809.236679] erofs: options -> [ 809.242345] erofs: blksize 1 isn't supported on this platform 19:41:30 executing program 4: fsetxattr$security_ima(0xffffffffffffffff, 0x0, 0x0, 0xf, 0x0) write$eventfd(0xffffffffffffffff, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000140)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x317d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$udf(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0xe, &(0x7f0000000200)=[{&(0x7f0000000040)="00424541303101", 0x7, 0x8000}, {&(0x7f0000010100)="004e53523033010000", 0x9, 0x8800}, {&(0x7f0000010300)="0100030012000100cbf1f001600000000100000000000000084c696e757855444600000000000000000000000000000000000000000000090100010003000300010000000100000008313233343536373831323334353637384c696e75785544460000", 0x63, 0xc000}, {&(0x7f0000010400)="0000000000000019004f53544120436f6d7072657373656420556e69636f646500000000000000000000000000000000000000000000000000000000000000000000000000000000004f53544120436f6d7072657373656420556e69636f64650000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002a4c696e7578206d6b756466667300000000000000000004050000000000007810e4070913142c1643092d002a4c696e757820554446465300000000000000000000000405", 0xde, 0xc0c0}, {&(0x7f0000010500)="00000000000000000100000000000000000000000000000000000000000000000600030061000100fd10e8016100000002000000004f53544120436f6d7072657373656420556e69636f646500000000000000000000000000000000000000000000000000000000000000000000000000000000084c696e7578554446", 0x7d, 0xc1e0}, {&(0x7f0000010600)="000000000000000000000000000000000000000900020000002a4f5354412055444620436f6d706c69616e74000000000102000000000000000200002000000000000000000000004000000001000000002a4c696e757820554446465300000000000000000000000405", 0x6a, 0xc2c0}, {&(0x7f0000010700)="00000000000000000000000000000000004000008000000002400000002a554446205370617261626c6520506172746974696f6e0102040500000000010000002000020038010000a0000000e0070000000000000000000000000000000000000500030033000100cd0af001620000000500000001000000002b4e535230330000000000000000000000000000000000000000000000000000000000000000000002", 0xa2, 0xc3a0}, {&(0x7f0000010800)="0000000000000000000000000000000000000000000000000300000020050000a0020000002a4c696e757820554446465300000000000000000000000405", 0x3e, 0xc4a0}, {&(0x7f0000010d00)}, {&(0x7f0000000140)="02000300fe0001008f77f00100010000004000006000000000400000c007", 0x1e, 0x20000}, {&(0x7f0000011200)="080103002e000100c059080000000000a002000054000000feff", 0x1a, 0xa4000}, {&(0x7f0000011300)="000103006e0001003a1ef001200000007810e4070913142c1643092d0300030001000000010000000000000000000000004f53544120436f6d7072657373656420556e69636f646500000000000000000000000000000000000000000000000000000000000000000000000000000000084c696e7578554446", 0x79, 0xa8000}, {&(0x7f0000011400)="00000000000000000000000000000009004f53544120436f6d7072657373656420556e69636f646500000000000000000000000000000000000000000000000000000000000000000000000000000000084c696e7578554446000000000000000000000000000000000000000000000908436f707972696768740000000000000000000000000000000000000000000a084162737472616374000000000000000000000000000000000000000000000900020000600000000000000000000000002a4f5354412055444620436f6d706c69616e74000000000102000000000000000000000000000000000000000000000002000040", 0xf5, 0xa80e0}, {&(0x7f0000011700)="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", 0x1e0, 0xb0000}], 0x88003, &(0x7f0000013500)) chdir(&(0x7f0000000140)='./file0\x00') r0 = open(&(0x7f0000000200)='./bus\x00', 0x141042, 0x0) r1 = syz_open_dev$usbfs(&(0x7f0000000840), 0x90f, 0x68501) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$USBDEVFS_CONTROL(r2, 0xc0185500, &(0x7f00000000c0)={0x80, 0x6, 0x303, 0x0, 0x4, 0x0, 0x0}) perf_event_open$cgroup(&(0x7f0000000400)={0x0, 0x80, 0xff, 0x6, 0x0, 0x8, 0x0, 0x4, 0x45002, 0x4, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x4, @perf_config_ext={0x4, 0x3}, 0x8000, 0x7f, 0x1, 0x6, 0x1, 0x9, 0x2, 0x0, 0x21, 0x0, 0x4}, r2, 0xc, 0xffffffffffffffff, 0xa) write$UHID_INPUT(r0, &(0x7f0000000980), 0x10a9) r3 = open(&(0x7f00000003c0)='./bus\x00', 0x145742, 0x111) ftruncate(r3, 0x80006) sendfile(r0, r0, &(0x7f00000001c0), 0x8080ffffff80) [ 809.279201] erofs: mounted on /dev/loop2 with opts: fault_injection=0x0000000000000000. [ 809.324502] FAULT_INJECTION: forcing a failure. [ 809.324502] name failslab, interval 1, probability 0, space 0, times 0 [ 809.337142] CPU: 1 PID: 7220 Comm: syz-executor.1 Not tainted 4.19.211-syzkaller #0 [ 809.344956] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 809.354486] Call Trace: [ 809.357095] dump_stack+0x1fc/0x2ef [ 809.360743] should_fail.cold+0xa/0xf [ 809.364565] ? setup_fault_attr+0x200/0x200 [ 809.368903] ? lock_acquire+0x170/0x3c0 [ 809.372979] __should_failslab+0x115/0x180 [ 809.377227] should_failslab+0x5/0x10 [ 809.381035] kmem_cache_alloc_trace+0x284/0x380 [ 809.385831] ? loop_info64_to_compat+0x5e0/0x5e0 [ 809.390605] __kthread_create_on_node+0xd2/0x410 [ 809.395372] ? kthread_parkme+0xa0/0xa0 [ 809.399359] ? lock_acquire+0x170/0x3c0 [ 809.403346] ? lo_ioctl+0x1bb/0x20e0 [ 809.407090] ? __mutex_lock+0x368/0x1190 [ 809.411170] ? lock_downgrade+0x720/0x720 [ 809.415326] ? check_preemption_disabled+0x41/0x280 [ 809.420355] ? loop_info64_to_compat+0x5e0/0x5e0 [ 809.425122] kthread_create_on_node+0xbb/0xf0 [ 809.429627] ? __kthread_create_on_node+0x410/0x410 [ 809.434646] ? __fget+0x356/0x510 [ 809.438112] ? do_dup2+0x450/0x450 [ 809.441662] ? __lockdep_init_map+0x100/0x5a0 [ 809.446170] ? __lockdep_init_map+0x100/0x5a0 [ 809.450678] lo_ioctl+0xae5/0x20e0 [ 809.454235] ? loop_set_status64+0x110/0x110 [ 809.458654] blkdev_ioctl+0x5cb/0x1a80 [ 809.462552] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 809.467923] ? blkpg_ioctl+0x9d0/0x9d0 [ 809.471814] ? mark_held_locks+0xf0/0xf0 [ 809.475971] ? mark_held_locks+0xf0/0xf0 [ 809.480032] ? debug_check_no_obj_freed+0x201/0x490 [ 809.485038] ? lock_downgrade+0x720/0x720 [ 809.489185] block_ioctl+0xe9/0x130 [ 809.492813] ? blkdev_fallocate+0x3f0/0x3f0 [ 809.497128] do_vfs_ioctl+0xcdb/0x12e0 [ 809.501000] ? lock_downgrade+0x720/0x720 [ 809.505136] ? check_preemption_disabled+0x41/0x280 [ 809.510143] ? ioctl_preallocate+0x200/0x200 [ 809.514546] ? __fget+0x356/0x510 [ 809.517996] ? do_dup2+0x450/0x450 [ 809.521533] ? do_sys_open+0x2bf/0x520 [ 809.525404] ksys_ioctl+0x9b/0xc0 [ 809.528852] __x64_sys_ioctl+0x6f/0xb0 [ 809.532740] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 809.537313] do_syscall_64+0xf9/0x620 [ 809.541109] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 809.546289] RIP: 0033:0x7ff03e650c77 [ 809.549996] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 04 54 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 809.569164] RSP: 002b:00007ff03cfc5f28 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 809.576882] RAX: ffffffffffffffda RBX: 00007ff03e69a9c8 RCX: 00007ff03e650c77 [ 809.584147] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 809.591416] RBP: 0000000000000005 R08: 0000000000000000 R09: 00007ff03cfc61d0 [ 809.598686] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 809.605951] R13: 0000000000000004 R14: 0000000020000248 R15: 0000000000000003 19:41:30 executing program 2: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c0024", 0xf, 0x400}, {&(0x7f0000000280)="05000000c041", 0x6, 0x480}, {0x0, 0x3f00, 0x1000}], 0x0, &(0x7f0000000080)={[{@fault_injection}]}) 19:41:30 executing program 1: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c0024", 0xf, 0x400}, {&(0x7f0000000280)="050000040041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000080)) (fail_nth: 12) 19:41:30 executing program 0: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e0", 0x4, 0x400}, {0x0, 0x8201, 0x1000}], 0x0, &(0x7f0000000080)) [ 809.659430] erofs: unmounted for /dev/loop2 [ 809.675525] erofs: read_super, device -> /dev/loop5 [ 809.677901] erofs: read_super, device -> /dev/loop3 [ 809.683632] erofs: options -> fault_injection=0x0000000000000000, [ 809.694178] erofs: options -> fault_injection=0x0000000000000000, [ 809.722038] erofs: FAULT_INJECTION was not selected [ 809.729104] erofs: FAULT_INJECTION was not selected [ 809.746182] erofs: root inode @ nid 36 [ 809.746688] erofs: root inode @ nid 0 [ 809.755943] erofs: bogus i_mode (0) @ nid 0 [ 809.761153] erofs: bogus i_mode (0) @ nid 36 [ 809.780365] FAULT_INJECTION: forcing a failure. [ 809.780365] name failslab, interval 1, probability 0, space 0, times 0 [ 809.792124] CPU: 0 PID: 7254 Comm: syz-executor.1 Not tainted 4.19.211-syzkaller #0 [ 809.799931] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 809.809286] Call Trace: [ 809.811882] dump_stack+0x1fc/0x2ef [ 809.815504] should_fail.cold+0xa/0xf [ 809.819291] ? setup_fault_attr+0x200/0x200 [ 809.823593] ? lock_acquire+0x170/0x3c0 [ 809.827636] __should_failslab+0x115/0x180 [ 809.831861] should_failslab+0x5/0x10 [ 809.835647] kmem_cache_alloc+0x277/0x370 [ 809.839778] __kernfs_new_node+0xd2/0x680 [ 809.843911] ? kernfs_dop_revalidate+0x3a0/0x3a0 [ 809.848646] ? _raw_spin_unlock_irq+0x5a/0x80 [ 809.853121] ? __cpu_to_node+0x7b/0xa0 [ 809.856990] ? mark_held_locks+0xf0/0xf0 [ 809.861032] ? io_schedule_timeout+0x140/0x140 [ 809.865610] ? enqueue_entity+0xf86/0x3850 [ 809.869828] ? set_user_nice.part.0+0x3b9/0xab0 [ 809.874492] kernfs_create_dir_ns+0x9e/0x230 [ 809.878881] internal_create_group+0x1c1/0xb20 [ 809.883447] ? sysfs_remove_link_from_group+0x70/0x70 [ 809.888614] ? lock_downgrade+0x720/0x720 [ 809.892750] lo_ioctl+0xf7c/0x20e0 [ 809.896274] ? loop_set_status64+0x110/0x110 [ 809.900666] blkdev_ioctl+0x5cb/0x1a80 [ 809.904535] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 809.909878] ? blkpg_ioctl+0x9d0/0x9d0 [ 809.913748] ? mark_held_locks+0xf0/0xf0 [ 809.917792] ? mark_held_locks+0xf0/0xf0 [ 809.921836] ? debug_check_no_obj_freed+0x201/0x490 [ 809.926838] ? lock_downgrade+0x720/0x720 [ 809.931060] block_ioctl+0xe9/0x130 [ 809.934668] ? blkdev_fallocate+0x3f0/0x3f0 [ 809.938970] do_vfs_ioctl+0xcdb/0x12e0 [ 809.942840] ? lock_downgrade+0x720/0x720 [ 809.946968] ? check_preemption_disabled+0x41/0x280 [ 809.951969] ? ioctl_preallocate+0x200/0x200 [ 809.956360] ? __fget+0x356/0x510 [ 809.959793] ? do_dup2+0x450/0x450 [ 809.963314] ? do_sys_open+0x2bf/0x520 [ 809.967184] ksys_ioctl+0x9b/0xc0 [ 809.970636] __x64_sys_ioctl+0x6f/0xb0 [ 809.974514] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 809.979081] do_syscall_64+0xf9/0x620 [ 809.982872] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 809.988044] RIP: 0033:0x7ff03e650c77 [ 809.991747] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 04 54 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 810.010629] RSP: 002b:00007ff03cfc5f28 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 810.018324] RAX: ffffffffffffffda RBX: 00007ff03e69a9c8 RCX: 00007ff03e650c77 [ 810.025575] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 810.032822] RBP: 0000000000000005 R08: 0000000000000000 R09: 00007ff03cfc61d0 [ 810.040071] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 810.047317] R13: 0000000000000004 R14: 0000000020000248 R15: 0000000000000003 19:41:31 executing program 5: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467d9dcdf720c0024", 0xf, 0x400}, {&(0x7f0000000280)="05", 0x1, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000080)={[{@fault_injection}]}) 19:41:31 executing program 3: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b0046701039c000c", 0xd, 0x400}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000080)={[{@fault_injection}]}) [ 810.171650] erofs: read_super, device -> /dev/loop1 [ 810.176696] erofs: options -> [ 810.202771] erofs: root inode @ nid 36 [ 810.209233] erofs: mounted on /dev/loop1 with opts: . 19:41:31 executing program 1: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c0024", 0xf, 0x400}, {&(0x7f0000000280)="050000040041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000080)) (fail_nth: 13) [ 810.218072] erofs: read_super, device -> /dev/loop0 [ 810.235770] erofs: read_super, device -> /dev/loop2 [ 810.243703] erofs: options -> [ 810.250377] erofs: options -> fault_injection=0x0000000000000000, [ 810.261203] erofs: blksize 1 isn't supported on this platform [ 810.294133] erofs: read_super, device -> /dev/loop3 [ 810.299922] erofs: unmounted for /dev/loop1 [ 810.305208] erofs: FAULT_INJECTION was not selected [ 810.314077] erofs: options -> fault_injection=0x0000000000000000, [ 810.319409] erofs: root inode @ nid 36 [ 810.322548] erofs: FAULT_INJECTION was not selected [ 810.325674] erofs: mounted on /dev/loop2 with opts: fault_injection=0x0000000000000000. [ 810.332374] erofs: root inode @ nid 0 [ 810.343264] erofs: bogus i_mode (0) @ nid 0 [ 810.391715] erofs: read_super, device -> /dev/loop5 [ 810.396912] erofs: options -> fault_injection=0x0000000000000000, [ 810.411774] erofs: FAULT_INJECTION was not selected [ 810.417087] erofs: root inode @ nid 36 [ 810.424432] erofs: bogus i_mode (0) @ nid 36 19:41:31 executing program 0: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e0", 0x4, 0x400}, {0x0, 0xedc0, 0x1000}], 0x0, &(0x7f0000000080)) 19:41:31 executing program 4: fsetxattr$security_ima(0xffffffffffffffff, 0x0, 0x0, 0xf, 0x0) (async) write$eventfd(0xffffffffffffffff, 0x0, 0x0) (async) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) (async) sched_setattr(0x0, &(0x7f0000000140)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) (async) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x317d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) syz_mount_image$udf(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0xe, &(0x7f0000000200)=[{&(0x7f0000000040)="00424541303101", 0x7, 0x8000}, {&(0x7f0000010100)="004e53523033010000", 0x9, 0x8800}, {&(0x7f0000010300)="0100030012000100cbf1f001600000000100000000000000084c696e757855444600000000000000000000000000000000000000000000090100010003000300010000000100000008313233343536373831323334353637384c696e75785544460000", 0x63, 0xc000}, {&(0x7f0000010400)="0000000000000019004f53544120436f6d7072657373656420556e69636f646500000000000000000000000000000000000000000000000000000000000000000000000000000000004f53544120436f6d7072657373656420556e69636f64650000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002a4c696e7578206d6b756466667300000000000000000004050000000000007810e4070913142c1643092d002a4c696e757820554446465300000000000000000000000405", 0xde, 0xc0c0}, {&(0x7f0000010500)="00000000000000000100000000000000000000000000000000000000000000000600030061000100fd10e8016100000002000000004f53544120436f6d7072657373656420556e69636f646500000000000000000000000000000000000000000000000000000000000000000000000000000000084c696e7578554446", 0x7d, 0xc1e0}, {&(0x7f0000010600)="000000000000000000000000000000000000000900020000002a4f5354412055444620436f6d706c69616e74000000000102000000000000000200002000000000000000000000004000000001000000002a4c696e757820554446465300000000000000000000000405", 0x6a, 0xc2c0}, {&(0x7f0000010700)="00000000000000000000000000000000004000008000000002400000002a554446205370617261626c6520506172746974696f6e0102040500000000010000002000020038010000a0000000e0070000000000000000000000000000000000000500030033000100cd0af001620000000500000001000000002b4e535230330000000000000000000000000000000000000000000000000000000000000000000002", 0xa2, 0xc3a0}, {&(0x7f0000010800)="0000000000000000000000000000000000000000000000000300000020050000a0020000002a4c696e757820554446465300000000000000000000000405", 0x3e, 0xc4a0}, {&(0x7f0000010d00)}, {&(0x7f0000000140)="02000300fe0001008f77f00100010000004000006000000000400000c007", 0x1e, 0x20000}, {&(0x7f0000011200)="080103002e000100c059080000000000a002000054000000feff", 0x1a, 0xa4000}, {&(0x7f0000011300)="000103006e0001003a1ef001200000007810e4070913142c1643092d0300030001000000010000000000000000000000004f53544120436f6d7072657373656420556e69636f646500000000000000000000000000000000000000000000000000000000000000000000000000000000084c696e7578554446", 0x79, 0xa8000}, {&(0x7f0000011400)="00000000000000000000000000000009004f53544120436f6d7072657373656420556e69636f646500000000000000000000000000000000000000000000000000000000000000000000000000000000084c696e7578554446000000000000000000000000000000000000000000000908436f707972696768740000000000000000000000000000000000000000000a084162737472616374000000000000000000000000000000000000000000000900020000600000000000000000000000002a4f5354412055444620436f6d706c69616e74000000000102000000000000000000000000000000000000000000000002000040", 0xf5, 0xa80e0}, {&(0x7f0000011700)="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", 0x1e0, 0xb0000}], 0x88003, &(0x7f0000013500)) (async) chdir(&(0x7f0000000140)='./file0\x00') r0 = open(&(0x7f0000000200)='./bus\x00', 0x141042, 0x0) (async) r1 = syz_open_dev$usbfs(&(0x7f0000000840), 0x90f, 0x68501) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$USBDEVFS_CONTROL(r2, 0xc0185500, &(0x7f00000000c0)={0x80, 0x6, 0x303, 0x0, 0x4, 0x0, 0x0}) perf_event_open$cgroup(&(0x7f0000000400)={0x0, 0x80, 0xff, 0x6, 0x0, 0x8, 0x0, 0x4, 0x45002, 0x4, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x4, @perf_config_ext={0x4, 0x3}, 0x8000, 0x7f, 0x1, 0x6, 0x1, 0x9, 0x2, 0x0, 0x21, 0x0, 0x4}, r2, 0xc, 0xffffffffffffffff, 0xa) write$UHID_INPUT(r0, &(0x7f0000000980), 0x10a9) (async) r3 = open(&(0x7f00000003c0)='./bus\x00', 0x145742, 0x111) ftruncate(r3, 0x80006) (async) sendfile(r0, r0, &(0x7f00000001c0), 0x8080ffffff80) 19:41:31 executing program 5: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467dfdcdf720c0024", 0xf, 0x400}, {&(0x7f0000000280)="05", 0x1, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000080)={[{@fault_injection}]}) 19:41:31 executing program 2: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c0024", 0xf, 0x400}, {&(0x7f0000000280)="05000000c041", 0x6, 0x480}, {0x0, 0xedc0, 0x1000}], 0x0, &(0x7f0000000080)={[{@fault_injection}]}) 19:41:31 executing program 3: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b0046701039d000c", 0xd, 0x400}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000080)={[{@fault_injection}]}) [ 810.517524] FAULT_INJECTION: forcing a failure. [ 810.517524] name failslab, interval 1, probability 0, space 0, times 0 [ 810.528882] erofs: unmounted for /dev/loop2 [ 810.533782] CPU: 1 PID: 7280 Comm: syz-executor.1 Not tainted 4.19.211-syzkaller #0 [ 810.541599] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 810.550963] Call Trace: [ 810.553575] dump_stack+0x1fc/0x2ef [ 810.557189] should_fail.cold+0xa/0xf [ 810.560971] ? setup_fault_attr+0x200/0x200 [ 810.565286] ? lock_acquire+0x170/0x3c0 [ 810.569263] __should_failslab+0x115/0x180 [ 810.573490] should_failslab+0x5/0x10 [ 810.577274] kmem_cache_alloc+0x277/0x370 [ 810.581407] __kernfs_new_node+0xd2/0x680 [ 810.585537] ? kernfs_dop_revalidate+0x3a0/0x3a0 [ 810.590287] ? __mutex_unlock_slowpath+0xea/0x610 [ 810.595133] ? wait_for_completion_io+0x10/0x10 [ 810.599802] ? kernfs_next_descendant_post+0x19c/0x290 [ 810.605069] kernfs_new_node+0x92/0x120 [ 810.609055] __kernfs_create_file+0x51/0x340 [ 810.613550] sysfs_add_file_mode_ns+0x226/0x540 [ 810.618206] internal_create_group+0x355/0xb20 [ 810.622772] ? sysfs_remove_link_from_group+0x70/0x70 [ 810.627963] ? lock_downgrade+0x720/0x720 [ 810.632132] lo_ioctl+0xf7c/0x20e0 [ 810.635673] ? loop_set_status64+0x110/0x110 [ 810.640065] blkdev_ioctl+0x5cb/0x1a80 [ 810.643942] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 810.649301] ? blkpg_ioctl+0x9d0/0x9d0 [ 810.653194] ? mark_held_locks+0xf0/0xf0 [ 810.657249] ? mark_held_locks+0xf0/0xf0 [ 810.661291] ? debug_check_no_obj_freed+0x201/0x490 [ 810.666337] ? lock_downgrade+0x720/0x720 [ 810.670493] block_ioctl+0xe9/0x130 [ 810.674113] ? blkdev_fallocate+0x3f0/0x3f0 [ 810.678423] do_vfs_ioctl+0xcdb/0x12e0 [ 810.682298] ? lock_downgrade+0x720/0x720 [ 810.686428] ? check_preemption_disabled+0x41/0x280 [ 810.691451] ? ioctl_preallocate+0x200/0x200 [ 810.695860] ? __fget+0x356/0x510 [ 810.699478] ? do_dup2+0x450/0x450 [ 810.703004] ? do_sys_open+0x2bf/0x520 [ 810.706879] ksys_ioctl+0x9b/0xc0 [ 810.710398] __x64_sys_ioctl+0x6f/0xb0 [ 810.714279] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 810.718854] do_syscall_64+0xf9/0x620 [ 810.722643] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 810.727822] RIP: 0033:0x7ff03e650c77 [ 810.731541] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 04 54 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 810.750443] RSP: 002b:00007ff03cfc5f28 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 810.758413] RAX: ffffffffffffffda RBX: 00007ff03e69a9c8 RCX: 00007ff03e650c77 [ 810.765753] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 810.773004] RBP: 0000000000000005 R08: 0000000000000000 R09: 00007ff03cfc61d0 [ 810.780255] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 810.787512] R13: 0000000000000004 R14: 0000000020000248 R15: 0000000000000003 [ 810.809850] erofs: read_super, device -> /dev/loop1 [ 810.833595] erofs: options -> [ 810.844240] erofs: root inode @ nid 36 [ 810.851484] erofs: mounted on /dev/loop1 with opts: . 19:41:31 executing program 1: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c0024", 0xf, 0x400}, {&(0x7f0000000280)="050000040041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000080)) (fail_nth: 14) [ 810.882330] erofs: read_super, device -> /dev/loop0 [ 810.887376] erofs: options -> [ 810.893559] erofs: read_super, device -> /dev/loop5 [ 810.908418] erofs: options -> fault_injection=0x0000000000000000, [ 810.913679] erofs: blksize 1 isn't supported on this platform [ 810.924352] erofs: unmounted for /dev/loop1 [ 810.929172] erofs: read_super, device -> /dev/loop3 [ 810.949432] erofs: options -> fault_injection=0x0000000000000000, [ 810.957992] erofs: FAULT_INJECTION was not selected [ 810.963123] erofs: root inode @ nid 0 [ 810.966774] erofs: FAULT_INJECTION was not selected [ 810.976677] erofs: bogus i_mode (0) @ nid 0 19:41:32 executing program 0: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e0", 0x4, 0x400}, {0x0, 0xff0f, 0x1000}], 0x0, &(0x7f0000000080)) 19:41:32 executing program 4: fsetxattr$security_ima(0xffffffffffffffff, 0x0, 0x0, 0xf, 0x0) (async) write$eventfd(0xffffffffffffffff, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000140)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) (async) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x317d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$udf(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0xe, &(0x7f0000000200)=[{&(0x7f0000000040)="00424541303101", 0x7, 0x8000}, {&(0x7f0000010100)="004e53523033010000", 0x9, 0x8800}, {&(0x7f0000010300)="0100030012000100cbf1f001600000000100000000000000084c696e757855444600000000000000000000000000000000000000000000090100010003000300010000000100000008313233343536373831323334353637384c696e75785544460000", 0x63, 0xc000}, {&(0x7f0000010400)="0000000000000019004f53544120436f6d7072657373656420556e69636f646500000000000000000000000000000000000000000000000000000000000000000000000000000000004f53544120436f6d7072657373656420556e69636f64650000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002a4c696e7578206d6b756466667300000000000000000004050000000000007810e4070913142c1643092d002a4c696e757820554446465300000000000000000000000405", 0xde, 0xc0c0}, {&(0x7f0000010500)="00000000000000000100000000000000000000000000000000000000000000000600030061000100fd10e8016100000002000000004f53544120436f6d7072657373656420556e69636f646500000000000000000000000000000000000000000000000000000000000000000000000000000000084c696e7578554446", 0x7d, 0xc1e0}, {&(0x7f0000010600)="000000000000000000000000000000000000000900020000002a4f5354412055444620436f6d706c69616e74000000000102000000000000000200002000000000000000000000004000000001000000002a4c696e757820554446465300000000000000000000000405", 0x6a, 0xc2c0}, {&(0x7f0000010700)="00000000000000000000000000000000004000008000000002400000002a554446205370617261626c6520506172746974696f6e0102040500000000010000002000020038010000a0000000e0070000000000000000000000000000000000000500030033000100cd0af001620000000500000001000000002b4e535230330000000000000000000000000000000000000000000000000000000000000000000002", 0xa2, 0xc3a0}, {&(0x7f0000010800)="0000000000000000000000000000000000000000000000000300000020050000a0020000002a4c696e757820554446465300000000000000000000000405", 0x3e, 0xc4a0}, {&(0x7f0000010d00)}, {&(0x7f0000000140)="02000300fe0001008f77f00100010000004000006000000000400000c007", 0x1e, 0x20000}, {&(0x7f0000011200)="080103002e000100c059080000000000a002000054000000feff", 0x1a, 0xa4000}, {&(0x7f0000011300)="000103006e0001003a1ef001200000007810e4070913142c1643092d0300030001000000010000000000000000000000004f53544120436f6d7072657373656420556e69636f646500000000000000000000000000000000000000000000000000000000000000000000000000000000084c696e7578554446", 0x79, 0xa8000}, {&(0x7f0000011400)="00000000000000000000000000000009004f53544120436f6d7072657373656420556e69636f646500000000000000000000000000000000000000000000000000000000000000000000000000000000084c696e7578554446000000000000000000000000000000000000000000000908436f707972696768740000000000000000000000000000000000000000000a084162737472616374000000000000000000000000000000000000000000000900020000600000000000000000000000002a4f5354412055444620436f6d706c69616e74000000000102000000000000000000000000000000000000000000000002000040", 0xf5, 0xa80e0}, {&(0x7f0000011700)="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", 0x1e0, 0xb0000}], 0x88003, &(0x7f0000013500)) (async) chdir(&(0x7f0000000140)='./file0\x00') r0 = open(&(0x7f0000000200)='./bus\x00', 0x141042, 0x0) (async) r1 = syz_open_dev$usbfs(&(0x7f0000000840), 0x90f, 0x68501) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$USBDEVFS_CONTROL(r2, 0xc0185500, &(0x7f00000000c0)={0x80, 0x6, 0x303, 0x0, 0x4, 0x0, 0x0}) perf_event_open$cgroup(&(0x7f0000000400)={0x0, 0x80, 0xff, 0x6, 0x0, 0x8, 0x0, 0x4, 0x45002, 0x4, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x4, @perf_config_ext={0x4, 0x3}, 0x8000, 0x7f, 0x1, 0x6, 0x1, 0x9, 0x2, 0x0, 0x21, 0x0, 0x4}, r2, 0xc, 0xffffffffffffffff, 0xa) write$UHID_INPUT(r0, &(0x7f0000000980), 0x10a9) (async) r3 = open(&(0x7f00000003c0)='./bus\x00', 0x145742, 0x111) ftruncate(r3, 0x80006) (async) sendfile(r0, r0, &(0x7f00000001c0), 0x8080ffffff80) [ 810.980253] erofs: root inode @ nid 36 [ 810.985720] erofs: bogus i_mode (0) @ nid 36 [ 811.102876] erofs: read_super, device -> /dev/loop2 19:41:32 executing program 3: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b0046701039e000c", 0xd, 0x400}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000080)={[{@fault_injection}]}) [ 811.134824] erofs: options -> fault_injection=0x0000000000000000, [ 811.140245] FAULT_INJECTION: forcing a failure. [ 811.140245] name failslab, interval 1, probability 0, space 0, times 0 [ 811.154760] erofs: FAULT_INJECTION was not selected [ 811.155450] CPU: 1 PID: 7318 Comm: syz-executor.1 Not tainted 4.19.211-syzkaller #0 [ 811.167587] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 811.171082] erofs: root inode @ nid 36 [ 811.176933] Call Trace: 19:41:32 executing program 5: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b004671fffffff0c0024", 0xf, 0x400}, {&(0x7f0000000280)="05", 0x1, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000080)={[{@fault_injection}]}) [ 811.176957] dump_stack+0x1fc/0x2ef [ 811.176974] should_fail.cold+0xa/0xf [ 811.176992] ? setup_fault_attr+0x200/0x200 [ 811.183765] erofs: mounted on /dev/loop2 with opts: fault_injection=0x0000000000000000. [ 811.187048] ? lock_acquire+0x170/0x3c0 [ 811.187070] __should_failslab+0x115/0x180 [ 811.187087] should_failslab+0x5/0x10 [ 811.215289] kmem_cache_alloc+0x277/0x370 [ 811.219457] __kernfs_new_node+0xd2/0x680 [ 811.223625] ? kernfs_dop_revalidate+0x3a0/0x3a0 [ 811.228388] ? __mutex_unlock_slowpath+0xea/0x610 [ 811.233240] ? wait_for_completion_io+0x10/0x10 [ 811.237931] ? kernfs_next_descendant_post+0x19c/0x290 [ 811.243234] kernfs_new_node+0x92/0x120 [ 811.247263] __kernfs_create_file+0x51/0x340 [ 811.251688] sysfs_add_file_mode_ns+0x226/0x540 [ 811.256376] internal_create_group+0x355/0xb20 [ 811.260976] ? sysfs_remove_link_from_group+0x70/0x70 [ 811.266175] ? lock_downgrade+0x720/0x720 [ 811.270344] lo_ioctl+0xf7c/0x20e0 [ 811.273899] ? loop_set_status64+0x110/0x110 [ 811.278317] blkdev_ioctl+0x5cb/0x1a80 [ 811.282213] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 811.287585] ? blkpg_ioctl+0x9d0/0x9d0 [ 811.291477] ? mark_held_locks+0xf0/0xf0 [ 811.295548] ? mark_held_locks+0xf0/0xf0 [ 811.299619] ? debug_check_no_obj_freed+0x201/0x490 [ 811.304653] ? lock_downgrade+0x720/0x720 [ 811.308817] block_ioctl+0xe9/0x130 [ 811.312459] ? blkdev_fallocate+0x3f0/0x3f0 [ 811.316790] do_vfs_ioctl+0xcdb/0x12e0 [ 811.320701] ? lock_downgrade+0x720/0x720 [ 811.324867] ? check_preemption_disabled+0x41/0x280 [ 811.329893] ? ioctl_preallocate+0x200/0x200 [ 811.334318] ? __fget+0x356/0x510 [ 811.337786] ? do_dup2+0x450/0x450 [ 811.341333] ? do_sys_open+0x2bf/0x520 [ 811.345254] ksys_ioctl+0x9b/0xc0 [ 811.348717] __x64_sys_ioctl+0x6f/0xb0 [ 811.352613] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 811.357201] do_syscall_64+0xf9/0x620 [ 811.361016] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 811.366219] RIP: 0033:0x7ff03e650c77 [ 811.369944] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 04 54 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 811.388849] RSP: 002b:00007ff03cfc5f28 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 811.396569] RAX: ffffffffffffffda RBX: 00007ff03e69a9c8 RCX: 00007ff03e650c77 [ 811.403850] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 811.411129] RBP: 0000000000000005 R08: 0000000000000000 R09: 00007ff03cfc61d0 [ 811.418405] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 811.425687] R13: 0000000000000004 R14: 0000000020000248 R15: 0000000000000003 19:41:32 executing program 2: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c0024", 0xf, 0x400}, {&(0x7f0000000280)="05000000c041", 0x6, 0x480}, {0x0, 0xff0f, 0x1000}], 0x0, &(0x7f0000000080)={[{@fault_injection}]}) [ 811.453132] erofs: read_super, device -> /dev/loop0 [ 811.456857] erofs: read_super, device -> /dev/loop1 [ 811.465385] erofs: options -> [ 811.472248] erofs: options -> [ 811.481737] erofs: unmounted for /dev/loop2 [ 811.488118] erofs: root inode @ nid 36 [ 811.493171] erofs: blksize 1 isn't supported on this platform [ 811.494786] erofs: mounted on /dev/loop1 with opts: . 19:41:32 executing program 1: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c0024", 0xf, 0x400}, {&(0x7f0000000280)="050000040041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000080)) (fail_nth: 15) [ 811.548156] erofs: unmounted for /dev/loop1 [ 811.569193] erofs: read_super, device -> /dev/loop5 [ 811.574392] erofs: options -> fault_injection=0x0000000000000000, [ 811.582200] erofs: FAULT_INJECTION was not selected [ 811.594374] erofs: read_super, device -> /dev/loop3 [ 811.600496] erofs: options -> fault_injection=0x0000000000000000, [ 811.607041] erofs: root inode @ nid 36 [ 811.612277] erofs: FAULT_INJECTION was not selected 19:41:32 executing program 0: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e0", 0x4, 0x400}, {0x0, 0x20000, 0x1000}], 0x0, &(0x7f0000000080)) [ 811.618301] erofs: root inode @ nid 0 [ 811.622380] erofs: bogus i_mode (0) @ nid 36 [ 811.630857] erofs: bogus i_mode (0) @ nid 0 [ 811.644309] erofs: read_super, device -> /dev/loop2 [ 811.655689] erofs: options -> fault_injection=0x0000000000000000, [ 811.663617] erofs: FAULT_INJECTION was not selected [ 811.672068] erofs: root inode @ nid 36 [ 811.679971] FAULT_INJECTION: forcing a failure. [ 811.679971] name failslab, interval 1, probability 0, space 0, times 0 [ 811.688918] erofs: mounted on /dev/loop2 with opts: fault_injection=0x0000000000000000. [ 811.696641] CPU: 1 PID: 7356 Comm: syz-executor.1 Not tainted 4.19.211-syzkaller #0 [ 811.707210] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 811.716570] Call Trace: [ 811.719353] dump_stack+0x1fc/0x2ef [ 811.723000] should_fail.cold+0xa/0xf [ 811.726905] ? setup_fault_attr+0x200/0x200 [ 811.731220] ? lock_acquire+0x170/0x3c0 [ 811.735193] __should_failslab+0x115/0x180 [ 811.739438] should_failslab+0x5/0x10 [ 811.743248] kmem_cache_alloc+0x277/0x370 [ 811.747412] __kernfs_new_node+0xd2/0x680 [ 811.751573] ? kernfs_dop_revalidate+0x3a0/0x3a0 [ 811.756337] ? __mutex_unlock_slowpath+0xea/0x610 [ 811.761298] ? wait_for_completion_io+0x10/0x10 [ 811.765979] ? kernfs_next_descendant_post+0x19c/0x290 [ 811.771261] kernfs_new_node+0x92/0x120 [ 811.775240] __kernfs_create_file+0x51/0x340 [ 811.779652] sysfs_add_file_mode_ns+0x226/0x540 [ 811.784317] internal_create_group+0x355/0xb20 [ 811.788906] ? sysfs_remove_link_from_group+0x70/0x70 [ 811.794111] ? lock_downgrade+0x720/0x720 [ 811.798286] lo_ioctl+0xf7c/0x20e0 [ 811.801844] ? loop_set_status64+0x110/0x110 [ 811.806266] blkdev_ioctl+0x5cb/0x1a80 [ 811.810166] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 811.815531] ? blkpg_ioctl+0x9d0/0x9d0 [ 811.819427] ? mark_held_locks+0xf0/0xf0 [ 811.823498] ? mark_held_locks+0xf0/0xf0 [ 811.827574] ? debug_check_no_obj_freed+0x201/0x490 [ 811.832608] ? lock_downgrade+0x720/0x720 [ 811.836758] block_ioctl+0xe9/0x130 [ 811.840375] ? blkdev_fallocate+0x3f0/0x3f0 [ 811.844696] do_vfs_ioctl+0xcdb/0x12e0 [ 811.848593] ? lock_downgrade+0x720/0x720 [ 811.852743] ? check_preemption_disabled+0x41/0x280 [ 811.857748] ? ioctl_preallocate+0x200/0x200 [ 811.862151] ? __fget+0x356/0x510 [ 811.865604] ? do_dup2+0x450/0x450 [ 811.869142] ? do_sys_open+0x2bf/0x520 [ 811.873030] ksys_ioctl+0x9b/0xc0 [ 811.876486] __x64_sys_ioctl+0x6f/0xb0 [ 811.880375] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 811.884960] do_syscall_64+0xf9/0x620 [ 811.888773] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 811.893959] RIP: 0033:0x7ff03e650c77 [ 811.897669] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 04 54 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 19:41:33 executing program 4: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c0024", 0xf, 0x400}, {&(0x7f0000000280)="05000000c041", 0x6, 0x480}, {0x0, 0x3f00, 0x1000}], 0x0, &(0x7f0000000080)={[{@fault_injection}]}) 19:41:33 executing program 2: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c0024", 0xf, 0x400}, {&(0x7f0000000280)="05000000c041", 0x6, 0x480}, {0x0, 0x40000, 0x1000}], 0x0, &(0x7f0000000080)={[{@fault_injection}]}) [ 811.916566] RSP: 002b:00007ff03cfc5f28 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 811.924264] RAX: ffffffffffffffda RBX: 00007ff03e69a9c8 RCX: 00007ff03e650c77 [ 811.931525] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 811.938790] RBP: 0000000000000005 R08: 0000000000000000 R09: 00007ff03cfc61d0 [ 811.946064] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 811.953328] R13: 0000000000000004 R14: 0000000020000248 R15: 0000000000000003 19:41:33 executing program 5: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b0046701000000060024", 0xf, 0x400}, {&(0x7f0000000280)="05", 0x1, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000080)={[{@fault_injection}]}) 19:41:33 executing program 3: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b0046701039f000c", 0xd, 0x400}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000080)={[{@fault_injection}]}) [ 812.001933] erofs: unmounted for /dev/loop2 [ 812.026823] erofs: read_super, device -> /dev/loop1 [ 812.036034] erofs: options -> [ 812.040605] erofs: root inode @ nid 36 [ 812.044821] erofs: mounted on /dev/loop1 with opts: . [ 812.053954] erofs: read_super, device -> /dev/loop0 [ 812.065570] erofs: options -> 19:41:33 executing program 1: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c0024", 0xf, 0x400}, {&(0x7f0000000280)="050000040041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000080)) (fail_nth: 16) 19:41:33 executing program 4: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c0024", 0xf, 0x400}, {&(0x7f0000000280)="05000000c041", 0x6, 0x480}, {0x0, 0x3f00, 0x1000}], 0x0, &(0x7f0000000080)={[{@fault_injection}]}) [ 812.082613] erofs: blksize 1 isn't supported on this platform [ 812.101601] erofs: unmounted for /dev/loop1 19:41:33 executing program 0: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e0", 0x4, 0x400}, {0x0, 0x40000, 0x1000}], 0x0, &(0x7f0000000080)) [ 812.179647] erofs: read_super, device -> /dev/loop2 [ 812.179651] erofs: read_super, device -> /dev/loop3 [ 812.179663] erofs: options -> fault_injection=0x0000000000000000, [ 812.184699] erofs: options -> fault_injection=0x0000000000000000, [ 812.202758] erofs: read_super, device -> /dev/loop5 [ 812.206336] erofs: FAULT_INJECTION was not selected [ 812.216107] erofs: options -> fault_injection=0x0000000000000000, [ 812.220830] erofs: root inode @ nid 36 [ 812.234732] erofs: blksize 64 isn't supported on this platform [ 812.237111] erofs: mounted on /dev/loop2 with opts: fault_injection=0x0000000000000000. [ 812.244030] erofs: FAULT_INJECTION was not selected [ 812.254824] FAULT_INJECTION: forcing a failure. [ 812.254824] name failslab, interval 1, probability 0, space 0, times 0 [ 812.266487] erofs: root inode @ nid 0 [ 812.271276] CPU: 0 PID: 7391 Comm: syz-executor.1 Not tainted 4.19.211-syzkaller #0 [ 812.279084] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 812.288427] Call Trace: [ 812.291040] dump_stack+0x1fc/0x2ef [ 812.294684] should_fail.cold+0xa/0xf [ 812.297074] erofs: bogus i_mode (0) @ nid 0 [ 812.298489] ? setup_fault_attr+0x200/0x200 [ 812.298505] ? lock_acquire+0x170/0x3c0 [ 812.298528] __should_failslab+0x115/0x180 [ 812.298545] should_failslab+0x5/0x10 [ 812.298561] kmem_cache_alloc+0x277/0x370 [ 812.323239] __kernfs_new_node+0xd2/0x680 [ 812.327378] ? kernfs_dop_revalidate+0x3a0/0x3a0 [ 812.332125] ? __mutex_unlock_slowpath+0xea/0x610 [ 812.336950] ? wait_for_completion_io+0x10/0x10 [ 812.341600] ? kernfs_next_descendant_post+0x19c/0x290 [ 812.346876] kernfs_new_node+0x92/0x120 [ 812.350837] __kernfs_create_file+0x51/0x340 [ 812.355229] sysfs_add_file_mode_ns+0x226/0x540 [ 812.359884] internal_create_group+0x355/0xb20 [ 812.364448] ? sysfs_remove_link_from_group+0x70/0x70 [ 812.369614] ? lock_downgrade+0x720/0x720 [ 812.373751] lo_ioctl+0xf7c/0x20e0 [ 812.377276] ? loop_set_status64+0x110/0x110 [ 812.381776] blkdev_ioctl+0x5cb/0x1a80 [ 812.385644] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 812.390989] ? blkpg_ioctl+0x9d0/0x9d0 [ 812.394858] ? mark_held_locks+0xf0/0xf0 [ 812.398899] ? mark_held_locks+0xf0/0xf0 [ 812.402943] ? debug_check_no_obj_freed+0x201/0x490 [ 812.407945] ? lock_downgrade+0x720/0x720 [ 812.412074] block_ioctl+0xe9/0x130 [ 812.415678] ? blkdev_fallocate+0x3f0/0x3f0 [ 812.419980] do_vfs_ioctl+0xcdb/0x12e0 [ 812.423849] ? lock_downgrade+0x720/0x720 [ 812.427983] ? check_preemption_disabled+0x41/0x280 [ 812.432980] ? ioctl_preallocate+0x200/0x200 [ 812.437372] ? __fget+0x356/0x510 [ 812.440813] ? do_dup2+0x450/0x450 [ 812.444334] ? do_sys_open+0x2bf/0x520 [ 812.448227] ksys_ioctl+0x9b/0xc0 [ 812.452030] __x64_sys_ioctl+0x6f/0xb0 [ 812.455908] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 812.460479] do_syscall_64+0xf9/0x620 [ 812.464279] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 812.469466] RIP: 0033:0x7ff03e650c77 [ 812.473175] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 04 54 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 812.492071] RSP: 002b:00007ff03cfc5f28 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 812.499761] RAX: ffffffffffffffda RBX: 00007ff03e69a9c8 RCX: 00007ff03e650c77 [ 812.507010] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 812.514263] RBP: 0000000000000005 R08: 0000000000000000 R09: 00007ff03cfc61d0 [ 812.521513] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 812.528766] R13: 0000000000000004 R14: 0000000020000248 R15: 0000000000000003 19:41:33 executing program 4: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c0024", 0xf, 0x400}, {&(0x7f0000000280)="05000000c041", 0x6, 0x480}, {0x0, 0x3f00, 0x1000}], 0x0, &(0x7f0000000080)={[{@fault_injection}]}) [ 812.585751] erofs: read_super, device -> /dev/loop0 [ 812.591127] erofs: read_super, device -> /dev/loop1 [ 812.596167] erofs: options -> [ 812.617078] erofs: options -> [ 812.630554] erofs: root inode @ nid 36 19:41:33 executing program 5: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010200000c0024", 0xf, 0x400}, {&(0x7f0000000280)="05", 0x1, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000080)={[{@fault_injection}]}) 19:41:33 executing program 2: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c0024", 0xf, 0x400}, {&(0x7f0000000280)="05000000c041", 0x6, 0x480}, {0x0, 0x1fffff, 0x1000}], 0x0, &(0x7f0000000080)={[{@fault_injection}]}) 19:41:33 executing program 3: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b004670103a0000c", 0xd, 0x400}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000080)={[{@fault_injection}]}) 19:41:33 executing program 0: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e0", 0x4, 0x400}, {0x0, 0x100000, 0x1000}], 0x0, &(0x7f0000000080)) [ 812.634663] erofs: blksize 1 isn't supported on this platform [ 812.644545] erofs: mounted on /dev/loop1 with opts: . [ 812.650272] erofs: unmounted for /dev/loop2 19:41:33 executing program 1: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c0024", 0xf, 0x400}, {&(0x7f0000000280)="050000040041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000080)) (fail_nth: 17) 19:41:33 executing program 4: r0 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000000)='.log\x00', 0x2400c0, 0x20) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x8) syz_kvm_setup_cpu$x86(r0, r1, &(0x7f0000fe5000/0x18000)=nil, &(0x7f0000000100)=[@text64={0x40, &(0x7f0000000080)="65f30fc7b601000000f30f011964360f01cbc744240000000000c744240200580000c7442406000000000f011c240f07c401fa10b41600700000d976470f01ca66b87f008ec0450f01c8", 0x4a}], 0x1, 0x20, &(0x7f0000000140)=[@cr0={0x0, 0x40000002}, @efer={0x2, 0x4000}], 0x2) r2 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000200), 0x0, 0x0) r3 = syz_mount_image$fuse(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x8004, &(0x7f0000000240)={{'fd', 0x3d, r2}, 0x2c, {'rootmode', 0x3d, 0x1000}, 0x2c, {'user_id', 0x3d, 0xee01}, 0x2c, {'group_id', 0x3d, 0xee00}, 0x2c, {[{@allow_other}, {@blksize={'blksize', 0x3d, 0x1200}}], [{@defcontext={'defcontext', 0x3d, 'system_u'}}, {@euid_eq={'euid', 0x3d, 0xee00}}, {@dont_appraise}, {@fscontext={'fscontext', 0x3d, 'unconfined_u'}}, {@dont_hash}, {@euid_eq}]}}) ioctl$TIOCNXCL(0xffffffffffffffff, 0x540d) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r2, 0xc0406619, &(0x7f0000000380)={@desc={0x1, 0x0, @desc3}}) ioctl$KVM_RUN(r0, 0xae80, 0x0) r4 = open(&(0x7f00000003c0)='./file0\x00', 0x9e080, 0x6) ioctl$TIOCGPGRP(r0, 0x540f, &(0x7f0000000400)) r5 = dup2(r3, r3) openat(r5, &(0x7f0000000440)='./file0\x00', 0x100, 0x10) ioctl$KVM_TRANSLATE(r2, 0xc018ae85, &(0x7f0000000480)={0x0, 0x10000, 0x4, 0x1, 0x4}) setsockopt$ARPT_SO_SET_REPLACE(r5, 0x0, 0x60, &(0x7f0000000500)={'filter\x00', 0x7, 0x4, 0x3e8, 0x1f0, 0x1f0, 0x1f0, 0x300, 0x300, 0x300, 0x4, &(0x7f00000004c0), {[{{@uncond, 0xc0, 0x108}, @unspec=@LED={0x48, 'LED\x00', 0x0, {'syz1\x00', 0x0, 0x0, {0x3ff}}}}, {{@arp={@empty, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0xffffffff, 0xd, 0xd, {@mac=@random="81a60ae8b95d", {[0x0, 0xff, 0x0, 0xff, 0xff, 0xff]}}, {@empty, {[0xff, 0x0, 0x0, 0x0, 0xff]}}, 0x3f, 0x1f, 0x1f, 0xc7, 0x7, 0x4, 'sit0\x00', 'veth0_to_bridge\x00', {}, {0xff}, 0x0, 0x410}, 0xc0, 0xe8}, @unspec=@NFQUEUE1={0x28, 'NFQUEUE\x00', 0x1, {0x7, 0xfa43}}}, {{@arp={@dev={0xac, 0x14, 0x14, 0x26}, @rand_addr=0x64010101, 0xffffff00, 0xffffffff, 0x4, 0xd, {@empty, {[0xff, 0x0, 0x7f]}}, {@empty, {[0xff, 0x0, 0xff]}}, 0x800, 0x40e, 0x0, 0x8, 0x7, 0x2, 'vlan0\x00', 'bridge0\x00', {}, {0xff}}, 0xc0, 0x110}, @mangle={0x50, 'mangle\x00', 0x0, {@empty, @empty, @dev={0xac, 0x14, 0x14, 0x2d}, @rand_addr=0x64010100, 0x8ecdcc6143a313e, 0x1}}}], {{'\x00', 0xc0, 0xe8}, {0x28}}}}, 0x438) r6 = bpf$ITER_CREATE(0x21, &(0x7f0000000940)={r4}, 0x8) ioctl$KDFONTOP_SET(r6, 0x4b72, &(0x7f0000000d80)={0x0, 0x0, 0x3, 0x13, 0xd3, &(0x7f0000000980)="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"}) ioctl$KVM_PPC_ALLOCATE_HTAB(r6, 0xc004aea7, &(0x7f0000000dc0)) r7 = openat$cgroup_ro(r5, &(0x7f0000000e00)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) read$FUSE(r6, &(0x7f0000000e40)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_INTERRUPT(r7, &(0x7f0000002e80)={0x10, 0x0, r8}, 0x10) [ 812.739313] erofs: unmounted for /dev/loop1 [ 812.773547] erofs: read_super, device -> /dev/loop5 [ 812.783032] erofs: read_super, device -> /dev/loop3 [ 812.796182] erofs: options -> fault_injection=0x0000000000000000, [ 812.799439] FAULT_INJECTION: forcing a failure. [ 812.799439] name failslab, interval 1, probability 0, space 0, times 0 [ 812.803336] erofs: options -> fault_injection=0x0000000000000000, [ 812.825824] erofs: FAULT_INJECTION was not selected [ 812.831567] erofs: root inode @ nid 36 [ 812.835617] CPU: 0 PID: 7420 Comm: syz-executor.1 Not tainted 4.19.211-syzkaller #0 [ 812.835691] erofs: bogus i_mode (0) @ nid 36 [ 812.843416] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 812.843428] Call Trace: [ 812.843450] dump_stack+0x1fc/0x2ef [ 812.843470] should_fail.cold+0xa/0xf [ 812.843486] ? setup_fault_attr+0x200/0x200 [ 812.843501] ? lock_acquire+0x170/0x3c0 [ 812.843519] __should_failslab+0x115/0x180 [ 812.843534] should_failslab+0x5/0x10 [ 812.843547] kmem_cache_alloc+0x277/0x370 [ 812.843564] __kernfs_new_node+0xd2/0x680 [ 812.848680] erofs: FAULT_INJECTION was not selected [ 812.857303] ? kernfs_dop_revalidate+0x3a0/0x3a0 [ 812.857323] ? __mutex_unlock_slowpath+0xea/0x610 [ 812.857340] ? wait_for_completion_io+0x10/0x10 [ 812.857355] ? kernfs_next_descendant_post+0x19c/0x290 [ 812.857373] kernfs_new_node+0x92/0x120 [ 812.860493] erofs: root inode @ nid 0 [ 812.863600] __kernfs_create_file+0x51/0x340 [ 812.863622] sysfs_add_file_mode_ns+0x226/0x540 [ 812.863642] internal_create_group+0x355/0xb20 [ 812.863659] ? sysfs_remove_link_from_group+0x70/0x70 [ 812.867903] erofs: bogus i_mode (0) @ nid 0 [ 812.871749] ? lock_downgrade+0x720/0x720 [ 812.871777] lo_ioctl+0xf7c/0x20e0 [ 812.871798] ? loop_set_status64+0x110/0x110 [ 812.871816] blkdev_ioctl+0x5cb/0x1a80 [ 812.963392] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 812.968742] ? blkpg_ioctl+0x9d0/0x9d0 [ 812.972614] ? mark_held_locks+0xf0/0xf0 [ 812.976689] ? mark_held_locks+0xf0/0xf0 [ 812.980736] ? debug_check_no_obj_freed+0x201/0x490 [ 812.985740] ? lock_downgrade+0x720/0x720 [ 812.989869] block_ioctl+0xe9/0x130 [ 812.993475] ? blkdev_fallocate+0x3f0/0x3f0 [ 812.997788] do_vfs_ioctl+0xcdb/0x12e0 [ 813.001660] ? lock_downgrade+0x720/0x720 [ 813.005790] ? check_preemption_disabled+0x41/0x280 [ 813.010788] ? ioctl_preallocate+0x200/0x200 [ 813.015179] ? __fget+0x356/0x510 [ 813.018614] ? do_dup2+0x450/0x450 [ 813.022136] ? do_sys_open+0x2bf/0x520 [ 813.026021] ksys_ioctl+0x9b/0xc0 [ 813.029460] __x64_sys_ioctl+0x6f/0xb0 [ 813.033329] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 813.037903] do_syscall_64+0xf9/0x620 [ 813.041695] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 813.046863] RIP: 0033:0x7ff03e650c77 [ 813.050557] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 04 54 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 813.069439] RSP: 002b:00007ff03cfc5f28 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 19:41:34 executing program 4: r0 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000000)='.log\x00', 0x2400c0, 0x20) (async, rerun: 64) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x8) (rerun: 64) syz_kvm_setup_cpu$x86(r0, r1, &(0x7f0000fe5000/0x18000)=nil, &(0x7f0000000100)=[@text64={0x40, &(0x7f0000000080)="65f30fc7b601000000f30f011964360f01cbc744240000000000c744240200580000c7442406000000000f011c240f07c401fa10b41600700000d976470f01ca66b87f008ec0450f01c8", 0x4a}], 0x1, 0x20, &(0x7f0000000140)=[@cr0={0x0, 0x40000002}, @efer={0x2, 0x4000}], 0x2) (async) r2 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000200), 0x0, 0x0) r3 = syz_mount_image$fuse(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x8004, &(0x7f0000000240)={{'fd', 0x3d, r2}, 0x2c, {'rootmode', 0x3d, 0x1000}, 0x2c, {'user_id', 0x3d, 0xee01}, 0x2c, {'group_id', 0x3d, 0xee00}, 0x2c, {[{@allow_other}, {@blksize={'blksize', 0x3d, 0x1200}}], [{@defcontext={'defcontext', 0x3d, 'system_u'}}, {@euid_eq={'euid', 0x3d, 0xee00}}, {@dont_appraise}, {@fscontext={'fscontext', 0x3d, 'unconfined_u'}}, {@dont_hash}, {@euid_eq}]}}) (async) ioctl$TIOCNXCL(0xffffffffffffffff, 0x540d) (async) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r2, 0xc0406619, &(0x7f0000000380)={@desc={0x1, 0x0, @desc3}}) (async, rerun: 32) ioctl$KVM_RUN(r0, 0xae80, 0x0) (rerun: 32) r4 = open(&(0x7f00000003c0)='./file0\x00', 0x9e080, 0x6) ioctl$TIOCGPGRP(r0, 0x540f, &(0x7f0000000400)) (async) r5 = dup2(r3, r3) openat(r5, &(0x7f0000000440)='./file0\x00', 0x100, 0x10) (async) ioctl$KVM_TRANSLATE(r2, 0xc018ae85, &(0x7f0000000480)={0x0, 0x10000, 0x4, 0x1, 0x4}) (async) setsockopt$ARPT_SO_SET_REPLACE(r5, 0x0, 0x60, &(0x7f0000000500)={'filter\x00', 0x7, 0x4, 0x3e8, 0x1f0, 0x1f0, 0x1f0, 0x300, 0x300, 0x300, 0x4, &(0x7f00000004c0), {[{{@uncond, 0xc0, 0x108}, @unspec=@LED={0x48, 'LED\x00', 0x0, {'syz1\x00', 0x0, 0x0, {0x3ff}}}}, {{@arp={@empty, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0xffffffff, 0xd, 0xd, {@mac=@random="81a60ae8b95d", {[0x0, 0xff, 0x0, 0xff, 0xff, 0xff]}}, {@empty, {[0xff, 0x0, 0x0, 0x0, 0xff]}}, 0x3f, 0x1f, 0x1f, 0xc7, 0x7, 0x4, 'sit0\x00', 'veth0_to_bridge\x00', {}, {0xff}, 0x0, 0x410}, 0xc0, 0xe8}, @unspec=@NFQUEUE1={0x28, 'NFQUEUE\x00', 0x1, {0x7, 0xfa43}}}, {{@arp={@dev={0xac, 0x14, 0x14, 0x26}, @rand_addr=0x64010101, 0xffffff00, 0xffffffff, 0x4, 0xd, {@empty, {[0xff, 0x0, 0x7f]}}, {@empty, {[0xff, 0x0, 0xff]}}, 0x800, 0x40e, 0x0, 0x8, 0x7, 0x2, 'vlan0\x00', 'bridge0\x00', {}, {0xff}}, 0xc0, 0x110}, @mangle={0x50, 'mangle\x00', 0x0, {@empty, @empty, @dev={0xac, 0x14, 0x14, 0x2d}, @rand_addr=0x64010100, 0x8ecdcc6143a313e, 0x1}}}], {{'\x00', 0xc0, 0xe8}, {0x28}}}}, 0x438) (async, rerun: 64) r6 = bpf$ITER_CREATE(0x21, &(0x7f0000000940)={r4}, 0x8) (rerun: 64) ioctl$KDFONTOP_SET(r6, 0x4b72, &(0x7f0000000d80)={0x0, 0x0, 0x3, 0x13, 0xd3, &(0x7f0000000980)="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"}) ioctl$KVM_PPC_ALLOCATE_HTAB(r6, 0xc004aea7, &(0x7f0000000dc0)) (async) r7 = openat$cgroup_ro(r5, &(0x7f0000000e00)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) read$FUSE(r6, &(0x7f0000000e40)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_INTERRUPT(r7, &(0x7f0000002e80)={0x10, 0x0, r8}, 0x10) [ 813.077130] RAX: ffffffffffffffda RBX: 00007ff03e69a9c8 RCX: 00007ff03e650c77 [ 813.084389] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 813.091644] RBP: 0000000000000005 R08: 0000000000000000 R09: 00007ff03cfc61d0 [ 813.098894] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 813.106152] R13: 0000000000000004 R14: 0000000020000248 R15: 0000000000000003 [ 813.171655] erofs: read_super, device -> /dev/loop1 [ 813.176883] erofs: options -> [ 813.180645] erofs: read_super, device -> /dev/loop0 [ 813.185678] erofs: options -> [ 813.197998] erofs: root inode @ nid 36 [ 813.205196] erofs: blksize 1 isn't supported on this platform [ 813.215592] erofs: mounted on /dev/loop1 with opts: . 19:41:34 executing program 0: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e0", 0x4, 0x400}, {0x0, 0x1fffff, 0x1000}], 0x0, &(0x7f0000000080)) 19:41:34 executing program 5: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010300000c0024", 0xf, 0x400}, {&(0x7f0000000280)="05", 0x1, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000080)={[{@fault_injection}]}) 19:41:34 executing program 3: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010fff000c", 0xd, 0x400}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000080)={[{@fault_injection}]}) [ 813.229524] erofs: read_super, device -> /dev/loop2 [ 813.235022] erofs: options -> fault_injection=0x0000000000000000, 19:41:34 executing program 1: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c0024", 0xf, 0x400}, {&(0x7f0000000280)="050000040041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000080)) (fail_nth: 18) 19:41:34 executing program 4: r0 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000000)='.log\x00', 0x2400c0, 0x20) (async) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x8) syz_kvm_setup_cpu$x86(r0, r1, &(0x7f0000fe5000/0x18000)=nil, &(0x7f0000000100)=[@text64={0x40, &(0x7f0000000080)="65f30fc7b601000000f30f011964360f01cbc744240000000000c744240200580000c7442406000000000f011c240f07c401fa10b41600700000d976470f01ca66b87f008ec0450f01c8", 0x4a}], 0x1, 0x20, &(0x7f0000000140)=[@cr0={0x0, 0x40000002}, @efer={0x2, 0x4000}], 0x2) r2 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000200), 0x0, 0x0) r3 = syz_mount_image$fuse(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x8004, &(0x7f0000000240)={{'fd', 0x3d, r2}, 0x2c, {'rootmode', 0x3d, 0x1000}, 0x2c, {'user_id', 0x3d, 0xee01}, 0x2c, {'group_id', 0x3d, 0xee00}, 0x2c, {[{@allow_other}, {@blksize={'blksize', 0x3d, 0x1200}}], [{@defcontext={'defcontext', 0x3d, 'system_u'}}, {@euid_eq={'euid', 0x3d, 0xee00}}, {@dont_appraise}, {@fscontext={'fscontext', 0x3d, 'unconfined_u'}}, {@dont_hash}, {@euid_eq}]}}) (async, rerun: 32) ioctl$TIOCNXCL(0xffffffffffffffff, 0x540d) (async, rerun: 32) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r2, 0xc0406619, &(0x7f0000000380)={@desc={0x1, 0x0, @desc3}}) (async) ioctl$KVM_RUN(r0, 0xae80, 0x0) (async) r4 = open(&(0x7f00000003c0)='./file0\x00', 0x9e080, 0x6) ioctl$TIOCGPGRP(r0, 0x540f, &(0x7f0000000400)) (async) r5 = dup2(r3, r3) openat(r5, &(0x7f0000000440)='./file0\x00', 0x100, 0x10) (async) ioctl$KVM_TRANSLATE(r2, 0xc018ae85, &(0x7f0000000480)={0x0, 0x10000, 0x4, 0x1, 0x4}) setsockopt$ARPT_SO_SET_REPLACE(r5, 0x0, 0x60, &(0x7f0000000500)={'filter\x00', 0x7, 0x4, 0x3e8, 0x1f0, 0x1f0, 0x1f0, 0x300, 0x300, 0x300, 0x4, &(0x7f00000004c0), {[{{@uncond, 0xc0, 0x108}, @unspec=@LED={0x48, 'LED\x00', 0x0, {'syz1\x00', 0x0, 0x0, {0x3ff}}}}, {{@arp={@empty, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0xffffffff, 0xd, 0xd, {@mac=@random="81a60ae8b95d", {[0x0, 0xff, 0x0, 0xff, 0xff, 0xff]}}, {@empty, {[0xff, 0x0, 0x0, 0x0, 0xff]}}, 0x3f, 0x1f, 0x1f, 0xc7, 0x7, 0x4, 'sit0\x00', 'veth0_to_bridge\x00', {}, {0xff}, 0x0, 0x410}, 0xc0, 0xe8}, @unspec=@NFQUEUE1={0x28, 'NFQUEUE\x00', 0x1, {0x7, 0xfa43}}}, {{@arp={@dev={0xac, 0x14, 0x14, 0x26}, @rand_addr=0x64010101, 0xffffff00, 0xffffffff, 0x4, 0xd, {@empty, {[0xff, 0x0, 0x7f]}}, {@empty, {[0xff, 0x0, 0xff]}}, 0x800, 0x40e, 0x0, 0x8, 0x7, 0x2, 'vlan0\x00', 'bridge0\x00', {}, {0xff}}, 0xc0, 0x110}, @mangle={0x50, 'mangle\x00', 0x0, {@empty, @empty, @dev={0xac, 0x14, 0x14, 0x2d}, @rand_addr=0x64010100, 0x8ecdcc6143a313e, 0x1}}}], {{'\x00', 0xc0, 0xe8}, {0x28}}}}, 0x438) (async) r6 = bpf$ITER_CREATE(0x21, &(0x7f0000000940)={r4}, 0x8) ioctl$KDFONTOP_SET(r6, 0x4b72, &(0x7f0000000d80)={0x0, 0x0, 0x3, 0x13, 0xd3, &(0x7f0000000980)="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"}) ioctl$KVM_PPC_ALLOCATE_HTAB(r6, 0xc004aea7, &(0x7f0000000dc0)) (async) r7 = openat$cgroup_ro(r5, &(0x7f0000000e00)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) (async) read$FUSE(r6, &(0x7f0000000e40)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_INTERRUPT(r7, &(0x7f0000002e80)={0x10, 0x0, r8}, 0x10) [ 813.292036] erofs: unmounted for /dev/loop1 [ 813.296098] erofs: FAULT_INJECTION was not selected [ 813.303685] erofs: root inode @ nid 36 [ 813.311220] erofs: mounted on /dev/loop2 with opts: fault_injection=0x0000000000000000. 19:41:34 executing program 2: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c0024", 0xf, 0x400}, {&(0x7f0000000280)="05000000c041", 0x6, 0x480}, {0x0, 0x1000000, 0x1000}], 0x0, &(0x7f0000000080)={[{@fault_injection}]}) [ 813.364808] erofs: read_super, device -> /dev/loop0 [ 813.365759] erofs: read_super, device -> /dev/loop3 [ 813.376791] erofs: options -> [ 813.381338] erofs: options -> fault_injection=0x0000000000000000, [ 813.389809] erofs: read_super, device -> /dev/loop5 [ 813.394851] erofs: options -> fault_injection=0x0000000000000000, [ 813.402405] erofs: blksize 1 isn't supported on this platform 19:41:34 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000001c0)=@newlink={0x28, 0x10, 0x401, 0x0, 0x4, {}, [@IFLA_NUM_TX_QUEUES={0x8, 0x1f, 0xfffffff8}]}, 0x28}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x28001010}, 0xc, &(0x7f00000000c0)={&(0x7f0000000540)=ANY=[@ANYBLOB="20000000680000022bbd7000ffdbdf25000002000b00000008000500", @ANYRES32=0x0, @ANYBLOB="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"], 0x20}, 0x1, 0x0, 0x0, 0x800}, 0x0) r1 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000180), 0x48000, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000500)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000004c0)={&(0x7f0000000440)=@gettaction={0x64, 0x32, 0x8, 0x70bd28, 0x25dfdbfc, {}, [@action_dump_flags=@TCA_ROOT_FLAGS={0xc}, @action_dump_flags=@TCA_ROOT_FLAGS={0xc, 0x2, {0x0, 0x1}}, @action_gd=@TCA_ACT_TAB={0x38, 0x1, [{0x10, 0x6, 0x0, 0x0, @TCA_ACT_KIND={0xb, 0x1, 'mirred\x00'}}, {0xc, 0x1c, 0x0, 0x0, @TCA_ACT_INDEX={0x8, 0x3, 0x1}}, {0xc, 0x12, 0x0, 0x0, @TCA_ACT_INDEX={0x8, 0x3, 0x5}}, {0xc, 0x1c, 0x0, 0x0, @TCA_ACT_INDEX={0x8, 0x3, 0x7ff0}}]}]}, 0x64}, 0x1, 0x0, 0x0, 0x4040041}, 0x2000) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x5, &(0x7f0000000200)=[{0x0, 0x0, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f0003000400000000000000", 0x1a, 0x1000}, {&(0x7f0000010500), 0x0, 0x2000}, {&(0x7f0000012600)="ed41000010000000daf4655fdbf4655fdbf4655f00000000000004008000000000000800050000000af301000400000000000000000000000900000010", 0x3d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='cpuacct.stat\x00', 0x26e1, 0x0) unlinkat(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x0, 0xff, 0x0, 0x0, 0x0, 0x248000009, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10100}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x4030582a, &(0x7f0000000040)) perf_event_open(&(0x7f0000000280)={0x4, 0x80, 0x0, 0x70, 0x7, 0x0, 0x0, 0x0, 0x20010, 0xd, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x9, 0xbe}, 0x40c31, 0x9, 0x0, 0x8, 0x4, 0x400, 0x0, 0x0, 0x29, 0x0, 0x6}, 0x0, 0x0, r2, 0x4) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0xe, 0x0, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) write$cgroup_type(r2, &(0x7f0000000140), 0xffffff1f) sendmsg$NFT_MSG_GETOBJ_RESET(r1, &(0x7f00000002c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)={0x2c, 0x15, 0xa, 0x401, 0x0, 0x0, {0x7, 0x0, 0x3}, [@NFTA_OBJ_NAME={0x9, 0x2, 'syz0\x00'}, @NFTA_OBJ_NAME={0x9, 0x2, 'syz2\x00'}]}, 0x2c}, 0x1, 0x0, 0x0, 0x4815}, 0x20040050) sendmsg$ETHTOOL_MSG_RINGS_SET(r1, &(0x7f00000003c0)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)={0x1c, 0x0, 0x800, 0x70bd28, 0x25dfdbfb, {}, [@ETHTOOL_A_RINGS_RX_JUMBO={0x8, 0x8, 0x7}]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000000}, 0x40) [ 813.416937] erofs: unmounted for /dev/loop2 [ 813.421515] erofs: FAULT_INJECTION was not selected [ 813.426621] erofs: root inode @ nid 0 [ 813.435473] erofs: FAULT_INJECTION was not selected [ 813.440953] FAULT_INJECTION: forcing a failure. [ 813.440953] name failslab, interval 1, probability 0, space 0, times 0 [ 813.452927] CPU: 1 PID: 7464 Comm: syz-executor.1 Not tainted 4.19.211-syzkaller #0 [ 813.460823] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 813.462325] erofs: bogus i_mode (0) @ nid 0 [ 813.470175] Call Trace: [ 813.470303] dump_stack+0x1fc/0x2ef [ 813.474852] erofs: root inode @ nid 36 [ 813.477193] should_fail.cold+0xa/0xf [ 813.477210] ? is_bpf_text_address+0xfc/0x1b0 [ 813.477228] ? setup_fault_attr+0x200/0x200 [ 813.477242] ? kernel_text_address+0xbd/0xf0 [ 813.477261] ? __kernel_text_address+0x9/0x30 [ 813.485520] erofs: bogus i_mode (0) @ nid 36 [ 813.488629] ? unwind_get_return_address+0x51/0x90 [ 813.488648] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 813.488672] __should_failslab+0x115/0x180 [ 813.488689] should_failslab+0x5/0x10 [ 813.488702] kmem_cache_alloc+0x3f/0x370 [ 813.488719] radix_tree_node_alloc.constprop.0+0x1e4/0x320 [ 813.488735] idr_get_free+0x50e/0xa10 [ 813.488759] idr_alloc_u32+0x1a5/0x320 [ 813.488777] ? __fprop_inc_percpu_max+0x210/0x210 [ 813.551555] ? mark_held_locks+0xf0/0xf0 [ 813.555610] ? node_tag_clear+0xb5/0x1b0 [ 813.559689] ? should_fail+0x142/0x7b0 [ 813.563569] ? fs_reclaim_release+0xd0/0x110 [ 813.567965] idr_alloc_cyclic+0x102/0x230 [ 813.572100] ? idr_alloc+0x130/0x130 [ 813.575797] ? __kernfs_new_node+0xf9/0x680 [ 813.580114] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 813.585134] __kernfs_new_node+0x11a/0x680 [ 813.589360] ? kernfs_dop_revalidate+0x3a0/0x3a0 [ 813.594103] ? __mutex_unlock_slowpath+0xea/0x610 [ 813.598963] ? wait_for_completion_io+0x10/0x10 [ 813.603631] ? kernfs_next_descendant_post+0x19c/0x290 [ 813.608898] kernfs_new_node+0x92/0x120 [ 813.612874] __kernfs_create_file+0x51/0x340 [ 813.617284] sysfs_add_file_mode_ns+0x226/0x540 [ 813.621965] internal_create_group+0x355/0xb20 [ 813.626543] ? sysfs_remove_link_from_group+0x70/0x70 [ 813.631718] ? lock_downgrade+0x720/0x720 [ 813.635858] lo_ioctl+0xf7c/0x20e0 [ 813.639396] ? loop_set_status64+0x110/0x110 [ 813.643800] blkdev_ioctl+0x5cb/0x1a80 [ 813.647672] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 813.653020] ? blkpg_ioctl+0x9d0/0x9d0 [ 813.656898] ? mark_held_locks+0xf0/0xf0 [ 813.660953] ? mark_held_locks+0xf0/0xf0 [ 813.665012] ? debug_check_no_obj_freed+0x201/0x490 [ 813.670016] ? lock_downgrade+0x720/0x720 [ 813.674271] block_ioctl+0xe9/0x130 [ 813.677891] ? blkdev_fallocate+0x3f0/0x3f0 [ 813.682218] do_vfs_ioctl+0xcdb/0x12e0 [ 813.686102] ? lock_downgrade+0x720/0x720 [ 813.690236] ? check_preemption_disabled+0x41/0x280 [ 813.695243] ? ioctl_preallocate+0x200/0x200 [ 813.699659] ? __fget+0x356/0x510 [ 813.703107] ? do_dup2+0x450/0x450 [ 813.706646] ? do_sys_open+0x2bf/0x520 [ 813.710538] ksys_ioctl+0x9b/0xc0 [ 813.713987] __x64_sys_ioctl+0x6f/0xb0 [ 813.717870] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 813.722460] do_syscall_64+0xf9/0x620 [ 813.726260] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 813.731433] RIP: 0033:0x7ff03e650c77 [ 813.735160] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 04 54 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 813.754051] RSP: 002b:00007ff03cfc5f28 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 813.761757] RAX: ffffffffffffffda RBX: 00007ff03e69a9c8 RCX: 00007ff03e650c77 [ 813.769028] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 813.776282] RBP: 0000000000000005 R08: 0000000000000000 R09: 00007ff03cfc61d0 [ 813.783544] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 813.790796] R13: 0000000000000004 R14: 0000000020000248 R15: 0000000000000003 19:41:35 executing program 3: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000d", 0xd, 0x400}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000080)={[{@fault_injection}]}) 19:41:35 executing program 0: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e0", 0x4, 0x400}, {0x0, 0x400000, 0x1000}], 0x0, &(0x7f0000000080)) [ 813.920728] erofs: read_super, device -> /dev/loop1 [ 813.925785] erofs: options -> 19:41:35 executing program 5: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010400000c0024", 0xf, 0x400}, {&(0x7f0000000280)="05", 0x1, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000080)={[{@fault_injection}]}) [ 813.963434] erofs: root inode @ nid 36 [ 813.971399] erofs: mounted on /dev/loop1 with opts: . 19:41:35 executing program 1: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c0024", 0xf, 0x400}, {&(0x7f0000000280)="050000040041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000080)) (fail_nth: 19) [ 814.021914] erofs: read_super, device -> /dev/loop2 [ 814.037870] erofs: unmounted for /dev/loop1 [ 814.042330] erofs: options -> fault_injection=0x0000000000000000, [ 814.057330] erofs: FAULT_INJECTION was not selected [ 814.081302] erofs: root inode @ nid 36 [ 814.085440] erofs: mounted on /dev/loop2 with opts: fault_injection=0x0000000000000000. 19:41:35 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000001c0)=@newlink={0x28, 0x10, 0x401, 0x0, 0x4, {}, [@IFLA_NUM_TX_QUEUES={0x8, 0x1f, 0xfffffff8}]}, 0x28}}, 0x0) (async) sendmsg$nl_route(r0, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x28001010}, 0xc, &(0x7f00000000c0)={&(0x7f0000000540)=ANY=[@ANYBLOB="20000000680000022bbd7000ffdbdf25000002000b00000008000500", @ANYRES32=0x0, @ANYBLOB="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"], 0x20}, 0x1, 0x0, 0x0, 0x800}, 0x0) r1 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000180), 0x48000, 0x0) (async) sendmsg$nl_route_sched(r0, &(0x7f0000000500)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000004c0)={&(0x7f0000000440)=@gettaction={0x64, 0x32, 0x8, 0x70bd28, 0x25dfdbfc, {}, [@action_dump_flags=@TCA_ROOT_FLAGS={0xc}, @action_dump_flags=@TCA_ROOT_FLAGS={0xc, 0x2, {0x0, 0x1}}, @action_gd=@TCA_ACT_TAB={0x38, 0x1, [{0x10, 0x6, 0x0, 0x0, @TCA_ACT_KIND={0xb, 0x1, 'mirred\x00'}}, {0xc, 0x1c, 0x0, 0x0, @TCA_ACT_INDEX={0x8, 0x3, 0x1}}, {0xc, 0x12, 0x0, 0x0, @TCA_ACT_INDEX={0x8, 0x3, 0x5}}, {0xc, 0x1c, 0x0, 0x0, @TCA_ACT_INDEX={0x8, 0x3, 0x7ff0}}]}]}, 0x64}, 0x1, 0x0, 0x0, 0x4040041}, 0x2000) (async) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x5, &(0x7f0000000200)=[{0x0, 0x0, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f0003000400000000000000", 0x1a, 0x1000}, {&(0x7f0000010500), 0x0, 0x2000}, {&(0x7f0000012600)="ed41000010000000daf4655fdbf4655fdbf4655f00000000000004008000000000000800050000000af301000400000000000000000000000900000010", 0x3d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) (async) chdir(&(0x7f0000000140)='./file0\x00') r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='cpuacct.stat\x00', 0x26e1, 0x0) (async) unlinkat(0xffffffffffffffff, 0x0, 0x0) (async) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x0, 0xff, 0x0, 0x0, 0x0, 0x248000009, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10100}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x4030582a, &(0x7f0000000040)) (async) perf_event_open(&(0x7f0000000280)={0x4, 0x80, 0x0, 0x70, 0x7, 0x0, 0x0, 0x0, 0x20010, 0xd, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x9, 0xbe}, 0x40c31, 0x9, 0x0, 0x8, 0x4, 0x400, 0x0, 0x0, 0x29, 0x0, 0x6}, 0x0, 0x0, r2, 0x4) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async, rerun: 64) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0xe, 0x0, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) (async, rerun: 64) write$cgroup_type(r2, &(0x7f0000000140), 0xffffff1f) sendmsg$NFT_MSG_GETOBJ_RESET(r1, &(0x7f00000002c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)={0x2c, 0x15, 0xa, 0x401, 0x0, 0x0, {0x7, 0x0, 0x3}, [@NFTA_OBJ_NAME={0x9, 0x2, 'syz0\x00'}, @NFTA_OBJ_NAME={0x9, 0x2, 'syz2\x00'}]}, 0x2c}, 0x1, 0x0, 0x0, 0x4815}, 0x20040050) sendmsg$ETHTOOL_MSG_RINGS_SET(r1, &(0x7f00000003c0)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)={0x1c, 0x0, 0x800, 0x70bd28, 0x25dfdbfb, {}, [@ETHTOOL_A_RINGS_RX_JUMBO={0x8, 0x8, 0x7}]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000000}, 0x40) [ 814.144455] erofs: read_super, device -> /dev/loop0 [ 814.149838] erofs: options -> [ 814.155888] erofs: blksize 1 isn't supported on this platform [ 814.165794] FAULT_INJECTION: forcing a failure. [ 814.165794] name failslab, interval 1, probability 0, space 0, times 0 [ 814.178694] CPU: 1 PID: 7494 Comm: syz-executor.1 Not tainted 4.19.211-syzkaller #0 [ 814.186496] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 814.195931] Call Trace: [ 814.198532] dump_stack+0x1fc/0x2ef [ 814.202168] should_fail.cold+0xa/0xf [ 814.205975] ? setup_fault_attr+0x200/0x200 [ 814.210300] ? lock_acquire+0x170/0x3c0 [ 814.214275] ? dev_uevent_filter+0xd0/0xd0 [ 814.218505] __should_failslab+0x115/0x180 [ 814.222746] should_failslab+0x5/0x10 [ 814.226545] kmem_cache_alloc_trace+0x284/0x380 [ 814.231201] ? dev_uevent_filter+0xd0/0xd0 [ 814.235506] kobject_uevent_env+0x236/0x1480 [ 814.239925] lo_ioctl+0xff9/0x20e0 [ 814.243474] ? loop_set_status64+0x110/0x110 [ 814.248033] blkdev_ioctl+0x5cb/0x1a80 [ 814.251913] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 814.257264] ? blkpg_ioctl+0x9d0/0x9d0 [ 814.261151] ? mark_held_locks+0xf0/0xf0 [ 814.265211] ? mark_held_locks+0xf0/0xf0 [ 814.269270] ? debug_check_no_obj_freed+0x201/0x490 [ 814.274379] ? lock_downgrade+0x720/0x720 [ 814.278524] block_ioctl+0xe9/0x130 [ 814.282155] ? blkdev_fallocate+0x3f0/0x3f0 [ 814.286474] do_vfs_ioctl+0xcdb/0x12e0 [ 814.290348] ? lock_downgrade+0x720/0x720 [ 814.294488] ? check_preemption_disabled+0x41/0x280 [ 814.299502] ? ioctl_preallocate+0x200/0x200 [ 814.304016] ? __fget+0x356/0x510 [ 814.307464] ? do_dup2+0x450/0x450 [ 814.310994] ? do_sys_open+0x2bf/0x520 [ 814.314874] ksys_ioctl+0x9b/0xc0 [ 814.318345] __x64_sys_ioctl+0x6f/0xb0 [ 814.322240] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 814.326818] do_syscall_64+0xf9/0x620 [ 814.330610] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 814.335785] RIP: 0033:0x7ff03e650c77 [ 814.339490] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 04 54 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 814.358392] RSP: 002b:00007ff03cfc5f28 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 814.366097] RAX: ffffffffffffffda RBX: 00007ff03e69a9c8 RCX: 00007ff03e650c77 [ 814.373362] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 814.380635] RBP: 0000000000000005 R08: 0000000000000000 R09: 00007ff03cfc61d0 [ 814.387899] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 19:41:35 executing program 3: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b004670100000010", 0xd, 0x400}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000080)={[{@fault_injection}]}) 19:41:35 executing program 2: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c0024", 0xf, 0x400}, {&(0x7f0000000280)="05000000c041", 0x6, 0x480}, {0x0, 0x2000000, 0x1000}], 0x0, &(0x7f0000000080)={[{@fault_injection}]}) 19:41:35 executing program 0: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e0", 0x4, 0x400}, {0x0, 0x1000000, 0x1000}], 0x0, &(0x7f0000000080)) [ 814.395154] R13: 0000000000000004 R14: 0000000020000248 R15: 0000000000000003 [ 814.411833] erofs: read_super, device -> /dev/loop5 [ 814.424138] erofs: options -> fault_injection=0x0000000000000000, [ 814.458960] erofs: read_super, device -> /dev/loop1 [ 814.466512] erofs: unmounted for /dev/loop2 [ 814.472487] erofs: FAULT_INJECTION was not selected [ 814.478779] erofs: options -> [ 814.484925] erofs: root inode @ nid 36 [ 814.487885] erofs: root inode @ nid 36 [ 814.507799] erofs: bogus i_mode (0) @ nid 36 [ 814.514792] erofs: mounted on /dev/loop1 with opts: . 19:41:35 executing program 5: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010500000c0024", 0xf, 0x400}, {&(0x7f0000000280)="05", 0x1, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000080)={[{@fault_injection}]}) 19:41:35 executing program 3: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b004670100000014", 0xd, 0x400}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000080)={[{@fault_injection}]}) 19:41:35 executing program 1: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c0024", 0xf, 0x400}, {&(0x7f0000000280)="050000040041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000080)) (fail_nth: 20) [ 814.623673] erofs: read_super, device -> /dev/loop0 [ 814.631856] erofs: options -> [ 814.648028] erofs: blksize 1 isn't supported on this platform [ 814.665839] erofs: unmounted for /dev/loop1 19:41:35 executing program 0: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e0", 0x4, 0x400}, {0x0, 0x2000000, 0x1000}], 0x0, &(0x7f0000000080)) 19:41:35 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000001c0)=@newlink={0x28, 0x10, 0x401, 0x0, 0x4, {}, [@IFLA_NUM_TX_QUEUES={0x8, 0x1f, 0xfffffff8}]}, 0x28}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x28001010}, 0xc, &(0x7f00000000c0)={&(0x7f0000000540)=ANY=[@ANYBLOB="20000000680000022bbd7000ffdbdf25000002000b00000008000500", @ANYRES32=0x0, @ANYBLOB="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"], 0x20}, 0x1, 0x0, 0x0, 0x800}, 0x0) r1 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000180), 0x48000, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000500)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000004c0)={&(0x7f0000000440)=@gettaction={0x64, 0x32, 0x8, 0x70bd28, 0x25dfdbfc, {}, [@action_dump_flags=@TCA_ROOT_FLAGS={0xc}, @action_dump_flags=@TCA_ROOT_FLAGS={0xc, 0x2, {0x0, 0x1}}, @action_gd=@TCA_ACT_TAB={0x38, 0x1, [{0x10, 0x6, 0x0, 0x0, @TCA_ACT_KIND={0xb, 0x1, 'mirred\x00'}}, {0xc, 0x1c, 0x0, 0x0, @TCA_ACT_INDEX={0x8, 0x3, 0x1}}, {0xc, 0x12, 0x0, 0x0, @TCA_ACT_INDEX={0x8, 0x3, 0x5}}, {0xc, 0x1c, 0x0, 0x0, @TCA_ACT_INDEX={0x8, 0x3, 0x7ff0}}]}]}, 0x64}, 0x1, 0x0, 0x0, 0x4040041}, 0x2000) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x5, &(0x7f0000000200)=[{0x0, 0x0, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f0003000400000000000000", 0x1a, 0x1000}, {&(0x7f0000010500), 0x0, 0x2000}, {&(0x7f0000012600)="ed41000010000000daf4655fdbf4655fdbf4655f00000000000004008000000000000800050000000af301000400000000000000000000000900000010", 0x3d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='cpuacct.stat\x00', 0x26e1, 0x0) unlinkat(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x0, 0xff, 0x0, 0x0, 0x0, 0x248000009, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10100}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x4030582a, &(0x7f0000000040)) perf_event_open(&(0x7f0000000280)={0x4, 0x80, 0x0, 0x70, 0x7, 0x0, 0x0, 0x0, 0x20010, 0xd, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x9, 0xbe}, 0x40c31, 0x9, 0x0, 0x8, 0x4, 0x400, 0x0, 0x0, 0x29, 0x0, 0x6}, 0x0, 0x0, r2, 0x4) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0xe, 0x0, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) write$cgroup_type(r2, &(0x7f0000000140), 0xffffff1f) sendmsg$NFT_MSG_GETOBJ_RESET(r1, &(0x7f00000002c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)={0x2c, 0x15, 0xa, 0x401, 0x0, 0x0, {0x7, 0x0, 0x3}, [@NFTA_OBJ_NAME={0x9, 0x2, 'syz0\x00'}, @NFTA_OBJ_NAME={0x9, 0x2, 'syz2\x00'}]}, 0x2c}, 0x1, 0x0, 0x0, 0x4815}, 0x20040050) sendmsg$ETHTOOL_MSG_RINGS_SET(r1, &(0x7f00000003c0)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)={0x1c, 0x0, 0x800, 0x70bd28, 0x25dfdbfb, {}, [@ETHTOOL_A_RINGS_RX_JUMBO={0x8, 0x8, 0x7}]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000000}, 0x40) socket$nl_route(0x10, 0x3, 0x0) (async) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000001c0)=@newlink={0x28, 0x10, 0x401, 0x0, 0x4, {}, [@IFLA_NUM_TX_QUEUES={0x8, 0x1f, 0xfffffff8}]}, 0x28}}, 0x0) (async) sendmsg$nl_route(r0, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x28001010}, 0xc, &(0x7f00000000c0)={&(0x7f0000000540)=ANY=[@ANYBLOB="20000000680000022bbd7000ffdbdf25000002000b00000008000500", @ANYRES32=0x0, @ANYBLOB="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"], 0x20}, 0x1, 0x0, 0x0, 0x800}, 0x0) (async) openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000180), 0x48000, 0x0) (async) sendmsg$nl_route_sched(r0, &(0x7f0000000500)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000004c0)={&(0x7f0000000440)=@gettaction={0x64, 0x32, 0x8, 0x70bd28, 0x25dfdbfc, {}, [@action_dump_flags=@TCA_ROOT_FLAGS={0xc}, @action_dump_flags=@TCA_ROOT_FLAGS={0xc, 0x2, {0x0, 0x1}}, @action_gd=@TCA_ACT_TAB={0x38, 0x1, [{0x10, 0x6, 0x0, 0x0, @TCA_ACT_KIND={0xb, 0x1, 'mirred\x00'}}, {0xc, 0x1c, 0x0, 0x0, @TCA_ACT_INDEX={0x8, 0x3, 0x1}}, {0xc, 0x12, 0x0, 0x0, @TCA_ACT_INDEX={0x8, 0x3, 0x5}}, {0xc, 0x1c, 0x0, 0x0, @TCA_ACT_INDEX={0x8, 0x3, 0x7ff0}}]}]}, 0x64}, 0x1, 0x0, 0x0, 0x4040041}, 0x2000) (async) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x5, &(0x7f0000000200)=[{0x0, 0x0, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f0003000400000000000000", 0x1a, 0x1000}, {&(0x7f0000010500), 0x0, 0x2000}, {&(0x7f0000012600)="ed41000010000000daf4655fdbf4655fdbf4655f00000000000004008000000000000800050000000af301000400000000000000000000000900000010", 0x3d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) (async) chdir(&(0x7f0000000140)='./file0\x00') (async) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='cpuacct.stat\x00', 0x26e1, 0x0) (async) unlinkat(0xffffffffffffffff, 0x0, 0x0) (async) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x0, 0xff, 0x0, 0x0, 0x0, 0x248000009, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10100}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x4030582a, &(0x7f0000000040)) (async) perf_event_open(&(0x7f0000000280)={0x4, 0x80, 0x0, 0x70, 0x7, 0x0, 0x0, 0x0, 0x20010, 0xd, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x9, 0xbe}, 0x40c31, 0x9, 0x0, 0x8, 0x4, 0x400, 0x0, 0x0, 0x29, 0x0, 0x6}, 0x0, 0x0, r2, 0x4) (async) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0xe, 0x0, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) (async) write$cgroup_type(r2, &(0x7f0000000140), 0xffffff1f) (async) sendmsg$NFT_MSG_GETOBJ_RESET(r1, &(0x7f00000002c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)={0x2c, 0x15, 0xa, 0x401, 0x0, 0x0, {0x7, 0x0, 0x3}, [@NFTA_OBJ_NAME={0x9, 0x2, 'syz0\x00'}, @NFTA_OBJ_NAME={0x9, 0x2, 'syz2\x00'}]}, 0x2c}, 0x1, 0x0, 0x0, 0x4815}, 0x20040050) (async) sendmsg$ETHTOOL_MSG_RINGS_SET(r1, &(0x7f00000003c0)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)={0x1c, 0x0, 0x800, 0x70bd28, 0x25dfdbfb, {}, [@ETHTOOL_A_RINGS_RX_JUMBO={0x8, 0x8, 0x7}]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000000}, 0x40) (async) [ 814.670239] erofs: read_super, device -> /dev/loop2 [ 814.670247] erofs: options -> fault_injection=0x0000000000000000, [ 814.670676] erofs: FAULT_INJECTION was not selected [ 814.699458] erofs: root inode @ nid 36 [ 814.704786] erofs: mounted on /dev/loop2 with opts: fault_injection=0x0000000000000000. 19:41:35 executing program 2: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c0024", 0xf, 0x400}, {&(0x7f0000000280)="05000000c041", 0x6, 0x480}, {0x0, 0x3000000, 0x1000}], 0x0, &(0x7f0000000080)={[{@fault_injection}]}) [ 814.768177] erofs: read_super, device -> /dev/loop5 [ 814.773230] erofs: options -> fault_injection=0x0000000000000000, [ 814.782134] erofs: unmounted for /dev/loop2 [ 814.791177] erofs: read_super, device -> /dev/loop3 [ 814.797080] FAULT_INJECTION: forcing a failure. [ 814.797080] name failslab, interval 1, probability 0, space 0, times 0 [ 814.798719] erofs: options -> fault_injection=0x0000000000000000, [ 814.811549] CPU: 0 PID: 7539 Comm: syz-executor.1 Not tainted 4.19.211-syzkaller #0 [ 814.820403] erofs: blksize 1048576 isn't supported on this platform [ 814.822461] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 814.822467] Call Trace: [ 814.822488] dump_stack+0x1fc/0x2ef [ 814.822506] should_fail.cold+0xa/0xf [ 814.822524] ? setup_fault_attr+0x200/0x200 [ 814.829258] erofs: FAULT_INJECTION was not selected [ 814.838268] ? lock_acquire+0x170/0x3c0 [ 814.838291] __should_failslab+0x115/0x180 [ 814.838309] should_failslab+0x5/0x10 [ 814.838321] __kmalloc+0x2ab/0x3c0 [ 814.838335] ? kobject_get_path+0xbf/0x240 [ 814.838365] kobject_get_path+0xbf/0x240 [ 814.841053] erofs: root inode @ nid 36 [ 814.844546] kobject_uevent_env+0x25c/0x1480 [ 814.844574] lo_ioctl+0xff9/0x20e0 [ 814.844596] ? loop_set_status64+0x110/0x110 [ 814.848692] erofs: bogus i_mode (0) @ nid 36 [ 814.852677] blkdev_ioctl+0x5cb/0x1a80 [ 814.852695] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 814.852707] ? blkpg_ioctl+0x9d0/0x9d0 [ 814.852725] ? mark_held_locks+0xf0/0xf0 [ 814.919370] ? mark_held_locks+0xf0/0xf0 [ 814.923419] ? debug_check_no_obj_freed+0x201/0x490 [ 814.928424] ? lock_downgrade+0x720/0x720 [ 814.932555] block_ioctl+0xe9/0x130 [ 814.936177] ? blkdev_fallocate+0x3f0/0x3f0 [ 814.940482] do_vfs_ioctl+0xcdb/0x12e0 [ 814.944382] ? lock_downgrade+0x720/0x720 [ 814.948518] ? check_preemption_disabled+0x41/0x280 [ 814.953528] ? ioctl_preallocate+0x200/0x200 [ 814.957924] ? __fget+0x356/0x510 [ 814.961368] ? do_dup2+0x450/0x450 [ 814.964896] ? do_sys_open+0x2bf/0x520 [ 814.968794] ksys_ioctl+0x9b/0xc0 [ 814.972241] __x64_sys_ioctl+0x6f/0xb0 [ 814.976137] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 814.980716] do_syscall_64+0xf9/0x620 [ 814.984533] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 814.989718] RIP: 0033:0x7ff03e650c77 [ 814.993547] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 04 54 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 815.012611] RSP: 002b:00007ff03cfc5f28 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 815.020310] RAX: ffffffffffffffda RBX: 00007ff03e69a9c8 RCX: 00007ff03e650c77 [ 815.027566] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 815.034819] RBP: 0000000000000005 R08: 0000000000000000 R09: 00007ff03cfc61d0 [ 815.042071] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 815.049361] R13: 0000000000000004 R14: 0000000020000248 R15: 0000000000000003 [ 815.060881] ieee802154 phy0 wpan0: encryption failed: -22 [ 815.066489] ieee802154 phy1 wpan1: encryption failed: -22 19:41:36 executing program 3: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b004670100000037", 0xd, 0x400}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000080)={[{@fault_injection}]}) 19:41:36 executing program 1: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c0024", 0xf, 0x400}, {&(0x7f0000000280)="050000040041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000080)) (fail_nth: 21) 19:41:36 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000001c0)=@newlink={0x28, 0x10, 0x401, 0x0, 0x4, {}, [@IFLA_NUM_TX_QUEUES={0x8, 0x1f, 0xfffffff8}]}, 0x28}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x28001010}, 0xc, &(0x7f00000000c0)={&(0x7f0000000540)=ANY=[@ANYBLOB="20000000680000022bbd7000ffdbdf25000002000b00000008000500", @ANYRES32=0x0, @ANYBLOB="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"], 0x20}, 0x1, 0x0, 0x0, 0x800}, 0x0) r1 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000180), 0x48000, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000500)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000004c0)={&(0x7f0000000440)=@gettaction={0x64, 0x32, 0x8, 0x70bd28, 0x25dfdbfc, {}, [@action_dump_flags=@TCA_ROOT_FLAGS={0xc}, @action_dump_flags=@TCA_ROOT_FLAGS={0xc, 0x2, {0x0, 0x1}}, @action_gd=@TCA_ACT_TAB={0x38, 0x1, [{0x10, 0x6, 0x0, 0x0, @TCA_ACT_KIND={0xb, 0x1, 'mirred\x00'}}, {0xc, 0x1c, 0x0, 0x0, @TCA_ACT_INDEX={0x8, 0x3, 0x1}}, {0xc, 0x12, 0x0, 0x0, @TCA_ACT_INDEX={0x8, 0x3, 0x5}}, {0xc, 0x1c, 0x0, 0x0, @TCA_ACT_INDEX={0x8, 0x3, 0x7ff0}}]}]}, 0x64}, 0x1, 0x0, 0x0, 0x4040041}, 0x2000) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x5, &(0x7f0000000200)=[{0x0, 0x0, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f0003000400000000000000", 0x1a, 0x1000}, {&(0x7f0000010500), 0x0, 0x2000}, {&(0x7f0000012600)="ed41000010000000daf4655fdbf4655fdbf4655f00000000000004008000000000000800050000000af301000400000000000000000000000900000010", 0x3d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='cpuacct.stat\x00', 0x26e1, 0x0) unlinkat(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x0, 0xff, 0x0, 0x0, 0x0, 0x248000009, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10100}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x4030582a, &(0x7f0000000040)) perf_event_open(&(0x7f0000000280)={0x4, 0x80, 0x0, 0x70, 0x7, 0x0, 0x0, 0x0, 0x20010, 0xd, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x9, 0xbe}, 0x40c31, 0x9, 0x0, 0x8, 0x4, 0x400, 0x0, 0x0, 0x29, 0x0, 0x6}, 0x0, 0x0, r2, 0x4) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0xe, 0x0, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) write$cgroup_type(r2, &(0x7f0000000140), 0xffffff1f) sendmsg$NFT_MSG_GETOBJ_RESET(r1, &(0x7f00000002c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)={0x2c, 0x15, 0xa, 0x401, 0x0, 0x0, {0x7, 0x0, 0x3}, [@NFTA_OBJ_NAME={0x9, 0x2, 'syz0\x00'}, @NFTA_OBJ_NAME={0x9, 0x2, 'syz2\x00'}]}, 0x2c}, 0x1, 0x0, 0x0, 0x4815}, 0x20040050) sendmsg$ETHTOOL_MSG_RINGS_SET(r1, &(0x7f00000003c0)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)={0x1c, 0x0, 0x800, 0x70bd28, 0x25dfdbfb, {}, [@ETHTOOL_A_RINGS_RX_JUMBO={0x8, 0x8, 0x7}]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000000}, 0x40) [ 815.148305] erofs: read_super, device -> /dev/loop1 [ 815.153414] erofs: options -> [ 815.154259] erofs: read_super, device -> /dev/loop0 [ 815.163187] erofs: root inode @ nid 36 [ 815.174540] erofs: mounted on /dev/loop1 with opts: . [ 815.176392] erofs: options -> [ 815.184600] erofs: blksize 1 isn't supported on this platform 19:41:36 executing program 5: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010600000c0024", 0xf, 0x400}, {&(0x7f0000000280)="05", 0x1, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000080)={[{@fault_injection}]}) [ 815.225363] erofs: unmounted for /dev/loop1 19:41:36 executing program 0: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e0", 0x4, 0x400}, {0x0, 0x3000000, 0x1000}], 0x0, &(0x7f0000000080)) 19:41:36 executing program 2: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c0024", 0xf, 0x400}, {&(0x7f0000000280)="05000000c041", 0x6, 0x480}, {0x0, 0x4000000, 0x1000}], 0x0, &(0x7f0000000080)={[{@fault_injection}]}) [ 815.253612] erofs: read_super, device -> /dev/loop2 [ 815.259161] erofs: options -> fault_injection=0x0000000000000000, [ 815.270717] erofs: FAULT_INJECTION was not selected [ 815.275745] erofs: root inode @ nid 36 [ 815.280316] erofs: mounted on /dev/loop2 with opts: fault_injection=0x0000000000000000. [ 815.307291] erofs: unmounted for /dev/loop2 [ 815.349780] erofs: read_super, device -> /dev/loop3 [ 815.355067] erofs: options -> fault_injection=0x0000000000000000, [ 815.365844] erofs: blksize 8388608 isn't supported on this platform [ 815.384499] erofs: read_super, device -> /dev/loop5 [ 815.397856] erofs: read_super, device -> /dev/loop0 [ 815.404308] erofs: options -> fault_injection=0x0000000000000000, [ 815.406967] FAULT_INJECTION: forcing a failure. [ 815.406967] name failslab, interval 1, probability 0, space 0, times 0 [ 815.419034] erofs: options -> [ 815.429698] CPU: 0 PID: 7583 Comm: syz-executor.1 Not tainted 4.19.211-syzkaller #0 [ 815.437507] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 815.441857] erofs: blksize 1 isn't supported on this platform [ 815.446859] Call Trace: [ 815.446882] dump_stack+0x1fc/0x2ef [ 815.446904] should_fail.cold+0xa/0xf [ 815.446920] ? setup_fault_attr+0x200/0x200 [ 815.446937] ? lock_acquire+0x170/0x3c0 [ 815.460500] erofs: FAULT_INJECTION was not selected [ 815.462801] __should_failslab+0x115/0x180 [ 815.462821] should_failslab+0x5/0x10 [ 815.462834] kmem_cache_alloc_node+0x245/0x3b0 [ 815.462853] __alloc_skb+0x71/0x560 [ 815.474980] erofs: root inode @ nid 36 [ 815.476142] alloc_uevent_skb+0x7b/0x210 [ 815.476163] kobject_uevent_env+0xa90/0x1480 [ 815.476187] lo_ioctl+0xff9/0x20e0 [ 815.490299] erofs: bogus i_mode (0) @ nid 36 [ 815.492474] ? loop_set_status64+0x110/0x110 [ 815.492492] blkdev_ioctl+0x5cb/0x1a80 [ 815.492511] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 815.526640] ? blkpg_ioctl+0x9d0/0x9d0 [ 815.530543] ? mark_held_locks+0xf0/0xf0 [ 815.534618] ? mark_held_locks+0xf0/0xf0 [ 815.538693] ? debug_check_no_obj_freed+0x201/0x490 [ 815.543723] ? lock_downgrade+0x720/0x720 19:41:36 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000240)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000180)={&(0x7f0000000540)=@gettaction={0x144, 0x32, 0x20, 0x70bd2d, 0x25dfdbfe, {}, [@action_dump_flags=@TCA_ROOT_FLAGS={0xc}, @action_gd=@TCA_ACT_TAB={0x9c, 0x1, [{0x10, 0x2, 0x0, 0x0, @TCA_ACT_KIND={0xc, 0x1, 'skbedit\x00'}}, {0x14, 0x12, 0x0, 0x0, @TCA_ACT_KIND={0xd, 0x1, 'connmark\x00'}}, {0x14, 0xa, 0x0, 0x0, @TCA_ACT_KIND={0xf, 0x1, 'tunnel_key\x00'}}, {0xc, 0xb, 0x0, 0x0, @TCA_ACT_INDEX={0x8, 0x3, 0x3ff}}, {0xc, 0x1d, 0x0, 0x0, @TCA_ACT_INDEX={0x8, 0x3, 0x6}}, {0x10, 0x1b, 0x0, 0x0, @TCA_ACT_KIND={0x9, 0x1, 'vlan\x00'}}, {0x10, 0x3, 0x0, 0x0, @TCA_ACT_KIND={0x9, 0x1, 'gact\x00'}}, {0xc, 0x15, 0x0, 0x0, @TCA_ACT_INDEX={0x8, 0x3, 0x400}}, {0x10, 0x12, 0x0, 0x0, @TCA_ACT_KIND={0xb, 0x1, 'mirred\x00'}}, {0xc, 0xc, 0x0, 0x0, @TCA_ACT_INDEX={0x8, 0x3, 0x40}}]}, @action_dump_flags=@TCA_ROOT_FLAGS={0xc, 0x2, {0x1}}, @action_dump_flags=@TCA_ROOT_FLAGS={0xc}, @action_dump_flags=@TCA_ROOT_TIME_DELTA={0x8, 0x4, 0x101}, @action_gd=@TCA_ACT_TAB={0x34, 0x1, [{0xc, 0x2, 0x0, 0x0, @TCA_ACT_INDEX={0x8}}, {0xc, 0x9, 0x0, 0x0, @TCA_ACT_INDEX={0x8, 0x3, 0x8}}, {0xc, 0x1d, 0x0, 0x0, @TCA_ACT_INDEX={0x8, 0x3, 0x7}}, {0xc, 0x6, 0x0, 0x0, @TCA_ACT_INDEX={0x8, 0x3, 0x401}}]}, @action_dump_flags=@TCA_ROOT_FLAGS={0xc}, @action_gd=@TCA_ACT_TAB={0x28, 0x1, [{0xc, 0xb, 0x0, 0x0, @TCA_ACT_INDEX={0x8, 0x3, 0xfffffff7}}, {0xc, 0x1d, 0x0, 0x0, @TCA_ACT_INDEX={0x8, 0x3, 0x7fffffff}}, {0xc, 0x14, 0x0, 0x0, @TCA_ACT_INDEX={0x8, 0x3, 0xc5f}}]}]}, 0x144}, 0x1, 0x0, 0x0, 0x1}, 0x10) r3 = socket(0x10, 0x803, 0x0) sendmsg$BATADV_CMD_GET_MESH(r3, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000480)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000010400eeff7fff00102e80a423c7", @ANYRES32=r4, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000005840)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000500)=@newqdisc={0x38, 0x24, 0xe0b, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_fq_codel={{0xd}, {0x4}}]}, 0x38}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000013c0)=@newtfilter={0x8c, 0x2c, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {}, {}, {0xb}}, [@filter_kind_options=@f_bpf={{0x8}, {0x60, 0x2, [@TCA_BPF_ACT={0x50, 0x1, [@m_csum={0x4c, 0x1, 0x0, 0x0, {{0x9}, {0x20, 0x2, 0x0, 0x1, [@TCA_CSUM_PARMS={0x1c, 0x1, {{0x0, 0x0, 0x20000000}}}]}, {0x4}, {0xc}, {0xc}}}]}, @TCA_BPF_OPS={{0x6}, {0x4}}]}}]}, 0x8c}}, 0x0) [ 815.547882] block_ioctl+0xe9/0x130 [ 815.551516] ? blkdev_fallocate+0x3f0/0x3f0 [ 815.555852] do_vfs_ioctl+0xcdb/0x12e0 [ 815.559753] ? lock_downgrade+0x720/0x720 [ 815.563996] ? check_preemption_disabled+0x41/0x280 [ 815.569021] ? ioctl_preallocate+0x200/0x200 [ 815.573430] ? __fget+0x356/0x510 [ 815.576870] ? do_dup2+0x450/0x450 [ 815.580400] ? do_sys_open+0x2bf/0x520 [ 815.584287] ksys_ioctl+0x9b/0xc0 [ 815.587736] __x64_sys_ioctl+0x6f/0xb0 [ 815.591699] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 815.596283] do_syscall_64+0xf9/0x620 [ 815.600089] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 815.605261] RIP: 0033:0x7ff03e650c77 [ 815.609076] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 04 54 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 815.627958] RSP: 002b:00007ff03cfc5f28 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 815.635649] RAX: ffffffffffffffda RBX: 00007ff03e69a9c8 RCX: 00007ff03e650c77 [ 815.642908] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 815.650163] RBP: 0000000000000005 R08: 0000000000000000 R09: 00007ff03cfc61d0 [ 815.657421] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 815.664681] R13: 0000000000000004 R14: 0000000020000248 R15: 0000000000000003 19:41:36 executing program 0: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e0", 0x4, 0x400}, {0x0, 0x4000000, 0x1000}], 0x0, &(0x7f0000000080)) [ 815.711301] erofs: read_super, device -> /dev/loop1 [ 815.723053] erofs: options -> [ 815.729514] erofs: root inode @ nid 36 [ 815.733585] erofs: mounted on /dev/loop1 with opts: . [ 815.756130] erofs: read_super, device -> /dev/loop2 19:41:36 executing program 3: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b004670100000045", 0xd, 0x400}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000080)={[{@fault_injection}]}) 19:41:36 executing program 1: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c0024", 0xf, 0x400}, {&(0x7f0000000280)="050000040041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000080)) (fail_nth: 22) [ 815.761860] erofs: options -> fault_injection=0x0000000000000000, [ 815.778778] erofs: FAULT_INJECTION was not selected [ 815.783840] erofs: root inode @ nid 36 [ 815.793038] erofs: mounted on /dev/loop2 with opts: fault_injection=0x0000000000000000. 19:41:36 executing program 5: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010700000c0024", 0xf, 0x400}, {&(0x7f0000000280)="05", 0x1, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000080)={[{@fault_injection}]}) 19:41:36 executing program 2: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c0024", 0xf, 0x400}, {&(0x7f0000000280)="05000000c041", 0x6, 0x480}, {0x0, 0x5000000, 0x1000}], 0x0, &(0x7f0000000080)={[{@fault_injection}]}) [ 815.845570] erofs: read_super, device -> /dev/loop0 [ 815.847626] erofs: unmounted for /dev/loop1 [ 815.850849] erofs: options -> [ 815.867996] erofs: unmounted for /dev/loop2 [ 815.874641] erofs: blksize 1 isn't supported on this platform 19:41:36 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) (async) r1 = socket(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000240)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000180)={&(0x7f0000000540)=@gettaction={0x144, 0x32, 0x20, 0x70bd2d, 0x25dfdbfe, {}, [@action_dump_flags=@TCA_ROOT_FLAGS={0xc}, @action_gd=@TCA_ACT_TAB={0x9c, 0x1, [{0x10, 0x2, 0x0, 0x0, @TCA_ACT_KIND={0xc, 0x1, 'skbedit\x00'}}, {0x14, 0x12, 0x0, 0x0, @TCA_ACT_KIND={0xd, 0x1, 'connmark\x00'}}, {0x14, 0xa, 0x0, 0x0, @TCA_ACT_KIND={0xf, 0x1, 'tunnel_key\x00'}}, {0xc, 0xb, 0x0, 0x0, @TCA_ACT_INDEX={0x8, 0x3, 0x3ff}}, {0xc, 0x1d, 0x0, 0x0, @TCA_ACT_INDEX={0x8, 0x3, 0x6}}, {0x10, 0x1b, 0x0, 0x0, @TCA_ACT_KIND={0x9, 0x1, 'vlan\x00'}}, {0x10, 0x3, 0x0, 0x0, @TCA_ACT_KIND={0x9, 0x1, 'gact\x00'}}, {0xc, 0x15, 0x0, 0x0, @TCA_ACT_INDEX={0x8, 0x3, 0x400}}, {0x10, 0x12, 0x0, 0x0, @TCA_ACT_KIND={0xb, 0x1, 'mirred\x00'}}, {0xc, 0xc, 0x0, 0x0, @TCA_ACT_INDEX={0x8, 0x3, 0x40}}]}, @action_dump_flags=@TCA_ROOT_FLAGS={0xc, 0x2, {0x1}}, @action_dump_flags=@TCA_ROOT_FLAGS={0xc}, @action_dump_flags=@TCA_ROOT_TIME_DELTA={0x8, 0x4, 0x101}, @action_gd=@TCA_ACT_TAB={0x34, 0x1, [{0xc, 0x2, 0x0, 0x0, @TCA_ACT_INDEX={0x8}}, {0xc, 0x9, 0x0, 0x0, @TCA_ACT_INDEX={0x8, 0x3, 0x8}}, {0xc, 0x1d, 0x0, 0x0, @TCA_ACT_INDEX={0x8, 0x3, 0x7}}, {0xc, 0x6, 0x0, 0x0, @TCA_ACT_INDEX={0x8, 0x3, 0x401}}]}, @action_dump_flags=@TCA_ROOT_FLAGS={0xc}, @action_gd=@TCA_ACT_TAB={0x28, 0x1, [{0xc, 0xb, 0x0, 0x0, @TCA_ACT_INDEX={0x8, 0x3, 0xfffffff7}}, {0xc, 0x1d, 0x0, 0x0, @TCA_ACT_INDEX={0x8, 0x3, 0x7fffffff}}, {0xc, 0x14, 0x0, 0x0, @TCA_ACT_INDEX={0x8, 0x3, 0xc5f}}]}]}, 0x144}, 0x1, 0x0, 0x0, 0x1}, 0x10) (async) r3 = socket(0x10, 0x803, 0x0) sendmsg$BATADV_CMD_GET_MESH(r3, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000480)={0x0}}, 0x0) (async) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000010400eeff7fff00102e80a423c7", @ANYRES32=r4, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000005840)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000500)=@newqdisc={0x38, 0x24, 0xe0b, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_fq_codel={{0xd}, {0x4}}]}, 0x38}}, 0x0) (async) sendmsg$nl_route_sched(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000013c0)=@newtfilter={0x8c, 0x2c, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {}, {}, {0xb}}, [@filter_kind_options=@f_bpf={{0x8}, {0x60, 0x2, [@TCA_BPF_ACT={0x50, 0x1, [@m_csum={0x4c, 0x1, 0x0, 0x0, {{0x9}, {0x20, 0x2, 0x0, 0x1, [@TCA_CSUM_PARMS={0x1c, 0x1, {{0x0, 0x0, 0x20000000}}}]}, {0x4}, {0xc}, {0xc}}}]}, @TCA_BPF_OPS={{0x6}, {0x4}}]}}]}, 0x8c}}, 0x0) [ 815.893986] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.4'. [ 815.954430] erofs: read_super, device -> /dev/loop5 [ 815.963262] erofs: read_super, device -> /dev/loop3 [ 815.968652] erofs: read_super, device -> /dev/loop2 [ 815.970725] erofs: options -> fault_injection=0x0000000000000000, [ 815.976671] erofs: options -> fault_injection=0x0000000000000000, [ 815.988832] erofs: options -> fault_injection=0x0000000000000000, [ 815.999649] erofs: FAULT_INJECTION was not selected 19:41:37 executing program 0: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e0", 0x4, 0x400}, {0x0, 0x5000000, 0x1000}], 0x0, &(0x7f0000000080)) [ 816.024210] erofs: FAULT_INJECTION was not selected [ 816.036631] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.4'. [ 816.045073] erofs: blksize 32 isn't supported on this platform [ 816.057611] FAULT_INJECTION: forcing a failure. [ 816.057611] name failslab, interval 1, probability 0, space 0, times 0 [ 816.059544] erofs: root inode @ nid 36 [ 816.071285] erofs: root inode @ nid 36 [ 816.074536] erofs: mounted on /dev/loop2 with opts: fault_injection=0x0000000000000000. [ 816.079128] erofs: bogus i_mode (0) @ nid 36 [ 816.086920] CPU: 1 PID: 7626 Comm: syz-executor.1 Not tainted 4.19.211-syzkaller #0 [ 816.097205] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 816.106544] Call Trace: [ 816.109131] dump_stack+0x1fc/0x2ef [ 816.112755] should_fail.cold+0xa/0xf [ 816.116543] ? setup_fault_attr+0x200/0x200 [ 816.120849] ? lock_acquire+0x170/0x3c0 [ 816.124817] __should_failslab+0x115/0x180 [ 816.129048] should_failslab+0x5/0x10 [ 816.132845] kmem_cache_alloc_node+0x245/0x3b0 [ 816.137429] __alloc_skb+0x71/0x560 [ 816.141062] alloc_uevent_skb+0x7b/0x210 [ 816.145120] kobject_uevent_env+0xa90/0x1480 [ 816.149533] lo_ioctl+0xff9/0x20e0 [ 816.153075] ? loop_set_status64+0x110/0x110 [ 816.157484] blkdev_ioctl+0x5cb/0x1a80 [ 816.161363] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 816.166723] ? blkpg_ioctl+0x9d0/0x9d0 [ 816.170614] ? mark_held_locks+0xf0/0xf0 [ 816.174758] ? mark_held_locks+0xf0/0xf0 [ 816.178804] ? debug_check_no_obj_freed+0x201/0x490 [ 816.183804] ? lock_downgrade+0x720/0x720 [ 816.187976] block_ioctl+0xe9/0x130 [ 816.191600] ? blkdev_fallocate+0x3f0/0x3f0 [ 816.195929] do_vfs_ioctl+0xcdb/0x12e0 [ 816.199818] ? lock_downgrade+0x720/0x720 [ 816.204037] ? check_preemption_disabled+0x41/0x280 [ 816.209051] ? ioctl_preallocate+0x200/0x200 [ 816.213466] ? __fget+0x356/0x510 [ 816.216913] ? do_dup2+0x450/0x450 [ 816.220448] ? do_sys_open+0x2bf/0x520 [ 816.224347] ksys_ioctl+0x9b/0xc0 [ 816.227809] __x64_sys_ioctl+0x6f/0xb0 [ 816.231710] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 816.236287] do_syscall_64+0xf9/0x620 [ 816.240082] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 816.245271] RIP: 0033:0x7ff03e650c77 [ 816.248982] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 04 54 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 816.267884] RSP: 002b:00007ff03cfc5f28 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 19:41:37 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000240)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000180)={&(0x7f0000000540)=@gettaction={0x144, 0x32, 0x20, 0x70bd2d, 0x25dfdbfe, {}, [@action_dump_flags=@TCA_ROOT_FLAGS={0xc}, @action_gd=@TCA_ACT_TAB={0x9c, 0x1, [{0x10, 0x2, 0x0, 0x0, @TCA_ACT_KIND={0xc, 0x1, 'skbedit\x00'}}, {0x14, 0x12, 0x0, 0x0, @TCA_ACT_KIND={0xd, 0x1, 'connmark\x00'}}, {0x14, 0xa, 0x0, 0x0, @TCA_ACT_KIND={0xf, 0x1, 'tunnel_key\x00'}}, {0xc, 0xb, 0x0, 0x0, @TCA_ACT_INDEX={0x8, 0x3, 0x3ff}}, {0xc, 0x1d, 0x0, 0x0, @TCA_ACT_INDEX={0x8, 0x3, 0x6}}, {0x10, 0x1b, 0x0, 0x0, @TCA_ACT_KIND={0x9, 0x1, 'vlan\x00'}}, {0x10, 0x3, 0x0, 0x0, @TCA_ACT_KIND={0x9, 0x1, 'gact\x00'}}, {0xc, 0x15, 0x0, 0x0, @TCA_ACT_INDEX={0x8, 0x3, 0x400}}, {0x10, 0x12, 0x0, 0x0, @TCA_ACT_KIND={0xb, 0x1, 'mirred\x00'}}, {0xc, 0xc, 0x0, 0x0, @TCA_ACT_INDEX={0x8, 0x3, 0x40}}]}, @action_dump_flags=@TCA_ROOT_FLAGS={0xc, 0x2, {0x1}}, @action_dump_flags=@TCA_ROOT_FLAGS={0xc}, @action_dump_flags=@TCA_ROOT_TIME_DELTA={0x8, 0x4, 0x101}, @action_gd=@TCA_ACT_TAB={0x34, 0x1, [{0xc, 0x2, 0x0, 0x0, @TCA_ACT_INDEX={0x8}}, {0xc, 0x9, 0x0, 0x0, @TCA_ACT_INDEX={0x8, 0x3, 0x8}}, {0xc, 0x1d, 0x0, 0x0, @TCA_ACT_INDEX={0x8, 0x3, 0x7}}, {0xc, 0x6, 0x0, 0x0, @TCA_ACT_INDEX={0x8, 0x3, 0x401}}]}, @action_dump_flags=@TCA_ROOT_FLAGS={0xc}, @action_gd=@TCA_ACT_TAB={0x28, 0x1, [{0xc, 0xb, 0x0, 0x0, @TCA_ACT_INDEX={0x8, 0x3, 0xfffffff7}}, {0xc, 0x1d, 0x0, 0x0, @TCA_ACT_INDEX={0x8, 0x3, 0x7fffffff}}, {0xc, 0x14, 0x0, 0x0, @TCA_ACT_INDEX={0x8, 0x3, 0xc5f}}]}]}, 0x144}, 0x1, 0x0, 0x0, 0x1}, 0x10) r3 = socket(0x10, 0x803, 0x0) sendmsg$BATADV_CMD_GET_MESH(r3, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000480)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000010400eeff7fff00102e80a423c7", @ANYRES32=r4, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000005840)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000500)=@newqdisc={0x38, 0x24, 0xe0b, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_fq_codel={{0xd}, {0x4}}]}, 0x38}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000013c0)=@newtfilter={0x8c, 0x2c, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {}, {}, {0xb}}, [@filter_kind_options=@f_bpf={{0x8}, {0x60, 0x2, [@TCA_BPF_ACT={0x50, 0x1, [@m_csum={0x4c, 0x1, 0x0, 0x0, {{0x9}, {0x20, 0x2, 0x0, 0x1, [@TCA_CSUM_PARMS={0x1c, 0x1, {{0x0, 0x0, 0x20000000}}}]}, {0x4}, {0xc}, {0xc}}}]}, @TCA_BPF_OPS={{0x6}, {0x4}}]}}]}, 0x8c}}, 0x0) socket$nl_route(0x10, 0x3, 0x0) (async) socket(0x10, 0x3, 0x0) (async) socket$nl_route(0x10, 0x3, 0x0) (async) sendmsg$nl_route_sched(r2, &(0x7f0000000240)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000180)={&(0x7f0000000540)=@gettaction={0x144, 0x32, 0x20, 0x70bd2d, 0x25dfdbfe, {}, [@action_dump_flags=@TCA_ROOT_FLAGS={0xc}, @action_gd=@TCA_ACT_TAB={0x9c, 0x1, [{0x10, 0x2, 0x0, 0x0, @TCA_ACT_KIND={0xc, 0x1, 'skbedit\x00'}}, {0x14, 0x12, 0x0, 0x0, @TCA_ACT_KIND={0xd, 0x1, 'connmark\x00'}}, {0x14, 0xa, 0x0, 0x0, @TCA_ACT_KIND={0xf, 0x1, 'tunnel_key\x00'}}, {0xc, 0xb, 0x0, 0x0, @TCA_ACT_INDEX={0x8, 0x3, 0x3ff}}, {0xc, 0x1d, 0x0, 0x0, @TCA_ACT_INDEX={0x8, 0x3, 0x6}}, {0x10, 0x1b, 0x0, 0x0, @TCA_ACT_KIND={0x9, 0x1, 'vlan\x00'}}, {0x10, 0x3, 0x0, 0x0, @TCA_ACT_KIND={0x9, 0x1, 'gact\x00'}}, {0xc, 0x15, 0x0, 0x0, @TCA_ACT_INDEX={0x8, 0x3, 0x400}}, {0x10, 0x12, 0x0, 0x0, @TCA_ACT_KIND={0xb, 0x1, 'mirred\x00'}}, {0xc, 0xc, 0x0, 0x0, @TCA_ACT_INDEX={0x8, 0x3, 0x40}}]}, @action_dump_flags=@TCA_ROOT_FLAGS={0xc, 0x2, {0x1}}, @action_dump_flags=@TCA_ROOT_FLAGS={0xc}, @action_dump_flags=@TCA_ROOT_TIME_DELTA={0x8, 0x4, 0x101}, @action_gd=@TCA_ACT_TAB={0x34, 0x1, [{0xc, 0x2, 0x0, 0x0, @TCA_ACT_INDEX={0x8}}, {0xc, 0x9, 0x0, 0x0, @TCA_ACT_INDEX={0x8, 0x3, 0x8}}, {0xc, 0x1d, 0x0, 0x0, @TCA_ACT_INDEX={0x8, 0x3, 0x7}}, {0xc, 0x6, 0x0, 0x0, @TCA_ACT_INDEX={0x8, 0x3, 0x401}}]}, @action_dump_flags=@TCA_ROOT_FLAGS={0xc}, @action_gd=@TCA_ACT_TAB={0x28, 0x1, [{0xc, 0xb, 0x0, 0x0, @TCA_ACT_INDEX={0x8, 0x3, 0xfffffff7}}, {0xc, 0x1d, 0x0, 0x0, @TCA_ACT_INDEX={0x8, 0x3, 0x7fffffff}}, {0xc, 0x14, 0x0, 0x0, @TCA_ACT_INDEX={0x8, 0x3, 0xc5f}}]}]}, 0x144}, 0x1, 0x0, 0x0, 0x1}, 0x10) (async) socket(0x10, 0x803, 0x0) (async) sendmsg$BATADV_CMD_GET_MESH(r3, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000480)={0x0}}, 0x0) (async) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) (async) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000010400eeff7fff00102e80a423c7", @ANYRES32=r4, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) (async) sendmsg$nl_route_sched(r1, &(0x7f0000005840)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000500)=@newqdisc={0x38, 0x24, 0xe0b, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_fq_codel={{0xd}, {0x4}}]}, 0x38}}, 0x0) (async) sendmsg$nl_route_sched(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000013c0)=@newtfilter={0x8c, 0x2c, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {}, {}, {0xb}}, [@filter_kind_options=@f_bpf={{0x8}, {0x60, 0x2, [@TCA_BPF_ACT={0x50, 0x1, [@m_csum={0x4c, 0x1, 0x0, 0x0, {{0x9}, {0x20, 0x2, 0x0, 0x1, [@TCA_CSUM_PARMS={0x1c, 0x1, {{0x0, 0x0, 0x20000000}}}]}, {0x4}, {0xc}, {0xc}}}]}, @TCA_BPF_OPS={{0x6}, {0x4}}]}}]}, 0x8c}}, 0x0) (async) [ 816.275589] RAX: ffffffffffffffda RBX: 00007ff03e69a9c8 RCX: 00007ff03e650c77 [ 816.282842] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 816.290111] RBP: 0000000000000005 R08: 0000000000000000 R09: 00007ff03cfc61d0 [ 816.297391] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 816.304660] R13: 0000000000000004 R14: 0000000020000248 R15: 0000000000000003 19:41:37 executing program 3: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467017ffffffe", 0xd, 0x400}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000080)={[{@fault_injection}]}) [ 816.359001] erofs: read_super, device -> /dev/loop1 19:41:37 executing program 2: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c0024", 0xf, 0x400}, {&(0x7f0000000280)="05000000c041", 0x6, 0x480}, {0x0, 0x6000000, 0x1000}], 0x0, &(0x7f0000000080)={[{@fault_injection}]}) 19:41:37 executing program 5: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010800000c0024", 0xf, 0x400}, {&(0x7f0000000280)="05", 0x1, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000080)={[{@fault_injection}]}) [ 816.393503] erofs: read_super, device -> /dev/loop0 [ 816.407630] erofs: options -> [ 816.411730] erofs: options -> [ 816.416213] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.4'. [ 816.417524] erofs: blksize 1 isn't supported on this platform [ 816.431674] erofs: unmounted for /dev/loop2 [ 816.436348] erofs: root inode @ nid 36 19:41:37 executing program 1: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c0024", 0xf, 0x400}, {&(0x7f0000000280)="050000040041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000080)) (fail_nth: 23) 19:41:37 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0xa, 0x801, 0x84) connect$inet(r0, &(0x7f0000004cc0)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) listen(r0, 0x4) write$binfmt_script(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="8ce00c00044d9d51f29c196d3549f901f967bec2e763fbd916b2f56c3dc8684f1afccad486f1204baa472d847d140e9f83c40819dc466297d2182919085b5fd6ac2fbd32b1b63ac316240d4a384358f2e6920a1c01002b208c7248be94fd626fa508c8545ec18f37997293fb2731ef8d9a538c114f0400"/143, @ANYRES64, @ANYBLOB="2ad64e75dc862951c4dd74ea2f342443b8f15269af7e754b5c716c80a3b2e4fc0ae8ed73a98c7a70be9b"], 0xfea7) accept4(r0, &(0x7f0000000200), &(0x7f0000000280)=0x80, 0x800) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r1, 0x0) r2 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$NL80211_CMD_DEL_TX_TS(r2, &(0x7f00000001c0)={&(0x7f0000000000), 0xc, &(0x7f0000000180)={&(0x7f0000000100)={0x5c, 0x0, 0x10, 0x70bd28, 0x25dfdbfc, {{}, {@void, @void}}, [@NL80211_ATTR_MAC={0xa, 0x6, @device_b}, @NL80211_ATTR_MAC={0xa}, @NL80211_ATTR_TSID={0x5, 0xd2, 0x6}, @NL80211_ATTR_TSID={0x5}, @NL80211_ATTR_TSID={0x5, 0xd2, 0x1}, @NL80211_ATTR_TSID={0x5, 0xd2, 0xf}, @NL80211_ATTR_TSID={0x5}, @NL80211_ATTR_TSID={0x5}]}, 0x5c}, 0x1, 0x0, 0x0, 0x40000}, 0x4000004) socket(0x0, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_EVENTS(r2, 0x84, 0xb, &(0x7f0000000040), 0xb) setsockopt$inet_sctp6_SCTP_RECVNXTINFO(r2, 0x84, 0x21, &(0x7f00000000c0), 0x4) recvmmsg(r2, &(0x7f0000004300), 0x3a4, 0x0, 0x0) [ 816.440973] erofs: mounted on /dev/loop1 with opts: . [ 816.458973] erofs: unmounted for /dev/loop1 [ 816.466053] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.4'. 19:41:37 executing program 0: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e0", 0x4, 0x400}, {0x0, 0x6000000, 0x1000}], 0x0, &(0x7f0000000080)) [ 816.557733] erofs: read_super, device -> /dev/loop5 [ 816.562880] erofs: options -> fault_injection=0x0000000000000000, [ 816.582156] erofs: FAULT_INJECTION was not selected [ 816.596467] erofs: read_super, device -> /dev/loop3 [ 816.603809] erofs: root inode @ nid 36 19:41:37 executing program 3: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010002000c", 0xd, 0x400}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000080)={[{@fault_injection}]}) [ 816.613769] erofs: bogus i_mode (0) @ nid 36 [ 816.620988] erofs: options -> fault_injection=0x0000000000000000, [ 816.628183] erofs: blksize 1073741824 isn't supported on this platform [ 816.680908] FAULT_INJECTION: forcing a failure. [ 816.680908] name failslab, interval 1, probability 0, space 0, times 0 [ 816.699581] CPU: 1 PID: 7669 Comm: syz-executor.1 Not tainted 4.19.211-syzkaller #0 [ 816.707404] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 816.716848] Call Trace: [ 816.719448] dump_stack+0x1fc/0x2ef [ 816.723081] should_fail.cold+0xa/0xf [ 816.726940] ? setup_fault_attr+0x200/0x200 [ 816.731255] ? lock_acquire+0x170/0x3c0 [ 816.735220] __should_failslab+0x115/0x180 [ 816.739452] should_failslab+0x5/0x10 [ 816.743331] kmem_cache_alloc+0x277/0x370 [ 816.747474] skb_clone+0x151/0x3d0 [ 816.751012] netlink_broadcast_filtered+0x8e5/0xbc0 [ 816.756037] netlink_broadcast+0x35/0x40 [ 816.760102] kobject_uevent_env+0xa56/0x1480 [ 816.764504] lo_ioctl+0xff9/0x20e0 [ 816.768042] ? loop_set_status64+0x110/0x110 [ 816.772441] blkdev_ioctl+0x5cb/0x1a80 [ 816.776313] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 816.781671] ? blkpg_ioctl+0x9d0/0x9d0 [ 816.785551] ? mark_held_locks+0xf0/0xf0 [ 816.789609] ? mark_held_locks+0xf0/0xf0 [ 816.793665] ? debug_check_no_obj_freed+0x201/0x490 [ 816.798681] ? lock_downgrade+0x720/0x720 [ 816.802822] block_ioctl+0xe9/0x130 [ 816.806443] ? blkdev_fallocate+0x3f0/0x3f0 [ 816.810768] do_vfs_ioctl+0xcdb/0x12e0 [ 816.814649] ? lock_downgrade+0x720/0x720 [ 816.818791] ? check_preemption_disabled+0x41/0x280 [ 816.823798] ? ioctl_preallocate+0x200/0x200 [ 816.828202] ? __fget+0x356/0x510 [ 816.831648] ? do_dup2+0x450/0x450 [ 816.835181] ? do_sys_open+0x2bf/0x520 [ 816.839075] ksys_ioctl+0x9b/0xc0 [ 816.842522] __x64_sys_ioctl+0x6f/0xb0 [ 816.846406] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 816.850991] do_syscall_64+0xf9/0x620 [ 816.854984] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 816.860161] RIP: 0033:0x7ff03e650c77 [ 816.863866] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 04 54 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 816.882935] RSP: 002b:00007ff03cfc5f28 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 816.890643] RAX: ffffffffffffffda RBX: 00007ff03e69a9c8 RCX: 00007ff03e650c77 [ 816.897900] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 816.905163] RBP: 0000000000000005 R08: 0000000000000000 R09: 00007ff03cfc61d0 [ 816.912417] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 816.919676] R13: 0000000000000004 R14: 0000000020000248 R15: 0000000000000003 19:41:38 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) r0 = socket$inet(0xa, 0x801, 0x84) connect$inet(r0, &(0x7f0000004cc0)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) (async) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) listen(r0, 0x4) (async) write$binfmt_script(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="8ce00c00044d9d51f29c196d3549f901f967bec2e763fbd916b2f56c3dc8684f1afccad486f1204baa472d847d140e9f83c40819dc466297d2182919085b5fd6ac2fbd32b1b63ac316240d4a384358f2e6920a1c01002b208c7248be94fd626fa508c8545ec18f37997293fb2731ef8d9a538c114f0400"/143, @ANYRES64, @ANYBLOB="2ad64e75dc862951c4dd74ea2f342443b8f15269af7e754b5c716c80a3b2e4fc0ae8ed73a98c7a70be9b"], 0xfea7) accept4(r0, &(0x7f0000000200), &(0x7f0000000280)=0x80, 0x800) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r1, 0x0) (async) r2 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$NL80211_CMD_DEL_TX_TS(r2, &(0x7f00000001c0)={&(0x7f0000000000), 0xc, &(0x7f0000000180)={&(0x7f0000000100)={0x5c, 0x0, 0x10, 0x70bd28, 0x25dfdbfc, {{}, {@void, @void}}, [@NL80211_ATTR_MAC={0xa, 0x6, @device_b}, @NL80211_ATTR_MAC={0xa}, @NL80211_ATTR_TSID={0x5, 0xd2, 0x6}, @NL80211_ATTR_TSID={0x5}, @NL80211_ATTR_TSID={0x5, 0xd2, 0x1}, @NL80211_ATTR_TSID={0x5, 0xd2, 0xf}, @NL80211_ATTR_TSID={0x5}, @NL80211_ATTR_TSID={0x5}]}, 0x5c}, 0x1, 0x0, 0x0, 0x40000}, 0x4000004) (async) socket(0x0, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_EVENTS(r2, 0x84, 0xb, &(0x7f0000000040), 0xb) setsockopt$inet_sctp6_SCTP_RECVNXTINFO(r2, 0x84, 0x21, &(0x7f00000000c0), 0x4) recvmmsg(r2, &(0x7f0000004300), 0x3a4, 0x0, 0x0) 19:41:38 executing program 5: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010900000c0024", 0xf, 0x400}, {&(0x7f0000000280)="05", 0x1, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000080)={[{@fault_injection}]}) [ 816.963224] erofs: read_super, device -> /dev/loop2 [ 816.968763] erofs: read_super, device -> /dev/loop0 [ 816.977733] erofs: read_super, device -> /dev/loop1 [ 816.982778] erofs: options -> [ 816.995670] erofs: options -> [ 817.000243] erofs: options -> fault_injection=0x0000000000000000, [ 817.008808] erofs: root inode @ nid 36 [ 817.016151] erofs: blksize 1 isn't supported on this platform [ 817.032100] erofs: FAULT_INJECTION was not selected [ 817.037290] erofs: mounted on /dev/loop1 with opts: . [ 817.062312] erofs: root inode @ nid 36 [ 817.066918] erofs: mounted on /dev/loop2 with opts: fault_injection=0x0000000000000000. [ 817.099686] erofs: read_super, device -> /dev/loop5 [ 817.107845] erofs: options -> fault_injection=0x0000000000000000, 19:41:38 executing program 0: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e0", 0x4, 0x400}, {0x0, 0x7000000, 0x1000}], 0x0, &(0x7f0000000080)) 19:41:38 executing program 1: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c0024", 0xf, 0x400}, {&(0x7f0000000280)="050000040041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000080)) (fail_nth: 24) [ 817.138237] erofs: read_super, device -> /dev/loop3 [ 817.144411] erofs: options -> fault_injection=0x0000000000000000, [ 817.152002] erofs: FAULT_INJECTION was not selected 19:41:38 executing program 2: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c0024", 0xf, 0x400}, {&(0x7f0000000280)="05000000c041", 0x6, 0x480}, {0x0, 0x7000000, 0x1000}], 0x0, &(0x7f0000000080)={[{@fault_injection}]}) 19:41:38 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0xa, 0x801, 0x84) connect$inet(r0, &(0x7f0000004cc0)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) listen(r0, 0x4) write$binfmt_script(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="8ce00c00044d9d51f29c196d3549f901f967bec2e763fbd916b2f56c3dc8684f1afccad486f1204baa472d847d140e9f83c40819dc466297d2182919085b5fd6ac2fbd32b1b63ac316240d4a384358f2e6920a1c01002b208c7248be94fd626fa508c8545ec18f37997293fb2731ef8d9a538c114f0400"/143, @ANYRES64, @ANYBLOB="2ad64e75dc862951c4dd74ea2f342443b8f15269af7e754b5c716c80a3b2e4fc0ae8ed73a98c7a70be9b"], 0xfea7) accept4(r0, &(0x7f0000000200), &(0x7f0000000280)=0x80, 0x800) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r1, 0x0) r2 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$NL80211_CMD_DEL_TX_TS(r2, &(0x7f00000001c0)={&(0x7f0000000000), 0xc, &(0x7f0000000180)={&(0x7f0000000100)={0x5c, 0x0, 0x10, 0x70bd28, 0x25dfdbfc, {{}, {@void, @void}}, [@NL80211_ATTR_MAC={0xa, 0x6, @device_b}, @NL80211_ATTR_MAC={0xa}, @NL80211_ATTR_TSID={0x5, 0xd2, 0x6}, @NL80211_ATTR_TSID={0x5}, @NL80211_ATTR_TSID={0x5, 0xd2, 0x1}, @NL80211_ATTR_TSID={0x5, 0xd2, 0xf}, @NL80211_ATTR_TSID={0x5}, @NL80211_ATTR_TSID={0x5}]}, 0x5c}, 0x1, 0x0, 0x0, 0x40000}, 0x4000004) socket(0x0, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_EVENTS(r2, 0x84, 0xb, &(0x7f0000000040), 0xb) setsockopt$inet_sctp6_SCTP_RECVNXTINFO(r2, 0x84, 0x21, &(0x7f00000000c0), 0x4) recvmmsg(r2, &(0x7f0000004300), 0x3a4, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) socket$inet(0xa, 0x801, 0x84) (async) connect$inet(r0, &(0x7f0000004cc0)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) (async) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) (async) listen(r0, 0x4) (async) write$binfmt_script(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="8ce00c00044d9d51f29c196d3549f901f967bec2e763fbd916b2f56c3dc8684f1afccad486f1204baa472d847d140e9f83c40819dc466297d2182919085b5fd6ac2fbd32b1b63ac316240d4a384358f2e6920a1c01002b208c7248be94fd626fa508c8545ec18f37997293fb2731ef8d9a538c114f0400"/143, @ANYRES64, @ANYBLOB="2ad64e75dc862951c4dd74ea2f342443b8f15269af7e754b5c716c80a3b2e4fc0ae8ed73a98c7a70be9b"], 0xfea7) (async) accept4(r0, &(0x7f0000000200), &(0x7f0000000280)=0x80, 0x800) (async) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r1, 0x0) (async) accept4(r0, 0x0, 0x0, 0x0) (async) sendmsg$NL80211_CMD_DEL_TX_TS(r2, &(0x7f00000001c0)={&(0x7f0000000000), 0xc, &(0x7f0000000180)={&(0x7f0000000100)={0x5c, 0x0, 0x10, 0x70bd28, 0x25dfdbfc, {{}, {@void, @void}}, [@NL80211_ATTR_MAC={0xa, 0x6, @device_b}, @NL80211_ATTR_MAC={0xa}, @NL80211_ATTR_TSID={0x5, 0xd2, 0x6}, @NL80211_ATTR_TSID={0x5}, @NL80211_ATTR_TSID={0x5, 0xd2, 0x1}, @NL80211_ATTR_TSID={0x5, 0xd2, 0xf}, @NL80211_ATTR_TSID={0x5}, @NL80211_ATTR_TSID={0x5}]}, 0x5c}, 0x1, 0x0, 0x0, 0x40000}, 0x4000004) (async) socket(0x0, 0x0, 0x0) (async) setsockopt$inet_sctp6_SCTP_EVENTS(r2, 0x84, 0xb, &(0x7f0000000040), 0xb) (async) setsockopt$inet_sctp6_SCTP_RECVNXTINFO(r2, 0x84, 0x21, &(0x7f00000000c0), 0x4) (async) recvmmsg(r2, &(0x7f0000004300), 0x3a4, 0x0, 0x0) (async) [ 817.179585] erofs: FAULT_INJECTION was not selected [ 817.184801] erofs: root inode @ nid 36 [ 817.189903] erofs: unmounted for /dev/loop1 [ 817.200020] erofs: unmounted for /dev/loop2 [ 817.206572] erofs: bogus i_mode (0) @ nid 36 [ 817.212152] erofs: root inode @ nid 0 [ 817.216220] erofs: bogus i_mode (0) @ nid 0 [ 817.306389] FAULT_INJECTION: forcing a failure. [ 817.306389] name failslab, interval 1, probability 0, space 0, times 0 [ 817.317878] CPU: 1 PID: 7700 Comm: syz-executor.1 Not tainted 4.19.211-syzkaller #0 [ 817.326028] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 817.335470] Call Trace: [ 817.338065] dump_stack+0x1fc/0x2ef [ 817.341706] should_fail.cold+0xa/0xf [ 817.345512] ? setup_fault_attr+0x200/0x200 [ 817.349838] ? lock_acquire+0x170/0x3c0 [ 817.353823] __should_failslab+0x115/0x180 [ 817.358239] should_failslab+0x5/0x10 [ 817.362041] kmem_cache_alloc_trace+0x284/0x380 [ 817.366714] ? wait_for_completion_io+0x10/0x10 [ 817.371389] ? kobj_ns_initial+0x90/0x90 [ 817.375461] call_usermodehelper_setup+0x84/0x300 [ 817.380320] kobject_uevent_env+0xe83/0x1480 [ 817.384745] lo_ioctl+0xff9/0x20e0 [ 817.388302] ? loop_set_status64+0x110/0x110 [ 817.392718] blkdev_ioctl+0x5cb/0x1a80 [ 817.396603] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 817.401963] ? blkpg_ioctl+0x9d0/0x9d0 [ 817.405858] ? mark_held_locks+0xf0/0xf0 [ 817.409928] ? mark_held_locks+0xf0/0xf0 [ 817.414086] ? debug_check_no_obj_freed+0x201/0x490 [ 817.419121] ? lock_downgrade+0x720/0x720 [ 817.423274] block_ioctl+0xe9/0x130 [ 817.426920] ? blkdev_fallocate+0x3f0/0x3f0 [ 817.431342] do_vfs_ioctl+0xcdb/0x12e0 [ 817.435226] ? lock_downgrade+0x720/0x720 [ 817.439380] ? check_preemption_disabled+0x41/0x280 [ 817.444403] ? ioctl_preallocate+0x200/0x200 [ 817.448821] ? __fget+0x356/0x510 [ 817.452388] ? do_dup2+0x450/0x450 [ 817.455929] ? do_sys_open+0x2bf/0x520 [ 817.459823] ksys_ioctl+0x9b/0xc0 [ 817.463272] __x64_sys_ioctl+0x6f/0xb0 [ 817.467161] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 817.471730] do_syscall_64+0xf9/0x620 [ 817.475517] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 817.480792] RIP: 0033:0x7ff03e650c77 [ 817.484499] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 04 54 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 19:41:38 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$zero(0xffffffffffffff9c, &(0x7f00000029c0), 0x0, 0x0) r1 = socket$kcm(0x2, 0x7, 0x73) r2 = socket$inet_smc(0x2b, 0x1, 0x0) fcntl$F_SET_RW_HINT(r2, 0x40c, &(0x7f0000001280)=0x5) bind$inet(r1, &(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10) connect(r0, &(0x7f0000000000)=@pppol2tpv3={0x2, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x4e24, @empty}, 0x0, 0x3}}, 0x80) sendmmsg(r1, &(0x7f0000001540), 0x553, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) r3 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r4 = gettid() tkill(r4, 0x38) r5 = openat$binder_debug(0xffffffffffffff9c, &(0x7f00000001c0)='/sys/kernel/debug/binder/transaction_log\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001500)={0x2, 0x80, 0x0, 0x5, 0x5, 0x1, 0x0, 0x5e96, 0xa6830, 0xb, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2, 0x0, @perf_config_ext={0x3, 0x100000000}, 0x4000, 0x1, 0xa10, 0x1, 0x40000800, 0x855, 0x9cb9, 0x0, 0x3, 0x0, 0x80000001}, r4, 0x5, r5, 0x0) r6 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) bind$bt_l2cap(0xffffffffffffffff, &(0x7f0000000000)={0x1f, 0x4}, 0xe) listen(r6, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000000080)={&(0x7f0000001680)=@rxrpc=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @ipv4={""/10, ""/2, @broadcast}}}, 0x80, &(0x7f00000013c0)=[{&(0x7f0000000280)=""/4096, 0x1000}, {&(0x7f00000012c0)=""/31, 0x1f}, {&(0x7f0000001340)=""/34, 0x22}, {&(0x7f0000001600)=""/77, 0x4d}, {&(0x7f0000001580)=""/80, 0x50}], 0x5, &(0x7f00000014c0)=""/20, 0x14}, 0x2022) sendto$inet(r3, &(0x7f0000000100)="eb6d1ba9e80868d991488756e8d40c93227f9863288447efcf93bffde03a5d4ceb7ee34b655c49a588c110b358507bbd1f281c4f1a9ddee60fbe5438b8c15f770744ec91351ac8004121e43b5271e2be8aa6c43bd00cacf367e3827ca31b8b6497b6238b6a7d3c2dec4d30ac60128e01d871f6b3c2a670ab65f20d816857eb752ef4a1e7715ff6ba23bb3f7016edc099b467661a0ba7593387", 0x99, 0x8095, &(0x7f0000001440)={0x2, 0x4e21, @loopback}, 0x10) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x89a0, 0x0) 19:41:38 executing program 5: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467011000000c0024", 0xf, 0x400}, {&(0x7f0000000280)="05", 0x1, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000080)={[{@fault_injection}]}) [ 817.503391] RSP: 002b:00007ff03cfc5f28 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 817.511186] RAX: ffffffffffffffda RBX: 00007ff03e69a9c8 RCX: 00007ff03e650c77 [ 817.518447] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 817.525710] RBP: 0000000000000005 R08: 0000000000000000 R09: 00007ff03cfc61d0 [ 817.533172] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 817.540431] R13: 0000000000000004 R14: 0000000020000248 R15: 0000000000000003 [ 817.597156] erofs: read_super, device -> /dev/loop0 [ 817.602750] erofs: options -> [ 817.606137] erofs: blksize 1 isn't supported on this platform [ 817.620048] erofs: read_super, device -> /dev/loop2 [ 817.621683] erofs: read_super, device -> /dev/loop1 [ 817.628329] erofs: options -> fault_injection=0x0000000000000000, [ 817.640617] erofs: FAULT_INJECTION was not selected 19:41:38 executing program 3: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010003000c", 0xd, 0x400}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000080)={[{@fault_injection}]}) [ 817.656118] erofs: options -> [ 817.662063] erofs: root inode @ nid 36 [ 817.665201] erofs: root inode @ nid 36 [ 817.670566] erofs: mounted on /dev/loop2 with opts: fault_injection=0x0000000000000000. 19:41:38 executing program 2: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c0024", 0xf, 0x400}, {&(0x7f0000000280)="05000000c041", 0x6, 0x480}, {0x0, 0x8000000, 0x1000}], 0x0, &(0x7f0000000080)={[{@fault_injection}]}) 19:41:38 executing program 0: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e0", 0x4, 0x400}, {0x0, 0x8000000, 0x1000}], 0x0, &(0x7f0000000080)) 19:41:38 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$zero(0xffffffffffffff9c, &(0x7f00000029c0), 0x0, 0x0) r1 = socket$kcm(0x2, 0x7, 0x73) r2 = socket$inet_smc(0x2b, 0x1, 0x0) fcntl$F_SET_RW_HINT(r2, 0x40c, &(0x7f0000001280)=0x5) bind$inet(r1, &(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10) connect(r0, &(0x7f0000000000)=@pppol2tpv3={0x2, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x4e24, @empty}, 0x0, 0x3}}, 0x80) sendmmsg(r1, &(0x7f0000001540), 0x553, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) r3 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r4 = gettid() tkill(r4, 0x38) r5 = openat$binder_debug(0xffffffffffffff9c, &(0x7f00000001c0)='/sys/kernel/debug/binder/transaction_log\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001500)={0x2, 0x80, 0x0, 0x5, 0x5, 0x1, 0x0, 0x5e96, 0xa6830, 0xb, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2, 0x0, @perf_config_ext={0x3, 0x100000000}, 0x4000, 0x1, 0xa10, 0x1, 0x40000800, 0x855, 0x9cb9, 0x0, 0x3, 0x0, 0x80000001}, r4, 0x5, r5, 0x0) r6 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) bind$bt_l2cap(0xffffffffffffffff, &(0x7f0000000000)={0x1f, 0x4}, 0xe) listen(r6, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000000080)={&(0x7f0000001680)=@rxrpc=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @ipv4={""/10, ""/2, @broadcast}}}, 0x80, &(0x7f00000013c0)=[{&(0x7f0000000280)=""/4096, 0x1000}, {&(0x7f00000012c0)=""/31, 0x1f}, {&(0x7f0000001340)=""/34, 0x22}, {&(0x7f0000001600)=""/77, 0x4d}, {&(0x7f0000001580)=""/80, 0x50}], 0x5, &(0x7f00000014c0)=""/20, 0x14}, 0x2022) sendto$inet(r3, &(0x7f0000000100)="eb6d1ba9e80868d991488756e8d40c93227f9863288447efcf93bffde03a5d4ceb7ee34b655c49a588c110b358507bbd1f281c4f1a9ddee60fbe5438b8c15f770744ec91351ac8004121e43b5271e2be8aa6c43bd00cacf367e3827ca31b8b6497b6238b6a7d3c2dec4d30ac60128e01d871f6b3c2a670ab65f20d816857eb752ef4a1e7715ff6ba23bb3f7016edc099b467661a0ba7593387", 0x99, 0x8095, &(0x7f0000001440)={0x2, 0x4e21, @loopback}, 0x10) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x89a0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) openat$zero(0xffffffffffffff9c, &(0x7f00000029c0), 0x0, 0x0) (async) socket$kcm(0x2, 0x7, 0x73) (async) socket$inet_smc(0x2b, 0x1, 0x0) (async) fcntl$F_SET_RW_HINT(r2, 0x40c, &(0x7f0000001280)=0x5) (async) bind$inet(r1, &(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10) (async) connect(r0, &(0x7f0000000000)=@pppol2tpv3={0x2, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x4e24, @empty}, 0x0, 0x3}}, 0x80) (async) sendmmsg(r1, &(0x7f0000001540), 0x553, 0x0) (async) socket$inet_icmp_raw(0x2, 0x3, 0x1) (async) socket$inet_icmp_raw(0x2, 0x3, 0x1) (async) gettid() (async) tkill(r4, 0x38) (async) openat$binder_debug(0xffffffffffffff9c, &(0x7f00000001c0)='/sys/kernel/debug/binder/transaction_log\x00', 0x0, 0x0) (async) perf_event_open(&(0x7f0000001500)={0x2, 0x80, 0x0, 0x5, 0x5, 0x1, 0x0, 0x5e96, 0xa6830, 0xb, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2, 0x0, @perf_config_ext={0x3, 0x100000000}, 0x4000, 0x1, 0xa10, 0x1, 0x40000800, 0x855, 0x9cb9, 0x0, 0x3, 0x0, 0x80000001}, r4, 0x5, r5, 0x0) (async) syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) (async) bind$bt_l2cap(0xffffffffffffffff, &(0x7f0000000000)={0x1f, 0x4}, 0xe) (async) listen(r6, 0x0) (async) recvmsg(0xffffffffffffffff, &(0x7f0000000080)={&(0x7f0000001680)=@rxrpc=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @ipv4={""/10, ""/2, @broadcast}}}, 0x80, &(0x7f00000013c0)=[{&(0x7f0000000280)=""/4096, 0x1000}, {&(0x7f00000012c0)=""/31, 0x1f}, {&(0x7f0000001340)=""/34, 0x22}, {&(0x7f0000001600)=""/77, 0x4d}, {&(0x7f0000001580)=""/80, 0x50}], 0x5, &(0x7f00000014c0)=""/20, 0x14}, 0x2022) (async) sendto$inet(r3, &(0x7f0000000100)="eb6d1ba9e80868d991488756e8d40c93227f9863288447efcf93bffde03a5d4ceb7ee34b655c49a588c110b358507bbd1f281c4f1a9ddee60fbe5438b8c15f770744ec91351ac8004121e43b5271e2be8aa6c43bd00cacf367e3827ca31b8b6497b6238b6a7d3c2dec4d30ac60128e01d871f6b3c2a670ab65f20d816857eb752ef4a1e7715ff6ba23bb3f7016edc099b467661a0ba7593387", 0x99, 0x8095, &(0x7f0000001440)={0x2, 0x4e21, @loopback}, 0x10) (async) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x89a0, 0x0) (async) [ 817.717968] erofs: read_super, device -> /dev/loop5 [ 817.723162] erofs: mounted on /dev/loop1 with opts: . [ 817.734202] erofs: unmounted for /dev/loop2 [ 817.749859] erofs: options -> fault_injection=0x0000000000000000, [ 817.776007] erofs: read_super, device -> /dev/loop3 [ 817.794931] erofs: FAULT_INJECTION was not selected [ 817.813191] erofs: read_super, device -> /dev/loop0 19:41:38 executing program 1: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c0024", 0xf, 0x400}, {&(0x7f0000000280)="050000040041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000080)) (fail_nth: 25) [ 817.820570] erofs: options -> fault_injection=0x0000000000000000, [ 817.831310] erofs: options -> [ 817.836862] erofs: FAULT_INJECTION was not selected [ 817.844260] erofs: unmounted for /dev/loop1 [ 817.845285] erofs: blksize 1 isn't supported on this platform [ 817.858831] erofs: root inode @ nid 36 [ 817.860872] erofs: root inode @ nid 0 [ 817.865096] erofs: bogus i_mode (0) @ nid 36 [ 817.872431] erofs: bogus i_mode (0) @ nid 0 19:41:38 executing program 0: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e0", 0x4, 0x400}, {0x0, 0x9000000, 0x1000}], 0x0, &(0x7f0000000080)) 19:41:38 executing program 5: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467012100000c0024", 0xf, 0x400}, {&(0x7f0000000280)="05", 0x1, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000080)={[{@fault_injection}]}) 19:41:39 executing program 3: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010004000c", 0xd, 0x400}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000080)={[{@fault_injection}]}) [ 817.914083] erofs: read_super, device -> /dev/loop2 [ 817.934069] erofs: options -> fault_injection=0x0000000000000000, 19:41:39 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) r0 = openat$zero(0xffffffffffffff9c, &(0x7f00000029c0), 0x0, 0x0) (async) r1 = socket$kcm(0x2, 0x7, 0x73) (async) r2 = socket$inet_smc(0x2b, 0x1, 0x0) fcntl$F_SET_RW_HINT(r2, 0x40c, &(0x7f0000001280)=0x5) bind$inet(r1, &(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10) (async) connect(r0, &(0x7f0000000000)=@pppol2tpv3={0x2, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x4e24, @empty}, 0x0, 0x3}}, 0x80) (async) sendmmsg(r1, &(0x7f0000001540), 0x553, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) (async) r3 = socket$inet_icmp_raw(0x2, 0x3, 0x1) (async) r4 = gettid() tkill(r4, 0x38) (async) r5 = openat$binder_debug(0xffffffffffffff9c, &(0x7f00000001c0)='/sys/kernel/debug/binder/transaction_log\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001500)={0x2, 0x80, 0x0, 0x5, 0x5, 0x1, 0x0, 0x5e96, 0xa6830, 0xb, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2, 0x0, @perf_config_ext={0x3, 0x100000000}, 0x4000, 0x1, 0xa10, 0x1, 0x40000800, 0x855, 0x9cb9, 0x0, 0x3, 0x0, 0x80000001}, r4, 0x5, r5, 0x0) (async) r6 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) bind$bt_l2cap(0xffffffffffffffff, &(0x7f0000000000)={0x1f, 0x4}, 0xe) listen(r6, 0x0) (async) recvmsg(0xffffffffffffffff, &(0x7f0000000080)={&(0x7f0000001680)=@rxrpc=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @ipv4={""/10, ""/2, @broadcast}}}, 0x80, &(0x7f00000013c0)=[{&(0x7f0000000280)=""/4096, 0x1000}, {&(0x7f00000012c0)=""/31, 0x1f}, {&(0x7f0000001340)=""/34, 0x22}, {&(0x7f0000001600)=""/77, 0x4d}, {&(0x7f0000001580)=""/80, 0x50}], 0x5, &(0x7f00000014c0)=""/20, 0x14}, 0x2022) sendto$inet(r3, &(0x7f0000000100)="eb6d1ba9e80868d991488756e8d40c93227f9863288447efcf93bffde03a5d4ceb7ee34b655c49a588c110b358507bbd1f281c4f1a9ddee60fbe5438b8c15f770744ec91351ac8004121e43b5271e2be8aa6c43bd00cacf367e3827ca31b8b6497b6238b6a7d3c2dec4d30ac60128e01d871f6b3c2a670ab65f20d816857eb752ef4a1e7715ff6ba23bb3f7016edc099b467661a0ba7593387", 0x99, 0x8095, &(0x7f0000001440)={0x2, 0x4e21, @loopback}, 0x10) (async) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x89a0, 0x0) [ 817.961652] erofs: FAULT_INJECTION was not selected [ 817.975772] erofs: root inode @ nid 36 [ 817.981307] erofs: mounted on /dev/loop2 with opts: fault_injection=0x0000000000000000. [ 818.057281] FAULT_INJECTION: forcing a failure. [ 818.057281] name failslab, interval 1, probability 0, space 0, times 0 [ 818.079857] CPU: 0 PID: 7759 Comm: syz-executor.1 Not tainted 4.19.211-syzkaller #0 [ 818.087681] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 818.097044] Call Trace: [ 818.099644] dump_stack+0x1fc/0x2ef [ 818.103275] should_fail.cold+0xa/0xf [ 818.107077] ? setup_fault_attr+0x200/0x200 [ 818.111409] ? lock_acquire+0x170/0x3c0 [ 818.115380] __should_failslab+0x115/0x180 [ 818.119611] should_failslab+0x5/0x10 [ 818.123397] kmem_cache_alloc_trace+0x284/0x380 [ 818.128053] ? wait_for_completion_io+0x10/0x10 [ 818.132728] ? kobj_ns_initial+0x90/0x90 [ 818.136889] call_usermodehelper_setup+0x84/0x300 [ 818.141747] kobject_uevent_env+0xe83/0x1480 [ 818.146160] lo_ioctl+0xff9/0x20e0 [ 818.149687] ? loop_set_status64+0x110/0x110 [ 818.154081] blkdev_ioctl+0x5cb/0x1a80 [ 818.157954] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 818.163304] ? blkpg_ioctl+0x9d0/0x9d0 [ 818.167187] ? mark_held_locks+0xf0/0xf0 [ 818.171268] ? mark_held_locks+0xf0/0xf0 [ 818.175751] ? debug_check_no_obj_freed+0x201/0x490 [ 818.180754] ? lock_downgrade+0x720/0x720 [ 818.184887] block_ioctl+0xe9/0x130 [ 818.188497] ? blkdev_fallocate+0x3f0/0x3f0 [ 818.192811] do_vfs_ioctl+0xcdb/0x12e0 [ 818.196693] ? lock_downgrade+0x720/0x720 [ 818.200882] ? check_preemption_disabled+0x41/0x280 [ 818.205928] ? ioctl_preallocate+0x200/0x200 [ 818.210345] ? __fget+0x356/0x510 [ 818.213836] ? do_dup2+0x450/0x450 [ 818.217373] ? do_sys_open+0x2bf/0x520 [ 818.221257] ksys_ioctl+0x9b/0xc0 [ 818.224694] __x64_sys_ioctl+0x6f/0xb0 [ 818.228567] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 818.233133] do_syscall_64+0xf9/0x620 [ 818.236919] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 818.242090] RIP: 0033:0x7ff03e650c77 [ 818.245785] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 04 54 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 818.264670] RSP: 002b:00007ff03cfc5f28 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 818.272361] RAX: ffffffffffffffda RBX: 00007ff03e69a9c8 RCX: 00007ff03e650c77 [ 818.279705] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 818.286989] RBP: 0000000000000005 R08: 0000000000000000 R09: 00007ff03cfc61d0 [ 818.294243] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 19:41:39 executing program 4: r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}, 0x44}, 0x0, 0xb, 0xffffffffffffffff, 0x2) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, 0x0) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) bind$bt_l2cap(r1, &(0x7f0000000000), 0x58) listen(r1, 0x0) write(r1, &(0x7f0000000280)="21bbe8264f7f2310544baa09c47ab9aaaf017d803c2d45f8031343fd868623624822dc256865af656c74d5f289d81dd4a14f6a8f7bf2060ecc901fdd6408489595735a28a8c510ea57ed2c3c499a108ef8ba3aa67cedcbc8598718cf7a696484886a8b964ace1ffa46d1406601e8a99713dd5d9835e164de8440e83806723141b69410b817ab29d14ea349c6867d5a91d1a47e9639575e8eaf7cf56def95bb97ef1063e677fd175417b09e6c0ad08e0072b602ab5724f3d086a780260e3e6b6deab9f66ea1c969a236374e9a7d31aed0407b514fb1dc9040ce6791da05b757206c00031a5c63dd", 0xe7) r2 = dup(r0) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, 0x0) r3 = socket$unix(0x1, 0x0, 0x0) r4 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r4, 0x6, 0x80000000000002, &(0x7f00000005c0)=0x169, 0x4) bind$inet(r4, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r4, 0x0, 0x0, 0x240007fd, &(0x7f0000000040)={0x2, 0x4e23, @local}, 0x10) sendto$inet(r4, &(0x7f0000000000)="339e2e7ee5723660a2b09299", 0xc, 0x4000080, 0x0, 0x0) setsockopt$sock_int(r1, 0x1, 0x21, &(0x7f0000000200), 0x4) setsockopt$sock_int(r4, 0x1, 0x2f, 0x0, 0x0) recvmsg(r4, &(0x7f0000000240)={0x0, 0xfffffffffffffd83, &(0x7f0000000180)=[{&(0x7f0000003ac0)=""/4096, 0x5801}], 0x1, 0x0, 0xf080, 0x3}, 0x100) write$binfmt_elf64(r4, &(0x7f0000000600)=ANY=[], 0xfc30) bind$unix(r3, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) writev(0xffffffffffffffff, &(0x7f0000000080)=[{}, {0x0}], 0x2) [ 818.301496] R13: 0000000000000004 R14: 0000000020000248 R15: 0000000000000003 [ 818.336480] erofs: read_super, device -> /dev/loop1 [ 818.353417] erofs: read_super, device -> /dev/loop3 [ 818.359080] erofs: read_super, device -> /dev/loop5 [ 818.367596] erofs: options -> fault_injection=0x0000000000000000, [ 818.376704] erofs: read_super, device -> /dev/loop0 [ 818.377591] erofs: options -> 19:41:39 executing program 2: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c0024", 0xf, 0x400}, {&(0x7f0000000280)="05000000c041", 0x6, 0x480}, {0x0, 0x20000000, 0x1000}], 0x0, &(0x7f0000000080)={[{@fault_injection}]}) [ 818.385360] erofs: options -> fault_injection=0x0000000000000000, [ 818.394088] erofs: root inode @ nid 36 [ 818.396695] erofs: options -> [ 818.404240] erofs: unmounted for /dev/loop2 [ 818.406282] erofs: FAULT_INJECTION was not selected [ 818.416083] erofs: FAULT_INJECTION was not selected [ 818.417792] erofs: cannot read erofs superblock [ 818.422691] erofs: root inode @ nid 0 [ 818.430257] erofs: mounted on /dev/loop1 with opts: . 19:41:39 executing program 1: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c0024", 0xf, 0x400}, {&(0x7f0000000280)="050000040041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000080)) (fail_nth: 26) [ 818.441304] erofs: root inode @ nid 36 [ 818.446860] erofs: bogus i_mode (0) @ nid 0 [ 818.452772] erofs: bogus i_mode (0) @ nid 36 19:41:39 executing program 5: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467012300000c0024", 0xf, 0x400}, {&(0x7f0000000280)="05", 0x1, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000080)={[{@fault_injection}]}) [ 818.484899] erofs: unmounted for /dev/loop1 19:41:39 executing program 3: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010005000c", 0xd, 0x400}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000080)={[{@fault_injection}]}) 19:41:39 executing program 0: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e0", 0x4, 0x400}, {0x0, 0xa000000, 0x1000}], 0x0, &(0x7f0000000080)) [ 818.637363] erofs: read_super, device -> /dev/loop2 [ 818.642416] erofs: options -> fault_injection=0x0000000000000000, [ 818.661425] erofs: read_super, device -> /dev/loop5 [ 818.663484] erofs: cannot read erofs superblock [ 818.684414] erofs: options -> fault_injection=0x0000000000000000, [ 818.691146] erofs: FAULT_INJECTION was not selected [ 818.696238] erofs: root inode @ nid 36 [ 818.700533] erofs: bogus i_mode (0) @ nid 36 [ 818.709374] erofs: read_super, device -> /dev/loop3 [ 818.714667] erofs: options -> fault_injection=0x0000000000000000, [ 818.716835] FAULT_INJECTION: forcing a failure. [ 818.716835] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 818.727828] erofs: FAULT_INJECTION was not selected [ 818.732704] CPU: 1 PID: 7815 Comm: syz-executor.1 Not tainted 4.19.211-syzkaller #0 [ 818.732714] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 818.732719] Call Trace: [ 818.732742] dump_stack+0x1fc/0x2ef [ 818.732763] should_fail.cold+0xa/0xf [ 818.732785] ? setup_fault_attr+0x200/0x200 [ 818.738394] erofs: root inode @ nid 0 [ 818.745601] ? wake_up_q+0x93/0xe0 [ 818.745619] ? __mutex_unlock_slowpath+0x2be/0x610 [ 818.745638] __alloc_pages_nodemask+0x239/0x2890 [ 818.745665] ? __lock_acquire+0x6de/0x3ff0 [ 818.745687] ? gfp_pfmemalloc_allowed+0x150/0x150 [ 818.745700] ? blkdev_ioctl+0x11a/0x1a80 [ 818.745724] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 818.764908] erofs: bogus i_mode (0) @ nid 0 [ 818.765045] ? blkpg_ioctl+0x9d0/0x9d0 [ 818.765066] ? debug_check_no_obj_freed+0x201/0x490 [ 818.818026] ? lock_downgrade+0x720/0x720 [ 818.822164] cache_grow_begin+0xa4/0x8a0 [ 818.826225] ? setup_fault_attr+0x200/0x200 [ 818.830549] ? cache_alloc_pfmemalloc+0x1e/0x140 [ 818.835399] cache_alloc_refill+0x273/0x340 [ 818.839731] kmem_cache_alloc+0x346/0x370 [ 818.844021] getname_flags+0xce/0x590 [ 818.847819] do_mkdirat+0x8d/0x2d0 [ 818.851360] ? __ia32_sys_mknod+0x120/0x120 [ 818.855679] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 818.861029] ? trace_hardirqs_off_caller+0x6e/0x210 [ 818.866032] ? do_syscall_64+0x21/0x620 [ 818.869995] do_syscall_64+0xf9/0x620 [ 818.873787] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 818.878965] RIP: 0033:0x7ff03e64ffc7 [ 818.882676] Code: 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 818.901683] RSP: 002b:00007ff03cfc5f88 EFLAGS: 00000213 ORIG_RAX: 0000000000000053 [ 818.909384] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007ff03e64ffc7 [ 818.916647] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000100 [ 818.923910] RBP: 00007ff03cfc6020 R08: 0000000000000000 R09: 00007ff03cfc61d0 [ 818.931270] R10: 0000000000000000 R11: 0000000000000213 R12: 0000000020000000 [ 818.938539] R13: 0000000020000100 R14: 00007ff03cfc5fe0 R15: 0000000020000080 [ 818.958437] erofs: read_super, device -> /dev/loop0 [ 818.967010] erofs: read_super, device -> /dev/loop1 [ 818.975665] erofs: options -> [ 818.981785] erofs: cannot read erofs superblock 19:41:40 executing program 5: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467014800000c0024", 0xf, 0x400}, {&(0x7f0000000280)="05", 0x1, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000080)={[{@fault_injection}]}) 19:41:40 executing program 2: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c0024", 0xf, 0x400}, {&(0x7f0000000280)="05000000c041", 0x6, 0x480}, {0x0, 0x3c020000, 0x1000}], 0x0, &(0x7f0000000080)={[{@fault_injection}]}) 19:41:40 executing program 0: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e0", 0x4, 0x400}, {0x0, 0xc000000, 0x1000}], 0x0, &(0x7f0000000080)) 19:41:40 executing program 3: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010006000c", 0xd, 0x400}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000080)={[{@fault_injection}]}) [ 818.986910] erofs: options -> [ 818.992003] erofs: root inode @ nid 36 [ 818.996916] erofs: mounted on /dev/loop1 with opts: . 19:41:40 executing program 1: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c0024", 0xf, 0x400}, {&(0x7f0000000280)="050000040041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000080)) (fail_nth: 27) [ 819.067863] erofs: read_super, device -> /dev/loop3 [ 819.073146] erofs: options -> fault_injection=0x0000000000000000, [ 819.079895] erofs: read_super, device -> /dev/loop5 [ 819.084929] erofs: options -> fault_injection=0x0000000000000000, [ 819.096834] erofs: FAULT_INJECTION was not selected [ 819.106692] erofs: unmounted for /dev/loop1 [ 819.120591] erofs: FAULT_INJECTION was not selected [ 819.131208] erofs: root inode @ nid 0 [ 819.135370] erofs: root inode @ nid 36 [ 819.140468] erofs: bogus i_mode (0) @ nid 0 [ 819.145359] erofs: bogus i_mode (0) @ nid 36 [ 819.155726] erofs: read_super, device -> /dev/loop2 [ 819.162203] erofs: options -> fault_injection=0x0000000000000000, 19:41:40 executing program 2: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c0024", 0xf, 0x400}, {&(0x7f0000000280)="05000000c041", 0x6, 0x480}, {0x0, 0x3f000000, 0x1000}], 0x0, &(0x7f0000000080)={[{@fault_injection}]}) [ 819.171006] erofs: cannot read erofs superblock 19:41:40 executing program 4: r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}, 0x44}, 0x0, 0xb, 0xffffffffffffffff, 0x2) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, 0x0) (async) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) bind$bt_l2cap(r1, &(0x7f0000000000), 0x58) (async, rerun: 64) listen(r1, 0x0) (rerun: 64) write(r1, &(0x7f0000000280)="21bbe8264f7f2310544baa09c47ab9aaaf017d803c2d45f8031343fd868623624822dc256865af656c74d5f289d81dd4a14f6a8f7bf2060ecc901fdd6408489595735a28a8c510ea57ed2c3c499a108ef8ba3aa67cedcbc8598718cf7a696484886a8b964ace1ffa46d1406601e8a99713dd5d9835e164de8440e83806723141b69410b817ab29d14ea349c6867d5a91d1a47e9639575e8eaf7cf56def95bb97ef1063e677fd175417b09e6c0ad08e0072b602ab5724f3d086a780260e3e6b6deab9f66ea1c969a236374e9a7d31aed0407b514fb1dc9040ce6791da05b757206c00031a5c63dd", 0xe7) r2 = dup(r0) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, 0x0) (async) r3 = socket$unix(0x1, 0x0, 0x0) (async) r4 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r4, 0x6, 0x80000000000002, &(0x7f00000005c0)=0x169, 0x4) (async) bind$inet(r4, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1}, 0x10) (async) sendto$inet(r4, 0x0, 0x0, 0x240007fd, &(0x7f0000000040)={0x2, 0x4e23, @local}, 0x10) (async) sendto$inet(r4, &(0x7f0000000000)="339e2e7ee5723660a2b09299", 0xc, 0x4000080, 0x0, 0x0) (async) setsockopt$sock_int(r1, 0x1, 0x21, &(0x7f0000000200), 0x4) setsockopt$sock_int(r4, 0x1, 0x2f, 0x0, 0x0) (async) recvmsg(r4, &(0x7f0000000240)={0x0, 0xfffffffffffffd83, &(0x7f0000000180)=[{&(0x7f0000003ac0)=""/4096, 0x5801}], 0x1, 0x0, 0xf080, 0x3}, 0x100) (async) write$binfmt_elf64(r4, &(0x7f0000000600)=ANY=[], 0xfc30) (async) bind$unix(r3, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) (async) writev(0xffffffffffffffff, &(0x7f0000000080)=[{}, {0x0}], 0x2) 19:41:40 executing program 3: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010007000c", 0xd, 0x400}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000080)={[{@fault_injection}]}) 19:41:40 executing program 5: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467014c00000c0024", 0xf, 0x400}, {&(0x7f0000000280)="05", 0x1, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000080)={[{@fault_injection}]}) [ 819.267422] FAULT_INJECTION: forcing a failure. [ 819.267422] name failslab, interval 1, probability 0, space 0, times 0 [ 819.289951] erofs: read_super, device -> /dev/loop0 [ 819.295345] erofs: options -> [ 819.331964] CPU: 0 PID: 7844 Comm: syz-executor.1 Not tainted 4.19.211-syzkaller #0 [ 819.336379] erofs: cannot read erofs superblock [ 819.339975] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 819.340005] Call Trace: [ 819.340028] dump_stack+0x1fc/0x2ef [ 819.340048] should_fail.cold+0xa/0xf [ 819.340067] ? setup_fault_attr+0x200/0x200 [ 819.340082] ? lock_acquire+0x170/0x3c0 [ 819.340100] __should_failslab+0x115/0x180 [ 819.340117] should_failslab+0x5/0x10 [ 819.340131] kmem_cache_alloc+0x277/0x370 [ 819.340148] __d_alloc+0x2b/0xa10 [ 819.340167] d_alloc+0x4a/0x230 [ 819.340187] __lookup_hash+0xc8/0x180 [ 819.340202] filename_create+0x186/0x490 [ 819.340216] ? kern_path_mountpoint+0x40/0x40 [ 819.340229] ? strncpy_from_user+0x2a2/0x350 [ 819.340247] ? getname_flags+0x25b/0x590 [ 819.340264] do_mkdirat+0xa0/0x2d0 [ 819.340280] ? __ia32_sys_mknod+0x120/0x120 [ 819.340293] ? trace_hardirqs_off_caller+0x6e/0x210 [ 819.340310] ? do_syscall_64+0x21/0x620 [ 819.429394] do_syscall_64+0xf9/0x620 [ 819.433196] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 819.438474] RIP: 0033:0x7ff03e64ffc7 [ 819.442195] Code: 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 819.461088] RSP: 002b:00007ff03cfc5f88 EFLAGS: 00000213 ORIG_RAX: 0000000000000053 [ 819.468779] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007ff03e64ffc7 [ 819.477007] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000100 [ 819.484281] RBP: 00007ff03cfc6020 R08: 0000000000000000 R09: 00007ff03cfc61d0 [ 819.491545] R10: 0000000000000000 R11: 0000000000000213 R12: 0000000020000000 [ 819.499018] R13: 0000000020000100 R14: 00007ff03cfc5fe0 R15: 0000000020000080 [ 819.522077] erofs: read_super, device -> /dev/loop2 [ 819.522459] erofs: read_super, device -> /dev/loop3 19:41:40 executing program 0: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e0", 0x4, 0x400}, {0x0, 0x10000000, 0x1000}], 0x0, &(0x7f0000000080)) [ 819.528574] erofs: options -> fault_injection=0x0000000000000000, [ 819.535193] erofs: options -> fault_injection=0x0000000000000000, [ 819.540963] erofs: cannot read erofs superblock [ 819.550366] erofs: FAULT_INJECTION was not selected [ 819.555534] erofs: root inode @ nid 0 [ 819.560775] erofs: bogus i_mode (0) @ nid 0 19:41:40 executing program 2: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c0024", 0xf, 0x400}, {&(0x7f0000000280)="05000000c041", 0x6, 0x480}, {0x0, 0x8cffffff, 0x1000}], 0x0, &(0x7f0000000080)={[{@fault_injection}]}) [ 819.658298] erofs: read_super, device -> /dev/loop5 19:41:40 executing program 1: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c0024", 0xf, 0x400}, {&(0x7f0000000280)="050000040041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000080)) (fail_nth: 28) 19:41:40 executing program 3: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010008000c", 0xd, 0x400}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000080)={[{@fault_injection}]}) [ 819.688208] erofs: options -> fault_injection=0x0000000000000000, [ 819.714081] erofs: FAULT_INJECTION was not selected [ 819.753705] erofs: root inode @ nid 36 [ 819.764832] FAULT_INJECTION: forcing a failure. [ 819.764832] name failslab, interval 1, probability 0, space 0, times 0 [ 819.764927] erofs: read_super, device -> /dev/loop0 [ 819.786013] CPU: 1 PID: 7886 Comm: syz-executor.1 Not tainted 4.19.211-syzkaller #0 [ 819.793843] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 819.803204] Call Trace: [ 819.805809] dump_stack+0x1fc/0x2ef [ 819.809454] should_fail.cold+0xa/0xf [ 819.813281] ? setup_fault_attr+0x200/0x200 [ 819.817632] __should_failslab+0x115/0x180 [ 819.821839] erofs: bogus i_mode (0) @ nid 36 [ 819.821886] should_failslab+0x5/0x10 [ 819.830080] kmem_cache_alloc+0x277/0x370 [ 819.834252] ? ext4_sync_fs+0x8d0/0x8d0 [ 819.835504] erofs: options -> [ 819.838499] ext4_alloc_inode+0x1a/0x630 [ 819.838516] ? ext4_sync_fs+0x8d0/0x8d0 [ 819.838531] alloc_inode+0x5d/0x180 [ 819.838541] new_inode+0x1d/0xf0 [ 819.838554] __ext4_new_inode+0x400/0x5a20 [ 819.838572] ? putname+0xe1/0x120 [ 819.838583] ? do_mkdirat+0xa0/0x2d0 [ 819.838604] ? ext4_free_inode+0x1780/0x1780 [ 819.838616] ? debug_check_no_obj_freed+0x201/0x490 [ 819.838630] ? __dquot_initialize+0x298/0xb70 [ 819.838651] ? lock_acquire+0x170/0x3c0 [ 819.847482] erofs: cannot read erofs superblock [ 819.849856] ? dquot_initialize_needed+0x290/0x290 [ 819.849876] ? trace_hardirqs_off+0x64/0x200 [ 819.849895] ? common_perm+0x4be/0x800 [ 819.849912] ext4_mkdir+0x396/0xe10 [ 819.849931] ? putname+0xe1/0x120 [ 819.887077] erofs: read_super, device -> /dev/loop2 [ 819.891207] ? ext4_init_dot_dotdot+0x600/0x600 [ 819.891225] ? generic_permission+0x116/0x4d0 [ 819.891241] ? security_inode_permission+0xc5/0xf0 [ 819.891259] ? inode_permission.part.0+0x10c/0x450 [ 819.891277] vfs_mkdir+0x508/0x7a0 [ 819.891291] do_mkdirat+0x262/0x2d0 [ 819.891305] ? __ia32_sys_mknod+0x120/0x120 [ 819.891324] ? trace_hardirqs_off_caller+0x6e/0x210 [ 819.896423] erofs: options -> fault_injection=0x0000000000000000, [ 819.900639] ? do_syscall_64+0x21/0x620 [ 819.900654] do_syscall_64+0xf9/0x620 [ 819.900671] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 819.900684] RIP: 0033:0x7ff03e64ffc7 [ 819.900697] Code: 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 819.900705] RSP: 002b:00007ff03cfc5f88 EFLAGS: 00000213 ORIG_RAX: 0000000000000053 [ 819.900718] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007ff03e64ffc7 [ 819.900727] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000100 [ 819.900735] RBP: 00007ff03cfc6020 R08: 0000000000000000 R09: 00007ff03cfc61d0 [ 819.900742] R10: 0000000000000000 R11: 0000000000000213 R12: 0000000020000000 [ 819.900749] R13: 0000000020000100 R14: 00007ff03cfc5fe0 R15: 0000000020000080 [ 820.040707] erofs: cannot read erofs superblock [ 820.049427] erofs: read_super, device -> /dev/loop3 [ 820.054459] erofs: options -> fault_injection=0x0000000000000000, [ 820.062691] erofs: FAULT_INJECTION was not selected [ 820.067848] erofs: root inode @ nid 0 [ 820.071674] erofs: bogus i_mode (0) @ nid 0 19:41:41 executing program 5: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467016000000c0024", 0xf, 0x400}, {&(0x7f0000000280)="05", 0x1, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000080)={[{@fault_injection}]}) 19:41:41 executing program 4: r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}, 0x44}, 0x0, 0xb, 0xffffffffffffffff, 0x2) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, 0x0) (async, rerun: 64) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) (rerun: 64) bind$bt_l2cap(r1, &(0x7f0000000000), 0x58) (async, rerun: 64) listen(r1, 0x0) (async, rerun: 64) write(r1, &(0x7f0000000280)="21bbe8264f7f2310544baa09c47ab9aaaf017d803c2d45f8031343fd868623624822dc256865af656c74d5f289d81dd4a14f6a8f7bf2060ecc901fdd6408489595735a28a8c510ea57ed2c3c499a108ef8ba3aa67cedcbc8598718cf7a696484886a8b964ace1ffa46d1406601e8a99713dd5d9835e164de8440e83806723141b69410b817ab29d14ea349c6867d5a91d1a47e9639575e8eaf7cf56def95bb97ef1063e677fd175417b09e6c0ad08e0072b602ab5724f3d086a780260e3e6b6deab9f66ea1c969a236374e9a7d31aed0407b514fb1dc9040ce6791da05b757206c00031a5c63dd", 0xe7) (async, rerun: 64) r2 = dup(r0) (rerun: 64) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, 0x0) (async, rerun: 32) r3 = socket$unix(0x1, 0x0, 0x0) (async, rerun: 32) r4 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r4, 0x6, 0x80000000000002, &(0x7f00000005c0)=0x169, 0x4) bind$inet(r4, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1}, 0x10) (async) sendto$inet(r4, 0x0, 0x0, 0x240007fd, &(0x7f0000000040)={0x2, 0x4e23, @local}, 0x10) (async, rerun: 64) sendto$inet(r4, &(0x7f0000000000)="339e2e7ee5723660a2b09299", 0xc, 0x4000080, 0x0, 0x0) (async, rerun: 64) setsockopt$sock_int(r1, 0x1, 0x21, &(0x7f0000000200), 0x4) (async) setsockopt$sock_int(r4, 0x1, 0x2f, 0x0, 0x0) recvmsg(r4, &(0x7f0000000240)={0x0, 0xfffffffffffffd83, &(0x7f0000000180)=[{&(0x7f0000003ac0)=""/4096, 0x5801}], 0x1, 0x0, 0xf080, 0x3}, 0x100) (async, rerun: 32) write$binfmt_elf64(r4, &(0x7f0000000600)=ANY=[], 0xfc30) (async, rerun: 32) bind$unix(r3, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) (async) writev(0xffffffffffffffff, &(0x7f0000000080)=[{}, {0x0}], 0x2) 19:41:41 executing program 2: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c0024", 0xf, 0x400}, {&(0x7f0000000280)="05000000c041", 0x6, 0x480}, {0x0, 0xc0ed0000, 0x1000}], 0x0, &(0x7f0000000080)={[{@fault_injection}]}) 19:41:41 executing program 0: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e0", 0x4, 0x400}, {0x0, 0x1f000000, 0x1000}], 0x0, &(0x7f0000000080)) 19:41:41 executing program 1: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c0024", 0xf, 0x400}, {&(0x7f0000000280)="050000040041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000080)) (fail_nth: 29) 19:41:41 executing program 3: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010009000c", 0xd, 0x400}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000080)={[{@fault_injection}]}) [ 820.305301] FAULT_INJECTION: forcing a failure. [ 820.305301] name failslab, interval 1, probability 0, space 0, times 0 [ 820.324143] erofs: read_super, device -> /dev/loop3 [ 820.331207] erofs: read_super, device -> /dev/loop0 [ 820.340160] erofs: read_super, device -> /dev/loop5 [ 820.345404] erofs: options -> [ 820.351705] erofs: options -> fault_injection=0x0000000000000000, [ 820.362454] erofs: FAULT_INJECTION was not selected [ 820.369094] erofs: root inode @ nid 36 [ 820.377522] erofs: read_super, device -> /dev/loop2 [ 820.383916] erofs: bogus i_mode (0) @ nid 36 [ 820.385981] erofs: cannot read erofs superblock [ 820.390172] CPU: 1 PID: 7912 Comm: syz-executor.1 Not tainted 4.19.211-syzkaller #0 19:41:41 executing program 4: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467012100000c0024", 0xf, 0x400}, {&(0x7f0000000280)="05", 0x1, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000080)={[{@fault_injection}]}) [ 820.401024] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 820.403363] erofs: options -> fault_injection=0x0000000000000000, [ 820.410377] Call Trace: [ 820.410401] dump_stack+0x1fc/0x2ef [ 820.410419] should_fail.cold+0xa/0xf [ 820.410435] ? setup_fault_attr+0x200/0x200 [ 820.410450] ? __lock_acquire+0x6de/0x3ff0 [ 820.410471] __should_failslab+0x115/0x180 [ 820.410505] should_failslab+0x5/0x10 [ 820.410522] __kmalloc+0x2ab/0x3c0 [ 820.431483] erofs: options -> fault_injection=0x0000000000000000, [ 820.435240] ? ext4_find_extent+0x9bb/0xc70 [ 820.435259] ext4_find_extent+0x9bb/0xc70 [ 820.435281] ext4_ext_map_blocks+0x1c0/0x7390 [ 820.447098] erofs: FAULT_INJECTION was not selected [ 820.453042] ? __lock_acquire+0x6de/0x3ff0 [ 820.453062] ? __lock_acquire+0x6de/0x3ff0 [ 820.453083] ? mark_held_locks+0xf0/0xf0 [ 820.453096] ? __ext4_handle_dirty_metadata+0x1e0/0x590 [ 820.453110] ? ext4_find_delalloc_cluster+0x1f0/0x1f0 [ 820.453129] ? mark_held_locks+0xf0/0xf0 [ 820.468820] erofs: cannot read erofs superblock [ 820.471321] ? ext4_mark_iloc_dirty+0x1b0d/0x2b30 [ 820.471341] ? ext4_es_lookup_extent+0x375/0xb60 [ 820.476728] erofs: root inode @ nid 0 [ 820.479784] ? lock_downgrade+0x720/0x720 [ 820.479796] ? lock_acquire+0x170/0x3c0 [ 820.479812] ? check_preemption_disabled+0x41/0x280 [ 820.479831] ? lock_acquire+0x170/0x3c0 [ 820.479845] ? ext4_map_blocks+0x33e/0x1a50 [ 820.479867] ext4_map_blocks+0xd88/0x1a50 [ 820.479885] ? check_preemption_disabled+0x41/0x280 [ 820.479901] ? ext4_issue_zeroout+0x160/0x160 [ 820.479916] ? __brelse+0x84/0xa0 [ 820.479931] ? __ext4_new_inode+0x2eb/0x5a20 [ 820.488604] erofs: bogus i_mode (0) @ nid 0 [ 820.489334] ext4_getblk+0xad/0x4f0 [ 820.567430] ? ext4_iomap_begin+0xe00/0xe00 [ 820.571756] ? ext4_free_inode+0x1780/0x1780 [ 820.576158] ? debug_check_no_obj_freed+0x201/0x490 [ 820.581239] ? __dquot_initialize+0x298/0xb70 [ 820.585721] ext4_bread+0x7c/0x210 [ 820.589256] ? ext4_getblk+0x4f0/0x4f0 [ 820.593135] ? dquot_initialize_needed+0x290/0x290 [ 820.598051] ? trace_hardirqs_off+0x64/0x200 [ 820.602444] ext4_append+0x155/0x370 [ 820.606148] ext4_mkdir+0x5bd/0xe10 [ 820.609785] ? ext4_init_dot_dotdot+0x600/0x600 [ 820.614450] ? generic_permission+0x116/0x4d0 [ 820.618935] ? inode_permission.part.0+0x10c/0x450 [ 820.623862] vfs_mkdir+0x508/0x7a0 [ 820.627400] do_mkdirat+0x262/0x2d0 [ 820.631045] ? __ia32_sys_mknod+0x120/0x120 [ 820.635360] ? trace_hardirqs_off_caller+0x6e/0x210 [ 820.640359] ? do_syscall_64+0x21/0x620 [ 820.644317] do_syscall_64+0xf9/0x620 [ 820.648119] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 820.653300] RIP: 0033:0x7ff03e64ffc7 [ 820.657000] Code: 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 820.675884] RSP: 002b:00007ff03cfc5f88 EFLAGS: 00000213 ORIG_RAX: 0000000000000053 [ 820.683579] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007ff03e64ffc7 [ 820.690848] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000100 [ 820.698115] RBP: 00007ff03cfc6020 R08: 0000000000000000 R09: 00007ff03cfc61d0 [ 820.705382] R10: 0000000000000000 R11: 0000000000000213 R12: 0000000020000000 [ 820.712639] R13: 0000000020000100 R14: 00007ff03cfc5fe0 R15: 0000000020000080 [ 820.754658] erofs: read_super, device -> /dev/loop1 [ 820.759927] erofs: options -> [ 820.763270] erofs: root inode @ nid 36 [ 820.767707] erofs: mounted on /dev/loop1 with opts: . 19:41:41 executing program 5: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467016800000c0024", 0xf, 0x400}, {&(0x7f0000000280)="05", 0x1, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000080)={[{@fault_injection}]}) 19:41:41 executing program 1: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c0024", 0xf, 0x400}, {&(0x7f0000000280)="050000040041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000080)) (fail_nth: 30) 19:41:41 executing program 0: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e0", 0x4, 0x400}, {0x0, 0x20000000, 0x1000}], 0x0, &(0x7f0000000080)) 19:41:41 executing program 2: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c0024", 0xf, 0x400}, {&(0x7f0000000280)="05000000c041", 0x6, 0x480}, {0x0, 0xf6ffffff, 0x1000}], 0x0, &(0x7f0000000080)={[{@fault_injection}]}) 19:41:41 executing program 3: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010010000c", 0xd, 0x400}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000080)={[{@fault_injection}]}) 19:41:41 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$int_in(r0, 0x5421, &(0x7f00000001c0)=0x101) r1 = syz_open_dev$audion(&(0x7f0000000040), 0x0, 0x0) ioctl$DRM_IOCTL_AGP_ACQUIRE(r1, 0x6430) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @empty}, 0x1c) io_setup(0xb, &(0x7f0000000100)=0x0) io_submit(r2, 0x1, &(0x7f0000000200)=[&(0x7f0000000000)={0x180a, 0x0, 0x0, 0x0, 0x0, r0, 0x0, 0x10000007ffff000}]) [ 820.911465] erofs: unmounted for /dev/loop1 [ 820.974770] erofs: read_super, device -> /dev/loop0 [ 820.975979] erofs: read_super, device -> /dev/loop5 [ 820.987293] erofs: options -> fault_injection=0x0000000000000000, [ 820.996792] erofs: options -> [ 821.009498] erofs: FAULT_INJECTION was not selected [ 821.012656] erofs: cannot read erofs superblock [ 821.025834] erofs: root inode @ nid 36 [ 821.036099] erofs: bogus i_mode (0) @ nid 36 19:41:42 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$int_in(r0, 0x5421, &(0x7f00000001c0)=0x101) r1 = syz_open_dev$audion(&(0x7f0000000040), 0x0, 0x0) ioctl$DRM_IOCTL_AGP_ACQUIRE(r1, 0x6430) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @empty}, 0x1c) io_setup(0xb, &(0x7f0000000100)=0x0) io_submit(r2, 0x1, &(0x7f0000000200)=[&(0x7f0000000000)={0x180a, 0x0, 0x0, 0x0, 0x0, r0, 0x0, 0x10000007ffff000}]) socket$inet6_tcp(0xa, 0x1, 0x0) (async) ioctl$int_in(r0, 0x5421, &(0x7f00000001c0)=0x101) (async) syz_open_dev$audion(&(0x7f0000000040), 0x0, 0x0) (async) ioctl$DRM_IOCTL_AGP_ACQUIRE(r1, 0x6430) (async) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @empty}, 0x1c) (async) io_setup(0xb, &(0x7f0000000100)) (async) io_submit(r2, 0x1, &(0x7f0000000200)=[&(0x7f0000000000)={0x180a, 0x0, 0x0, 0x0, 0x0, r0, 0x0, 0x10000007ffff000}]) (async) 19:41:42 executing program 0: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e0", 0x4, 0x400}, {0x0, 0x21000000, 0x1000}], 0x0, &(0x7f0000000080)) [ 821.082815] erofs: read_super, device -> /dev/loop3 [ 821.091387] erofs: options -> fault_injection=0x0000000000000000, [ 821.101510] erofs: FAULT_INJECTION was not selected [ 821.106665] erofs: root inode @ nid 0 [ 821.111514] erofs: bogus i_mode (0) @ nid 0 [ 821.130505] FAULT_INJECTION: forcing a failure. [ 821.130505] name failslab, interval 1, probability 0, space 0, times 0 [ 821.142253] CPU: 1 PID: 7959 Comm: syz-executor.1 Not tainted 4.19.211-syzkaller #0 [ 821.150069] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 821.159436] Call Trace: [ 821.162044] dump_stack+0x1fc/0x2ef [ 821.165793] should_fail.cold+0xa/0xf [ 821.169609] ? setup_fault_attr+0x200/0x200 [ 821.173946] ? __es_tree_search.isra.0+0x1af/0x210 [ 821.178896] __should_failslab+0x115/0x180 [ 821.183242] should_failslab+0x5/0x10 [ 821.187048] kmem_cache_alloc+0x3f/0x370 [ 821.191121] __es_insert_extent+0x39b/0x13b0 [ 821.195543] ? lock_acquire+0x170/0x3c0 [ 821.199525] ? ext4_es_insert_extent+0x17e/0x5e0 [ 821.204338] ext4_es_insert_extent+0x22e/0x5e0 [ 821.208959] ? lock_downgrade+0x720/0x720 [ 821.213112] ? ext4_es_find_delayed_extent_range+0x9f0/0x9f0 [ 821.218932] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 821.223952] ? ext4_es_find_delayed_extent_range+0x7d9/0x9f0 [ 821.229786] ext4_ext_map_blocks+0x2129/0x7390 [ 821.234471] ? __lock_acquire+0x6de/0x3ff0 [ 821.238715] ? __lock_acquire+0x6de/0x3ff0 [ 821.242949] ? mark_held_locks+0xf0/0xf0 [ 821.247000] ? __ext4_handle_dirty_metadata+0x1e0/0x590 [ 821.252351] ? ext4_find_delalloc_cluster+0x1f0/0x1f0 [ 821.257539] ? mark_held_locks+0xf0/0xf0 [ 821.261711] ? ext4_mark_iloc_dirty+0x1b0d/0x2b30 [ 821.266561] ? ext4_es_lookup_extent+0x375/0xb60 [ 821.271338] ? check_preemption_disabled+0x41/0x280 [ 821.276383] ? lock_acquire+0x170/0x3c0 [ 821.280355] ? ext4_map_blocks+0x33e/0x1a50 [ 821.284668] ext4_map_blocks+0xd88/0x1a50 [ 821.288819] ? check_preemption_disabled+0x41/0x280 [ 821.293829] ? ext4_issue_zeroout+0x160/0x160 [ 821.298320] ? __brelse+0x84/0xa0 [ 821.301769] ? __ext4_new_inode+0x2eb/0x5a20 [ 821.306172] ext4_getblk+0xad/0x4f0 [ 821.309797] ? ext4_iomap_begin+0xe00/0xe00 [ 821.314115] ? ext4_free_inode+0x1780/0x1780 [ 821.318517] ? debug_check_no_obj_freed+0x201/0x490 [ 821.323528] ? __dquot_initialize+0x298/0xb70 [ 821.328078] ext4_bread+0x7c/0x210 [ 821.331622] ? ext4_getblk+0x4f0/0x4f0 [ 821.335517] ? dquot_initialize_needed+0x290/0x290 [ 821.340467] ? trace_hardirqs_off+0x64/0x200 [ 821.344862] ext4_append+0x155/0x370 [ 821.348583] ext4_mkdir+0x5bd/0xe10 [ 821.352224] ? ext4_init_dot_dotdot+0x600/0x600 [ 821.356998] ? generic_permission+0x116/0x4d0 [ 821.361484] ? inode_permission.part.0+0x10c/0x450 [ 821.366414] vfs_mkdir+0x508/0x7a0 [ 821.369964] do_mkdirat+0x262/0x2d0 [ 821.373600] ? __ia32_sys_mknod+0x120/0x120 [ 821.377920] ? trace_hardirqs_off_caller+0x6e/0x210 [ 821.382934] ? do_syscall_64+0x21/0x620 [ 821.386904] do_syscall_64+0xf9/0x620 [ 821.390705] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 821.395918] RIP: 0033:0x7ff03e64ffc7 [ 821.399626] Code: 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 821.418531] RSP: 002b:00007ff03cfc5f88 EFLAGS: 00000213 ORIG_RAX: 0000000000000053 [ 821.426352] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007ff03e64ffc7 [ 821.433609] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000100 [ 821.440868] RBP: 00007ff03cfc6020 R08: 0000000000000000 R09: 00007ff03cfc61d0 [ 821.448192] R10: 0000000000000000 R11: 0000000000000213 R12: 0000000020000000 [ 821.455474] R13: 0000000020000100 R14: 00007ff03cfc5fe0 R15: 0000000020000080 19:41:42 executing program 3: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010021000c", 0xd, 0x400}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000080)={[{@fault_injection}]}) 19:41:42 executing program 5: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467016c00000c0024", 0xf, 0x400}, {&(0x7f0000000280)="05", 0x1, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000080)={[{@fault_injection}]}) 19:41:42 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$int_in(r0, 0x5421, &(0x7f00000001c0)=0x101) r1 = syz_open_dev$audion(&(0x7f0000000040), 0x0, 0x0) ioctl$DRM_IOCTL_AGP_ACQUIRE(r1, 0x6430) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @empty}, 0x1c) io_setup(0xb, &(0x7f0000000100)=0x0) io_submit(r2, 0x1, &(0x7f0000000200)=[&(0x7f0000000000)={0x180a, 0x0, 0x0, 0x0, 0x0, r0, 0x0, 0x10000007ffff000}]) socket$inet6_tcp(0xa, 0x1, 0x0) (async) ioctl$int_in(r0, 0x5421, &(0x7f00000001c0)=0x101) (async) syz_open_dev$audion(&(0x7f0000000040), 0x0, 0x0) (async) ioctl$DRM_IOCTL_AGP_ACQUIRE(r1, 0x6430) (async) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @empty}, 0x1c) (async) io_setup(0xb, &(0x7f0000000100)) (async) io_submit(r2, 0x1, &(0x7f0000000200)=[&(0x7f0000000000)={0x180a, 0x0, 0x0, 0x0, 0x0, r0, 0x0, 0x10000007ffff000}]) (async) [ 821.479960] erofs: read_super, device -> /dev/loop1 [ 821.485456] erofs: options -> [ 821.493491] erofs: root inode @ nid 36 [ 821.506897] erofs: read_super, device -> /dev/loop2 [ 821.518718] erofs: read_super, device -> /dev/loop0 [ 821.523765] erofs: options -> [ 821.527018] erofs: cannot read erofs superblock [ 821.556365] erofs: read_super, device -> /dev/loop3 [ 821.564425] erofs: options -> fault_injection=0x0000000000000000, [ 821.567145] erofs: mounted on /dev/loop1 with opts: . [ 821.573381] erofs: FAULT_INJECTION was not selected [ 821.576503] erofs: options -> fault_injection=0x0000000000000000, [ 821.582208] erofs: root inode @ nid 0 [ 821.592216] erofs: bogus i_mode (0) @ nid 0 19:41:42 executing program 3: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010023000c", 0xd, 0x400}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000080)={[{@fault_injection}]}) [ 821.610534] erofs: cannot read erofs superblock 19:41:42 executing program 4: r0 = perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001040)={0x2, 0x80, 0x6a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = dup3(r0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0x9) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='stat\x00') r3 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) bind$bt_l2cap(r3, &(0x7f0000000000), 0x58) listen(r3, 0x0) readv(r3, &(0x7f0000000100)=[{&(0x7f00000010c0)=""/4096, 0x1000}, {&(0x7f0000000000)=""/3, 0x3}], 0x2) exit(0x0) open_by_handle_at(r0, &(0x7f0000000140)=@reiserfs_6={0x18, 0x6, {0xffffe06e, 0x3ff, 0x9, 0xd3b, 0x9, 0x7}}, 0xa0000) getpgrp(0xffffffffffffffff) preadv(0xffffffffffffffff, &(0x7f0000000600)=[{&(0x7f0000000300)=""/9, 0x9}, {&(0x7f0000000340)=""/54, 0x36}, {&(0x7f0000000380)=""/188, 0xbc}, {&(0x7f0000000440)=""/182, 0xb6}, {&(0x7f0000000500)=""/128, 0x80}, {&(0x7f0000000580)=""/81, 0x51}], 0x6, 0xfffffffc, 0xf9cc) preadv(r2, &(0x7f0000000500), 0xf1, 0x0, 0x0) 19:41:42 executing program 1: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c0024", 0xf, 0x400}, {&(0x7f0000000280)="050000040041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000080)) (fail_nth: 31) 19:41:42 executing program 0: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e0", 0x4, 0x400}, {0x0, 0x23000000, 0x1000}], 0x0, &(0x7f0000000080)) 19:41:42 executing program 2: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c0024", 0xf, 0x400}, {&(0x7f0000000280)="05000000c041", 0x6, 0x480}, {0x0, 0xff0f0000, 0x1000}], 0x0, &(0x7f0000000080)={[{@fault_injection}]}) [ 821.694362] erofs: unmounted for /dev/loop1 [ 821.703137] erofs: read_super, device -> /dev/loop5 [ 821.717981] erofs: options -> fault_injection=0x0000000000000000, [ 821.731542] erofs: FAULT_INJECTION was not selected [ 821.736717] erofs: root inode @ nid 36 [ 821.741617] erofs: bogus i_mode (0) @ nid 36 [ 821.814737] erofs: read_super, device -> /dev/loop0 [ 821.819952] erofs: options -> [ 821.823229] FAULT_INJECTION: forcing a failure. [ 821.823229] name failslab, interval 1, probability 0, space 0, times 0 [ 821.823264] erofs: cannot read erofs superblock [ 821.841105] erofs: read_super, device -> /dev/loop3 [ 821.846140] erofs: options -> fault_injection=0x0000000000000000, [ 821.853637] CPU: 0 PID: 8016 Comm: syz-executor.1 Not tainted 4.19.211-syzkaller #0 [ 821.857570] erofs: read_super, device -> /dev/loop2 [ 821.861579] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 821.861585] Call Trace: [ 821.861608] dump_stack+0x1fc/0x2ef [ 821.861630] should_fail.cold+0xa/0xf [ 821.877469] erofs: options -> fault_injection=0x0000000000000000, [ 821.878601] ? setup_fault_attr+0x200/0x200 [ 821.878622] ? lock_downgrade+0x720/0x720 [ 821.882792] erofs: FAULT_INJECTION was not selected [ 821.886032] __should_failslab+0x115/0x180 [ 821.886050] should_failslab+0x5/0x10 [ 821.886066] __kmalloc+0x2ab/0x3c0 [ 821.897335] erofs: cannot read erofs superblock [ 821.900821] ? ext4_find_extent+0x9bb/0xc70 [ 821.900839] ext4_find_extent+0x9bb/0xc70 [ 821.900861] ext4_ext_map_blocks+0x1c0/0x7390 [ 821.915199] erofs: root inode @ nid 0 [ 821.917410] ? __lock_acquire+0x6de/0x3ff0 [ 821.917430] ? mark_held_locks+0xf0/0xf0 [ 821.917445] ? __ext4_handle_dirty_metadata+0x1e0/0x590 [ 821.917458] ? ext4_find_delalloc_cluster+0x1f0/0x1f0 [ 821.917473] ? mark_held_locks+0xf0/0xf0 [ 821.925131] erofs: bogus i_mode (0) @ nid 0 [ 821.926477] ? ext4_mark_iloc_dirty+0x1b0d/0x2b30 [ 821.926503] ? ext4_es_lookup_extent+0x375/0xb60 [ 821.926525] ? ext4_map_blocks+0x59f/0x1a50 [ 821.980151] ? lock_acquire+0x170/0x3c0 [ 821.984113] ? ext4_map_blocks+0x740/0x1a50 [ 821.988424] ext4_map_blocks+0x7a2/0x1a50 [ 821.992560] ? check_preemption_disabled+0x41/0x280 [ 821.997567] ? ext4_issue_zeroout+0x160/0x160 [ 822.002060] ? __brelse+0x84/0xa0 [ 822.005503] ? __ext4_new_inode+0x2eb/0x5a20 [ 822.009903] ext4_getblk+0xad/0x4f0 [ 822.013523] ? ext4_iomap_begin+0xe00/0xe00 [ 822.017837] ? ext4_free_inode+0x1780/0x1780 [ 822.022228] ? debug_check_no_obj_freed+0x201/0x490 [ 822.027227] ? __dquot_initialize+0x298/0xb70 [ 822.031737] ext4_bread+0x7c/0x210 [ 822.035261] ? ext4_getblk+0x4f0/0x4f0 [ 822.039135] ? dquot_initialize_needed+0x290/0x290 [ 822.044053] ? trace_hardirqs_off+0x64/0x200 [ 822.048453] ext4_append+0x155/0x370 [ 822.052158] ext4_mkdir+0x5bd/0xe10 [ 822.055895] ? ext4_init_dot_dotdot+0x600/0x600 [ 822.060558] ? generic_permission+0x116/0x4d0 [ 822.065037] ? inode_permission.part.0+0x10c/0x450 [ 822.070213] vfs_mkdir+0x508/0x7a0 [ 822.073742] do_mkdirat+0x262/0x2d0 [ 822.077960] ? __ia32_sys_mknod+0x120/0x120 [ 822.082266] ? trace_hardirqs_off_caller+0x6e/0x210 [ 822.087264] ? do_syscall_64+0x21/0x620 [ 822.091344] do_syscall_64+0xf9/0x620 [ 822.095158] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 822.100350] RIP: 0033:0x7ff03e64ffc7 [ 822.104046] Code: 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 822.122936] RSP: 002b:00007ff03cfc5f88 EFLAGS: 00000213 ORIG_RAX: 0000000000000053 [ 822.130633] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007ff03e64ffc7 [ 822.137897] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000100 [ 822.145153] RBP: 00007ff03cfc6020 R08: 0000000000000000 R09: 00007ff03cfc61d0 [ 822.152409] R10: 0000000000000000 R11: 0000000000000213 R12: 0000000020000000 19:41:43 executing program 5: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467017400000c0024", 0xf, 0x400}, {&(0x7f0000000280)="05", 0x1, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000080)={[{@fault_injection}]}) 19:41:43 executing program 0: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e0", 0x4, 0x400}, {0x0, 0x3c020000, 0x1000}], 0x0, &(0x7f0000000080)) [ 822.159658] R13: 0000000020000100 R14: 00007ff03cfc5fe0 R15: 0000000020000080 19:41:43 executing program 1: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c0024", 0xf, 0x400}, {&(0x7f0000000280)="050000040041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000080)) (fail_nth: 32) 19:41:43 executing program 3: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010060000c", 0xd, 0x400}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000080)={[{@fault_injection}]}) 19:41:43 executing program 2: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c0024", 0xf, 0x400}, {&(0x7f0000000280)="05000000c041", 0x6, 0x480}, {0x0, 0xffff1f00, 0x1000}], 0x0, &(0x7f0000000080)={[{@fault_injection}]}) [ 822.322001] erofs: read_super, device -> /dev/loop5 [ 822.360541] erofs: read_super, device -> /dev/loop0 [ 822.366382] erofs: options -> fault_injection=0x0000000000000000, [ 822.384015] erofs: options -> [ 822.392246] erofs: FAULT_INJECTION was not selected [ 822.401984] erofs: cannot read erofs superblock [ 822.405998] FAULT_INJECTION: forcing a failure. [ 822.405998] name failslab, interval 1, probability 0, space 0, times 0 [ 822.411248] erofs: root inode @ nid 36 [ 822.425702] CPU: 0 PID: 8052 Comm: syz-executor.1 Not tainted 4.19.211-syzkaller #0 [ 822.428314] erofs: bogus i_mode (0) @ nid 36 [ 822.433514] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 822.433520] Call Trace: [ 822.433541] dump_stack+0x1fc/0x2ef [ 822.433560] should_fail.cold+0xa/0xf [ 822.433577] ? setup_fault_attr+0x200/0x200 [ 822.461642] ? lock_downgrade+0x720/0x720 [ 822.465779] ? check_preemption_disabled+0x41/0x280 [ 822.470870] __should_failslab+0x115/0x180 [ 822.475189] should_failslab+0x5/0x10 [ 822.478975] kmem_cache_alloc+0x277/0x370 [ 822.483110] ext4_mb_new_blocks+0x60a/0x4370 [ 822.487507] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 822.492520] ? ext4_cache_extents+0x68/0x2d0 [ 822.496929] ? ext4_find_extent+0x9bb/0xc70 [ 822.501252] ? ext4_discard_preallocations+0xfb0/0xfb0 [ 822.506515] ? ext4_ext_search_right+0x2c7/0xb60 [ 822.511263] ? ext4_inode_to_goal_block+0x2d2/0x3e0 [ 822.516286] ext4_ext_map_blocks+0x2aa2/0x7390 [ 822.520867] ? __lock_acquire+0x6de/0x3ff0 [ 822.525088] ? mark_held_locks+0xf0/0xf0 [ 822.529151] ? __ext4_handle_dirty_metadata+0x1e0/0x590 [ 822.534527] ? ext4_find_delalloc_cluster+0x1f0/0x1f0 [ 822.539701] ? mark_held_locks+0xf0/0xf0 [ 822.543768] ? ext4_mark_iloc_dirty+0x1b0d/0x2b30 [ 822.548605] ? ext4_es_lookup_extent+0x375/0xb60 [ 822.553541] ? ext4_map_blocks+0x59f/0x1a50 [ 822.557968] ext4_map_blocks+0x7a2/0x1a50 [ 822.562114] ? check_preemption_disabled+0x41/0x280 [ 822.567998] ? ext4_issue_zeroout+0x160/0x160 [ 822.572499] ? __brelse+0x84/0xa0 [ 822.577790] ? __ext4_new_inode+0x2eb/0x5a20 [ 822.582199] ext4_getblk+0xad/0x4f0 [ 822.585811] ? ext4_iomap_begin+0xe00/0xe00 [ 822.590134] ? ext4_free_inode+0x1780/0x1780 [ 822.594552] ? debug_check_no_obj_freed+0x201/0x490 [ 822.599556] ? __dquot_initialize+0x298/0xb70 [ 822.604037] ext4_bread+0x7c/0x210 [ 822.607571] ? ext4_getblk+0x4f0/0x4f0 [ 822.611442] ? dquot_initialize_needed+0x290/0x290 [ 822.616359] ? trace_hardirqs_off+0x64/0x200 [ 822.620750] ext4_append+0x155/0x370 [ 822.624447] ext4_mkdir+0x5bd/0xe10 [ 822.628061] ? ext4_init_dot_dotdot+0x600/0x600 [ 822.632726] ? generic_permission+0x116/0x4d0 [ 822.637236] ? inode_permission.part.0+0x10c/0x450 [ 822.642152] vfs_mkdir+0x508/0x7a0 [ 822.645677] do_mkdirat+0x262/0x2d0 [ 822.649286] ? __ia32_sys_mknod+0x120/0x120 [ 822.653775] ? trace_hardirqs_off_caller+0x6e/0x210 [ 822.658784] ? do_syscall_64+0x21/0x620 [ 822.662739] do_syscall_64+0xf9/0x620 [ 822.666525] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 822.671701] RIP: 0033:0x7ff03e64ffc7 [ 822.675404] Code: 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 822.694300] RSP: 002b:00007ff03cfc5f88 EFLAGS: 00000213 ORIG_RAX: 0000000000000053 [ 822.702080] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007ff03e64ffc7 19:41:43 executing program 4: r0 = perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001040)={0x2, 0x80, 0x6a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async) r1 = dup3(r0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0x9) (async) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='stat\x00') r3 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) bind$bt_l2cap(r3, &(0x7f0000000000), 0x58) listen(r3, 0x0) (async) readv(r3, &(0x7f0000000100)=[{&(0x7f00000010c0)=""/4096, 0x1000}, {&(0x7f0000000000)=""/3, 0x3}], 0x2) (async, rerun: 32) exit(0x0) (async, rerun: 32) open_by_handle_at(r0, &(0x7f0000000140)=@reiserfs_6={0x18, 0x6, {0xffffe06e, 0x3ff, 0x9, 0xd3b, 0x9, 0x7}}, 0xa0000) (async, rerun: 32) getpgrp(0xffffffffffffffff) (async, rerun: 32) preadv(0xffffffffffffffff, &(0x7f0000000600)=[{&(0x7f0000000300)=""/9, 0x9}, {&(0x7f0000000340)=""/54, 0x36}, {&(0x7f0000000380)=""/188, 0xbc}, {&(0x7f0000000440)=""/182, 0xb6}, {&(0x7f0000000500)=""/128, 0x80}, {&(0x7f0000000580)=""/81, 0x51}], 0x6, 0xfffffffc, 0xf9cc) (async) preadv(r2, &(0x7f0000000500), 0xf1, 0x0, 0x0) 19:41:43 executing program 0: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e0", 0x4, 0x400}, {0x0, 0x3f000000, 0x1000}], 0x0, &(0x7f0000000080)) [ 822.709333] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000100 [ 822.716592] RBP: 00007ff03cfc6020 R08: 0000000000000000 R09: 00007ff03cfc61d0 [ 822.723845] R10: 0000000000000000 R11: 0000000000000213 R12: 0000000020000000 [ 822.731181] R13: 0000000020000100 R14: 00007ff03cfc5fe0 R15: 0000000020000080 19:41:43 executing program 1: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c0024", 0xf, 0x400}, {&(0x7f0000000280)="050000040041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000080)) (fail_nth: 33) [ 822.802275] erofs: read_super, device -> /dev/loop3 [ 822.807599] erofs: options -> fault_injection=0x0000000000000000, [ 822.814670] erofs: FAULT_INJECTION was not selected [ 822.821940] erofs: root inode @ nid 0 [ 822.826132] erofs: bogus i_mode (0) @ nid 0 [ 822.831767] erofs: read_super, device -> /dev/loop2 [ 822.836957] erofs: options -> fault_injection=0x0000000000000000, 19:41:43 executing program 4: r0 = perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001040)={0x2, 0x80, 0x6a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = dup3(r0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0x9) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='stat\x00') r3 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) bind$bt_l2cap(r3, &(0x7f0000000000), 0x58) listen(r3, 0x0) readv(r3, &(0x7f0000000100)=[{&(0x7f00000010c0)=""/4096, 0x1000}, {&(0x7f0000000000)=""/3, 0x3}], 0x2) exit(0x0) open_by_handle_at(r0, &(0x7f0000000140)=@reiserfs_6={0x18, 0x6, {0xffffe06e, 0x3ff, 0x9, 0xd3b, 0x9, 0x7}}, 0xa0000) getpgrp(0xffffffffffffffff) preadv(0xffffffffffffffff, &(0x7f0000000600)=[{&(0x7f0000000300)=""/9, 0x9}, {&(0x7f0000000340)=""/54, 0x36}, {&(0x7f0000000380)=""/188, 0xbc}, {&(0x7f0000000440)=""/182, 0xb6}, {&(0x7f0000000500)=""/128, 0x80}, {&(0x7f0000000580)=""/81, 0x51}], 0x6, 0xfffffffc, 0xf9cc) preadv(r2, &(0x7f0000000500), 0xf1, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) perf_event_open(&(0x7f0000001040)={0x2, 0x80, 0x6a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async) dup3(r0, 0xffffffffffffffff, 0x0) (async) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0x9) (async) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='stat\x00') (async) syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) (async) bind$bt_l2cap(r3, &(0x7f0000000000), 0x58) (async) listen(r3, 0x0) (async) readv(r3, &(0x7f0000000100)=[{&(0x7f00000010c0)=""/4096, 0x1000}, {&(0x7f0000000000)=""/3, 0x3}], 0x2) (async) exit(0x0) (async) open_by_handle_at(r0, &(0x7f0000000140)=@reiserfs_6={0x18, 0x6, {0xffffe06e, 0x3ff, 0x9, 0xd3b, 0x9, 0x7}}, 0xa0000) (async) getpgrp(0xffffffffffffffff) (async) preadv(0xffffffffffffffff, &(0x7f0000000600)=[{&(0x7f0000000300)=""/9, 0x9}, {&(0x7f0000000340)=""/54, 0x36}, {&(0x7f0000000380)=""/188, 0xbc}, {&(0x7f0000000440)=""/182, 0xb6}, {&(0x7f0000000500)=""/128, 0x80}, {&(0x7f0000000580)=""/81, 0x51}], 0x6, 0xfffffffc, 0xf9cc) (async) preadv(r2, &(0x7f0000000500), 0xf1, 0x0, 0x0) (async) 19:41:43 executing program 5: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467017a00000c0024", 0xf, 0x400}, {&(0x7f0000000280)="05", 0x1, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000080)={[{@fault_injection}]}) [ 822.858572] erofs: cannot read erofs superblock 19:41:44 executing program 3: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010082010c", 0xd, 0x400}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000080)={[{@fault_injection}]}) [ 822.965050] erofs: read_super, device -> /dev/loop5 [ 822.966606] erofs: read_super, device -> /dev/loop0 [ 822.975570] FAULT_INJECTION: forcing a failure. [ 822.975570] name failslab, interval 1, probability 0, space 0, times 0 [ 822.986914] CPU: 1 PID: 8079 Comm: syz-executor.1 Not tainted 4.19.211-syzkaller #0 [ 822.992887] erofs: options -> [ 822.994819] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 822.994825] Call Trace: [ 822.994847] dump_stack+0x1fc/0x2ef [ 822.994866] should_fail.cold+0xa/0xf [ 823.013745] erofs: cannot read erofs superblock [ 823.017378] ? setup_fault_attr+0x200/0x200 [ 823.017394] ? __es_tree_search.isra.0+0x1af/0x210 [ 823.017411] __should_failslab+0x115/0x180 [ 823.017428] should_failslab+0x5/0x10 [ 823.017441] kmem_cache_alloc+0x3f/0x370 [ 823.017456] __es_insert_extent+0x39b/0x13b0 [ 823.017478] ext4_es_insert_extent+0x22e/0x5e0 [ 823.032194] erofs: options -> fault_injection=0x0000000000000000, [ 823.035597] ? ext4_map_blocks+0x59f/0x1a50 19:41:44 executing program 2: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c0024", 0xf, 0x400}, {&(0x7f0000000280)="05000000c041", 0x6, 0x480}, {0x0, 0xffffff7f, 0x1000}], 0x0, &(0x7f0000000080)={[{@fault_injection}]}) [ 823.035615] ? ext4_es_find_delayed_extent_range+0x9f0/0x9f0 [ 823.035643] ext4_map_blocks+0xa2a/0x1a50 [ 823.054122] erofs: FAULT_INJECTION was not selected [ 823.058670] ? ext4_issue_zeroout+0x160/0x160 [ 823.058687] ? __brelse+0x84/0xa0 [ 823.058699] ? __ext4_new_inode+0x2eb/0x5a20 [ 823.058720] ext4_getblk+0xad/0x4f0 [ 823.058735] ? ext4_iomap_begin+0xe00/0xe00 [ 823.058757] ? ext4_free_inode+0x1780/0x1780 [ 823.058770] ? debug_check_no_obj_freed+0x201/0x490 [ 823.058785] ? __dquot_initialize+0x298/0xb70 19:41:44 executing program 4: syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) syz_open_dev$usbmon(0x0, 0x0, 0x0) ioctl$EXT4_IOC_MIGRATE(0xffffffffffffffff, 0x6609) pwrite64(0xffffffffffffffff, 0x0, 0x0, 0x0) fcntl$getflags(0xffffffffffffffff, 0x1) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f00000001c0)={'veth1_to_bridge\x00', &(0x7f0000000200)=ANY=[]}) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x26e1, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpgid(0x0) get_robust_list(r1, 0x0, &(0x7f00000022c0)) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/netlink\x00') r3 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000840), 0xc0a81, 0x0) sendfile(r3, r2, 0x0, 0x7ffff000) dup2(r2, r3) ioctl$TCSETSW2(0xffffffffffffffff, 0x402c542c, &(0x7f0000000080)={0x6, 0x1, 0x0, 0x0, 0xc1, "923937bd9f0e05135601000100", 0x0, 0x3f}) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$FAT_IOCTL_GET_VOLUME_ID(0xffffffffffffffff, 0x80047213, &(0x7f0000000100)) ioctl$TCSETSW2(r0, 0x402c542c, &(0x7f0000000000)={0x80000000, 0x200, 0xb5e, 0x2, 0x6, "1547d08faf34d67ba40035da982ae278c3096b", 0x7, 0x4}) ptrace$setregs(0xffffffffffffffff, 0x0, 0x0, 0x0) [ 823.058800] ext4_bread+0x7c/0x210 [ 823.058816] ? ext4_getblk+0x4f0/0x4f0 [ 823.076983] erofs: root inode @ nid 36 [ 823.078046] ? dquot_initialize_needed+0x290/0x290 [ 823.078064] ? trace_hardirqs_off+0x64/0x200 [ 823.078083] ext4_append+0x155/0x370 [ 823.078103] ext4_mkdir+0x5bd/0xe10 [ 823.078123] ? ext4_init_dot_dotdot+0x600/0x600 [ 823.078138] ? generic_permission+0x116/0x4d0 [ 823.078155] ? inode_permission.part.0+0x10c/0x450 [ 823.078170] vfs_mkdir+0x508/0x7a0 [ 823.078184] do_mkdirat+0x262/0x2d0 [ 823.078199] ? __ia32_sys_mknod+0x120/0x120 [ 823.078215] ? trace_hardirqs_off_caller+0x6e/0x210 [ 823.097031] erofs: bogus i_mode (0) @ nid 36 [ 823.098546] ? do_syscall_64+0x21/0x620 [ 823.098563] do_syscall_64+0xf9/0x620 [ 823.098582] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 823.098594] RIP: 0033:0x7ff03e64ffc7 [ 823.098608] Code: 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 823.098616] RSP: 002b:00007ff03cfc5f88 EFLAGS: 00000213 ORIG_RAX: 0000000000000053 [ 823.098630] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007ff03e64ffc7 [ 823.098638] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000100 [ 823.098645] RBP: 00007ff03cfc6020 R08: 0000000000000000 R09: 00007ff03cfc61d0 [ 823.098652] R10: 0000000000000000 R11: 0000000000000213 R12: 0000000020000000 [ 823.098660] R13: 0000000020000100 R14: 00007ff03cfc5fe0 R15: 0000000020000080 19:41:44 executing program 0: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e0", 0x4, 0x400}, {0x0, 0x48000000, 0x1000}], 0x0, &(0x7f0000000080)) [ 823.273785] erofs: read_super, device -> /dev/loop1 [ 823.283499] erofs: options -> [ 823.290773] erofs: root inode @ nid 36 [ 823.307355] erofs: mounted on /dev/loop1 with opts: . [ 823.313698] erofs: read_super, device -> /dev/loop3 19:41:44 executing program 5: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467018201000c0024", 0xf, 0x400}, {&(0x7f0000000280)="05", 0x1, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000080)={[{@fault_injection}]}) 19:41:44 executing program 1: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c0024", 0xf, 0x400}, {&(0x7f0000000280)="050000040041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000080)) (fail_nth: 34) [ 823.325636] erofs: options -> fault_injection=0x0000000000000000, [ 823.363635] erofs: FAULT_INJECTION was not selected 19:41:44 executing program 4: syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) (async) syz_open_dev$usbmon(0x0, 0x0, 0x0) (async) ioctl$EXT4_IOC_MIGRATE(0xffffffffffffffff, 0x6609) pwrite64(0xffffffffffffffff, 0x0, 0x0, 0x0) (async) fcntl$getflags(0xffffffffffffffff, 0x1) (async) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f00000001c0)={'veth1_to_bridge\x00', &(0x7f0000000200)=ANY=[]}) (async) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x26e1, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, 0x0) (async) perf_event_open(&(0x7f000001d000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpgid(0x0) get_robust_list(r1, 0x0, &(0x7f00000022c0)) (async) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/netlink\x00') (async) r3 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000840), 0xc0a81, 0x0) sendfile(r3, r2, 0x0, 0x7ffff000) (async) dup2(r2, r3) (async) ioctl$TCSETSW2(0xffffffffffffffff, 0x402c542c, &(0x7f0000000080)={0x6, 0x1, 0x0, 0x0, 0xc1, "923937bd9f0e05135601000100", 0x0, 0x3f}) (async) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$FAT_IOCTL_GET_VOLUME_ID(0xffffffffffffffff, 0x80047213, &(0x7f0000000100)) (async) ioctl$TCSETSW2(r0, 0x402c542c, &(0x7f0000000000)={0x80000000, 0x200, 0xb5e, 0x2, 0x6, "1547d08faf34d67ba40035da982ae278c3096b", 0x7, 0x4}) (async) ptrace$setregs(0xffffffffffffffff, 0x0, 0x0, 0x0) [ 823.381707] erofs: root inode @ nid 0 [ 823.388982] erofs: read_super, device -> /dev/loop2 [ 823.394647] erofs: bogus i_mode (0) @ nid 0 [ 823.400955] erofs: unmounted for /dev/loop1 [ 823.411476] erofs: options -> fault_injection=0x0000000000000000, [ 823.427236] erofs: cannot read erofs superblock 19:41:44 executing program 2: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c0024", 0xf, 0x400}, {&(0x7f0000000280)="05000000c041", 0x6, 0x480}, {0x0, 0xffffff8c, 0x1000}], 0x0, &(0x7f0000000080)={[{@fault_injection}]}) 19:41:44 executing program 3: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b0046701003c020c", 0xd, 0x400}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000080)={[{@fault_injection}]}) [ 823.518242] erofs: read_super, device -> /dev/loop5 [ 823.529105] erofs: options -> fault_injection=0x0000000000000000, [ 823.538053] erofs: FAULT_INJECTION was not selected [ 823.550241] erofs: root inode @ nid 36 [ 823.562682] erofs: read_super, device -> /dev/loop0 [ 823.569761] FAULT_INJECTION: forcing a failure. [ 823.569761] name failslab, interval 1, probability 0, space 0, times 0 [ 823.579460] erofs: options -> [ 823.584592] erofs: bogus i_mode (0) @ nid 36 [ 823.604413] erofs: cannot read erofs superblock 19:41:44 executing program 4: syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) (async) syz_open_dev$usbmon(0x0, 0x0, 0x0) (async) ioctl$EXT4_IOC_MIGRATE(0xffffffffffffffff, 0x6609) (async) pwrite64(0xffffffffffffffff, 0x0, 0x0, 0x0) (async) fcntl$getflags(0xffffffffffffffff, 0x1) (async) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f00000001c0)={'veth1_to_bridge\x00', &(0x7f0000000200)=ANY=[]}) (async) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x26e1, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, 0x0) (async) perf_event_open(&(0x7f000001d000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpgid(0x0) get_robust_list(r1, 0x0, &(0x7f00000022c0)) (async) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/netlink\x00') (async) r3 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000840), 0xc0a81, 0x0) sendfile(r3, r2, 0x0, 0x7ffff000) (async) dup2(r2, r3) (async) ioctl$TCSETSW2(0xffffffffffffffff, 0x402c542c, &(0x7f0000000080)={0x6, 0x1, 0x0, 0x0, 0xc1, "923937bd9f0e05135601000100", 0x0, 0x3f}) (async) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) (async) ioctl$FAT_IOCTL_GET_VOLUME_ID(0xffffffffffffffff, 0x80047213, &(0x7f0000000100)) (async) ioctl$TCSETSW2(r0, 0x402c542c, &(0x7f0000000000)={0x80000000, 0x200, 0xb5e, 0x2, 0x6, "1547d08faf34d67ba40035da982ae278c3096b", 0x7, 0x4}) (async) ptrace$setregs(0xffffffffffffffff, 0x0, 0x0, 0x0) [ 823.614560] CPU: 1 PID: 8140 Comm: syz-executor.1 Not tainted 4.19.211-syzkaller #0 [ 823.622390] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 823.631841] Call Trace: [ 823.634445] dump_stack+0x1fc/0x2ef [ 823.638088] should_fail.cold+0xa/0xf [ 823.641955] ? setup_fault_attr+0x200/0x200 [ 823.646292] ? lock_acquire+0x170/0x3c0 [ 823.650292] __should_failslab+0x115/0x180 [ 823.654538] should_failslab+0x5/0x10 [ 823.658334] __kmalloc_track_caller+0x2a6/0x3c0 [ 823.662992] ? strndup_user+0x70/0x120 [ 823.666866] ? _copy_from_user+0xd2/0x130 [ 823.671006] memdup_user+0x22/0xb0 [ 823.674562] strndup_user+0x70/0x120 [ 823.678267] ksys_mount+0x6f/0x130 [ 823.681792] __x64_sys_mount+0xba/0x150 [ 823.685761] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 823.690422] do_syscall_64+0xf9/0x620 [ 823.694215] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 823.699391] RIP: 0033:0x7ff03e6523ea [ 823.703089] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 823.721975] RSP: 002b:00007ff03cfc5f88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 823.729675] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007ff03e6523ea [ 823.737364] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007ff03cfc5fe0 [ 823.744618] RBP: 00007ff03cfc6020 R08: 00007ff03cfc6020 R09: 0000000020000000 [ 823.751871] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000000 [ 823.759126] R13: 0000000020000100 R14: 00007ff03cfc5fe0 R15: 0000000020000080 19:41:44 executing program 5: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467013c02000c0024", 0xf, 0x400}, {&(0x7f0000000280)="05", 0x1, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000080)={[{@fault_injection}]}) 19:41:44 executing program 1: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c0024", 0xf, 0x400}, {&(0x7f0000000280)="050000040041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000080)) (fail_nth: 35) 19:41:44 executing program 0: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e0", 0x4, 0x400}, {0x0, 0x4c000000, 0x1000}], 0x0, &(0x7f0000000080)) [ 823.842303] erofs: read_super, device -> /dev/loop2 [ 823.851158] erofs: read_super, device -> /dev/loop3 [ 823.851947] erofs: options -> fault_injection=0x0000000000000000, [ 823.856197] erofs: options -> fault_injection=0x0000000000000000, [ 823.856283] erofs: FAULT_INJECTION was not selected [ 823.856295] erofs: root inode @ nid 0 19:41:45 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x83c00, 0x4, &(0x7f0000000540)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef020001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000180)) lstat(&(0x7f0000000140)='./file0\x00', &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0}) keyctl$get_persistent(0x16, r0, 0x0) syz_mount_image$gfs2meta(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0xffff, 0x1, &(0x7f0000000100)=[{&(0x7f00000001c0)="cc5e855e5f0cc92d5e3d4e29bf0e20e1b949168bd4b13f3ddd806ff0170c49427ff5d374db0f42958ee5e5d99c1c40689076d9a7de0ff147c274361fa5bd7d2a51b4753dbad081d9719756d40a327bde35be3ff59cae7a03e8a68982e357d98ca4ae377d7103c6123f2573a0b3515a5b2fd88c10a5f04563e457039ec8c6a0ff799b9a16c15ad36a3144ea706e1a68a2b7d64275cd2d615c846b215fa8986c416ba9dd33bc97e3774d637bfc", 0xac, 0x81}], 0x0, &(0x7f0000000280)={[{'%'}], [{@uid_lt={'uid<', 0xee01}}, {@context={'context', 0x3d, 'user_u'}}, {@permit_directio}, {@audit}, {@permit_directio}, {@mask={'mask', 0x3d, 'MAY_READ'}}, {@hash}, {@dont_hash}, {@euid_gt={'euid>', 0xee01}}]}) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) dup(r1) 19:41:45 executing program 2: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c0024", 0xf, 0x400}, {&(0x7f0000000280)="05000000c041", 0x6, 0x480}, {0x0, 0xfffffff6, 0x1000}], 0x0, &(0x7f0000000080)={[{@fault_injection}]}) [ 823.940646] erofs: cannot read erofs superblock [ 823.984617] erofs: bogus i_mode (0) @ nid 0 [ 823.998937] erofs: read_super, device -> /dev/loop5 [ 824.008285] erofs: options -> fault_injection=0x0000000000000000, [ 824.019445] erofs: read_super, device -> /dev/loop0 [ 824.024471] erofs: options -> [ 824.027409] FAULT_INJECTION: forcing a failure. [ 824.027409] name failslab, interval 1, probability 0, space 0, times 0 [ 824.037747] erofs: cannot read erofs superblock [ 824.040755] erofs: FAULT_INJECTION was not selected [ 824.049443] CPU: 0 PID: 8180 Comm: syz-executor.1 Not tainted 4.19.211-syzkaller #0 [ 824.054356] erofs: root inode @ nid 36 [ 824.057248] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 824.057255] Call Trace: [ 824.057277] dump_stack+0x1fc/0x2ef [ 824.057298] should_fail.cold+0xa/0xf [ 824.057315] ? setup_fault_attr+0x200/0x200 [ 824.057332] ? lock_acquire+0x170/0x3c0 [ 824.057352] __should_failslab+0x115/0x180 [ 824.057369] should_failslab+0x5/0x10 [ 824.057383] kmem_cache_alloc_trace+0x284/0x380 [ 824.057396] ? _copy_from_user+0xd2/0x130 [ 824.057412] copy_mount_options+0x59/0x380 [ 824.057430] ksys_mount+0x9b/0x130 [ 824.057446] __x64_sys_mount+0xba/0x150 [ 824.057461] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 824.057475] do_syscall_64+0xf9/0x620 [ 824.057492] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 824.057503] RIP: 0033:0x7ff03e6523ea [ 824.057517] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 824.057524] RSP: 002b:00007ff03cfc5f88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 824.057537] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007ff03e6523ea [ 824.057545] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007ff03cfc5fe0 [ 824.057556] RBP: 00007ff03cfc6020 R08: 00007ff03cfc6020 R09: 0000000020000000 19:41:45 executing program 0: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e0", 0x4, 0x400}, {0x0, 0x60000000, 0x1000}], 0x0, &(0x7f0000000080)) [ 824.182995] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000000 [ 824.190255] R13: 0000000020000100 R14: 00007ff03cfc5fe0 R15: 0000000020000080 [ 824.199496] erofs: bogus i_mode (0) @ nid 36 19:41:45 executing program 3: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000030c", 0xd, 0x400}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000080)={[{@fault_injection}]}) 19:41:45 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x83c00, 0x4, &(0x7f0000000540)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef020001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000180)) lstat(&(0x7f0000000140)='./file0\x00', &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0}) keyctl$get_persistent(0x16, r0, 0x0) syz_mount_image$gfs2meta(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0xffff, 0x1, &(0x7f0000000100)=[{&(0x7f00000001c0)="cc5e855e5f0cc92d5e3d4e29bf0e20e1b949168bd4b13f3ddd806ff0170c49427ff5d374db0f42958ee5e5d99c1c40689076d9a7de0ff147c274361fa5bd7d2a51b4753dbad081d9719756d40a327bde35be3ff59cae7a03e8a68982e357d98ca4ae377d7103c6123f2573a0b3515a5b2fd88c10a5f04563e457039ec8c6a0ff799b9a16c15ad36a3144ea706e1a68a2b7d64275cd2d615c846b215fa8986c416ba9dd33bc97e3774d637bfc", 0xac, 0x81}], 0x0, &(0x7f0000000280)={[{'%'}], [{@uid_lt={'uid<', 0xee01}}, {@context={'context', 0x3d, 'user_u'}}, {@permit_directio}, {@audit}, {@permit_directio}, {@mask={'mask', 0x3d, 'MAY_READ'}}, {@hash}, {@dont_hash}, {@euid_gt={'euid>', 0xee01}}]}) (async) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) dup(r1) 19:41:45 executing program 5: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b0046701ba02000c0024", 0xf, 0x400}, {&(0x7f0000000280)="05", 0x1, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000080)={[{@fault_injection}]}) 19:41:45 executing program 1: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c0024", 0xf, 0x400}, {&(0x7f0000000280)="050000040041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000080)) (fail_nth: 36) [ 824.318358] erofs: read_super, device -> /dev/loop2 [ 824.336364] erofs: options -> fault_injection=0x0000000000000000, [ 824.365795] erofs: cannot read erofs superblock [ 824.380720] erofs: read_super, device -> /dev/loop3 [ 824.399195] erofs: options -> fault_injection=0x0000000000000000, [ 824.412836] erofs: FAULT_INJECTION was not selected [ 824.418170] erofs: root inode @ nid 0 [ 824.422311] erofs: bogus i_mode (0) @ nid 0 [ 824.437677] FAULT_INJECTION: forcing a failure. [ 824.437677] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 824.449506] CPU: 1 PID: 8212 Comm: syz-executor.1 Not tainted 4.19.211-syzkaller #0 [ 824.457312] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 824.466670] Call Trace: [ 824.467351] erofs: read_super, device -> /dev/loop0 [ 824.469264] dump_stack+0x1fc/0x2ef [ 824.474262] erofs: options -> [ 824.477888] should_fail.cold+0xa/0xf [ 824.477907] ? setup_fault_attr+0x200/0x200 [ 824.477920] ? unwind_next_frame+0xeee/0x1400 [ 824.477933] ? __save_stack_trace+0x72/0x190 [ 824.477944] ? deref_stack_reg+0x134/0x1d0 [ 824.477955] ? get_reg+0x176/0x1f0 [ 824.477972] __alloc_pages_nodemask+0x239/0x2890 [ 824.477990] ? cmp_ex_search+0x87/0xb0 19:41:45 executing program 2: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c0024", 0xf, 0x400}, {&(0x7f0000000280)="05000000c041", 0x6, 0x480}, {0x0, 0xedc000000000, 0x1000}], 0x0, &(0x7f0000000080)={[{@fault_injection}]}) [ 824.505553] erofs: read_super, device -> /dev/loop5 [ 824.505896] ? __lock_acquire+0x6de/0x3ff0 [ 824.516972] erofs: options -> fault_injection=0x0000000000000000, [ 824.519519] ? copy_mount_options+0x1e9/0x380 [ 824.519536] ? gfp_pfmemalloc_allowed+0x150/0x150 [ 824.519549] ? ex_handler_default+0x14/0x90 [ 824.519562] ? phys_mem_access_encrypted+0x10/0x10 [ 824.519581] ? no_context+0xce/0x940 [ 824.519602] ? force_sig_info_fault.constprop.0+0x320/0x320 [ 824.519632] ? bad_area_access_error+0x23b/0x4a0 [ 824.519653] cache_grow_begin+0xa4/0x8a0 [ 824.528523] erofs: cannot read erofs superblock [ 824.530110] ? setup_fault_attr+0x200/0x200 [ 824.530128] ? cache_alloc_pfmemalloc+0x1e/0x140 [ 824.530147] cache_alloc_refill+0x273/0x340 [ 824.530168] kmem_cache_alloc+0x346/0x370 [ 824.544285] erofs: FAULT_INJECTION was not selected [ 824.548937] getname_flags+0xce/0x590 [ 824.548957] user_path_at_empty+0x2a/0x50 [ 824.548976] do_mount+0x147/0x2f50 [ 824.548992] ? cmp_ex_sort+0xc0/0xc0 [ 824.549008] ? __do_page_fault+0x180/0xd60 19:41:45 executing program 3: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010082030c", 0xd, 0x400}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000080)={[{@fault_injection}]}) 19:41:45 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x83c00, 0x4, &(0x7f0000000540)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef020001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000180)) lstat(&(0x7f0000000140)='./file0\x00', &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0}) keyctl$get_persistent(0x16, r0, 0x0) (async) syz_mount_image$gfs2meta(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0xffff, 0x1, &(0x7f0000000100)=[{&(0x7f00000001c0)="cc5e855e5f0cc92d5e3d4e29bf0e20e1b949168bd4b13f3ddd806ff0170c49427ff5d374db0f42958ee5e5d99c1c40689076d9a7de0ff147c274361fa5bd7d2a51b4753dbad081d9719756d40a327bde35be3ff59cae7a03e8a68982e357d98ca4ae377d7103c6123f2573a0b3515a5b2fd88c10a5f04563e457039ec8c6a0ff799b9a16c15ad36a3144ea706e1a68a2b7d64275cd2d615c846b215fa8986c416ba9dd33bc97e3774d637bfc", 0xac, 0x81}], 0x0, &(0x7f0000000280)={[{'%'}], [{@uid_lt={'uid<', 0xee01}}, {@context={'context', 0x3d, 'user_u'}}, {@permit_directio}, {@audit}, {@permit_directio}, {@mask={'mask', 0x3d, 'MAY_READ'}}, {@hash}, {@dont_hash}, {@euid_gt={'euid>', 0xee01}}]}) (async, rerun: 64) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) (rerun: 64) dup(r1) [ 824.549022] ? copy_mount_string+0x40/0x40 [ 824.549042] ? memset+0x20/0x40 [ 824.549056] ? copy_mount_options+0x26f/0x380 [ 824.549072] ksys_mount+0xcf/0x130 [ 824.549087] __x64_sys_mount+0xba/0x150 [ 824.549104] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 824.549118] do_syscall_64+0xf9/0x620 [ 824.549137] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 824.549149] RIP: 0033:0x7ff03e6523ea [ 824.549163] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 824.549171] RSP: 002b:00007ff03cfc5f88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 824.549185] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007ff03e6523ea [ 824.549193] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007ff03cfc5fe0 [ 824.549201] RBP: 00007ff03cfc6020 R08: 00007ff03cfc6020 R09: 0000000020000000 [ 824.549209] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000000 [ 824.549218] R13: 0000000020000100 R14: 00007ff03cfc5fe0 R15: 0000000020000080 [ 824.569096] erofs: read_super, device -> /dev/loop1 [ 824.612263] erofs: root inode @ nid 36 [ 824.629646] erofs: options -> [ 824.634716] erofs: bogus i_mode (0) @ nid 36 [ 824.649722] erofs: root inode @ nid 36 [ 824.736837] erofs: mounted on /dev/loop1 with opts: . 19:41:45 executing program 1: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c0024", 0xf, 0x400}, {&(0x7f0000000280)="050000040041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000080)) (fail_nth: 37) 19:41:45 executing program 0: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e0", 0x4, 0x400}, {0x0, 0x68000000, 0x1000}], 0x0, &(0x7f0000000080)) [ 824.785675] erofs: unmounted for /dev/loop1 [ 824.798360] erofs: read_super, device -> /dev/loop2 [ 824.798755] erofs: read_super, device -> /dev/loop3 [ 824.809578] erofs: options -> fault_injection=0x0000000000000000, [ 824.813212] erofs: options -> fault_injection=0x0000000000000000, [ 824.824024] erofs: cannot read erofs superblock [ 824.825232] erofs: FAULT_INJECTION was not selected 19:41:45 executing program 5: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010003000c0024", 0xf, 0x400}, {&(0x7f0000000280)="05", 0x1, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000080)={[{@fault_injection}]}) [ 824.834525] erofs: root inode @ nid 0 [ 824.838877] erofs: bogus i_mode (0) @ nid 0 19:41:45 executing program 3: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010093030c", 0xd, 0x400}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000080)={[{@fault_injection}]}) [ 824.911069] FAULT_INJECTION: forcing a failure. [ 824.911069] name failslab, interval 1, probability 0, space 0, times 0 [ 824.937162] CPU: 0 PID: 8245 Comm: syz-executor.1 Not tainted 4.19.211-syzkaller #0 [ 824.945003] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 824.954367] Call Trace: [ 824.956962] dump_stack+0x1fc/0x2ef [ 824.960700] should_fail.cold+0xa/0xf [ 824.964496] ? setup_fault_attr+0x200/0x200 [ 824.968816] ? lock_acquire+0x170/0x3c0 [ 824.972789] __should_failslab+0x115/0x180 [ 824.977022] should_failslab+0x5/0x10 [ 824.980812] kmem_cache_alloc+0x277/0x370 [ 824.984957] getname_flags+0xce/0x590 [ 824.988765] user_path_at_empty+0x2a/0x50 [ 824.992904] do_mount+0x147/0x2f50 [ 824.996439] ? cmp_ex_sort+0xc0/0xc0 [ 825.000151] ? __do_page_fault+0x180/0xd60 [ 825.004370] ? copy_mount_string+0x40/0x40 [ 825.008610] ? memset+0x20/0x40 [ 825.011892] ? copy_mount_options+0x26f/0x380 [ 825.016396] ksys_mount+0xcf/0x130 [ 825.019925] __x64_sys_mount+0xba/0x150 [ 825.023887] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 825.028454] do_syscall_64+0xf9/0x620 [ 825.032252] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 825.037430] RIP: 0033:0x7ff03e6523ea [ 825.041214] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 825.060100] RSP: 002b:00007ff03cfc5f88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 825.067801] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007ff03e6523ea [ 825.075054] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007ff03cfc5fe0 [ 825.082308] RBP: 00007ff03cfc6020 R08: 00007ff03cfc6020 R09: 0000000020000000 [ 825.089566] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000000 [ 825.096833] R13: 0000000020000100 R14: 00007ff03cfc5fe0 R15: 0000000020000080 19:41:46 executing program 2: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c0024", 0xf, 0x400}, {&(0x7f0000000280)="05000000c041", 0x6, 0x480}, {0x0, 0x4000000000000, 0x1000}], 0x0, &(0x7f0000000080)={[{@fault_injection}]}) [ 825.140181] erofs: read_super, device -> /dev/loop0 [ 825.145233] erofs: options -> [ 825.153448] erofs: read_super, device -> /dev/loop3 [ 825.158835] erofs: options -> fault_injection=0x0000000000000000, [ 825.168586] erofs: cannot read erofs superblock [ 825.169665] erofs: read_super, device -> /dev/loop5 [ 825.182176] erofs: FAULT_INJECTION was not selected 19:41:46 executing program 1: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c0024", 0xf, 0x400}, {&(0x7f0000000280)="050000040041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000080)) (fail_nth: 38) 19:41:46 executing program 0: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e0", 0x4, 0x400}, {0x0, 0x6c000000, 0x1000}], 0x0, &(0x7f0000000080)) [ 825.189438] erofs: root inode @ nid 0 [ 825.193978] erofs: options -> fault_injection=0x0000000000000000, [ 825.197591] erofs: bogus i_mode (0) @ nid 0 [ 825.213893] erofs: FAULT_INJECTION was not selected [ 825.219760] erofs: root inode @ nid 36 [ 825.226566] erofs: bogus i_mode (0) @ nid 36 19:41:46 executing program 3: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010094030c", 0xd, 0x400}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000080)={[{@fault_injection}]}) [ 825.248286] FAULT_INJECTION: forcing a failure. [ 825.248286] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 825.260213] CPU: 1 PID: 8265 Comm: syz-executor.1 Not tainted 4.19.211-syzkaller #0 [ 825.268014] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 825.277372] Call Trace: [ 825.279968] dump_stack+0x1fc/0x2ef [ 825.283609] should_fail.cold+0xa/0xf [ 825.287600] ? setup_fault_attr+0x200/0x200 [ 825.291934] ? unwind_next_frame+0xeee/0x1400 [ 825.296426] ? __save_stack_trace+0x72/0x190 [ 825.300819] ? deref_stack_reg+0x134/0x1d0 [ 825.305036] ? get_reg+0x176/0x1f0 [ 825.308567] __alloc_pages_nodemask+0x239/0x2890 [ 825.313313] ? cmp_ex_search+0x87/0xb0 [ 825.317204] ? __lock_acquire+0x6de/0x3ff0 [ 825.321435] ? copy_mount_options+0x1e9/0x380 [ 825.325928] ? gfp_pfmemalloc_allowed+0x150/0x150 [ 825.330863] ? ex_handler_default+0x14/0x90 [ 825.335425] ? phys_mem_access_encrypted+0x10/0x10 [ 825.340533] ? no_context+0xce/0x940 [ 825.344253] ? force_sig_info_fault.constprop.0+0x320/0x320 [ 825.349950] ? bad_area_access_error+0x23b/0x4a0 [ 825.354713] cache_grow_begin+0xa4/0x8a0 [ 825.358761] ? setup_fault_attr+0x200/0x200 [ 825.363120] ? cache_alloc_pfmemalloc+0x1e/0x140 [ 825.367876] cache_alloc_refill+0x273/0x340 [ 825.372203] kmem_cache_alloc+0x346/0x370 [ 825.376341] getname_flags+0xce/0x590 [ 825.380127] user_path_at_empty+0x2a/0x50 [ 825.384267] do_mount+0x147/0x2f50 [ 825.387809] ? cmp_ex_sort+0xc0/0xc0 [ 825.391529] ? __do_page_fault+0x180/0xd60 [ 825.395769] ? copy_mount_string+0x40/0x40 [ 825.400006] ? memset+0x20/0x40 [ 825.403282] ? copy_mount_options+0x26f/0x380 [ 825.407774] ksys_mount+0xcf/0x130 [ 825.411329] __x64_sys_mount+0xba/0x150 [ 825.415309] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 825.419895] do_syscall_64+0xf9/0x620 [ 825.423694] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 825.428869] RIP: 0033:0x7ff03e6523ea [ 825.432570] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 825.451454] RSP: 002b:00007ff03cfc5f88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 825.459170] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007ff03e6523ea [ 825.466431] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007ff03cfc5fe0 [ 825.473690] RBP: 00007ff03cfc6020 R08: 00007ff03cfc6020 R09: 0000000020000000 [ 825.480958] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000000 [ 825.488216] R13: 0000000020000100 R14: 00007ff03cfc5fe0 R15: 0000000020000080 19:41:46 executing program 5: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467015503000c0024", 0xf, 0x400}, {&(0x7f0000000280)="05", 0x1, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000080)={[{@fault_injection}]}) [ 825.527411] erofs: read_super, device -> /dev/loop1 [ 825.528208] erofs: read_super, device -> /dev/loop2 [ 825.533318] erofs: options -> [ 825.537984] erofs: read_super, device -> /dev/loop0 [ 825.567387] erofs: options -> fault_injection=0x0000000000000000, [ 825.573767] erofs: options -> 19:41:46 executing program 4: pipe(&(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r3, &(0x7f0000000040)={0xa, 0x0, 0x0, @mcast2, 0x9}, 0x1c) ioctl$SNAPSHOT_FREE(r0, 0x3305) splice(r2, &(0x7f0000000080)=0x1b81, r2, &(0x7f00000000c0)=0x5, 0x2, 0x0) r4 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) bind$bt_l2cap(r4, &(0x7f0000000000), 0x58) listen(r4, 0x0) setsockopt$sock_int(r4, 0x1, 0x1, &(0x7f0000000100), 0x4) setsockopt$inet6_IPV6_PKTINFO(r3, 0x29, 0x32, &(0x7f0000000000)={@empty}, 0x14) write$binfmt_misc(r1, &(0x7f00000005c0)=ANY=[], 0x37cb1133) perf_event_open(&(0x7f0000001340)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x51c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) splice(r0, 0x0, r2, 0x0, 0x19410, 0x0) r5 = creat(&(0x7f0000000140)='./file0\x00', 0x10) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(r5, 0xc0189378, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r6, {r1}}, './file0\x00'}) [ 825.580796] erofs: root inode @ nid 36 [ 825.583748] erofs: cannot read erofs superblock [ 825.592926] erofs: cannot read erofs superblock [ 825.595803] erofs: read_super, device -> /dev/loop5 [ 825.604584] erofs: mounted on /dev/loop1 with opts: . [ 825.606070] erofs: options -> fault_injection=0x0000000000000000, [ 825.617139] erofs: FAULT_INJECTION was not selected [ 825.624252] erofs: root inode @ nid 36 19:41:46 executing program 2: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c0024", 0xf, 0x400}, {&(0x7f0000000280)="05000000c041", 0x6, 0x480}, {0x0, 0x100000000000000, 0x1000}], 0x0, &(0x7f0000000080)={[{@fault_injection}]}) [ 825.629825] erofs: bogus i_mode (0) @ nid 36 19:41:46 executing program 1: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c0024", 0xf, 0x400}, {&(0x7f0000000280)="050000040041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000080)) (fail_nth: 39) [ 825.690447] erofs: unmounted for /dev/loop1 19:41:46 executing program 0: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e0", 0x4, 0x400}, {0x0, 0x74000000, 0x1000}], 0x0, &(0x7f0000000080)) [ 825.713933] erofs: read_super, device -> /dev/loop3 [ 825.723374] erofs: read_super, device -> /dev/loop2 [ 825.728636] erofs: options -> fault_injection=0x0000000000000000, [ 825.741702] erofs: options -> fault_injection=0x0000000000000000, [ 825.746938] erofs: cannot read erofs superblock 19:41:46 executing program 5: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467018203000c0024", 0xf, 0x400}, {&(0x7f0000000280)="05", 0x1, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000080)={[{@fault_injection}]}) [ 825.767110] erofs: FAULT_INJECTION was not selected [ 825.774017] erofs: root inode @ nid 0 [ 825.780193] erofs: bogus i_mode (0) @ nid 0 19:41:46 executing program 2: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c0024", 0xf, 0x400}, {&(0x7f0000000280)="05000000c041", 0x6, 0x480}, {0x0, 0x200000000000000, 0x1000}], 0x0, &(0x7f0000000080)={[{@fault_injection}]}) 19:41:46 executing program 3: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010095030c", 0xd, 0x400}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000080)={[{@fault_injection}]}) [ 825.864641] erofs: read_super, device -> /dev/loop0 [ 825.874761] erofs: options -> [ 825.884322] erofs: cannot read erofs superblock 19:41:47 executing program 0: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e0", 0x4, 0x400}, {0x0, 0x7a000000, 0x1000}], 0x0, &(0x7f0000000080)) [ 825.953439] FAULT_INJECTION: forcing a failure. [ 825.953439] name failslab, interval 1, probability 0, space 0, times 0 [ 825.969646] erofs: read_super, device -> /dev/loop5 [ 825.974689] erofs: options -> fault_injection=0x0000000000000000, [ 825.984005] erofs: FAULT_INJECTION was not selected [ 825.992475] erofs: read_super, device -> /dev/loop2 [ 825.997726] erofs: root inode @ nid 36 [ 826.008708] erofs: bogus i_mode (0) @ nid 36 [ 826.014640] erofs: read_super, device -> /dev/loop3 [ 826.025843] erofs: options -> fault_injection=0x0000000000000000, [ 826.033598] erofs: options -> fault_injection=0x0000000000000000, [ 826.037406] erofs: FAULT_INJECTION was not selected [ 826.046867] CPU: 1 PID: 8311 Comm: syz-executor.1 Not tainted 4.19.211-syzkaller #0 [ 826.049935] erofs: root inode @ nid 0 [ 826.054679] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 826.059385] erofs: cannot read erofs superblock [ 826.067800] Call Trace: [ 826.067822] dump_stack+0x1fc/0x2ef [ 826.067838] should_fail.cold+0xa/0xf [ 826.067855] ? setup_fault_attr+0x200/0x200 [ 826.067870] ? lock_acquire+0x170/0x3c0 [ 826.067889] __should_failslab+0x115/0x180 [ 826.067907] should_failslab+0x5/0x10 [ 826.076439] erofs: bogus i_mode (0) @ nid 0 [ 826.078740] __kmalloc_track_caller+0x2a6/0x3c0 [ 826.078756] ? kstrdup_const+0x53/0x80 [ 826.078774] kstrdup+0x36/0x70 [ 826.078789] kstrdup_const+0x53/0x80 [ 826.078803] alloc_vfsmnt+0xb5/0x780 [ 826.078816] ? _raw_read_unlock+0x29/0x40 [ 826.078831] vfs_kern_mount.part.0+0x27/0x470 [ 826.078848] do_mount+0x115c/0x2f50 [ 826.134938] ? cmp_ex_sort+0xc0/0xc0 [ 826.138645] ? __do_page_fault+0x180/0xd60 [ 826.142865] ? copy_mount_string+0x40/0x40 [ 826.147096] ? memset+0x20/0x40 [ 826.150365] ? copy_mount_options+0x26f/0x380 [ 826.154848] ksys_mount+0xcf/0x130 [ 826.158372] __x64_sys_mount+0xba/0x150 [ 826.162342] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 826.166902] do_syscall_64+0xf9/0x620 [ 826.170697] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 826.175871] RIP: 0033:0x7ff03e6523ea [ 826.179564] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 826.198448] RSP: 002b:00007ff03cfc5f88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 19:41:47 executing program 5: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467018303000c0024", 0xf, 0x400}, {&(0x7f0000000280)="05", 0x1, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000080)={[{@fault_injection}]}) [ 826.206139] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007ff03e6523ea [ 826.213388] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007ff03cfc5fe0 [ 826.220638] RBP: 00007ff03cfc6020 R08: 00007ff03cfc6020 R09: 0000000020000000 [ 826.227895] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000000 [ 826.235156] R13: 0000000020000100 R14: 00007ff03cfc5fe0 R15: 0000000020000080 19:41:47 executing program 2: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c0024", 0xf, 0x400}, {&(0x7f0000000280)="05000000c041", 0x6, 0x480}, {0x0, 0x300000000000000, 0x1000}], 0x0, &(0x7f0000000080)={[{@fault_injection}]}) [ 826.358212] erofs: read_super, device -> /dev/loop0 [ 826.370326] erofs: options -> [ 826.377795] erofs: cannot read erofs superblock 19:41:47 executing program 1: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c0024", 0xf, 0x400}, {&(0x7f0000000280)="050000040041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000080)) (fail_nth: 40) 19:41:47 executing program 3: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010096030c", 0xd, 0x400}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000080)={[{@fault_injection}]}) [ 826.399743] erofs: read_super, device -> /dev/loop5 [ 826.404934] erofs: options -> fault_injection=0x0000000000000000, [ 826.431744] erofs: FAULT_INJECTION was not selected [ 826.437457] erofs: root inode @ nid 36 [ 826.441533] erofs: bogus i_mode (0) @ nid 36 [ 826.473460] FAULT_INJECTION: forcing a failure. [ 826.473460] name failslab, interval 1, probability 0, space 0, times 0 [ 826.480918] erofs: read_super, device -> /dev/loop2 [ 826.495777] CPU: 1 PID: 8347 Comm: syz-executor.1 Not tainted 4.19.211-syzkaller #0 [ 826.503594] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 826.512944] Call Trace: [ 826.515530] dump_stack+0x1fc/0x2ef [ 826.519151] should_fail.cold+0xa/0xf [ 826.522952] ? setup_fault_attr+0x200/0x200 [ 826.527262] ? lock_acquire+0x170/0x3c0 [ 826.531228] __should_failslab+0x115/0x180 [ 826.535453] should_failslab+0x5/0x10 [ 826.539328] __kmalloc_track_caller+0x2a6/0x3c0 [ 826.543986] ? kstrdup_const+0x53/0x80 [ 826.547865] kstrdup+0x36/0x70 [ 826.551045] kstrdup_const+0x53/0x80 [ 826.554746] alloc_vfsmnt+0xb5/0x780 [ 826.558447] ? _raw_read_unlock+0x29/0x40 [ 826.562583] vfs_kern_mount.part.0+0x27/0x470 [ 826.567072] do_mount+0x115c/0x2f50 [ 826.570687] ? cmp_ex_sort+0xc0/0xc0 [ 826.574392] ? __do_page_fault+0x180/0xd60 [ 826.578617] ? copy_mount_string+0x40/0x40 [ 826.582847] ? memset+0x20/0x40 [ 826.586113] ? copy_mount_options+0x26f/0x380 [ 826.590596] ksys_mount+0xcf/0x130 [ 826.594126] __x64_sys_mount+0xba/0x150 [ 826.598087] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 826.602657] do_syscall_64+0xf9/0x620 [ 826.606448] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 826.611623] RIP: 0033:0x7ff03e6523ea [ 826.615325] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 826.634211] RSP: 002b:00007ff03cfc5f88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 826.641919] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007ff03e6523ea [ 826.649189] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007ff03cfc5fe0 [ 826.656458] RBP: 00007ff03cfc6020 R08: 00007ff03cfc6020 R09: 0000000020000000 [ 826.663726] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000000 19:41:47 executing program 4: pipe(&(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r3, &(0x7f0000000040)={0xa, 0x0, 0x0, @mcast2, 0x9}, 0x1c) ioctl$SNAPSHOT_FREE(r0, 0x3305) splice(r2, &(0x7f0000000080)=0x1b81, r2, &(0x7f00000000c0)=0x5, 0x2, 0x0) (async, rerun: 64) r4 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) (rerun: 64) bind$bt_l2cap(r4, &(0x7f0000000000), 0x58) listen(r4, 0x0) (async, rerun: 32) setsockopt$sock_int(r4, 0x1, 0x1, &(0x7f0000000100), 0x4) (async, rerun: 32) setsockopt$inet6_IPV6_PKTINFO(r3, 0x29, 0x32, &(0x7f0000000000)={@empty}, 0x14) (async) write$binfmt_misc(r1, &(0x7f00000005c0)=ANY=[], 0x37cb1133) perf_event_open(&(0x7f0000001340)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x51c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) splice(r0, 0x0, r2, 0x0, 0x19410, 0x0) (async) r5 = creat(&(0x7f0000000140)='./file0\x00', 0x10) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(r5, 0xc0189378, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r6, {r1}}, './file0\x00'}) 19:41:47 executing program 0: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e0", 0x4, 0x400}, {0x0, 0x82010000, 0x1000}], 0x0, &(0x7f0000000080)) [ 826.670983] R13: 0000000020000100 R14: 00007ff03cfc5fe0 R15: 0000000020000080 [ 826.692762] erofs: options -> fault_injection=0x0000000000000000, [ 826.701615] erofs: cannot read erofs superblock 19:41:47 executing program 5: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b0046701c203000c0024", 0xf, 0x400}, {&(0x7f0000000280)="05", 0x1, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000080)={[{@fault_injection}]}) 19:41:47 executing program 2: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c0024", 0xf, 0x400}, {&(0x7f0000000280)="05000000c041", 0x6, 0x480}, {0x0, 0x400000000000000, 0x1000}], 0x0, &(0x7f0000000080)={[{@fault_injection}]}) [ 826.764190] erofs: read_super, device -> /dev/loop3 [ 826.777208] erofs: options -> fault_injection=0x0000000000000000, [ 826.800363] erofs: FAULT_INJECTION was not selected 19:41:47 executing program 1: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c0024", 0xf, 0x400}, {&(0x7f0000000280)="050000040041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000080)) (fail_nth: 41) [ 826.812366] erofs: root inode @ nid 0 [ 826.820251] erofs: bogus i_mode (0) @ nid 0 [ 826.826062] erofs: read_super, device -> /dev/loop0 [ 826.847478] erofs: options -> [ 826.853775] erofs: cannot read erofs superblock 19:41:47 executing program 3: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010097030c", 0xd, 0x400}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000080)={[{@fault_injection}]}) 19:41:48 executing program 0: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e0", 0x4, 0x400}, {0x0, 0x8cffffff, 0x1000}], 0x0, &(0x7f0000000080)) [ 826.960813] FAULT_INJECTION: forcing a failure. [ 826.960813] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 826.972641] CPU: 1 PID: 8375 Comm: syz-executor.1 Not tainted 4.19.211-syzkaller #0 [ 826.980437] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 826.989797] Call Trace: [ 826.992397] dump_stack+0x1fc/0x2ef [ 826.996040] should_fail.cold+0xa/0xf [ 826.999854] ? setup_fault_attr+0x200/0x200 [ 827.004187] ? unwind_next_frame+0xeee/0x1400 [ 827.008695] ? __save_stack_trace+0x72/0x190 [ 827.013115] ? deref_stack_reg+0x134/0x1d0 [ 827.017358] ? get_reg+0x176/0x1f0 [ 827.020908] __alloc_pages_nodemask+0x239/0x2890 [ 827.025682] ? cmp_ex_search+0x87/0xb0 [ 827.029583] ? __lock_acquire+0x6de/0x3ff0 [ 827.033834] ? copy_mount_options+0x1e9/0x380 [ 827.038343] ? gfp_pfmemalloc_allowed+0x150/0x150 [ 827.043193] ? ex_handler_default+0x14/0x90 [ 827.047521] ? phys_mem_access_encrypted+0x10/0x10 [ 827.052467] ? no_context+0xce/0x940 [ 827.056190] ? __lock_acquire+0x6de/0x3ff0 [ 827.060435] ? force_sig_info_fault.constprop.0+0x320/0x320 [ 827.061275] erofs: read_super, device -> /dev/loop5 [ 827.066145] ? bad_area_access_error+0x23b/0x4a0 [ 827.066173] cache_grow_begin+0xa4/0x8a0 [ 827.066191] ? setup_fault_attr+0x200/0x200 [ 827.066205] ? cache_alloc_pfmemalloc+0x1e/0x140 [ 827.066225] cache_alloc_refill+0x273/0x340 [ 827.071482] erofs: options -> fault_injection=0x0000000000000000, [ 827.075978] kmem_cache_alloc+0x346/0x370 [ 827.075999] getname_flags+0xce/0x590 [ 827.076016] user_path_at_empty+0x2a/0x50 [ 827.076034] do_mount+0x147/0x2f50 [ 827.076052] ? cmp_ex_sort+0xc0/0xc0 [ 827.085953] erofs: read_super, device -> /dev/loop2 [ 827.089146] ? __do_page_fault+0x180/0xd60 [ 827.089166] ? copy_mount_string+0x40/0x40 [ 827.089190] ? memset+0x20/0x40 [ 827.089205] ? copy_mount_options+0x26f/0x380 [ 827.089221] ksys_mount+0xcf/0x130 [ 827.089237] __x64_sys_mount+0xba/0x150 [ 827.089252] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 827.089264] do_syscall_64+0xf9/0x620 [ 827.089282] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 827.089298] RIP: 0033:0x7ff03e6523ea [ 827.107544] erofs: read_super, device -> /dev/loop0 [ 827.107770] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 827.116895] erofs: options -> [ 827.119123] RSP: 002b:00007ff03cfc5f88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 827.119138] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007ff03e6523ea [ 827.119144] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007ff03cfc5fe0 [ 827.119151] RBP: 00007ff03cfc6020 R08: 00007ff03cfc6020 R09: 0000000020000000 [ 827.119158] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000000 [ 827.119165] R13: 0000000020000100 R14: 00007ff03cfc5fe0 R15: 0000000020000080 [ 827.140340] erofs: read_super, device -> /dev/loop1 [ 827.142639] erofs: options -> fault_injection=0x0000000000000000, [ 827.145292] erofs: options -> [ 827.152041] erofs: FAULT_INJECTION was not selected [ 827.179924] erofs: cannot read erofs superblock 19:41:48 executing program 0: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e0", 0x4, 0x400}, {0x0, 0x97ffffff, 0x1000}], 0x0, &(0x7f0000000080)) [ 827.191419] erofs: root inode @ nid 36 [ 827.195663] erofs: root inode @ nid 36 [ 827.213958] erofs: cannot read erofs superblock [ 827.263779] erofs: mounted on /dev/loop1 with opts: . [ 827.266049] erofs: bogus i_mode (0) @ nid 36 [ 827.292563] erofs: read_super, device -> /dev/loop3 [ 827.301521] erofs: options -> fault_injection=0x0000000000000000, [ 827.316254] erofs: FAULT_INJECTION was not selected [ 827.323089] erofs: root inode @ nid 0 [ 827.331466] erofs: bogus i_mode (0) @ nid 0 19:41:48 executing program 3: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010098030c", 0xd, 0x400}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000080)={[{@fault_injection}]}) 19:41:48 executing program 1: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c0024", 0xf, 0x400}, {&(0x7f0000000280)="050000040041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000080)) (fail_nth: 42) 19:41:48 executing program 2: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c0024", 0xf, 0x400}, {&(0x7f0000000280)="05000000c041", 0x6, 0x480}, {0x0, 0x500000000000000, 0x1000}], 0x0, &(0x7f0000000080)={[{@fault_injection}]}) 19:41:48 executing program 5: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b0046701c303000c0024", 0xf, 0x400}, {&(0x7f0000000280)="05", 0x1, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000080)={[{@fault_injection}]}) [ 827.471090] erofs: unmounted for /dev/loop1 [ 827.482855] erofs: read_super, device -> /dev/loop0 [ 827.488837] erofs: options -> [ 827.496210] erofs: cannot read erofs superblock [ 827.503225] erofs: read_super, device -> /dev/loop3 [ 827.510580] erofs: read_super, device -> /dev/loop2 [ 827.514158] erofs: options -> fault_injection=0x0000000000000000, [ 827.521320] erofs: options -> fault_injection=0x0000000000000000, [ 827.539072] erofs: cannot read erofs superblock [ 827.544095] erofs: FAULT_INJECTION was not selected [ 827.551176] erofs: root inode @ nid 0 [ 827.555241] erofs: bogus i_mode (0) @ nid 0 [ 827.638801] erofs: read_super, device -> /dev/loop5 [ 827.645610] erofs: options -> fault_injection=0x0000000000000000, [ 827.657050] FAULT_INJECTION: forcing a failure. [ 827.657050] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 827.668961] CPU: 1 PID: 8423 Comm: syz-executor.1 Not tainted 4.19.211-syzkaller #0 [ 827.676758] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 827.686123] Call Trace: [ 827.688727] dump_stack+0x1fc/0x2ef [ 827.692365] should_fail.cold+0xa/0xf [ 827.696193] ? setup_fault_attr+0x200/0x200 [ 827.698401] erofs: FAULT_INJECTION was not selected [ 827.700520] ? get_page_from_freelist+0x1d60/0x4170 [ 827.700542] __alloc_pages_nodemask+0x239/0x2890 [ 827.700560] ? get_page_from_freelist+0x1d60/0x4170 [ 827.700579] ? bad_range+0x260/0x3c0 [ 827.722271] erofs: root inode @ nid 36 [ 827.724165] ? __lock_acquire+0x6de/0x3ff0 [ 827.724188] ? preempt_count_add+0xaf/0x190 19:41:48 executing program 4: pipe(&(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r3, &(0x7f0000000040)={0xa, 0x0, 0x0, @mcast2, 0x9}, 0x1c) ioctl$SNAPSHOT_FREE(r0, 0x3305) splice(r2, &(0x7f0000000080)=0x1b81, r2, &(0x7f00000000c0)=0x5, 0x2, 0x0) r4 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) bind$bt_l2cap(r4, &(0x7f0000000000), 0x58) listen(r4, 0x0) setsockopt$sock_int(r4, 0x1, 0x1, &(0x7f0000000100), 0x4) setsockopt$inet6_IPV6_PKTINFO(r3, 0x29, 0x32, &(0x7f0000000000)={@empty}, 0x14) write$binfmt_misc(r1, &(0x7f00000005c0)=ANY=[], 0x37cb1133) perf_event_open(&(0x7f0000001340)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x51c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) splice(r0, 0x0, r2, 0x0, 0x19410, 0x0) r5 = creat(&(0x7f0000000140)='./file0\x00', 0x10) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(r5, 0xc0189378, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r6, {r1}}, './file0\x00'}) pipe(&(0x7f0000000740)) (async) socket$inet_udp(0x2, 0x2, 0x0) (async) close(r2) (async) socket$inet6(0xa, 0x2, 0x0) (async) connect$inet6(r3, &(0x7f0000000040)={0xa, 0x0, 0x0, @mcast2, 0x9}, 0x1c) (async) ioctl$SNAPSHOT_FREE(r0, 0x3305) (async) splice(r2, &(0x7f0000000080)=0x1b81, r2, &(0x7f00000000c0)=0x5, 0x2, 0x0) (async) syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) (async) bind$bt_l2cap(r4, &(0x7f0000000000), 0x58) (async) listen(r4, 0x0) (async) setsockopt$sock_int(r4, 0x1, 0x1, &(0x7f0000000100), 0x4) (async) setsockopt$inet6_IPV6_PKTINFO(r3, 0x29, 0x32, &(0x7f0000000000)={@empty}, 0x14) (async) write$binfmt_misc(r1, &(0x7f00000005c0)=ANY=[], 0x37cb1133) (async) perf_event_open(&(0x7f0000001340)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x51c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async) splice(r0, 0x0, r2, 0x0, 0x19410, 0x0) (async) creat(&(0x7f0000000140)='./file0\x00', 0x10) (async) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000180)) (async) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(r5, 0xc0189378, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r6, {r1}}, './file0\x00'}) (async) 19:41:48 executing program 2: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c0024", 0xf, 0x400}, {&(0x7f0000000280)="05000000c041", 0x6, 0x480}, {0x0, 0x600000000000000, 0x1000}], 0x0, &(0x7f0000000080)={[{@fault_injection}]}) 19:41:48 executing program 0: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e0", 0x4, 0x400}, {0x0, 0x9b9015a9, 0x1000}], 0x0, &(0x7f0000000080)) 19:41:48 executing program 3: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010099030c", 0xd, 0x400}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000080)={[{@fault_injection}]}) [ 827.724204] ? gfp_pfmemalloc_allowed+0x150/0x150 [ 827.724229] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 827.747018] cache_grow_begin+0xa4/0x8a0 [ 827.751091] ? setup_fault_attr+0x200/0x200 [ 827.755424] ? cache_alloc_pfmemalloc+0x1e/0x140 [ 827.758315] erofs: bogus i_mode (0) @ nid 36 [ 827.760187] cache_alloc_refill+0x273/0x340 [ 827.760209] kmem_cache_alloc+0x346/0x370 [ 827.760228] getname_kernel+0x4e/0x370 [ 827.760242] kern_path+0x1b/0x40 [ 827.780393] lookup_bdev+0xfc/0x220 [ 827.784030] ? bd_acquire+0x440/0x440 [ 827.787847] blkdev_get_by_path+0x1b/0xd0 [ 827.792002] mount_bdev+0x5b/0x3b0 [ 827.793708] erofs: read_super, device -> /dev/loop2 [ 827.795542] ? gb_gbphy_register_driver.cold+0x39/0x39 [ 827.795562] erofs_mount+0x8c/0xc0 [ 827.795577] ? erofs_kill_sb+0x20/0x20 [ 827.795597] ? alloc_pages_current+0x19b/0x2a0 [ 827.795609] ? __lockdep_init_map+0x100/0x5a0 [ 827.795625] mount_fs+0xa3/0x310 [ 827.812641] erofs: options -> fault_injection=0x0000000000000000, [ 827.813296] vfs_kern_mount.part.0+0x68/0x470 [ 827.813317] do_mount+0x115c/0x2f50 [ 827.813336] ? cmp_ex_sort+0xc0/0xc0 [ 827.813357] ? __do_page_fault+0x180/0xd60 [ 827.825603] erofs: cannot read erofs superblock [ 827.825761] ? copy_mount_string+0x40/0x40 [ 827.825789] ? memset+0x20/0x40 [ 827.825803] ? copy_mount_options+0x26f/0x380 [ 827.825820] ksys_mount+0xcf/0x130 [ 827.868152] __x64_sys_mount+0xba/0x150 [ 827.872138] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 827.876738] do_syscall_64+0xf9/0x620 [ 827.880553] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 827.885749] RIP: 0033:0x7ff03e6523ea [ 827.889468] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 827.908385] RSP: 002b:00007ff03cfc5f88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 827.916106] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007ff03e6523ea [ 827.923394] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007ff03cfc5fe0 [ 827.930671] RBP: 00007ff03cfc6020 R08: 00007ff03cfc6020 R09: 0000000020000000 [ 827.937947] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000000 [ 827.945222] R13: 0000000020000100 R14: 00007ff03cfc5fe0 R15: 0000000020000080 [ 827.977269] erofs: read_super, device -> /dev/loop1 [ 827.982339] erofs: options -> 19:41:49 executing program 4: r0 = syz_init_net_socket$nl_rdma(0x10, 0x3, 0x10) getresuid(0x0, 0x0, &(0x7f0000000200)=0x0) r2 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000a00)={0x0, 0x0, &(0x7f00000009c0)={&(0x7f0000000880)=ANY=[@ANYBLOB='$\x00\x00\x00-\x00'/20, @ANYRES32=0x0, @ANYBLOB="ffffffda0000000000000000"], 0x24}}, 0x0) getsockname$packet(r3, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000000c0)=0x14) r5 = socket$netlink(0x10, 0x3, 0x0) sendmmsg(r5, &(0x7f00000002c0), 0x40000000000009f, 0x0) sendmsg$nl_route(r5, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[], 0x48}}, 0x0) setsockopt$IP_VS_SO_SET_FLUSH(r3, 0x0, 0x485, 0x0, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000004c0)=@newqdisc={0x48, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_htb={{0x8}, {0x1c, 0x2, [@TCA_HTB_INIT={0x18}]}}]}, 0x48}}, 0x0) r6 = getgid() perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x7, 0x20, 0x7, 0x8, 0x0, 0x0, 0x42, 0x5, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x3, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, @perf_bp={&(0x7f0000000540), 0x1}, 0x48018, 0x4, 0x7fff, 0x7, 0x57, 0x1ff, 0x4, 0x0, 0x4, 0x0, 0x6}, 0x0, 0x5, r2, 0x8) mount$fuse(0x0, &(0x7f0000000300)='./file0\x00', &(0x7f0000000380), 0x1008000, &(0x7f0000000640)={{}, 0x2c, {'rootmode', 0x3d, 0x1000}, 0x2c, {'user_id', 0x3d, r1}, 0x2c, {'group_id', 0x3d, r6}, 0x2c, {[{@allow_other}, {@max_read={'max_read', 0x3d, 0x8}}, {@max_read={'max_read', 0x3d, 0x8}}, {@max_read={'max_read', 0x3d, 0x8001}}], [{@obj_user={'obj_user', 0x3d, 'htb\x00'}}, {@obj_role={'obj_role', 0x3d, 'team_slave_0\x00'}}]}}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000600)=ANY=[@ANYBLOB="bc0000002c00270d00"/20, @ANYRES32=r4, @ANYBLOB="00000800000000000d0000000b000100666c6f77657200008c0002"], 0xbc}}, 0x0) sendmsg$ETHTOOL_MSG_FEATURES_GET(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000180)={&(0x7f0000000040)={0xa8, 0x0, 0x800, 0x70bd25, 0x25dfdbfe, {}, [@HEADER={0x2c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vlan0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'team0\x00'}]}, @HEADER={0x68, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r4}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'team_slave_0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ip6gretap0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_vlan\x00'}]}]}, 0xa8}, 0x1, 0x0, 0x0, 0x4004094}, 0x40000) sendmsg$netlink(r0, &(0x7f0000001ac0)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f00000003c0)={0x114, 0x19, 0x1, 0x0, 0x0, "", [@nested={0x102, 0x0, 0x0, 0x1, [@typed={0xc, 0x1, 0x0, 0x0, @u64}, @typed={0xc, 0x0, 0x0, 0x0, @u64}, @generic="50bb2d6f67d29d6fabadb107d0def49c88ea04abde1d5e8d3fb22a1b5046778bdafefc46b0449ade68bf84b36ec72dd71265fc2e882348c26c2126347dd5b37f5ae655b1086cda40e00aec58754734be31d750351dc076eb47d96219c08c029d1608a487f26fbe816b89f7cb81bff81a8b7a82565856555ee923c65973deb0a99b962bc0fe94a3fcae3697bd7b85b3a682167c43dbf137115a40ebddcad74875cf0d972df9e99f07976773f4d98fe3fa370d47eb640dc5061dc35817c8a66c29be82fdc2f4393c05a007d12b505a84dfdb98d568175b62421d726d1e5331e1ddfd4d770b57e0"]}]}, 0x114}, {0x0}], 0x2}, 0x0) [ 827.997222] erofs: root inode @ nid 36 [ 828.008000] erofs: mounted on /dev/loop1 with opts: . [ 828.026015] erofs: read_super, device -> /dev/loop0 [ 828.031625] erofs: read_super, device -> /dev/loop3 [ 828.036648] erofs: options -> fault_injection=0x0000000000000000, 19:41:49 executing program 2: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c0024", 0xf, 0x400}, {&(0x7f0000000280)="05000000c041", 0x6, 0x480}, {0x0, 0x700000000000000, 0x1000}], 0x0, &(0x7f0000000080)={[{@fault_injection}]}) 19:41:49 executing program 1: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c0024", 0xf, 0x400}, {&(0x7f0000000280)="050000040041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000080)) (fail_nth: 43) 19:41:49 executing program 5: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b0046701c403000c0024", 0xf, 0x400}, {&(0x7f0000000280)="05", 0x1, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000080)={[{@fault_injection}]}) [ 828.065637] erofs: options -> [ 828.075554] erofs: unmounted for /dev/loop1 [ 828.081564] netlink: 'syz-executor.4': attribute type 1 has an invalid length. [ 828.083474] erofs: cannot read erofs superblock [ 828.100383] erofs: FAULT_INJECTION was not selected [ 828.102747] netlink: 232 bytes leftover after parsing attributes in process `syz-executor.4'. 19:41:49 executing program 4: r0 = syz_init_net_socket$nl_rdma(0x10, 0x3, 0x10) getresuid(0x0, 0x0, &(0x7f0000000200)=0x0) r2 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000a00)={0x0, 0x0, &(0x7f00000009c0)={&(0x7f0000000880)=ANY=[@ANYBLOB='$\x00\x00\x00-\x00'/20, @ANYRES32=0x0, @ANYBLOB="ffffffda0000000000000000"], 0x24}}, 0x0) getsockname$packet(r3, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000000c0)=0x14) r5 = socket$netlink(0x10, 0x3, 0x0) sendmmsg(r5, &(0x7f00000002c0), 0x40000000000009f, 0x0) sendmsg$nl_route(r5, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[], 0x48}}, 0x0) setsockopt$IP_VS_SO_SET_FLUSH(r3, 0x0, 0x485, 0x0, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000004c0)=@newqdisc={0x48, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_htb={{0x8}, {0x1c, 0x2, [@TCA_HTB_INIT={0x18}]}}]}, 0x48}}, 0x0) r6 = getgid() perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x7, 0x20, 0x7, 0x8, 0x0, 0x0, 0x42, 0x5, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x3, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, @perf_bp={&(0x7f0000000540), 0x1}, 0x48018, 0x4, 0x7fff, 0x7, 0x57, 0x1ff, 0x4, 0x0, 0x4, 0x0, 0x6}, 0x0, 0x5, r2, 0x8) mount$fuse(0x0, &(0x7f0000000300)='./file0\x00', &(0x7f0000000380), 0x1008000, &(0x7f0000000640)={{}, 0x2c, {'rootmode', 0x3d, 0x1000}, 0x2c, {'user_id', 0x3d, r1}, 0x2c, {'group_id', 0x3d, r6}, 0x2c, {[{@allow_other}, {@max_read={'max_read', 0x3d, 0x8}}, {@max_read={'max_read', 0x3d, 0x8}}, {@max_read={'max_read', 0x3d, 0x8001}}], [{@obj_user={'obj_user', 0x3d, 'htb\x00'}}, {@obj_role={'obj_role', 0x3d, 'team_slave_0\x00'}}]}}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000600)=ANY=[@ANYBLOB="bc0000002c00270d00"/20, @ANYRES32=r4, @ANYBLOB="00000800000000000d0000000b000100666c6f77657200008c0002"], 0xbc}}, 0x0) sendmsg$ETHTOOL_MSG_FEATURES_GET(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000180)={&(0x7f0000000040)={0xa8, 0x0, 0x800, 0x70bd25, 0x25dfdbfe, {}, [@HEADER={0x2c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vlan0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'team0\x00'}]}, @HEADER={0x68, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r4}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'team_slave_0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ip6gretap0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_vlan\x00'}]}]}, 0xa8}, 0x1, 0x0, 0x0, 0x4004094}, 0x40000) sendmsg$netlink(r0, &(0x7f0000001ac0)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f00000003c0)={0x114, 0x19, 0x1, 0x0, 0x0, "", [@nested={0x102, 0x0, 0x0, 0x1, [@typed={0xc, 0x1, 0x0, 0x0, @u64}, @typed={0xc, 0x0, 0x0, 0x0, @u64}, @generic="50bb2d6f67d29d6fabadb107d0def49c88ea04abde1d5e8d3fb22a1b5046778bdafefc46b0449ade68bf84b36ec72dd71265fc2e882348c26c2126347dd5b37f5ae655b1086cda40e00aec58754734be31d750351dc076eb47d96219c08c029d1608a487f26fbe816b89f7cb81bff81a8b7a82565856555ee923c65973deb0a99b962bc0fe94a3fcae3697bd7b85b3a682167c43dbf137115a40ebddcad74875cf0d972df9e99f07976773f4d98fe3fa370d47eb640dc5061dc35817c8a66c29be82fdc2f4393c05a007d12b505a84dfdb98d568175b62421d726d1e5331e1ddfd4d770b57e0"]}]}, 0x114}, {0x0}], 0x2}, 0x0) syz_init_net_socket$nl_rdma(0x10, 0x3, 0x10) (async) getresuid(0x0, 0x0, &(0x7f0000000200)) (async) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) (async) socket$netlink(0x10, 0x3, 0x0) (async) socket(0x10, 0x803, 0x0) (async) sendmsg$nl_route_sched(r3, &(0x7f0000000a00)={0x0, 0x0, &(0x7f00000009c0)={&(0x7f0000000880)=ANY=[@ANYBLOB='$\x00\x00\x00-\x00'/20, @ANYRES32=0x0, @ANYBLOB="ffffffda0000000000000000"], 0x24}}, 0x0) (async) getsockname$packet(r3, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000000c0)=0x14) (async) socket$netlink(0x10, 0x3, 0x0) (async) sendmmsg(r5, &(0x7f00000002c0), 0x40000000000009f, 0x0) (async) sendmsg$nl_route(r5, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[], 0x48}}, 0x0) (async) setsockopt$IP_VS_SO_SET_FLUSH(r3, 0x0, 0x485, 0x0, 0x0) (async) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000004c0)=@newqdisc={0x48, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_htb={{0x8}, {0x1c, 0x2, [@TCA_HTB_INIT={0x18}]}}]}, 0x48}}, 0x0) (async) getgid() (async) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x7, 0x20, 0x7, 0x8, 0x0, 0x0, 0x42, 0x5, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x3, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, @perf_bp={&(0x7f0000000540), 0x1}, 0x48018, 0x4, 0x7fff, 0x7, 0x57, 0x1ff, 0x4, 0x0, 0x4, 0x0, 0x6}, 0x0, 0x5, r2, 0x8) (async) mount$fuse(0x0, &(0x7f0000000300)='./file0\x00', &(0x7f0000000380), 0x1008000, &(0x7f0000000640)={{}, 0x2c, {'rootmode', 0x3d, 0x1000}, 0x2c, {'user_id', 0x3d, r1}, 0x2c, {'group_id', 0x3d, r6}, 0x2c, {[{@allow_other}, {@max_read={'max_read', 0x3d, 0x8}}, {@max_read={'max_read', 0x3d, 0x8}}, {@max_read={'max_read', 0x3d, 0x8001}}], [{@obj_user={'obj_user', 0x3d, 'htb\x00'}}, {@obj_role={'obj_role', 0x3d, 'team_slave_0\x00'}}]}}) (async) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000600)=ANY=[@ANYBLOB="bc0000002c00270d00"/20, @ANYRES32=r4, @ANYBLOB="00000800000000000d0000000b000100666c6f77657200008c0002"], 0xbc}}, 0x0) (async) sendmsg$ETHTOOL_MSG_FEATURES_GET(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000180)={&(0x7f0000000040)={0xa8, 0x0, 0x800, 0x70bd25, 0x25dfdbfe, {}, [@HEADER={0x2c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vlan0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'team0\x00'}]}, @HEADER={0x68, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r4}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'team_slave_0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ip6gretap0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_vlan\x00'}]}]}, 0xa8}, 0x1, 0x0, 0x0, 0x4004094}, 0x40000) (async) sendmsg$netlink(r0, &(0x7f0000001ac0)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f00000003c0)={0x114, 0x19, 0x1, 0x0, 0x0, "", [@nested={0x102, 0x0, 0x0, 0x1, [@typed={0xc, 0x1, 0x0, 0x0, @u64}, @typed={0xc, 0x0, 0x0, 0x0, @u64}, @generic="50bb2d6f67d29d6fabadb107d0def49c88ea04abde1d5e8d3fb22a1b5046778bdafefc46b0449ade68bf84b36ec72dd71265fc2e882348c26c2126347dd5b37f5ae655b1086cda40e00aec58754734be31d750351dc076eb47d96219c08c029d1608a487f26fbe816b89f7cb81bff81a8b7a82565856555ee923c65973deb0a99b962bc0fe94a3fcae3697bd7b85b3a682167c43dbf137115a40ebddcad74875cf0d972df9e99f07976773f4d98fe3fa370d47eb640dc5061dc35817c8a66c29be82fdc2f4393c05a007d12b505a84dfdb98d568175b62421d726d1e5331e1ddfd4d770b57e0"]}]}, 0x114}, {0x0}], 0x2}, 0x0) (async) [ 828.112749] erofs: root inode @ nid 0 [ 828.120993] erofs: bogus i_mode (0) @ nid 0 [ 828.207612] erofs: read_super, device -> /dev/loop2 [ 828.223161] erofs: options -> fault_injection=0x0000000000000000, [ 828.226000] FAULT_INJECTION: forcing a failure. [ 828.226000] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 828.235545] erofs: read_super, device -> /dev/loop5 [ 828.241217] CPU: 1 PID: 8465 Comm: syz-executor.1 Not tainted 4.19.211-syzkaller #0 [ 828.241226] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 828.241230] Call Trace: [ 828.241253] dump_stack+0x1fc/0x2ef [ 828.241279] should_fail.cold+0xa/0xf [ 828.241297] ? setup_fault_attr+0x200/0x200 [ 828.241319] ? get_page_from_freelist+0x1d60/0x4170 [ 828.255442] erofs: cannot read erofs superblock [ 828.263458] __alloc_pages_nodemask+0x239/0x2890 [ 828.263477] ? get_page_from_freelist+0x1d60/0x4170 [ 828.263490] ? bad_range+0x260/0x3c0 [ 828.263506] ? __lock_acquire+0x6de/0x3ff0 [ 828.263523] ? preempt_count_add+0xaf/0x190 [ 828.263537] ? gfp_pfmemalloc_allowed+0x150/0x150 [ 828.263562] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 828.263584] cache_grow_begin+0xa4/0x8a0 [ 828.285105] erofs: options -> fault_injection=0x0000000000000000, [ 828.287522] ? setup_fault_attr+0x200/0x200 [ 828.287537] ? cache_alloc_pfmemalloc+0x1e/0x140 [ 828.287553] cache_alloc_refill+0x273/0x340 [ 828.287572] kmem_cache_alloc+0x346/0x370 [ 828.287589] getname_kernel+0x4e/0x370 [ 828.287604] kern_path+0x1b/0x40 [ 828.287617] lookup_bdev+0xfc/0x220 [ 828.287628] ? bd_acquire+0x440/0x440 [ 828.287646] blkdev_get_by_path+0x1b/0xd0 [ 828.303278] erofs: FAULT_INJECTION was not selected [ 828.305483] mount_bdev+0x5b/0x3b0 [ 828.305498] ? gb_gbphy_register_driver.cold+0x39/0x39 [ 828.305515] erofs_mount+0x8c/0xc0 [ 828.321388] erofs: root inode @ nid 36 [ 828.324041] ? erofs_kill_sb+0x20/0x20 [ 828.324060] ? alloc_pages_current+0x19b/0x2a0 [ 828.324076] ? __lockdep_init_map+0x100/0x5a0 [ 828.400513] mount_fs+0xa3/0x310 [ 828.403873] vfs_kern_mount.part.0+0x68/0x470 [ 828.408359] do_mount+0x115c/0x2f50 [ 828.411977] ? cmp_ex_sort+0xc0/0xc0 [ 828.415681] ? __do_page_fault+0x180/0xd60 [ 828.419904] ? copy_mount_string+0x40/0x40 [ 828.424135] ? memset+0x20/0x40 [ 828.427404] ? copy_mount_options+0x26f/0x380 [ 828.431891] ksys_mount+0xcf/0x130 [ 828.435418] __x64_sys_mount+0xba/0x150 [ 828.439380] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 828.443947] do_syscall_64+0xf9/0x620 [ 828.447740] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 828.452919] RIP: 0033:0x7ff03e6523ea [ 828.456619] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 828.475505] RSP: 002b:00007ff03cfc5f88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 828.483202] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007ff03e6523ea [ 828.490455] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007ff03cfc5fe0 [ 828.497714] RBP: 00007ff03cfc6020 R08: 00007ff03cfc6020 R09: 0000000020000000 19:41:49 executing program 2: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c0024", 0xf, 0x400}, {&(0x7f0000000280)="05000000c041", 0x6, 0x480}, {0x0, 0x800000000000000, 0x1000}], 0x0, &(0x7f0000000080)={[{@fault_injection}]}) 19:41:49 executing program 0: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e0", 0x4, 0x400}, {0x0, 0xa915909b, 0x1000}], 0x0, &(0x7f0000000080)) 19:41:49 executing program 1: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c0024", 0xf, 0x400}, {&(0x7f0000000280)="050000040041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000080)) (fail_nth: 44) [ 828.506010] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000000 [ 828.513275] R13: 0000000020000100 R14: 00007ff03cfc5fe0 R15: 0000000020000080 [ 828.521392] erofs: read_super, device -> /dev/loop1 [ 828.526529] erofs: options -> [ 828.530134] erofs: root inode @ nid 36 [ 828.536041] erofs: mounted on /dev/loop1 with opts: . [ 828.542184] netlink: 'syz-executor.4': attribute type 1 has an invalid length. [ 828.550333] netlink: 232 bytes leftover after parsing attributes in process `syz-executor.4'. 19:41:49 executing program 3: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b0046701009a030c", 0xd, 0x400}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000080)={[{@fault_injection}]}) 19:41:49 executing program 4: r0 = syz_init_net_socket$nl_rdma(0x10, 0x3, 0x10) (async) getresuid(0x0, 0x0, &(0x7f0000000200)=0x0) (async) r2 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) (async) socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000a00)={0x0, 0x0, &(0x7f00000009c0)={&(0x7f0000000880)=ANY=[@ANYBLOB='$\x00\x00\x00-\x00'/20, @ANYRES32=0x0, @ANYBLOB="ffffffda0000000000000000"], 0x24}}, 0x0) (async) getsockname$packet(r3, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000000c0)=0x14) (async) r5 = socket$netlink(0x10, 0x3, 0x0) sendmmsg(r5, &(0x7f00000002c0), 0x40000000000009f, 0x0) (async) sendmsg$nl_route(r5, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[], 0x48}}, 0x0) (async) setsockopt$IP_VS_SO_SET_FLUSH(r3, 0x0, 0x485, 0x0, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000004c0)=@newqdisc={0x48, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_htb={{0x8}, {0x1c, 0x2, [@TCA_HTB_INIT={0x18}]}}]}, 0x48}}, 0x0) (async) r6 = getgid() perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x7, 0x20, 0x7, 0x8, 0x0, 0x0, 0x42, 0x5, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x3, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, @perf_bp={&(0x7f0000000540), 0x1}, 0x48018, 0x4, 0x7fff, 0x7, 0x57, 0x1ff, 0x4, 0x0, 0x4, 0x0, 0x6}, 0x0, 0x5, r2, 0x8) (async) mount$fuse(0x0, &(0x7f0000000300)='./file0\x00', &(0x7f0000000380), 0x1008000, &(0x7f0000000640)={{}, 0x2c, {'rootmode', 0x3d, 0x1000}, 0x2c, {'user_id', 0x3d, r1}, 0x2c, {'group_id', 0x3d, r6}, 0x2c, {[{@allow_other}, {@max_read={'max_read', 0x3d, 0x8}}, {@max_read={'max_read', 0x3d, 0x8}}, {@max_read={'max_read', 0x3d, 0x8001}}], [{@obj_user={'obj_user', 0x3d, 'htb\x00'}}, {@obj_role={'obj_role', 0x3d, 'team_slave_0\x00'}}]}}) (async) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000600)=ANY=[@ANYBLOB="bc0000002c00270d00"/20, @ANYRES32=r4, @ANYBLOB="00000800000000000d0000000b000100666c6f77657200008c0002"], 0xbc}}, 0x0) (async) sendmsg$ETHTOOL_MSG_FEATURES_GET(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000180)={&(0x7f0000000040)={0xa8, 0x0, 0x800, 0x70bd25, 0x25dfdbfe, {}, [@HEADER={0x2c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vlan0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'team0\x00'}]}, @HEADER={0x68, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r4}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'team_slave_0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ip6gretap0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_vlan\x00'}]}]}, 0xa8}, 0x1, 0x0, 0x0, 0x4004094}, 0x40000) (async) sendmsg$netlink(r0, &(0x7f0000001ac0)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f00000003c0)={0x114, 0x19, 0x1, 0x0, 0x0, "", [@nested={0x102, 0x0, 0x0, 0x1, [@typed={0xc, 0x1, 0x0, 0x0, @u64}, @typed={0xc, 0x0, 0x0, 0x0, @u64}, @generic="50bb2d6f67d29d6fabadb107d0def49c88ea04abde1d5e8d3fb22a1b5046778bdafefc46b0449ade68bf84b36ec72dd71265fc2e882348c26c2126347dd5b37f5ae655b1086cda40e00aec58754734be31d750351dc076eb47d96219c08c029d1608a487f26fbe816b89f7cb81bff81a8b7a82565856555ee923c65973deb0a99b962bc0fe94a3fcae3697bd7b85b3a682167c43dbf137115a40ebddcad74875cf0d972df9e99f07976773f4d98fe3fa370d47eb640dc5061dc35817c8a66c29be82fdc2f4393c05a007d12b505a84dfdb98d568175b62421d726d1e5331e1ddfd4d770b57e0"]}]}, 0x114}, {0x0}], 0x2}, 0x0) [ 828.570555] erofs: unmounted for /dev/loop1 [ 828.579936] erofs: read_super, device -> /dev/loop0 [ 828.585039] erofs: options -> [ 828.588409] erofs: cannot read erofs superblock [ 828.596846] erofs: bogus i_mode (0) @ nid 36 [ 828.681801] erofs: read_super, device -> /dev/loop3 [ 828.693917] erofs: options -> fault_injection=0x0000000000000000, [ 828.701579] erofs: FAULT_INJECTION was not selected [ 828.706665] erofs: root inode @ nid 0 [ 828.711729] erofs: bogus i_mode (0) @ nid 0 19:41:49 executing program 3: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b0046701009b030c", 0xd, 0x400}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000080)={[{@fault_injection}]}) 19:41:49 executing program 0: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e0", 0x4, 0x400}, {0x0, 0xc0ed0000, 0x1000}], 0x0, &(0x7f0000000080)) 19:41:49 executing program 5: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b0046701c503000c0024", 0xf, 0x400}, {&(0x7f0000000280)="05", 0x1, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000080)={[{@fault_injection}]}) [ 828.761760] erofs: read_super, device -> /dev/loop2 [ 828.766813] erofs: options -> fault_injection=0x0000000000000000, [ 828.767990] FAULT_INJECTION: forcing a failure. [ 828.767990] name failslab, interval 1, probability 0, space 0, times 0 [ 828.815200] erofs: cannot read erofs superblock [ 828.817196] CPU: 1 PID: 8501 Comm: syz-executor.1 Not tainted 4.19.211-syzkaller #0 [ 828.827694] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 828.835521] netlink: 'syz-executor.4': attribute type 1 has an invalid length. [ 828.837048] Call Trace: [ 828.837070] dump_stack+0x1fc/0x2ef [ 828.837088] should_fail.cold+0xa/0xf [ 828.837105] ? setup_fault_attr+0x200/0x200 [ 828.837119] ? lock_acquire+0x170/0x3c0 [ 828.837138] __should_failslab+0x115/0x180 [ 828.837154] should_failslab+0x5/0x10 [ 828.837172] kmem_cache_alloc_node_trace+0x244/0x3b0 [ 828.844600] netlink: 232 bytes leftover after parsing attributes in process `syz-executor.4'. [ 828.847087] __kmalloc_node+0x38/0x70 [ 828.847104] kvmalloc_node+0x61/0xf0 [ 828.847119] __list_lru_init+0x4c6/0x7f0 [ 828.847132] ? up_read+0xb3/0x110 [ 828.847150] sget_userns+0x7e2/0xcd0 [ 828.847163] ? set_bdev_super+0x110/0x110 [ 828.847181] ? ns_test_super+0x50/0x50 [ 828.847196] ? set_bdev_super+0x110/0x110 [ 828.847209] ? ns_test_super+0x50/0x50 [ 828.847224] sget+0x102/0x140 [ 828.902802] erofs: read_super, device -> /dev/loop5 [ 828.903852] mount_bdev+0xf8/0x3b0 [ 828.903868] ? gb_gbphy_register_driver.cold+0x39/0x39 [ 828.903886] erofs_mount+0x8c/0xc0 [ 828.908202] erofs: options -> fault_injection=0x0000000000000000, [ 828.911917] ? erofs_kill_sb+0x20/0x20 [ 828.911938] ? alloc_pages_current+0x19b/0x2a0 [ 828.911956] ? __lockdep_init_map+0x100/0x5a0 [ 828.916490] erofs: FAULT_INJECTION was not selected 19:41:50 executing program 4: preadv(0xffffffffffffffff, &(0x7f0000000480), 0x10000000000002a1, 0x0, 0x0) r0 = dup(0xffffffffffffffff) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000280)={0x18, 0x3, &(0x7f00000001c0)=ANY=[@ANYBLOB="18000000000000080000bacefbd9dfa7ab1ed30eced79cf542874adbb5fe4fa9a90d79a82ab3becb09a2fdb0a5b92d8573eb5a54f8290a26d98e1f5fed7411733af2339ec1c4d2b65d1d28bfe6c48927c75a88d18d5d5854945622d3cdaff17a337a1b44a1080aecaf2c6d6f7e7d96c37be7022c283716df74e9a5a4fc0759f0e58bf0e682d9205bb70d6a"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x74) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r1}, 0x10) mkdir(&(0x7f0000000000)='./file0\x00', 0xa0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x40104, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0xfffffeff}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000280)='./file0\x00', &(0x7f0000000080)='./file0\x00') r2 = socket$inet6(0xa, 0x1, 0x0) getpeername$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000040)=0x14) connect$packet(0xffffffffffffffff, &(0x7f0000000080)={0x11, 0x0, r3, 0x1, 0x0, 0x6, @broadcast}, 0x14) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000040)={'sit0\x00', 0x0}) ioctl$sock_inet6_SIOCSIFDSTADDR(r2, 0x8918, &(0x7f0000000180)={@loopback={0x0, 0x300}, 0x0, r4}) write$UHID_INPUT(r0, &(0x7f0000001040)={0x8, {"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", 0x1000}}, 0x1006) [ 828.919963] mount_fs+0xa3/0x310 [ 828.919982] vfs_kern_mount.part.0+0x68/0x470 [ 828.920000] do_mount+0x115c/0x2f50 [ 828.920017] ? cmp_ex_sort+0xc0/0xc0 [ 828.920034] ? __do_page_fault+0x180/0xd60 [ 828.920048] ? copy_mount_string+0x40/0x40 [ 828.920070] ? memset+0x20/0x40 [ 828.920085] ? copy_mount_options+0x26f/0x380 [ 828.920103] ksys_mount+0xcf/0x130 [ 828.920117] __x64_sys_mount+0xba/0x150 [ 828.920135] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 828.936121] erofs: root inode @ nid 36 [ 828.937009] do_syscall_64+0xf9/0x620 [ 828.937029] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 828.937040] RIP: 0033:0x7ff03e6523ea [ 828.937054] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 828.937061] RSP: 002b:00007ff03cfc5f88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 828.937073] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007ff03e6523ea [ 828.937082] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007ff03cfc5fe0 [ 828.937090] RBP: 00007ff03cfc6020 R08: 00007ff03cfc6020 R09: 0000000020000000 [ 828.937097] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000000 [ 828.937104] R13: 0000000020000100 R14: 00007ff03cfc5fe0 R15: 0000000020000080 [ 829.090058] erofs: bogus i_mode (0) @ nid 36 19:41:50 executing program 1: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c0024", 0xf, 0x400}, {&(0x7f0000000280)="050000040041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000080)) (fail_nth: 45) 19:41:50 executing program 5: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b0046701c603000c0024", 0xf, 0x400}, {&(0x7f0000000280)="05", 0x1, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000080)={[{@fault_injection}]}) 19:41:50 executing program 2: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c0024", 0xf, 0x400}, {&(0x7f0000000280)="05000000c041", 0x6, 0x480}, {0x0, 0x2000000000000000, 0x1000}], 0x0, &(0x7f0000000080)={[{@fault_injection}]}) [ 829.167889] erofs: read_super, device -> /dev/loop3 [ 829.173482] erofs: read_super, device -> /dev/loop0 [ 829.197173] erofs: options -> [ 829.200602] erofs: options -> fault_injection=0x0000000000000000, [ 829.233274] erofs: cannot read erofs superblock [ 829.247714] erofs: FAULT_INJECTION was not selected 19:41:50 executing program 0: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e0", 0x4, 0x400}, {0x0, 0xf5ffffff, 0x1000}], 0x0, &(0x7f0000000080)) [ 829.272620] erofs: root inode @ nid 0 [ 829.308592] erofs: bogus i_mode (0) @ nid 0 [ 829.318860] erofs: read_super, device -> /dev/loop5 19:41:50 executing program 3: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b0046701009c030c", 0xd, 0x400}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000080)={[{@fault_injection}]}) [ 829.353192] erofs: options -> fault_injection=0x0000000000000000, [ 829.363544] erofs: read_super, device -> /dev/loop2 [ 829.391515] erofs: options -> fault_injection=0x0000000000000000, 19:41:50 executing program 4: preadv(0xffffffffffffffff, &(0x7f0000000480), 0x10000000000002a1, 0x0, 0x0) r0 = dup(0xffffffffffffffff) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000280)={0x18, 0x3, &(0x7f00000001c0)=ANY=[@ANYBLOB="18000000000000080000bacefbd9dfa7ab1ed30eced79cf542874adbb5fe4fa9a90d79a82ab3becb09a2fdb0a5b92d8573eb5a54f8290a26d98e1f5fed7411733af2339ec1c4d2b65d1d28bfe6c48927c75a88d18d5d5854945622d3cdaff17a337a1b44a1080aecaf2c6d6f7e7d96c37be7022c283716df74e9a5a4fc0759f0e58bf0e682d9205bb70d6a"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x74) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r1}, 0x10) mkdir(&(0x7f0000000000)='./file0\x00', 0xa0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x40104, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0xfffffeff}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000280)='./file0\x00', &(0x7f0000000080)='./file0\x00') r2 = socket$inet6(0xa, 0x1, 0x0) getpeername$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000040)=0x14) connect$packet(0xffffffffffffffff, &(0x7f0000000080)={0x11, 0x0, r3, 0x1, 0x0, 0x6, @broadcast}, 0x14) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000040)={'sit0\x00', 0x0}) ioctl$sock_inet6_SIOCSIFDSTADDR(r2, 0x8918, &(0x7f0000000180)={@loopback={0x0, 0x300}, 0x0, r4}) write$UHID_INPUT(r0, &(0x7f0000001040)={0x8, {"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", 0x1000}}, 0x1006) preadv(0xffffffffffffffff, &(0x7f0000000480), 0x10000000000002a1, 0x0, 0x0) (async) dup(0xffffffffffffffff) (async) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000280)={0x18, 0x3, &(0x7f00000001c0)=ANY=[@ANYBLOB="18000000000000080000bacefbd9dfa7ab1ed30eced79cf542874adbb5fe4fa9a90d79a82ab3becb09a2fdb0a5b92d8573eb5a54f8290a26d98e1f5fed7411733af2339ec1c4d2b65d1d28bfe6c48927c75a88d18d5d5854945622d3cdaff17a337a1b44a1080aecaf2c6d6f7e7d96c37be7022c283716df74e9a5a4fc0759f0e58bf0e682d9205bb70d6a"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x74) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r1}, 0x10) (async) mkdir(&(0x7f0000000000)='./file0\x00', 0xa0) (async) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) (async) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x40104, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0xfffffeff}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) (async) pivot_root(&(0x7f0000000280)='./file0\x00', &(0x7f0000000080)='./file0\x00') (async) socket$inet6(0xa, 0x1, 0x0) (async) getpeername$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000040)=0x14) (async) connect$packet(0xffffffffffffffff, &(0x7f0000000080)={0x11, 0x0, r3, 0x1, 0x0, 0x6, @broadcast}, 0x14) (async) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000040)={'sit0\x00'}) (async) ioctl$sock_inet6_SIOCSIFDSTADDR(r2, 0x8918, &(0x7f0000000180)={@loopback={0x0, 0x300}, 0x0, r4}) (async) write$UHID_INPUT(r0, &(0x7f0000001040)={0x8, {"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", 0x1000}}, 0x1006) (async) [ 829.403102] erofs: FAULT_INJECTION was not selected [ 829.411709] erofs: cannot read erofs superblock [ 829.416624] erofs: root inode @ nid 36 [ 829.427114] FAULT_INJECTION: forcing a failure. [ 829.427114] name failslab, interval 1, probability 0, space 0, times 0 [ 829.441901] CPU: 0 PID: 8554 Comm: syz-executor.1 Not tainted 4.19.211-syzkaller #0 [ 829.449736] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 829.459095] Call Trace: [ 829.461695] dump_stack+0x1fc/0x2ef [ 829.465345] should_fail.cold+0xa/0xf [ 829.469161] ? setup_fault_attr+0x200/0x200 [ 829.473677] ? lock_acquire+0x170/0x3c0 [ 829.477669] __should_failslab+0x115/0x180 [ 829.481914] should_failslab+0x5/0x10 [ 829.485730] kmem_cache_alloc_trace+0x284/0x380 [ 829.490405] ? set_bdev_super+0x110/0x110 [ 829.494558] ? ns_test_super+0x50/0x50 [ 829.498451] sget_userns+0x122/0xcd0 [ 829.502167] ? set_bdev_super+0x110/0x110 [ 829.506319] ? ns_test_super+0x50/0x50 [ 829.510211] ? set_bdev_super+0x110/0x110 [ 829.514361] ? ns_test_super+0x50/0x50 [ 829.518255] sget+0x102/0x140 [ 829.521366] mount_bdev+0xf8/0x3b0 [ 829.524906] ? gb_gbphy_register_driver.cold+0x39/0x39 [ 829.530183] erofs_mount+0x8c/0xc0 [ 829.533716] ? erofs_kill_sb+0x20/0x20 [ 829.537596] ? alloc_pages_current+0x19b/0x2a0 [ 829.542166] ? __lockdep_init_map+0x100/0x5a0 [ 829.546651] mount_fs+0xa3/0x310 [ 829.550010] vfs_kern_mount.part.0+0x68/0x470 [ 829.554509] do_mount+0x115c/0x2f50 [ 829.558126] ? cmp_ex_sort+0xc0/0xc0 [ 829.561831] ? __do_page_fault+0x180/0xd60 [ 829.566057] ? copy_mount_string+0x40/0x40 [ 829.570284] ? memset+0x20/0x40 [ 829.573552] ? copy_mount_options+0x26f/0x380 [ 829.578040] ksys_mount+0xcf/0x130 [ 829.581570] __x64_sys_mount+0xba/0x150 [ 829.585531] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 829.590109] do_syscall_64+0xf9/0x620 [ 829.593900] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 829.599075] RIP: 0033:0x7ff03e6523ea [ 829.602780] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 829.621855] RSP: 002b:00007ff03cfc5f88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 829.629644] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007ff03e6523ea [ 829.636900] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007ff03cfc5fe0 [ 829.644156] RBP: 00007ff03cfc6020 R08: 00007ff03cfc6020 R09: 0000000020000000 [ 829.651409] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000000 [ 829.658662] R13: 0000000020000100 R14: 00007ff03cfc5fe0 R15: 0000000020000080 [ 829.676014] erofs: bogus i_mode (0) @ nid 36 19:41:50 executing program 2: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c0024", 0xf, 0x400}, {&(0x7f0000000280)="05000000c041", 0x6, 0x480}, {0x0, 0x3c02000000000000, 0x1000}], 0x0, &(0x7f0000000080)={[{@fault_injection}]}) 19:41:50 executing program 5: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b0046701c703000c0024", 0xf, 0x400}, {&(0x7f0000000280)="05", 0x1, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000080)={[{@fault_injection}]}) [ 829.769148] erofs: read_super, device -> /dev/loop0 [ 829.776137] erofs: options -> [ 829.790536] erofs: read_super, device -> /dev/loop3 [ 829.793013] erofs: cannot read erofs superblock 19:41:50 executing program 0: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e0", 0x4, 0x400}, {0x0, 0xf6ffffff, 0x1000}], 0x0, &(0x7f0000000080)) 19:41:50 executing program 1: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c0024", 0xf, 0x400}, {&(0x7f0000000280)="050000040041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000080)) (fail_nth: 46) [ 829.835072] erofs: options -> fault_injection=0x0000000000000000, [ 829.861705] erofs: FAULT_INJECTION was not selected [ 829.876473] erofs: root inode @ nid 0 [ 829.881374] erofs: bogus i_mode (0) @ nid 0 19:41:51 executing program 3: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b0046701009d030c", 0xd, 0x400}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000080)={[{@fault_injection}]}) [ 829.907305] erofs: read_super, device -> /dev/loop5 [ 829.912644] erofs: read_super, device -> /dev/loop2 [ 829.921146] erofs: options -> fault_injection=0x0000000000000000, [ 829.931629] erofs: options -> fault_injection=0x0000000000000000, [ 829.970495] erofs: FAULT_INJECTION was not selected [ 829.977133] erofs: cannot read erofs superblock [ 830.001143] erofs: root inode @ nid 36 [ 830.015638] erofs: bogus i_mode (0) @ nid 36 [ 830.105694] erofs: read_super, device -> /dev/loop0 [ 830.111014] FAULT_INJECTION: forcing a failure. [ 830.111014] name failslab, interval 1, probability 0, space 0, times 0 [ 830.145237] erofs: read_super, device -> /dev/loop3 19:41:51 executing program 2: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c0024", 0xf, 0x400}, {&(0x7f0000000280)="05000000c041", 0x6, 0x480}, {0x0, 0x3f00000000000000, 0x1000}], 0x0, &(0x7f0000000080)={[{@fault_injection}]}) 19:41:51 executing program 5: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b0046701c803000c0024", 0xf, 0x400}, {&(0x7f0000000280)="05", 0x1, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000080)={[{@fault_injection}]}) [ 830.177157] erofs: options -> [ 830.180938] erofs: cannot read erofs superblock [ 830.203844] erofs: options -> fault_injection=0x0000000000000000, [ 830.211406] CPU: 1 PID: 8592 Comm: syz-executor.1 Not tainted 4.19.211-syzkaller #0 [ 830.219216] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 830.228566] Call Trace: [ 830.231154] dump_stack+0x1fc/0x2ef [ 830.234775] should_fail.cold+0xa/0xf [ 830.238568] ? setup_fault_attr+0x200/0x200 [ 830.242877] ? lock_acquire+0x170/0x3c0 [ 830.246845] __should_failslab+0x115/0x180 [ 830.251072] should_failslab+0x5/0x10 [ 830.254860] __kmalloc+0x2ab/0x3c0 [ 830.258398] ? prealloc_shrinker+0x15d/0x340 [ 830.262796] prealloc_shrinker+0x15d/0x340 [ 830.267107] sget_userns+0x7b4/0xcd0 [ 830.270809] ? set_bdev_super+0x110/0x110 [ 830.274948] ? ns_test_super+0x50/0x50 [ 830.278822] ? set_bdev_super+0x110/0x110 [ 830.282956] ? ns_test_super+0x50/0x50 [ 830.286833] sget+0x102/0x140 [ 830.289926] mount_bdev+0xf8/0x3b0 [ 830.293452] ? gb_gbphy_register_driver.cold+0x39/0x39 [ 830.298724] erofs_mount+0x8c/0xc0 [ 830.302253] ? erofs_kill_sb+0x20/0x20 [ 830.306133] ? alloc_pages_current+0x19b/0x2a0 [ 830.310705] ? __lockdep_init_map+0x100/0x5a0 [ 830.315195] mount_fs+0xa3/0x310 [ 830.318555] vfs_kern_mount.part.0+0x68/0x470 [ 830.323043] do_mount+0x115c/0x2f50 [ 830.326663] ? cmp_ex_sort+0xc0/0xc0 [ 830.330368] ? __do_page_fault+0x180/0xd60 [ 830.334601] ? copy_mount_string+0x40/0x40 [ 830.338830] ? memset+0x20/0x40 [ 830.342101] ? copy_mount_options+0x26f/0x380 [ 830.346586] ksys_mount+0xcf/0x130 [ 830.350118] __x64_sys_mount+0xba/0x150 [ 830.354081] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 830.358651] do_syscall_64+0xf9/0x620 [ 830.362449] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 830.367623] RIP: 0033:0x7ff03e6523ea [ 830.371323] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 830.390213] RSP: 002b:00007ff03cfc5f88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 830.397920] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007ff03e6523ea [ 830.405176] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007ff03cfc5fe0 [ 830.412435] RBP: 00007ff03cfc6020 R08: 00007ff03cfc6020 R09: 0000000020000000 [ 830.419697] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000000 19:41:51 executing program 0: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e0", 0x4, 0x400}, {0x0, 0xfbffffff, 0x1000}], 0x0, &(0x7f0000000080)) [ 830.426949] R13: 0000000020000100 R14: 00007ff03cfc5fe0 R15: 0000000020000080 [ 830.448174] erofs: FAULT_INJECTION was not selected [ 830.461849] erofs: root inode @ nid 0 19:41:51 executing program 1: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c0024", 0xf, 0x400}, {&(0x7f0000000280)="050000040041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000080)) (fail_nth: 47) [ 830.474988] erofs: read_super, device -> /dev/loop2 [ 830.485935] erofs: bogus i_mode (0) @ nid 0 [ 830.493549] erofs: options -> fault_injection=0x0000000000000000, [ 830.513335] erofs: cannot read erofs superblock 19:41:51 executing program 2: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c0024", 0xf, 0x400}, {&(0x7f0000000280)="05000000c041", 0x6, 0x480}, {0x0, 0x8cffffff00000000, 0x1000}], 0x0, &(0x7f0000000080)={[{@fault_injection}]}) 19:41:51 executing program 3: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b0046701009e030c", 0xd, 0x400}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000080)={[{@fault_injection}]}) [ 830.582123] erofs: read_super, device -> /dev/loop5 [ 830.588361] erofs: options -> fault_injection=0x0000000000000000, [ 830.588819] erofs: read_super, device -> /dev/loop0 [ 830.613563] erofs: FAULT_INJECTION was not selected 19:41:51 executing program 4: preadv(0xffffffffffffffff, &(0x7f0000000480), 0x10000000000002a1, 0x0, 0x0) (async) r0 = dup(0xffffffffffffffff) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) (async) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000280)={0x18, 0x3, &(0x7f00000001c0)=ANY=[@ANYBLOB="18000000000000080000bacefbd9dfa7ab1ed30eced79cf542874adbb5fe4fa9a90d79a82ab3becb09a2fdb0a5b92d8573eb5a54f8290a26d98e1f5fed7411733af2339ec1c4d2b65d1d28bfe6c48927c75a88d18d5d5854945622d3cdaff17a337a1b44a1080aecaf2c6d6f7e7d96c37be7022c283716df74e9a5a4fc0759f0e58bf0e682d9205bb70d6a"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x74) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r1}, 0x10) (async) mkdir(&(0x7f0000000000)='./file0\x00', 0xa0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) (async) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x40104, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0xfffffeff}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) (async) pivot_root(&(0x7f0000000280)='./file0\x00', &(0x7f0000000080)='./file0\x00') (async) r2 = socket$inet6(0xa, 0x1, 0x0) (async) getpeername$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000040)=0x14) connect$packet(0xffffffffffffffff, &(0x7f0000000080)={0x11, 0x0, r3, 0x1, 0x0, 0x6, @broadcast}, 0x14) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000040)={'sit0\x00', 0x0}) ioctl$sock_inet6_SIOCSIFDSTADDR(r2, 0x8918, &(0x7f0000000180)={@loopback={0x0, 0x300}, 0x0, r4}) (async) write$UHID_INPUT(r0, &(0x7f0000001040)={0x8, {"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", 0x1000}}, 0x1006) [ 830.631424] erofs: root inode @ nid 36 [ 830.640540] erofs: options -> [ 830.663779] erofs: bogus i_mode (0) @ nid 36 [ 830.669287] erofs: cannot read erofs superblock 19:41:51 executing program 5: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b0046701c903000c0024", 0xf, 0x400}, {&(0x7f0000000280)="05", 0x1, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000080)={[{@fault_injection}]}) [ 830.708770] FAULT_INJECTION: forcing a failure. [ 830.708770] name failslab, interval 1, probability 0, space 0, times 0 [ 830.732096] CPU: 1 PID: 8624 Comm: syz-executor.1 Not tainted 4.19.211-syzkaller #0 [ 830.739926] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 830.749293] Call Trace: [ 830.751889] dump_stack+0x1fc/0x2ef [ 830.755528] should_fail.cold+0xa/0xf [ 830.759337] ? setup_fault_attr+0x200/0x200 [ 830.763673] ? lock_acquire+0x170/0x3c0 [ 830.767667] __should_failslab+0x115/0x180 [ 830.771920] should_failslab+0x5/0x10 [ 830.775735] kmem_cache_alloc_node_trace+0x244/0x3b0 [ 830.780856] __kmalloc_node+0x38/0x70 [ 830.784665] kvmalloc_node+0x61/0xf0 [ 830.788386] __list_lru_init+0x4c6/0x7f0 [ 830.792455] ? up_read+0xb3/0x110 [ 830.795921] sget_userns+0x810/0xcd0 [ 830.799646] ? set_bdev_super+0x110/0x110 [ 830.803803] ? ns_test_super+0x50/0x50 [ 830.807698] ? set_bdev_super+0x110/0x110 [ 830.811849] ? ns_test_super+0x50/0x50 [ 830.815738] sget+0x102/0x140 [ 830.818847] mount_bdev+0xf8/0x3b0 [ 830.822387] ? gb_gbphy_register_driver.cold+0x39/0x39 [ 830.827672] erofs_mount+0x8c/0xc0 [ 830.831217] ? erofs_kill_sb+0x20/0x20 [ 830.835110] ? alloc_pages_current+0x19b/0x2a0 [ 830.839707] ? __lockdep_init_map+0x100/0x5a0 [ 830.842316] erofs: read_super, device -> /dev/loop2 [ 830.844754] mount_fs+0xa3/0x310 [ 830.850654] erofs: options -> fault_injection=0x0000000000000000, [ 830.853124] vfs_kern_mount.part.0+0x68/0x470 [ 830.853145] do_mount+0x115c/0x2f50 [ 830.853163] ? cmp_ex_sort+0xc0/0xc0 [ 830.853183] ? __do_page_fault+0x180/0xd60 [ 830.875424] ? copy_mount_string+0x40/0x40 [ 830.879694] ? memset+0x20/0x40 [ 830.882988] ? copy_mount_options+0x26f/0x380 [ 830.887496] ksys_mount+0xcf/0x130 [ 830.891047] __x64_sys_mount+0xba/0x150 [ 830.894812] erofs: cannot read erofs superblock [ 830.895027] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 830.904252] do_syscall_64+0xf9/0x620 19:41:51 executing program 4: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b0046701c803000c0024", 0xf, 0x400}, {&(0x7f0000000280)="05", 0x1, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000080)={[{@fault_injection}]}) [ 830.908066] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 830.913257] RIP: 0033:0x7ff03e6523ea [ 830.916980] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 830.935888] RSP: 002b:00007ff03cfc5f88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 830.943606] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007ff03e6523ea [ 830.950880] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007ff03cfc5fe0 19:41:52 executing program 0: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e0", 0x4, 0x400}, {0x0, 0xfcfdffff, 0x1000}], 0x0, &(0x7f0000000080)) [ 830.958283] RBP: 00007ff03cfc6020 R08: 00007ff03cfc6020 R09: 0000000020000000 [ 830.965558] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000000 [ 830.972928] R13: 0000000020000100 R14: 00007ff03cfc5fe0 R15: 0000000020000080 [ 831.000034] erofs: read_super, device -> /dev/loop3 [ 831.010397] erofs: options -> fault_injection=0x0000000000000000, [ 831.046904] erofs: FAULT_INJECTION was not selected [ 831.071522] erofs: read_super, device -> /dev/loop5 [ 831.077073] erofs: options -> fault_injection=0x0000000000000000, [ 831.082865] erofs: root inode @ nid 0 [ 831.110129] erofs: read_super, device -> /dev/loop0 [ 831.115188] erofs: options -> 19:41:52 executing program 1: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c0024", 0xf, 0x400}, {&(0x7f0000000280)="050000040041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000080)) (fail_nth: 48) 19:41:52 executing program 2: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c0024", 0xf, 0x400}, {&(0x7f0000000280)="05000000c041", 0x6, 0x480}, {0x0, 0xf6ffffff00000000, 0x1000}], 0x0, &(0x7f0000000080)={[{@fault_injection}]}) 19:41:52 executing program 0: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e0", 0x4, 0x400}, {0x0, 0xfdfdffff, 0x1000}], 0x0, &(0x7f0000000080)) [ 831.119046] erofs: cannot read erofs superblock [ 831.124382] erofs: bogus i_mode (0) @ nid 0 [ 831.130353] erofs: FAULT_INJECTION was not selected [ 831.135382] erofs: root inode @ nid 36 [ 831.144678] erofs: bogus i_mode (0) @ nid 36 [ 831.250323] FAULT_INJECTION: forcing a failure. [ 831.250323] name failslab, interval 1, probability 0, space 0, times 0 [ 831.270961] erofs: read_super, device -> /dev/loop2 19:41:52 executing program 5: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b0046701ca03000c0024", 0xf, 0x400}, {&(0x7f0000000280)="05", 0x1, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000080)={[{@fault_injection}]}) 19:41:52 executing program 3: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b0046701009f030c", 0xd, 0x400}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000080)={[{@fault_injection}]}) [ 831.299229] erofs: options -> fault_injection=0x0000000000000000, [ 831.329891] CPU: 0 PID: 8653 Comm: syz-executor.1 Not tainted 4.19.211-syzkaller #0 [ 831.337719] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 831.340761] erofs: cannot read erofs superblock [ 831.347079] Call Trace: [ 831.347103] dump_stack+0x1fc/0x2ef [ 831.347123] should_fail.cold+0xa/0xf [ 831.347139] ? setup_fault_attr+0x200/0x200 [ 831.347154] ? lock_acquire+0x170/0x3c0 [ 831.347172] __should_failslab+0x115/0x180 [ 831.347191] should_failslab+0x5/0x10 [ 831.378078] kmem_cache_alloc_node_trace+0x244/0x3b0 [ 831.383192] __kmalloc_node+0x38/0x70 [ 831.387005] kvmalloc_node+0x61/0xf0 [ 831.390724] __list_lru_init+0x4c6/0x7f0 [ 831.394787] ? up_read+0xb3/0x110 [ 831.398243] sget_userns+0x810/0xcd0 [ 831.401963] ? set_bdev_super+0x110/0x110 [ 831.406118] ? ns_test_super+0x50/0x50 [ 831.410010] ? set_bdev_super+0x110/0x110 [ 831.414159] ? ns_test_super+0x50/0x50 [ 831.418050] sget+0x102/0x140 [ 831.421160] mount_bdev+0xf8/0x3b0 [ 831.424707] ? gb_gbphy_register_driver.cold+0x39/0x39 [ 831.429992] erofs_mount+0x8c/0xc0 [ 831.433536] ? erofs_kill_sb+0x20/0x20 [ 831.437428] ? alloc_pages_current+0x19b/0x2a0 [ 831.442017] ? __lockdep_init_map+0x100/0x5a0 [ 831.446519] mount_fs+0xa3/0x310 [ 831.449893] vfs_kern_mount.part.0+0x68/0x470 [ 831.454404] do_mount+0x115c/0x2f50 [ 831.458039] ? cmp_ex_sort+0xc0/0xc0 [ 831.461759] ? __do_page_fault+0x180/0xd60 [ 831.465999] ? copy_mount_string+0x40/0x40 [ 831.470246] ? memset+0x20/0x40 [ 831.473525] ? copy_mount_options+0x26f/0x380 [ 831.478027] ksys_mount+0xcf/0x130 [ 831.481573] __x64_sys_mount+0xba/0x150 [ 831.485553] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 831.490140] do_syscall_64+0xf9/0x620 [ 831.493950] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 831.499137] RIP: 0033:0x7ff03e6523ea [ 831.502850] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 831.521840] RSP: 002b:00007ff03cfc5f88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 831.529555] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007ff03e6523ea [ 831.536828] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007ff03cfc5fe0 [ 831.544101] RBP: 00007ff03cfc6020 R08: 00007ff03cfc6020 R09: 0000000020000000 [ 831.551375] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000000 [ 831.558653] R13: 0000000020000100 R14: 00007ff03cfc5fe0 R15: 0000000020000080 19:41:52 executing program 2: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c0024", 0xf, 0x400}, {&(0x7f0000000280)="05000000c041", 0x6, 0x480}, {0x0, 0xff0f000000000000, 0x1000}], 0x0, &(0x7f0000000080)={[{@fault_injection}]}) 19:41:52 executing program 0: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e0", 0x4, 0x400}, {0x0, 0xfdffffff, 0x1000}], 0x0, &(0x7f0000000080)) [ 831.618228] erofs: read_super, device -> /dev/loop5 [ 831.623309] erofs: options -> fault_injection=0x0000000000000000, [ 831.633799] erofs: read_super, device -> /dev/loop0 [ 831.639175] erofs: options -> [ 831.645778] erofs: cannot read erofs superblock [ 831.690362] erofs: FAULT_INJECTION was not selected [ 831.719515] erofs: read_super, device -> /dev/loop3 [ 831.728012] erofs: options -> fault_injection=0x0000000000000000, [ 831.738759] erofs: root inode @ nid 36 [ 831.757138] erofs: bogus i_mode (0) @ nid 36 19:41:52 executing program 5: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b0046701cb03000c0024", 0xf, 0x400}, {&(0x7f0000000280)="05", 0x1, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000080)={[{@fault_injection}]}) [ 831.765041] erofs: FAULT_INJECTION was not selected [ 831.786852] erofs: root inode @ nid 0 [ 831.803953] erofs: bogus i_mode (0) @ nid 0 19:41:52 executing program 3: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b004670100a0030c", 0xd, 0x400}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000080)={[{@fault_injection}]}) [ 831.862970] erofs: read_super, device -> /dev/loop0 [ 831.868134] erofs: options -> [ 831.896880] erofs: cannot read erofs superblock [ 831.911811] erofs: read_super, device -> /dev/loop2 19:41:53 executing program 0: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e0", 0x4, 0x400}, {0x0, 0xff0f0000, 0x1000}], 0x0, &(0x7f0000000080)) [ 831.949357] erofs: options -> fault_injection=0x0000000000000000, [ 831.984141] erofs: read_super, device -> /dev/loop5 [ 831.990574] erofs: options -> fault_injection=0x0000000000000000, [ 832.014101] erofs: cannot read erofs superblock [ 832.031970] erofs: FAULT_INJECTION was not selected [ 832.034931] erofs: read_super, device -> /dev/loop3 [ 832.050190] erofs: options -> fault_injection=0x0000000000000000, [ 832.079809] erofs: read_super, device -> /dev/loop0 [ 832.083086] erofs: root inode @ nid 36 [ 832.087296] erofs: FAULT_INJECTION was not selected [ 832.098057] erofs: bogus i_mode (0) @ nid 36 [ 832.102793] erofs: options -> [ 832.106215] erofs: cannot read erofs superblock [ 832.106818] erofs: root inode @ nid 0 [ 832.124012] erofs: bogus i_mode (0) @ nid 0 [ 836.017373] IPVS: stopping master sync thread 6508 ... [ 836.126264] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 836.135212] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 836.144215] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 836.154300] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 836.162648] device bridge_slave_1 left promiscuous mode [ 836.168952] bridge0: port 2(bridge_slave_1) entered disabled state [ 836.176099] device bridge_slave_0 left promiscuous mode [ 836.182522] bridge0: port 1(bridge_slave_0) entered disabled state [ 836.193230] device veth1_macvtap left promiscuous mode [ 836.199154] device veth0_macvtap left promiscuous mode [ 836.205070] device veth1_vlan left promiscuous mode [ 836.211326] device veth0_vlan left promiscuous mode [ 838.296803] Bluetooth: hci0: command 0x0409 tx timeout [ 840.376671] Bluetooth: hci0: command 0x041b tx timeout [ 841.118273] device hsr_slave_1 left promiscuous mode [ 841.125762] device hsr_slave_0 left promiscuous mode [ 841.142943] team0 (unregistering): Port device team_slave_1 removed [ 841.152352] team0 (unregistering): Port device team_slave_0 removed [ 841.162113] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 841.173503] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 841.205467] bond0 (unregistering): Released all slaves [ 841.224811] IPVS: ftp: loaded support on port[0] = 21 [ 841.313528] chnl_net:caif_netlink_parms(): no params data found [ 841.481238] bridge0: port 1(bridge_slave_0) entered blocking state [ 841.493438] bridge0: port 1(bridge_slave_0) entered disabled state [ 841.502399] device bridge_slave_0 entered promiscuous mode [ 841.518092] bridge0: port 2(bridge_slave_1) entered blocking state [ 841.524522] bridge0: port 2(bridge_slave_1) entered disabled state [ 841.538496] device bridge_slave_1 entered promiscuous mode [ 841.572830] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 841.584741] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 841.621207] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 841.631190] team0: Port device team_slave_0 added [ 841.641732] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 841.651457] team0: Port device team_slave_1 added [ 841.684950] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 841.693597] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 841.725221] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 841.738311] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 841.744590] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 841.776900] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 841.793198] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 841.802679] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 841.841367] device hsr_slave_0 entered promiscuous mode [ 841.851696] device hsr_slave_1 entered promiscuous mode [ 841.861689] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 841.873949] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 842.019303] bridge0: port 2(bridge_slave_1) entered blocking state [ 842.025664] bridge0: port 2(bridge_slave_1) entered forwarding state [ 842.032285] bridge0: port 1(bridge_slave_0) entered blocking state [ 842.038683] bridge0: port 1(bridge_slave_0) entered forwarding state [ 842.085208] 8021q: adding VLAN 0 to HW filter on device bond0 [ 842.094789] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 842.105544] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 842.114153] bridge0: port 1(bridge_slave_0) entered disabled state [ 842.121035] bridge0: port 2(bridge_slave_1) entered disabled state [ 842.134078] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 842.140762] 8021q: adding VLAN 0 to HW filter on device team0 [ 842.151965] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 842.160794] bridge0: port 1(bridge_slave_0) entered blocking state [ 842.167210] bridge0: port 1(bridge_slave_0) entered forwarding state [ 842.187013] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 842.194709] bridge0: port 2(bridge_slave_1) entered blocking state [ 842.201120] bridge0: port 2(bridge_slave_1) entered forwarding state [ 842.219036] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 842.228035] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 842.236768] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 842.247663] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 842.256103] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 842.274210] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 842.281414] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 842.294974] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 842.302688] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 842.312403] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 842.328759] IPv6: ADDRCONF(NETDEV_UP): vxcan0: link is not ready [ 842.337637] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 842.343880] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 842.353001] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 842.364975] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 842.382222] IPv6: ADDRCONF(NETDEV_UP): veth0_virt_wifi: link is not ready [ 842.392849] IPv6: ADDRCONF(NETDEV_UP): veth1_virt_wifi: link is not ready [ 842.400862] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 842.409821] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 842.442243] IPv6: ADDRCONF(NETDEV_UP): veth0_vlan: link is not ready [ 842.450946] IPv6: ADDRCONF(NETDEV_UP): vlan0: link is not ready [ 842.457385] Bluetooth: hci0: command 0x040f tx timeout [ 842.461463] IPv6: ADDRCONF(NETDEV_UP): vlan1: link is not ready [ 842.472986] IPv6: ADDRCONF(NETDEV_UP): veth1_vlan: link is not ready [ 842.480042] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 842.487771] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 842.496088] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 842.503597] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 842.511841] device veth0_vlan entered promiscuous mode [ 842.524813] device veth1_vlan entered promiscuous mode [ 842.530929] IPv6: ADDRCONF(NETDEV_UP): macvlan0: link is not ready [ 842.541386] IPv6: ADDRCONF(NETDEV_UP): macvlan1: link is not ready [ 842.553083] IPv6: ADDRCONF(NETDEV_UP): veth0_macvtap: link is not ready [ 842.563330] IPv6: ADDRCONF(NETDEV_UP): veth1_macvtap: link is not ready [ 842.570295] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 842.577908] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 842.585081] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 842.592883] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 842.603422] device veth0_macvtap entered promiscuous mode [ 842.609805] IPv6: ADDRCONF(NETDEV_UP): macvtap0: link is not ready [ 842.619413] device veth1_macvtap entered promiscuous mode [ 842.625644] IPv6: ADDRCONF(NETDEV_UP): macsec0: link is not ready [ 842.635093] IPv6: ADDRCONF(NETDEV_UP): veth0_to_batadv: link is not ready [ 842.645344] IPv6: ADDRCONF(NETDEV_UP): veth1_to_batadv: link is not ready [ 842.654454] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 842.664523] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 842.673999] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 842.684030] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 842.693206] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 842.703510] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 842.712883] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 842.722678] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 842.731992] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 842.741778] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 842.752234] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_0: link is not ready [ 842.759597] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 842.766939] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 842.774177] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 842.781546] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 842.789591] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 842.801291] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 842.811311] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 842.820492] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 842.830253] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 842.839572] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 842.849643] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 842.859032] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 842.868856] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 842.878031] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 842.887803] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 842.898389] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_1: link is not ready [ 842.905296] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 842.913725] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 842.922015] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 843.043364] IPv6: ADDRCONF(NETDEV_UP): wlan0: link is not ready [ 843.055935] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 843.076607] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 843.093217] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready [ 843.105547] IPv6: ADDRCONF(NETDEV_UP): wlan1: link is not ready [ 843.114957] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 843.122674] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 843.129722] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready [ 843.163352] erofs: read_super, device -> /dev/loop4 [ 843.168825] erofs: options -> fault_injection=0x0000000000000000, [ 843.175216] erofs: FAULT_INJECTION was not selected [ 843.182503] erofs: root inode @ nid 36 [ 843.187382] erofs: bogus i_mode (0) @ nid 36 19:42:04 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) timer_create(0x6, &(0x7f0000000600)={0x0, 0x2b, 0x4, @tid=r0}, &(0x7f0000000340)) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) open(0x0, 0x6c2483, 0x18c) r1 = socket$nl_route(0x10, 0x3, 0x0) write$binfmt_elf64(r1, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], 0x46a) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f00000005c0)='/proc/sysvipc/msg\x00', 0x0, 0x0) ioctl$EVIOCSABS3F(r2, 0x401845ff, &(0x7f0000000200)={0x6, 0x3d1abc84, 0x7c, 0x1}) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$TIOCSETD(r3, 0x5423, &(0x7f0000000080)=0x3) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x4, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r4 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040), 0x429e41, 0x0) dup2(0xffffffffffffffff, r1) ioctl$EVIOCGPROP(r4, 0x40047438, &(0x7f0000000180)=""/246) pwritev(r4, &(0x7f0000000380)=[{&(0x7f00000010c0)="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"/4096, 0x1000}, {&(0x7f0000000400)="3d9c7e9dd799fe2bb80020307877a48044b9f07025b476cc9127b6e1eff4f9fa6fa5537f1aea08d69d9bcdf479048f3555947e65a377a8001e3d8bf10f2e7a5daf50d19abf72a0cc32ff58e90d413f6351ea9269253f916aeb15306392cd85d7cb00825ad0147d323c474d8b32f3d98fc3ac9092b4491263", 0x78}, {&(0x7f0000000480)="ddbf2011806e6720f319cf7328576c5012720676d84a2850003de9db12cfcf678d019c76b79320582d67d9d9e571b973616e6b40781ec3f1b435b3f02989f94c0f97948d7eb40fa30d34ab7b60e54947269ebf42004d943feb7c6aaf40e305797c4d8ee502250ecfa8969a5e46512b84d3910adadd7baf16836512e01c6600bf3dba330f622a890b81cfe7e3f5198eaa479f8fb4bb6cb29da01738d3c731118d05cc82b7018f2fb6b312aad5a940880f1c43ecb052624e41d8cbc7a05194ce7de7c588ea428b45cdc50c07b5fceb3f16ff584cb3e676a5ebf4113730733e88e1f9fa3fc220dc2ee0233d", 0xfffffcb8}], 0x3, 0xf1, 0x1) ioctl$TIOCSETD(r3, 0x5423, &(0x7f0000000280)=0x5) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000000c0)='sysfs\x00', 0x0, 0x0) 19:42:04 executing program 1: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c0024", 0xf, 0x400}, {&(0x7f0000000280)="050000040041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000080)) (fail_nth: 49) 19:42:04 executing program 2: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c0024", 0xf, 0x400}, {&(0x7f0000000280)="05000000c041", 0x6, 0x480}, {0x0, 0xffff1f0000000000, 0x1000}], 0x0, &(0x7f0000000080)={[{@fault_injection}]}) 19:42:04 executing program 0: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e0", 0x4, 0x400}, {0x0, 0xffff1f00, 0x1000}], 0x0, &(0x7f0000000080)) 19:42:04 executing program 3: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000050c", 0xd, 0x400}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000080)={[{@fault_injection}]}) 19:42:04 executing program 5: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b0046701cc03000c0024", 0xf, 0x400}, {&(0x7f0000000280)="05", 0x1, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000080)={[{@fault_injection}]}) [ 843.274824] erofs: read_super, device -> /dev/loop2 [ 843.283066] erofs: read_super, device -> /dev/loop0 [ 843.293140] erofs: options -> fault_injection=0x0000000000000000, [ 843.301210] erofs: options -> [ 843.305110] erofs: cannot read erofs superblock [ 843.311517] erofs: cannot read erofs superblock 19:42:04 executing program 2: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c0024", 0xf, 0x400}, {&(0x7f0000000280)="05000000c041", 0x6, 0x480}, {0x0, 0xffffff7f00000000, 0x1000}], 0x0, &(0x7f0000000080)={[{@fault_injection}]}) [ 843.323622] FAULT_INJECTION: forcing a failure. [ 843.323622] name failslab, interval 1, probability 0, space 0, times 0 [ 843.324976] erofs: read_super, device -> /dev/loop3 [ 843.335498] erofs: read_super, device -> /dev/loop5 [ 843.355082] erofs: options -> fault_injection=0x0000000000000000, [ 843.360490] erofs: options -> fault_injection=0x0000000000000000, [ 843.369117] erofs: FAULT_INJECTION was not selected [ 843.374281] erofs: root inode @ nid 0 [ 843.374661] CPU: 1 PID: 9024 Comm: syz-executor.1 Not tainted 4.19.211-syzkaller #0 [ 843.381943] erofs: bogus i_mode (0) @ nid 0 [ 843.385867] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 843.385873] Call Trace: [ 843.385894] dump_stack+0x1fc/0x2ef [ 843.385915] should_fail.cold+0xa/0xf [ 843.409528] ? setup_fault_attr+0x200/0x200 [ 843.413856] ? lock_acquire+0x170/0x3c0 [ 843.417111] mkiss: ax0: crc mode is auto. [ 843.417841] __should_failslab+0x115/0x180 [ 843.417860] should_failslab+0x5/0x10 [ 843.417875] kmem_cache_alloc_node_trace+0x244/0x3b0 [ 843.417893] __kmalloc_node+0x38/0x70 [ 843.431614] erofs: FAULT_INJECTION was not selected [ 843.435123] kvmalloc_node+0x61/0xf0 [ 843.435142] __list_lru_init+0x4c6/0x7f0 [ 843.435156] ? up_read+0xb3/0x110 [ 843.435174] sget_userns+0x810/0xcd0 [ 843.435188] ? set_bdev_super+0x110/0x110 [ 843.435206] ? ns_test_super+0x50/0x50 [ 843.435220] ? set_bdev_super+0x110/0x110 [ 843.435233] ? ns_test_super+0x50/0x50 [ 843.435247] sget+0x102/0x140 [ 843.435262] mount_bdev+0xf8/0x3b0 [ 843.435277] ? gb_gbphy_register_driver.cold+0x39/0x39 [ 843.435295] erofs_mount+0x8c/0xc0 [ 843.435310] ? erofs_kill_sb+0x20/0x20 [ 843.435329] ? alloc_pages_current+0x19b/0x2a0 [ 843.435343] ? __lockdep_init_map+0x100/0x5a0 [ 843.435358] mount_fs+0xa3/0x310 [ 843.435378] vfs_kern_mount.part.0+0x68/0x470 [ 843.435397] do_mount+0x115c/0x2f50 [ 843.435413] ? cmp_ex_sort+0xc0/0xc0 [ 843.435429] ? __do_page_fault+0x180/0xd60 [ 843.447966] erofs: root inode @ nid 36 [ 843.451958] ? copy_mount_string+0x40/0x40 [ 843.451983] ? memset+0x20/0x40 [ 843.452001] ? copy_mount_options+0x26f/0x380 [ 843.455733] erofs: bogus i_mode (0) @ nid 36 [ 843.459136] ksys_mount+0xcf/0x130 [ 843.459152] __x64_sys_mount+0xba/0x150 [ 843.459169] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 843.459183] do_syscall_64+0xf9/0x620 [ 843.459203] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 843.459215] RIP: 0033:0x7ff03e6523ea [ 843.459227] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 843.459234] RSP: 002b:00007ff03cfc5f88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 843.459246] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007ff03e6523ea [ 843.459254] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007ff03cfc5fe0 [ 843.459262] RBP: 00007ff03cfc6020 R08: 00007ff03cfc6020 R09: 0000000020000000 [ 843.459269] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000000 [ 843.459277] R13: 0000000020000100 R14: 00007ff03cfc5fe0 R15: 0000000020000080 19:42:04 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) timer_create(0x6, &(0x7f0000000600)={0x0, 0x2b, 0x4, @tid=r0}, &(0x7f0000000340)) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) open(0x0, 0x6c2483, 0x18c) r1 = socket$nl_route(0x10, 0x3, 0x0) write$binfmt_elf64(r1, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], 0x46a) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f00000005c0)='/proc/sysvipc/msg\x00', 0x0, 0x0) ioctl$EVIOCSABS3F(r2, 0x401845ff, &(0x7f0000000200)={0x6, 0x3d1abc84, 0x7c, 0x1}) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$TIOCSETD(r3, 0x5423, &(0x7f0000000080)=0x3) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x4, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r4 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040), 0x429e41, 0x0) dup2(0xffffffffffffffff, r1) ioctl$EVIOCGPROP(r4, 0x40047438, &(0x7f0000000180)=""/246) pwritev(r4, &(0x7f0000000380)=[{&(0x7f00000010c0)="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"/4096, 0x1000}, {&(0x7f0000000400)="3d9c7e9dd799fe2bb80020307877a48044b9f07025b476cc9127b6e1eff4f9fa6fa5537f1aea08d69d9bcdf479048f3555947e65a377a8001e3d8bf10f2e7a5daf50d19abf72a0cc32ff58e90d413f6351ea9269253f916aeb15306392cd85d7cb00825ad0147d323c474d8b32f3d98fc3ac9092b4491263", 0x78}, {&(0x7f0000000480)="ddbf2011806e6720f319cf7328576c5012720676d84a2850003de9db12cfcf678d019c76b79320582d67d9d9e571b973616e6b40781ec3f1b435b3f02989f94c0f97948d7eb40fa30d34ab7b60e54947269ebf42004d943feb7c6aaf40e305797c4d8ee502250ecfa8969a5e46512b84d3910adadd7baf16836512e01c6600bf3dba330f622a890b81cfe7e3f5198eaa479f8fb4bb6cb29da01738d3c731118d05cc82b7018f2fb6b312aad5a940880f1c43ecb052624e41d8cbc7a05194ce7de7c588ea428b45cdc50c07b5fceb3f16ff584cb3e676a5ebf4113730733e88e1f9fa3fc220dc2ee0233d", 0xfffffcb8}], 0x3, 0xf1, 0x1) ioctl$TIOCSETD(r3, 0x5423, &(0x7f0000000280)=0x5) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000000c0)='sysfs\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) getpid() (async) sched_setscheduler(r0, 0x5, &(0x7f0000000380)) (async) timer_create(0x6, &(0x7f0000000600)={0x0, 0x2b, 0x4, @tid=r0}, &(0x7f0000000340)) (async) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) (async) open(0x0, 0x6c2483, 0x18c) (async) socket$nl_route(0x10, 0x3, 0x0) (async) write$binfmt_elf64(r1, &(0x7f0000000640)=ANY=[@ANYBLOB="7f454c4624050300ff0700000000000002003e00ff7f00008e030000000000004000000000000000530000000000000008000000db0038000200daf30400ff03040000000000000000010000710000000700000000000000010100006096680501010000000000000500000000000000f207000000000000dc95cb805a27529096a7333de5e7489329c23b059a94f51c30c6ec08a003066f42b072b594f0e82c6bee1faccd3ca747a01ab19ef1391bd78132082568abbdaead203b0994be266c2e39ec72942a1d57bd59cb93e21400c8de62dc8699cd924852595a41ad421929220000000000729fc1e7f182bcf3ec86e5845d7b7d378c13930115fd1fdcbe7d70caffe083c78734f7f6ded232f62c3908d02e23f36be7f5b863da15d01ae1319b56f7a8569bf5411b914f0e8eb6afb40b4033080378b8128752777b690486a3b4444f58e3704cfd7aceaa467870dc4ccf659df1c6ce34bff4131329f0d98a7203b5bb8544af2cf392b6ed9a204039497f0000000000000000f6ae4f2ecf7fb382ac710000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ee00000000000000d6b50000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000850800000000000000000000000000000000000000000000f2a8b0ab00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000070bd9a1fedc4cfb0d4ac000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000eeff00000000000000000000000000000000000000000500000000000000000004045ba7301471146700000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000200000000000000000000000000000000000000010001000000000000f3ffffff000000000000006db9f10a616e00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002ad2731c6235e520000000000000000000000000000000000000000000e7000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000006543e119006472e816c58000000000000000000000000000000000000000000000000000000000000000000000000b97b7f509b35b09e00000000000000000000000000000000000000000000000000000000000000000000a1000000000000000000000000000000000000000000000000000000000000000000000000000b1f260000000000db02b5653f09b519bf1dc63ad2037427b598e3f6af1b968fca2c917ae22f131e65496c0f9cfa56a651dbe510521364af765c05eb2b69720c9304b9fe07089fb62bc98921f7d79750de5317f56f46ea0fff048b94e24046b05f9ebf69fa71a39df1d4ec227f58c686cfdfefe5584563b560476c03813fb403e8ed01c15e1cc286927fc3c54a2adf73c14cf0383df0e9b83aea45865a570fd74228745f7b9bab55cb905fba5edab5fb311187cbe8c95ca880b71f9b252c6980f775c9af261b45d1fd4df8d06ac86a92be9f1c0f82817d64e0a475595df60c108a7330954887499f4ec9398478e66030fb0c2db53748a31439721bd37b5ff3c3a1a119bb9c59cede07634747ed175da4ede303f433a69fb09ab1e583ce9cce79c60a80ded8efc488e4b978b95e71b998e6c427282e872170fdb7b015276cb095b9d3cc861c2c178979dae8500cc39065e6f41d343d84ae2b3ac01b76ebbe35315aa2d262e3bd5fea36d40f6880022a15c60703495d9fa8e1ac26902539dd6f2aaa770ae8ae5327d7055bd1f4622f6f1e61e6f2c37ebe5a0000f425c6091f66f5fc4c93d78662226bc29cc5001f3d1ada2159f91243660ace09b10bf2a5947e5097e4540ad4ac87a6bea25a4ff24e296319784dcf0995b0415b287240d151f4bc21ff14d02570c39b93de973e8084c7afb87cb5d754251b3cb9107401f5789d9906e1f5925c3b79ac106ab694ab7f093e5de3190f4518692fc9e1b728c9b3d4734571ed7a632fedc33142d5854750aae3dba771a6e7a23b0774fa5dd6cf5f8f3117adfd5895549fef6498e277ce3c53000000000000033fb872a65b1b378c1173c7a8f17bc6a2aef6b4ab0ede8cf65703f78d81a183dcd24acdfcb750bda2bbce2c65e69a167aba44f1954bff36299d12b74e0f22fba76d20a74acd87b5a2fc9a099e5896e26174454e62224dbff8ff758df7952ce802c42cd15382525f0a9002f6a6b4d403eebf5e593c3085cd688978de955268f8e83ece490b771b6ab484bb4c559b24a0c060182cb66d7fd7490b702fff05977b71edb9f8f49aad2a2e0d26b75d5bb5dfff6a83ca22e7bd85143e161449e82e1c6952620feaf23941a5f583c16eb5aa2c69713b6fff389d8115161c9ccd1f8c02e67b87239f222f0d33ee40910fffb74a485b055484292a3eef94edd2497ed44f5f39f8f23d36e819392f1f3bd5e4a3d65bae3c29afdd7141d724310482e7d357c2067eb41351a92150a9ca35ff3689881cb6878b850f3daaa237d5873a342f9d5410534abd038e67c4d8e095d555cead451b2fda9600bb7c1ec45f93537a7e9a17c4efa20563c996ae89f753dc4cbd332958450dfd35179f88a0559dd01adb145771f07b8aca396941a5fd82d2a78614c240c3eae920198059129905d813dc726be785fecc1e0010d4b707a45a7d383d18fecd01818a6008b8d64de3b7acb074199bf8476b97a1d234621f7d1acb09d6c0a786049b2a30eb990bc58351f235f73633cb5753da62d7238c95b4f8000000000000000000"], 0x46a) (async) openat$procfs(0xffffffffffffff9c, &(0x7f00000005c0)='/proc/sysvipc/msg\x00', 0x0, 0x0) (async) ioctl$EVIOCSABS3F(r2, 0x401845ff, &(0x7f0000000200)={0x6, 0x3d1abc84, 0x7c, 0x1}) (async) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) (async) ioctl$TIOCSETD(r3, 0x5423, &(0x7f0000000080)=0x3) (async) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x4, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) (async) openat$ppp(0xffffffffffffff9c, &(0x7f0000000040), 0x429e41, 0x0) (async) dup2(0xffffffffffffffff, r1) (async) ioctl$EVIOCGPROP(r4, 0x40047438, &(0x7f0000000180)=""/246) (async) pwritev(r4, &(0x7f0000000380)=[{&(0x7f00000010c0)="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"/4096, 0x1000}, {&(0x7f0000000400)="3d9c7e9dd799fe2bb80020307877a48044b9f07025b476cc9127b6e1eff4f9fa6fa5537f1aea08d69d9bcdf479048f3555947e65a377a8001e3d8bf10f2e7a5daf50d19abf72a0cc32ff58e90d413f6351ea9269253f916aeb15306392cd85d7cb00825ad0147d323c474d8b32f3d98fc3ac9092b4491263", 0x78}, {&(0x7f0000000480)="ddbf2011806e6720f319cf7328576c5012720676d84a2850003de9db12cfcf678d019c76b79320582d67d9d9e571b973616e6b40781ec3f1b435b3f02989f94c0f97948d7eb40fa30d34ab7b60e54947269ebf42004d943feb7c6aaf40e305797c4d8ee502250ecfa8969a5e46512b84d3910adadd7baf16836512e01c6600bf3dba330f622a890b81cfe7e3f5198eaa479f8fb4bb6cb29da01738d3c731118d05cc82b7018f2fb6b312aad5a940880f1c43ecb052624e41d8cbc7a05194ce7de7c588ea428b45cdc50c07b5fceb3f16ff584cb3e676a5ebf4113730733e88e1f9fa3fc220dc2ee0233d", 0xfffffcb8}], 0x3, 0xf1, 0x1) (async) ioctl$TIOCSETD(r3, 0x5423, &(0x7f0000000280)=0x5) (async) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000000c0)='sysfs\x00', 0x0, 0x0) (async) 19:42:04 executing program 3: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000060c", 0xd, 0x400}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000080)={[{@fault_injection}]}) 19:42:04 executing program 0: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e0", 0x4, 0x400}, {0x0, 0xfffffdfc, 0x1000}], 0x0, &(0x7f0000000080)) 19:42:04 executing program 5: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b0046701cd03000c0024", 0xf, 0x400}, {&(0x7f0000000280)="05", 0x1, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000080)={[{@fault_injection}]}) 19:42:04 executing program 1: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c0024", 0xf, 0x400}, {&(0x7f0000000280)="050000040041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000080)) (fail_nth: 50) [ 843.832029] FAULT_INJECTION: forcing a failure. [ 843.832029] name failslab, interval 1, probability 0, space 0, times 0 [ 843.852393] CPU: 1 PID: 9066 Comm: syz-executor.1 Not tainted 4.19.211-syzkaller #0 [ 843.860218] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 843.869833] Call Trace: [ 843.872428] dump_stack+0x1fc/0x2ef [ 843.876061] should_fail.cold+0xa/0xf [ 843.879869] ? setup_fault_attr+0x200/0x200 [ 843.882082] mkiss: ax0: crc mode is auto. [ 843.884190] ? lock_acquire+0x170/0x3c0 [ 843.884213] __should_failslab+0x115/0x180 [ 843.884232] should_failslab+0x5/0x10 [ 843.884251] kmem_cache_alloc_node_trace+0x244/0x3b0 [ 843.905437] __kmalloc_node+0x38/0x70 [ 843.909249] kvmalloc_node+0x61/0xf0 [ 843.912979] __list_lru_init+0x4c6/0x7f0 [ 843.917047] ? up_read+0xb3/0x110 [ 843.920509] sget_userns+0x7e2/0xcd0 [ 843.924220] ? set_bdev_super+0x110/0x110 [ 843.928379] ? ns_test_super+0x50/0x50 [ 843.932270] ? set_bdev_super+0x110/0x110 [ 843.936421] ? ns_test_super+0x50/0x50 [ 843.940324] sget+0x102/0x140 [ 843.943442] mount_bdev+0xf8/0x3b0 [ 843.947001] ? gb_gbphy_register_driver.cold+0x39/0x39 [ 843.952292] erofs_mount+0x8c/0xc0 [ 843.955838] ? erofs_kill_sb+0x20/0x20 [ 843.959734] ? alloc_pages_current+0x19b/0x2a0 [ 843.964318] ? __lockdep_init_map+0x100/0x5a0 [ 843.968820] mount_fs+0xa3/0x310 [ 843.972389] vfs_kern_mount.part.0+0x68/0x470 [ 843.976903] do_mount+0x115c/0x2f50 [ 843.980597] ? cmp_ex_sort+0xc0/0xc0 [ 843.984322] ? __do_page_fault+0x180/0xd60 [ 843.988562] ? copy_mount_string+0x40/0x40 [ 843.992811] ? memset+0x20/0x40 [ 843.996099] ? copy_mount_options+0x26f/0x380 [ 844.000593] ksys_mount+0xcf/0x130 [ 844.004130] __x64_sys_mount+0xba/0x150 [ 844.008111] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 844.012699] do_syscall_64+0xf9/0x620 [ 844.016509] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 844.021698] RIP: 0033:0x7ff03e6523ea [ 844.025416] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 844.044321] RSP: 002b:00007ff03cfc5f88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 844.047150] erofs: read_super, device -> /dev/loop2 [ 844.052034] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007ff03e6523ea [ 844.052043] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007ff03cfc5fe0 [ 844.052051] RBP: 00007ff03cfc6020 R08: 00007ff03cfc6020 R09: 0000000020000000 [ 844.052059] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000000 [ 844.052068] R13: 0000000020000100 R14: 00007ff03cfc5fe0 R15: 0000000020000080 [ 844.100600] erofs: read_super, device -> /dev/loop3 [ 844.101722] erofs: options -> fault_injection=0x0000000000000000, [ 844.105637] erofs: options -> fault_injection=0x0000000000000000, [ 844.105716] erofs: FAULT_INJECTION was not selected [ 844.112469] erofs: cannot read erofs superblock [ 844.127956] erofs: read_super, device -> /dev/loop5 [ 844.128553] erofs: read_super, device -> /dev/loop0 [ 844.133589] erofs: options -> fault_injection=0x0000000000000000, [ 844.143480] erofs: options -> [ 844.203418] erofs: cannot read erofs superblock 19:42:05 executing program 2: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c0024", 0xf, 0x400}, {&(0x7f0000000280)="05000000c041", 0x6, 0x480}, {0x0, 0xffffffff00000000, 0x1000}], 0x0, &(0x7f0000000080)={[{@fault_injection}]}) [ 844.247082] erofs: root inode @ nid 0 [ 844.255306] erofs: bogus i_mode (0) @ nid 0 [ 844.256802] erofs: FAULT_INJECTION was not selected [ 844.281809] erofs: root inode @ nid 36 [ 844.286388] erofs: bogus i_mode (0) @ nid 36 19:42:05 executing program 0: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e0", 0x4, 0x400}, {0x0, 0xfffffdfd, 0x1000}], 0x0, &(0x7f0000000080)) 19:42:05 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) (async) timer_create(0x6, &(0x7f0000000600)={0x0, 0x2b, 0x4, @tid=r0}, &(0x7f0000000340)) (async) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) (async) open(0x0, 0x6c2483, 0x18c) r1 = socket$nl_route(0x10, 0x3, 0x0) write$binfmt_elf64(r1, &(0x7f0000000640)=ANY=[@ANYBLOB="7f454c4624050300ff0700000000000002003e00ff7f00008e030000000000004000000000000000530000000000000008000000db0038000200daf30400ff03040000000000000000010000710000000700000000000000010100006096680501010000000000000500000000000000f207000000000000dc95cb805a27529096a7333de5e7489329c23b059a94f51c30c6ec08a003066f42b072b594f0e82c6bee1faccd3ca747a01ab19ef1391bd78132082568abbdaead203b0994be266c2e39ec72942a1d57bd59cb93e21400c8de62dc8699cd924852595a41ad421929220000000000729fc1e7f182bcf3ec86e5845d7b7d378c13930115fd1fdcbe7d70caffe083c78734f7f6ded232f62c3908d02e23f36be7f5b863da15d01ae1319b56f7a8569bf5411b914f0e8eb6afb40b4033080378b8128752777b690486a3b4444f58e3704cfd7aceaa467870dc4ccf659df1c6ce34bff4131329f0d98a7203b5bb8544af2cf392b6ed9a204039497f0000000000000000f6ae4f2ecf7fb382ac710000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ee00000000000000d6b50000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000850800000000000000000000000000000000000000000000f2a8b0ab00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000070bd9a1fedc4cfb0d4ac000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000eeff00000000000000000000000000000000000000000500000000000000000004045ba7301471146700000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000200000000000000000000000000000000000000010001000000000000f3ffffff000000000000006db9f10a616e00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002ad2731c6235e520000000000000000000000000000000000000000000e7000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000006543e119006472e816c58000000000000000000000000000000000000000000000000000000000000000000000000b97b7f509b35b09e00000000000000000000000000000000000000000000000000000000000000000000a1000000000000000000000000000000000000000000000000000000000000000000000000000b1f260000000000db02b5653f09b519bf1dc63ad2037427b598e3f6af1b968fca2c917ae22f131e65496c0f9cfa56a651dbe510521364af765c05eb2b69720c9304b9fe07089fb62bc98921f7d79750de5317f56f46ea0fff048b94e24046b05f9ebf69fa71a39df1d4ec227f58c686cfdfefe5584563b560476c03813fb403e8ed01c15e1cc286927fc3c54a2adf73c14cf0383df0e9b83aea45865a570fd74228745f7b9bab55cb905fba5edab5fb311187cbe8c95ca880b71f9b252c6980f775c9af261b45d1fd4df8d06ac86a92be9f1c0f82817d64e0a475595df60c108a7330954887499f4ec9398478e66030fb0c2db53748a31439721bd37b5ff3c3a1a119bb9c59cede07634747ed175da4ede303f433a69fb09ab1e583ce9cce79c60a80ded8efc488e4b978b95e71b998e6c427282e872170fdb7b015276cb095b9d3cc861c2c178979dae8500cc39065e6f41d343d84ae2b3ac01b76ebbe35315aa2d262e3bd5fea36d40f6880022a15c60703495d9fa8e1ac26902539dd6f2aaa770ae8ae5327d7055bd1f4622f6f1e61e6f2c37ebe5a0000f425c6091f66f5fc4c93d78662226bc29cc5001f3d1ada2159f91243660ace09b10bf2a5947e5097e4540ad4ac87a6bea25a4ff24e296319784dcf0995b0415b287240d151f4bc21ff14d02570c39b93de973e8084c7afb87cb5d754251b3cb9107401f5789d9906e1f5925c3b79ac106ab694ab7f093e5de3190f4518692fc9e1b728c9b3d4734571ed7a632fedc33142d5854750aae3dba771a6e7a23b0774fa5dd6cf5f8f3117adfd5895549fef6498e277ce3c53000000000000033fb872a65b1b378c1173c7a8f17bc6a2aef6b4ab0ede8cf65703f78d81a183dcd24acdfcb750bda2bbce2c65e69a167aba44f1954bff36299d12b74e0f22fba76d20a74acd87b5a2fc9a099e5896e26174454e62224dbff8ff758df7952ce802c42cd15382525f0a9002f6a6b4d403eebf5e593c3085cd688978de955268f8e83ece490b771b6ab484bb4c559b24a0c060182cb66d7fd7490b702fff05977b71edb9f8f49aad2a2e0d26b75d5bb5dfff6a83ca22e7bd85143e161449e82e1c6952620feaf23941a5f583c16eb5aa2c69713b6fff389d8115161c9ccd1f8c02e67b87239f222f0d33ee40910fffb74a485b055484292a3eef94edd2497ed44f5f39f8f23d36e819392f1f3bd5e4a3d65bae3c29afdd7141d724310482e7d357c2067eb41351a92150a9ca35ff3689881cb6878b850f3daaa237d5873a342f9d5410534abd038e67c4d8e095d555cead451b2fda9600bb7c1ec45f93537a7e9a17c4efa20563c996ae89f753dc4cbd332958450dfd35179f88a0559dd01adb145771f07b8aca396941a5fd82d2a78614c240c3eae920198059129905d813dc726be785fecc1e0010d4b707a45a7d383d18fecd01818a6008b8d64de3b7acb074199bf8476b97a1d234621f7d1acb09d6c0a786049b2a30eb990bc58351f235f73633cb5753da62d7238c95b4f8000000000000000000"], 0x46a) (async) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f00000005c0)='/proc/sysvipc/msg\x00', 0x0, 0x0) ioctl$EVIOCSABS3F(r2, 0x401845ff, &(0x7f0000000200)={0x6, 0x3d1abc84, 0x7c, 0x1}) (async) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$TIOCSETD(r3, 0x5423, &(0x7f0000000080)=0x3) (async) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x4, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) (async) r4 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040), 0x429e41, 0x0) dup2(0xffffffffffffffff, r1) (async) ioctl$EVIOCGPROP(r4, 0x40047438, &(0x7f0000000180)=""/246) pwritev(r4, &(0x7f0000000380)=[{&(0x7f00000010c0)="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"/4096, 0x1000}, {&(0x7f0000000400)="3d9c7e9dd799fe2bb80020307877a48044b9f07025b476cc9127b6e1eff4f9fa6fa5537f1aea08d69d9bcdf479048f3555947e65a377a8001e3d8bf10f2e7a5daf50d19abf72a0cc32ff58e90d413f6351ea9269253f916aeb15306392cd85d7cb00825ad0147d323c474d8b32f3d98fc3ac9092b4491263", 0x78}, {&(0x7f0000000480)="ddbf2011806e6720f319cf7328576c5012720676d84a2850003de9db12cfcf678d019c76b79320582d67d9d9e571b973616e6b40781ec3f1b435b3f02989f94c0f97948d7eb40fa30d34ab7b60e54947269ebf42004d943feb7c6aaf40e305797c4d8ee502250ecfa8969a5e46512b84d3910adadd7baf16836512e01c6600bf3dba330f622a890b81cfe7e3f5198eaa479f8fb4bb6cb29da01738d3c731118d05cc82b7018f2fb6b312aad5a940880f1c43ecb052624e41d8cbc7a05194ce7de7c588ea428b45cdc50c07b5fceb3f16ff584cb3e676a5ebf4113730733e88e1f9fa3fc220dc2ee0233d", 0xfffffcb8}], 0x3, 0xf1, 0x1) (async) ioctl$TIOCSETD(r3, 0x5423, &(0x7f0000000280)=0x5) (async) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000000c0)='sysfs\x00', 0x0, 0x0) 19:42:05 executing program 1: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c0024", 0xf, 0x400}, {&(0x7f0000000280)="050000040041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000080)) (fail_nth: 51) 19:42:05 executing program 3: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000070c", 0xd, 0x400}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000080)={[{@fault_injection}]}) [ 844.436433] erofs: read_super, device -> /dev/loop2 [ 844.441484] erofs: options -> fault_injection=0x0000000000000000, [ 844.453808] FAULT_INJECTION: forcing a failure. [ 844.453808] name failslab, interval 1, probability 0, space 0, times 0 [ 844.468075] CPU: 0 PID: 9116 Comm: syz-executor.1 Not tainted 4.19.211-syzkaller #0 [ 844.475896] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 844.485350] Call Trace: [ 844.487948] dump_stack+0x1fc/0x2ef [ 844.491591] should_fail.cold+0xa/0xf [ 844.495423] ? setup_fault_attr+0x200/0x200 [ 844.499759] ? lock_acquire+0x170/0x3c0 [ 844.503924] __should_failslab+0x115/0x180 [ 844.508172] should_failslab+0x5/0x10 [ 844.511995] kmem_cache_alloc_node_trace+0x244/0x3b0 [ 844.517112] __kmalloc_node+0x38/0x70 [ 844.518928] erofs: cannot read erofs superblock [ 844.520924] kvmalloc_node+0x61/0xf0 [ 844.520943] __list_lru_init+0x4c6/0x7f0 [ 844.520958] ? up_read+0xb3/0x110 [ 844.520978] sget_userns+0x810/0xcd0 [ 844.540549] ? set_bdev_super+0x110/0x110 [ 844.544720] ? ns_test_super+0x50/0x50 [ 844.548625] ? set_bdev_super+0x110/0x110 [ 844.552783] ? ns_test_super+0x50/0x50 [ 844.556678] sget+0x102/0x140 [ 844.559799] mount_bdev+0xf8/0x3b0 [ 844.563374] ? gb_gbphy_register_driver.cold+0x39/0x39 [ 844.568660] erofs_mount+0x8c/0xc0 [ 844.572210] ? erofs_kill_sb+0x20/0x20 [ 844.576104] ? alloc_pages_current+0x19b/0x2a0 [ 844.580688] ? __lockdep_init_map+0x100/0x5a0 19:42:05 executing program 5: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b0046701ce03000c0024", 0xf, 0x400}, {&(0x7f0000000280)="05", 0x1, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000080)={[{@fault_injection}]}) [ 844.585188] mount_fs+0xa3/0x310 [ 844.588562] vfs_kern_mount.part.0+0x68/0x470 [ 844.593066] do_mount+0x115c/0x2f50 [ 844.595015] mkiss: ax0: crc mode is auto. [ 844.596704] ? copy_mount_string+0x40/0x40 [ 844.596729] ? memset+0x20/0x40 [ 844.596744] ? copy_mount_options+0x26f/0x380 [ 844.596762] ksys_mount+0xcf/0x130 [ 844.596779] __x64_sys_mount+0xba/0x150 [ 844.596797] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 844.624958] do_syscall_64+0xf9/0x620 [ 844.628774] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 844.633956] RIP: 0033:0x7ff03e6523ea [ 844.637665] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 844.656551] RSP: 002b:00007ff03cfc5f88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 844.664243] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007ff03e6523ea [ 844.671589] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007ff03cfc5fe0 [ 844.678841] RBP: 00007ff03cfc6020 R08: 00007ff03cfc6020 R09: 0000000020000000 19:42:05 executing program 2: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c0024", 0xf, 0x400}, {&(0x7f0000000280)="05000000c041", 0x6, 0x480}, {0x0, 0xffffffffffffffff, 0x1000}], 0x0, &(0x7f0000000080)={[{@fault_injection}]}) [ 844.686099] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000000 [ 844.693362] R13: 0000000020000100 R14: 00007ff03cfc5fe0 R15: 0000000020000080 [ 844.707851] Bluetooth: hci0: command 0x0419 tx timeout 19:42:05 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="cd80", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={0x0, 0x0, 0x1c}, 0x20) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) wait4(r0, 0x0, 0x2, &(0x7f0000000140)) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() rt_sigqueueinfo(r1, 0xc, &(0x7f00000002c0)) [ 844.746697] erofs: read_super, device -> /dev/loop0 [ 844.746997] erofs: read_super, device -> /dev/loop3 [ 844.756836] erofs: options -> fault_injection=0x0000000000000000, [ 844.761312] erofs: options -> [ 844.763323] erofs: FAULT_INJECTION was not selected [ 844.773534] erofs: root inode @ nid 0 [ 844.774201] erofs: cannot read erofs superblock [ 844.778359] erofs: bogus i_mode (0) @ nid 0 19:42:05 executing program 1: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c0024", 0xf, 0x400}, {&(0x7f0000000280)="050000040041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000080)) (fail_nth: 52) [ 844.827494] erofs: read_super, device -> /dev/loop5 [ 844.841603] erofs: options -> fault_injection=0x0000000000000000, [ 844.848584] erofs: FAULT_INJECTION was not selected [ 844.853793] erofs: root inode @ nid 36 [ 844.859479] erofs: bogus i_mode (0) @ nid 36 19:42:05 executing program 5: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010005000c0024", 0xf, 0x400}, {&(0x7f0000000280)="05", 0x1, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000080)={[{@fault_injection}]}) 19:42:05 executing program 3: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000090c", 0xd, 0x400}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000080)={[{@fault_injection}]}) [ 844.887825] erofs: read_super, device -> /dev/loop2 19:42:05 executing program 0: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e0", 0x4, 0x400}, {0x0, 0xffffff7f, 0x1000}], 0x0, &(0x7f0000000080)) 19:42:06 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) (async) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="cd80", 0x2}], 0x1, 0x0) (async) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={0x0, 0x0, 0x1c}, 0x20) tkill(r0, 0x40) (async) wait4(0x0, 0x0, 0x0, 0x0) (async) wait4(r0, 0x0, 0x2, &(0x7f0000000140)) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) (async) r1 = gettid() rt_sigqueueinfo(r1, 0xc, &(0x7f00000002c0)) [ 844.920420] erofs: options -> fault_injection=0x0000000000000000, [ 844.945139] erofs: cannot read erofs superblock [ 844.955930] erofs: read_super, device -> /dev/loop5 [ 844.962965] erofs: options -> fault_injection=0x0000000000000000, 19:42:06 executing program 2: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c0024", 0xf, 0x400}, {&(0x7f0000000280)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x6}], 0x0, &(0x7f0000000080)={[{@fault_injection}]}) [ 844.970848] erofs: FAULT_INJECTION was not selected [ 844.975942] erofs: root inode @ nid 36 [ 844.981130] erofs: bogus i_mode (0) @ nid 36 [ 845.006849] erofs: read_super, device -> /dev/loop0 [ 845.012400] FAULT_INJECTION: forcing a failure. [ 845.012400] name failslab, interval 1, probability 0, space 0, times 0 [ 845.017891] erofs: options -> [ 845.024308] erofs: read_super, device -> /dev/loop3 [ 845.035094] erofs: options -> fault_injection=0x0000000000000000, [ 845.041747] CPU: 0 PID: 9162 Comm: syz-executor.1 Not tainted 4.19.211-syzkaller #0 [ 845.049560] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 845.058912] Call Trace: [ 845.060222] erofs: cannot read erofs superblock [ 845.061511] dump_stack+0x1fc/0x2ef [ 845.061533] should_fail.cold+0xa/0xf [ 845.061551] ? setup_fault_attr+0x200/0x200 [ 845.069347] erofs: FAULT_INJECTION was not selected [ 845.069817] ? lock_acquire+0x170/0x3c0 [ 845.073750] erofs: root inode @ nid 0 [ 845.077905] __should_failslab+0x115/0x180 [ 845.077925] should_failslab+0x5/0x10 [ 845.077937] __kmalloc+0x2ab/0x3c0 [ 845.077949] ? __list_lru_init+0xd3/0x7f0 [ 845.077964] __list_lru_init+0xd3/0x7f0 [ 845.077978] ? up_read+0xb3/0x110 [ 845.077994] sget_userns+0x810/0xcd0 [ 845.078012] ? set_bdev_super+0x110/0x110 [ 845.088082] erofs: bogus i_mode (0) @ nid 0 [ 845.090841] ? ns_test_super+0x50/0x50 [ 845.090859] ? set_bdev_super+0x110/0x110 [ 845.090873] ? ns_test_super+0x50/0x50 [ 845.090885] sget+0x102/0x140 [ 845.090900] mount_bdev+0xf8/0x3b0 [ 845.144490] ? gb_gbphy_register_driver.cold+0x39/0x39 [ 845.149757] erofs_mount+0x8c/0xc0 [ 845.153291] ? erofs_kill_sb+0x20/0x20 [ 845.157175] ? alloc_pages_current+0x19b/0x2a0 [ 845.161737] ? __lockdep_init_map+0x100/0x5a0 [ 845.166215] mount_fs+0xa3/0x310 [ 845.169568] vfs_kern_mount.part.0+0x68/0x470 [ 845.174054] do_mount+0x115c/0x2f50 [ 845.177680] ? cmp_ex_sort+0xc0/0xc0 [ 845.181395] ? __do_page_fault+0x180/0xd60 [ 845.185611] ? copy_mount_string+0x40/0x40 [ 845.189843] ? memset+0x20/0x40 [ 845.193112] ? copy_mount_options+0x26f/0x380 [ 845.197597] ksys_mount+0xcf/0x130 [ 845.201128] __x64_sys_mount+0xba/0x150 [ 845.205085] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 845.209651] do_syscall_64+0xf9/0x620 [ 845.213450] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 845.218627] RIP: 0033:0x7ff03e6523ea [ 845.222337] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 845.241220] RSP: 002b:00007ff03cfc5f88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 845.248909] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007ff03e6523ea [ 845.256168] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007ff03cfc5fe0 [ 845.263417] RBP: 00007ff03cfc6020 R08: 00007ff03cfc6020 R09: 0000000020000000 19:42:06 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) (async) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) (async) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) (async) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="cd80", 0x2}], 0x1, 0x0) (async) ptrace$setopts(0x4206, r0, 0x0, 0x0) (async) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={0x0, 0x0, 0x1c}, 0x20) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) (async) wait4(r0, 0x0, 0x2, &(0x7f0000000140)) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() rt_sigqueueinfo(r1, 0xc, &(0x7f00000002c0)) [ 845.270668] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000000 [ 845.277917] R13: 0000000020000100 R14: 00007ff03cfc5fe0 R15: 0000000020000080 19:42:06 executing program 5: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010006000c0024", 0xf, 0x400}, {&(0x7f0000000280)="05", 0x1, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000080)={[{@fault_injection}]}) 19:42:06 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000080)='\x00') ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40086602, &(0x7f0000000040)) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x5d, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000001, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r2, &(0x7f0000000000)=ANY=[], 0x32600) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x7a05, 0x1700) ioctl$TUNGETVNETHDRSZ(r1, 0x800454d7, &(0x7f0000000100)) write$cgroup_subtree(r2, &(0x7f0000000000)=ANY=[], 0xda00) perf_event_open(&(0x7f0000000600)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_QUERY(0x10, 0x0, 0x0) write$cgroup_int(r3, &(0x7f0000000200), 0x43408) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0xda00) write$cgroup_int(r4, &(0x7f00000004c0), 0x12) perf_event_open(&(0x7f0000000280)={0x0, 0x80, 0x2e, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 19:42:06 executing program 0: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e0", 0x4, 0x400}, {0x0, 0xffffff8c, 0x1000}], 0x0, &(0x7f0000000080)) 19:42:06 executing program 3: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000200c", 0xd, 0x400}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000080)={[{@fault_injection}]}) 19:42:06 executing program 1: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c0024", 0xf, 0x400}, {&(0x7f0000000280)="050000040041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000080)) (fail_nth: 53) [ 845.429136] erofs: read_super, device -> /dev/loop2 [ 845.434187] erofs: options -> fault_injection=0x0000000000000000, [ 845.441757] erofs: read_super, device -> /dev/loop5 [ 845.455761] erofs: options -> fault_injection=0x0000000000000000, 19:42:06 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000080)='\x00') ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40086602, &(0x7f0000000040)) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x5d, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000001, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r2, &(0x7f0000000000)=ANY=[], 0x32600) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x7a05, 0x1700) ioctl$TUNGETVNETHDRSZ(r1, 0x800454d7, &(0x7f0000000100)) write$cgroup_subtree(r2, &(0x7f0000000000)=ANY=[], 0xda00) perf_event_open(&(0x7f0000000600)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_QUERY(0x10, 0x0, 0x0) write$cgroup_int(r3, &(0x7f0000000200), 0x43408) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0xda00) write$cgroup_int(r4, &(0x7f00000004c0), 0x12) perf_event_open(&(0x7f0000000280)={0x0, 0x80, 0x2e, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) (async) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x7a05, 0x1700) (async) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000080)='\x00') (async) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40086602, &(0x7f0000000040)) (async) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x5d, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000001, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) (async) write$cgroup_subtree(r2, &(0x7f0000000000)=ANY=[], 0x32600) (async) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x7a05, 0x1700) (async) ioctl$TUNGETVNETHDRSZ(r1, 0x800454d7, &(0x7f0000000100)) (async) write$cgroup_subtree(r2, &(0x7f0000000000)=ANY=[], 0xda00) (async) perf_event_open(&(0x7f0000000600)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) bpf$BPF_PROG_QUERY(0x10, 0x0, 0x0) (async) write$cgroup_int(r3, &(0x7f0000000200), 0x43408) (async) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) (async) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0xda00) (async) write$cgroup_int(r4, &(0x7f00000004c0), 0x12) (async) perf_event_open(&(0x7f0000000280)={0x0, 0x80, 0x2e, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) (async) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async) 19:42:06 executing program 2: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c0024", 0xf, 0x400}, {&(0x7f0000000280)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x8}], 0x0, &(0x7f0000000080)={[{@fault_injection}]}) [ 845.482135] erofs: cannot read erofs superblock [ 845.485886] erofs: FAULT_INJECTION was not selected [ 845.495215] erofs: root inode @ nid 36 [ 845.500560] erofs: bogus i_mode (0) @ nid 36 [ 845.509617] erofs: read_super, device -> /dev/loop0 [ 845.515030] erofs: options -> [ 845.518871] erofs: cannot read erofs superblock 19:42:06 executing program 5: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010007000c0024", 0xf, 0x400}, {&(0x7f0000000280)="05", 0x1, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000080)={[{@fault_injection}]}) [ 845.592030] erofs: read_super, device -> /dev/loop3 [ 845.597562] erofs: read_super, device -> /dev/loop1 [ 845.616695] erofs: options -> [ 845.621001] FAULT_INJECTION: forcing a failure. [ 845.621001] name failslab, interval 1, probability 0, space 0, times 0 [ 845.621478] erofs: options -> fault_injection=0x0000000000000000, [ 845.637383] CPU: 1 PID: 9214 Comm: syz-executor.1 Not tainted 4.19.211-syzkaller #0 [ 845.646557] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 845.655908] Call Trace: [ 845.658505] dump_stack+0x1fc/0x2ef [ 845.662146] should_fail.cold+0xa/0xf [ 845.665957] ? setup_fault_attr+0x200/0x200 [ 845.670291] ? lock_acquire+0x170/0x3c0 [ 845.674280] __should_failslab+0x115/0x180 [ 845.678522] should_failslab+0x5/0x10 [ 845.682325] kmem_cache_alloc_trace+0x284/0x380 [ 845.687001] erofs_fill_super+0x167/0x12cc [ 845.691250] ? gb_gbphy_register_driver.cold+0x39/0x39 [ 845.696539] ? vsprintf+0x30/0x30 [ 845.700003] ? wait_for_completion_io+0x10/0x10 [ 845.704672] ? set_blocksize+0x163/0x3f0 [ 845.708744] mount_bdev+0x2fc/0x3b0 [ 845.712377] ? gb_gbphy_register_driver.cold+0x39/0x39 [ 845.717665] erofs_mount+0x8c/0xc0 [ 845.721207] ? erofs_kill_sb+0x20/0x20 [ 845.725103] ? alloc_pages_current+0x19b/0x2a0 [ 845.729689] ? __lockdep_init_map+0x100/0x5a0 [ 845.734188] mount_fs+0xa3/0x310 [ 845.737563] vfs_kern_mount.part.0+0x68/0x470 [ 845.742073] do_mount+0x115c/0x2f50 [ 845.745709] ? cmp_ex_sort+0xc0/0xc0 [ 845.749434] ? __do_page_fault+0x180/0xd60 [ 845.753679] ? copy_mount_string+0x40/0x40 [ 845.757931] ? memset+0x20/0x40 [ 845.761218] ? copy_mount_options+0x26f/0x380 [ 845.765733] ksys_mount+0xcf/0x130 [ 845.769283] __x64_sys_mount+0xba/0x150 [ 845.773273] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 845.777860] do_syscall_64+0xf9/0x620 [ 845.781677] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 845.786874] RIP: 0033:0x7ff03e6523ea [ 845.790590] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 845.807540] erofs: FAULT_INJECTION was not selected [ 845.809663] RSP: 002b:00007ff03cfc5f88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 845.809676] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007ff03e6523ea [ 845.809685] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007ff03cfc5fe0 19:42:06 executing program 0: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e0", 0x4, 0x400}, {0x0, 0xffffff97, 0x1000}], 0x0, &(0x7f0000000080)) [ 845.809693] RBP: 00007ff03cfc6020 R08: 00007ff03cfc6020 R09: 0000000020000000 [ 845.809704] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000000 [ 845.820082] erofs: root inode @ nid 0 [ 845.822389] R13: 0000000020000100 R14: 00007ff03cfc5fe0 R15: 0000000020000080 [ 845.877044] erofs: read_super, device -> /dev/loop2 19:42:06 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000080)='\x00') (async) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40086602, &(0x7f0000000040)) (async) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x5d, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000001, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r2, &(0x7f0000000000)=ANY=[], 0x32600) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x7a05, 0x1700) (async) ioctl$TUNGETVNETHDRSZ(r1, 0x800454d7, &(0x7f0000000100)) (async) write$cgroup_subtree(r2, &(0x7f0000000000)=ANY=[], 0xda00) perf_event_open(&(0x7f0000000600)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_QUERY(0x10, 0x0, 0x0) write$cgroup_int(r3, &(0x7f0000000200), 0x43408) (async) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0xda00) (async) write$cgroup_int(r4, &(0x7f00000004c0), 0x12) perf_event_open(&(0x7f0000000280)={0x0, 0x80, 0x2e, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) (async) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 845.895692] erofs: options -> fault_injection=0x0000000000000000, [ 845.906655] erofs: bogus i_mode (0) @ nid 0 [ 845.929646] erofs: cannot read erofs superblock [ 845.941120] erofs: read_super, device -> /dev/loop5 19:42:07 executing program 3: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000210c", 0xd, 0x400}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000080)={[{@fault_injection}]}) [ 845.946518] erofs: read_super, device -> /dev/loop0 [ 845.960622] erofs: options -> fault_injection=0x0000000000000000, [ 845.962010] erofs: options -> [ 845.977372] erofs: FAULT_INJECTION was not selected [ 845.986551] erofs: cannot read erofs superblock 19:42:07 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000180)='blkio.bfq.dequeue\x00', 0x0, 0x0) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000001c0)=ANY=[@ANYBLOB="1400ae106566b32f677ba8a7ad8eb90000020201086c00"/33], 0x14}}, 0x0) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x40, 0x2, 0x6, 0x5, 0x0, 0x0, {0x2, 0x0, 0x5}, [@IPSET_ATTR_TYPENAME={0x15, 0x3, 'hash:ip,port,net\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5}]}, 0x40}, 0x1, 0x0, 0x0, 0x24000000}, 0x61bc2c4c6464f779) 19:42:07 executing program 2: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c0024", 0xf, 0x400}, {&(0x7f0000000280)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0xb}], 0x0, &(0x7f0000000080)={[{@fault_injection}]}) [ 846.000299] erofs: root inode @ nid 36 [ 846.004861] erofs: bogus i_mode (0) @ nid 36 19:42:07 executing program 0: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e0", 0x4, 0x400}, {0x0, 0xfffffff5, 0x1000}], 0x0, &(0x7f0000000080)) 19:42:07 executing program 1: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c0024", 0xf, 0x400}, {&(0x7f0000000280)="050000040041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000080)) (fail_nth: 54) [ 846.123421] erofs: read_super, device -> /dev/loop3 [ 846.134221] erofs: options -> fault_injection=0x0000000000000000, [ 846.149031] erofs: FAULT_INJECTION was not selected [ 846.156001] erofs: read_super, device -> /dev/loop2 [ 846.166456] erofs: root inode @ nid 0 19:42:07 executing program 5: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010009000c0024", 0xf, 0x400}, {&(0x7f0000000280)="05", 0x1, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000080)={[{@fault_injection}]}) 19:42:07 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) (async) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000180)='blkio.bfq.dequeue\x00', 0x0, 0x0) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000001c0)=ANY=[@ANYBLOB="1400ae106566b32f677ba8a7ad8eb90000020201086c00"/33], 0x14}}, 0x0) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x40, 0x2, 0x6, 0x5, 0x0, 0x0, {0x2, 0x0, 0x5}, [@IPSET_ATTR_TYPENAME={0x15, 0x3, 'hash:ip,port,net\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5}]}, 0x40}, 0x1, 0x0, 0x0, 0x24000000}, 0x61bc2c4c6464f779) 19:42:07 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000180)='blkio.bfq.dequeue\x00', 0x0, 0x0) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000001c0)=ANY=[@ANYBLOB="1400ae106566b32f677ba8a7ad8eb90000020201086c00"/33], 0x14}}, 0x0) (async, rerun: 32) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x40, 0x2, 0x6, 0x5, 0x0, 0x0, {0x2, 0x0, 0x5}, [@IPSET_ATTR_TYPENAME={0x15, 0x3, 'hash:ip,port,net\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5}]}, 0x40}, 0x1, 0x0, 0x0, 0x24000000}, 0x61bc2c4c6464f779) (rerun: 32) [ 846.170417] erofs: options -> fault_injection=0x0000000000000000, [ 846.192287] erofs: bogus i_mode (0) @ nid 0 [ 846.201395] erofs: cannot read erofs superblock 19:42:07 executing program 3: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000230c", 0xd, 0x400}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000080)={[{@fault_injection}]}) [ 846.287473] erofs: read_super, device -> /dev/loop1 [ 846.288279] erofs: read_super, device -> /dev/loop0 [ 846.292771] erofs: read_super, device -> /dev/loop5 [ 846.297676] erofs: options -> [ 846.297737] erofs: cannot read erofs superblock [ 846.300500] erofs: options -> [ 846.303486] erofs: options -> fault_injection=0x0000000000000000, [ 846.314315] FAULT_INJECTION: forcing a failure. [ 846.314315] name failslab, interval 1, probability 0, space 0, times 0 [ 846.322297] erofs: FAULT_INJECTION was not selected [ 846.332216] CPU: 1 PID: 9297 Comm: syz-executor.1 Not tainted 4.19.211-syzkaller #0 [ 846.338695] erofs: root inode @ nid 36 [ 846.344749] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 846.344754] Call Trace: [ 846.344775] dump_stack+0x1fc/0x2ef [ 846.344796] should_fail.cold+0xa/0xf [ 846.344816] ? setup_fault_attr+0x200/0x200 [ 846.344829] ? lock_acquire+0x170/0x3c0 [ 846.344847] __should_failslab+0x115/0x180 [ 846.353766] erofs: bogus i_mode (0) @ nid 36 19:42:07 executing program 2: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c0024", 0xf, 0x400}, {&(0x7f0000000280)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x10}], 0x0, &(0x7f0000000080)={[{@fault_injection}]}) [ 846.358069] should_failslab+0x5/0x10 [ 846.358086] kmem_cache_alloc_trace+0x284/0x380 [ 846.358105] erofs_fill_super+0x167/0x12cc [ 846.358125] ? gb_gbphy_register_driver.cold+0x39/0x39 [ 846.358138] ? vsprintf+0x30/0x30 [ 846.358154] ? wait_for_completion_io+0x10/0x10 [ 846.358167] ? set_blocksize+0x163/0x3f0 [ 846.358185] mount_bdev+0x2fc/0x3b0 [ 846.358197] ? gb_gbphy_register_driver.cold+0x39/0x39 [ 846.358213] erofs_mount+0x8c/0xc0 [ 846.358226] ? erofs_kill_sb+0x20/0x20 [ 846.358243] ? alloc_pages_current+0x19b/0x2a0 19:42:07 executing program 4: r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$int_in(r0, 0x5421, &(0x7f0000000200)=0x8) read$dsp(r0, &(0x7f0000000040)=""/157, 0x9d) ioctl$SNDRV_PCM_IOCTL_DRAIN(0xffffffffffffffff, 0x4144, 0x0) r1 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) copy_file_range(r1, &(0x7f0000000000)=0x7, r0, &(0x7f0000000100)=0x10000, 0x9f0, 0x0) [ 846.358256] ? __lockdep_init_map+0x100/0x5a0 [ 846.358270] mount_fs+0xa3/0x310 [ 846.443827] vfs_kern_mount.part.0+0x68/0x470 [ 846.448327] do_mount+0x115c/0x2f50 [ 846.451943] ? cmp_ex_sort+0xc0/0xc0 [ 846.455649] ? __do_page_fault+0x180/0xd60 [ 846.460032] ? copy_mount_string+0x40/0x40 [ 846.464370] ? memset+0x20/0x40 [ 846.467662] ? copy_mount_options+0x26f/0x380 [ 846.472166] ksys_mount+0xcf/0x130 [ 846.475704] __x64_sys_mount+0xba/0x150 [ 846.479675] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 846.484256] do_syscall_64+0xf9/0x620 [ 846.488052] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 846.493238] RIP: 0033:0x7ff03e6523ea [ 846.496944] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 846.515843] RSP: 002b:00007ff03cfc5f88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 846.523550] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007ff03e6523ea [ 846.530815] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007ff03cfc5fe0 [ 846.538239] RBP: 00007ff03cfc6020 R08: 00007ff03cfc6020 R09: 0000000020000000 [ 846.545492] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000000 [ 846.552742] R13: 0000000020000100 R14: 00007ff03cfc5fe0 R15: 0000000020000080 19:42:07 executing program 0: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e0", 0x4, 0x400}, {0x0, 0xfffffff6, 0x1000}], 0x0, &(0x7f0000000080)) 19:42:07 executing program 4: r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$int_in(r0, 0x5421, &(0x7f0000000200)=0x8) (async) read$dsp(r0, &(0x7f0000000040)=""/157, 0x9d) (async) ioctl$SNDRV_PCM_IOCTL_DRAIN(0xffffffffffffffff, 0x4144, 0x0) (async) r1 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) copy_file_range(r1, &(0x7f0000000000)=0x7, r0, &(0x7f0000000100)=0x10000, 0x9f0, 0x0) 19:42:07 executing program 5: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010020000c0024", 0xf, 0x400}, {&(0x7f0000000280)="05", 0x1, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000080)={[{@fault_injection}]}) 19:42:07 executing program 1: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c0024", 0xf, 0x400}, {&(0x7f0000000280)="050000040041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000080)) (fail_nth: 55) [ 846.629952] erofs: read_super, device -> /dev/loop3 [ 846.643732] erofs: options -> fault_injection=0x0000000000000000, [ 846.653098] erofs: read_super, device -> /dev/loop2 [ 846.661570] erofs: options -> fault_injection=0x0000000000000000, 19:42:07 executing program 4: r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$int_in(r0, 0x5421, &(0x7f0000000200)=0x8) read$dsp(r0, &(0x7f0000000040)=""/157, 0x9d) ioctl$SNDRV_PCM_IOCTL_DRAIN(0xffffffffffffffff, 0x4144, 0x0) r1 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) copy_file_range(r1, &(0x7f0000000000)=0x7, r0, &(0x7f0000000100)=0x10000, 0x9f0, 0x0) openat$audio(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) (async) ioctl$int_in(r0, 0x5421, &(0x7f0000000200)=0x8) (async) read$dsp(r0, &(0x7f0000000040)=""/157, 0x9d) (async) ioctl$SNDRV_PCM_IOCTL_DRAIN(0xffffffffffffffff, 0x4144, 0x0) (async) syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) (async) copy_file_range(r1, &(0x7f0000000000)=0x7, r0, &(0x7f0000000100)=0x10000, 0x9f0, 0x0) (async) [ 846.677852] erofs: FAULT_INJECTION was not selected [ 846.687225] erofs: cannot read erofs superblock [ 846.695983] erofs: read_super, device -> /dev/loop0 [ 846.697873] erofs: root inode @ nid 0 [ 846.711089] erofs: bogus i_mode (0) @ nid 0 [ 846.720474] erofs: options -> [ 846.723923] erofs: cannot read erofs superblock [ 846.737332] erofs: read_super, device -> /dev/loop5 [ 846.742709] erofs: options -> fault_injection=0x0000000000000000, [ 846.749496] erofs: FAULT_INJECTION was not selected [ 846.754644] erofs: root inode @ nid 36 [ 846.759327] erofs: bogus i_mode (0) @ nid 36 [ 846.820913] erofs: read_super, device -> /dev/loop1 [ 846.826188] erofs: options -> [ 846.829536] FAULT_INJECTION: forcing a failure. [ 846.829536] name failslab, interval 1, probability 0, space 0, times 0 [ 846.841871] CPU: 1 PID: 9340 Comm: syz-executor.1 Not tainted 4.19.211-syzkaller #0 [ 846.849679] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 846.859025] Call Trace: [ 846.861870] dump_stack+0x1fc/0x2ef [ 846.865486] should_fail.cold+0xa/0xf [ 846.869293] ? setup_fault_attr+0x200/0x200 [ 846.873619] ? lock_acquire+0x170/0x3c0 [ 846.877599] __should_failslab+0x115/0x180 [ 846.881829] should_failslab+0x5/0x10 [ 846.885614] kmem_cache_alloc_trace+0x284/0x380 [ 846.890279] erofs_fill_super+0x167/0x12cc [ 846.894622] ? gb_gbphy_register_driver.cold+0x39/0x39 [ 846.899886] ? vsprintf+0x30/0x30 [ 846.903330] ? wait_for_completion_io+0x10/0x10 [ 846.908005] ? set_blocksize+0x163/0x3f0 [ 846.912065] mount_bdev+0x2fc/0x3b0 [ 846.915681] ? gb_gbphy_register_driver.cold+0x39/0x39 [ 846.920944] erofs_mount+0x8c/0xc0 [ 846.924467] ? erofs_kill_sb+0x20/0x20 [ 846.928356] ? alloc_pages_current+0x19b/0x2a0 [ 846.932933] ? __lockdep_init_map+0x100/0x5a0 [ 846.937413] mount_fs+0xa3/0x310 [ 846.940767] vfs_kern_mount.part.0+0x68/0x470 [ 846.945272] do_mount+0x115c/0x2f50 [ 846.949036] ? cmp_ex_sort+0xc0/0xc0 [ 846.952747] ? __do_page_fault+0x180/0xd60 [ 846.956972] ? copy_mount_string+0x40/0x40 [ 846.961370] ? memset+0x20/0x40 [ 846.964640] ? copy_mount_options+0x26f/0x380 [ 846.969138] ksys_mount+0xcf/0x130 [ 846.972671] __x64_sys_mount+0xba/0x150 [ 846.976642] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 846.981205] do_syscall_64+0xf9/0x620 [ 846.984993] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 846.990176] RIP: 0033:0x7ff03e6523ea [ 846.993883] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 847.012856] RSP: 002b:00007ff03cfc5f88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 19:42:08 executing program 4: perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c44, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f00009e1000)='./file0\x00', 0x8060, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) fcntl$setsig(r0, 0xa, 0x11) r1 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x317d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000a40)={0x1, 0x80, 0x2e, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0xffff, 0x4, @perf_bp={&(0x7f0000000040)}, 0x118e5, 0xffffffff7ffffffd, 0x5, 0x0, 0xc, 0x0, 0x5, 0x0, 0x5}, 0x0, 0x8, r2, 0x8) sendfile(r1, 0xffffffffffffffff, &(0x7f00000001c0), 0x0) fcntl$setlease(r0, 0x400, 0x0) write$binfmt_script(r1, &(0x7f00000002c0)=ANY=[@ANYBLOB="2321202e2f66696c65302f66696c653020202e24233bcc245b205e242ab721202623282c5c205c5b402e2d4220292b5e2618269b5c5d20200a4b950734eace01be167e14df28d6b9319d6b2166a9d35098b0a0653ea7c2207afcd679854c2571e4c484ff3683207f2c62f9f9a182f0e2def500a065745f7546009876ff45b1660ede1f8868b5b066f9"], 0x89) timer_create(0x0, &(0x7f00000000c0)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000280)) timer_settime(0x0, 0x0, &(0x7f0000000180)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, 0x0) r3 = dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x40082406, 0x0) timer_create(0x0, &(0x7f0000000000)={0x0, 0x14, 0x0, @tid=0xffffffffffffffff}, &(0x7f0000000200)=0x0) timer_settime(r4, 0x0, &(0x7f0000000180)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, 0x0) truncate(&(0x7f0000000040)='./file0\x00', 0x0) timer_create(0x0, 0x0, 0x0) 19:42:08 executing program 2: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c0024", 0xf, 0x400}, {&(0x7f0000000280)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1002}], 0x0, &(0x7f0000000080)={[{@fault_injection}]}) 19:42:08 executing program 0: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e0", 0x4, 0x400}, {0x0, 0xfffffffb, 0x1000}], 0x0, &(0x7f0000000080)) [ 847.020551] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007ff03e6523ea [ 847.027811] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007ff03cfc5fe0 [ 847.035071] RBP: 00007ff03cfc6020 R08: 00007ff03cfc6020 R09: 0000000020000000 [ 847.042325] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000000 [ 847.049583] R13: 0000000020000100 R14: 00007ff03cfc5fe0 R15: 0000000020000080 19:42:08 executing program 3: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010091260c", 0xd, 0x400}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000080)={[{@fault_injection}]}) 19:42:08 executing program 5: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010021000c0024", 0xf, 0x400}, {&(0x7f0000000280)="05", 0x1, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000080)={[{@fault_injection}]}) [ 847.154198] erofs: read_super, device -> /dev/loop2 [ 847.160401] erofs: options -> fault_injection=0x0000000000000000, [ 847.164091] erofs: read_super, device -> /dev/loop3 [ 847.168671] erofs: FAULT_INJECTION was not selected [ 847.176272] erofs: options -> fault_injection=0x0000000000000000, [ 847.178445] erofs: root inode @ nid 36 [ 847.184550] erofs: FAULT_INJECTION was not selected [ 847.188656] erofs: mounted on /dev/loop2 with opts: fault_injection=0x0000000000000000. [ 847.201725] erofs: root inode @ nid 0 [ 847.205904] erofs: bogus i_mode (0) @ nid 0 [ 847.211555] erofs: read_super, device -> /dev/loop0 [ 847.218118] erofs: options -> [ 847.222540] erofs: cannot read erofs superblock [ 847.230519] erofs: read_super, device -> /dev/loop5 [ 847.235554] erofs: options -> fault_injection=0x0000000000000000, 19:42:08 executing program 0: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e0", 0x4, 0x400}, {0x0, 0xfffffffd, 0x1000}], 0x0, &(0x7f0000000080)) 19:42:08 executing program 1: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c0024", 0xf, 0x400}, {&(0x7f0000000280)="050000040041", 0x6, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000080)) (fail_nth: 56) 19:42:08 executing program 2: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c0024", 0xf, 0x400}, {&(0x7f0000000280)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1003}], 0x0, &(0x7f0000000080)={[{@fault_injection}]}) [ 847.249866] erofs: FAULT_INJECTION was not selected [ 847.255847] erofs: root inode @ nid 36 19:42:08 executing program 3: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b004670100023c0c", 0xd, 0x400}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000080)={[{@fault_injection}]}) [ 847.295726] erofs: unmounted for /dev/loop2 [ 847.300840] erofs: bogus i_mode (0) @ nid 36 19:42:08 executing program 5: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010023000c0024", 0xf, 0x400}, {&(0x7f0000000280)="05", 0x1, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000080)={[{@fault_injection}]}) [ 847.351601] erofs: read_super, device -> /dev/loop3 [ 847.361622] erofs: read_super, device -> /dev/loop0 [ 847.362254] erofs: options -> fault_injection=0x0000000000000000, [ 847.372450] erofs: options -> [ 847.376503] erofs: FAULT_INJECTION was not selected [ 847.381551] erofs: root inode @ nid 0 [ 847.385952] erofs: cannot read erofs superblock [ 847.391724] erofs: bogus i_mode (0) @ nid 0 [ 847.398058] erofs: read_super, device -> /dev/loop1 [ 847.403096] erofs: options -> [ 847.407170] erofs: root inode @ nid 36 [ 847.411354] FAULT_INJECTION: forcing a failure. [ 847.411354] name failslab, interval 1, probability 0, space 0, times 0 [ 847.423594] CPU: 0 PID: 9391 Comm: syz-executor.1 Not tainted 4.19.211-syzkaller #0 [ 847.431390] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 847.440728] Call Trace: [ 847.443305] dump_stack+0x1fc/0x2ef [ 847.446918] should_fail.cold+0xa/0xf [ 847.450706] ? setup_fault_attr+0x200/0x200 [ 847.455012] ? lock_acquire+0x170/0x3c0 [ 847.458976] __should_failslab+0x115/0x180 [ 847.463207] should_failslab+0x5/0x10 [ 847.466999] kmem_cache_alloc+0x277/0x370 [ 847.471138] __d_alloc+0x2b/0xa10 [ 847.474626] d_make_root+0x3e/0x90 [ 847.478330] erofs_fill_super+0x102f/0x12cc [ 847.482638] ? gb_gbphy_register_driver.cold+0x39/0x39 [ 847.487900] ? vsprintf+0x30/0x30 [ 847.491350] ? wait_for_completion_io+0x10/0x10 [ 847.496002] ? set_blocksize+0x163/0x3f0 [ 847.500135] mount_bdev+0x2fc/0x3b0 [ 847.503759] ? gb_gbphy_register_driver.cold+0x39/0x39 [ 847.509027] erofs_mount+0x8c/0xc0 [ 847.512555] ? erofs_kill_sb+0x20/0x20 [ 847.516436] ? alloc_pages_current+0x19b/0x2a0 [ 847.521000] ? __lockdep_init_map+0x100/0x5a0 [ 847.525476] mount_fs+0xa3/0x310 [ 847.528828] vfs_kern_mount.part.0+0x68/0x470 [ 847.533321] do_mount+0x115c/0x2f50 [ 847.536945] ? cmp_ex_sort+0xc0/0xc0 [ 847.540646] ? __do_page_fault+0x180/0xd60 [ 847.544867] ? copy_mount_string+0x40/0x40 [ 847.549093] ? memset+0x20/0x40 [ 847.552359] ? copy_mount_options+0x26f/0x380 [ 847.556842] ksys_mount+0xcf/0x130 [ 847.560368] __x64_sys_mount+0xba/0x150 [ 847.564337] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 847.568912] do_syscall_64+0xf9/0x620 [ 847.572707] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 847.577886] RIP: 0033:0x7ff03e6523ea [ 847.581588] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 847.600472] RSP: 002b:00007ff03cfc5f88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 847.608174] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007ff03e6523ea [ 847.615438] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007ff03cfc5fe0 [ 847.622693] RBP: 00007ff03cfc6020 R08: 00007ff03cfc6020 R09: 0000000020000000 [ 847.630032] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000000 [ 847.637285] R13: 0000000020000100 R14: 00007ff03cfc5fe0 R15: 0000000020000080 [ 847.660607] ------------[ cut here ]------------ [ 847.665367] kernel BUG at fs/inode.c:1571! [ 847.670051] invalid opcode: 0000 [#1] PREEMPT SMP KASAN [ 847.675508] CPU: 0 PID: 9391 Comm: syz-executor.1 Not tainted 4.19.211-syzkaller #0 [ 847.683278] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 847.692616] RIP: 0010:iput+0x727/0x860 [ 847.696483] Code: b8 00 00 00 00 00 fc ff df 48 c1 ea 03 80 3c 02 00 0f 84 18 fd ff ff 48 8b 3c 24 e8 33 d9 ee ff e9 0a fd ff ff e8 39 fc b8 ff <0f> 0b e8 32 fc b8 ff 48 89 ef e8 1a f7 ff ff 4c 89 f7 e8 b2 c6 6f [ 847.715361] RSP: 0018:ffff8880ab3efa80 EFLAGS: 00010246 [ 847.720702] RAX: 0000000000040000 RBX: 0000000000000040 RCX: ffffc9000813c000 [ 847.727981] RDX: 0000000000040000 RSI: ffffffff81a98937 RDI: 0000000000000007 [ 847.735229] RBP: ffff88803886f0e8 R08: 0000000000000000 R09: 0000000000000000 [ 847.742476] R10: 0000000000000007 R11: 0000000000000000 R12: ffff8880a23aa080 [ 847.749724] R13: ffff88803886f0e8 R14: 0000000000000000 R15: 00000000fffffff4 [ 847.756971] FS: 00007ff03cfc6700(0000) GS:ffff8880ba000000(0000) knlGS:0000000000000000 [ 847.765173] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 847.771029] CR2: 00007fa8cde36090 CR3: 0000000023570000 CR4: 00000000003406f0 [ 847.778294] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 847.785552] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 847.792797] Call Trace: [ 847.795372] erofs_fill_super+0x1205/0x12cc [ 847.799673] ? gb_gbphy_register_driver.cold+0x39/0x39 [ 847.804926] ? vsprintf+0x30/0x30 [ 847.808359] ? wait_for_completion_io+0x10/0x10 [ 847.813007] ? set_blocksize+0x163/0x3f0 [ 847.817052] mount_bdev+0x2fc/0x3b0 [ 847.820656] ? gb_gbphy_register_driver.cold+0x39/0x39 [ 847.825915] erofs_mount+0x8c/0xc0 [ 847.829436] ? erofs_kill_sb+0x20/0x20 [ 847.833310] ? alloc_pages_current+0x19b/0x2a0 [ 847.837872] ? __lockdep_init_map+0x100/0x5a0 [ 847.842345] mount_fs+0xa3/0x310 [ 847.845690] vfs_kern_mount.part.0+0x68/0x470 [ 847.850164] do_mount+0x115c/0x2f50 [ 847.853772] ? cmp_ex_sort+0xc0/0xc0 [ 847.857467] ? __do_page_fault+0x180/0xd60 [ 847.861679] ? copy_mount_string+0x40/0x40 [ 847.865898] ? memset+0x20/0x40 [ 847.869155] ? copy_mount_options+0x26f/0x380 [ 847.873629] ksys_mount+0xcf/0x130 [ 847.877149] __x64_sys_mount+0xba/0x150 [ 847.881103] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 847.885667] do_syscall_64+0xf9/0x620 [ 847.889448] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 847.894614] RIP: 0033:0x7ff03e6523ea [ 847.898306] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 847.917226] RSP: 002b:00007ff03cfc5f88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 847.924923] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007ff03e6523ea [ 847.932196] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007ff03cfc5fe0 [ 847.939449] RBP: 00007ff03cfc6020 R08: 00007ff03cfc6020 R09: 0000000020000000 [ 847.946696] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000000 [ 847.953947] R13: 0000000020000100 R14: 00007ff03cfc5fe0 R15: 0000000020000080 19:42:09 executing program 4: perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c44, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async) r0 = open(&(0x7f00009e1000)='./file0\x00', 0x8060, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) (async, rerun: 64) fcntl$setsig(r0, 0xa, 0x11) (async, rerun: 64) r1 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x317d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000a40)={0x1, 0x80, 0x2e, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0xffff, 0x4, @perf_bp={&(0x7f0000000040)}, 0x118e5, 0xffffffff7ffffffd, 0x5, 0x0, 0xc, 0x0, 0x5, 0x0, 0x5}, 0x0, 0x8, r2, 0x8) (async) sendfile(r1, 0xffffffffffffffff, &(0x7f00000001c0), 0x0) (async) fcntl$setlease(r0, 0x400, 0x0) (async) write$binfmt_script(r1, &(0x7f00000002c0)=ANY=[@ANYBLOB="2321202e2f66696c65302f66696c653020202e24233bcc245b205e242ab721202623282c5c205c5b402e2d4220292b5e2618269b5c5d20200a4b950734eace01be167e14df28d6b9319d6b2166a9d35098b0a0653ea7c2207afcd679854c2571e4c484ff3683207f2c62f9f9a182f0e2def500a065745f7546009876ff45b1660ede1f8868b5b066f9"], 0x89) (async) timer_create(0x0, &(0x7f00000000c0)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000280)) timer_settime(0x0, 0x0, &(0x7f0000000180)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, 0x0) r3 = dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x40082406, 0x0) (async, rerun: 32) timer_create(0x0, &(0x7f0000000000)={0x0, 0x14, 0x0, @tid=0xffffffffffffffff}, &(0x7f0000000200)=0x0) (rerun: 32) timer_settime(r4, 0x0, &(0x7f0000000180)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, 0x0) (async) truncate(&(0x7f0000000040)='./file0\x00', 0x0) timer_create(0x0, 0x0, 0x0) [ 847.961198] Modules linked in: [ 847.966557] ---[ end trace bf6743caec4c5e1f ]--- [ 847.971567] RIP: 0010:iput+0x727/0x860 [ 847.984469] Code: b8 00 00 00 00 00 fc ff df 48 c1 ea 03 80 3c 02 00 0f 84 18 fd ff ff 48 8b 3c 24 e8 33 d9 ee ff e9 0a fd ff ff e8 39 fc b8 ff <0f> 0b e8 32 fc b8 ff 48 89 ef e8 1a f7 ff ff 4c 89 f7 e8 b2 c6 6f [ 848.003688] RSP: 0018:ffff8880ab3efa80 EFLAGS: 00010246 19:42:09 executing program 3: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b004670100003f0c", 0xd, 0x400}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000080)={[{@fault_injection}]}) [ 848.009296] RAX: 0000000000040000 RBX: 0000000000000040 RCX: ffffc9000813c000 [ 848.017033] RDX: 0000000000040000 RSI: ffffffff81a98937 RDI: 0000000000000007 [ 848.024518] erofs: read_super, device -> /dev/loop2 [ 848.037442] erofs: options -> fault_injection=0x0000000000000000, 19:42:09 executing program 0: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e0", 0x4, 0x400}, {0x0, 0xedc000000000, 0x1000}], 0x0, &(0x7f0000000080)) [ 848.055995] RBP: ffff88803886f0e8 R08: 0000000000000000 R09: 0000000000000000 [ 848.061059] erofs: read_super, device -> /dev/loop5 [ 848.076766] erofs: FAULT_INJECTION was not selected [ 848.085476] erofs: options -> fault_injection=0x0000000000000000, [ 848.089473] erofs: root inode @ nid 36 [ 848.093878] erofs: read_super, device -> /dev/loop3 [ 848.101603] erofs: FAULT_INJECTION was not selected [ 848.106984] erofs: options -> fault_injection=0x0000000000000000, [ 848.108725] R10: 0000000000000007 R11: 0000000000000000 R12: ffff8880a23aa080 [ 848.116736] erofs: root inode @ nid 36 [ 848.124774] erofs: FAULT_INJECTION was not selected [ 848.133775] erofs: mounted on /dev/loop2 with opts: fault_injection=0x0000000000000000. [ 848.134518] erofs: read_super, device -> /dev/loop0 [ 848.149993] erofs: bogus i_mode (0) @ nid 36 [ 848.154571] erofs: root inode @ nid 0 19:42:09 executing program 2: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000000c0024", 0xf, 0x400}, {&(0x7f0000000280)="05000000c041", 0x6, 0x480}, {0x0, 0x0, 0x1004}], 0x0, &(0x7f0000000080)={[{@fault_injection}]}) [ 848.157803] R13: ffff88803886f0e8 R14: 0000000000000000 R15: 00000000fffffff4 [ 848.169008] erofs: bogus i_mode (0) @ nid 0 [ 848.177899] erofs: options -> [ 848.181855] FS: 00007ff03cfc6700(0000) GS:ffff8880ba100000(0000) knlGS:0000000000000000 [ 848.186231] erofs: cannot read erofs superblock [ 848.194939] erofs: unmounted for /dev/loop2 [ 848.195092] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 19:42:09 executing program 3: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b00467010000600c", 0xd, 0x400}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000080)={[{@fault_injection}]}) [ 848.207823] CR2: 00007f21a2d06000 CR3: 0000000023570000 CR4: 00000000003406e0 19:42:09 executing program 5: syz_mount_image$erofs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="e2e1f5e084b0046701a926000c0024", 0xf, 0x400}, {&(0x7f0000000280)="05", 0x1, 0x480}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000080)={[{@fault_injection}]}) [ 848.233667] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 848.243184] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 848.251396] Kernel panic - not syncing: Fatal exception [ 848.257026] Kernel Offset: disabled [ 848.260638] Rebooting in 86400 seconds..