call:1 fault-nth:14): creat(&(0x7f0000000280)='./file0\x00', 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) [ 397.071903] EXT4-fs (loop3): mounted filesystem without journal. Opts: ,errors=continue [ 397.094301] EXT4-fs (loop2): VFS: Can't find ext4 filesystem 16:47:47 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x0, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f00000000c0)={0x0, {0x0, 0x0, 0x0, 0x0, 0x5, 0x2}}) 16:47:47 executing program 2: creat(&(0x7f0000000280)='./file0\x00', 0x0) close(0xffffffffffffffff) write$binfmt_script(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d90000000f0000000100000000000000000000000020000000200000200000002cc4645f2cc4645f0100ffff53ef0100010000002cc4645f000000000000000001000000000000000b0000008000000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e3338363633343038350000000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000000000000000000000000000000000000d9ca5cac99fd4329af4dde786c1a5d13010040000c000000000000002cc4645f", 0x10c}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) [ 397.195699] EXT4-fs (loop5): bad geometry: block count 256 exceeds size of device (113 blocks) 16:47:47 executing program 5: creat(&(0x7f0000000280)='./file0\x00', 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x1c5e1, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) 16:47:47 executing program 0: creat(&(0x7f0000000280)='./file0\x00', 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d90000000f0000000100000000000000000000000020000000200000200000002cc4645f2cc4645f0100ffff53ef0100010000002cc4645f000000000000000001000000000000000b0000008000000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e3338363633343038350000000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000000000000000000000000000000000000d9ca5cac99fd4329af4dde786c1a5d13010040000c000000000000002cc4645f", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) [ 397.268605] EXT4-fs (loop2): VFS: Can't find ext4 filesystem [ 397.289674] FAULT_INJECTION: forcing a failure. [ 397.289674] name failslab, interval 1, probability 0, space 0, times 0 [ 397.313392] CPU: 1 PID: 22312 Comm: syz-executor.3 Not tainted 4.19.169-syzkaller #0 [ 397.321317] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 397.330776] Call Trace: [ 397.333391] dump_stack+0x1fc/0x2ef [ 397.337045] should_fail.cold+0xa/0xf [ 397.340868] ? setup_fault_attr+0x200/0x200 [ 397.345359] ? lock_acquire+0x170/0x3c0 [ 397.349361] __should_failslab+0x115/0x180 [ 397.353616] should_failslab+0x5/0x10 [ 397.357432] kmem_cache_alloc+0x277/0x370 [ 397.361601] __kernfs_new_node+0xd2/0x680 [ 397.365775] ? kernfs_dop_revalidate+0x3a0/0x3a0 [ 397.370546] ? kernfs_activate+0x2c/0x1d0 [ 397.374710] ? lock_downgrade+0x720/0x720 [ 397.378873] ? kernfs_add_one+0x51/0x4c0 [ 397.382956] ? __mutex_add_waiter+0x160/0x160 [ 397.387478] ? __mutex_unlock_slowpath+0xea/0x610 [ 397.392429] kernfs_new_node+0x92/0x120 [ 397.396424] __kernfs_create_file+0x51/0x340 [ 397.400858] sysfs_add_file_mode_ns+0x226/0x540 [ 397.405555] internal_create_group+0x355/0xb20 [ 397.410248] ? sysfs_remove_link_from_group+0x70/0x70 [ 397.415454] ? lock_downgrade+0x720/0x720 [ 397.419634] lo_ioctl+0xf7c/0x20e0 [ 397.423201] ? loop_set_status64+0x110/0x110 [ 397.427631] blkdev_ioctl+0x5cb/0x1a80 [ 397.431680] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 397.437172] ? blkpg_ioctl+0x9d0/0x9d0 [ 397.441088] ? mark_held_locks+0xf0/0xf0 [ 397.445298] ? mark_held_locks+0xf0/0xf0 [ 397.449382] ? debug_check_no_obj_freed+0x201/0x490 [ 397.454545] ? lock_downgrade+0x720/0x720 [ 397.458725] block_ioctl+0xe9/0x130 [ 397.462526] ? blkdev_fallocate+0x3f0/0x3f0 [ 397.466984] do_vfs_ioctl+0xcdb/0x12e0 [ 397.470890] ? lock_downgrade+0x720/0x720 [ 397.475054] ? check_preemption_disabled+0x41/0x280 [ 397.480091] ? ioctl_preallocate+0x200/0x200 [ 397.484540] ? __fget+0x356/0x510 [ 397.488138] ? do_dup2+0x450/0x450 [ 397.491695] ? do_sys_open+0x2bf/0x520 [ 397.495611] ksys_ioctl+0x9b/0xc0 [ 397.499084] __x64_sys_ioctl+0x6f/0xb0 [ 397.503152] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 397.507852] do_syscall_64+0xf9/0x620 [ 397.511843] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 397.517045] RIP: 0033:0x45e087 [ 397.520254] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 6d b5 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 397.539272] RSP: 002b:00007fb3ea55ea18 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 397.539286] RAX: ffffffffffffffda RBX: 0000000000000006 RCX: 000000000045e087 [ 397.539294] RDX: 0000000000000005 RSI: 0000000000004c00 RDI: 0000000000000006 [ 397.539302] RBP: 0000000000000000 R08: 0000000020000260 R09: 0000000000000000 [ 397.539310] R10: 0000000000009060 R11: 0000000000000246 R12: 0000000000000004 [ 397.539318] R13: 0000000000000005 R14: 0000000000000005 R15: 0000000020000270 [ 397.576396] EXT4-fs (loop3): mounted filesystem without journal. Opts: ,errors=continue 16:47:48 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x0, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f00000000c0)={0x0, {0x0, 0x0, 0x0, 0x0, 0x5, 0x3}}) 16:47:48 executing program 2: creat(&(0x7f0000000280)='./file0\x00', 0x0) close(0xffffffffffffffff) write$binfmt_script(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) [ 397.659583] EXT4-fs (loop5): bad geometry: block count 256 exceeds size of device (113 blocks) 16:47:48 executing program 3 (fault-call:1 fault-nth:15): creat(&(0x7f0000000280)='./file0\x00', 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) 16:47:48 executing program 0: creat(&(0x7f0000000280)='./file0\x00', 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) 16:47:48 executing program 5: creat(&(0x7f0000000280)='./file0\x00', 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x1c5e2, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) 16:47:48 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x0, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f00000000c0)={0x0, {0x0, 0x0, 0x0, 0x0, 0x5, 0x4}}) [ 397.833829] FAULT_INJECTION: forcing a failure. [ 397.833829] name failslab, interval 1, probability 0, space 0, times 0 [ 397.864914] CPU: 0 PID: 22339 Comm: syz-executor.3 Not tainted 4.19.169-syzkaller #0 [ 397.873071] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 397.882442] Call Trace: [ 397.885054] dump_stack+0x1fc/0x2ef [ 397.888702] should_fail.cold+0xa/0xf [ 397.892523] ? setup_fault_attr+0x200/0x200 [ 397.896861] ? lock_acquire+0x170/0x3c0 [ 397.900860] __should_failslab+0x115/0x180 [ 397.905117] should_failslab+0x5/0x10 [ 397.908929] kmem_cache_alloc+0x277/0x370 [ 397.913103] __kernfs_new_node+0xd2/0x680 [ 397.917271] ? kernfs_dop_revalidate+0x3a0/0x3a0 [ 397.922055] ? __mutex_unlock_slowpath+0xea/0x610 [ 397.926925] ? wait_for_completion_io+0x10/0x10 [ 397.931614] ? kernfs_next_descendant_post+0x19c/0x290 [ 397.936913] kernfs_new_node+0x92/0x120 [ 397.941046] __kernfs_create_file+0x51/0x340 [ 397.945597] sysfs_add_file_mode_ns+0x226/0x540 [ 397.950285] internal_create_group+0x355/0xb20 [ 397.954890] ? sysfs_remove_link_from_group+0x70/0x70 [ 397.960095] ? lock_downgrade+0x720/0x720 [ 397.964359] lo_ioctl+0xf7c/0x20e0 [ 397.967920] ? loop_set_status64+0x110/0x110 [ 397.972354] blkdev_ioctl+0x5cb/0x1a80 [ 397.976256] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 397.981640] ? blkpg_ioctl+0x9d0/0x9d0 [ 397.985545] ? mark_held_locks+0xf0/0xf0 [ 397.989630] ? mark_held_locks+0xf0/0xf0 [ 397.993713] ? debug_check_no_obj_freed+0x201/0x490 [ 397.998839] ? lock_downgrade+0x720/0x720 [ 398.003008] block_ioctl+0xe9/0x130 [ 398.006649] ? blkdev_fallocate+0x3f0/0x3f0 [ 398.010991] do_vfs_ioctl+0xcdb/0x12e0 [ 398.014899] ? lock_downgrade+0x720/0x720 [ 398.019063] ? check_preemption_disabled+0x41/0x280 [ 398.024096] ? ioctl_preallocate+0x200/0x200 [ 398.028644] ? __fget+0x356/0x510 [ 398.032120] ? do_dup2+0x450/0x450 [ 398.035720] ? do_sys_open+0x2bf/0x520 [ 398.039628] ksys_ioctl+0x9b/0xc0 [ 398.043118] __x64_sys_ioctl+0x6f/0xb0 [ 398.047031] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 398.051626] do_syscall_64+0xf9/0x620 [ 398.055446] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 398.060645] RIP: 0033:0x45e087 [ 398.063846] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 6d b5 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 398.082758] RSP: 002b:00007fb3ea55ea18 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 398.090587] RAX: ffffffffffffffda RBX: 0000000000000006 RCX: 000000000045e087 [ 398.097883] RDX: 0000000000000005 RSI: 0000000000004c00 RDI: 0000000000000006 [ 398.105165] RBP: 0000000000000000 R08: 0000000020000260 R09: 0000000000000000 [ 398.112599] R10: 0000000000009060 R11: 0000000000000246 R12: 0000000000000004 [ 398.119999] R13: 0000000000000005 R14: 0000000000000005 R15: 0000000020000270 16:47:48 executing program 0: creat(&(0x7f0000000280)='./file0\x00', 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) 16:47:48 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x0, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f00000000c0)={0x0, {0x0, 0x0, 0x0, 0x0, 0x5, 0x5}}) [ 398.176442] EXT4-fs (loop3): mounted filesystem without journal. Opts: ,errors=continue [ 398.194273] EXT4-fs (loop2): VFS: Can't find ext4 filesystem [ 398.195531] EXT4-fs (loop5): bad geometry: block count 256 exceeds size of device (113 blocks) 16:47:48 executing program 2: creat(&(0x7f0000000280)='./file0\x00', 0x0) close(0xffffffffffffffff) write$binfmt_script(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, 0x0) 16:47:48 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x0, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f00000000c0)={0x0, {0x0, 0x0, 0x0, 0x0, 0x5, 0x6}}) 16:47:48 executing program 5: creat(&(0x7f0000000280)='./file0\x00', 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x1c5ee, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) 16:47:48 executing program 0: creat(&(0x7f0000000280)='./file0\x00', 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="30000000000100000c000000d90000000f0000000100000000000000000000000020000000200000200000002cc4645f2cc4645f0100ffff53ef0100010000002cc4645f000000000000000001000000000000000b0000008000000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e3338363633343038350000000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000000000000000000000000000000000000d9ca5cac99fd4329af4dde786c1a5d13010040000c000000000000002cc4645f", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) 16:47:48 executing program 3 (fault-call:1 fault-nth:16): creat(&(0x7f0000000280)='./file0\x00', 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) 16:47:48 executing program 2: creat(&(0x7f0000000280)='./file0\x00', 0x0) close(0xffffffffffffffff) write$binfmt_script(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, 0x0) 16:47:48 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x0, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f00000000c0)={0x0, {0x0, 0x0, 0x0, 0x0, 0x5, 0x7}}) [ 398.513233] FAULT_INJECTION: forcing a failure. [ 398.513233] name failslab, interval 1, probability 0, space 0, times 0 [ 398.548971] CPU: 1 PID: 22376 Comm: syz-executor.3 Not tainted 4.19.169-syzkaller #0 [ 398.557159] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 398.566524] Call Trace: [ 398.569135] dump_stack+0x1fc/0x2ef [ 398.572787] should_fail.cold+0xa/0xf [ 398.576606] ? setup_fault_attr+0x200/0x200 [ 398.580942] ? lock_acquire+0x170/0x3c0 [ 398.584941] __should_failslab+0x115/0x180 [ 398.589204] should_failslab+0x5/0x10 [ 398.593020] kmem_cache_alloc+0x277/0x370 [ 398.597188] __kernfs_new_node+0xd2/0x680 [ 398.601357] ? kernfs_dop_revalidate+0x3a0/0x3a0 [ 398.606163] ? __mutex_unlock_slowpath+0xea/0x610 [ 398.611027] ? wait_for_completion_io+0x10/0x10 [ 398.615803] ? kernfs_next_descendant_post+0x19c/0x290 [ 398.621102] kernfs_new_node+0x92/0x120 [ 398.625094] __kernfs_create_file+0x51/0x340 [ 398.629523] sysfs_add_file_mode_ns+0x226/0x540 [ 398.634210] internal_create_group+0x355/0xb20 [ 398.638811] ? sysfs_remove_link_from_group+0x70/0x70 [ 398.644119] ? lock_downgrade+0x720/0x720 [ 398.648309] lo_ioctl+0xf7c/0x20e0 [ 398.651874] ? loop_set_status64+0x110/0x110 [ 398.656303] blkdev_ioctl+0x5cb/0x1a80 [ 398.660205] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 398.665584] ? blkpg_ioctl+0x9d0/0x9d0 [ 398.669815] ? mark_held_locks+0xf0/0xf0 [ 398.673898] ? mark_held_locks+0xf0/0xf0 [ 398.677985] ? debug_check_no_obj_freed+0x201/0x490 [ 398.683131] ? lock_downgrade+0x720/0x720 [ 398.687304] block_ioctl+0xe9/0x130 [ 398.690944] ? blkdev_fallocate+0x3f0/0x3f0 [ 398.695285] do_vfs_ioctl+0xcdb/0x12e0 [ 398.699189] ? lock_downgrade+0x720/0x720 [ 398.703511] ? check_preemption_disabled+0x41/0x280 [ 398.708539] ? ioctl_preallocate+0x200/0x200 [ 398.713055] ? __fget+0x356/0x510 [ 398.716670] ? do_dup2+0x450/0x450 [ 398.720226] ? do_sys_open+0x2bf/0x520 [ 398.724283] ksys_ioctl+0x9b/0xc0 [ 398.727754] __x64_sys_ioctl+0x6f/0xb0 [ 398.731659] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 398.736260] do_syscall_64+0xf9/0x620 [ 398.740079] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 398.745282] RIP: 0033:0x45e087 16:47:49 executing program 0: creat(&(0x7f0000000280)='./file0\x00', 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) 16:47:49 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x0, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f00000000c0)={0x0, {0x0, 0x0, 0x0, 0x0, 0x5, 0xa}}) [ 398.748484] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 6d b5 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 398.767396] RSP: 002b:00007fb3ea55ea18 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 398.775271] RAX: ffffffffffffffda RBX: 0000000000000006 RCX: 000000000045e087 [ 398.782554] RDX: 0000000000000005 RSI: 0000000000004c00 RDI: 0000000000000006 [ 398.789833] RBP: 0000000000000000 R08: 0000000020000260 R09: 0000000000000000 [ 398.797114] R10: 0000000000009060 R11: 0000000000000246 R12: 0000000000000004 [ 398.804401] R13: 0000000000000005 R14: 0000000000000005 R15: 0000000020000270 [ 398.879188] EXT4-fs (loop5): bad geometry: block count 256 exceeds size of device (113 blocks) [ 398.888952] EXT4-fs (loop3): mounted filesystem without journal. Opts: ,errors=continue 16:47:49 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x0, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f00000000c0)={0x0, {0x0, 0x0, 0x0, 0x0, 0x5, 0x10}}) 16:47:49 executing program 2: creat(&(0x7f0000000280)='./file0\x00', 0x0) close(0xffffffffffffffff) write$binfmt_script(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, 0x0) 16:47:49 executing program 0: creat(&(0x7f0000000280)='./file0\x00', 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20030000000100000c000000d90000000f0000000100000000000000000000000020000000200000200000002cc4645f2cc4645f0100ffff53ef0100010000002cc4645f000000000000000001000000000000000b0000008000000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e3338363633343038350000000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000000000000000000000000000000000000d9ca5cac99fd4329af4dde786c1a5d13010040000c000000000000002cc4645f", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) 16:47:49 executing program 3 (fault-call:1 fault-nth:17): creat(&(0x7f0000000280)='./file0\x00', 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d90000000f0000000100000000000000000000000020000000200000200000002cc4645f2cc4645f0100ffff53ef0100010000002cc4645f000000000000000001000000000000000b0000008000000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e3338363633343038350000000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000000000000000000000000000000000000d9ca5cac99fd4329af4dde786c1a5d13010040000c000000000000002cc4645f", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) 16:47:49 executing program 5: creat(&(0x7f0000000280)='./file0\x00', 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x1c5ef, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) 16:47:49 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x0, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f00000000c0)={0x0, {0x0, 0x0, 0x0, 0x0, 0x5, 0x48}}) [ 399.257436] FAULT_INJECTION: forcing a failure. [ 399.257436] name failslab, interval 1, probability 0, space 0, times 0 [ 399.284146] CPU: 1 PID: 22417 Comm: syz-executor.3 Not tainted 4.19.169-syzkaller #0 [ 399.292123] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 399.301494] Call Trace: [ 399.304108] dump_stack+0x1fc/0x2ef [ 399.307764] should_fail.cold+0xa/0xf [ 399.311588] ? setup_fault_attr+0x200/0x200 [ 399.315934] ? lock_acquire+0x170/0x3c0 [ 399.320075] __should_failslab+0x115/0x180 [ 399.324327] should_failslab+0x5/0x10 [ 399.328145] kmem_cache_alloc+0x277/0x370 [ 399.332324] __kernfs_new_node+0xd2/0x680 [ 399.336495] ? kernfs_dop_revalidate+0x3a0/0x3a0 [ 399.341372] ? __mutex_unlock_slowpath+0xea/0x610 [ 399.346427] ? wait_for_completion_io+0x10/0x10 [ 399.351286] ? kernfs_next_descendant_post+0x19c/0x290 [ 399.356590] kernfs_new_node+0x92/0x120 [ 399.360585] __kernfs_create_file+0x51/0x340 [ 399.365018] sysfs_add_file_mode_ns+0x226/0x540 [ 399.369712] internal_create_group+0x355/0xb20 [ 399.374325] ? sysfs_remove_link_from_group+0x70/0x70 [ 399.379532] ? lock_downgrade+0x720/0x720 [ 399.383853] lo_ioctl+0xf7c/0x20e0 [ 399.387590] ? loop_set_status64+0x110/0x110 [ 399.392154] blkdev_ioctl+0x5cb/0x1a80 [ 399.396061] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 399.401582] ? blkpg_ioctl+0x9d0/0x9d0 [ 399.405487] ? mark_held_locks+0xf0/0xf0 [ 399.409572] ? mark_held_locks+0xf0/0xf0 [ 399.413659] ? debug_check_no_obj_freed+0x201/0x490 [ 399.418821] ? lock_downgrade+0x720/0x720 [ 399.423085] block_ioctl+0xe9/0x130 [ 399.426724] ? blkdev_fallocate+0x3f0/0x3f0 [ 399.431063] do_vfs_ioctl+0xcdb/0x12e0 [ 399.434966] ? lock_downgrade+0x720/0x720 [ 399.439459] ? check_preemption_disabled+0x41/0x280 [ 399.444494] ? ioctl_preallocate+0x200/0x200 [ 399.448924] ? __fget+0x356/0x510 [ 399.452400] ? do_dup2+0x450/0x450 [ 399.455960] ? do_sys_open+0x2bf/0x520 [ 399.459990] ksys_ioctl+0x9b/0xc0 [ 399.463580] __x64_sys_ioctl+0x6f/0xb0 [ 399.467486] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 399.472222] do_syscall_64+0xf9/0x620 [ 399.476049] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 399.481252] RIP: 0033:0x45e087 [ 399.484462] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 6d b5 fb ff c3 66 2e 0f 1f 84 00 00 00 00 16:47:49 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x0, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f00000000c0)={0x0, {0x0, 0x0, 0x0, 0x6c00, 0x5}}) [ 399.503378] RSP: 002b:00007fb3ea55ea18 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 399.511100] RAX: ffffffffffffffda RBX: 0000000000000006 RCX: 000000000045e087 [ 399.518467] RDX: 0000000000000005 RSI: 0000000000004c00 RDI: 0000000000000006 [ 399.525968] RBP: 0000000000000000 R08: 0000000020000260 R09: 0000000000000000 [ 399.533343] R10: 0000000000009060 R11: 0000000000000246 R12: 0000000000000004 [ 399.540853] R13: 0000000000000005 R14: 0000000000000005 R15: 0000000020000270 [ 399.585258] EXT4-fs (loop5): bad geometry: block count 256 exceeds size of device (113 blocks) [ 399.599131] EXT4-fs (loop3): mounted filesystem without journal. Opts: ,errors=continue 16:47:50 executing program 0: creat(&(0x7f0000000280)='./file0\x00', 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20040000000100000c000000d90000000f0000000100000000000000000000000020000000200000200000002cc4645f2cc4645f0100ffff53ef0100010000002cc4645f000000000000000001000000000000000b0000008000000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e3338363633343038350000000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000000000000000000000000000000000000d9ca5cac99fd4329af4dde786c1a5d13010040000c000000000000002cc4645f", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) 16:47:50 executing program 2 (fault-call:3 fault-nth:0): creat(&(0x7f0000000280)='./file0\x00', 0x0) close(0xffffffffffffffff) write$binfmt_script(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d90000000f0000000100000000000000000000000020000000200000200000002cc4645f2cc4645f0100ffff53ef0100010000002cc4645f000000000000000001000000000000000b0000008000000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e3338363633343038350000000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000000000000000000000000000000000000d9ca5cac99fd4329af4dde786c1a5d13010040000c000000000000002cc4645f", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) 16:47:50 executing program 0: creat(&(0x7f0000000280)='./file0\x00', 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) 16:47:50 executing program 3 (fault-call:1 fault-nth:18): creat(&(0x7f0000000280)='./file0\x00', 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) 16:47:50 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x0, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f00000000c0)={0x0, {0x0, 0x0, 0x0, 0x0, 0x5, 0x4c}}) 16:47:50 executing program 5: creat(&(0x7f0000000280)='./file0\x00', 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x1c5f0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) [ 399.812861] FAULT_INJECTION: forcing a failure. [ 399.812861] name failslab, interval 1, probability 0, space 0, times 0 [ 399.836737] FAULT_INJECTION: forcing a failure. [ 399.836737] name failslab, interval 1, probability 0, space 0, times 0 [ 399.853459] CPU: 0 PID: 22440 Comm: syz-executor.2 Not tainted 4.19.169-syzkaller #0 [ 399.861385] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 399.870932] Call Trace: [ 399.870958] dump_stack+0x1fc/0x2ef [ 399.870977] should_fail.cold+0xa/0xf [ 399.870994] ? setup_fault_attr+0x200/0x200 [ 399.871010] ? lock_acquire+0x170/0x3c0 [ 399.871032] __should_failslab+0x115/0x180 [ 399.871050] should_failslab+0x5/0x10 [ 399.897493] __kmalloc+0x2ab/0x3c0 [ 399.901053] ? __se_sys_memfd_create+0xf8/0x440 [ 399.905839] __se_sys_memfd_create+0xf8/0x440 [ 399.910357] ? memfd_file_seals_ptr+0x150/0x150 [ 399.915042] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 399.920552] ? trace_hardirqs_off_caller+0x6e/0x210 [ 399.925601] ? do_syscall_64+0x21/0x620 [ 399.929840] do_syscall_64+0xf9/0x620 [ 399.933753] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 399.938957] RIP: 0033:0x45e219 [ 399.942166] Code: 0d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 399.961083] RSP: 002b:00007fadad313a18 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 399.968920] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 000000000045e219 [ 399.976204] RDX: 0000000020000260 RSI: 0000000000000000 RDI: 00000000004c2c87 [ 399.983487] RBP: 0000000000040000 R08: 0000000020000260 R09: 0000000000000000 [ 399.990882] R10: fe03f80fe03f80ff R11: 0000000000000246 R12: 0000000000000004 [ 399.998415] R13: 0000000020000100 R14: 0000000020000200 R15: 0000000020013000 [ 400.013546] CPU: 1 PID: 22443 Comm: syz-executor.3 Not tainted 4.19.169-syzkaller #0 [ 400.021718] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 400.031360] Call Trace: [ 400.034016] dump_stack+0x1fc/0x2ef [ 400.037669] should_fail.cold+0xa/0xf [ 400.041493] ? setup_fault_attr+0x200/0x200 [ 400.045839] ? lock_acquire+0x170/0x3c0 [ 400.049854] __should_failslab+0x115/0x180 [ 400.054113] should_failslab+0x5/0x10 [ 400.057931] kmem_cache_alloc+0x277/0x370 [ 400.062098] __kernfs_new_node+0xd2/0x680 [ 400.066267] ? kernfs_dop_revalidate+0x3a0/0x3a0 [ 400.071046] ? __mutex_unlock_slowpath+0xea/0x610 [ 400.075907] ? wait_for_completion_io+0x10/0x10 [ 400.080598] ? kernfs_next_descendant_post+0x19c/0x290 [ 400.085898] kernfs_new_node+0x92/0x120 [ 400.090121] __kernfs_create_file+0x51/0x340 [ 400.094547] sysfs_add_file_mode_ns+0x226/0x540 [ 400.099238] internal_create_group+0x355/0xb20 [ 400.103848] ? sysfs_remove_link_from_group+0x70/0x70 [ 400.109200] ? lock_downgrade+0x720/0x720 [ 400.113379] lo_ioctl+0xf7c/0x20e0 [ 400.116941] ? loop_set_status64+0x110/0x110 [ 400.121373] blkdev_ioctl+0x5cb/0x1a80 [ 400.125281] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 400.130793] ? blkpg_ioctl+0x9d0/0x9d0 [ 400.134707] ? mark_held_locks+0xf0/0xf0 [ 400.138790] ? mark_held_locks+0xf0/0xf0 [ 400.142875] ? debug_check_no_obj_freed+0x201/0x490 [ 400.147916] ? lock_downgrade+0x720/0x720 [ 400.152085] block_ioctl+0xe9/0x130 [ 400.155728] ? blkdev_fallocate+0x3f0/0x3f0 [ 400.160066] do_vfs_ioctl+0xcdb/0x12e0 [ 400.163973] ? lock_downgrade+0x720/0x720 [ 400.168279] ? check_preemption_disabled+0x41/0x280 [ 400.173310] ? ioctl_preallocate+0x200/0x200 [ 400.177739] ? __fget+0x356/0x510 [ 400.181212] ? do_dup2+0x450/0x450 [ 400.184767] ? do_sys_open+0x2bf/0x520 [ 400.188688] ksys_ioctl+0x9b/0xc0 [ 400.192155] __x64_sys_ioctl+0x6f/0xb0 [ 400.196056] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 400.200789] do_syscall_64+0xf9/0x620 [ 400.204614] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 400.209824] RIP: 0033:0x45e087 [ 400.213031] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 6d b5 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 400.232005] RSP: 002b:00007fb3ea55ea18 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 400.239729] RAX: ffffffffffffffda RBX: 0000000000000006 RCX: 000000000045e087 [ 400.247015] RDX: 0000000000000005 RSI: 0000000000004c00 RDI: 0000000000000006 [ 400.254385] RBP: 0000000000000000 R08: 0000000020000260 R09: 0000000000000000 16:47:50 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x0, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f00000000c0)={0x0, {0x0, 0x0, 0x0, 0x0, 0x5, 0x68}}) 16:47:50 executing program 2 (fault-call:3 fault-nth:1): creat(&(0x7f0000000280)='./file0\x00', 0x0) close(0xffffffffffffffff) write$binfmt_script(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) [ 400.261668] R10: 0000000000009060 R11: 0000000000000246 R12: 0000000000000004 [ 400.268953] R13: 0000000000000005 R14: 0000000000000005 R15: 0000000020000270 16:47:50 executing program 0: creat(&(0x7f0000000280)='./file0\x00', 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) [ 400.353394] EXT4-fs (loop3): mounted filesystem without journal. Opts: ,errors=continue [ 400.362160] EXT4-fs (loop5): bad geometry: block count 256 exceeds size of device (113 blocks) 16:47:50 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x0, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f00000000c0)={0x0, {0x0, 0x0, 0x0, 0x0, 0x5, 0x6c}}) [ 400.409563] FAULT_INJECTION: forcing a failure. [ 400.409563] name failslab, interval 1, probability 0, space 0, times 0 [ 400.422034] CPU: 0 PID: 22460 Comm: syz-executor.2 Not tainted 4.19.169-syzkaller #0 [ 400.429954] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 400.439332] Call Trace: [ 400.441947] dump_stack+0x1fc/0x2ef [ 400.445606] should_fail.cold+0xa/0xf [ 400.449432] ? setup_fault_attr+0x200/0x200 [ 400.453776] ? lock_acquire+0x170/0x3c0 [ 400.457778] __should_failslab+0x115/0x180 [ 400.462031] should_failslab+0x5/0x10 [ 400.465847] kmem_cache_alloc+0x277/0x370 [ 400.470015] ? shmem_destroy_callback+0xb0/0xb0 [ 400.474703] shmem_alloc_inode+0x18/0x40 [ 400.478867] ? shmem_destroy_callback+0xb0/0xb0 [ 400.483550] alloc_inode+0x5d/0x180 [ 400.487194] new_inode+0x1d/0xf0 [ 400.490840] shmem_get_inode+0x96/0x8d0 [ 400.494856] __shmem_file_setup.part.0+0x7a/0x2b0 [ 400.499842] shmem_file_setup+0x61/0x90 [ 400.503839] __se_sys_memfd_create+0x26b/0x440 [ 400.508440] ? memfd_file_seals_ptr+0x150/0x150 [ 400.513128] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 400.518515] ? trace_hardirqs_off_caller+0x6e/0x210 [ 400.523548] ? do_syscall_64+0x21/0x620 [ 400.527553] do_syscall_64+0xf9/0x620 [ 400.531497] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 400.536699] RIP: 0033:0x45e219 [ 400.539909] Code: 0d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 16:47:51 executing program 3 (fault-call:1 fault-nth:19): creat(&(0x7f0000000280)='./file0\x00', 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) [ 400.558973] RSP: 002b:00007fadad313a18 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 400.566946] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 000000000045e219 [ 400.574228] RDX: 0000000020000260 RSI: 0000000000000000 RDI: 00000000004c2c87 [ 400.581513] RBP: 0000000000040000 R08: 0000000020000260 R09: 0000000000000000 [ 400.588797] R10: fe03f80fe03f80ff R11: 0000000000000246 R12: 0000000000000004 [ 400.596343] R13: 0000000020000100 R14: 0000000020000200 R15: 0000000020013000 16:47:51 executing program 5: creat(&(0x7f0000000280)='./file0\x00', 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x20000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) 16:47:51 executing program 2 (fault-call:3 fault-nth:2): creat(&(0x7f0000000280)='./file0\x00', 0x0) close(0xffffffffffffffff) write$binfmt_script(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) 16:47:51 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x0, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f00000000c0)={0x0, {0x0, 0x0, 0x0, 0x0, 0x5, 0x74}}) 16:47:51 executing program 0: creat(&(0x7f0000000280)='./file0\x00', 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) [ 400.749854] FAULT_INJECTION: forcing a failure. [ 400.749854] name failslab, interval 1, probability 0, space 0, times 0 [ 400.763758] FAULT_INJECTION: forcing a failure. [ 400.763758] name failslab, interval 1, probability 0, space 0, times 0 [ 400.778256] CPU: 1 PID: 22477 Comm: syz-executor.2 Not tainted 4.19.169-syzkaller #0 [ 400.786468] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 400.795833] Call Trace: [ 400.798456] dump_stack+0x1fc/0x2ef [ 400.802100] should_fail.cold+0xa/0xf [ 400.805919] ? setup_fault_attr+0x200/0x200 [ 400.810259] ? lock_acquire+0x170/0x3c0 [ 400.814448] __should_failslab+0x115/0x180 [ 400.818692] should_failslab+0x5/0x10 [ 400.822613] kmem_cache_alloc+0x277/0x370 [ 400.826772] __d_alloc+0x2b/0xa10 [ 400.830431] d_alloc_pseudo+0x19/0x70 [ 400.834249] alloc_file_pseudo+0xc6/0x250 [ 400.838420] ? alloc_file+0x4d0/0x4d0 [ 400.842243] ? lockdep_annotate_inode_mutex_key+0x43/0x130 [ 400.847973] ? shmem_get_inode+0x44c/0x8d0 [ 400.852339] __shmem_file_setup.part.0+0x102/0x2b0 [ 400.857421] shmem_file_setup+0x61/0x90 [ 400.861403] __se_sys_memfd_create+0x26b/0x440 [ 400.866001] ? memfd_file_seals_ptr+0x150/0x150 [ 400.870776] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 400.876154] ? trace_hardirqs_off_caller+0x6e/0x210 [ 400.881183] ? do_syscall_64+0x21/0x620 [ 400.885176] do_syscall_64+0xf9/0x620 [ 400.889084] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 400.894282] RIP: 0033:0x45e219 [ 400.894297] Code: 0d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 400.894305] RSP: 002b:00007fadad313a18 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 400.894317] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 000000000045e219 [ 400.894325] RDX: 0000000020000260 RSI: 0000000000000000 RDI: 00000000004c2c87 [ 400.894331] RBP: 0000000000040000 R08: 0000000020000260 R09: 0000000000000000 [ 400.894343] R10: fe03f80fe03f80ff R11: 0000000000000246 R12: 0000000000000004 [ 400.954069] R13: 0000000020000100 R14: 0000000020000200 R15: 0000000020013000 [ 400.961375] CPU: 0 PID: 22472 Comm: syz-executor.3 Not tainted 4.19.169-syzkaller #0 [ 400.969282] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 400.978777] Call Trace: [ 400.981393] dump_stack+0x1fc/0x2ef [ 400.985047] should_fail.cold+0xa/0xf [ 400.988867] ? setup_fault_attr+0x200/0x200 [ 400.993349] ? lock_acquire+0x170/0x3c0 [ 400.997352] __should_failslab+0x115/0x180 [ 401.001620] should_failslab+0x5/0x10 [ 401.005433] kmem_cache_alloc+0x277/0x370 [ 401.009605] __kernfs_new_node+0xd2/0x680 [ 401.013772] ? kernfs_dop_revalidate+0x3a0/0x3a0 [ 401.018546] ? __mutex_unlock_slowpath+0xea/0x610 [ 401.023545] ? wait_for_completion_io+0x10/0x10 [ 401.028246] ? kernfs_next_descendant_post+0x19c/0x290 [ 401.033546] kernfs_new_node+0x92/0x120 [ 401.037665] __kernfs_create_file+0x51/0x340 [ 401.042094] sysfs_add_file_mode_ns+0x226/0x540 [ 401.046790] internal_create_group+0x355/0xb20 [ 401.051478] ? sysfs_remove_link_from_group+0x70/0x70 [ 401.056681] ? lock_downgrade+0x720/0x720 [ 401.060854] lo_ioctl+0xf7c/0x20e0 [ 401.064418] ? loop_set_status64+0x110/0x110 [ 401.068848] blkdev_ioctl+0x5cb/0x1a80 [ 401.072763] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 401.078145] ? blkpg_ioctl+0x9d0/0x9d0 [ 401.082047] ? mark_held_locks+0xf0/0xf0 [ 401.086299] ? mark_held_locks+0xf0/0xf0 [ 401.090384] ? debug_check_no_obj_freed+0x201/0x490 [ 401.095426] ? lock_downgrade+0x720/0x720 [ 401.099592] block_ioctl+0xe9/0x130 [ 401.103238] ? blkdev_fallocate+0x3f0/0x3f0 [ 401.107580] do_vfs_ioctl+0xcdb/0x12e0 [ 401.111496] ? lock_downgrade+0x720/0x720 [ 401.115661] ? check_preemption_disabled+0x41/0x280 [ 401.120694] ? ioctl_preallocate+0x200/0x200 [ 401.125127] ? __fget+0x356/0x510 [ 401.128601] ? do_dup2+0x450/0x450 [ 401.132160] ? do_sys_open+0x2bf/0x520 [ 401.136073] ksys_ioctl+0x9b/0xc0 [ 401.139547] __x64_sys_ioctl+0x6f/0xb0 [ 401.144841] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 401.149587] do_syscall_64+0xf9/0x620 [ 401.153411] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 401.158616] RIP: 0033:0x45e087 [ 401.161825] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 6d b5 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 401.180889] RSP: 002b:00007fb3ea55ea18 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 401.188615] RAX: ffffffffffffffda RBX: 0000000000000006 RCX: 000000000045e087 16:47:51 executing program 2 (fault-call:3 fault-nth:3): creat(&(0x7f0000000280)='./file0\x00', 0x0) close(0xffffffffffffffff) write$binfmt_script(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d90000000f0000000100000000000000000000000020000000200000200000002cc4645f2cc4645f0100ffff53ef0100010000002cc4645f000000000000000001000000000000000b0000008000000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e3338363633343038350000000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000000000000000000000000000000000000d9ca5cac99fd4329af4dde786c1a5d13010040000c000000000000002cc4645f", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) [ 401.195904] RDX: 0000000000000005 RSI: 0000000000004c00 RDI: 0000000000000006 [ 401.203331] RBP: 0000000000000000 R08: 0000000020000260 R09: 0000000000000000 [ 401.210614] R10: 0000000000009060 R11: 0000000000000246 R12: 0000000000000004 [ 401.217896] R13: 0000000000000005 R14: 0000000000000005 R15: 0000000020000270 16:47:51 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x0, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f00000000c0)={0x0, {0x0, 0x0, 0x0, 0x0, 0x5, 0x7a}}) [ 401.274851] EXT4-fs (loop5): bad geometry: block count 256 exceeds size of device (128 blocks) [ 401.285259] EXT4-fs (loop3): mounted filesystem without journal. Opts: ,errors=continue 16:47:51 executing program 5: creat(&(0x7f0000000280)='./file0\x00', 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x24c00, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) 16:47:51 executing program 0: creat(&(0x7f0000000280)='./file0\x00', 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) [ 401.356616] FAULT_INJECTION: forcing a failure. [ 401.356616] name failslab, interval 1, probability 0, space 0, times 0 16:47:51 executing program 3 (fault-call:1 fault-nth:20): creat(&(0x7f0000000280)='./file0\x00', 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) [ 401.427449] CPU: 0 PID: 22491 Comm: syz-executor.2 Not tainted 4.19.169-syzkaller #0 [ 401.435572] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 401.445025] Call Trace: [ 401.447637] dump_stack+0x1fc/0x2ef [ 401.451287] should_fail.cold+0xa/0xf [ 401.455141] ? setup_fault_attr+0x200/0x200 [ 401.459480] ? lock_acquire+0x170/0x3c0 [ 401.463479] __should_failslab+0x115/0x180 [ 401.467846] should_failslab+0x5/0x10 16:47:51 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x0, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f00000000c0)={0x0, {0x0, 0x0, 0x0, 0x0, 0x5, 0x300}}) [ 401.469448] EXT4-fs (loop5): bad geometry: block count 256 exceeds size of device (147 blocks) [ 401.471811] kmem_cache_alloc+0x277/0x370 [ 401.471830] __alloc_file+0x21/0x330 [ 401.471906] alloc_empty_file+0x6d/0x170 [ 401.492588] alloc_file+0x5e/0x4d0 [ 401.496262] alloc_file_pseudo+0x165/0x250 [ 401.500514] ? alloc_file+0x4d0/0x4d0 [ 401.504337] ? lockdep_annotate_inode_mutex_key+0x43/0x130 [ 401.510108] ? shmem_get_inode+0x44c/0x8d0 [ 401.514369] __shmem_file_setup.part.0+0x102/0x2b0 [ 401.519347] shmem_file_setup+0x61/0x90 [ 401.523341] __se_sys_memfd_create+0x26b/0x440 [ 401.527944] ? memfd_file_seals_ptr+0x150/0x150 [ 401.532631] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 401.538017] ? trace_hardirqs_off_caller+0x6e/0x210 [ 401.543206] ? do_syscall_64+0x21/0x620 [ 401.547200] do_syscall_64+0xf9/0x620 [ 401.551111] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 401.556312] RIP: 0033:0x45e219 [ 401.559519] Code: 0d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 401.578432] RSP: 002b:00007fadad313a18 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 401.586385] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 000000000045e219 [ 401.593692] RDX: 0000000020000260 RSI: 0000000000000000 RDI: 00000000004c2c87 [ 401.601107] RBP: 0000000000040000 R08: 0000000020000260 R09: 0000000000000000 [ 401.608394] R10: fe03f80fe03f80ff R11: 0000000000000246 R12: 0000000000000004 [ 401.615830] R13: 0000000020000100 R14: 0000000020000200 R15: 0000000020013000 16:47:52 executing program 2 (fault-call:3 fault-nth:4): creat(&(0x7f0000000280)='./file0\x00', 0x0) close(0xffffffffffffffff) write$binfmt_script(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) [ 401.664187] FAULT_INJECTION: forcing a failure. [ 401.664187] name failslab, interval 1, probability 0, space 0, times 0 [ 401.692624] CPU: 1 PID: 22506 Comm: syz-executor.3 Not tainted 4.19.169-syzkaller #0 [ 401.700544] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 401.709913] Call Trace: [ 401.712785] dump_stack+0x1fc/0x2ef [ 401.716450] should_fail.cold+0xa/0xf [ 401.720274] ? setup_fault_attr+0x200/0x200 [ 401.724613] ? lock_acquire+0x170/0x3c0 [ 401.728611] __should_failslab+0x115/0x180 [ 401.732867] should_failslab+0x5/0x10 [ 401.736685] kmem_cache_alloc+0x277/0x370 [ 401.741023] __kernfs_new_node+0xd2/0x680 [ 401.745192] ? kernfs_dop_revalidate+0x3a0/0x3a0 [ 401.749967] ? __mutex_unlock_slowpath+0xea/0x610 [ 401.754833] ? wait_for_completion_io+0x10/0x10 [ 401.759534] ? kernfs_next_descendant_post+0x19c/0x290 [ 401.764857] kernfs_new_node+0x92/0x120 [ 401.768875] __kernfs_create_file+0x51/0x340 [ 401.773415] sysfs_add_file_mode_ns+0x226/0x540 [ 401.778114] internal_create_group+0x355/0xb20 [ 401.782719] ? sysfs_remove_link_from_group+0x70/0x70 [ 401.787925] ? lock_downgrade+0x720/0x720 [ 401.792107] lo_ioctl+0xf7c/0x20e0 [ 401.795668] ? loop_set_status64+0x110/0x110 [ 401.800184] blkdev_ioctl+0x5cb/0x1a80 [ 401.804098] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 401.809474] ? blkpg_ioctl+0x9d0/0x9d0 [ 401.813384] ? mark_held_locks+0xf0/0xf0 [ 401.817465] ? mark_held_locks+0xf0/0xf0 [ 401.821670] ? debug_check_no_obj_freed+0x201/0x490 [ 401.826709] ? lock_downgrade+0x720/0x720 [ 401.831028] block_ioctl+0xe9/0x130 [ 401.834667] ? blkdev_fallocate+0x3f0/0x3f0 [ 401.839009] do_vfs_ioctl+0xcdb/0x12e0 [ 401.842915] ? lock_downgrade+0x720/0x720 [ 401.847241] ? check_preemption_disabled+0x41/0x280 [ 401.852275] ? ioctl_preallocate+0x200/0x200 [ 401.856702] ? __fget+0x356/0x510 [ 401.860172] ? do_dup2+0x450/0x450 [ 401.863728] ? do_sys_open+0x2bf/0x520 [ 401.867763] ksys_ioctl+0x9b/0xc0 [ 401.871251] __x64_sys_ioctl+0x6f/0xb0 [ 401.875154] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 401.879837] do_syscall_64+0xf9/0x620 [ 401.883665] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 401.888960] RIP: 0033:0x45e087 [ 401.892166] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 6d b5 fb ff c3 66 2e 0f 1f 84 00 00 00 00 16:47:52 executing program 0: creat(&(0x7f0000000280)='./file0\x00', 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) [ 401.911415] RSP: 002b:00007fb3ea55ea18 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 401.919230] RAX: ffffffffffffffda RBX: 0000000000000006 RCX: 000000000045e087 [ 401.926603] RDX: 0000000000000005 RSI: 0000000000004c00 RDI: 0000000000000006 [ 401.934031] RBP: 0000000000000000 R08: 0000000020000260 R09: 0000000000000000 [ 401.941315] R10: 0000000000009060 R11: 0000000000000246 R12: 0000000000000004 [ 401.948717] R13: 0000000000000005 R14: 0000000000000005 R15: 0000000020000270 16:47:52 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x0, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f00000000c0)={0x0, {0x0, 0x0, 0x0, 0x0, 0x5, 0x500}}) 16:47:52 executing program 5: creat(&(0x7f0000000280)='./file0\x00', 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x24ddb, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) [ 402.045565] EXT4-fs (loop3): mounted filesystem without journal. Opts: ,errors=continue [ 402.129136] FAULT_INJECTION: forcing a failure. [ 402.129136] name failslab, interval 1, probability 0, space 0, times 0 16:47:52 executing program 3 (fault-call:1 fault-nth:21): creat(&(0x7f0000000280)='./file0\x00', 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) 16:47:52 executing program 0: creat(&(0x7f0000000280)='./file0\x00', 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) [ 402.170554] EXT4-fs (loop5): bad geometry: block count 256 exceeds size of device (147 blocks) [ 402.198639] CPU: 1 PID: 22521 Comm: syz-executor.2 Not tainted 4.19.169-syzkaller #0 [ 402.206835] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 402.216317] Call Trace: [ 402.218933] dump_stack+0x1fc/0x2ef [ 402.222675] should_fail.cold+0xa/0xf [ 402.226504] ? setup_fault_attr+0x200/0x200 [ 402.230855] ? lock_acquire+0x170/0x3c0 [ 402.234864] __should_failslab+0x115/0x180 [ 402.239116] should_failslab+0x5/0x10 [ 402.242949] kmem_cache_alloc_trace+0x284/0x380 [ 402.247638] apparmor_file_alloc_security+0x394/0xad0 [ 402.252944] ? apparmor_file_receive+0x160/0x160 [ 402.257809] ? __alloc_file+0x21/0x330 [ 402.261720] security_file_alloc+0x40/0x90 [ 402.265977] __alloc_file+0xc9/0x330 [ 402.269732] alloc_empty_file+0x6d/0x170 [ 402.273814] alloc_file+0x5e/0x4d0 [ 402.277377] alloc_file_pseudo+0x165/0x250 [ 402.281634] ? alloc_file+0x4d0/0x4d0 [ 402.285457] ? lockdep_annotate_inode_mutex_key+0x43/0x130 [ 402.291101] ? shmem_get_inode+0x44c/0x8d0 [ 402.295359] __shmem_file_setup.part.0+0x102/0x2b0 [ 402.300312] shmem_file_setup+0x61/0x90 [ 402.304304] __se_sys_memfd_create+0x26b/0x440 [ 402.309100] ? memfd_file_seals_ptr+0x150/0x150 [ 402.313787] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 402.319288] ? trace_hardirqs_off_caller+0x6e/0x210 [ 402.324379] ? do_syscall_64+0x21/0x620 [ 402.328377] do_syscall_64+0xf9/0x620 [ 402.332226] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 402.337433] RIP: 0033:0x45e219 [ 402.340641] Code: 0d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 402.359694] RSP: 002b:00007fadad313a18 EFLAGS: 00000246 ORIG_RAX: 000000000000013f 16:47:52 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x0, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f00000000c0)={0x0, {0x0, 0x0, 0x0, 0x0, 0x5, 0x600}}) [ 402.367421] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 000000000045e219 [ 402.374708] RDX: 0000000020000260 RSI: 0000000000000000 RDI: 00000000004c2c87 [ 402.381993] RBP: 0000000000040000 R08: 0000000020000260 R09: 0000000000000000 [ 402.389414] R10: fe03f80fe03f80ff R11: 0000000000000246 R12: 0000000000000004 [ 402.396698] R13: 0000000020000100 R14: 0000000020000200 R15: 0000000020013000 16:47:52 executing program 2 (fault-call:3 fault-nth:5): creat(&(0x7f0000000280)='./file0\x00', 0x0) close(0xffffffffffffffff) write$binfmt_script(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d90000000f0000000100000000000000000000000020000000200000200000002cc4645f2cc4645f0100ffff53ef0100010000002cc4645f000000000000000001000000000000000b0000008000000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e3338363633343038350000000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000000000000000000000000000000000000d9ca5cac99fd4329af4dde786c1a5d13010040000c000000000000002cc4645f", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) 16:47:52 executing program 0: creat(&(0x7f0000000280)='./file0\x00', 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) 16:47:52 executing program 5: creat(&(0x7f0000000280)='./file0\x00', 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x24e00, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) [ 402.491331] FAULT_INJECTION: forcing a failure. [ 402.491331] name failslab, interval 1, probability 0, space 0, times 0 [ 402.513446] CPU: 1 PID: 22533 Comm: syz-executor.3 Not tainted 4.19.169-syzkaller #0 [ 402.521374] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 402.530755] Call Trace: [ 402.533362] dump_stack+0x1fc/0x2ef [ 402.537011] should_fail.cold+0xa/0xf [ 402.540829] ? setup_fault_attr+0x200/0x200 [ 402.545166] ? lock_acquire+0x170/0x3c0 [ 402.549166] ? dev_uevent_filter+0xd0/0xd0 [ 402.553418] __should_failslab+0x115/0x180 [ 402.557690] should_failslab+0x5/0x10 [ 402.561510] kmem_cache_alloc_trace+0x284/0x380 [ 402.566197] ? dev_uevent_filter+0xd0/0xd0 [ 402.570449] kobject_uevent_env+0x236/0x14a0 [ 402.574997] lo_ioctl+0xff9/0x20e0 [ 402.578558] ? loop_set_status64+0x110/0x110 [ 402.582988] blkdev_ioctl+0x5cb/0x1a80 [ 402.586896] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 402.592423] ? blkpg_ioctl+0x9d0/0x9d0 [ 402.596327] ? mark_held_locks+0xf0/0xf0 [ 402.600401] ? mark_held_locks+0xf0/0xf0 [ 402.604503] ? debug_check_no_obj_freed+0x201/0x490 [ 402.609676] ? lock_downgrade+0x720/0x720 [ 402.613839] block_ioctl+0xe9/0x130 [ 402.617483] ? blkdev_fallocate+0x3f0/0x3f0 [ 402.621825] do_vfs_ioctl+0xcdb/0x12e0 [ 402.625851] ? lock_downgrade+0x720/0x720 [ 402.630014] ? check_preemption_disabled+0x41/0x280 [ 402.635047] ? ioctl_preallocate+0x200/0x200 [ 402.639473] ? __fget+0x356/0x510 [ 402.643100] ? do_dup2+0x450/0x450 [ 402.646762] ? do_sys_open+0x2bf/0x520 [ 402.650670] ksys_ioctl+0x9b/0xc0 [ 402.654225] __x64_sys_ioctl+0x6f/0xb0 [ 402.658134] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 402.662850] do_syscall_64+0xf9/0x620 [ 402.666668] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 402.671956] RIP: 0033:0x45e087 [ 402.675300] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 6d b5 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 402.694545] RSP: 002b:00007fb3ea55ea18 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 402.702270] RAX: ffffffffffffffda RBX: 0000000000000006 RCX: 000000000045e087 [ 402.709870] RDX: 0000000000000005 RSI: 0000000000004c00 RDI: 0000000000000006 [ 402.717155] RBP: 0000000000000000 R08: 0000000020000260 R09: 0000000000000000 [ 402.724646] R10: 0000000000009060 R11: 0000000000000246 R12: 0000000000000004 [ 402.732082] R13: 0000000000000005 R14: 0000000000000005 R15: 0000000020000270 16:47:53 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x0, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f00000000c0)={0x0, {0x0, 0x0, 0x0, 0x0, 0x5, 0x700}}) [ 402.793593] EXT4-fs (loop3): mounted filesystem without journal. Opts: ,errors=continue [ 402.835094] FAULT_INJECTION: forcing a failure. [ 402.835094] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 402.891832] CPU: 1 PID: 22548 Comm: syz-executor.2 Not tainted 4.19.169-syzkaller #0 [ 402.899760] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 402.909275] Call Trace: [ 402.912022] dump_stack+0x1fc/0x2ef [ 402.915682] should_fail.cold+0xa/0xf [ 402.919502] ? lock_acquire+0x170/0x3c0 [ 402.923493] ? setup_fault_attr+0x200/0x200 [ 402.927840] __alloc_pages_nodemask+0x239/0x2890 [ 402.932612] ? __update_load_avg_se+0x5ec/0xa00 [ 402.937299] ? mark_held_locks+0xf0/0xf0 [ 402.941380] ? static_obj+0x50/0x50 [ 402.945029] ? __lock_acquire+0x6de/0x3ff0 [ 402.949279] ? gfp_pfmemalloc_allowed+0x150/0x150 [ 402.954140] ? __lock_acquire+0x6de/0x3ff0 [ 402.958760] ? deref_stack_reg+0x134/0x1d0 [ 402.963020] ? mark_held_locks+0xf0/0xf0 [ 402.967099] ? mark_held_locks+0xf0/0xf0 [ 402.971177] ? unwind_next_frame+0x10a9/0x1c60 [ 402.975774] alloc_pages_vma+0xf2/0x780 [ 402.979889] shmem_alloc_page+0x11c/0x1f0 [ 402.984053] ? shmem_swapin+0x220/0x220 [ 402.988060] ? percpu_counter_add_batch+0x126/0x180 [ 402.993095] ? __vm_enough_memory+0x316/0x650 [ 402.997724] shmem_alloc_and_acct_page+0x15a/0x850 [ 403.002761] shmem_getpage_gfp+0x4e9/0x37f0 [ 403.007110] ? shmem_alloc_and_acct_page+0x850/0x850 [ 403.012230] ? mark_held_locks+0xa6/0xf0 [ 403.016304] ? ktime_get_coarse_real_ts64+0x1c7/0x290 [ 403.021511] ? iov_iter_fault_in_readable+0x1fc/0x3f0 [ 403.026718] shmem_write_begin+0xff/0x1e0 [ 403.030896] generic_perform_write+0x1f8/0x4d0 [ 403.035502] ? filemap_page_mkwrite+0x2f0/0x2f0 [ 403.040271] ? current_time+0x1c0/0x1c0 [ 403.044419] ? lock_acquire+0x170/0x3c0 [ 403.048409] __generic_file_write_iter+0x24b/0x610 [ 403.053498] generic_file_write_iter+0x3f8/0x730 [ 403.058273] __vfs_write+0x51b/0x770 [ 403.062007] ? kernel_read+0x110/0x110 [ 403.065921] ? check_preemption_disabled+0x41/0x280 [ 403.070966] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 403.076192] vfs_write+0x1f3/0x540 [ 403.079760] __x64_sys_pwrite64+0x1f7/0x250 [ 403.084094] ? ksys_pwrite64+0x1a0/0x1a0 [ 403.088170] ? trace_hardirqs_off_caller+0x6e/0x210 [ 403.093203] ? do_syscall_64+0x21/0x620 [ 403.097198] do_syscall_64+0xf9/0x620 [ 403.101017] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 403.106220] RIP: 0033:0x417d77 [ 403.109554] Code: 12 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 a1 18 00 00 c3 48 83 ec 08 e8 07 fa ff ff 48 89 04 24 49 89 ca b8 12 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 4d fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 403.128469] RSP: 002b:00007fadad313a10 EFLAGS: 00000293 ORIG_RAX: 0000000000000012 16:47:53 executing program 3 (fault-call:1 fault-nth:22): creat(&(0x7f0000000280)='./file0\x00', 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) 16:47:53 executing program 0: creat(&(0x7f0000000280)='./file0\x00', 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000500000100000c000000d90000000f0000000100000000000000000000000020000000200000200000002cc4645f2cc4645f0100ffff53ef0100010000002cc4645f000000000000000001000000000000000b0000008000000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e3338363633343038350000000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000000000000000000000000000000000000d9ca5cac99fd4329af4dde786c1a5d13010040000c000000000000002cc4645f", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) [ 403.136192] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 0000000000417d77 [ 403.143474] RDX: 000000000000010c RSI: 0000000020010000 RDI: 0000000000000005 [ 403.150755] RBP: 0000000000000000 R08: 0000000020000260 R09: 0000000000000000 [ 403.158037] R10: 0000000000000400 R11: 0000000000000293 R12: 0000000000000004 [ 403.165403] R13: 0000000000000005 R14: 0000000000000005 R15: 0000000020000210 16:47:53 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x0, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f00000000c0)={0x0, {0x0, 0x0, 0x0, 0x0, 0x5, 0xa00}}) [ 403.200264] EXT4-fs (loop5): bad geometry: block count 256 exceeds size of device (147 blocks) [ 403.273206] FAULT_INJECTION: forcing a failure. [ 403.273206] name failslab, interval 1, probability 0, space 0, times 0 [ 403.296461] CPU: 1 PID: 22558 Comm: syz-executor.3 Not tainted 4.19.169-syzkaller #0 [ 403.304509] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 403.313870] Call Trace: [ 403.316481] dump_stack+0x1fc/0x2ef [ 403.320127] should_fail.cold+0xa/0xf [ 403.323943] ? setup_fault_attr+0x200/0x200 [ 403.328436] ? lock_acquire+0x170/0x3c0 [ 403.332459] __should_failslab+0x115/0x180 [ 403.336795] should_failslab+0x5/0x10 [ 403.340609] __kmalloc+0x2ab/0x3c0 [ 403.344169] ? kobject_get_path+0xbf/0x240 [ 403.348414] kobject_get_path+0xbf/0x240 [ 403.352482] kobject_uevent_env+0x25c/0x14a0 [ 403.356920] lo_ioctl+0xff9/0x20e0 [ 403.360485] ? loop_set_status64+0x110/0x110 [ 403.364914] blkdev_ioctl+0x5cb/0x1a80 [ 403.368816] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 403.374194] ? blkpg_ioctl+0x9d0/0x9d0 [ 403.378098] ? mark_held_locks+0xf0/0xf0 [ 403.382175] ? mark_held_locks+0xf0/0xf0 [ 403.386259] ? debug_check_no_obj_freed+0x201/0x490 [ 403.391294] ? lock_downgrade+0x720/0x720 [ 403.395461] block_ioctl+0xe9/0x130 [ 403.399263] ? blkdev_fallocate+0x3f0/0x3f0 [ 403.403763] do_vfs_ioctl+0xcdb/0x12e0 [ 403.407673] ? lock_downgrade+0x720/0x720 [ 403.411838] ? check_preemption_disabled+0x41/0x280 [ 403.417103] ? ioctl_preallocate+0x200/0x200 [ 403.421533] ? __fget+0x356/0x510 [ 403.425008] ? do_dup2+0x450/0x450 [ 403.428719] ? do_sys_open+0x2bf/0x520 [ 403.432718] ksys_ioctl+0x9b/0xc0 [ 403.436189] __x64_sys_ioctl+0x6f/0xb0 [ 403.440091] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 403.444689] do_syscall_64+0xf9/0x620 [ 403.448505] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 403.453717] RIP: 0033:0x45e087 16:47:53 executing program 5: creat(&(0x7f0000000280)='./file0\x00', 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x25a28, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) 16:47:53 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x0, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f00000000c0)={0x0, {0x0, 0x0, 0x0, 0x0, 0x5, 0x3f00}}) [ 403.456925] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 6d b5 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 403.475983] RSP: 002b:00007fb3ea55ea18 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 403.483706] RAX: ffffffffffffffda RBX: 0000000000000006 RCX: 000000000045e087 [ 403.490989] RDX: 0000000000000005 RSI: 0000000000004c00 RDI: 0000000000000006 [ 403.498271] RBP: 0000000000000000 R08: 0000000020000260 R09: 0000000000000000 [ 403.505646] R10: 0000000000009060 R11: 0000000000000246 R12: 0000000000000004 [ 403.512925] R13: 0000000000000005 R14: 0000000000000005 R15: 0000000020000270 16:47:54 executing program 2 (fault-call:3 fault-nth:6): creat(&(0x7f0000000280)='./file0\x00', 0x0) close(0xffffffffffffffff) write$binfmt_script(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d90000000f0000000100000000000000000000000020000000200000200000002cc4645f2cc4645f0100ffff53ef0100010000002cc4645f000000000000000001000000000000000b0000008000000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e3338363633343038350000000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000000000000000000000000000000000000d9ca5cac99fd4329af4dde786c1a5d13010040000c000000000000002cc4645f", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) [ 403.540703] EXT4-fs (loop2): VFS: Can't find ext4 filesystem 16:47:54 executing program 0: creat(&(0x7f0000000280)='./file0\x00', 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) [ 403.599315] EXT4-fs (loop3): mounted filesystem without journal. Opts: ,errors=continue [ 403.632115] EXT4-fs (loop5): bad geometry: block count 256 exceeds size of device (150 blocks) [ 403.649828] FAULT_INJECTION: forcing a failure. [ 403.649828] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 403.683612] CPU: 1 PID: 22576 Comm: syz-executor.2 Not tainted 4.19.169-syzkaller #0 [ 403.691714] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 403.701172] Call Trace: [ 403.703785] dump_stack+0x1fc/0x2ef [ 403.707442] should_fail.cold+0xa/0xf [ 403.711891] ? lock_acquire+0x170/0x3c0 [ 403.715882] ? setup_fault_attr+0x200/0x200 [ 403.720350] __alloc_pages_nodemask+0x239/0x2890 [ 403.725122] ? __lock_acquire+0x6de/0x3ff0 [ 403.729474] ? __lock_acquire+0x6de/0x3ff0 [ 403.733732] ? __lock_acquire+0x6de/0x3ff0 [ 403.737989] ? gfp_pfmemalloc_allowed+0x150/0x150 [ 403.742853] ? __lock_acquire+0x6de/0x3ff0 [ 403.747247] ? static_obj+0x50/0x50 [ 403.750889] ? mark_held_locks+0xf0/0xf0 [ 403.754970] alloc_pages_vma+0xf2/0x780 [ 403.758974] shmem_alloc_page+0x11c/0x1f0 [ 403.763266] ? shmem_swapin+0x220/0x220 [ 403.767284] ? percpu_counter_add_batch+0x126/0x180 [ 403.772322] ? __vm_enough_memory+0x316/0x650 [ 403.776841] shmem_alloc_and_acct_page+0x15a/0x850 [ 403.781799] shmem_getpage_gfp+0x4e9/0x37f0 [ 403.786158] ? shmem_alloc_and_acct_page+0x850/0x850 [ 403.791282] ? mark_held_locks+0xa6/0xf0 [ 403.795360] ? ktime_get_coarse_real_ts64+0x1c7/0x290 [ 403.800571] ? iov_iter_fault_in_readable+0x1fc/0x3f0 [ 403.805785] shmem_write_begin+0xff/0x1e0 [ 403.809959] generic_perform_write+0x1f8/0x4d0 [ 403.814658] ? filemap_page_mkwrite+0x2f0/0x2f0 [ 403.819501] ? current_time+0x1c0/0x1c0 [ 403.823494] ? lock_acquire+0x170/0x3c0 [ 403.827488] __generic_file_write_iter+0x24b/0x610 [ 403.832446] generic_file_write_iter+0x3f8/0x730 [ 403.837540] __vfs_write+0x51b/0x770 [ 403.841271] ? kernel_read+0x110/0x110 [ 403.845186] ? check_preemption_disabled+0x41/0x280 [ 403.850405] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 403.855440] vfs_write+0x1f3/0x540 [ 403.859122] __x64_sys_pwrite64+0x1f7/0x250 [ 403.863462] ? ksys_pwrite64+0x1a0/0x1a0 [ 403.867546] ? trace_hardirqs_off_caller+0x6e/0x210 [ 403.872583] ? do_syscall_64+0x21/0x620 [ 403.876586] do_syscall_64+0xf9/0x620 [ 403.880413] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 403.885749] RIP: 0033:0x417d77 [ 403.888963] Code: 12 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 a1 18 00 00 c3 48 83 ec 08 e8 07 fa ff ff 48 89 04 24 49 89 ca b8 12 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 4d fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 403.908220] RSP: 002b:00007fadad313a10 EFLAGS: 00000293 ORIG_RAX: 0000000000000012 [ 403.915942] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000417d77 [ 403.923424] RDX: 000000000000009e RSI: 0000000020011e00 RDI: 0000000000000005 [ 403.930712] RBP: 0000000000000000 R08: 0000000020000260 R09: 0000000000000000 [ 403.937993] R10: 0000000000009060 R11: 0000000000000293 R12: 0000000000000004 16:47:54 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x0, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f00000000c0)={0x0, {0x0, 0x0, 0x0, 0x0, 0x5, 0x4800}}) 16:47:54 executing program 3 (fault-call:1 fault-nth:23): creat(&(0x7f0000000280)='./file0\x00', 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) 16:47:54 executing program 5: creat(&(0x7f0000000280)='./file0\x00', 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x25a84, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) 16:47:54 executing program 0: creat(&(0x7f0000000280)='./file0\x00', 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000700000100000c000000d90000000f0000000100000000000000000000000020000000200000200000002cc4645f2cc4645f0100ffff53ef0100010000002cc4645f000000000000000001000000000000000b0000008000000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e3338363633343038350000000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000000000000000000000000000000000000d9ca5cac99fd4329af4dde786c1a5d13010040000c000000000000002cc4645f", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) [ 403.945907] R13: 0000000000000005 R14: 0000000000000005 R15: 0000000020000258 [ 403.964944] FAULT_INJECTION: forcing a failure. [ 403.964944] name failslab, interval 1, probability 0, space 0, times 0 [ 404.009689] CPU: 0 PID: 22587 Comm: syz-executor.3 Not tainted 4.19.169-syzkaller #0 [ 404.017616] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 404.026986] Call Trace: [ 404.029685] dump_stack+0x1fc/0x2ef [ 404.033337] should_fail.cold+0xa/0xf [ 404.037156] ? setup_fault_attr+0x200/0x200 [ 404.041507] ? lock_acquire+0x170/0x3c0 [ 404.045504] __should_failslab+0x115/0x180 [ 404.049756] should_failslab+0x5/0x10 [ 404.053569] kmem_cache_alloc_node_trace+0x244/0x3b0 [ 404.058688] __kmalloc_node_track_caller+0x38/0x70 [ 404.063631] __alloc_skb+0xae/0x560 [ 404.067430] alloc_uevent_skb+0x7b/0x210 [ 404.071511] kobject_uevent_env+0xa83/0x14a0 [ 404.075950] lo_ioctl+0xff9/0x20e0 [ 404.079512] ? loop_set_status64+0x110/0x110 [ 404.083937] blkdev_ioctl+0x5cb/0x1a80 [ 404.087844] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 404.093399] ? blkpg_ioctl+0x9d0/0x9d0 [ 404.097302] ? mark_held_locks+0xf0/0xf0 [ 404.101386] ? mark_held_locks+0xf0/0xf0 [ 404.105470] ? debug_check_no_obj_freed+0x201/0x490 [ 404.110842] ? lock_downgrade+0x720/0x720 [ 404.115016] block_ioctl+0xe9/0x130 [ 404.118767] ? blkdev_fallocate+0x3f0/0x3f0 [ 404.123102] do_vfs_ioctl+0xcdb/0x12e0 [ 404.127003] ? lock_downgrade+0x720/0x720 [ 404.131162] ? check_preemption_disabled+0x41/0x280 [ 404.136191] ? ioctl_preallocate+0x200/0x200 [ 404.140803] ? __fget+0x356/0x510 [ 404.144276] ? do_dup2+0x450/0x450 [ 404.147831] ? do_sys_open+0x2bf/0x520 [ 404.151748] ksys_ioctl+0x9b/0xc0 [ 404.155222] __x64_sys_ioctl+0x6f/0xb0 [ 404.159358] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 404.164056] do_syscall_64+0xf9/0x620 [ 404.167872] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 404.173074] RIP: 0033:0x45e087 [ 404.176277] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 6d b5 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 404.195416] RSP: 002b:00007fb3ea55ea18 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 404.203146] RAX: ffffffffffffffda RBX: 0000000000000006 RCX: 000000000045e087 [ 404.210568] RDX: 0000000000000005 RSI: 0000000000004c00 RDI: 0000000000000006 [ 404.217847] RBP: 0000000000000000 R08: 0000000020000260 R09: 0000000000000000 [ 404.225133] R10: 0000000000009060 R11: 0000000000000246 R12: 0000000000000004 [ 404.232414] R13: 0000000000000005 R14: 0000000000000005 R15: 0000000020000270 16:47:54 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x0, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f00000000c0)={0x0, {0x0, 0x0, 0x0, 0x0, 0x5, 0x4c00}}) 16:47:54 executing program 0: creat(&(0x7f0000000280)='./file0\x00', 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) 16:47:54 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x0, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f00000000c0)={0x0, {0x0, 0x0, 0x0, 0x0, 0x5, 0x6088}}) 16:47:54 executing program 5: creat(&(0x7f0000000280)='./file0\x00', 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x30000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) [ 404.400934] EXT4-fs (loop3): mounted filesystem without journal. Opts: ,errors=continue [ 404.409869] EXT4-fs error (device loop2): ext4_fill_super:4446: inode #2: comm syz-executor.2: iget: root inode unallocated [ 404.488178] EXT4-fs (loop2): get root inode failed 16:47:55 executing program 3 (fault-call:1 fault-nth:24): creat(&(0x7f0000000280)='./file0\x00', 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) [ 404.526554] EXT4-fs (loop2): mount failed 16:47:55 executing program 0: creat(&(0x7f0000000280)='./file0\x00', 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20002000000100000c000000d90000000f0000000100000000000000000000000020000000200000200000002cc4645f2cc4645f0100ffff53ef0100010000002cc4645f000000000000000001000000000000000b0000008000000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e3338363633343038350000000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000000000000000000000000000000000000d9ca5cac99fd4329af4dde786c1a5d13010040000c000000000000002cc4645f", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) [ 404.551489] EXT4-fs (loop5): bad geometry: block count 256 exceeds size of device (192 blocks) 16:47:55 executing program 2: creat(&(0x7f0000000280)='./file0\x00', 0x0) close(0xffffffffffffffff) write$binfmt_script(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) 16:47:55 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x0, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f00000000c0)={0x0, {0x0, 0x0, 0x0, 0x0, 0x5, 0x6800}}) 16:47:55 executing program 5: creat(&(0x7f0000000280)='./file0\x00', 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40002, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) 16:47:55 executing program 0: creat(&(0x7f0000000280)='./file0\x00', 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20003f00000100000c000000d90000000f0000000100000000000000000000000020000000200000200000002cc4645f2cc4645f0100ffff53ef0100010000002cc4645f000000000000000001000000000000000b0000008000000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e3338363633343038350000000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000000000000000000000000000000000000d9ca5cac99fd4329af4dde786c1a5d13010040000c000000000000002cc4645f", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) [ 404.750484] FAULT_INJECTION: forcing a failure. [ 404.750484] name failslab, interval 1, probability 0, space 0, times 0 [ 404.782572] CPU: 0 PID: 22621 Comm: syz-executor.3 Not tainted 4.19.169-syzkaller #0 [ 404.790505] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 404.799998] Call Trace: [ 404.802614] dump_stack+0x1fc/0x2ef [ 404.806263] should_fail.cold+0xa/0xf [ 404.810085] ? setup_fault_attr+0x200/0x200 [ 404.814425] ? lock_acquire+0x170/0x3c0 [ 404.818430] __should_failslab+0x115/0x180 [ 404.822690] should_failslab+0x5/0x10 [ 404.826506] kmem_cache_alloc+0x277/0x370 [ 404.830783] skb_clone+0x151/0x3d0 [ 404.834437] netlink_broadcast_filtered+0x8df/0xbc0 [ 404.839479] netlink_broadcast+0x35/0x40 [ 404.843561] kobject_uevent_env+0xa49/0x14a0 [ 404.847996] lo_ioctl+0xff9/0x20e0 [ 404.851707] ? loop_set_status64+0x110/0x110 [ 404.856136] blkdev_ioctl+0x5cb/0x1a80 [ 404.860159] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 404.865540] ? blkpg_ioctl+0x9d0/0x9d0 [ 404.869597] ? mark_held_locks+0xf0/0xf0 [ 404.873671] ? mark_held_locks+0xf0/0xf0 [ 404.877756] ? debug_check_no_obj_freed+0x201/0x490 [ 404.882799] ? lock_downgrade+0x720/0x720 [ 404.886985] block_ioctl+0xe9/0x130 [ 404.890630] ? blkdev_fallocate+0x3f0/0x3f0 [ 404.895185] do_vfs_ioctl+0xcdb/0x12e0 [ 404.899090] ? lock_downgrade+0x720/0x720 [ 404.903255] ? check_preemption_disabled+0x41/0x280 [ 404.908509] ? ioctl_preallocate+0x200/0x200 [ 404.912942] ? __fget+0x356/0x510 [ 404.916539] ? do_dup2+0x450/0x450 [ 404.920096] ? do_sys_open+0x2bf/0x520 [ 404.924007] ksys_ioctl+0x9b/0xc0 [ 404.927480] __x64_sys_ioctl+0x6f/0xb0 [ 404.931571] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 404.936342] do_syscall_64+0xf9/0x620 [ 404.940253] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 404.945457] RIP: 0033:0x45e087 [ 404.948667] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 6d b5 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 404.967845] RSP: 002b:00007fb3ea55ea18 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 404.975757] RAX: ffffffffffffffda RBX: 0000000000000006 RCX: 000000000045e087 [ 404.983047] RDX: 0000000000000005 RSI: 0000000000004c00 RDI: 0000000000000006 [ 404.990418] RBP: 0000000000000000 R08: 0000000020000260 R09: 0000000000000000 16:47:55 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x0, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f00000000c0)={0x0, {0x0, 0x0, 0x0, 0x0, 0x5, 0x6c00}}) [ 404.997701] R10: 0000000000009060 R11: 0000000000000246 R12: 0000000000000004 [ 405.004993] R13: 0000000000000005 R14: 0000000000000005 R15: 0000000020000270 16:47:55 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x0, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f00000000c0)={0x0, {0x0, 0x0, 0x0, 0x0, 0x5, 0x7400}}) 16:47:55 executing program 0: creat(&(0x7f0000000280)='./file0\x00', 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) [ 405.080725] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue [ 405.090987] EXT4-fs (loop3): mounted filesystem without journal. Opts: ,errors=continue [ 405.100920] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue 16:47:55 executing program 5: creat(&(0x7f0000000280)='./file0\x00', 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40003, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) 16:47:55 executing program 3 (fault-call:1 fault-nth:25): creat(&(0x7f0000000280)='./file0\x00', 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) 16:47:55 executing program 2: creat(&(0x7f0000000280)='./file0\x00', 0x0) close(0xffffffffffffffff) write$binfmt_script(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x1c4e1, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) 16:47:55 executing program 0: creat(&(0x7f0000000280)='./file0\x00', 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) 16:47:55 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x0, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f00000000c0)={0x0, {0x0, 0x0, 0x0, 0x0, 0x5, 0x7a00}}) [ 405.372434] FAULT_INJECTION: forcing a failure. [ 405.372434] name failslab, interval 1, probability 0, space 0, times 0 [ 405.385821] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue [ 405.416050] CPU: 0 PID: 22666 Comm: syz-executor.3 Not tainted 4.19.169-syzkaller #0 [ 405.424120] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 405.433878] Call Trace: [ 405.436489] dump_stack+0x1fc/0x2ef [ 405.440138] should_fail.cold+0xa/0xf [ 405.443958] ? setup_fault_attr+0x200/0x200 [ 405.448458] ? lock_acquire+0x170/0x3c0 [ 405.452462] __should_failslab+0x115/0x180 [ 405.456721] should_failslab+0x5/0x10 [ 405.460633] kmem_cache_alloc+0x277/0x370 [ 405.464800] skb_clone+0x151/0x3d0 [ 405.468361] netlink_broadcast_filtered+0x8df/0xbc0 [ 405.473404] netlink_broadcast+0x35/0x40 [ 405.477488] kobject_uevent_env+0xa49/0x14a0 [ 405.481919] lo_ioctl+0xff9/0x20e0 [ 405.485480] ? loop_set_status64+0x110/0x110 [ 405.489998] blkdev_ioctl+0x5cb/0x1a80 [ 405.493904] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 405.499285] ? blkpg_ioctl+0x9d0/0x9d0 [ 405.503193] ? mark_held_locks+0xf0/0xf0 [ 405.507322] ? mark_held_locks+0xf0/0xf0 [ 405.511408] ? debug_check_no_obj_freed+0x201/0x490 [ 405.516446] ? lock_downgrade+0x720/0x720 [ 405.520616] block_ioctl+0xe9/0x130 [ 405.524260] ? blkdev_fallocate+0x3f0/0x3f0 [ 405.528611] do_vfs_ioctl+0xcdb/0x12e0 [ 405.532516] ? lock_downgrade+0x720/0x720 [ 405.536680] ? check_preemption_disabled+0x41/0x280 [ 405.541714] ? ioctl_preallocate+0x200/0x200 [ 405.546236] ? __fget+0x356/0x510 [ 405.549709] ? do_dup2+0x450/0x450 [ 405.553264] ? do_sys_open+0x2bf/0x520 [ 405.557175] ksys_ioctl+0x9b/0xc0 [ 405.560645] __x64_sys_ioctl+0x6f/0xb0 [ 405.564690] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 405.569288] do_syscall_64+0xf9/0x620 [ 405.573110] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 405.578310] RIP: 0033:0x45e087 [ 405.581527] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 6d b5 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 405.600616] RSP: 002b:00007fb3ea55ea18 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 405.608347] RAX: ffffffffffffffda RBX: 0000000000000006 RCX: 000000000045e087 16:47:56 executing program 4: r0 = syz_open_dev$vim2m(&(0x7f0000000040)='/dev/video#\x00', 0x6, 0x2) r1 = syz_open_dev$vim2m(&(0x7f0000000000)='/dev/video#\x00', 0x80, 0x2) writev(r0, &(0x7f0000000840)=[{&(0x7f0000000380)}, {&(0x7f00000003c0)="10", 0x1}], 0x2) fcntl$getownex(r1, 0x10, &(0x7f0000000080)={0x0, 0x0}) r3 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x0) lseek(r3, 0x8, 0x1) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000048480)={0x7, [], 0x24, "37598cef1f2087"}) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r3, 0xc0709411, &(0x7f0000058d80)={{0x0, 0x0, 0x3, 0x2, 0x9, 0xf6, 0x1, 0x2, 0x8, 0x1ff, 0x7, 0xffffffff, 0x8, 0x1, 0x6}, 0x30, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r1, 0xd000943d, &(0x7f0000058e40)={0x4, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}], 0x9, "fac9fd4bdd8d94"}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000004c0)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000048480)={0x7, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r7}], 0x24, "37598cef1f2087"}) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r1, 0xc0709411, &(0x7f0000059e40)={{0x0, 0x7, 0x7, 0xb584, 0x7, 0xffff, 0x6314aa4e, 0x7, 0xfff, 0x81, 0x7fffffff, 0x1, 0xa27, 0x7ff, 0x2ab}, 0x20, [0x0, 0x0, 0x0, 0x0]}) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r0, 0xc0709411, &(0x7f0000059f00)={{0x0, 0x9, 0xffffffffffffffac, 0xffffffffffff7291, 0x0, 0xffffffff, 0x4, 0x1, 0x7fffffff, 0x80, 0x462f, 0x4, 0x6, 0x2, 0x2}, 0x8, [0x0]}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r0, 0xd000943d, &(0x7f0000059f80)={0x7, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}], 0x1, "9ffb9d97c65b70"}) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r1, 0xc0709411, &(0x7f000005af80)={{0x0, 0x9, 0x71, 0x4, 0x0, 0x8000, 0xfff, 0x2, 0x1, 0x81, 0xc5a, 0x9, 0xff, 0x100000000}, 0x18, [0x0, 0x0, 0x0]}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000004c0)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000048480)={0x7, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r12}], 0x24, "37598cef1f2087"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r3, 0xd000943d, &(0x7f000005b040)={0x4, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r5}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r13}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r4, r6}, {0x0, r7}, {r8}, {r9}, {0x0, r10}, {r11, r12}], 0x80, "394423987e15cd"}) pipe(&(0x7f00000000c0)) kcmp(r2, 0x0, 0x3, r3, 0xffffffffffffffff) [ 405.615635] RDX: 0000000000000005 RSI: 0000000000004c00 RDI: 0000000000000006 [ 405.622923] RBP: 0000000000000000 R08: 0000000020000260 R09: 0000000000000000 [ 405.630204] R10: 0000000000009060 R11: 0000000000000246 R12: 0000000000000004 [ 405.637484] R13: 0000000000000005 R14: 0000000000000005 R15: 0000000020000270 16:47:56 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x0, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f00000000c0)={0x0, {0x0, 0x0, 0x0, 0x0, 0x5, 0x1000000}}) [ 405.671774] EXT4-fs (loop2): bad geometry: block count 256 exceeds size of device (113 blocks) 16:47:56 executing program 0: creat(&(0x7f0000000280)='./file0\x00', 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) 16:47:56 executing program 5: creat(&(0x7f0000000280)='./file0\x00', 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40004, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) 16:47:56 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x0, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f00000000c0)={0x0, {0x0, 0x0, 0x0, 0x0, 0x5, 0x2000000}}) [ 405.716539] EXT4-fs (loop3): mounted filesystem without journal. Opts: ,errors=continue 16:47:56 executing program 3 (fault-call:1 fault-nth:26): creat(&(0x7f0000000280)='./file0\x00', 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) 16:47:56 executing program 4: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000100)='/dev/nullb0\x00', 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r1, &(0x7f0000000200)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x20a002, 0x0) getsockopt$ARPT_SO_GET_ENTRIES(r2, 0x0, 0x61, &(0x7f0000000200)={'filter\x00', 0xd1, "95cdcf9d004dc937cba71aedf55a73045ada5d6c0092fe2fb5d5b5d34fab5b4ba398c65a29d0991d5ba2a1acdc1d107c95efdafd994afd3264be5cb9f35dbfe9f69b7f57223b8c6ac78d9835536b07dc160a4c0c08aff3fa3b3830f2d4342d739a5604f798e30052693ad2da7c3dfe2143a66f400d7733ec5ad5a970def5bb8262fd24b494a76acf53971a2f6a2d5075d11fc8579e157d4276bcdc2b03bf83a3d71cceec3e73876faefe42b7d43bf693771ed484d24b7e5d28a070a0dd8221b61a289f525daaa88f93ff932ca53dfc0006"}, &(0x7f0000000040)=0xf5) r3 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000080)='/dev/bsg\x00', 0x400700, 0x0) r4 = socket$isdn(0x22, 0x3, 0x1) ioctl(r4, 0xfff, &(0x7f0000000140)="6715a5305f78771b7b63fbc710ca0d8a462c530b505ec2247113c06f8e156b9b9d4cc8e08832d9f63f364af809835d9238a628e3f80c922c5b0f7eae15011aaf3c28807f04aeef664f1aa6c26ab88a") setsockopt$IPT_SO_SET_REPLACE(r3, 0x0, 0x40, &(0x7f0000000300)=@security={'security\x00', 0xe, 0x4, 0x3a0, 0xffffffff, 0xf8, 0x220, 0x220, 0xffffffff, 0xffffffff, 0x308, 0x308, 0x308, 0xffffffff, 0x4, &(0x7f00000000c0), {[{{@uncond, 0x0, 0x98, 0xf8, 0x0, {}, [@common=@icmp={{0x28, 'icmp\x00'}, {0xf, "c961", 0x1}}]}, @common=@SET={0x60, 'SET\x00', 0x0, {{0x2, [0x2, 0x9, 0x2, 0x7, 0x3, 0xd], 0x0, 0x6}, {0xffffffffffffffff, [0x0, 0x6, 0x4, 0x2, 0x1, 0x1], 0x5, 0x6}}}}, {{@ip={@dev={0xac, 0x14, 0x14, 0x21}, @dev={0xac, 0x14, 0x14, 0x30}, 0xff000000, 0x0, 'caif0\x00', 'gre0\x00', {0xff}, {}, 0x62, 0x1}, 0x0, 0xc8, 0x128, 0x0, {}, [@common=@unspec=@connmark={{0x30, 'connmark\x00'}, {0x2, 0x8}}, @common=@icmp={{0x28, 'icmp\x00'}, {0x0, "866a"}}]}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @empty, 0x9, 0xa, [0x2d, 0x3, 0x26, 0x32, 0x2f, 0x38, 0x12, 0xc, 0x16, 0x3d, 0x14, 0x13, 0xa, 0x27, 0x3f, 0x1d], 0x0, 0x5, 0x7fff}}}, {{@uncond, 0x0, 0xc0, 0xe8, 0x0, {}, [@common=@ttl={{0x28, 'ttl\x00'}, {0x0, 0x3f}}, @common=@unspec=@addrtype1={{0x28, 'addrtype\x00'}, {0x0, 0x180}}]}, @common=@inet=@TCPMSS={0x28, 'TCPMSS\x00', 0x0, {0x9}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x400) read$FUSE(r0, &(0x7f0000006200)={0x2020}, 0x3e80000000) 16:47:56 executing program 2: creat(&(0x7f0000000280)='./file0\x00', 0x0) close(0xffffffffffffffff) write$binfmt_script(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x1c4e2, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) [ 405.897361] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue 16:47:56 executing program 0: creat(&(0x7f0000000280)='./file0\x00', 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) 16:47:56 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x0, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f00000000c0)={0x0, {0x0, 0x0, 0x0, 0x0, 0x5, 0x3000000}}) [ 405.963653] FAULT_INJECTION: forcing a failure. [ 405.963653] name failslab, interval 1, probability 0, space 0, times 0 [ 405.985374] CPU: 1 PID: 22713 Comm: syz-executor.3 Not tainted 4.19.169-syzkaller #0 [ 405.993291] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 406.002656] Call Trace: [ 406.005264] dump_stack+0x1fc/0x2ef [ 406.008909] should_fail.cold+0xa/0xf [ 406.012728] ? setup_fault_attr+0x200/0x200 [ 406.017064] ? lock_acquire+0x170/0x3c0 [ 406.021211] __should_failslab+0x115/0x180 [ 406.025471] should_failslab+0x5/0x10 [ 406.029283] kmem_cache_alloc+0x277/0x370 [ 406.033544] skb_clone+0x151/0x3d0 [ 406.037107] netlink_broadcast_filtered+0x8df/0xbc0 [ 406.042151] netlink_broadcast+0x35/0x40 [ 406.046236] kobject_uevent_env+0xa49/0x14a0 [ 406.050672] lo_ioctl+0xff9/0x20e0 [ 406.054238] ? loop_set_status64+0x110/0x110 [ 406.058665] blkdev_ioctl+0x5cb/0x1a80 [ 406.062565] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 406.067944] ? blkpg_ioctl+0x9d0/0x9d0 [ 406.071935] ? mark_held_locks+0xf0/0xf0 [ 406.076015] ? mark_held_locks+0xf0/0xf0 [ 406.080098] ? debug_check_no_obj_freed+0x201/0x490 [ 406.085137] ? lock_downgrade+0x720/0x720 [ 406.089306] block_ioctl+0xe9/0x130 [ 406.092945] ? blkdev_fallocate+0x3f0/0x3f0 [ 406.097284] do_vfs_ioctl+0xcdb/0x12e0 [ 406.101227] ? lock_downgrade+0x720/0x720 [ 406.105392] ? check_preemption_disabled+0x41/0x280 [ 406.110425] ? ioctl_preallocate+0x200/0x200 [ 406.114853] ? __fget+0x356/0x510 [ 406.118326] ? do_dup2+0x450/0x450 [ 406.121882] ? do_sys_open+0x2bf/0x520 [ 406.125790] ksys_ioctl+0x9b/0xc0 [ 406.129260] __x64_sys_ioctl+0x6f/0xb0 [ 406.133312] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 406.137911] do_syscall_64+0xf9/0x620 [ 406.141731] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 406.146929] RIP: 0033:0x45e087 [ 406.150153] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 6d b5 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 406.169065] RSP: 002b:00007fb3ea53da18 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 406.176952] RAX: ffffffffffffffda RBX: 0000000000000006 RCX: 000000000045e087 [ 406.184237] RDX: 0000000000000005 RSI: 0000000000004c00 RDI: 0000000000000006 [ 406.191595] RBP: 0000000000000000 R08: 0000000020000260 R09: 0000000000000000 [ 406.198878] R10: 0000000000009060 R11: 0000000000000246 R12: 0000000000000004 [ 406.206160] R13: 0000000000000005 R14: 0000000000000005 R15: 0000000020000270 [ 406.276891] EXT4-fs (loop3): mounted filesystem without journal. Opts: ,errors=continue 16:47:56 executing program 5: creat(&(0x7f0000000280)='./file0\x00', 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40005, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) [ 406.324041] EXT4-fs (loop2): bad geometry: block count 256 exceeds size of device (113 blocks) 16:47:56 executing program 3 (fault-call:1 fault-nth:27): creat(&(0x7f0000000280)='./file0\x00', 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) 16:47:56 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x0, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f00000000c0)={0x0, {0x0, 0x0, 0x0, 0x0, 0x5, 0x4000000}}) 16:47:56 executing program 0: creat(&(0x7f0000000280)='./file0\x00', 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) 16:47:56 executing program 2: creat(&(0x7f0000000280)='./file0\x00', 0x0) close(0xffffffffffffffff) write$binfmt_script(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x1c500, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) [ 406.573032] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue [ 406.577150] FAULT_INJECTION: forcing a failure. [ 406.577150] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 406.593360] CPU: 1 PID: 22743 Comm: syz-executor.3 Not tainted 4.19.169-syzkaller #0 [ 406.601261] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 406.610626] Call Trace: [ 406.613239] dump_stack+0x1fc/0x2ef [ 406.616888] should_fail.cold+0xa/0xf [ 406.620705] ? setup_fault_attr+0x200/0x200 [ 406.625047] ? wake_up_q+0x93/0xe0 [ 406.628606] ? __mutex_unlock_slowpath+0x2be/0x610 [ 406.633556] __alloc_pages_nodemask+0x239/0x2890 [ 406.638340] ? __lock_acquire+0x6de/0x3ff0 [ 406.642597] ? gfp_pfmemalloc_allowed+0x150/0x150 [ 406.647540] ? blkdev_ioctl+0x11a/0x1a80 [ 406.651617] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 406.656996] ? blkpg_ioctl+0x9d0/0x9d0 [ 406.660907] ? debug_check_no_obj_freed+0x201/0x490 [ 406.665944] ? lock_downgrade+0x720/0x720 [ 406.670118] cache_grow_begin+0xa4/0x8a0 [ 406.674347] ? setup_fault_attr+0x200/0x200 [ 406.678803] ? lock_acquire+0x170/0x3c0 [ 406.682933] cache_alloc_refill+0x273/0x340 [ 406.687409] kmem_cache_alloc+0x346/0x370 [ 406.691578] getname_flags+0xce/0x590 [ 406.695404] do_mkdirat+0x8d/0x2d0 [ 406.698958] ? __ia32_sys_mknod+0x120/0x120 [ 406.703293] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 406.708675] ? trace_hardirqs_off_caller+0x6e/0x210 [ 406.713712] ? do_syscall_64+0x21/0x620 [ 406.717840] do_syscall_64+0xf9/0x620 [ 406.721823] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 406.727031] RIP: 0033:0x45d637 [ 406.730233] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 dd bf fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 bd bf fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 406.749150] RSP: 002b:00007fb3ea55ea78 EFLAGS: 00000213 ORIG_RAX: 0000000000000053 [ 406.757052] RAX: ffffffffffffffda RBX: 00007fb3ea55eb10 RCX: 000000000045d637 [ 406.764348] RDX: 0000000000000005 RSI: 00000000000001ff RDI: 0000000020000100 16:47:57 executing program 0: creat(&(0x7f0000000280)='./file0\x00', 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) [ 406.771800] RBP: 00007fb3ea55ead0 R08: 0000000020000260 R09: 0000000000000000 [ 406.779170] R10: 0000000000009060 R11: 0000000000000213 R12: 0000000020000000 [ 406.786453] R13: 0000000020000100 R14: 0000000020000200 R15: 0000000020013000 16:47:57 executing program 5: creat(&(0x7f0000000280)='./file0\x00', 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40006, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) [ 406.829642] EXT4-fs (loop2): bad geometry: block count 256 exceeds size of device (113 blocks) 16:47:57 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x0, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f00000000c0)={0x0, {0x0, 0x0, 0x0, 0x0, 0x5, 0x5000000}}) [ 406.895873] EXT4-fs (loop3): mounted filesystem without journal. Opts: ,errors=continue [ 407.030825] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue 16:47:57 executing program 4: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000100)='/dev/nullb0\x00', 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r1, &(0x7f0000000200)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x20a002, 0x0) getsockopt$ARPT_SO_GET_ENTRIES(r2, 0x0, 0x61, &(0x7f0000000200)={'filter\x00', 0xd1, "95cdcf9d004dc937cba71aedf55a73045ada5d6c0092fe2fb5d5b5d34fab5b4ba398c65a29d0991d5ba2a1acdc1d107c95efdafd994afd3264be5cb9f35dbfe9f69b7f57223b8c6ac78d9835536b07dc160a4c0c08aff3fa3b3830f2d4342d739a5604f798e30052693ad2da7c3dfe2143a66f400d7733ec5ad5a970def5bb8262fd24b494a76acf53971a2f6a2d5075d11fc8579e157d4276bcdc2b03bf83a3d71cceec3e73876faefe42b7d43bf693771ed484d24b7e5d28a070a0dd8221b61a289f525daaa88f93ff932ca53dfc0006"}, &(0x7f0000000040)=0xf5) r3 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000080)='/dev/bsg\x00', 0x400700, 0x0) r4 = socket$isdn(0x22, 0x3, 0x1) ioctl(r4, 0xfff, &(0x7f0000000140)="6715a5305f78771b7b63fbc710ca0d8a462c530b505ec2247113c06f8e156b9b9d4cc8e08832d9f63f364af809835d9238a628e3f80c922c5b0f7eae15011aaf3c28807f04aeef664f1aa6c26ab88a") setsockopt$IPT_SO_SET_REPLACE(r3, 0x0, 0x40, &(0x7f0000000300)=@security={'security\x00', 0xe, 0x4, 0x3a0, 0xffffffff, 0xf8, 0x220, 0x220, 0xffffffff, 0xffffffff, 0x308, 0x308, 0x308, 0xffffffff, 0x4, &(0x7f00000000c0), {[{{@uncond, 0x0, 0x98, 0xf8, 0x0, {}, [@common=@icmp={{0x28, 'icmp\x00'}, {0xf, "c961", 0x1}}]}, @common=@SET={0x60, 'SET\x00', 0x0, {{0x2, [0x2, 0x9, 0x2, 0x7, 0x3, 0xd], 0x0, 0x6}, {0xffffffffffffffff, [0x0, 0x6, 0x4, 0x2, 0x1, 0x1], 0x5, 0x6}}}}, {{@ip={@dev={0xac, 0x14, 0x14, 0x21}, @dev={0xac, 0x14, 0x14, 0x30}, 0xff000000, 0x0, 'caif0\x00', 'gre0\x00', {0xff}, {}, 0x62, 0x1}, 0x0, 0xc8, 0x128, 0x0, {}, [@common=@unspec=@connmark={{0x30, 'connmark\x00'}, {0x2, 0x8}}, @common=@icmp={{0x28, 'icmp\x00'}, {0x0, "866a"}}]}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @empty, 0x9, 0xa, [0x2d, 0x3, 0x26, 0x32, 0x2f, 0x38, 0x12, 0xc, 0x16, 0x3d, 0x14, 0x13, 0xa, 0x27, 0x3f, 0x1d], 0x0, 0x5, 0x7fff}}}, {{@uncond, 0x0, 0xc0, 0xe8, 0x0, {}, [@common=@ttl={{0x28, 'ttl\x00'}, {0x0, 0x3f}}, @common=@unspec=@addrtype1={{0x28, 'addrtype\x00'}, {0x0, 0x180}}]}, @common=@inet=@TCPMSS={0x28, 'TCPMSS\x00', 0x0, {0x9}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x400) read$FUSE(r0, &(0x7f0000006200)={0x2020}, 0x3e80000000) 16:47:57 executing program 0: creat(&(0x7f0000000280)='./file0\x00', 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) 16:47:57 executing program 3 (fault-call:1 fault-nth:28): creat(&(0x7f0000000280)='./file0\x00', 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) 16:47:57 executing program 2: creat(&(0x7f0000000280)='./file0\x00', 0x0) close(0xffffffffffffffff) write$binfmt_script(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x1c50a, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d90000000f0000000100000000000000000000000020000000200000200000002cc4645f2cc4645f0100ffff53ef0100010000002cc4645f000000000000000001000000000000000b0000008000000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e3338363633343038350000000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000000000000000000000000000000000000d9ca5cac99fd4329af4dde786c1a5d13010040000c000000000000002cc4645f", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) 16:47:57 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x0, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f00000000c0)={0x0, {0x0, 0x0, 0x0, 0x0, 0x5, 0x6000000}}) 16:47:57 executing program 5: creat(&(0x7f0000000280)='./file0\x00', 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40007, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d90000000f0000000100000000000000000000000020000000200000200000002cc4645f2cc4645f0100ffff53ef0100010000002cc4645f000000000000000001000000000000000b0000008000000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e3338363633343038350000000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000000000000000000000000000000000000d9ca5cac99fd4329af4dde786c1a5d13010040000c000000000000002cc4645f", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) [ 407.212991] FAULT_INJECTION: forcing a failure. [ 407.212991] name failslab, interval 1, probability 0, space 0, times 0 [ 407.240441] CPU: 0 PID: 22786 Comm: syz-executor.3 Not tainted 4.19.169-syzkaller #0 [ 407.248364] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 407.257728] Call Trace: 16:47:57 executing program 0: creat(&(0x7f0000000280)='./file0\x00', 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) [ 407.260337] dump_stack+0x1fc/0x2ef [ 407.263981] should_fail.cold+0xa/0xf [ 407.267796] ? setup_fault_attr+0x200/0x200 [ 407.272129] ? lock_acquire+0x170/0x3c0 [ 407.276127] __should_failslab+0x115/0x180 [ 407.280373] should_failslab+0x5/0x10 [ 407.284182] kmem_cache_alloc+0x277/0x370 [ 407.288341] getname_flags+0xce/0x590 [ 407.292152] do_mkdirat+0x8d/0x2d0 [ 407.296054] ? __ia32_sys_mknod+0x120/0x120 [ 407.300382] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 407.305748] ? trace_hardirqs_off_caller+0x6e/0x210 [ 407.310767] ? do_syscall_64+0x21/0x620 [ 407.314749] do_syscall_64+0xf9/0x620 [ 407.318551] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 407.323764] RIP: 0033:0x45d637 [ 407.326957] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 dd bf fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 bd bf fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 407.345862] RSP: 002b:00007fb3ea55ea78 EFLAGS: 00000213 ORIG_RAX: 0000000000000053 [ 407.353573] RAX: ffffffffffffffda RBX: 00007fb3ea55eb10 RCX: 000000000045d637 16:47:57 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x0, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f00000000c0)={0x0, {0x0, 0x0, 0x0, 0x0, 0x5, 0x7000000}}) [ 407.360837] RDX: 0000000000000005 RSI: 00000000000001ff RDI: 0000000020000100 [ 407.368184] RBP: 00007fb3ea55ead0 R08: 0000000020000260 R09: 0000000000000000 [ 407.375458] R10: 0000000000009060 R11: 0000000000000213 R12: 0000000020000000 [ 407.382715] R13: 0000000020000100 R14: 0000000020000200 R15: 0000000020013000 [ 407.390502] EXT4-fs (loop2): bad geometry: block count 256 exceeds size of device (113 blocks) [ 407.482397] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue 16:47:58 executing program 2: creat(&(0x7f0000000280)='./file0\x00', 0x0) close(0xffffffffffffffff) write$binfmt_script(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x1c50b, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) [ 407.541138] EXT4-fs (loop3): mounted filesystem without journal. Opts: ,errors=continue 16:47:58 executing program 0: creat(&(0x7f0000000280)='./file0\x00', 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) 16:47:58 executing program 5: creat(&(0x7f0000000280)='./file0\x00', 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40008, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) 16:47:58 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x0, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f00000000c0)={0x0, {0x0, 0x0, 0x0, 0x0, 0x5, 0xa000000}}) [ 407.774786] EXT4-fs (loop2): bad geometry: block count 256 exceeds size of device (113 blocks) [ 407.892583] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue 16:47:58 executing program 4: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x50300, 0x0, 0x0, 0x0, 0xfffffffffffffbff, 0x0, 0x1000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r0, 0x4602, &(0x7f0000000000)={0x0, 0x0, 0x6c0, 0x0, 0x0, 0x0, 0x0, 0x20000000, {}, {0x0, 0x4}}) setsockopt$inet6_dccp_int(0xffffffffffffffff, 0x21, 0x10, &(0x7f00000000c0)=0x6, 0x4) r1 = socket(0x11, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r1, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r1, 0x89f1, &(0x7f00000000c0)={'ip6tnl0\x00', &(0x7f0000000000)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @empty={[0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7a]}, @ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2], [], @private}}}) socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ethtool(0x0) sendmsg$ETHTOOL_MSG_LINKMODES_SET(0xffffffffffffffff, 0x0, 0x0) getpeername$packet(0xffffffffffffffff, 0x0, 0x0) sendmsg$ETHTOOL_MSG_PAUSE_SET(0xffffffffffffffff, 0x0, 0x0) sendmsg$NL80211_CMD_SET_REKEY_OFFLOAD(0xffffffffffffffff, 0x0, 0x0) openat$vsock(0xffffffffffffff9c, 0x0, 0x0, 0x0) 16:47:58 executing program 3 (fault-call:1 fault-nth:29): creat(&(0x7f0000000280)='./file0\x00', 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) 16:47:58 executing program 0: creat(&(0x7f0000000280)='./file0\x00', 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) 16:47:58 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x0, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f00000000c0)={0x0, {0x0, 0x0, 0x0, 0x0, 0x5, 0x10000000}}) 16:47:58 executing program 2: creat(&(0x7f0000000280)='./file0\x00', 0x0) close(0xffffffffffffffff) write$binfmt_script(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x1c50c, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) 16:47:58 executing program 5: creat(&(0x7f0000000280)='./file0\x00', 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40009, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d90000000f0000000100000000000000000000000020000000200000200000002cc4645f2cc4645f0100ffff53ef0100010000002cc4645f000000000000000001000000000000000b0000008000000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e3338363633343038350000000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000000000000000000000000000000000000d9ca5cac99fd4329af4dde786c1a5d13010040000c000000000000002cc4645f", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) [ 408.238056] FAULT_INJECTION: forcing a failure. [ 408.238056] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 408.249985] CPU: 1 PID: 22842 Comm: syz-executor.3 Not tainted 4.19.169-syzkaller #0 [ 408.257871] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 408.267226] Call Trace: [ 408.269828] dump_stack+0x1fc/0x2ef [ 408.273462] should_fail.cold+0xa/0xf [ 408.273482] ? setup_fault_attr+0x200/0x200 [ 408.281610] ? wake_up_q+0x93/0xe0 16:47:58 executing program 0: creat(&(0x7f0000000280)='./file0\x00', 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) [ 408.285159] ? __mutex_unlock_slowpath+0x2be/0x610 [ 408.285178] __alloc_pages_nodemask+0x239/0x2890 [ 408.285202] ? __lock_acquire+0x6de/0x3ff0 [ 408.285221] ? gfp_pfmemalloc_allowed+0x150/0x150 [ 408.303972] ? blkdev_ioctl+0x11a/0x1a80 [ 408.308035] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 408.313408] ? blkpg_ioctl+0x9d0/0x9d0 [ 408.317311] ? debug_check_no_obj_freed+0x201/0x490 [ 408.322339] ? lock_downgrade+0x720/0x720 [ 408.326495] cache_grow_begin+0xa4/0x8a0 [ 408.330553] ? setup_fault_attr+0x200/0x200 [ 408.334969] ? lock_acquire+0x170/0x3c0 [ 408.338931] cache_alloc_refill+0x273/0x340 [ 408.343267] kmem_cache_alloc+0x346/0x370 [ 408.347433] getname_flags+0xce/0x590 [ 408.351262] do_mkdirat+0x8d/0x2d0 [ 408.354783] ? __ia32_sys_mknod+0x120/0x120 [ 408.359134] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 408.364510] ? trace_hardirqs_off_caller+0x6e/0x210 [ 408.369526] ? do_syscall_64+0x21/0x620 [ 408.373550] do_syscall_64+0xf9/0x620 [ 408.377338] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 408.382511] RIP: 0033:0x45d637 [ 408.385699] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 dd bf fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 bd bf fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 408.404582] RSP: 002b:00007fb3ea55ea78 EFLAGS: 00000213 ORIG_RAX: 0000000000000053 [ 408.412278] RAX: ffffffffffffffda RBX: 00007fb3ea55eb10 RCX: 000000000045d637 [ 408.419632] RDX: 0000000000000005 RSI: 00000000000001ff RDI: 0000000020000100 [ 408.426910] RBP: 00007fb3ea55ead0 R08: 0000000020000260 R09: 0000000000000000 16:47:58 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x0, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f00000000c0)={0x0, {0x0, 0x0, 0x0, 0x0, 0x5, 0x3f000000}}) [ 408.434172] R10: 0000000000009060 R11: 0000000000000213 R12: 0000000020000000 [ 408.441424] R13: 0000000020000100 R14: 0000000020000200 R15: 0000000020013000 [ 408.467388] EXT4-fs (loop2): bad geometry: block count 256 exceeds size of device (113 blocks) 16:47:58 executing program 0: creat(&(0x7f0000000280)='./file0\x00', 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) [ 408.487324] EXT4-fs (loop3): mounted filesystem without journal. Opts: ,errors=continue [ 408.488018] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue 16:47:59 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x0, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f00000000c0)={0x0, {0x0, 0x0, 0x0, 0x0, 0x5, 0x48000000}}) 16:47:59 executing program 3 (fault-call:1 fault-nth:30): creat(&(0x7f0000000280)='./file0\x00', 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) 16:47:59 executing program 0: creat(&(0x7f0000000280)='./file0\x00', 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) [ 408.748305] FAULT_INJECTION: forcing a failure. [ 408.748305] name failslab, interval 1, probability 0, space 0, times 0 [ 408.780543] CPU: 0 PID: 22881 Comm: syz-executor.3 Not tainted 4.19.169-syzkaller #0 [ 408.788464] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 408.797832] Call Trace: [ 408.800462] dump_stack+0x1fc/0x2ef [ 408.804116] should_fail.cold+0xa/0xf [ 408.807930] ? setup_fault_attr+0x200/0x200 [ 408.812261] ? lock_acquire+0x170/0x3c0 [ 408.816253] __should_failslab+0x115/0x180 [ 408.820500] should_failslab+0x5/0x10 [ 408.824327] kmem_cache_alloc_trace+0x284/0x380 [ 408.828996] ? _copy_from_user+0xd2/0x130 [ 408.833149] copy_mount_options+0x59/0x380 [ 408.837414] ksys_mount+0x9b/0x130 [ 408.840980] __x64_sys_mount+0xba/0x150 [ 408.844965] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 408.849559] do_syscall_64+0xf9/0x620 [ 408.853381] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 408.858574] RIP: 0033:0x460c6a [ 408.861774] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 ad 89 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 8a 89 fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 408.880677] RSP: 002b:00007fb3ea55ea78 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 408.888392] RAX: ffffffffffffffda RBX: 00007fb3ea55eb10 RCX: 0000000000460c6a [ 408.895668] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007fb3ea55ead0 [ 408.902939] RBP: 00007fb3ea55ead0 R08: 00007fb3ea55eb10 R09: 0000000020000000 [ 408.910212] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000020000000 [ 408.917488] R13: 0000000020000100 R14: 0000000020000200 R15: 0000000020013000 16:47:59 executing program 2: creat(&(0x7f0000000280)='./file0\x00', 0x0) close(0xffffffffffffffff) write$binfmt_script(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x1c5f4, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) 16:47:59 executing program 5: creat(&(0x7f0000000280)='./file0\x00', 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4000d, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) 16:47:59 executing program 0: creat(&(0x7f0000000280)='./file0\x00', 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) 16:47:59 executing program 4: r0 = syz_open_dev$loop(&(0x7f0000000880)='/dev/loop#\x00', 0x7f, 0x182) r1 = memfd_create(&(0x7f0000000240)='.^\xc5', 0x0) pwritev(r1, &(0x7f0000000040)=[{&(0x7f0000000000)='!', 0x1}], 0x1, 0x81805, 0x0) sendfile(r0, r0, 0x0, 0x24000000) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = dup(r2) ioctl$DRM_IOCTL_MODE_SETPLANE(r3, 0xc03064b7, &(0x7f00000000c0)={0x0, 0x8, 0x1, 0x8, 0x80000000, 0x8, 0x8, 0x4, 0x7, 0x7, 0x5, 0x1ff}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = creat(&(0x7f0000000280)='./file0\x00', 0x1) close(r4) write$FUSE_NOTIFY_STORE(r4, &(0x7f0000000080)={0x2f, 0x4, 0x0, {0x4, 0x1, 0x7, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}}, 0x2f) r5 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x0) lseek(r5, 0x8, 0x1) ioctl$LOOP_SET_FD(r5, 0x4c00, r2) ioctl$LOOP_CLR_FD(r0, 0x4c01) symlinkat(&(0x7f0000000100)='./file0\x00', 0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00') ioctl$LOOP_SET_FD(r0, 0x4c00, r1) 16:47:59 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x0, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f00000000c0)={0x0, {0x0, 0x0, 0x0, 0x0, 0x5, 0x4c000000}}) 16:47:59 executing program 3 (fault-call:1 fault-nth:31): creat(&(0x7f0000000280)='./file0\x00', 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d90000000f0000000100000000000000000000000020000000200000200000002cc4645f2cc4645f0100ffff53ef0100010000002cc4645f000000000000000001000000000000000b0000008000000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e3338363633343038350000000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000000000000000000000000000000000000d9ca5cac99fd4329af4dde786c1a5d13010040000c000000000000002cc4645f", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) 16:47:59 executing program 0: creat(&(0x7f0000000280)='./file0\x00', 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) 16:47:59 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x0, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f00000000c0)={0x0, {0x0, 0x0, 0x0, 0x0, 0x5, 0x68000000}}) [ 409.095537] EXT4-fs (loop2): bad geometry: block count 256 exceeds size of device (113 blocks) [ 409.110499] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue 16:47:59 executing program 4: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x42, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x81, 0xe00000000000000}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000001c0)={0xa, 0x4e22}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x200440d4, &(0x7f000072e000)={0xa, 0x4e22, 0x0, @loopback, 0xffffffff}, 0x1c) setsockopt$inet6_int(r0, 0x29, 0x3, &(0x7f0000000440)=0xffffff10, 0x4) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=@newlink={0x54, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @macvlan={{0xc, 0x1, 'macvlan\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_MACVLAN_MODE={0x8, 0x1, 0x8}, @IFLA_MACVLAN_FLAGS={0x6, 0x2, 0x1}]}}}, @IFLA_LINK={0x8}, @IFLA_MASTER={0x8}]}, 0x54}}, 0x0) r1 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000180)={'bond0\x00', 0x0}) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)=@ipv4_getroute={0x1c, 0x1a, 0x800, 0x70bd29, 0x25dfdbfe, {0x2, 0x0, 0xa, 0x8a, 0xfd, 0x1, 0xfd, 0x6}, [""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000840}, 0x40804) bind$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, r2, 0x1, 0x80, 0x6, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x1}}, 0x14) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000280)={'batadv0\x00'}) r3 = socket$nl_route(0x10, 0x3, 0x0) socket(0x1, 0x803, 0x0) r4 = openat$bsg(0xffffff9c, &(0x7f0000000340)='/dev/bsg\x00', 0x400100, 0x0) ioctl$KVM_GET_DEBUGREGS(r4, 0x8080aea1, &(0x7f0000000480)) r5 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r5, 0x8936, &(0x7f0000000240)={@ipv4={[0xa], [], @multicast2}, 0x7d, r2}) sendmsg$nl_route(r3, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=@newlink={0x54, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @macvlan={{0xc, 0x1, 'macvlan\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_MACVLAN_MODE={0x8, 0x1, 0x8}, @IFLA_MACVLAN_FLAGS={0x6, 0x2, 0x1}]}}}, @IFLA_LINK={0x8, 0x5, r2}, @IFLA_MASTER={0x8}]}, 0x54}}, 0x0) [ 409.156761] FAULT_INJECTION: forcing a failure. [ 409.156761] name failslab, interval 1, probability 0, space 0, times 0 [ 409.190145] CPU: 1 PID: 22913 Comm: syz-executor.3 Not tainted 4.19.169-syzkaller #0 [ 409.198050] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 409.198056] Call Trace: [ 409.198077] dump_stack+0x1fc/0x2ef [ 409.198095] should_fail.cold+0xa/0xf [ 409.210031] ? setup_fault_attr+0x200/0x200 [ 409.210046] ? lock_acquire+0x170/0x3c0 [ 409.210069] __should_failslab+0x115/0x180 [ 409.229956] should_failslab+0x5/0x10 [ 409.233779] kmem_cache_alloc+0x277/0x370 [ 409.237927] alloc_vfsmnt+0x23/0x780 [ 409.241624] ? _raw_read_unlock+0x29/0x40 [ 409.245755] vfs_kern_mount.part.0+0x27/0x470 [ 409.250235] do_mount+0x113c/0x2f10 [ 409.253921] ? rcu_nmi_exit+0xb3/0x180 [ 409.257794] ? copy_mount_string+0x40/0x40 [ 409.262125] ? copy_mount_options+0x1da/0x380 [ 409.266661] ? copy_mount_options+0x1e0/0x380 [ 409.271156] ? copy_mount_options+0x26f/0x380 [ 409.275645] ksys_mount+0xcf/0x130 [ 409.279176] __x64_sys_mount+0xba/0x150 [ 409.283134] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 409.287710] do_syscall_64+0xf9/0x620 [ 409.291524] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 409.296713] RIP: 0033:0x460c6a [ 409.299926] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 ad 89 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 8a 89 fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 409.318826] RSP: 002b:00007fb3ea55ea78 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 409.326514] RAX: ffffffffffffffda RBX: 00007fb3ea55eb10 RCX: 0000000000460c6a [ 409.333766] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007fb3ea55ead0 [ 409.341036] RBP: 00007fb3ea55ead0 R08: 00007fb3ea55eb10 R09: 0000000020000000 [ 409.348328] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000020000000 16:47:59 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x0, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f00000000c0)={0x0, {0x0, 0x0, 0x0, 0x0, 0x5, 0x6c000000}}) 16:47:59 executing program 5: creat(&(0x7f0000000280)='./file0\x00', 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4000e, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) [ 409.355590] R13: 0000000020000100 R14: 0000000020000200 R15: 0000000020013000 16:47:59 executing program 2: creat(&(0x7f0000000280)='./file0\x00', 0x0) close(0xffffffffffffffff) write$binfmt_script(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x1c5f5, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) 16:48:00 executing program 0: creat(&(0x7f0000000280)='./file0\x00', 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) 16:48:00 executing program 3 (fault-call:1 fault-nth:32): creat(&(0x7f0000000280)='./file0\x00', 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) 16:48:00 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x0, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f00000000c0)={0x0, {0x0, 0x0, 0x0, 0x0, 0x5, 0x74000000}}) 16:48:00 executing program 4: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000080)={'bridge0\x00', &(0x7f0000000040)=@ethtool_ringparam={0x11, 0x0, 0x10001, 0x0, 0x200}}) creat(&(0x7f0000000000)='./file0\x00', 0x20) [ 409.620774] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue [ 409.643052] FAULT_INJECTION: forcing a failure. [ 409.643052] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 409.654999] CPU: 1 PID: 22954 Comm: syz-executor.3 Not tainted 4.19.169-syzkaller #0 [ 409.662889] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 409.672246] Call Trace: [ 409.674856] dump_stack+0x1fc/0x2ef [ 409.678499] should_fail.cold+0xa/0xf [ 409.682443] ? setup_fault_attr+0x200/0x200 [ 409.686766] ? is_bpf_text_address+0xfc/0x1b0 [ 409.686786] ? kernel_text_address+0xbd/0xf0 [ 409.686800] ? __kernel_text_address+0x9/0x30 [ 409.686819] __alloc_pages_nodemask+0x239/0x2890 [ 409.704963] ? __lock_acquire+0x6de/0x3ff0 [ 409.704984] ? __x64_sys_mount+0xba/0x150 [ 409.705001] ? gfp_pfmemalloc_allowed+0x150/0x150 [ 409.705017] ? debug_check_no_obj_freed+0xb5/0x490 [ 409.705038] ? _raw_spin_unlock_irqrestore+0x66/0xe0 [ 409.728278] ? debug_check_no_obj_freed+0x201/0x490 [ 409.733303] ? check_preemption_disabled+0x41/0x280 [ 409.738331] ? putname+0xe1/0x120 [ 409.741797] ? putname+0xe1/0x120 [ 409.745265] cache_grow_begin+0xa4/0x8a0 [ 409.749332] ? setup_fault_attr+0x200/0x200 [ 409.753662] ? lock_acquire+0x170/0x3c0 [ 409.757645] cache_alloc_refill+0x273/0x340 [ 409.761979] kmem_cache_alloc_trace+0x354/0x380 [ 409.766658] copy_mount_options+0x59/0x380 [ 409.770904] ksys_mount+0x9b/0x130 [ 409.774454] __x64_sys_mount+0xba/0x150 [ 409.778438] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 409.783028] do_syscall_64+0xf9/0x620 [ 409.786840] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 409.792037] RIP: 0033:0x460c6a [ 409.795235] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 ad 89 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 8a 89 fb ff c3 66 0f 1f 84 00 00 00 00 00 16:48:00 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x0, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f00000000c0)={0x0, {0x0, 0x0, 0x0, 0x0, 0x5, 0x7a000000}}) [ 409.814140] RSP: 002b:00007fb3ea55ea78 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 409.821862] RAX: ffffffffffffffda RBX: 00007fb3ea55eb10 RCX: 0000000000460c6a [ 409.829139] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007fb3ea55ead0 [ 409.836413] RBP: 00007fb3ea55ead0 R08: 00007fb3ea55eb10 R09: 0000000020000000 [ 409.843685] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000020000000 [ 409.850958] R13: 0000000020000100 R14: 0000000020000200 R15: 0000000020013000 16:48:00 executing program 4: r0 = signalfd4(0xffffffffffffffff, &(0x7f0000000340), 0x8, 0x0) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/audio\x00', 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) socket$inet6_sctp(0xa, 0x801, 0x84) timerfd_create(0x0, 0x0) ioctl$SNDCTL_DSP_SETFRAGMENT(r0, 0xc004500a, &(0x7f0000000000)=0x8) ioctl$int_in(r1, 0x800000c004500a, &(0x7f0000000300)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x4}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000080)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0)={0x0, 0x1, 0x0, 0xb224, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, &(0x7f0000000140)={0x1ff}, &(0x7f0000000200)={0x0, r2+30000000}, 0x0) 16:48:00 executing program 0: creat(&(0x7f0000000280)='./file0\x00', 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) [ 409.870992] EXT4-fs (loop2): bad geometry: block count 256 exceeds size of device (113 blocks) 16:48:00 executing program 5: creat(&(0x7f0000000280)='./file0\x00', 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40010, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) 16:48:00 executing program 2: creat(&(0x7f0000000280)='./file0\x00', 0x0) close(0xffffffffffffffff) write$binfmt_script(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x1c5f6, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) 16:48:00 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x0, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f00000000c0)={0x0, {0x0, 0x0, 0x0, 0x0, 0x5, 0x88600000}}) [ 409.987548] EXT4-fs (loop3): mounted filesystem without journal. Opts: ,errors=continue 16:48:00 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x0, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f00000000c0)={0x0, {0x0, 0x0, 0x0, 0x0, 0x5, 0xffffff7f}}) 16:48:00 executing program 3 (fault-call:1 fault-nth:33): creat(&(0x7f0000000280)='./file0\x00', 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) [ 410.049580] EXT4-fs (loop2): bad geometry: block count 256 exceeds size of device (113 blocks) 16:48:00 executing program 0: creat(&(0x7f0000000280)='./file0\x00', 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) 16:48:00 executing program 2: creat(&(0x7f0000000280)='./file0\x00', 0x0) close(0xffffffffffffffff) write$binfmt_script(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x1c600, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) [ 410.158983] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue [ 410.177995] FAULT_INJECTION: forcing a failure. [ 410.177995] name failslab, interval 1, probability 0, space 0, times 0 16:48:00 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x0, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f00000000c0)={0x0, {0x0, 0x0, 0x0, 0x0, 0x5, 0xffffffff}}) [ 410.208148] CPU: 1 PID: 23001 Comm: syz-executor.3 Not tainted 4.19.169-syzkaller #0 [ 410.216052] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 410.225407] Call Trace: [ 410.227992] dump_stack+0x1fc/0x2ef [ 410.231635] should_fail.cold+0xa/0xf [ 410.235431] ? setup_fault_attr+0x200/0x200 [ 410.239749] ? lock_acquire+0x170/0x3c0 [ 410.243713] __should_failslab+0x115/0x180 [ 410.247934] should_failslab+0x5/0x10 [ 410.251718] kmem_cache_alloc+0x277/0x370 [ 410.255896] alloc_vfsmnt+0x23/0x780 [ 410.259593] ? _raw_read_unlock+0x29/0x40 [ 410.263740] vfs_kern_mount.part.0+0x27/0x470 [ 410.268226] do_mount+0x113c/0x2f10 [ 410.271886] ? lock_acquire+0x170/0x3c0 [ 410.275847] ? check_preemption_disabled+0x41/0x280 [ 410.280848] ? copy_mount_string+0x40/0x40 [ 410.285067] ? copy_mount_options+0x59/0x380 [ 410.289547] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 410.294562] ? kmem_cache_alloc_trace+0x323/0x380 [ 410.299391] ? copy_mount_options+0x26f/0x380 [ 410.303873] ksys_mount+0xcf/0x130 [ 410.307405] __x64_sys_mount+0xba/0x150 [ 410.311404] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 410.315984] do_syscall_64+0xf9/0x620 [ 410.319777] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 410.325022] RIP: 0033:0x460c6a [ 410.328200] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 ad 89 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 8a 89 fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 410.347086] RSP: 002b:00007fb3ea55ea78 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 16:48:00 executing program 4: r0 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x100000006, 0x141000) ioctl$MON_IOCX_MFETCH(r0, 0xc0109207, &(0x7f0000000080)={&(0x7f0000000040)=[0x0, 0x0, 0x0], 0x3, 0x6}) ioctl$BTRFS_IOC_BALANCE_PROGRESS(r0, 0x84009422, &(0x7f0000000400)={0x0, 0x0, {0x0, @struct}, {0x0, @struct}}) preadv(r0, &(0x7f00000003c0)=[{&(0x7f0000000100)=""/121, 0x79}, {&(0x7f0000000180)=""/68, 0x44}, {&(0x7f0000000200)=""/191, 0xbf}, {&(0x7f00000002c0)=""/201, 0xc9}], 0x4, 0x1, 0x3ff) r1 = syz_open_dev$usbmon(&(0x7f0000000800)='/dev/usbmon#\x00', 0x9, 0x80) ioctl$MON_IOCG_STATS(r1, 0x80089203, &(0x7f0000000840)) r2 = dup(r0) sendfile(r0, r2, &(0x7f00000000c0), 0x8) [ 410.357686] RAX: ffffffffffffffda RBX: 00007fb3ea55eb10 RCX: 0000000000460c6a [ 410.365043] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007fb3ea55ead0 [ 410.372311] RBP: 00007fb3ea55ead0 R08: 00007fb3ea55eb10 R09: 0000000020000000 [ 410.379573] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000020000000 [ 410.386834] R13: 0000000020000100 R14: 0000000020000200 R15: 0000000020013000 16:48:00 executing program 1: read$FUSE(0xffffffffffffffff, &(0x7f0000000400)={0x2020, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x2020) perf_event_open(&(0x7f0000000140)={0x5, 0x70, 0x7, 0x1, 0x7f, 0x8f, 0x0, 0x7, 0x80040, 0x4, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x3, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x6, 0x0, @perf_bp={&(0x7f0000000100), 0x3}, 0x9, 0x1, 0x6, 0x7, 0x0, 0x0, 0x7fff}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r1 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x0, 0x0) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$UI_ABS_SETUP(r1, 0x401c5504, &(0x7f00000000c0)={0x0, {0x0, 0x0, 0x0, 0x0, 0x5}}) r4 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/stat\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r3, 0x84, 0x6d, &(0x7f0000000300)={0x0, 0xcb, "325418403ac0ca3c8ff7c0345bd9e3743ca0978857ebf230908b692f050de8ce69f2ffb615205c93d011f3609c631c2f9dd12285c887a03b88efabd993a6717bf3c46ed00f255b81cdb96b149698e6fbc715013a56af2850cb938c39ba43917980fa46267b50116790c3c4507804efde778603325aa04e37093ea0fdcd415c5fc6f161880b5c418503304f80c26397c07b41e80f3d91de2e0f339ce7996d18e94bd14f5f07f77c2ff6ba98fef57b4306267064b445d0ef70b17f6bac4ab81733458818b8867fa33316fcae"}, &(0x7f0000000080)=0xd3) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(r4, 0x84, 0x1b, &(0x7f0000000200)=ANY=[@ANYRES32=r5, @ANYBLOB="95000000951e0272745ead9e8ec958aa901bd04e3641748f61038c9fc4bce11d7ec5e17067442e4f85240d02b0c6f1448ea5068539852ad108b5f60357cef300ad8e7087ef8f128b20519a4b5bae7419567b0ab0075d3e30a7ae005d0c6aab13cec2059c887bad1ff2868b80339ef82045c1b20e746f223df53e800588e0dcc607e4262c8cecd08f50bee30e"], &(0x7f00000002c0)=0x9d) 16:48:00 executing program 5: creat(&(0x7f0000000280)='./file0\x00', 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40014, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) 16:48:00 executing program 0: creat(&(0x7f0000000280)='./file0\x00', 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) 16:48:01 executing program 3 (fault-call:1 fault-nth:34): creat(&(0x7f0000000280)='./file0\x00', 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) [ 410.492872] EXT4-fs (loop2): bad geometry: block count 256 exceeds size of device (113 blocks) 16:48:01 executing program 1: r0 = socket$tipc(0x1e, 0x2, 0x0) r1 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x0, 0x0) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r3 = dup(r2) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000a00)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000080)={&(0x7f0000000b40)=ANY=[@ANYBLOB="d8818e9abf68b4591d0992bdfbdcea090800"/35, @ANYRES32=0x0, @ANYBLOB="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"], 0x8d8}, 0x1, 0x0, 0x0, 0x4000000}, 0x4080) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000b00)=0x0) dup(r1) perf_event_open(&(0x7f0000000a80)={0x4, 0x70, 0x9, 0x3, 0x1, 0x40, 0x0, 0x6, 0x80040, 0x8, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1000, 0x2, @perf_bp={&(0x7f0000000a40), 0x9}, 0x14010, 0x0, 0x8000, 0x7, 0x5, 0xe9a}, r4, 0x6, 0xffffffffffffffff, 0x8) ioctl$UI_ABS_SETUP(r1, 0x401c5504, &(0x7f00000000c0)={0x0, {0x0, 0x0, 0x0, 0x0, 0x5}}) 16:48:01 executing program 2: creat(&(0x7f0000000280)='./file0\x00', 0x0) close(0xffffffffffffffff) write$binfmt_script(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x1c640, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) [ 410.600140] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue [ 410.637397] FAULT_INJECTION: forcing a failure. [ 410.637397] name failslab, interval 1, probability 0, space 0, times 0 16:48:01 executing program 0: creat(&(0x7f0000000280)='./file0\x00', 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) 16:48:01 executing program 5: creat(&(0x7f0000000280)='./file0\x00', 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40023, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d90000000f0000000100000000000000000000000020000000200000200000002cc4645f2cc4645f0100ffff53ef0100010000002cc4645f000000000000000001000000000000000b0000008000000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e3338363633343038350000000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000000000000000000000000000000000000d9ca5cac99fd4329af4dde786c1a5d13010040000c000000000000002cc4645f", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) 16:48:01 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x0, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x13) r2 = dup(r1) r3 = creat(&(0x7f0000000280)='./file0\x00', 0x1) close(r3) sendto$inet(r3, &(0x7f0000000280)="e90b76a44050ff0f610b7761184f304e82f6acc5eed09d8fb272ddaf3d26e54d3b5c4cad24f7a1b2faf998d13580c41fcff7cc3edf634cf3cd4658d63db400b5f72e46acdc6fe78401b7409fdf1131098879386b0fed7cec996777822d1a779e25bc705ed7114dacd0eb42e2718c5d3bb74aa82c7e7a6f7d64b6331b9dfe6d6e579d90e647d9e5a94e6ffd30ba3ed9457a7b7901fbd706b8dba1063e110c88af2eb38d48dc1648787283ccfb5f5d749111ecf08ba919806e236b57b47d981563e0e7731707fd55f00d21bf928e12ed4e1e000894559bd54edc21650ae0330aece7ec2ffecc1b7fd59fa2d555401200b3d44d253c003af4099fe8", 0xfa, 0x24000004, &(0x7f0000000380)={0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x13}}, 0x10) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r4 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x0) lseek(r4, 0x8, 0x1) read(r4, &(0x7f0000000180)=""/197, 0xc5) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f00000000c0)={0x0, {0x0, 0x0, 0x0, 0x0, 0x5}}) vmsplice(r0, &(0x7f0000000080)=[{&(0x7f0000000100)="f04b5314e92b8b0b26ef45577c35efcd4a5bc5e4d07f7f9b0ceb707c12d96fa5988d730075201a3af00e35a16a6462e5a3ba5260584d0cc2c4199fe0e4fc3de041badbc0be30023475d4039b8bca6bb766ea27a42624a3861b86b92effdcf1e91bd48987de68c6093c1a4d", 0x6b}], 0x1, 0x3) [ 410.703748] CPU: 1 PID: 23042 Comm: syz-executor.3 Not tainted 4.19.169-syzkaller #0 [ 410.711674] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 410.721033] Call Trace: [ 410.723638] dump_stack+0x1fc/0x2ef [ 410.727279] should_fail.cold+0xa/0xf [ 410.731097] ? setup_fault_attr+0x200/0x200 [ 410.735425] ? lock_acquire+0x170/0x3c0 [ 410.739419] __should_failslab+0x115/0x180 [ 410.743667] should_failslab+0x5/0x10 [ 410.746821] EXT4-fs (loop2): bad geometry: block count 256 exceeds size of device (113 blocks) [ 410.747472] kmem_cache_alloc+0x277/0x370 [ 410.760351] getname_flags+0xce/0x590 [ 410.764169] user_path_at_empty+0x2a/0x50 [ 410.768330] do_mount+0x147/0x2f10 [ 410.771884] ? do_raw_spin_unlock+0x171/0x230 [ 410.776386] ? check_preemption_disabled+0x41/0x280 [ 410.781407] ? copy_mount_string+0x40/0x40 [ 410.781422] ? copy_mount_options+0x59/0x380 [ 410.781439] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 410.795076] ? kmem_cache_alloc_trace+0x323/0x380 [ 410.799923] ? copy_mount_options+0x26f/0x380 16:48:01 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x0, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) perf_event_open(&(0x7f0000000100)={0x4, 0x70, 0x20, 0x96, 0xfe, 0xff, 0x0, 0x75dd, 0x8000, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x4, @perf_bp={&(0x7f0000000040)}, 0x4224, 0x0, 0xfffffffc, 0x3, 0x0, 0x1, 0xfff7}, 0xffffffffffffffff, 0x9, r2, 0x0) r3 = creat(&(0x7f0000000280)='./file0\x00', 0x1) close(r3) r4 = openat$cgroup_ro(r3, &(0x7f0000000080)='cpu.stat\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0xfffd) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f00000000c0)={0x0, {0x0, 0x0, 0x0, 0x0, 0x5}}) r5 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x0) r6 = perf_event_open(&(0x7f0000000380)={0x3, 0x70, 0x7f, 0xf8, 0xff, 0x3f, 0x0, 0x5, 0x4140, 0x3, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x4, @perf_bp={&(0x7f0000000300)}, 0x4000, 0x800, 0x2, 0x0, 0x873c, 0x666, 0x18}, 0xffffffffffffffff, 0x10, r4, 0x3) r7 = dup3(0xffffffffffffffff, r1, 0x80000) ioctl$ASHMEM_SET_PROT_MASK(r7, 0x40087705, &(0x7f0000000400)={0x3, 0x8}) r8 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x0) lseek(r8, 0x8, 0x1) write$binfmt_aout(r8, &(0x7f0000000440)={{0x10b, 0x5, 0x9, 0x3e3, 0x1be, 0x9, 0x29f, 0x1}, "4c8cf3701ba7333dc3aa06a35a7c4a8d32c9724d18450a956218ab0ce934002fba9bcf1507912073cf5fd3ca6243b91efb012f8769ab83c59e698bf1dc421d391a07c88159e0550faf74d81e64aae79d8dc7c96f27995a3b367ac34f1281d69e78415355ccb1e9b83f3b9303080a41ed20ed8161cacafa7e124fff478e5275d25c7c0732c3", [[], [], [], [], [], [], [], [], [], []]}, 0xaa5) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x10) lseek(r5, 0x8, 0x1) ioctl$BTRFS_IOC_TREE_SEARCH(r6, 0xd0009411, &(0x7f0000000f00)={{0x0, 0xffffffffffffffc0, 0x5, 0x401, 0x7fffffff, 0x3fb, 0x7b0, 0x24000000, 0x1, 0xb11, 0x2, 0x101, 0x100, 0x3, 0x5}}) preadv(r5, &(0x7f0000000340)=[{&(0x7f0000000180)=""/251, 0xfb}, {&(0x7f00000002c0)=""/46, 0x2e}], 0x2, 0x2, 0xfffeffff) [ 410.799946] ksys_mount+0xcf/0x130 [ 410.807963] __x64_sys_mount+0xba/0x150 [ 410.812211] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 410.816800] do_syscall_64+0xf9/0x620 [ 410.820610] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 410.825804] RIP: 0033:0x460c6a [ 410.829000] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 ad 89 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 8a 89 fb ff c3 66 0f 1f 84 00 00 00 00 00 16:48:01 executing program 0: creat(&(0x7f0000000280)='./file0\x00', 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) [ 410.847909] RSP: 002b:00007fb3ea55ea78 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 410.855680] RAX: ffffffffffffffda RBX: 00007fb3ea55eb10 RCX: 0000000000460c6a [ 410.862980] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007fb3ea55ead0 [ 410.870240] RBP: 00007fb3ea55ead0 R08: 00007fb3ea55eb10 R09: 0000000020000000 [ 410.877520] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000020000000 [ 410.884776] R13: 0000000020000100 R14: 0000000020000200 R15: 0000000020013000 [ 410.982194] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue 16:48:01 executing program 3 (fault-call:1 fault-nth:35): creat(&(0x7f0000000280)='./file0\x00', 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) 16:48:01 executing program 2: creat(&(0x7f0000000280)='./file0\x00', 0x0) close(0xffffffffffffffff) write$binfmt_script(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x1c658, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) 16:48:01 executing program 0: creat(&(0x7f0000000280)='./file0\x00', 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) 16:48:01 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x0, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f00000000c0)={0x0, {0x0, 0x0, 0x0, 0x0, 0x5}}) r3 = creat(&(0x7f0000000280)='./file0\x00', 0x1) close(r3) ioctl$UI_DEV_SETUP(r3, 0x405c5503, &(0x7f0000000040)={{0x1, 0x9, 0x6, 0x6}, 'syz0\x00', 0x4f}) 16:48:01 executing program 5: creat(&(0x7f0000000280)='./file0\x00', 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4002d, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) 16:48:01 executing program 4: perf_event_open(&(0x7f0000000440)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000002c0)={0x3, 0x70, 0x5, 0xd7, 0x6, 0x0, 0x0, 0x4, 0x10, 0x8, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x3, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8, 0x4, @perf_config_ext={0x100000000, 0x1}, 0x0, 0x4e, 0x0, 0x1, 0x1, 0x38b8, 0x9}, 0x0, 0xc, 0xffffffffffffffff, 0x9) r0 = getpid() r1 = shmget$private(0x0, 0xb000, 0x0, &(0x7f0000ff5000/0xb000)=nil) r2 = shmat(r1, &(0x7f0000ffd000/0x3000)=nil, 0xd800) shmdt(r2) pivot_root(0x0, 0x0) sendto$inet(0xffffffffffffffff, &(0x7f00003cef9f)='7', 0xfffa, 0x0, &(0x7f0000618000)={0x2, 0x0, @loopback}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000500)=ANY=[@ANYBLOB="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"], &(0x7f0000000000)=0x4) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, 0x0, 0x0) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, &(0x7f0000000100)={0x0, 0x8}, &(0x7f0000000140)=0x8) sched_setscheduler(r0, 0x0, &(0x7f0000000380)) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) setsockopt$inet6_int(r4, 0x29, 0x4, &(0x7f0000000000)=0x1, 0x4) sendto$inet6(r4, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x983a}, 0x1c) ioctl$SNDCTL_DSP_GETFMTS(0xffffffffffffffff, 0x8004500b, &(0x7f0000000040)=0x5) memfd_create(&(0x7f0000000200)='\x00\x83\xc5\xcb\xc7\x108\xa4\x03\x9c0T3\xc5\x97\x95\xb5\x8fM\xddU\x10\xaaod\x96\xeeM\xbe\x0e\xe4\xcc\xc4\xcf,\x9f7\xcc(Z\x13`\x00\x00\x00\x00 \x00\x00\x00\x00\x00\x00c\r\x14\xd8g\x02S -\xfd\xb5a\xedf|\xc4\xf9\xd2J\xadi\xcc[\\P\xa6F\x8c^\xc7i)d\x9f\xfckW\x86\xe4Qg1\xbdD\x1c\x13O\\\x7fS/\xc9d!\x19\"\x16\xfdC\tz\xf1\xf3q\xfd\'.\xb4\x14\x14m_&\x88\x8cfI\x18&\xea5\xa0\x00\xd2\xcd\xf0\xd5\x03\x9f\x18\x8d6\xc9,\xc9Y\xb8\xc9\xdd\xadp3\xbe\x93C\xa3b\x18\xe7\xcdx\x86aA\x9e\x83\aKc\xba\x05\x19\xb1\x9cJ\xce2\x9fW\xd3', 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000008c0)=ANY=[@ANYRES16, @ANYRES32, @ANYRES64=r3], 0x48}}, 0x4000) 16:48:01 executing program 0: creat(&(0x7f0000000280)='./file0\x00', 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) [ 411.460768] EXT4-fs (loop2): bad geometry: block count 256 exceeds size of device (113 blocks) 16:48:01 executing program 1: openat$uinput(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uinput\x00', 0x802, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x2, 0x0) ioctl$UI_SET_SWBIT(r1, 0x4004556d, 0x4) r2 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$UI_ABS_SETUP(r1, 0x401c5504, &(0x7f00000000c0)={0x0, {0x0, 0x0, 0x0, 0x0, 0x5, 0x42000000}}) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/meminfo\x00', 0x0, 0x0) write$uinput_user_dev(r3, &(0x7f0000000100)={'syz0\x00', {0x20, 0x8, 0x401, 0xb75}, 0x3b, [0xffffffd2, 0x0, 0x3, 0x3, 0x0, 0x7, 0x5, 0xfffffff9, 0xfffffff7, 0x8000, 0x1f08, 0x7, 0x4cf8, 0xfffffbbd, 0x0, 0x4, 0x10000, 0x1ff, 0x80000001, 0xa8, 0xf91, 0x4, 0x3f, 0x3ff, 0x100, 0xca5c, 0x6, 0x40, 0xffffffe0, 0x1f96, 0x1, 0x6, 0x101, 0x8, 0x8, 0x0, 0x1ff, 0x7, 0x7, 0xe8a, 0x0, 0x6, 0x3f, 0x3a3c, 0x9, 0x1, 0x400, 0x380, 0x8, 0x20, 0xd7, 0x8, 0x2, 0x7ff, 0x7fffffff, 0x9, 0x3, 0x10000, 0xa1e, 0x0, 0xe3, 0xfffffffe, 0x9, 0xfffffffb], [0x8, 0x80000000, 0x8, 0x66, 0x8, 0x27, 0x7, 0xd0c, 0xa89, 0x0, 0x1ff, 0xfffffff8, 0x7, 0x2, 0x579a, 0x3, 0x80000001, 0x43fc1e50, 0x8, 0xffffffff, 0x101, 0x10001, 0xb6, 0x5, 0x1, 0x6, 0x100, 0x100, 0x800, 0x7, 0x9, 0xffff, 0x0, 0x4, 0x80000000, 0x1fe, 0x8, 0x5, 0xfffffd0b, 0x8001, 0x3, 0x4, 0xffffffff, 0x4, 0x5, 0x2, 0x1, 0x7, 0x8e31, 0x6c8, 0x6, 0x40, 0x0, 0x800, 0x80000001, 0x5, 0x7, 0xff, 0x6, 0x2, 0x3, 0x1f, 0x9, 0xf7], [0x4, 0x4, 0x1ff, 0x7, 0x5, 0xd187, 0x0, 0x7, 0x3, 0x0, 0x45b, 0x1f, 0x8, 0xffff, 0x8, 0x2, 0x50, 0x2, 0xb4, 0x400, 0x3, 0xfffffd95, 0x6, 0x3ff, 0x3, 0xd2, 0x8831, 0x9, 0x400, 0xcf7, 0x5, 0x5, 0x80, 0x0, 0xe, 0x2, 0x9, 0x2, 0x7, 0x76db, 0x8, 0x20, 0x2, 0x200, 0x9, 0x5b, 0xffffffff, 0x81, 0xa32, 0x8, 0x8, 0x81, 0xfffffff7, 0x81, 0x80000000, 0xfffffffa, 0xfffffe82, 0x9, 0x9, 0xd2d, 0x400, 0xfba, 0x1ff, 0xffffffff], [0x2000, 0x7, 0x6, 0x9, 0x3, 0x7, 0x46, 0x8, 0x7, 0x800, 0xff, 0xfffffffa, 0x197, 0x6, 0x5, 0x7fff, 0x7, 0xfff, 0x1, 0xffffff11, 0x6, 0x4, 0x2, 0x98e3, 0x5, 0x0, 0x200, 0x1, 0x3, 0x9, 0x2, 0x6, 0x3, 0x8, 0x3, 0x0, 0x3856ce38, 0xfffffff8, 0x7fffffff, 0x6, 0x80, 0x4, 0xf6e4, 0x7fffffff, 0x0, 0x400, 0x8000, 0x1, 0x6b8e, 0x1ff, 0x8, 0x4, 0x81, 0x0, 0x2, 0x3, 0x4, 0x80, 0x8, 0x3, 0x9, 0x1000, 0x1, 0x401]}, 0x45c) r4 = bpf$ITER_CREATE(0x21, &(0x7f0000000580)={r2}, 0x8) ioctl$UI_END_FF_UPLOAD(r4, 0x406855c9, &(0x7f00000005c0)={0x6, 0xffffffff, {0x52, 0x2, 0xfff, {0x0, 0xffff}, {0x9, 0x8001}, @rumble={0x101, 0x7}}, {0x57, 0x4, 0xd29, {0xfffa, 0x5}, {0x0, 0x3}, @ramp={0x5, 0xfff, {0x20, 0x8000, 0x71, 0xc4f}}}}) [ 411.523996] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue [ 411.541001] FAULT_INJECTION: forcing a failure. [ 411.541001] name failslab, interval 1, probability 0, space 0, times 0 [ 411.555981] CPU: 1 PID: 23103 Comm: syz-executor.3 Not tainted 4.19.169-syzkaller #0 [ 411.563885] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 411.573237] Call Trace: [ 411.575834] dump_stack+0x1fc/0x2ef [ 411.579487] should_fail.cold+0xa/0xf [ 411.583293] ? setup_fault_attr+0x200/0x200 [ 411.587640] ? lock_acquire+0x170/0x3c0 [ 411.591633] __should_failslab+0x115/0x180 [ 411.595862] should_failslab+0x5/0x10 [ 411.599643] kmem_cache_alloc+0x277/0x370 [ 411.603801] alloc_vfsmnt+0x23/0x780 [ 411.607509] ? _raw_read_unlock+0x29/0x40 [ 411.611637] vfs_kern_mount.part.0+0x27/0x470 [ 411.616118] do_mount+0x113c/0x2f10 [ 411.619727] ? do_raw_spin_unlock+0x171/0x230 [ 411.624215] ? check_preemption_disabled+0x41/0x280 [ 411.629212] ? copy_mount_string+0x40/0x40 [ 411.633425] ? copy_mount_options+0x59/0x380 [ 411.637817] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 411.642820] ? kmem_cache_alloc_trace+0x323/0x380 [ 411.647650] ? copy_mount_options+0x26f/0x380 [ 411.652129] ksys_mount+0xcf/0x130 [ 411.655653] __x64_sys_mount+0xba/0x150 [ 411.659615] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 411.664185] do_syscall_64+0xf9/0x620 [ 411.667969] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 411.673137] RIP: 0033:0x460c6a [ 411.676308] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 ad 89 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 8a 89 fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 411.695200] RSP: 002b:00007fb3ea55ea78 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 411.702891] RAX: ffffffffffffffda RBX: 00007fb3ea55eb10 RCX: 0000000000460c6a [ 411.710142] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007fb3ea55ead0 [ 411.717436] RBP: 00007fb3ea55ead0 R08: 00007fb3ea55eb10 R09: 0000000020000000 16:48:02 executing program 2: creat(&(0x7f0000000280)='./file0\x00', 0x0) close(0xffffffffffffffff) write$binfmt_script(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x1c659, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d90000000f0000000100000000000000000000000020000000200000200000002cc4645f2cc4645f0100ffff53ef0100010000002cc4645f000000000000000001000000000000000b0000008000000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e3338363633343038350000000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000000000000000000000000000000000000d9ca5cac99fd4329af4dde786c1a5d13010040000c000000000000002cc4645f", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) 16:48:02 executing program 4: perf_event_open(&(0x7f0000000440)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000002c0)={0x3, 0x70, 0x5, 0xd7, 0x6, 0x0, 0x0, 0x4, 0x10, 0x8, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x3, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8, 0x4, @perf_config_ext={0x100000000, 0x1}, 0x0, 0x4e, 0x0, 0x1, 0x1, 0x38b8, 0x9}, 0x0, 0xc, 0xffffffffffffffff, 0x9) r0 = getpid() r1 = shmget$private(0x0, 0xb000, 0x0, &(0x7f0000ff5000/0xb000)=nil) r2 = shmat(r1, &(0x7f0000ffd000/0x3000)=nil, 0xd800) shmdt(r2) pivot_root(0x0, 0x0) sendto$inet(0xffffffffffffffff, &(0x7f00003cef9f)='7', 0xfffa, 0x0, &(0x7f0000618000)={0x2, 0x0, @loopback}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000500)=ANY=[@ANYBLOB="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"], &(0x7f0000000000)=0x4) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, 0x0, 0x0) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, &(0x7f0000000100)={0x0, 0x8}, &(0x7f0000000140)=0x8) sched_setscheduler(r0, 0x0, &(0x7f0000000380)) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) setsockopt$inet6_int(r4, 0x29, 0x4, &(0x7f0000000000)=0x1, 0x4) sendto$inet6(r4, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x983a}, 0x1c) ioctl$SNDCTL_DSP_GETFMTS(0xffffffffffffffff, 0x8004500b, &(0x7f0000000040)=0x5) memfd_create(&(0x7f0000000200)='\x00\x83\xc5\xcb\xc7\x108\xa4\x03\x9c0T3\xc5\x97\x95\xb5\x8fM\xddU\x10\xaaod\x96\xeeM\xbe\x0e\xe4\xcc\xc4\xcf,\x9f7\xcc(Z\x13`\x00\x00\x00\x00 \x00\x00\x00\x00\x00\x00c\r\x14\xd8g\x02S -\xfd\xb5a\xedf|\xc4\xf9\xd2J\xadi\xcc[\\P\xa6F\x8c^\xc7i)d\x9f\xfckW\x86\xe4Qg1\xbdD\x1c\x13O\\\x7fS/\xc9d!\x19\"\x16\xfdC\tz\xf1\xf3q\xfd\'.\xb4\x14\x14m_&\x88\x8cfI\x18&\xea5\xa0\x00\xd2\xcd\xf0\xd5\x03\x9f\x18\x8d6\xc9,\xc9Y\xb8\xc9\xdd\xadp3\xbe\x93C\xa3b\x18\xe7\xcdx\x86aA\x9e\x83\aKc\xba\x05\x19\xb1\x9cJ\xce2\x9fW\xd3', 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000008c0)=ANY=[@ANYRES16, @ANYRES32, @ANYRES64=r3], 0x48}}, 0x4000) [ 411.724687] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000020000000 [ 411.731937] R13: 0000000020000100 R14: 0000000020000200 R15: 0000000020013000 16:48:02 executing program 1: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x0) r1 = syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x3, &(0x7f00000002c0)=[{&(0x7f0000000180)="d0ccd53f3e083506bdee7e421dd008cb581c4c7b995b6c84cb6a782077fd9b4564c6c1c18140723b4d946ffe70d76a8c64ed8c63f196c1fc06a3fd23154c0783161dbe5667928f418d1bc22062f7660abd33824a459bbc1aa716865c093656c11c", 0x61, 0x3f}, {&(0x7f0000000200)="7f76f1704e54c57dd9e1417096175be9de4feebb43e308", 0x17, 0x7ff}, {&(0x7f0000000240)="e7adbe8b41bd906b8b9e292a8b11d9af76d1a1bf727f098e84f74d2ec313acff596cd759e865aa63bdb515421a624f02801acba5f29b12eece97d5c39ca09271fe624fa0115fa806a8cb0333e3700a281b317d1ca4a29bda7d6498474597f71b8dd9a9a19daef4272900c591e0a7c5e7a1cc63365d", 0x75, 0x400}], 0x400, &(0x7f0000000340)={[], [{@seclabel='seclabel'}, {@euid_lt={'euid<', 0xee01}}, {@obj_user={'obj_user', 0x3d, '/dev/uinput\x00'}}]}) mmap(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x3000008, 0x4000010, r1, 0x1403c000) lseek(r0, 0x8, 0x1) r2 = dup3(0xffffffffffffffff, r0, 0x0) r3 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x0, 0x0) r4 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$UI_SET_EVBIT(r2, 0x40045564, 0x10) r5 = dup(r4) ioctl$FS_IOC_GET_ENCRYPTION_NONCE(r2, 0x8010661b, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) ioctl$UI_ABS_SETUP(r3, 0x401c5504, &(0x7f00000000c0)={0x0, {0x0, 0x0, 0xffffffff, 0x0, 0x5}}) 16:48:02 executing program 3 (fault-call:1 fault-nth:36): creat(&(0x7f0000000280)='./file0\x00', 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) 16:48:02 executing program 0: creat(&(0x7f0000000280)='./file0\x00', 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) 16:48:02 executing program 5: creat(&(0x7f0000000280)='./file0\x00', 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40048, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d90000000f0000000100000000000000000000000020000000200000200000002cc4645f2cc4645f0100ffff53ef0100010000002cc4645f000000000000000001000000000000000b0000008000000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e3338363633343038350000000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000000000000000000000000000000000000d9ca5cac99fd4329af4dde786c1a5d13010040000c000000000000002cc4645f", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) [ 411.928621] EXT4-fs (loop2): bad geometry: block count 256 exceeds size of device (113 blocks) [ 411.942902] ntfs: (device loop1): parse_options(): Unrecognized mount option seclabel. [ 411.964403] FAULT_INJECTION: forcing a failure. [ 411.964403] name failslab, interval 1, probability 0, space 0, times 0 [ 411.975047] ntfs: (device loop1): parse_options(): Unrecognized mount option euid<00000000000000060929. [ 411.991238] CPU: 1 PID: 23140 Comm: syz-executor.3 Not tainted 4.19.169-syzkaller #0 [ 411.999133] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 412.005507] ntfs: (device loop1): parse_options(): Unrecognized mount option obj_user. [ 412.008509] Call Trace: [ 412.008543] dump_stack+0x1fc/0x2ef [ 412.022807] should_fail.cold+0xa/0xf [ 412.022828] ? setup_fault_attr+0x200/0x200 [ 412.030922] ? lock_acquire+0x170/0x3c0 [ 412.034905] __should_failslab+0x115/0x180 [ 412.039149] should_failslab+0x5/0x10 [ 412.042957] __kmalloc+0x2ab/0x3c0 [ 412.046509] ? prealloc_shrinker+0x15d/0x340 [ 412.050933] prealloc_shrinker+0x15d/0x340 [ 412.055172] sget_userns+0x7b4/0xcd0 [ 412.058873] ? set_bdev_super+0x110/0x110 [ 412.063008] ? ns_test_super+0x50/0x50 [ 412.066883] ? set_bdev_super+0x110/0x110 [ 412.071028] ? ns_test_super+0x50/0x50 [ 412.074902] sget+0x102/0x140 [ 412.078007] mount_bdev+0xf8/0x3b0 [ 412.081533] ? ext4_calculate_overhead+0x11c0/0x11c0 [ 412.086621] mount_fs+0xa3/0x310 [ 412.089987] vfs_kern_mount.part.0+0x68/0x470 [ 412.094471] do_mount+0x113c/0x2f10 [ 412.098085] ? lock_acquire+0x170/0x3c0 [ 412.102046] ? check_preemption_disabled+0x41/0x280 [ 412.107063] ? copy_mount_string+0x40/0x40 [ 412.111295] ? copy_mount_options+0x59/0x380 [ 412.115691] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 412.120706] ? kmem_cache_alloc_trace+0x323/0x380 [ 412.125533] ? copy_mount_options+0x26f/0x380 [ 412.130017] ksys_mount+0xcf/0x130 [ 412.133543] __x64_sys_mount+0xba/0x150 [ 412.137508] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 412.142078] do_syscall_64+0xf9/0x620 [ 412.145866] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 412.151038] RIP: 0033:0x460c6a [ 412.154217] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 ad 89 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 8a 89 fb ff c3 66 0f 1f 84 00 00 00 00 00 16:48:02 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x8000}, 0x0, 0xffffffffffffefff, 0xffffffffffffffff, 0x0) openat(0xffffffffffffffff, 0x0, 0x100, 0x0) r0 = creat(&(0x7f0000000280)='./file0\x00', 0x1) close(r0) ioctl$KVM_SET_REGS(r0, 0x4090ae82, &(0x7f0000000140)={[0x10001, 0x40, 0x8, 0x1, 0x8, 0x10da, 0x0, 0x200, 0x8, 0xffffffff, 0x9, 0x2, 0x0, 0x0, 0x3, 0x58], 0x10000, 0x180202}) setregid(0xee00, 0x0) lstat(&(0x7f0000000840)='./file0\x00', &(0x7f0000000880)={0x0, 0x0, 0x0, 0x0, 0x0}) r2 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r3) r4 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r5) syz_mount_image$f2fs(&(0x7f0000000040)='f2fs\x00', &(0x7f0000000340)='./mnt\x00', 0x2, 0x6, &(0x7f0000000780)=[{&(0x7f0000000380)="0bf4d73ada3747aca62bc3d9349c760c5ff735abb1f13e6abd8c5b5d69100f4b4f147415f7c6bd52813b156f5c9dd7c124742844ec792ea26e1d36b3addc7a5e48e35622b8954e847b04393bf3fcbe9f59fe63c221afccb02090d4e847eb4156889e7a11c074ebe95c301d8154304e9caa549e1a9701b781d68db5e7ca18799c84fc7770c5236d31cb1c2eb1d41657d972294e3c7940cd4447cd57b315fc347fc37e1f75015c48b2d7cf14cbdf0ba71f0e8d4b8a3f76", 0xb6, 0x10000}, {&(0x7f0000000440)="32d7d9097c744efd9392dde15c7ccb50bdf7549fc4acea", 0x17, 0x40}, {&(0x7f0000000480)="42991520ac47d4120883726eb70e69dc0c1c975193ee6383de68ea5bed96033187aef9130d0ed16be25d40e729d42d1e23b2224ed48212662fe529c2d535dce68292cd55879902f261", 0x49, 0x401}, {&(0x7f0000000500)="5c6fecc8842d39a671aab2da6cd54768d01070acffb75516986ef899d23862a69e376c4c6406d21fb96a1efa23003ec6ddb5c24be3516a224e5bfbc02b46c538f242396109505ac20ffc2d2cfd6e672983e8f1b555bced419f6be82020a5f7f3d5e754746764c52895d182539949aaff84baf44424a5a00f861cbb085508ffdccfdd4afca3124069cafc37a6bb3dd40deefb9efcb5dbb3c085ab2c3fdfe4f6d606adc53b6169e38c0f467601b14214dead57bfd28dc8838b5dee3771912f57cf27ef10da685c33c6d3696402604ad1a8af39e07de6b76cd12dab34fad1a6b8fa", 0xe0, 0xe66a}, {&(0x7f0000000640)="79f5a2862c31b1d3beec94032ef7a0a1", 0x10, 0x8001}, {&(0x7f0000000680)="eceecbd81f408503c8aab14baf9933c40168110035b0a1dc5598d8f0cddd94cedfd86af291f564602c8943577dd911a39411adfde2929fba712f5f35fc8967b3894e0ef77eabc50ccf7795daac0739001e5bd296d87f59ca03bf92dc51c8d56ae3f72b0b775319c59a7feddb49f8a0eac3ecdfca62d0c47e1238a3a96346dca311d4c531e46e63a749ac919e57e09dbee78c6f70874c5068f557e828ab09929fb437b140756c7545b87b69f34e7672e9a89334ffbbc01b8c588bb53e2de9d000a0d21050e3100433a610f2d5ee9cf06d221b3302db9e496fa97f585ef43a795620015bb8b3914cbe11037d", 0xeb}], 0x800, &(0x7f0000000900)={[], [{@euid_gt={'euid>', r1}}, {@obj_role={'obj_role', 0x3d, '/()*-^#['}}, {@uid_gt={'uid>', r3}}, {@measure='measure'}, {@fowner_gt={'fowner>', r5}}, {@hash='hash'}, {@appraise='appraise'}, {@rootcontext={'rootcontext', 0x3d, 'sysadm_u'}}]}) setregid(0x0, 0x0) syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f00000000c0)='./mnt\x00', 0x0, 0xd, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000e0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}, {&(0x7f00000106c0)="0bd03b7500000000001000000000000002000000000000000d0000001000000012000000000000000100000002000000ffffffffffffffffffffffffffffffffffffffff01000000000000000000000000000000030000000b00000005000000ffffffffffffffffffffffffffffffffffffffff010000000000000000000000000000008501000006000000010000000100000001000000040000004000000040000000fc0f", 0xa6, 0x200000}, {&(0x7f0000000080)="00000000000000000000000000000000000000000000000000000000d9fa28d501000300000000030000000010", 0x2d, 0x200fe0}, {&(0x7f0000000600)="000000000000000000000000000000000000000000000000000000060000000000010c80", 0x24, 0x2011e0}, {&(0x7f0000010800)="000000000000000000000001", 0xc, 0x201240}, {&(0x7f0000010820)="0000000000000000000000000000000000000000000000000002", 0x1a, 0x3fe}, {&(0x7f0000010840)="0000000000000003", 0x8, 0x2012e0}, {&(0x7f0000010860)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\v', 0x16, 0x201720}, {&(0x7f0000010880)="00000005", 0x4, 0x20137f}, {&(0x7f0000010920)="00000000000000000000000000000000000000000000000000000001000000000bd03b7500000000001000000000000002000000000000000d0000001000000012000000000000000100000002000000ffffffffffffffffffffffffffffffffffffffff01000000000000000000000000000000030000000b00000005000000ffffffffffffffffffffffffffffffffffffffff010000000000000000000000000000008501000006000000010000000100000001000000040000004000000040000000fc0f", 0xc6, 0x204fe0}, {&(0x7f0000010a00)="00000000c789035f7b90664000000000100000000000000001000000d9fa28d5", 0x20, 0x205fe0}, {&(0x7f0000010ca0)="ed410000e8030000e803000002000000001000000000000002", 0x19, 0x1000000}, {&(0x7f0000010d20)="00000000000000000300000003", 0xd, 0x1000fe0}], 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="008b8a0d2165431ffb4626ff51281b73b00bd9d672899c019222207c0ba1f7abb34761"]) socketpair$unix(0x1, 0x1, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) [ 412.173293] RSP: 002b:00007fb3ea55ea78 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 412.180986] RAX: ffffffffffffffda RBX: 00007fb3ea55eb10 RCX: 0000000000460c6a [ 412.188240] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007fb3ea55ead0 [ 412.195494] RBP: 00007fb3ea55ead0 R08: 00007fb3ea55eb10 R09: 0000000020000000 [ 412.202746] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000020000000 [ 412.210001] R13: 0000000020000100 R14: 0000000020000200 R15: 0000000020013000 16:48:02 executing program 0: creat(&(0x7f0000000280)='./file0\x00', 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) [ 412.262690] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue 16:48:02 executing program 3 (fault-call:1 fault-nth:37): creat(&(0x7f0000000280)='./file0\x00', 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) 16:48:02 executing program 2: creat(&(0x7f0000000280)='./file0\x00', 0x0) close(0xffffffffffffffff) write$binfmt_script(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x1c65a, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) 16:48:02 executing program 4: r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000240)='/proc/sys/net/ipv4/vs/sync_qlen_max\x00', 0x2, 0x0) ioctl$ASHMEM_SET_NAME(r0, 0x41007701, &(0x7f0000000280)='\x00') perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x6, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x5, 0xffffffffffffffff, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) prctl$PR_SET_THP_DISABLE(0x29, 0xffffffffffffffff) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x40000, &(0x7f0000000300)="81468ebf76bed5cd37ec828754ef3b06d0073ea6260db597d11fe63a7dee3f7b9ffb7e814c9cd639cc69d0bbdc4ab9327a9f6cc095c26da30f4e2406cd26a078ff144f6b25bae65ed8ee97b8a072dcbba55805da2d955f6c833d66dd252fcede87f077d47f4fc9caa4c999b333ad9e58baae3911b9228056c861b4a46315b803bafa400a7c72eef8460d03deddc580c05a0537c04cb0e2527547e95f04", &(0x7f00000004c0), &(0x7f0000000140), &(0x7f0000000440)="14930bda706606dfff51e2f0c038df29dc9c819622d0c147d95b83e0f42be18793d462be4096e5f7b87a354b942d94d16408efdfffb0394c253237a0845a28e7e29efe324ea69956c3f171c6dc24aaa93f71565370922fff1ef8e1388b2657a834ff747be1b72311e98ea8a933ab4281") open(&(0x7f0000000200)='./bus\x00', 0x400800, 0x40) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00900, 0x1, 0x0, 0x0, 0x10000000002) clone(0x810000, &(0x7f0000000000)="c89fb53a292b4fb13c2434dee1685b7bc6d470d96feb6c63075448413d809478a7604c84ead59018184551ddff5c6f4b49218068ce4dad317580eb6fa9492bab99e358f6e51afc0a42efa5ffc051f59afcfe45cf45c38128e83f18c65a241f10fea52a56ea862509339b067e84df9a2ef13a3dc8587291a23f8634e1ef22e74742545e08e8df7bfcb11c637752d444c3e898", &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000500)="98640b88b8b39d75ad89a9e423301f5d965a987b6972129a6a29709f56dd50011f19ba03b4dbd9cf3e97c4e683c78fbe96c42e68121a7d7d85f2b54b070f24c8d77a3718d3518935efe8313b016be48d22840871012aac7f596a026b9346dcda7e5122a03f30d389e646f359fa688ed568a127c465b4074f84e6f64e0a2e28aa0e2b44a6c295f180e27ba5fb26e99137938668c5c07f338eb4804f4897c966b7243e9befb6d47dbabffb51d188768348b0ca288ea99d2c77f730bd8f4fe69a57095ff2839f946439dcc972b546cb3c7c05e0a6a41e6abaa6454cd2d91ce0aec3df58cb3f14e6082770af9650aa330715a56b") 16:48:02 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x0, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$UI_ABS_SETUP(r3, 0x401c5504, &(0x7f0000000080)={0x4, {0x10001, 0x1, 0x0, 0x2, 0x1000, 0x8}}) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f00000000c0)={0x0, {0x0, 0x0, 0x0, 0x0, 0x5}}) 16:48:02 executing program 5: creat(&(0x7f0000000280)='./file0\x00', 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4004c, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) 16:48:02 executing program 0: creat(&(0x7f0000000280)='./file0\x00', 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) [ 412.472180] FAULT_INJECTION: forcing a failure. [ 412.472180] name failslab, interval 1, probability 0, space 0, times 0 [ 412.490886] EXT4-fs (loop2): bad geometry: block count 256 exceeds size of device (113 blocks) [ 412.510969] CPU: 1 PID: 23173 Comm: syz-executor.3 Not tainted 4.19.169-syzkaller #0 16:48:03 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x0, 0x0) r1 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uinput\x00', 0x802, 0x0) ioctl$UI_DEV_DESTROY(r1, 0x5502) r2 = signalfd(r0, &(0x7f0000000080)={[0x6]}, 0x8) ioctl$UI_SET_EVBIT(r2, 0x40045564, 0xc) ioctl$UI_ABS_SETUP(0xffffffffffffffff, 0x401c5504, &(0x7f0000000180)={0x200, {0xe2, 0x95e, 0x0, 0x2, 0x4, 0x401}}) r3 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r4 = dup(r3) r5 = gettid() process_vm_writev(r5, &(0x7f0000000000)=[{&(0x7f00008f9f09)=""/247, 0xf7}], 0x1, &(0x7f0000121000)=[{&(0x7f0000217f28)=""/231, 0xffffff4e}], 0x23a, 0x0) tkill(0xffffffffffffffff, 0x3c) perf_event_open(&(0x7f0000000100)={0x3, 0x70, 0x1, 0x6, 0x6, 0x5, 0x0, 0x5, 0x3, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0xffffffff, 0x2, @perf_config_ext={0x7f, 0x7}, 0x4002, 0x101, 0x0, 0x2, 0x7ff, 0x3, 0xffff}, r5, 0x3, 0xffffffffffffffff, 0x2) ioctl$UI_SET_FFBIT(r4, 0x4004556b, 0x65) r6 = fanotify_init(0x4, 0x40000) ioctl$BTRFS_IOC_SET_FEATURES(r6, 0x40309439, &(0x7f00000001c0)={0x3, 0x2, 0xc}) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f00000000c0)={0x0, {0x0, 0x0, 0x0, 0x0, 0x5}}) [ 412.518869] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 412.528226] Call Trace: [ 412.530828] dump_stack+0x1fc/0x2ef [ 412.534481] should_fail.cold+0xa/0xf [ 412.538295] ? setup_fault_attr+0x200/0x200 [ 412.542630] ? lock_acquire+0x170/0x3c0 [ 412.546623] __should_failslab+0x115/0x180 [ 412.550882] should_failslab+0x5/0x10 [ 412.554707] kmem_cache_alloc+0x277/0x370 [ 412.558876] getname_kernel+0x4e/0x370 [ 412.562776] kern_path+0x1b/0x40 [ 412.566151] lookup_bdev+0xfc/0x220 [ 412.569778] ? bd_acquire+0x440/0x440 [ 412.573611] blkdev_get_by_path+0x1b/0xd0 [ 412.577770] mount_bdev+0x5b/0x3b0 [ 412.581317] ? ext4_calculate_overhead+0x11c0/0x11c0 [ 412.586428] mount_fs+0xa3/0x310 [ 412.589806] vfs_kern_mount.part.0+0x68/0x470 [ 412.594319] do_mount+0x113c/0x2f10 [ 412.597964] ? lock_acquire+0x170/0x3c0 [ 412.601940] ? check_preemption_disabled+0x41/0x280 [ 412.601957] ? copy_mount_string+0x40/0x40 [ 412.601970] ? copy_mount_options+0x59/0x380 [ 412.601987] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 412.620612] ? kmem_cache_alloc_trace+0x323/0x380 [ 412.625467] ? copy_mount_options+0x26f/0x380 [ 412.629971] ksys_mount+0xcf/0x130 [ 412.633518] __x64_sys_mount+0xba/0x150 [ 412.637503] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 412.642090] do_syscall_64+0xf9/0x620 [ 412.645902] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 412.651098] RIP: 0033:0x460c6a [ 412.654301] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 ad 89 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 8a 89 fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 412.673205] RSP: 002b:00007fb3ea55ea78 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 412.680922] RAX: ffffffffffffffda RBX: 00007fb3ea55eb10 RCX: 0000000000460c6a [ 412.688196] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007fb3ea55ead0 [ 412.695476] RBP: 00007fb3ea55ead0 R08: 00007fb3ea55eb10 R09: 0000000020000000 [ 412.702750] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000020000000 [ 412.710023] R13: 0000000020000100 R14: 0000000020000200 R15: 0000000020013000 16:48:03 executing program 0: creat(&(0x7f0000000280)='./file0\x00', 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) [ 412.726044] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue 16:48:03 executing program 4: getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(0xffffffffffffffff, 0x6, 0x23, &(0x7f0000001140)={&(0x7f0000ffb000/0x4000)=nil, 0x4000}, &(0x7f0000001180)=0x10) r0 = perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket(0x10, 0x803, 0x0) ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x0) ioctl$BTRFS_IOC_INO_LOOKUP_USER(0xffffffffffffffff, 0xd000943e, &(0x7f00000000c0)={0x0, 0x0, "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", "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"}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81e8943c, &(0x7f000005fac0)) r1 = perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x0) lseek(r3, 0x8, 0x1) r4 = dup2(r3, r1) r5 = syz_open_procfs(0x0, &(0x7f0000000100)='net/fib_trie\x00') r6 = dup3(r1, r4, 0x80000) perf_event_open$cgroup(&(0x7f00000010c0)={0x3, 0x70, 0x1, 0x0, 0x81, 0xff, 0x0, 0x5, 0x1000, 0xd, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x4, @perf_config_ext={0x800, 0x3}, 0x200, 0x2, 0x80, 0x4, 0xffffffffffffff9b, 0x1, 0x3f}, r6, 0x10, 0xffffffffffffffff, 0x2) sendfile(r2, r5, 0x0, 0x320f) splice(r1, &(0x7f0000000000)=0xfffffffffffffffe, r2, &(0x7f0000000080), 0x7, 0x4) r7 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x0) lseek(r7, 0x8, 0x1) close(r7) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x320f) 16:48:03 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x0, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f0000000040)={0x0, {0x2, 0x1000, 0x3, 0xfffffffc, 0x5, 0x6}}) 16:48:03 executing program 2: creat(&(0x7f0000000280)='./file0\x00', 0x0) close(0xffffffffffffffff) write$binfmt_script(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x1c65b, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) 16:48:03 executing program 3 (fault-call:1 fault-nth:38): creat(&(0x7f0000000280)='./file0\x00', 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) 16:48:03 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x0, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$BINDER_WRITE_READ(0xffffffffffffffff, 0xc0306201, &(0x7f0000000080)={0x2c, 0x0, &(0x7f0000000040)=[@dead_binder_done, @enter_looper, @increfs_done={0x40106308, 0x3}, @acquire={0x40046305, 0x1}], 0xfa, 0x0, &(0x7f0000000100)="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"}) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r1 = syz_open_dev$audion(&(0x7f00000005c0)='/dev/audio#\x00', 0x1, 0x0) r2 = socket$packet(0x11, 0x3, 0x300) dup2(r2, r1) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f00000000c0)={0xffff, {0x0, 0x4, 0x10, 0xfffffffc, 0x5, 0xffffffff}}) 16:48:03 executing program 5: creat(&(0x7f0000000280)='./file0\x00', 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40056, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) 16:48:03 executing program 0: creat(&(0x7f0000000280)='./file0\x00', 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) [ 412.929864] EXT4-fs (loop2): bad geometry: block count 256 exceeds size of device (113 blocks) 16:48:03 executing program 4: r0 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r1 = dup3(r0, r0, 0x80000) ioctl$UFFDIO_COPY(r1, 0xc028aa03, &(0x7f0000000140)={&(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x1}) setsockopt$bt_BT_DEFER_SETUP(r1, 0x112, 0x7, &(0x7f0000000380), 0x4) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mkdir(&(0x7f00000009c0)='./file1\x00', 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x0) lseek(r2, 0x8, 0x1) setxattr$system_posix_acl(&(0x7f0000000580)='./file1\x00', &(0x7f00000005c0)='system.posix_acl_default\x00', &(0x7f0000000280)=ANY=[@ANYBLOB="02000000010000000000000002000000", @ANYRES32=0x0, @ANYBLOB="02000000", @ANYRES32=0x0, @ANYBLOB="1cff0000001a0000000000003c4770255ae1be6fdc2f3df23a03dd999cc94cb0685483b9588b7742564d6b56afb8fec5f2bfe7522b2dd8e9a567c0d7e8955b4da9b3da14b72bd380866b6b0aac78a66c49fd9c3c91b52750c790ea0c39a5ebfce73ed874a0a6f16e0e2a0eec6c446465fc3617dc1338ad611e4705630ce4bd0b0238216f4d679b9d81060a1462aed84987d90d494ea7bb", @ANYRES32=0x0, @ANYBLOB='\b\x00\x00\x00', @ANYRES32=0x0, @ANYBLOB='\b\x00\x00\x00', @ANYRES32=r2, @ANYBLOB='\b\x00\x00\x00', @ANYRES32=0x0, @ANYBLOB="08000100", @ANYRES32=0x0, @ANYBLOB="100000004bb0000020"], 0x5c, 0x0) mount$overlay(0x40000d, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}], [], 0xf603000000000000}) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000240)='cgroup2\x00', 0x0, 0x0) open(&(0x7f0000000140)='./file1\x00', 0x0, 0x5) ioctl$F2FS_IOC_RELEASE_COMPRESS_BLOCKS(0xffffffffffffffff, 0x8008f512, &(0x7f0000000200)) r3 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, &(0x7f00000004c0)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x0, 0x2d, 0x0, "98d3340600c7aa11897ecaab876eab79576839c5656be8410f2802e944af80373be2666b665770173fbd1883303b6ac4749393ad08f139a68f00"}, 0xd8) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x200007fd, 0x0, 0x0) recvmsg(r3, &(0x7f0000000240)={&(0x7f0000000040)=@nfc, 0x80, &(0x7f0000000180)=[{0x0}], 0x1, 0x0, 0x0, 0xb01001f1}, 0x0) [ 413.021660] FAULT_INJECTION: forcing a failure. [ 413.021660] name failslab, interval 1, probability 0, space 0, times 0 [ 413.051437] CPU: 1 PID: 23227 Comm: syz-executor.3 Not tainted 4.19.169-syzkaller #0 [ 413.057482] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue [ 413.059342] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 413.059348] Call Trace: [ 413.059371] dump_stack+0x1fc/0x2ef [ 413.059388] should_fail.cold+0xa/0xf [ 413.086870] ? setup_fault_attr+0x200/0x200 [ 413.091200] ? lock_acquire+0x170/0x3c0 [ 413.095192] __should_failslab+0x115/0x180 [ 413.099435] should_failslab+0x5/0x10 [ 413.103241] __kmalloc+0x2ab/0x3c0 [ 413.106786] ? prealloc_shrinker+0x15d/0x340 [ 413.111204] prealloc_shrinker+0x15d/0x340 [ 413.115483] sget_userns+0x7b4/0xcd0 [ 413.119204] ? set_bdev_super+0x110/0x110 [ 413.123361] ? ns_test_super+0x50/0x50 [ 413.127257] ? set_bdev_super+0x110/0x110 [ 413.131413] ? ns_test_super+0x50/0x50 [ 413.135307] sget+0x102/0x140 [ 413.138431] mount_bdev+0xf8/0x3b0 [ 413.141979] ? ext4_calculate_overhead+0x11c0/0x11c0 [ 413.147088] mount_fs+0xa3/0x310 [ 413.150464] vfs_kern_mount.part.0+0x68/0x470 [ 413.154969] do_mount+0x113c/0x2f10 [ 413.158607] ? do_raw_spin_unlock+0x171/0x230 [ 413.163110] ? check_preemption_disabled+0x41/0x280 [ 413.168146] ? copy_mount_string+0x40/0x40 [ 413.172392] ? copy_mount_options+0x59/0x380 [ 413.176809] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 413.181832] ? kmem_cache_alloc_trace+0x323/0x380 [ 413.186687] ? copy_mount_options+0x26f/0x380 [ 413.191192] ksys_mount+0xcf/0x130 [ 413.194749] __x64_sys_mount+0xba/0x150 [ 413.198733] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 413.203335] do_syscall_64+0xf9/0x620 [ 413.207161] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 413.212354] RIP: 0033:0x460c6a [ 413.215552] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 ad 89 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 8a 89 fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 413.234453] RSP: 002b:00007fb3ea55ea78 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 413.242165] RAX: ffffffffffffffda RBX: 00007fb3ea55eb10 RCX: 0000000000460c6a [ 413.249439] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007fb3ea55ead0 [ 413.256712] RBP: 00007fb3ea55ead0 R08: 00007fb3ea55eb10 R09: 0000000020000000 [ 413.263983] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000020000000 16:48:03 executing program 2: creat(&(0x7f0000000280)='./file0\x00', 0x0) close(0xffffffffffffffff) write$binfmt_script(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x1c65c, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d90000000f0000000100000000000000000000000020000000200000200000002cc4645f2cc4645f0100ffff53ef0100010000002cc4645f000000000000000001000000000000000b0000008000000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e3338363633343038350000000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000000000000000000000000000000000000d9ca5cac99fd4329af4dde786c1a5d13010040000c000000000000002cc4645f", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) 16:48:03 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x0, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) getsockopt$sock_int(r1, 0x1, 0x10, &(0x7f0000000080), &(0x7f0000000180)=0x4) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f00000000c0)={0x0, {0x0, 0x0, 0x0, 0x0, 0x5}}) r3 = open(&(0x7f0000000040)='./file0\x00', 0x6080, 0x85) ioctl$UI_DEV_SETUP(r3, 0x405c5503, &(0x7f0000000100)={{0x2, 0x100, 0x7, 0x7}, 'syz0\x00', 0x19}) r4 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x0) lseek(r4, 0x8, 0x1) pwrite64(r4, &(0x7f00000001c0)="e0349caa5d39adfd3469f113f3d00cef72a6d32b16bbb2b1257122843b04f4af175b78e10bb86149aa43d1dd811eba2a9b931ddad3940081c056baba9494f0b1df0983d9289d7d6ed39cd13e7cf791ac9a556ea6c17f9692ca52f924545e7a0caae2030c7b39f27bf5ea9d70499aa69795a062b9bf14d570b4e3e6c93b3688bf23f52386aa38f948cec3086704e2567f542f2f3fd125ebed9c0a1d121d14118a7e166599c0609d6fdc792a4aa53daab2dad7ffc4e1acc3bba70ff3d009ffb5e79003bd97e6900c24643ed254dc0a3520cb94e5826f3957a35223fdf78fa4ab9458b23b8717322b829c7b90e425fd85c709a14eb7b1602a", 0xf7, 0x4) [ 413.271252] R13: 0000000020000100 R14: 0000000020000200 R15: 0000000020013000 16:48:03 executing program 0: creat(&(0x7f0000000280)='./file0\x00', 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) 16:48:03 executing program 5: creat(&(0x7f0000000280)='./file0\x00', 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40060, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) 16:48:03 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x0, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) r3 = creat(&(0x7f0000000280)='./file0\x00', 0x1) close(r3) ioctl$UI_DEV_SETUP(r3, 0x405c5503, &(0x7f0000000040)={{0x2, 0x1, 0x3, 0x7}, 'syz1\x00', 0x54}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f00000000c0)={0x0, {0x0, 0x0, 0x0, 0x0, 0x5}}) r4 = creat(&(0x7f0000000280)='./file0\x00', 0x1) close(r4) ioctl$sock_kcm_SIOCKCMCLONE(r4, 0x89e2, &(0x7f00000001c0)={r3}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x2400, 0x4) setxattr$security_capability(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='security.capability\x00', &(0x7f0000000180)=@v1={0x1000000, [{0x3ff, 0x70}]}, 0xc, 0x2) [ 413.440364] EXT4-fs (loop2): bad geometry: block count 256 exceeds size of device (113 blocks) [ 413.453667] overlayfs: fs on './file0' does not support file handles, falling back to index=off,nfs_export=off. 16:48:04 executing program 2: creat(&(0x7f0000000280)='./file0\x00', 0x0) close(0xffffffffffffffff) write$binfmt_script(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x1c67b, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d90000000f0000000100000000000000000000000020000000200000200000002cc4645f2cc4645f0100ffff53ef0100010000002cc4645f000000000000000001000000000000000b0000008000000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e3338363633343038350000000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000000000000000000000000000000000000d9ca5cac99fd4329af4dde786c1a5d13010040000c000000000000002cc4645f", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) 16:48:04 executing program 0: creat(&(0x7f0000000280)='./file0\x00', 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) 16:48:04 executing program 3 (fault-call:1 fault-nth:39): creat(&(0x7f0000000280)='./file0\x00', 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) [ 413.557286] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue [ 413.578075] overlayfs: filesystem on './file0' not supported as upperdir 16:48:04 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x0, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x1000000000000005) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f0000000040)={0x8, {0xfffffffd, 0x3, 0x6, 0x1, 0x10000000, 0x1f}}) [ 413.609942] EXT4-fs (loop2): bad geometry: block count 256 exceeds size of device (113 blocks) 16:48:04 executing program 4: r0 = open(&(0x7f0000000080)='./file0\x00', 0x40c5, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup(r1) syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x1000, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = openat$tun(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/net/tun\x00', 0x0, 0x0) dup(r3) r4 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={0x0}}, 0x0) r5 = socket$inet_udplite(0x2, 0x2, 0x88) r6 = dup(r5) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=ANY=[@ANYBLOB="280000001d000100000000000000000007000000", @ANYRES32=r6, @ANYBLOB="80b586000a0002"], 0x28}}, 0x0) sendmmsg$alg(r4, &(0x7f00000000c0), 0x492492492492627, 0x0) ioctl$GIO_FONT(r0, 0x4b60, &(0x7f0000000100)=""/175) 16:48:04 executing program 5: creat(&(0x7f0000000280)='./file0\x00', 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40068, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d90000000f0000000100000000000000000000000020000000200000200000002cc4645f2cc4645f0100ffff53ef0100010000002cc4645f000000000000000001000000000000000b0000008000000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e3338363633343038350000000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000000000000000000000000000000000000d9ca5cac99fd4329af4dde786c1a5d13010040000c000000000000002cc4645f", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) 16:48:04 executing program 0: creat(&(0x7f0000000280)='./file0\x00', 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) [ 413.720843] FAULT_INJECTION: forcing a failure. [ 413.720843] name failslab, interval 1, probability 0, space 0, times 0 [ 413.767929] CPU: 0 PID: 23284 Comm: syz-executor.3 Not tainted 4.19.169-syzkaller #0 [ 413.775951] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 413.785303] Call Trace: [ 413.787906] dump_stack+0x1fc/0x2ef [ 413.791546] should_fail.cold+0xa/0xf [ 413.795366] ? setup_fault_attr+0x200/0x200 [ 413.799696] ? lock_acquire+0x170/0x3c0 [ 413.803688] __should_failslab+0x115/0x180 [ 413.807936] should_failslab+0x5/0x10 [ 413.811737] __kmalloc+0x2ab/0x3c0 [ 413.815283] ? __list_lru_init+0xd3/0x7f0 [ 413.819551] __list_lru_init+0xd3/0x7f0 [ 413.823530] ? up_read+0xc3/0x110 [ 413.826996] sget_userns+0x810/0xcd0 [ 413.830700] ? set_bdev_super+0x110/0x110 [ 413.834841] ? ns_test_super+0x50/0x50 [ 413.838718] ? set_bdev_super+0x110/0x110 [ 413.842863] ? ns_test_super+0x50/0x50 [ 413.846738] sget+0x102/0x140 [ 413.849832] mount_bdev+0xf8/0x3b0 [ 413.853359] ? ext4_calculate_overhead+0x11c0/0x11c0 [ 413.858470] mount_fs+0xa3/0x310 [ 413.861828] vfs_kern_mount.part.0+0x68/0x470 [ 413.866312] do_mount+0x113c/0x2f10 [ 413.869930] ? rcu_nmi_exit+0xb3/0x180 [ 413.873806] ? copy_mount_string+0x40/0x40 [ 413.878030] ? copy_mount_options+0x1cd/0x380 [ 413.882518] ? copy_mount_options+0x1cd/0x380 [ 413.887011] ? copy_mount_options+0x26f/0x380 [ 413.891497] ksys_mount+0xcf/0x130 [ 413.895046] __x64_sys_mount+0xba/0x150 [ 413.899024] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 413.903612] do_syscall_64+0xf9/0x620 [ 413.907403] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 413.912578] RIP: 0033:0x460c6a [ 413.915758] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 ad 89 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 8a 89 fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 413.934659] RSP: 002b:00007fb3ea55ea78 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 413.942352] RAX: ffffffffffffffda RBX: 00007fb3ea55eb10 RCX: 0000000000460c6a [ 413.949621] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007fb3ea55ead0 [ 413.956874] RBP: 00007fb3ea55ead0 R08: 00007fb3ea55eb10 R09: 0000000020000000 16:48:04 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x0, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f00000000c0)={0x0, {0x0, 0x2, 0x4, 0x0, 0x5}}) 16:48:04 executing program 2: creat(&(0x7f0000000280)='./file0\x00', 0x0) close(0xffffffffffffffff) write$binfmt_script(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x1c67c, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) [ 413.964127] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000020000000 [ 413.971382] R13: 0000000020000100 R14: 0000000020000200 R15: 0000000020013000 16:48:04 executing program 0: creat(&(0x7f0000000280)='./file0\x00', 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000700000100000c000000d90000000f0000000100000000000000000000000020000000200000200000002cc4645f2cc4645f0100ffff53ef0100010000002cc4645f000000000000000001000000000000000b0000008000000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e3338363633343038350000000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000000000000000000000000000000000000d9ca5cac99fd4329af4dde786c1a5d13010040000c000000000000002cc4645f", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) 16:48:04 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x0, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$sock_int(r1, 0x1, 0x21, &(0x7f0000000040)=0x2, 0x4) write$uinput_user_dev(r0, &(0x7f0000000100)={'syz0\x00', {0x401, 0x4, 0x0, 0xe28}, 0x52, [0x5, 0x7ff, 0x2, 0xc4, 0xffff, 0x3, 0x7, 0xfffff464, 0x0, 0x10000000, 0x2a, 0xffff4311, 0x59d0, 0x7, 0x4, 0x2, 0x0, 0x10001, 0x4, 0x1ff, 0xfffff578, 0xff, 0x1f, 0x2, 0x23616de2, 0x7, 0x3, 0x5, 0x1, 0x5, 0x400, 0x97, 0x1, 0x101, 0x2, 0x9, 0x9f8, 0xfffffffb, 0x8, 0x8, 0x9, 0x7, 0x5, 0x100, 0x0, 0x9ef, 0x7, 0x4, 0x8, 0x5, 0x9, 0x40, 0x200000, 0x9, 0x5, 0xfffffff8, 0xff, 0x6, 0x4, 0x5, 0x1, 0xc9, 0x81, 0x9708d87], [0x5, 0x39, 0x458b, 0x9, 0x4, 0x100, 0x1, 0x40, 0x81, 0xfffff061, 0x20, 0x10000, 0x7, 0x6, 0x40, 0x81, 0x800, 0x8, 0x1, 0x9, 0x2, 0x36b19aa6, 0x5, 0x6, 0x800, 0x7, 0xfffffffe, 0x6, 0x7fffffff, 0x3, 0xd0000000, 0x10000, 0x2, 0x8, 0xee91, 0x6b3, 0x9, 0x18, 0x4, 0x7, 0x60000, 0x1, 0x7, 0x3, 0x7b53686b, 0x15, 0xffffffff, 0x8, 0x800, 0xbab, 0x7, 0x1f, 0x3, 0xffff04ad, 0xffff8001, 0x9, 0x0, 0x5, 0x8, 0x5, 0x3f, 0x1000, 0x623], [0x5, 0xfffffff7, 0x1d32, 0x2, 0x1ff, 0xdea, 0x7, 0x1, 0x2, 0x7, 0x7f, 0x4179843d, 0x6, 0xc2, 0x7f, 0x681a, 0x9, 0xfffffffd, 0x1d7, 0x3, 0x0, 0xfffffffe, 0x6, 0x100, 0x101, 0x80, 0x8, 0x10001, 0x401, 0x1, 0x3, 0x7f, 0x12, 0xff, 0x0, 0x20, 0x5a7, 0x8000, 0x1ec, 0x80, 0x9, 0x7, 0xb6, 0x96, 0xffff, 0x81, 0xfffffff8, 0x101, 0x8fe2, 0x8001, 0x0, 0x4, 0x2, 0x6, 0x272, 0x9, 0x0, 0x7, 0xff80, 0x9, 0x4, 0x1, 0xe7e9, 0x6], [0x4, 0x1000, 0x80, 0x200, 0x0, 0x1b, 0x0, 0x1000, 0xf540, 0x7d, 0x6e, 0x0, 0x7ff, 0x2, 0x6, 0x85, 0x7c6, 0x4, 0x800, 0xd827, 0x200, 0x4, 0x99, 0x1ff, 0x1, 0x4, 0x8, 0x2dbb, 0x401, 0x1ff, 0x8, 0x8001, 0x26a4, 0x3ff, 0x0, 0xc9, 0x2, 0x4, 0x1, 0x5, 0x0, 0x9, 0x3, 0x1, 0x4, 0x7, 0x2, 0x3, 0x1000, 0x800, 0x9, 0xbe, 0x200, 0x1, 0x0, 0x9b, 0x2, 0xd1e, 0x1, 0x3, 0x3, 0x5, 0x1, 0xc0]}, 0x45c) r2 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x0) lseek(r2, 0x8, 0x1) fcntl$F_GET_FILE_RW_HINT(r2, 0x40d, &(0x7f0000000080)) r3 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) socket$inet_tcp(0x2, 0x1, 0x0) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f00000000c0)={0x0, {0x0, 0x0, 0x0, 0x0, 0x5}}) 16:48:04 executing program 4: r0 = open(&(0x7f0000000080)='./file0\x00', 0x40c5, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup(r1) syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x1000, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = openat$tun(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/net/tun\x00', 0x0, 0x0) dup(r3) r4 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={0x0}}, 0x0) r5 = socket$inet_udplite(0x2, 0x2, 0x88) r6 = dup(r5) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=ANY=[@ANYBLOB="280000001d000100000000000000000007000000", @ANYRES32=r6, @ANYBLOB="80b586000a0002"], 0x28}}, 0x0) sendmmsg$alg(r4, &(0x7f00000000c0), 0x492492492492627, 0x0) ioctl$GIO_FONT(r0, 0x4b60, &(0x7f0000000100)=""/175) [ 414.028070] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue 16:48:04 executing program 3 (fault-call:1 fault-nth:40): creat(&(0x7f0000000280)='./file0\x00', 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d90000000f0000000100000000000000000000000020000000200000200000002cc4645f2cc4645f0100ffff53ef0100010000002cc4645f000000000000000001000000000000000b0000008000000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e3338363633343038350000000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000000000000000000000000000000000000d9ca5cac99fd4329af4dde786c1a5d13010040000c000000000000002cc4645f", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) 16:48:04 executing program 5: creat(&(0x7f0000000280)='./file0\x00', 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4006c, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) 16:48:04 executing program 0: creat(&(0x7f0000000280)='./file0\x00', 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) [ 414.128861] EXT4-fs (loop2): bad geometry: block count 256 exceeds size of device (113 blocks) [ 414.155604] FAULT_INJECTION: forcing a failure. [ 414.155604] name failslab, interval 1, probability 0, space 0, times 0 [ 414.168050] CPU: 0 PID: 23326 Comm: syz-executor.3 Not tainted 4.19.169-syzkaller #0 [ 414.168108] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 414.168113] Call Trace: [ 414.168133] dump_stack+0x1fc/0x2ef [ 414.168148] should_fail.cold+0xa/0xf [ 414.168162] ? setup_fault_attr+0x200/0x200 [ 414.168176] ? lock_acquire+0x170/0x3c0 [ 414.168197] __should_failslab+0x115/0x180 [ 414.168211] should_failslab+0x5/0x10 [ 414.168221] __kmalloc+0x2ab/0x3c0 [ 414.168232] ? __list_lru_init+0xd3/0x7f0 [ 414.168246] __list_lru_init+0xd3/0x7f0 [ 414.168255] ? up_write+0x18/0x150 [ 414.168269] sget_userns+0x7e2/0xcd0 [ 414.168280] ? set_bdev_super+0x110/0x110 [ 414.168294] ? ns_test_super+0x50/0x50 [ 414.168307] ? set_bdev_super+0x110/0x110 [ 414.168318] ? ns_test_super+0x50/0x50 [ 414.168329] sget+0x102/0x140 [ 414.168343] mount_bdev+0xf8/0x3b0 [ 414.168357] ? ext4_calculate_overhead+0x11c0/0x11c0 [ 414.168369] mount_fs+0xa3/0x310 [ 414.168386] vfs_kern_mount.part.0+0x68/0x470 [ 414.168404] do_mount+0x113c/0x2f10 [ 414.168421] ? lock_acquire+0x170/0x3c0 [ 414.168437] ? check_preemption_disabled+0x41/0x280 [ 414.168451] ? copy_mount_string+0x40/0x40 [ 414.168464] ? copy_mount_options+0x59/0x380 [ 414.168480] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 414.168502] ? kmem_cache_alloc_trace+0x323/0x380 [ 414.168520] ? copy_mount_options+0x26f/0x380 [ 414.301672] ksys_mount+0xcf/0x130 [ 414.305202] __x64_sys_mount+0xba/0x150 [ 414.309192] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 414.313760] do_syscall_64+0xf9/0x620 [ 414.317547] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 414.322722] RIP: 0033:0x460c6a [ 414.325903] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 ad 89 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 8a 89 fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 414.344789] RSP: 002b:00007fb3ea55ea78 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 414.352483] RAX: ffffffffffffffda RBX: 00007fb3ea55eb10 RCX: 0000000000460c6a [ 414.359736] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007fb3ea55ead0 [ 414.366989] RBP: 00007fb3ea55ead0 R08: 00007fb3ea55eb10 R09: 0000000020000000 16:48:04 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x0, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x27e) r3 = dup2(0xffffffffffffffff, r1) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f0000000080)={'wlan0\x00', 0x0}) r5 = syz_genetlink_get_family_id$nl80211(&(0x7f00000001c0)='nl80211\x00') sendmsg$NL80211_CMD_SET_CHANNEL(r3, &(0x7f0000000180)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)=ANY=[@ANYBLOB="30e2d01d497bdeb71efb0a67de8300000000", @ANYRES16=r5, @ANYBLOB="040026bd7000fedbdf254100000008000300", @ANYRES32=r4, @ANYBLOB="0c0099700000000800a00001000080"], 0x30}, 0x1, 0x0, 0x0, 0x40}, 0x40c0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000006c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r6, 0x18000000000002a0, 0xcc0, 0x1200, &(0x7f0000001a80)="b9ff0300600d698cb89e14f088a8", 0x0, 0x100, 0x60000000, 0x0, 0x0, 0x0, 0x0}, 0x40) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000f00)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r7, 0x18000000000002a0, 0xcc0, 0x1200, &(0x7f0000001a80)="b9ff0300600d698cb89e14f088a8", 0x0, 0x100, 0x60000000, 0x0, 0x0, 0x0, 0x0}, 0x40) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f00000000c0)={0x0, {0x0, 0x0, 0x0, 0x0, 0x5}}) [ 414.374243] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000020000000 [ 414.381509] R13: 0000000020000100 R14: 0000000020000200 R15: 0000000020013000 16:48:04 executing program 4: r0 = open(&(0x7f0000000080)='./file0\x00', 0x40c5, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup(r1) syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x1000, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = openat$tun(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/net/tun\x00', 0x0, 0x0) dup(r3) r4 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={0x0}}, 0x0) r5 = socket$inet_udplite(0x2, 0x2, 0x88) r6 = dup(r5) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=ANY=[@ANYBLOB="280000001d000100000000000000000007000000", @ANYRES32=r6, @ANYBLOB="80b586000a0002"], 0x28}}, 0x0) sendmmsg$alg(r4, &(0x7f00000000c0), 0x492492492492627, 0x0) ioctl$GIO_FONT(r0, 0x4b60, &(0x7f0000000100)=""/175) 16:48:04 executing program 2: creat(&(0x7f0000000280)='./file0\x00', 0x0) close(0xffffffffffffffff) write$binfmt_script(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x1c680, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) 16:48:04 executing program 0: creat(&(0x7f0000000280)='./file0\x00', 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) 16:48:04 executing program 3 (fault-call:1 fault-nth:41): creat(&(0x7f0000000280)='./file0\x00', 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) [ 414.495319] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue 16:48:05 executing program 5: creat(&(0x7f0000000280)='./file0\x00', 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40070, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) 16:48:05 executing program 4: r0 = open(&(0x7f0000000080)='./file0\x00', 0x40c5, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup(r1) syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x1000, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = openat$tun(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/net/tun\x00', 0x0, 0x0) dup(r3) r4 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={0x0}}, 0x0) r5 = socket$inet_udplite(0x2, 0x2, 0x88) r6 = dup(r5) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=ANY=[@ANYBLOB="280000001d000100000000000000000007000000", @ANYRES32=r6, @ANYBLOB="80b586000a0002"], 0x28}}, 0x0) sendmmsg$alg(r4, &(0x7f00000000c0), 0x492492492492627, 0x0) ioctl$GIO_FONT(r0, 0x4b60, &(0x7f0000000100)=""/175) [ 414.568893] EXT4-fs (loop2): bad geometry: block count 256 exceeds size of device (113 blocks) [ 414.597120] FAULT_INJECTION: forcing a failure. [ 414.597120] name failslab, interval 1, probability 0, space 0, times 0 [ 414.640638] CPU: 1 PID: 23357 Comm: syz-executor.3 Not tainted 4.19.169-syzkaller #0 [ 414.648547] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 414.657914] Call Trace: [ 414.660515] dump_stack+0x1fc/0x2ef [ 414.664154] should_fail.cold+0xa/0xf [ 414.667965] ? setup_fault_attr+0x200/0x200 [ 414.672292] ? lock_acquire+0x170/0x3c0 [ 414.676262] __should_failslab+0x115/0x180 [ 414.680496] should_failslab+0x5/0x10 [ 414.684291] kmem_cache_alloc_node_trace+0x244/0x3b0 [ 414.689408] __kmalloc_node+0x38/0x70 [ 414.693218] kvmalloc_node+0x61/0xf0 [ 414.696934] __list_lru_init+0x4c6/0x7f0 [ 414.700981] ? up_read+0xc3/0x110 [ 414.704434] sget_userns+0x7e2/0xcd0 [ 414.708135] ? set_bdev_super+0x110/0x110 [ 414.712274] ? ns_test_super+0x50/0x50 [ 414.716153] ? set_bdev_super+0x110/0x110 [ 414.720293] ? ns_test_super+0x50/0x50 [ 414.724187] sget+0x102/0x140 [ 414.727286] mount_bdev+0xf8/0x3b0 [ 414.730815] ? ext4_calculate_overhead+0x11c0/0x11c0 [ 414.735903] mount_fs+0xa3/0x310 [ 414.739272] vfs_kern_mount.part.0+0x68/0x470 [ 414.743757] do_mount+0x113c/0x2f10 [ 414.747371] ? lock_acquire+0x170/0x3c0 [ 414.751330] ? check_preemption_disabled+0x41/0x280 [ 414.756332] ? copy_mount_string+0x40/0x40 [ 414.760550] ? copy_mount_options+0x59/0x380 [ 414.764945] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 414.769946] ? kmem_cache_alloc_trace+0x323/0x380 [ 414.774776] ? copy_mount_options+0x26f/0x380 [ 414.779258] ksys_mount+0xcf/0x130 [ 414.782785] __x64_sys_mount+0xba/0x150 [ 414.786743] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 414.791311] do_syscall_64+0xf9/0x620 [ 414.795115] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 414.800286] RIP: 0033:0x460c6a [ 414.803467] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 ad 89 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 8a 89 fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 414.822353] RSP: 002b:00007fb3ea55ea78 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 414.830058] RAX: ffffffffffffffda RBX: 00007fb3ea55eb10 RCX: 0000000000460c6a 16:48:05 executing program 0: creat(&(0x7f0000000280)='./file0\x00', 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) [ 414.837325] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007fb3ea55ead0 [ 414.844617] RBP: 00007fb3ea55ead0 R08: 00007fb3ea55eb10 R09: 0000000020000000 [ 414.852011] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000020000000 [ 414.859281] R13: 0000000020000100 R14: 0000000020000200 R15: 0000000020013000 16:48:05 executing program 3 (fault-call:1 fault-nth:42): creat(&(0x7f0000000280)='./file0\x00', 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) 16:48:05 executing program 2: creat(&(0x7f0000000280)='./file0\x00', 0x0) close(0xffffffffffffffff) write$binfmt_script(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x1c6c0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d90000000f0000000100000000000000000000000020000000200000200000002cc4645f2cc4645f0100ffff53ef0100010000002cc4645f000000000000000001000000000000000b0000008000000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e3338363633343038350000000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000000000000000000000000000000000000d9ca5cac99fd4329af4dde786c1a5d13010040000c000000000000002cc4645f", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) [ 414.925063] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue 16:48:05 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x0, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = socket$inet_icmp(0x2, 0x2, 0x1) setsockopt$IP_VS_SO_SET_STOPDAEMON(r2, 0x0, 0x48c, &(0x7f0000002f80)={0xdf4c989fae56b0b7, 'veth0_to_bridge\x00', 0x4}, 0x18) r3 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x0) lseek(r3, 0x8, 0x1) write$binfmt_elf64(r3, &(0x7f0000002fc0)=ANY=[@ANYBLOB="7f454c463f3f0809008000000000000003000600140000003e0200000000000040000000000000009d0200000000000032ee000004043800010040000100400004000000050000000800000000000000e10000000000000009000000000000000800000000000000010000000000000009000000000000003011e7304460786a55f75df69a838fa9ca8d5de690288594d4ca71ebf02d72bfa27886cbe097724d773e78b669cac2c3321a45e93eb3fbf8897c67260491df4409742960133a419c6aaf0294cc16b7eedb48da0095371812fef844c57b8ee744be3e77cce533a332a9444ef692726516b9f788ddccbeab3cb840b14142a502b39bc6fbad9954f14884faa8a37f2a923b0277504a4d93b54037fc03385b3bb465f7a05bcebdc86c38c885eb9bcfa6766d5c00a75097be69acd6c5832d285e4f00a39b782d1903aaad69792ab9ada2551d1931fbe43b83abfab205b328c681886d4072a137f50715087b59cc0c18efe61e7c275f4446c0ef2eee22bd3425d6b8d9430b1d0e415842ab9413677312ad6af1c697805a00421ffd56abb30925be751068b479f57721182f8eff366d11164d66a37bd1e2644c8aeb7689437e36ff1bc2998296d8da36de64d39029241bf1a2b38fca9f40a3b99d1732e9c0179aa73557b74c1fb8af01147b2860a15f71f27ad5ad8024ab7ea7d2ec544285ca575c61d5f2b101d58b118ecfe9f77ae26711ee68bcecd89ced0698bf5fc3a5ba5d82d33e8f037de4cd4f4cdd3bcc74456682ba343044133a858873ee6684b17dbac1ab20b27c78d3b98bb64a338e2889117196eb2a842472a90318cec0097c0dd6e2c57f14b812bcc5a2767adaa2f96be7ddd69f487dce1073704b030848302e11911bdba31b8949eb2eee44114cbdf650af511eef47816579c2816589e994566ed62e736d8db54eadb32bd5b681a1deaaf97c5df1a5c98d6a89e8f64005ed56b13ceafa165e3fe9642700f9f758e3a7aa53e29c1f195a39cf6b4089ca3ea94f76dac9d3c577fbe4a11c24f30e8fdf5b9b295100e41432b0e03595e9459a4b928de3b11c4e344b0543f0f4492bccf9ee941a2094f0389a40898609184b511e7f744655f8dce54cecd62fa2026f615872d11471ae866903131be5624ad67f91efd44dc77872a711f96e28bb1d32b57b43f020d765173a59459164c86e8ae4d06b2e142432b12632bec69b4b9cc969adfb37691dc7f665035f4f7ae3ae77ddda55a79c43cd3fa34b8bd8e0a91389f3e400d587fe77db4a6b200854dbc50a9479e5549fb0f5ba67749a682470ebdfb3a242f8c3f348a56872f0d158addddb69a9685f3266bcd092dcbf957f92644f0d120545985b662175a285aa5356ef1bb48c087d622c26a83c289b911217d49d31b1bbfce0cb8f6a4526c0197a9fc2990419103ab9b45e09a9d1f86523e87c085da8db4a55982017b051cddb6bd26f4b30eeb0dcb9168711757767ebdca875763a7016fae5c27c26f0a57446d5eb3079f21a076c28faa621b31430608bab78df03e24e2275f997538fa040151060b780d29f51f6ca161910e4562034b26605c7377c1d7ce11e8ac31fc45e5bab606f1a06229408fb3592240a7e0ba7adcb744ad0af9b581e7aec2340d762d0731153ded0144cce10983a709fc280a7b0f3541e25acbe9f0e53321e8b57eb8bdb79ded91e9e81f331f45bc17924bd430801b724379247d3877fd5d5914636d1af399ea35030e0839aad803c23966174fe82abbf8eb49998683bd8abddb8cf811c6d29a2a15d1377a1be318820912b53381c20937fae5296d0fb41a143fe956e2b5e7eec7433baeea629d5d3b99993d661b3d7097bd852c6d2c3b616f583d14cfcd370c0e0e0b7f0b51b51c4ec1439e9bf5cbe61c80cc9685465cb8b141b6b07513d2d5601e8aa19a625f70a6de7946b71a9449c967f958a41dd59a615ecbfe5e602b05a996b6038800485843b7ed21659c76b779a4e6761ca0cb8e1f51fefb92e16ce8865b612e62f9e0bdcf78d9fdb421b234c4cf9d06900c5137d60bf9ae6bfeb4d99af8a752d29f3239e4da07c1e3d02ac9da0b9ea1ebc9aa257f9e242853a6d041773b275f54a655a2a7c2d8a04105284297c30d9f40c8e918111ab95d85048edcbc8e2905ea2fdb5be007d69c43b84e2c40ac5cdfe5754617380e38573f8a18f1065d85c2f7139a5aa017665513ebe3b3e82f3c51f3eb33bdb1952f4f9f7d7565db3cf2e41e28750bf9357b0f7f438fb0c52f3f88c8ee7cd0cc1cce0c954052eb9888926440817fed0a4255624bcb047d728fa4ece01232d54b34831e90391c0f5ed645a005cb0288995c5c979fc6d1326d101563de1f67abff55279b7d9d6ee5c1c0e943c4cfb85abfbfd8b18b4d437829c95179d91a77d0ebe45b015d4d96fb2ec8d0fe0c9b846e61db2b664fcd8fc31efd0bf27942fba5a1b6b1d5d3dc8c5cb62ff15957e2bbeacd50489ef50aeb7d4c60f0a946f37899a02dffdfe166430553ec8ffea8c46ff3043925345cba466127887829eb1d51b4016eb08443e1a5e01628cb9fef3b215da983d278d74b0c6c6a3adabe4af470f36f03747148bdd628c6e627760ccbef05f717ac6f27ba297e4124c67977dbb322d7762d9cd651eda9d6a666a994abf6fee9eec2019e57498ae68da1ff64049b842ce3a9381833b9cbb0ae3e8f4f7d7f6e6ed461f939ddb9b3ccd402b2dc412c71d0d6612c54c6d2ef40789f10c5833bb67d32f3b38149738b668e677e9a118869ac76604dc55e12b396a47aebec288b2eaf552b022bf19750632811751bd235f5bd2dd989c66ad33959d50093f2b19b3f6d9ed817724a93f5f1ac960dfa2370cb4ccc5bdb8061f361d8bd8f53a327b138028a1ba3f1939b07d4f0e31ffb0a0c460f0dd781231193d169dedb4ab92d47368e192094646eab7ffbb4caa7599950a0fbcdbc361fb78c73a7919a3f64909718c647a3b58661007debc475783ee5e40010a0652163b696e5fc7a2aa0994327a32aae027145248e2e5633865c2eeab33f0d1235f19ba7585fd86c40a9130e6f4b9b9338bd240be791fafd00227a833b20f38e240166af4394e0bfc810eb414d15a75be5e07fd487981e7ff1580f326407c34b4f8903d4351c03f8f2b7f00a0e82abf1d8bc18d9db85434b915b0e1efdd6533273cb4b37f0e636a8d827402e5acf5209b56940a79d30496f38dea36a6d9a94852a55b4d12055c6eae06adda28e207b158dd718c3ea1d3b2a27687e1af89d2c6d9b78e1988eb9d0b5eeefbb8f686e112a64175eb2d4a2de75c1449db4c2e8ed3fef0470e0cb619fed0e129a05742df1346ca1310b24d8e4984ad132dd2a4736b617852bc976545a7bc31e3caed8e84935e4c1ebaa27ce7e649415bdeb073901eb325652eb04945721c3758740486cc2ef9b1d4c9813c29ab32a8bad83f1ce4f1004717b0a24ae7812631cfe698922489ffd5bcb901d94b9b7293fec9e74249bd4e8cc325d8e5e3e85299603f6314de6854cdde05d6f1b99b5e856bc9b8e3b665539f0efc2958c3381dad0d87d7d6caac53bada8f4ebcdca396ba4787c903ba5b3261a302396dda8e88ffe61ef10dadd8848abaf386c96e42e598a8c561c2a96eb6353353b8770c1b6161fb76a78e8e1d1f22b0ab1e185159beaa43a8221ec3e87ef09b40628f43077c557514f04e6bd0e35fb08460ac0b0ea5d0fed03247d0d9673fbee08e4153cc1525a1928b6d15b453d9bce2848e4e7f610b707e37f8b919d59bf5d32f5218542328fa6c50e6af04911c91d0ee7e1343a7f15aac4c90bbb5434e28f2c449cb805f2d59ae27b780072fd8aa1f2d26999d2adb1511252861a0ed467b28314419ed2ae463de0b08bd491b4d14880c7353e602c86d88538ad4787da5f0b651bd729ceaf026dfcd764907943b4455413ae70fadec6925cec89dc7d924a46f5b58237879ba395eec7bbb55daa308f30c5e6e4161d014c8fd444608fd6e659849ae8c81c6f977c2d00b0dabc531124228eefacea6622baef6b6f2f9aaa197b291cb0d71f5153f4d22f62359db0bdbd2e73c388b5a21b0c327f5aada7fea0c8bac42b4bc6682428b0ed31b837bddc7a09018131aa6ccb3ba1b770a201341d474d80b706025a3815cac8226a075eae4d0205ee0ec52136f09780700aed473453227315e268a72046a5f9a1f0539f16156c568bd37e2d87f16468cfc27c361bc740dbcaa2dfb77fad0b3a21047ea2fa25ad8a4d437a04f4a928e554d2f6553a6898c924081dfb39c37098fb47fab2660c9f56ea2639d3108d681175dcb2ec50a2aeed45e700e82a82327a814393a6d236d579ea2e1c7057d5f37d25fa3a774044857213dd6962eae199feffee16783d92f512c65f1d4650874ec28cf45c9733f9a1afeb8a621613cbbfdb292958f65e81e7b948569a456b9418790d1b1e2dbf1fac3f4e91010e5dba449f063edc01792d2ec6eeb23739bb6954486df36e4dc15d8342b973891a1425b49aa942943c3edf28d29642e0b684ca37b6f6aa491112a475f63665c41c8285f57e4d7e30d85f7a6df333f04f7884236b22f738645f8d1ef981835d35c836a0a835b414f007f4341025c3b0c386cf631c96cbce5e2e002d1acf1f8f8609bbc9b783e5adf4cf7239508a0d6e7723a60e9c8c444f7cdd4182413c1ef0190f6e02f8d021f8da4d8e538518771894c2493ce4c8848017fb69554b2708bccc52ae38968f41b7bf0bbfc10bcaa083f9f03b602a473687b8757392aecc4c94fe2fa45d5ea353063800dc980d4010e66938b860b839b796bba34d544779f0dff23deb5a6bd42e5ac55eacffe5832364ae124aed9e88ff9615b25b0db8078efb21dea5d86a15132a567f71f3ec62ff93e9abd5038113ba33fcada757ebe9a9a59444bb66e9a9ec946b06de4118398efc07ef28b505501be56ce1910a3e893f0a6863a14510acdb2ef630c986108ab33db9f103e86818d7c5591d5f41b4c73bc60b0b9c8a2b4ef0d32cfc7b123308ddd4b0bcfa434a279ec2f5392294bc666c7605977a5bf84e7ca7ee82f2ade8cd0f8d1da0f0d26bc8a2ae2ee604df3f4fbb46d0147f447715cd0333021106ef986a82c1c10bc72dfb52480ce974589a3fc2ce7f33b3bbf9159f313a2e8202f998f276680ead0c7ed48005f288b38b75532721de83cafaeb397d4b3d8dea22ce31980d404a13dec781de68d205a33261f9508cc78903e4dc8e67160e434540208e56ac318255f49af7096fb18a791393c7fd51b9fd7784eeba4d133a5b3f8f11344043fb0fe8d3dfe6c50ab21a167a8066da9ffa55a96d441b9ef7e6e60ecfd11d4b763423dcf58d8ea0397cc79e5cd8c9fe4c47ce26b873016b6bf197ec88244b1a1c8c9fc5d44131e949f44fa0e118696e91f13342ffb18795cf9b44a38087e056bbee99cae57eef76d0f76ba1ec2f6c1a35555451a9082fdd92b6232a2504f2f08edd9f778bdb32d42b31333f3bd60f27f08c7d8ac35b039957177f22c4d2979e39f2238b34b0153250384d650c0e7bb0c34f18890b85d61195ec90cd5a4370ec3893fc7bcbf417c0afc36fc99546a6e32549d6ee646fee82ba6e19399d6481d6aefd128d5a8d02f92e3c13062f9b81d5f41c6d1344cbe5efb497fe0d31709e127663b4be569a726e3fbe965108b677af86f902043281d65a44b80e418a696f0a0bfda3cb78a2453337f643a1a4aa41f3c6d750187d44ea0c370a90a8f6b8eebb7abfc86dd7f81cc1b7dc3d456819a8ffd861cdf0be6147f6bf8e3da64440c280c92a9765768129e8484fdd7d02b13c4ee219c6eacf1f8fdedb825a0e7d11b0e1b276e2a9d436593cb9c1dfe536b00574eefc30c90b8a7a2992cadc15f117ac456234a3e3d8bd86b0c4eae9c68e804a13df2b4f0d93d17c712a9ea4e5539ef12999904ea5a6bc86a87d5e8f3efc4058501b78500000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ee1926d11bfbb2d4be6ce9c8d992a065d459b505e6aa4b4160a30c89d5dd00000000000000"], 0x1876) pipe2(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}, 0x84c00) ioctl$LOOP_SET_FD(r4, 0x4c00, r0) dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f00000000c0)={0x0, {0x0, 0x0, 0x0, 0x0, 0x5}}) 16:48:05 executing program 4: open(&(0x7f0000000080)='./file0\x00', 0x40c5, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup(r0) syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x1000, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$tun(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/net/tun\x00', 0x0, 0x0) dup(r2) r3 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={0x0}}, 0x0) r4 = socket$inet_udplite(0x2, 0x2, 0x88) r5 = dup(r4) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=ANY=[@ANYBLOB="280000001d000100000000000000000007000000", @ANYRES32=r5, @ANYBLOB="80b586000a0002"], 0x28}}, 0x0) sendmmsg$alg(r3, &(0x7f00000000c0), 0x492492492492627, 0x0) 16:48:05 executing program 5: creat(&(0x7f0000000280)='./file0\x00', 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40074, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) [ 415.033809] FAULT_INJECTION: forcing a failure. [ 415.033809] name failslab, interval 1, probability 0, space 0, times 0 16:48:05 executing program 0: creat(&(0x7f0000000280)='./file0\x00', 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) 16:48:05 executing program 4: open(&(0x7f0000000080)='./file0\x00', 0x40c5, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup(r0) syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x1000, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$tun(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/net/tun\x00', 0x0, 0x0) dup(r2) r3 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={0x0}}, 0x0) r4 = socket$inet_udplite(0x2, 0x2, 0x88) dup(r4) sendmmsg$alg(r3, &(0x7f00000000c0), 0x492492492492627, 0x0) [ 415.081722] EXT4-fs (loop2): bad geometry: block count 256 exceeds size of device (113 blocks) [ 415.107042] CPU: 1 PID: 23380 Comm: syz-executor.3 Not tainted 4.19.169-syzkaller #0 [ 415.114945] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 415.124302] Call Trace: [ 415.126900] dump_stack+0x1fc/0x2ef [ 415.130539] should_fail.cold+0xa/0xf [ 415.134348] ? setup_fault_attr+0x200/0x200 [ 415.138676] ? lock_acquire+0x170/0x3c0 [ 415.142665] __should_failslab+0x115/0x180 [ 415.146910] should_failslab+0x5/0x10 [ 415.150710] kmem_cache_alloc_node_trace+0x244/0x3b0 [ 415.155806] __kmalloc_node+0x38/0x70 [ 415.159596] kvmalloc_node+0x61/0xf0 [ 415.163298] __list_lru_init+0x4c6/0x7f0 [ 415.167347] ? up_read+0xc3/0x110 [ 415.170815] sget_userns+0x810/0xcd0 [ 415.174515] ? set_bdev_super+0x110/0x110 [ 415.178652] ? ns_test_super+0x50/0x50 [ 415.182527] ? set_bdev_super+0x110/0x110 [ 415.186660] ? ns_test_super+0x50/0x50 [ 415.190545] sget+0x102/0x140 [ 415.193642] mount_bdev+0xf8/0x3b0 [ 415.197188] ? ext4_calculate_overhead+0x11c0/0x11c0 [ 415.202285] mount_fs+0xa3/0x310 [ 415.205684] vfs_kern_mount.part.0+0x68/0x470 [ 415.210192] do_mount+0x113c/0x2f10 [ 415.213813] ? lock_acquire+0x170/0x3c0 [ 415.217800] ? check_preemption_disabled+0x41/0x280 [ 415.222803] ? copy_mount_string+0x40/0x40 [ 415.227023] ? copy_mount_options+0x59/0x380 [ 415.231422] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 415.236425] ? kmem_cache_alloc_trace+0x323/0x380 [ 415.241557] ? copy_mount_options+0x26f/0x380 [ 415.246045] ksys_mount+0xcf/0x130 [ 415.249584] __x64_sys_mount+0xba/0x150 [ 415.253546] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 415.258115] do_syscall_64+0xf9/0x620 [ 415.261905] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 415.267079] RIP: 0033:0x460c6a [ 415.270271] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 ad 89 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 8a 89 fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 415.289261] RSP: 002b:00007fb3ea55ea78 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 415.296953] RAX: ffffffffffffffda RBX: 00007fb3ea55eb10 RCX: 0000000000460c6a [ 415.304207] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007fb3ea55ead0 [ 415.311460] RBP: 00007fb3ea55ead0 R08: 00007fb3ea55eb10 R09: 0000000020000000 [ 415.318714] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000020000000 [ 415.325968] R13: 0000000020000100 R14: 0000000020000200 R15: 0000000020013000 16:48:05 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x0, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0xdb) r3 = socket$bt_bnep(0x1f, 0x3, 0x4) dup(r3) r4 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x0) lseek(r4, 0x8, 0x1) ioctl$EXT4_IOC_GROUP_ADD(r4, 0x40286608, &(0x7f0000000080)={0x4, 0x5, 0x94, 0x3ff, 0x100, 0x4}) ioctl$UI_DEV_CREATE(r0, 0x5501) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f00000000c0)={0x0, {0x0, 0x0, 0x0, 0x0, 0x5}}) r5 = openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000040)='/sys/kernel/debug/binder/failed_transaction_log\x00', 0x0, 0x0) ioctl$UI_DEV_DESTROY(r5, 0x5502) 16:48:05 executing program 3 (fault-call:1 fault-nth:43): creat(&(0x7f0000000280)='./file0\x00', 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) 16:48:05 executing program 0: creat(&(0x7f0000000280)='./file0\x00', 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) 16:48:05 executing program 4: open(&(0x7f0000000080)='./file0\x00', 0x40c5, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup(r0) syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x1000, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$tun(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/net/tun\x00', 0x0, 0x0) dup(r2) r3 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={0x0}}, 0x0) r4 = socket$inet_udplite(0x2, 0x2, 0x88) dup(r4) sendmmsg$alg(r3, &(0x7f00000000c0), 0x492492492492627, 0x0) [ 415.407518] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue 16:48:05 executing program 2: creat(&(0x7f0000000280)='./file0\x00', 0x0) close(0xffffffffffffffff) write$binfmt_script(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x20000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) 16:48:05 executing program 4: open(&(0x7f0000000080)='./file0\x00', 0x40c5, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup(r0) syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x1000, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$tun(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/net/tun\x00', 0x0, 0x0) dup(r2) r3 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={0x0}}, 0x0) r4 = socket$inet_udplite(0x2, 0x2, 0x88) dup(r4) sendmmsg$alg(r3, &(0x7f00000000c0), 0x492492492492627, 0x0) 16:48:06 executing program 0: creat(&(0x7f0000000280)='./file0\x00', 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) [ 415.516350] FAULT_INJECTION: forcing a failure. [ 415.516350] name failslab, interval 1, probability 0, space 0, times 0 16:48:06 executing program 5: creat(&(0x7f0000000280)='./file0\x00', 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40076, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d90000000f0000000100000000000000000000000020000000200000200000002cc4645f2cc4645f0100ffff53ef0100010000002cc4645f000000000000000001000000000000000b0000008000000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e3338363633343038350000000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000000000000000000000000000000000000d9ca5cac99fd4329af4dde786c1a5d13010040000c000000000000002cc4645f", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) 16:48:06 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x7) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='attr/exec\x00') ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f00000000c0)={0x0, {0x0, 0x0, 0x0, 0x0, 0x5}}) [ 415.559225] CPU: 1 PID: 23413 Comm: syz-executor.3 Not tainted 4.19.169-syzkaller #0 [ 415.567135] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 415.576500] Call Trace: [ 415.579102] dump_stack+0x1fc/0x2ef [ 415.582741] should_fail.cold+0xa/0xf [ 415.586555] ? setup_fault_attr+0x200/0x200 [ 415.590996] ? lock_acquire+0x170/0x3c0 [ 415.594989] __should_failslab+0x115/0x180 [ 415.599237] should_failslab+0x5/0x10 [ 415.603046] kmem_cache_alloc_node_trace+0x244/0x3b0 16:48:06 executing program 0: creat(&(0x7f0000000280)='./file0\x00', 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) [ 415.608158] __kmalloc_node+0x38/0x70 [ 415.611967] kvmalloc_node+0x61/0xf0 [ 415.615731] __list_lru_init+0x4c6/0x7f0 [ 415.619800] ? up_read+0xc3/0x110 [ 415.623271] sget_userns+0x7e2/0xcd0 [ 415.626984] ? set_bdev_super+0x110/0x110 [ 415.627004] ? ns_test_super+0x50/0x50 [ 415.627020] ? set_bdev_super+0x110/0x110 [ 415.627033] ? ns_test_super+0x50/0x50 [ 415.627051] sget+0x102/0x140 [ 415.638868] EXT4-fs (loop2): bad geometry: block count 256 exceeds size of device (128 blocks) [ 415.639225] mount_bdev+0xf8/0x3b0 16:48:06 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x0, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f0000000080)={0x0, {0xffffffff, 0x0, 0x0, 0x0, 0x5}}) 16:48:06 executing program 4: open(&(0x7f0000000080)='./file0\x00', 0x40c5, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup(r0) syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x1000, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$tun(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/net/tun\x00', 0x0, 0x0) dup(r2) r3 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={0x0}}, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=ANY=[@ANYBLOB="280000001d000100000000000000000007000000", @ANYRES32, @ANYBLOB="80b586000a0002"], 0x28}}, 0x0) sendmmsg$alg(r3, &(0x7f00000000c0), 0x492492492492627, 0x0) [ 415.639242] ? ext4_calculate_overhead+0x11c0/0x11c0 [ 415.639257] mount_fs+0xa3/0x310 [ 415.639287] vfs_kern_mount.part.0+0x68/0x470 [ 415.671508] do_mount+0x113c/0x2f10 [ 415.675147] ? do_raw_spin_unlock+0x171/0x230 [ 415.679652] ? check_preemption_disabled+0x41/0x280 [ 415.684683] ? copy_mount_string+0x40/0x40 [ 415.684694] ? copy_mount_options+0x59/0x380 [ 415.684712] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 415.698365] ? kmem_cache_alloc_trace+0x323/0x380 [ 415.703216] ? copy_mount_options+0x26f/0x380 [ 415.707723] ksys_mount+0xcf/0x130 [ 415.711261] __x64_sys_mount+0xba/0x150 [ 415.715224] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 415.719790] do_syscall_64+0xf9/0x620 [ 415.723581] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 415.728757] RIP: 0033:0x460c6a [ 415.731970] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 ad 89 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 8a 89 fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 415.750856] RSP: 002b:00007fb3ea55ea78 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 415.758592] RAX: ffffffffffffffda RBX: 00007fb3ea55eb10 RCX: 0000000000460c6a [ 415.765856] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007fb3ea55ead0 [ 415.773114] RBP: 00007fb3ea55ead0 R08: 00007fb3ea55eb10 R09: 0000000020000000 [ 415.780375] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000020000000 [ 415.787640] R13: 0000000020000100 R14: 0000000020000200 R15: 0000000020013000 16:48:06 executing program 2: creat(&(0x7f0000000280)='./file0\x00', 0x0) close(0xffffffffffffffff) write$binfmt_script(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x24c00, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) 16:48:06 executing program 3 (fault-call:1 fault-nth:44): creat(&(0x7f0000000280)='./file0\x00', 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) 16:48:06 executing program 0: creat(&(0x7f0000000280)='./file0\x00', 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) 16:48:06 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x0, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000200)='nl80211\x00') ioctl$sock_SIOCGIFINDEX_80211(r3, 0x8933, &(0x7f0000000700)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_SET_INTERFACE(r3, &(0x7f0000000340)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000240)={0x24, r4, 0x5, 0x0, 0x0, {{}, {@val={0x8, 0x3, r5}, @void}}, [@NL80211_ATTR_IFTYPE={0x8, 0x5, 0x3}]}, 0x24}}, 0x0) ioctl$sock_SIOCGIFINDEX_80211(r1, 0x8933, &(0x7f0000000080)={'wlan0\x00', 0x0}) sendmsg$NL80211_CMD_TDLS_CANCEL_CHANNEL_SWITCH(r2, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000180)={&(0x7f0000000100)={0x70, r4, 0x20, 0x70bd28, 0x25dfdbfb, {{}, {@val={0x8, 0x3, r6}, @val={0xc, 0x99, {0xb5a, 0xe}}}}, [@NL80211_ATTR_MAC={0xa}, @NL80211_ATTR_MAC={0xa, 0x6, @broadcast}, @NL80211_ATTR_MAC={0xa, 0x6, @broadcast}, @NL80211_ATTR_MAC={0xa}, @NL80211_ATTR_MAC={0xa}, @NL80211_ATTR_MAC={0xa, 0x6, @broadcast}]}, 0x70}, 0x1, 0x0, 0x0, 0x814}, 0x20002000) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f00000000c0)={0x0, {0x0, 0x0, 0x0, 0x0, 0x5}}) [ 415.917940] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue [ 415.940916] FAULT_INJECTION: forcing a failure. [ 415.940916] name failslab, interval 1, probability 0, space 0, times 0 [ 415.959422] EXT4-fs (loop2): bad geometry: block count 256 exceeds size of device (147 blocks) 16:48:06 executing program 4: open(&(0x7f0000000080)='./file0\x00', 0x40c5, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup(r0) syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x1000, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$tun(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/net/tun\x00', 0x0, 0x0) dup(r2) r3 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={0x0}}, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=ANY=[@ANYBLOB="280000001d000100000000000000000007000000", @ANYRES32, @ANYBLOB="80b586000a0002"], 0x28}}, 0x0) sendmmsg$alg(r3, &(0x7f00000000c0), 0x492492492492627, 0x0) [ 415.981103] CPU: 0 PID: 23455 Comm: syz-executor.3 Not tainted 4.19.169-syzkaller #0 [ 415.989005] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 415.998357] Call Trace: [ 416.000952] dump_stack+0x1fc/0x2ef [ 416.004587] should_fail.cold+0xa/0xf [ 416.004604] ? setup_fault_attr+0x200/0x200 [ 416.004619] ? lock_acquire+0x170/0x3c0 [ 416.004643] __should_failslab+0x115/0x180 [ 416.020922] should_failslab+0x5/0x10 [ 416.020937] kmem_cache_alloc_node_trace+0x244/0x3b0 [ 416.020952] __kmalloc_node+0x38/0x70 [ 416.020969] kvmalloc_node+0x61/0xf0 [ 416.037331] __list_lru_init+0x4c6/0x7f0 [ 416.041402] ? up_read+0xc3/0x110 [ 416.044865] sget_userns+0x810/0xcd0 [ 416.048583] ? set_bdev_super+0x110/0x110 [ 416.052728] ? ns_test_super+0x50/0x50 [ 416.056608] ? set_bdev_super+0x110/0x110 [ 416.060868] ? ns_test_super+0x50/0x50 [ 416.064738] sget+0x102/0x140 [ 416.067829] mount_bdev+0xf8/0x3b0 [ 416.071359] ? ext4_calculate_overhead+0x11c0/0x11c0 [ 416.076461] mount_fs+0xa3/0x310 [ 416.079823] vfs_kern_mount.part.0+0x68/0x470 [ 416.084305] do_mount+0x113c/0x2f10 [ 416.087921] ? copy_mount_string+0x40/0x40 [ 416.092143] ? copy_mount_options+0x1da/0x380 [ 416.096636] ? copy_mount_options+0x1e6/0x380 [ 416.101146] ? copy_mount_options+0x26f/0x380 [ 416.105629] ksys_mount+0xcf/0x130 [ 416.109163] __x64_sys_mount+0xba/0x150 [ 416.113133] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 416.117708] do_syscall_64+0xf9/0x620 [ 416.121512] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 416.126685] RIP: 0033:0x460c6a [ 416.129885] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 ad 89 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 8a 89 fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 416.148865] RSP: 002b:00007fb3ea55ea78 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 416.156562] RAX: ffffffffffffffda RBX: 00007fb3ea55eb10 RCX: 0000000000460c6a [ 416.163822] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007fb3ea55ead0 [ 416.171083] RBP: 00007fb3ea55ead0 R08: 00007fb3ea55eb10 R09: 0000000020000000 16:48:06 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_DEV_CREATE(r0, 0x5501) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x1) ioctl$UI_GET_SYSNAME(r2, 0x8040552c, &(0x7f0000000040)) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f00000000c0)={0x0, {0x0, 0x0, 0x0, 0x0, 0x5}}) [ 416.178344] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000020000000 [ 416.185605] R13: 0000000020000100 R14: 0000000020000200 R15: 0000000020013000 16:48:06 executing program 0: creat(&(0x7f0000000280)='./file0\x00', 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) 16:48:06 executing program 5: creat(&(0x7f0000000280)='./file0\x00', 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4007a, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) 16:48:06 executing program 4: open(&(0x7f0000000080)='./file0\x00', 0x40c5, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup(r0) syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x1000, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$tun(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/net/tun\x00', 0x0, 0x0) dup(r2) r3 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={0x0}}, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=ANY=[@ANYBLOB="280000001d000100000000000000000007000000", @ANYRES32, @ANYBLOB="80b586000a0002"], 0x28}}, 0x0) sendmmsg$alg(r3, &(0x7f00000000c0), 0x492492492492627, 0x0) 16:48:06 executing program 2: creat(&(0x7f0000000280)='./file0\x00', 0x0) close(0xffffffffffffffff) write$binfmt_script(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x24ddb, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) 16:48:06 executing program 3 (fault-call:1 fault-nth:45): creat(&(0x7f0000000280)='./file0\x00', 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) 16:48:06 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x2, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f00000000c0)={0x0, {0x0, 0x0, 0x0, 0x0, 0x5}}) 16:48:06 executing program 0: creat(&(0x7f0000000280)='./file0\x00', 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) [ 416.434277] EXT4-fs (loop2): bad geometry: block count 256 exceeds size of device (147 blocks) [ 416.451465] FAULT_INJECTION: forcing a failure. [ 416.451465] name failslab, interval 1, probability 0, space 0, times 0 [ 416.467965] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue [ 416.492026] CPU: 0 PID: 23490 Comm: syz-executor.3 Not tainted 4.19.169-syzkaller #0 [ 416.499930] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 416.509284] Call Trace: [ 416.511888] dump_stack+0x1fc/0x2ef [ 416.515530] should_fail.cold+0xa/0xf [ 416.519342] ? setup_fault_attr+0x200/0x200 [ 416.523670] ? lock_acquire+0x170/0x3c0 [ 416.527660] __should_failslab+0x115/0x180 [ 416.531895] should_failslab+0x5/0x10 [ 416.535689] kmem_cache_alloc_node_trace+0x244/0x3b0 [ 416.540792] __kmalloc_node+0x38/0x70 [ 416.544587] kvmalloc_node+0x61/0xf0 [ 416.548289] __list_lru_init+0x4c6/0x7f0 [ 416.552338] ? up_read+0xc3/0x110 [ 416.555780] sget_userns+0x810/0xcd0 [ 416.559479] ? set_bdev_super+0x110/0x110 [ 416.563615] ? ns_test_super+0x50/0x50 [ 416.567487] ? set_bdev_super+0x110/0x110 [ 416.571644] ? ns_test_super+0x50/0x50 [ 416.575516] sget+0x102/0x140 [ 416.578623] mount_bdev+0xf8/0x3b0 [ 416.582149] ? ext4_calculate_overhead+0x11c0/0x11c0 [ 416.587237] mount_fs+0xa3/0x310 [ 416.590593] vfs_kern_mount.part.0+0x68/0x470 [ 416.595073] do_mount+0x113c/0x2f10 [ 416.598687] ? lock_acquire+0x170/0x3c0 [ 416.602648] ? check_preemption_disabled+0x41/0x280 [ 416.607653] ? copy_mount_string+0x40/0x40 [ 416.611875] ? copy_mount_options+0x59/0x380 [ 416.616273] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 416.621277] ? kmem_cache_alloc_trace+0x323/0x380 [ 416.626109] ? copy_mount_options+0x26f/0x380 [ 416.630612] ksys_mount+0xcf/0x130 [ 416.634140] __x64_sys_mount+0xba/0x150 [ 416.638101] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 416.642682] do_syscall_64+0xf9/0x620 [ 416.646471] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 416.651657] RIP: 0033:0x460c6a [ 416.654850] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 ad 89 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 8a 89 fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 416.673738] RSP: 002b:00007fb3ea55ea78 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 416.681446] RAX: ffffffffffffffda RBX: 00007fb3ea55eb10 RCX: 0000000000460c6a 16:48:07 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x0, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) dup(r2) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f00000000c0)={0x0, {0x0, 0x0, 0x0, 0x0, 0x5}}) 16:48:07 executing program 4: open(&(0x7f0000000080)='./file0\x00', 0x40c5, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup(r0) syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x1000, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$tun(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/net/tun\x00', 0x0, 0x0) dup(r2) r3 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={0x0}}, 0x0) r4 = dup(0xffffffffffffffff) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=ANY=[@ANYBLOB="280000001d000100000000000000000007000000", @ANYRES32=r4, @ANYBLOB="80b586000a0002"], 0x28}}, 0x0) sendmmsg$alg(r3, &(0x7f00000000c0), 0x492492492492627, 0x0) [ 416.688698] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007fb3ea55ead0 [ 416.695966] RBP: 00007fb3ea55ead0 R08: 00007fb3ea55eb10 R09: 0000000020000000 [ 416.703220] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000020000000 [ 416.710483] R13: 0000000020000100 R14: 0000000020000200 R15: 0000000020013000 16:48:07 executing program 5: creat(&(0x7f0000000280)='./file0\x00', 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40092, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) 16:48:07 executing program 2: creat(&(0x7f0000000280)='./file0\x00', 0x0) close(0xffffffffffffffff) write$binfmt_script(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x24e00, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) 16:48:07 executing program 0: creat(&(0x7f0000000280)='./file0\x00', 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) 16:48:07 executing program 3 (fault-call:1 fault-nth:46): creat(&(0x7f0000000280)='./file0\x00', 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) 16:48:07 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x0, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$INCFS_IOC_CREATE_FILE(r0, 0xc058671e, &(0x7f00000002c0)={{[], 0x2}, {0x589185e0}, 0x124, 0x0, 0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)="04b4c7016149ec2f9ff2b5348b0db12af9a2515007c3e65adbf861e3d825aa858a8ac131fed8c6e8d755dfba50748abb33f699d4b00f6190ddc6ce1667a7f223571d048a1e190d0cc5594f8b54c96f3789038059609a167348d602ddea1e707c72f236ab304b8f35ff7fa45e3b39f9a6030a45d4e555035157a000e5b307d678f6073ce186215266c98ccefcf8d64fcb47746e639ab8e6cbab54f2d0aa1bdc561093323faf63888e24090ffdaac4a2e900bdc994b3", 0xb5, 0x0, &(0x7f00000001c0)={0x2, 0xd3, {0x1, 0xc, 0x69, "875660b65bf1e2666ac17e6791352b18f4c20c82df902f077137fa771095da29566a5d7e9d68c087e8eb97556ba89a1603d1f191cd6859baa728d5add45773a14c4ba9c05c67222ab4551b10577b3080368f22f2072b0013762896ec0d3a102b3bcf07e19d2f49815a", 0x5d, "8c17a783f7ff9a32f5263e217db4c44e735998cd370462d81e13980096f10b7e531ea544daba2222befd544131e4a79a122bdff9a2623c4801d7601d38c927580dcf7b40d9beac8b857000790effde7a9c7a2f2eb44d83118f5f4902a1"}, 0x19, "02bdcadca7855d9718c61e088770bfebdf7e69bec0dcd5b7ba"}, 0xf8}) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f00000000c0)={0x0, {0x0, 0x0, 0x0, 0x0, 0x5}}) 16:48:07 executing program 4: open(&(0x7f0000000080)='./file0\x00', 0x40c5, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup(r0) syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x1000, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$tun(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/net/tun\x00', 0x0, 0x0) dup(r2) r3 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={0x0}}, 0x0) r4 = dup(0xffffffffffffffff) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=ANY=[@ANYBLOB="280000001d000100000000000000000007000000", @ANYRES32=r4, @ANYBLOB="80b586000a0002"], 0x28}}, 0x0) sendmmsg$alg(r3, &(0x7f00000000c0), 0x492492492492627, 0x0) 16:48:07 executing program 0: creat(&(0x7f0000000280)='./file0\x00', 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) [ 416.906030] EXT4-fs (loop2): bad geometry: block count 256 exceeds size of device (147 blocks) [ 416.918350] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue [ 416.940513] FAULT_INJECTION: forcing a failure. [ 416.940513] name failslab, interval 1, probability 0, space 0, times 0 16:48:07 executing program 4: open(&(0x7f0000000080)='./file0\x00', 0x40c5, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup(r0) syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x1000, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$tun(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/net/tun\x00', 0x0, 0x0) dup(r2) r3 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={0x0}}, 0x0) r4 = dup(0xffffffffffffffff) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=ANY=[@ANYBLOB="280000001d000100000000000000000007000000", @ANYRES32=r4, @ANYBLOB="80b586000a0002"], 0x28}}, 0x0) sendmmsg$alg(r3, &(0x7f00000000c0), 0x492492492492627, 0x0) [ 416.954029] CPU: 1 PID: 23527 Comm: syz-executor.3 Not tainted 4.19.169-syzkaller #0 [ 416.961934] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 416.961939] Call Trace: [ 416.961960] dump_stack+0x1fc/0x2ef [ 416.961978] should_fail.cold+0xa/0xf [ 416.981343] ? setup_fault_attr+0x200/0x200 [ 416.985678] ? lock_acquire+0x170/0x3c0 [ 416.989684] __should_failslab+0x115/0x180 [ 416.993919] should_failslab+0x5/0x10 [ 416.997704] __kmalloc_track_caller+0x2a6/0x3c0 [ 417.002356] ? ext4_fill_super+0xda/0xc820 [ 417.006577] kstrdup+0x36/0x70 [ 417.009755] ext4_fill_super+0xda/0xc820 [ 417.013805] ? enable_ptr_key_workfn+0x30/0x30 [ 417.018375] ? vsnprintf+0x2cc/0x14f0 [ 417.022161] ? pointer+0x850/0x850 [ 417.025701] ? lock_downgrade+0x720/0x720 [ 417.029981] ? ext4_calculate_overhead+0x11c0/0x11c0 [ 417.035075] ? snprintf+0xbb/0xf0 [ 417.038523] ? vsprintf+0x30/0x30 [ 417.041961] ? wait_for_completion_io+0x10/0x10 [ 417.046611] ? set_blocksize+0x163/0x3f0 [ 417.050659] mount_bdev+0x2fc/0x3b0 [ 417.054269] ? ext4_calculate_overhead+0x11c0/0x11c0 [ 417.059353] mount_fs+0xa3/0x310 [ 417.062705] vfs_kern_mount.part.0+0x68/0x470 [ 417.067215] do_mount+0x113c/0x2f10 [ 417.070846] ? lock_acquire+0x170/0x3c0 [ 417.074827] ? check_preemption_disabled+0x41/0x280 [ 417.079827] ? copy_mount_string+0x40/0x40 [ 417.084060] ? copy_mount_options+0x59/0x380 [ 417.088471] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 417.093472] ? kmem_cache_alloc_trace+0x323/0x380 [ 417.098300] ? copy_mount_options+0x26f/0x380 [ 417.102780] ksys_mount+0xcf/0x130 [ 417.106317] __x64_sys_mount+0xba/0x150 [ 417.110282] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 417.114847] do_syscall_64+0xf9/0x620 [ 417.118633] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 417.123806] RIP: 0033:0x460c6a [ 417.126981] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 ad 89 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 8a 89 fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 417.145863] RSP: 002b:00007fb3ea55ea78 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 16:48:07 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x0, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) dup(r1) r3 = creat(&(0x7f0000000280)='./file0\x00', 0x1) close(r3) ioctl$KVM_IRQ_LINE_STATUS(r3, 0xc008ae67, &(0x7f0000000040)={0xffffffff, 0xf9f}) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f00000000c0)={0x0, {0x0, 0x0, 0x0, 0x0, 0x5}}) [ 417.153552] RAX: ffffffffffffffda RBX: 00007fb3ea55eb10 RCX: 0000000000460c6a [ 417.160804] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007fb3ea55ead0 [ 417.168055] RBP: 00007fb3ea55ead0 R08: 00007fb3ea55eb10 R09: 0000000020000000 [ 417.175322] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000020000000 [ 417.182579] R13: 0000000020000100 R14: 0000000020000200 R15: 0000000020013000 16:48:07 executing program 4: open(&(0x7f0000000080)='./file0\x00', 0x40c5, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup(r0) syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x1000, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$tun(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/net/tun\x00', 0x0, 0x0) dup(r2) r3 = socket(0x10, 0x80002, 0x0) r4 = socket$inet_udplite(0x2, 0x2, 0x88) r5 = dup(r4) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=ANY=[@ANYBLOB="280000001d000100000000000000000007000000", @ANYRES32=r5, @ANYBLOB="80b586000a0002"], 0x28}}, 0x0) sendmmsg$alg(r3, &(0x7f00000000c0), 0x492492492492627, 0x0) 16:48:07 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x0, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = syz_open_dev$ttys(0xc, 0x2, 0x1) dup(r3) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f00000000c0)={0x0, {0x0, 0x0, 0x0, 0x0, 0x5}}) perf_event_open(&(0x7f0000000100)={0x2, 0x70, 0x6, 0x8, 0x4, 0x0, 0x0, 0x9, 0x200, 0x4, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x3, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7, 0x2, @perf_bp={&(0x7f0000000040), 0xc}, 0x841, 0x4, 0x7, 0x7, 0x7, 0x6, 0x3e0}, 0x0, 0x9, 0xffffffffffffffff, 0x1) 16:48:07 executing program 3 (fault-call:1 fault-nth:47): creat(&(0x7f0000000280)='./file0\x00', 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) [ 417.343180] FAULT_INJECTION: forcing a failure. [ 417.343180] name failslab, interval 1, probability 0, space 0, times 0 [ 417.356262] CPU: 1 PID: 23559 Comm: syz-executor.3 Not tainted 4.19.169-syzkaller #0 [ 417.364177] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 417.364182] Call Trace: [ 417.364204] dump_stack+0x1fc/0x2ef [ 417.364224] should_fail.cold+0xa/0xf [ 417.364242] ? setup_fault_attr+0x200/0x200 [ 417.364258] ? lock_acquire+0x170/0x3c0 [ 417.364282] __should_failslab+0x115/0x180 [ 417.364297] should_failslab+0x5/0x10 [ 417.364314] __kmalloc_track_caller+0x2a6/0x3c0 [ 417.404686] ? ext4_fill_super+0xda/0xc820 [ 417.404705] kstrdup+0x36/0x70 [ 417.412117] ext4_fill_super+0xda/0xc820 [ 417.416184] ? enable_ptr_key_workfn+0x30/0x30 [ 417.420795] ? vsnprintf+0x2cc/0x14f0 [ 417.424609] ? pointer+0x850/0x850 [ 417.428247] ? lock_downgrade+0x720/0x720 [ 417.432401] ? ext4_calculate_overhead+0x11c0/0x11c0 [ 417.437511] ? snprintf+0xbb/0xf0 [ 417.440963] ? vsprintf+0x30/0x30 [ 417.444426] ? wait_for_completion_io+0x10/0x10 [ 417.449100] ? set_blocksize+0x163/0x3f0 [ 417.453174] mount_bdev+0x2fc/0x3b0 [ 417.456807] ? ext4_calculate_overhead+0x11c0/0x11c0 [ 417.461920] mount_fs+0xa3/0x310 [ 417.465302] vfs_kern_mount.part.0+0x68/0x470 [ 417.469813] do_mount+0x113c/0x2f10 [ 417.473453] ? lock_acquire+0x170/0x3c0 [ 417.477438] ? check_preemption_disabled+0x41/0x280 [ 417.482464] ? copy_mount_string+0x40/0x40 [ 417.486711] ? copy_mount_options+0x59/0x380 [ 417.491131] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 417.496152] ? kmem_cache_alloc_trace+0x323/0x380 [ 417.501007] ? copy_mount_options+0x26f/0x380 [ 417.505513] ksys_mount+0xcf/0x130 [ 417.509063] __x64_sys_mount+0xba/0x150 [ 417.513048] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 417.517635] do_syscall_64+0xf9/0x620 [ 417.521447] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 417.526641] RIP: 0033:0x460c6a 16:48:08 executing program 5: creat(&(0x7f0000000280)='./file0\x00', 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x400ba, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d90000000f0000000100000000000000000000000020000000200000200000002cc4645f2cc4645f0100ffff53ef0100010000002cc4645f000000000000000001000000000000000b0000008000000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e3338363633343038350000000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000000000000000000000000000000000000d9ca5cac99fd4329af4dde786c1a5d13010040000c000000000000002cc4645f", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) 16:48:08 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x0, 0x0) r1 = creat(&(0x7f0000000280)='./file0\x00', 0x1) close(r1) ioctl$UI_DEV_CREATE(r1, 0x5501) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x0) lseek(r4, 0x8, 0x1) ioctl$F2FS_IOC_COMMIT_ATOMIC_WRITE(r4, 0xf502, 0x0) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f00000000c0)={0x0, {0x0, 0x0, 0x0, 0x0, 0x5}}) 16:48:08 executing program 2: creat(&(0x7f0000000280)='./file0\x00', 0x0) close(0xffffffffffffffff) write$binfmt_script(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x30000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) 16:48:08 executing program 4: open(&(0x7f0000000080)='./file0\x00', 0x40c5, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup(r0) syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x1000, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$tun(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/net/tun\x00', 0x0, 0x0) dup(r2) r3 = socket(0x10, 0x80002, 0x0) r4 = socket$inet_udplite(0x2, 0x2, 0x88) r5 = dup(r4) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=ANY=[@ANYBLOB="280000001d000100000000000000000007000000", @ANYRES32=r5, @ANYBLOB="80b586000a0002"], 0x28}}, 0x0) sendmmsg$alg(r3, &(0x7f00000000c0), 0x492492492492627, 0x0) 16:48:08 executing program 0: creat(&(0x7f0000000280)='./file0\x00', 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="2000e0ff000100000c000000d90000000f0000000100000000000000000000000020000000200000200000002cc4645f2cc4645f0100ffff53ef0100010000002cc4645f000000000000000001000000000000000b0000008000000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e3338363633343038350000000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000000000000000000000000000000000000d9ca5cac99fd4329af4dde786c1a5d13010040000c000000000000002cc4645f", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) [ 417.529842] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 ad 89 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 8a 89 fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 417.548834] RSP: 002b:00007fb3ea55ea78 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 417.556552] RAX: ffffffffffffffda RBX: 00007fb3ea55eb10 RCX: 0000000000460c6a [ 417.563825] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007fb3ea55ead0 [ 417.571099] RBP: 00007fb3ea55ead0 R08: 00007fb3ea55eb10 R09: 0000000020000000 [ 417.578375] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000020000000 [ 417.585653] R13: 0000000020000100 R14: 0000000020000200 R15: 0000000020013000 16:48:08 executing program 3 (fault-call:1 fault-nth:48): creat(&(0x7f0000000280)='./file0\x00', 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) [ 417.679650] EXT4-fs (loop2): bad geometry: block count 256 exceeds size of device (192 blocks) [ 417.741301] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue [ 417.750979] FAULT_INJECTION: forcing a failure. [ 417.750979] name failslab, interval 1, probability 0, space 0, times 0 16:48:08 executing program 2: creat(&(0x7f0000000280)='./file0\x00', 0x0) close(0xffffffffffffffff) write$binfmt_script(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x3be0c, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) 16:48:08 executing program 4: open(&(0x7f0000000080)='./file0\x00', 0x40c5, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup(r0) syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x1000, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$tun(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/net/tun\x00', 0x0, 0x0) dup(r2) r3 = socket(0x10, 0x80002, 0x0) r4 = socket$inet_udplite(0x2, 0x2, 0x88) r5 = dup(r4) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=ANY=[@ANYBLOB="280000001d000100000000000000000007000000", @ANYRES32=r5, @ANYBLOB="80b586000a0002"], 0x28}}, 0x0) sendmmsg$alg(r3, &(0x7f00000000c0), 0x492492492492627, 0x0) 16:48:08 executing program 0: creat(&(0x7f0000000280)='./file0\x00', 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) [ 417.789282] CPU: 1 PID: 23590 Comm: syz-executor.3 Not tainted 4.19.169-syzkaller #0 [ 417.797197] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 417.806546] Call Trace: [ 417.809132] dump_stack+0x1fc/0x2ef [ 417.812754] should_fail.cold+0xa/0xf [ 417.816541] ? setup_fault_attr+0x200/0x200 [ 417.820846] ? lock_acquire+0x170/0x3c0 [ 417.824857] __should_failslab+0x115/0x180 [ 417.829078] should_failslab+0x5/0x10 [ 417.832862] __kmalloc+0x2ab/0x3c0 [ 417.836385] ? crypto_create_tfm+0x79/0x2e0 [ 417.840689] ? up_read+0x17/0x110 [ 417.844127] crypto_create_tfm+0x79/0x2e0 [ 417.848280] crypto_alloc_tfm+0xff/0x230 [ 417.852338] ext4_fill_super+0xb00/0xc820 [ 417.856477] ? vsnprintf+0x2cc/0x14f0 [ 417.860261] ? pointer+0x850/0x850 [ 417.863811] ? lock_downgrade+0x720/0x720 [ 417.867944] ? ext4_calculate_overhead+0x11c0/0x11c0 [ 417.873040] ? snprintf+0xbb/0xf0 [ 417.876504] ? vsprintf+0x30/0x30 [ 417.879950] ? wait_for_completion_io+0x10/0x10 [ 417.884602] ? set_blocksize+0x163/0x3f0 [ 417.888650] mount_bdev+0x2fc/0x3b0 [ 417.892260] ? ext4_calculate_overhead+0x11c0/0x11c0 [ 417.897346] mount_fs+0xa3/0x310 [ 417.900701] vfs_kern_mount.part.0+0x68/0x470 [ 417.905180] do_mount+0x113c/0x2f10 [ 417.908791] ? lock_acquire+0x170/0x3c0 [ 417.912758] ? check_preemption_disabled+0x41/0x280 [ 417.917761] ? copy_mount_string+0x40/0x40 [ 417.921980] ? copy_mount_options+0x59/0x380 [ 417.926387] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 417.931393] ? kmem_cache_alloc_trace+0x323/0x380 [ 417.936310] ? copy_mount_options+0x26f/0x380 [ 417.940788] ksys_mount+0xcf/0x130 [ 417.944323] __x64_sys_mount+0xba/0x150 [ 417.948290] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 417.952856] do_syscall_64+0xf9/0x620 [ 417.956647] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 417.961821] RIP: 0033:0x460c6a [ 417.965005] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 ad 89 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 8a 89 fb ff c3 66 0f 1f 84 00 00 00 00 00 16:48:08 executing program 5: creat(&(0x7f0000000280)='./file0\x00', 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x400d6, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) [ 417.983903] RSP: 002b:00007fb3ea55ea78 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 417.991592] RAX: ffffffffffffffda RBX: 00007fb3ea55eb10 RCX: 0000000000460c6a [ 417.998843] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007fb3ea55ead0 [ 418.006094] RBP: 00007fb3ea55ead0 R08: 00007fb3ea55eb10 R09: 0000000020000000 [ 418.013351] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000020000000 [ 418.020611] R13: 0000000020000100 R14: 0000000020000200 R15: 0000000020013000 16:48:08 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x0, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = creat(&(0x7f0000000280)='./file0\x00', 0x1) close(r2) setsockopt$IPT_SO_SET_REPLACE(r2, 0x0, 0x40, &(0x7f0000000580)=@mangle={'mangle\x00', 0x1f, 0x6, 0x470, 0x248, 0x310, 0x98, 0x310, 0x248, 0x3d8, 0x3d8, 0x3d8, 0x3d8, 0x3d8, 0x6, &(0x7f0000000040), {[{{@ip={@private=0xa010101, @loopback, 0xffffff00, 0xffffffff, 'caif0\x00', 'gre0\x00', {}, {0xff}, 0x0, 0x1, 0x14}, 0x0, 0x70, 0x98}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00'}}, {{@uncond, 0x0, 0xa0, 0xc8, 0x0, {}, [@common=@addrtype={{0x30, 'addrtype\x00'}, {0x10, 0x40, 0x1, 0x1}}]}, @TTL={0x28, 'TTL\x00', 0x0, {0x2, 0x2}}}, {{@uncond, 0x0, 0xc0, 0xe8, 0x0, {}, [@common=@inet=@tcpmss={{0x28, 'tcpmss\x00'}, {0xfff, 0x3f}}, @inet=@rpfilter={{0x28, 'rpfilter\x00'}, {0xf}}]}, @TTL={0x28, 'TTL\x00', 0x0, {0x1}}}, {{@uncond, 0x0, 0x98, 0xc8, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}, {0x9}}]}, @common=@inet=@SET2={0x30, 'SET\x00', 0x2, {{0x1, 0x3, 0x4}, {0x2, 0x5, 0x2}, 0x0, 0x80000001}}}, {{@uncond, 0x0, 0x98, 0xc8, 0x0, {}, [@common=@ttl={{0x28, 'ttl\x00'}, {0x3, 0x9}}]}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0x81, 0x6f1, @loopback, 0x4e20}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x4d0) r3 = dup(r1) r4 = creat(&(0x7f0000000280)='./file0\x00', 0x1) close(r4) ioctl$UI_SET_ABSBIT(r4, 0x40045567, 0x3) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) write$uinput_user_dev(r0, &(0x7f0000000100)={'syz1\x00', {0x0, 0x55, 0x1000, 0x77}, 0x45, [0x8, 0x800, 0x64, 0x3f, 0x5, 0xa924, 0x100, 0x1, 0x2, 0x101, 0x1000, 0x81, 0x8, 0xffffffc0, 0x5dec, 0x3ff, 0x3d5, 0x2, 0x49, 0x5, 0x8000, 0xe99b, 0x6, 0x35, 0x210c068, 0x6cd5, 0x1ff, 0x3ff, 0xe4, 0x1, 0x2, 0x400, 0x8, 0x4, 0x8, 0x3, 0x9, 0x7, 0x400, 0x101, 0xff, 0x1ff, 0x7, 0x6, 0x3ff, 0x1, 0x1f, 0xfffffffc, 0x8000, 0x4, 0x7fffffff, 0x5, 0x80000001, 0x9, 0x1, 0xffff, 0x97d4, 0x7, 0xee, 0x20, 0x3, 0xfffffffa, 0xd4, 0x6], [0x2, 0x20, 0x72, 0x7fff, 0x7, 0x3, 0x1f, 0xff, 0x6, 0x0, 0x2, 0x6, 0x4, 0x80, 0xffff, 0xfff, 0x9, 0x400, 0x8, 0x4, 0x5, 0xfff, 0x7, 0x100, 0x2, 0x6, 0x823, 0x9, 0xffffffff, 0x80000000, 0x4, 0x10001, 0x3, 0x2, 0x4, 0x8000, 0x7, 0xfffffff8, 0x8, 0x5, 0x4, 0x0, 0x70e, 0x400, 0xf5c, 0xfffffffa, 0x27ae9329, 0x9, 0x81, 0x6, 0x9, 0x6, 0x8, 0x7, 0x1, 0x3ff, 0x1, 0x5, 0x10, 0x1, 0x9, 0x0, 0x8, 0x8d8], [0x0, 0x1, 0x4, 0x10001, 0x3, 0xa1b, 0x6, 0x20, 0x9, 0xa14f, 0x32, 0x6, 0x5, 0x4db, 0x9, 0x20, 0x4, 0x8b9, 0x9, 0x10001, 0xdc8, 0x5, 0xfffff56c, 0x1, 0x78, 0x4553a756, 0x7f, 0x7, 0x101, 0xe84f, 0xf6, 0x5, 0x401, 0x7, 0x3ff, 0xfffffffe, 0x1, 0x1, 0x9, 0x4, 0x4, 0x2, 0x200, 0x6, 0x93, 0x200, 0x60e, 0x1ff, 0x1f, 0x1f, 0x80, 0x2, 0x0, 0x101, 0x3, 0x1, 0x400, 0x1ff, 0x5, 0xfffffc00, 0x2, 0x3ff, 0x800, 0x5], [0x200, 0x7, 0xfff, 0x2, 0x2, 0x1, 0x7, 0x3, 0x8, 0x4e, 0xff, 0x2, 0x3ff, 0x0, 0x6, 0x9, 0x0, 0x0, 0x2, 0x0, 0xc38, 0x7e25, 0x7ff, 0x7fff, 0x9, 0x4, 0x7fff, 0x401, 0x6, 0x1, 0x0, 0x1, 0x3, 0x9, 0x7fff, 0x3, 0x9, 0x400, 0x9, 0x36d6, 0x0, 0x800, 0x400, 0x2, 0x6, 0x200, 0x1, 0x9, 0x40, 0xef5d, 0x1, 0x80000001, 0x5, 0x8, 0x1, 0x10000, 0x8000, 0x81, 0x10000, 0x1ff, 0x3, 0x1000, 0x3, 0x6]}, 0x45c) dup(r0) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f00000000c0)={0x0, {0x0, 0x0, 0x0, 0x0, 0x5}}) 16:48:08 executing program 4: open(&(0x7f0000000080)='./file0\x00', 0x40c5, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup(r0) syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x1000, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$tun(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/net/tun\x00', 0x0, 0x0) dup(r2) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={0x0}}, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) r4 = dup(r3) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=ANY=[@ANYBLOB="280000001d000100000000000000000007000000", @ANYRES32=r4, @ANYBLOB="80b586000a0002"], 0x28}}, 0x0) sendmmsg$alg(0xffffffffffffffff, &(0x7f00000000c0), 0x492492492492627, 0x0) [ 418.075082] EXT4-fs (loop3): Cannot load crc32c driver. [ 418.078193] EXT4-fs (loop2): bad geometry: block count 256 exceeds size of device (239 blocks) 16:48:08 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x0, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm-control\x00', 0x20000, 0x0) r4 = creat(&(0x7f0000000280)='./file0\x00', 0x1) close(r4) sendmsg$IPCTNL_MSG_CT_GET(r4, &(0x7f0000000300)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f00000002c0)={&(0x7f0000000180)=ANY=[@ANYBLOB="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"], 0x104}, 0x1, 0x0, 0x0, 0x4041}, 0x20000040) r5 = bpf$ITER_CREATE(0x21, &(0x7f0000000100)={r3}, 0x8) r6 = creat(&(0x7f0000000280)='./file0\x00', 0x1) close(r6) perf_event_open(&(0x7f0000000340)={0x3, 0x70, 0x3f, 0x9, 0xfb, 0x40, 0x0, 0x2, 0x140, 0xb, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x3, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x4, @perf_config_ext={0x3, 0x6}, 0x2000, 0xff, 0x10001, 0x0, 0x3, 0x30b9, 0x9}, 0xffffffffffffffff, 0x3, r6, 0x3) r7 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x0) lseek(r7, 0x8, 0x1) ioctl$F2FS_IOC_WRITE_CHECKPOINT(r7, 0xf507, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r5, 0x40082404, &(0x7f0000000080)=0x2f9) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f00000000c0)={0x0, {0x0, 0xfffffffc, 0x0, 0x0, 0x5}}) r8 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x0) lseek(r8, 0x8, 0x1) ftruncate(r8, 0x80) 16:48:08 executing program 4: open(&(0x7f0000000080)='./file0\x00', 0x40c5, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup(r0) syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x1000, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$tun(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/net/tun\x00', 0x0, 0x0) dup(r2) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={0x0}}, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) r4 = dup(r3) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=ANY=[@ANYBLOB="280000001d000100000000000000000007000000", @ANYRES32=r4, @ANYBLOB="80b586000a0002"], 0x28}}, 0x0) sendmmsg$alg(0xffffffffffffffff, &(0x7f00000000c0), 0x492492492492627, 0x0) 16:48:08 executing program 0: creat(&(0x7f0000000280)='./file0\x00', 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000300000c000000d90000000f0000000100000000000000000000000020000000200000200000002cc4645f2cc4645f0100ffff53ef0100010000002cc4645f000000000000000001000000000000000b0000008000000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e3338363633343038350000000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000000000000000000000000000000000000d9ca5cac99fd4329af4dde786c1a5d13010040000c000000000000002cc4645f", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) 16:48:08 executing program 3 (fault-call:1 fault-nth:49): creat(&(0x7f0000000280)='./file0\x00', 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d90000000f0000000100000000000000000000000020000000200000200000002cc4645f2cc4645f0100ffff53ef0100010000002cc4645f000000000000000001000000000000000b0000008000000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e3338363633343038350000000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000000000000000000000000000000000000d9ca5cac99fd4329af4dde786c1a5d13010040000c000000000000002cc4645f", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) 16:48:08 executing program 2: creat(&(0x7f0000000280)='./file0\x00', 0x0) close(0xffffffffffffffff) write$binfmt_script(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40002, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) [ 418.222667] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue 16:48:08 executing program 5: creat(&(0x7f0000000280)='./file0\x00', 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x400ee, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) 16:48:08 executing program 4: open(&(0x7f0000000080)='./file0\x00', 0x40c5, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup(r0) syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x1000, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$tun(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/net/tun\x00', 0x0, 0x0) dup(r2) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={0x0}}, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) r4 = dup(r3) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=ANY=[@ANYBLOB="280000001d000100000000000000000007000000", @ANYRES32=r4, @ANYBLOB="80b586000a0002"], 0x28}}, 0x0) sendmmsg$alg(0xffffffffffffffff, &(0x7f00000000c0), 0x492492492492627, 0x0) [ 418.309170] FAULT_INJECTION: forcing a failure. [ 418.309170] name failslab, interval 1, probability 0, space 0, times 0 [ 418.327353] CPU: 1 PID: 23634 Comm: syz-executor.3 Not tainted 4.19.169-syzkaller #0 [ 418.335253] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 418.344612] Call Trace: [ 418.347219] dump_stack+0x1fc/0x2ef [ 418.350858] should_fail.cold+0xa/0xf [ 418.354667] ? setup_fault_attr+0x200/0x200 [ 418.359000] ? lock_acquire+0x170/0x3c0 [ 418.362993] __should_failslab+0x115/0x180 [ 418.367238] should_failslab+0x5/0x10 [ 418.371042] kmem_cache_alloc_node_trace+0x244/0x3b0 [ 418.376150] __kmalloc_node+0x38/0x70 [ 418.379959] kvmalloc_node+0x61/0xf0 [ 418.382491] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue [ 418.383676] __list_lru_init+0x4c6/0x7f0 [ 418.383691] ? up_read+0xc3/0x110 [ 418.383710] sget_userns+0x810/0xcd0 [ 418.383725] ? set_bdev_super+0x110/0x110 [ 418.407155] ? ns_test_super+0x50/0x50 [ 418.411045] ? set_bdev_super+0x110/0x110 [ 418.415180] ? ns_test_super+0x50/0x50 [ 418.419053] sget+0x102/0x140 [ 418.422147] mount_bdev+0xf8/0x3b0 [ 418.425698] ? ext4_calculate_overhead+0x11c0/0x11c0 [ 418.430790] mount_fs+0xa3/0x310 [ 418.434148] vfs_kern_mount.part.0+0x68/0x470 [ 418.438629] do_mount+0x113c/0x2f10 [ 418.442247] ? do_raw_spin_unlock+0x171/0x230 [ 418.446739] ? check_preemption_disabled+0x41/0x280 [ 418.451741] ? copy_mount_string+0x40/0x40 [ 418.455971] ? copy_mount_options+0x59/0x380 [ 418.460382] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 418.465384] ? kmem_cache_alloc_trace+0x323/0x380 [ 418.470222] ? copy_mount_options+0x26f/0x380 [ 418.474706] ksys_mount+0xcf/0x130 [ 418.478237] __x64_sys_mount+0xba/0x150 [ 418.482197] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 418.486767] do_syscall_64+0xf9/0x620 [ 418.490557] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 418.495749] RIP: 0033:0x460c6a [ 418.498927] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 ad 89 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 8a 89 fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 418.517811] RSP: 002b:00007fb3ea55ea78 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 418.525500] RAX: ffffffffffffffda RBX: 00007fb3ea55eb10 RCX: 0000000000460c6a [ 418.532752] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007fb3ea55ead0 [ 418.540005] RBP: 00007fb3ea55ead0 R08: 00007fb3ea55eb10 R09: 0000000020000000 [ 418.547259] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000020000000 16:48:09 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x2a0200, 0x0) r2 = epoll_create(0x0) fallocate(r2, 0x25, 0x100, 0xbb) ioctl$UI_ABS_SETUP(0xffffffffffffffff, 0x401c5504, &(0x7f00000000c0)={0x0, {0x0, 0x0, 0x0, 0x0, 0x5}}) 16:48:09 executing program 0: creat(&(0x7f0000000280)='./file0\x00', 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) 16:48:09 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x2, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x0) lseek(r2, 0x8, 0x1) dup(r2) r3 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f00000000c0)={0x0, {0x0, 0x0, 0x0, 0x0, 0x5}}) [ 418.554510] R13: 0000000020000100 R14: 0000000020000200 R15: 0000000020013000 16:48:09 executing program 4: open(&(0x7f0000000080)='./file0\x00', 0x40c5, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup(r0) syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x1000, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) openat$tun(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/net/tun\x00', 0x0, 0x0) r2 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={0x0}}, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) r4 = dup(r3) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=ANY=[@ANYBLOB="280000001d000100000000000000000007000000", @ANYRES32=r4, @ANYBLOB="80b586000a0002"], 0x28}}, 0x0) sendmmsg$alg(r2, &(0x7f00000000c0), 0x492492492492627, 0x0) [ 418.600510] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue 16:48:09 executing program 5: creat(&(0x7f0000000280)='./file0\x00', 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x400f0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) 16:48:09 executing program 0: creat(&(0x7f0000000280)='./file0\x00', 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000500000c000000d90000000f0000000100000000000000000000000020000000200000200000002cc4645f2cc4645f0100ffff53ef0100010000002cc4645f000000000000000001000000000000000b0000008000000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e3338363633343038350000000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000000000000000000000000000000000000d9ca5cac99fd4329af4dde786c1a5d13010040000c000000000000002cc4645f", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) 16:48:09 executing program 3 (fault-call:1 fault-nth:50): creat(&(0x7f0000000280)='./file0\x00', 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d90000000f0000000100000000000000000000000020000000200000200000002cc4645f2cc4645f0100ffff53ef0100010000002cc4645f000000000000000001000000000000000b0000008000000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e3338363633343038350000000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000000000000000000000000000000000000d9ca5cac99fd4329af4dde786c1a5d13010040000c000000000000002cc4645f", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) 16:48:09 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x0, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f00000000c0)={0x0, {0x0, 0x0, 0x0, 0x0, 0x5}}) r3 = creat(&(0x7f0000000280)='./file0\x00', 0x1) close(r3) perf_event_open(&(0x7f0000000040)={0x5, 0x70, 0x60, 0x80, 0x81, 0x8, 0x0, 0x2, 0x8440, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x8, 0x2, @perf_config_ext={0x4, 0x81}, 0x0, 0x173, 0x1, 0x1, 0x5, 0x2, 0x4}, 0xffffffffffffffff, 0x10, r3, 0x8) write$uinput_user_dev(r0, &(0x7f0000000100)={'syz1\x00', {0x3f, 0x1, 0x401, 0x200}, 0x39, [0x7fff, 0x37f, 0x8, 0x0, 0x0, 0xfffffffc, 0xfff, 0x5, 0x7, 0x5, 0x4, 0x40, 0x7fff, 0x0, 0x7, 0x0, 0x9, 0x7fff, 0x0, 0x1, 0x101, 0x6, 0x6, 0xa88, 0x9ab6, 0x1, 0x4, 0x6, 0x11a, 0x954, 0x5, 0xff, 0x2, 0x1, 0x101, 0x1, 0x800, 0x6, 0x8000, 0x23, 0x0, 0xffffffdc, 0xffffff7f, 0x3, 0x6, 0x8, 0x5, 0x1, 0x3, 0x7ff, 0x3, 0xfffffffd, 0x80000001, 0x20, 0xa0, 0x0, 0x8001, 0x7, 0x785fa1a, 0x9, 0x454, 0x8001, 0x4, 0x1f], [0xfff, 0x80000001, 0x1f, 0x80000000, 0x4, 0x740, 0xffffc810, 0x1, 0xae, 0x5, 0x2, 0x100, 0x10001, 0x0, 0x6, 0x3, 0xfffffff8, 0x4, 0x2, 0xff, 0x3f, 0x80, 0xffffffff, 0x1, 0x1, 0x2, 0xfffffff7, 0x0, 0x6, 0x1f, 0x6, 0x4000000, 0x6, 0xfffffffb, 0x982, 0x479, 0x10000, 0x0, 0x200, 0x7, 0x5, 0x5, 0x7d, 0x8001, 0x81, 0xffff, 0x44, 0x10001, 0x3, 0x9c7f, 0x20, 0x5, 0x7, 0x8, 0x1ff, 0x7, 0x5, 0x1ff, 0x8, 0x3de8, 0x2, 0x27, 0x6, 0x9], [0x5, 0xa40, 0x1, 0x1, 0x7ff, 0x10001, 0x466, 0x58924c16, 0x3ff, 0x1, 0xfd, 0x3, 0x5, 0xa60, 0x5, 0xec06, 0x7fffffff, 0x1000, 0x7fff, 0x8, 0x7, 0x0, 0x81, 0x20, 0x1ffc0000, 0x8, 0xb54b4ae, 0x800, 0x7, 0x8, 0x3, 0x1000, 0x8, 0x2, 0x1ff, 0x6, 0xffffffff, 0x6, 0x6, 0x8, 0x3, 0x1e, 0x6, 0x1, 0x2de5, 0xff, 0x7ff, 0xffff6325, 0x4f, 0x4, 0x40, 0x7, 0x7, 0x2, 0x80, 0x9, 0x3, 0x20, 0xfffff800, 0x7, 0xf8, 0x7f, 0x80000001, 0x100], [0x400, 0x4, 0x10000, 0x1ff, 0x3, 0x0, 0x1, 0x0, 0x1, 0x5, 0x6, 0x4, 0x6, 0x5066, 0x9, 0x4, 0x7fff, 0x1ff, 0x3, 0xd88, 0x6e38b5bc, 0x8, 0x5, 0x1, 0xff, 0x6, 0x0, 0x10001, 0x3, 0xfffffffa, 0x2000000, 0x7f, 0x0, 0x7, 0x1, 0x80, 0x5df, 0x3, 0x4, 0x8, 0x0, 0x1, 0x1, 0x6, 0x9, 0x8, 0x6, 0x1400000, 0x8000, 0x9b, 0x2, 0x9851, 0x2, 0x1, 0x3, 0x4bfe, 0x3, 0x5, 0x8850, 0x1, 0x6, 0x7, 0xffff8001, 0x6]}, 0x45c) 16:48:09 executing program 2: creat(&(0x7f0000000280)='./file0\x00', 0x0) close(0xffffffffffffffff) write$binfmt_script(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40003, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d90000000f0000000100000000000000000000000020000000200000200000002cc4645f2cc4645f0100ffff53ef0100010000002cc4645f000000000000000001000000000000000b0000008000000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e3338363633343038350000000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000000000000000000000000000000000000d9ca5cac99fd4329af4dde786c1a5d13010040000c000000000000002cc4645f", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) 16:48:09 executing program 4: open(&(0x7f0000000080)='./file0\x00', 0x40c5, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup(r0) syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x1000, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) openat$tun(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/net/tun\x00', 0x0, 0x0) r2 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={0x0}}, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) r4 = dup(r3) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=ANY=[@ANYBLOB="280000001d000100000000000000000007000000", @ANYRES32=r4, @ANYBLOB="80b586000a0002"], 0x28}}, 0x0) sendmmsg$alg(r2, &(0x7f00000000c0), 0x492492492492627, 0x0) [ 418.832639] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue [ 418.860059] FAULT_INJECTION: forcing a failure. [ 418.860059] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 418.871893] CPU: 1 PID: 23674 Comm: syz-executor.3 Not tainted 4.19.169-syzkaller #0 16:48:09 executing program 0: creat(&(0x7f0000000280)='./file0\x00', 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) [ 418.879787] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 418.879791] Call Trace: [ 418.879812] dump_stack+0x1fc/0x2ef [ 418.879829] should_fail.cold+0xa/0xf [ 418.879843] ? is_bpf_text_address+0xfc/0x1b0 16:48:09 executing program 2: creat(&(0x7f0000000280)='./file0\x00', 0x0) close(0xffffffffffffffff) write$binfmt_script(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40004, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d90000000f0000000100000000000000000000000020000000200000200000002cc4645f2cc4645f0100ffff53ef0100010000002cc4645f000000000000000001000000000000000b0000008000000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e3338363633343038350000000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000000000000000000000000000000000000d9ca5cac99fd4329af4dde786c1a5d13010040000c000000000000002cc4645f", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) 16:48:09 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x0, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) dup(r1) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f00000000c0)={0x0, {0x0, 0x0, 0x0, 0x0, 0x5}}) r2 = syz_open_dev$audion(&(0x7f0000000040)='/dev/audio#\x00', 0x0, 0x800) ioctl$UI_SET_EVBIT(r2, 0x40045564, 0xa) 16:48:09 executing program 5: creat(&(0x7f0000000280)='./file0\x00', 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x400fc, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) [ 418.879857] ? setup_fault_attr+0x200/0x200 [ 418.879872] ? kernel_text_address+0xbd/0xf0 [ 418.879887] ? __kernel_text_address+0x9/0x30 [ 418.879902] ? unwind_get_return_address+0x51/0x90 16:48:09 executing program 3 (fault-call:1 fault-nth:51): creat(&(0x7f0000000280)='./file0\x00', 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d90000000f0000000100000000000000000000000020000000200000200000002cc4645f2cc4645f0100ffff53ef0100010000002cc4645f000000000000000001000000000000000b0000008000000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e3338363633343038350000000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000000000000000000000000000000000000d9ca5cac99fd4329af4dde786c1a5d13010040000c000000000000002cc4645f", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) 16:48:09 executing program 0: creat(&(0x7f0000000280)='./file0\x00', 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) [ 418.879914] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 418.879932] __alloc_pages_nodemask+0x239/0x2890 [ 418.879954] ? __lock_acquire+0x6de/0x3ff0 16:48:09 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x0, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = creat(&(0x7f0000000280)='./file0\x00', 0x1) close(r2) ioctl$UI_DEV_SETUP(r2, 0x405c5503, &(0x7f0000000040)={{0x7fff, 0x3, 0xff, 0x46}, 'syz1\x00', 0x52}) r3 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f00000000c0)={0x0, {0x0, 0x0, 0x0, 0x0, 0x5}}) [ 418.879970] ? ksys_mount+0xcf/0x130 [ 418.879982] ? __x64_sys_mount+0xba/0x150 [ 418.879995] ? gfp_pfmemalloc_allowed+0x150/0x150 [ 418.880008] ? mark_held_locks+0xf0/0xf0 [ 418.880019] ? __save_stack_trace+0xaf/0x190 [ 418.880036] ? set_precision+0x160/0x160 16:48:09 executing program 5: creat(&(0x7f0000000280)='./file0\x00', 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4010e, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) [ 418.880061] cache_grow_begin+0xa4/0x8a0 [ 418.880073] ? setup_fault_attr+0x200/0x200 16:48:09 executing program 0: creat(&(0x7f0000000280)='./file0\x00', 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) 16:48:09 executing program 3 (fault-call:1 fault-nth:52): creat(&(0x7f0000000280)='./file0\x00', 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) [ 418.880085] ? lock_acquire+0x170/0x3c0 [ 418.880119] cache_alloc_refill+0x273/0x340 16:48:09 executing program 2: creat(&(0x7f0000000280)='./file0\x00', 0x0) close(0xffffffffffffffff) write$binfmt_script(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40005, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d90000000f0000000100000000000000000000000020000000200000200000002cc4645f2cc4645f0100ffff53ef0100010000002cc4645f000000000000000001000000000000000b0000008000000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e3338363633343038350000000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000000000000000000000000000000000000d9ca5cac99fd4329af4dde786c1a5d13010040000c000000000000002cc4645f", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) [ 418.880137] kmem_cache_alloc_trace+0x354/0x380 [ 418.880153] ext4_fill_super+0x114/0xc820 [ 418.880165] ? enable_ptr_key_workfn+0x30/0x30 [ 418.880193] ? vsnprintf+0x2cc/0x14f0 [ 418.880211] ? pointer+0x850/0x850 [ 418.880227] ? lock_downgrade+0x720/0x720 [ 418.880240] ? ext4_calculate_overhead+0x11c0/0x11c0 [ 418.880255] ? snprintf+0xbb/0xf0 [ 418.880267] ? vsprintf+0x30/0x30 [ 418.880287] ? wait_for_completion_io+0x10/0x10 [ 418.880301] ? set_blocksize+0x163/0x3f0 [ 418.880332] mount_bdev+0x2fc/0x3b0 [ 418.880344] ? ext4_calculate_overhead+0x11c0/0x11c0 [ 418.880357] mount_fs+0xa3/0x310 [ 418.880374] vfs_kern_mount.part.0+0x68/0x470 [ 418.880390] do_mount+0x113c/0x2f10 [ 418.880406] ? do_raw_spin_unlock+0x171/0x230 [ 418.880419] ? check_preemption_disabled+0x41/0x280 [ 418.880433] ? copy_mount_string+0x40/0x40 [ 418.880445] ? copy_mount_options+0x59/0x380 [ 418.880460] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 418.880473] ? kmem_cache_alloc_trace+0x323/0x380 [ 418.880488] ? copy_mount_options+0x26f/0x380 [ 418.880503] ksys_mount+0xcf/0x130 [ 418.880519] __x64_sys_mount+0xba/0x150 [ 418.880536] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 418.880550] do_syscall_64+0xf9/0x620 [ 418.880565] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 418.880594] RIP: 0033:0x460c6a [ 418.880609] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 ad 89 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 8a 89 fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 418.880618] RSP: 002b:00007fb3ea55ea78 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 418.880632] RAX: ffffffffffffffda RBX: 00007fb3ea55eb10 RCX: 0000000000460c6a [ 418.880641] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007fb3ea55ead0 [ 418.880650] RBP: 00007fb3ea55ead0 R08: 00007fb3ea55eb10 R09: 0000000020000000 [ 418.880660] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000020000000 [ 418.880668] R13: 0000000020000100 R14: 0000000020000200 R15: 0000000020013000 [ 418.909916] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue [ 418.956930] EXT4-fs (loop3): mounted filesystem without journal. Opts: ,errors=continue [ 419.112671] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue [ 419.127498] FAULT_INJECTION: forcing a failure. [ 419.127498] name failslab, interval 1, probability 0, space 0, times 0 [ 419.127516] CPU: 1 PID: 23710 Comm: syz-executor.3 Not tainted 4.19.169-syzkaller #0 [ 419.127525] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 419.127530] Call Trace: [ 419.127552] dump_stack+0x1fc/0x2ef [ 419.127570] should_fail.cold+0xa/0xf [ 419.127587] ? setup_fault_attr+0x200/0x200 [ 419.127603] ? lock_acquire+0x170/0x3c0 [ 419.127625] __should_failslab+0x115/0x180 [ 419.127642] should_failslab+0x5/0x10 [ 419.127653] __kmalloc+0x2ab/0x3c0 [ 419.127667] ? crypto_create_tfm+0x79/0x2e0 [ 419.127679] ? up_read+0x17/0x110 [ 419.127696] crypto_create_tfm+0x79/0x2e0 [ 419.127713] crypto_alloc_tfm+0xff/0x230 [ 419.127731] ext4_fill_super+0xb00/0xc820 [ 419.127754] ? vsnprintf+0x2cc/0x14f0 [ 419.127772] ? pointer+0x850/0x850 [ 419.127800] ? lock_downgrade+0x720/0x720 [ 419.127819] ? ext4_calculate_overhead+0x11c0/0x11c0 [ 419.127835] ? snprintf+0xbb/0xf0 [ 419.127846] ? vsprintf+0x30/0x30 [ 419.127865] ? wait_for_completion_io+0x10/0x10 [ 419.127878] ? set_blocksize+0x163/0x3f0 [ 419.127899] mount_bdev+0x2fc/0x3b0 [ 419.127912] ? ext4_calculate_overhead+0x11c0/0x11c0 [ 419.127926] mount_fs+0xa3/0x310 [ 419.127944] vfs_kern_mount.part.0+0x68/0x470 [ 419.127960] do_mount+0x113c/0x2f10 [ 419.127976] ? lock_acquire+0x170/0x3c0 [ 419.127991] ? check_preemption_disabled+0x41/0x280 [ 419.128005] ? copy_mount_string+0x40/0x40 [ 419.128017] ? copy_mount_options+0x59/0x380 [ 419.128033] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 419.128045] ? kmem_cache_alloc_trace+0x323/0x380 [ 419.128062] ? copy_mount_options+0x26f/0x380 [ 419.128079] ksys_mount+0xcf/0x130 [ 419.128094] __x64_sys_mount+0xba/0x150 [ 419.128108] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 419.128121] do_syscall_64+0xf9/0x620 [ 419.128136] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 419.128147] RIP: 0033:0x460c6a [ 419.128167] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 ad 89 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 8a 89 fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 419.128174] RSP: 002b:00007fb3ea55ea78 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 419.128187] RAX: ffffffffffffffda RBX: 00007fb3ea55eb10 RCX: 0000000000460c6a [ 419.128195] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007fb3ea55ead0 [ 419.128203] RBP: 00007fb3ea55ead0 R08: 00007fb3ea55eb10 R09: 0000000020000000 [ 419.128210] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000020000000 [ 419.128217] R13: 0000000020000100 R14: 0000000020000200 R15: 0000000020013000 [ 419.128262] EXT4-fs (loop3): Cannot load crc32c driver. [ 419.224780] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue [ 419.346742] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue [ 419.360288] FAULT_INJECTION: forcing a failure. [ 419.360288] name failslab, interval 1, probability 0, space 0, times 0 [ 419.360306] CPU: 1 PID: 23740 Comm: syz-executor.3 Not tainted 4.19.169-syzkaller #0 [ 419.360314] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 419.360319] Call Trace: [ 419.360339] dump_stack+0x1fc/0x2ef [ 419.360358] should_fail.cold+0xa/0xf [ 419.360374] ? setup_fault_attr+0x200/0x200 [ 419.360391] ? lock_acquire+0x170/0x3c0 [ 419.360414] __should_failslab+0x115/0x180 [ 419.360431] should_failslab+0x5/0x10 [ 419.360443] __kmalloc+0x2ab/0x3c0 [ 419.360475] ? crypto_create_tfm+0x79/0x2e0 [ 419.360486] ? up_read+0x17/0x110 [ 419.360503] crypto_create_tfm+0x79/0x2e0 [ 419.360518] crypto_alloc_tfm+0xff/0x230 [ 419.360533] ext4_fill_super+0xb00/0xc820 [ 419.360569] ? vsnprintf+0x2cc/0x14f0 [ 419.360586] ? pointer+0x850/0x850 [ 419.360600] ? lock_downgrade+0x720/0x720 [ 419.360613] ? ext4_calculate_overhead+0x11c0/0x11c0 [ 419.360626] ? snprintf+0xbb/0xf0 [ 419.360637] ? vsprintf+0x30/0x30 [ 419.360655] ? wait_for_completion_io+0x10/0x10 [ 419.360685] ? set_blocksize+0x163/0x3f0 [ 419.360706] mount_bdev+0x2fc/0x3b0 [ 419.360719] ? ext4_calculate_overhead+0x11c0/0x11c0 [ 419.360732] mount_fs+0xa3/0x310 [ 419.360751] vfs_kern_mount.part.0+0x68/0x470 [ 419.360767] do_mount+0x113c/0x2f10 [ 419.360783] ? do_raw_spin_unlock+0x171/0x230 [ 419.360814] ? check_preemption_disabled+0x41/0x280 [ 419.360830] ? copy_mount_string+0x40/0x40 [ 419.360844] ? copy_mount_options+0x59/0x380 [ 419.360860] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 419.360875] ? kmem_cache_alloc_trace+0x323/0x380 [ 419.360892] ? copy_mount_options+0x26f/0x380 [ 419.360909] ksys_mount+0xcf/0x130 [ 419.360925] __x64_sys_mount+0xba/0x150 [ 419.360939] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 419.360952] do_syscall_64+0xf9/0x620 [ 419.360968] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 419.360979] RIP: 0033:0x460c6a [ 419.360991] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 ad 89 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 8a 89 fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 419.360998] RSP: 002b:00007fb3ea55ea78 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 16:48:10 executing program 4: open(&(0x7f0000000080)='./file0\x00', 0x40c5, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup(r0) syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x1000, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) openat$tun(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/net/tun\x00', 0x0, 0x0) r2 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={0x0}}, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) r4 = dup(r3) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=ANY=[@ANYBLOB="280000001d000100000000000000000007000000", @ANYRES32=r4, @ANYBLOB="80b586000a0002"], 0x28}}, 0x0) sendmmsg$alg(r2, &(0x7f00000000c0), 0x492492492492627, 0x0) 16:48:10 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x0, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) r3 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vcs\x00', 0x620000, 0x0) r4 = syz_open_dev$sg(&(0x7f00000001c0)='/dev/sg#\x00', 0x2, 0x109580) ioctl$BTRFS_IOC_DEFRAG(r4, 0x50009402, 0x0) signalfd4(r3, &(0x7f0000000080)={[0x4]}, 0x8, 0x800) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x204001fc) sendto$inet6(0xffffffffffffffff, &(0x7f0000000100)="7e4206e4209f4fd5f6c2bfbf1dce3a7bf1bfdea84cff0d1b0b8403070efd59bb7a8dcc1c4ea7dc8d950de8596aed1d820a3f36e313c171e957c6a76a23494bb038d54c0b88723cf6f97d50eeff52302cd049f2e71466dab9dc9462c2eed3b3aca196c908c53e1be9567b53c5a040694926b0809f29ac31e09c5de9558fb37236e69f280a3770927c3237468f", 0x8c, 0x10, 0x0, 0x0) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f00000000c0)={0x0, {0x0, 0x400, 0x4000, 0x0, 0x5, 0x1}}) 16:48:10 executing program 0: creat(&(0x7f0000000280)='./file0\x00', 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) 16:48:10 executing program 3 (fault-call:1 fault-nth:53): creat(&(0x7f0000000280)='./file0\x00', 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) 16:48:10 executing program 5: creat(&(0x7f0000000280)='./file0\x00', 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40123, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d90000000f0000000100000000000000000000000020000000200000200000002cc4645f2cc4645f0100ffff53ef0100010000002cc4645f000000000000000001000000000000000b0000008000000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e3338363633343038350000000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000000000000000000000000000000000000d9ca5cac99fd4329af4dde786c1a5d13010040000c000000000000002cc4645f", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) 16:48:10 executing program 2: creat(&(0x7f0000000280)='./file0\x00', 0x0) close(0xffffffffffffffff) write$binfmt_script(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40006, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) [ 419.361012] RAX: ffffffffffffffda RBX: 00007fb3ea55eb10 RCX: 0000000000460c6a [ 419.361021] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007fb3ea55ead0 [ 419.361030] RBP: 00007fb3ea55ead0 R08: 00007fb3ea55eb10 R09: 0000000020000000 [ 419.361038] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000020000000 [ 419.361046] R13: 0000000020000100 R14: 0000000020000200 R15: 0000000020013000 [ 419.366763] EXT4-fs (loop3): Cannot load crc32c driver. [ 419.479926] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue [ 420.353884] FAULT_INJECTION: forcing a failure. [ 420.353884] name failslab, interval 1, probability 0, space 0, times 0 [ 420.370304] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue 16:48:10 executing program 0: creat(&(0x7f0000000280)='./file0\x00', 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000002000000c000000d90000000f0000000100000000000000000000000020000000200000200000002cc4645f2cc4645f0100ffff53ef0100010000002cc4645f000000000000000001000000000000000b0000008000000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e3338363633343038350000000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000000000000000000000000000000000000d9ca5cac99fd4329af4dde786c1a5d13010040000c000000000000002cc4645f", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) 16:48:10 executing program 4: open(&(0x7f0000000080)='./file0\x00', 0x40c5, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup(r0) syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x1000, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) dup(0xffffffffffffffff) r2 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={0x0}}, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) r4 = dup(r3) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=ANY=[@ANYBLOB="280000001d000100000000000000000007000000", @ANYRES32=r4, @ANYBLOB="80b586000a0002"], 0x28}}, 0x0) sendmmsg$alg(r2, &(0x7f00000000c0), 0x492492492492627, 0x0) [ 420.404535] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue [ 420.418484] CPU: 0 PID: 23764 Comm: syz-executor.3 Not tainted 4.19.169-syzkaller #0 [ 420.426380] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 420.435854] Call Trace: [ 420.438452] dump_stack+0x1fc/0x2ef [ 420.442091] should_fail.cold+0xa/0xf [ 420.445902] ? setup_fault_attr+0x200/0x200 [ 420.450256] ? lock_acquire+0x170/0x3c0 [ 420.454245] __should_failslab+0x115/0x180 [ 420.458482] should_failslab+0x5/0x10 [ 420.462270] kmem_cache_alloc_trace+0x284/0x380 [ 420.466933] prealloc_shrinker+0x8d/0x340 [ 420.471067] register_shrinker+0x13/0x40 [ 420.475114] mb_cache_create+0x275/0x4c0 [ 420.479185] ext4_fill_super+0x97b1/0xc820 [ 420.483423] ? ext4_calculate_overhead+0x11c0/0x11c0 [ 420.488526] ? snprintf+0xbb/0xf0 [ 420.491972] ? wait_for_completion_io+0x10/0x10 [ 420.496642] ? set_blocksize+0x163/0x3f0 [ 420.500707] mount_bdev+0x2fc/0x3b0 [ 420.505272] ? ext4_calculate_overhead+0x11c0/0x11c0 [ 420.510360] mount_fs+0xa3/0x310 [ 420.513716] vfs_kern_mount.part.0+0x68/0x470 [ 420.518215] do_mount+0x113c/0x2f10 [ 420.521830] ? lock_acquire+0x170/0x3c0 [ 420.525808] ? check_preemption_disabled+0x41/0x280 [ 420.530812] ? copy_mount_string+0x40/0x40 [ 420.535032] ? copy_mount_options+0x59/0x380 [ 420.539427] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 420.544428] ? kmem_cache_alloc_trace+0x323/0x380 [ 420.549264] ? copy_mount_options+0x26f/0x380 [ 420.553762] ksys_mount+0xcf/0x130 [ 420.557288] __x64_sys_mount+0xba/0x150 [ 420.561337] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 420.565908] do_syscall_64+0xf9/0x620 [ 420.569703] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 420.574876] RIP: 0033:0x460c6a [ 420.578058] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 ad 89 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 8a 89 fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 420.597128] RSP: 002b:00007fb3ea55ea78 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 420.604818] RAX: ffffffffffffffda RBX: 00007fb3ea55eb10 RCX: 0000000000460c6a [ 420.612072] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007fb3ea55ead0 [ 420.619347] RBP: 00007fb3ea55ead0 R08: 00007fb3ea55eb10 R09: 0000000020000000 [ 420.626600] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000020000000 [ 420.634126] R13: 0000000020000100 R14: 0000000020000200 R15: 0000000020013000 16:48:11 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x0, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) r3 = creat(&(0x7f0000000280)='./file0\x00', 0x1) close(r3) ioctl$UI_SET_SNDBIT(r3, 0x4004556a, 0x1) lseek(0xffffffffffffffff, 0x8, 0x1) r4 = openat$urandom(0xffffffffffffff9c, &(0x7f0000002880)='/dev/urandom\x00', 0x149580, 0x0) r5 = socket$bt_bnep(0x1f, 0x3, 0x4) r6 = socket$inet_icmp(0x2, 0x2, 0x1) r7 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x0) lseek(r7, 0x8, 0x1) r8 = socket$l2tp(0x2, 0x2, 0x73) r9 = syz_mount_image$hfsplus(&(0x7f00000028c0)='hfsplus\x00', &(0x7f0000002900)='./file0\x00', 0x3, 0x0, &(0x7f0000002940), 0x2, &(0x7f0000002980)={[{@force='force'}, {@nodecompose='nodecompose'}, {@creator={'creator', 0x3d, "c010e4e8"}}, {@session={'session', 0x3d, 0x3f}}], [{@mask={'mask', 0x3d, 'MAY_WRITE'}}, {@func={'func', 0x3d, 'KEXEC_KERNEL_CHECK'}}, {@fscontext={'fscontext', 0x3d, 'system_u'}}, {@dont_hash='dont_hash'}, {@dont_measure='dont_measure'}]}) r10 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x0) lseek(r10, 0x8, 0x1) socketpair(0x27, 0x6, 0x3, &(0x7f0000002a40)={0xffffffffffffffff}) sendmsg$unix(r3, &(0x7f0000002b80)={&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000140)=[{&(0x7f0000000100)="90167e07460431f3d6b50ccb69a1", 0xe}, {&(0x7f00000002c0)="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", 0x1000}], 0x2, &(0x7f0000002a80)=[@cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, 0x0, 0xee00}}}, @rights={{0x2c, 0x1, 0x1, [r1, 0xffffffffffffffff, r3, 0xffffffffffffffff, 0xffffffffffffffff, r3, 0xffffffffffffffff]}}, @rights={{0x20, 0x1, 0x1, [r0, r4, r0, r5]}}, @rights={{0x30, 0x1, 0x1, [r2, r2, r3, r6, r3, r3, r3, r0]}}, @rights={{0x34, 0x1, 0x1, [r7, r0, r2, r8, r3, r9, r10, r11, r1]}}], 0xd8, 0x181}, 0x24008054) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f00000000c0)={0x0, {0x0, 0x0, 0x0, 0x0, 0x5}}) 16:48:11 executing program 0: creat(&(0x7f0000000280)='./file0\x00', 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) 16:48:11 executing program 5: creat(&(0x7f0000000280)='./file0\x00', 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40168, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) 16:48:11 executing program 4: open(&(0x7f0000000080)='./file0\x00', 0x40c5, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup(r0) syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x1000, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) dup(0xffffffffffffffff) r2 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={0x0}}, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) r4 = dup(r3) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=ANY=[@ANYBLOB="280000001d000100000000000000000007000000", @ANYRES32=r4, @ANYBLOB="80b586000a0002"], 0x28}}, 0x0) sendmmsg$alg(r2, &(0x7f00000000c0), 0x492492492492627, 0x0) [ 420.829070] hfsplus: unable to parse mount options 16:48:11 executing program 0: creat(&(0x7f0000000280)='./file0\x00', 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) 16:48:11 executing program 4: open(&(0x7f0000000080)='./file0\x00', 0x40c5, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup(r0) syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x1000, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) dup(0xffffffffffffffff) r2 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={0x0}}, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) r4 = dup(r3) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=ANY=[@ANYBLOB="280000001d000100000000000000000007000000", @ANYRES32=r4, @ANYBLOB="80b586000a0002"], 0x28}}, 0x0) sendmmsg$alg(r2, &(0x7f00000000c0), 0x492492492492627, 0x0) [ 420.863416] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue [ 420.867108] EXT4-fs (loop3): Failed to create ea_block_cache 16:48:11 executing program 3 (fault-call:1 fault-nth:54): creat(&(0x7f0000000280)='./file0\x00', 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) [ 421.060367] hfsplus: unable to parse mount options 16:48:11 executing program 5: creat(&(0x7f0000000280)='./file0\x00', 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40178, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) 16:48:11 executing program 2: creat(&(0x7f0000000280)='./file0\x00', 0x0) close(0xffffffffffffffff) write$binfmt_script(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40007, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) 16:48:11 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x0, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) write$vga_arbiter(r2, &(0x7f0000000100)=@target={'target ', {'PCI:', '1a', ':', '0', ':', '1a', '.', '1'}}, 0x15) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f00000000c0)={0x0, {0x0, 0x0, 0x0, 0x0, 0x5}}) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x6, 0x1f, 0xf9, 0x3, 0x0, 0x20, 0x40010, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x4, @perf_config_ext={0x101, 0x7}, 0x51404, 0x6, 0x5, 0x2, 0x7, 0x1, 0xf725}, 0xffffffffffffffff, 0xd, 0xffffffffffffffff, 0x8) r3 = socket$inet_smc(0x2b, 0x1, 0x0) lseek(r3, 0x10000000000000, 0x4) 16:48:11 executing program 0: creat(&(0x7f0000000280)='./file0\x00', 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) 16:48:11 executing program 4: open(&(0x7f0000000080)='./file0\x00', 0x40c5, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) dup(r0) syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x1000, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/net/tun\x00', 0x0, 0x0) dup(r1) r2 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={0x0}}, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) r4 = dup(r3) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=ANY=[@ANYBLOB="280000001d000100000000000000000007000000", @ANYRES32=r4, @ANYBLOB="80b586000a0002"], 0x28}}, 0x0) sendmmsg$alg(r2, &(0x7f00000000c0), 0x492492492492627, 0x0) [ 421.209882] FAULT_INJECTION: forcing a failure. [ 421.209882] name failslab, interval 1, probability 0, space 0, times 0 [ 421.226069] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue [ 421.235512] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue [ 421.267201] CPU: 0 PID: 23825 Comm: syz-executor.3 Not tainted 4.19.169-syzkaller #0 [ 421.275096] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 421.284436] Call Trace: [ 421.287017] dump_stack+0x1fc/0x2ef [ 421.290634] should_fail.cold+0xa/0xf [ 421.294423] ? ksys_mount+0xcf/0x130 [ 421.298124] ? setup_fault_attr+0x200/0x200 [ 421.302449] ? blk_queue_enter+0x40b/0xb70 [ 421.306675] __should_failslab+0x115/0x180 [ 421.310898] should_failslab+0x5/0x10 [ 421.314685] kmem_cache_alloc_node+0x54/0x3b0 [ 421.319186] create_task_io_context+0x2c/0x430 [ 421.323756] generic_make_request_checks+0x1c4f/0x22e0 [ 421.329023] ? should_fail_bio.isra.0+0xa0/0xa0 [ 421.333682] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 421.338699] ? kmem_cache_alloc+0x315/0x370 [ 421.343011] generic_make_request+0x23f/0xdf0 [ 421.347494] ? blk_put_request+0x110/0x110 [ 421.351728] ? lock_downgrade+0x720/0x720 [ 421.355883] submit_bio+0xb1/0x430 [ 421.359416] ? generic_make_request+0xdf0/0xdf0 [ 421.364086] ? check_preemption_disabled+0x41/0x280 [ 421.369094] ? guard_bio_eod+0x2a0/0x640 [ 421.373143] submit_bh_wbc+0x5a7/0x760 [ 421.377032] __bread_gfp+0x14e/0x300 [ 421.380734] ext4_fill_super+0x57b/0xc820 [ 421.384874] ? vsnprintf+0x2cc/0x14f0 [ 421.388661] ? pointer+0x850/0x850 [ 421.392201] ? lock_downgrade+0x720/0x720 [ 421.396337] ? ext4_calculate_overhead+0x11c0/0x11c0 [ 421.401426] ? snprintf+0xbb/0xf0 [ 421.404864] ? vsprintf+0x30/0x30 [ 421.408320] ? wait_for_completion_io+0x10/0x10 [ 421.412988] ? set_blocksize+0x163/0x3f0 [ 421.417041] mount_bdev+0x2fc/0x3b0 [ 421.420666] ? ext4_calculate_overhead+0x11c0/0x11c0 [ 421.425755] mount_fs+0xa3/0x310 [ 421.429124] vfs_kern_mount.part.0+0x68/0x470 [ 421.433618] do_mount+0x113c/0x2f10 [ 421.437241] ? do_raw_spin_unlock+0x171/0x230 [ 421.441725] ? check_preemption_disabled+0x41/0x280 [ 421.446739] ? copy_mount_string+0x40/0x40 [ 421.450964] ? copy_mount_options+0x59/0x380 [ 421.455362] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 421.460365] ? kmem_cache_alloc_trace+0x323/0x380 [ 421.465200] ? copy_mount_options+0x26f/0x380 [ 421.469703] ksys_mount+0xcf/0x130 [ 421.473234] __x64_sys_mount+0xba/0x150 [ 421.477202] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 421.481773] do_syscall_64+0xf9/0x620 [ 421.485577] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 421.490753] RIP: 0033:0x460c6a [ 421.493933] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 ad 89 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 8a 89 fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 421.512823] RSP: 002b:00007fb3ea55ea78 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 421.520518] RAX: ffffffffffffffda RBX: 00007fb3ea55eb10 RCX: 0000000000460c6a [ 421.527772] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007fb3ea55ead0 [ 421.535025] RBP: 00007fb3ea55ead0 R08: 00007fb3ea55eb10 R09: 0000000020000000 [ 421.542279] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000020000000 [ 421.549657] R13: 0000000020000100 R14: 0000000020000200 R15: 0000000020013000 16:48:12 executing program 4: open(&(0x7f0000000080)='./file0\x00', 0x40c5, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) dup(r0) syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x1000, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/net/tun\x00', 0x0, 0x0) dup(r1) r2 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={0x0}}, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) r4 = dup(r3) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=ANY=[@ANYBLOB="280000001d000100000000000000000007000000", @ANYRES32=r4, @ANYBLOB="80b586000a0002"], 0x28}}, 0x0) sendmmsg$alg(r2, &(0x7f00000000c0), 0x492492492492627, 0x0) 16:48:12 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x0, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x0) lseek(r2, 0x8, 0x1) r3 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x48, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$dupfd(r3, 0x0, 0xffffffffffffffff) ioctl$BTRFS_IOC_BALANCE_PROGRESS(0xffffffffffffffff, 0x84009422, &(0x7f0000000cc0)={0x0, 0x0, {0x0, @usage, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {0x0, @usage, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {0x0, @usage, 0x0}}) socketpair(0x1, 0x20000000000001, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) sendfile(0xffffffffffffffff, r3, &(0x7f0000000080)=0x7fffffff, 0x80) ioctl$PERF_EVENT_IOC_SET_FILTER(r5, 0x8914, &(0x7f0000000040)='lo\x00\x96o\xd6Q\xb9Y\xa9\xc8J,\x00\xd2\x97\x04\x03\xdc\r') ioctl$PERF_EVENT_IOC_SET_FILTER(r5, 0x8923, &(0x7f0000000680)='lo\x00\x96o8\x0fd\xa1\xe3\xd7]b}\x1f\xa1Y\xad4\x90\x9d`\xd2\x98\x00\x00\x00 \'Y\x17]\x15c\xcaR\xdd\x98OC\x89\x1b\xe7\x84\xe2\x05\x80w\xd2|D\x8dK\x14Bx\xcbuH\xc2\xeec\xbf<>Y\x1a\xfc\x1f9OB\x81\x89\x186\xc5q@n\xb4\xb6s\xb0\x00\x00\x00\x00\x00\b\x00\x00\xda\xef\xecE\xec\xd5I\xb2\x9b\xfe\x8d\x90?\x00\xe9\xe4~g:\xc1\xb2aj\x96\xbb\xa7\xe2\xc0\xdc\xf9Q\b\xeb\x16\x7fT\x11\xd3\r7\xe6\"f\xcf\x8e\xabd\x0ftp\x82\xae\xd2\x15\x8e+c\xf6\xbf\xe14>\xa6-\xa5c\xde\xd7\xab\xea\x1f\xf8s2\x9cVF\xd5\x18\xfe\x0e\x8f \x01\x00\x00y.\xfc*\x82\xa5\xa1p5\xc8{\xf7\xef\xab\xe8\x99\xebw#\x8at\x1c\x80\xfc\xb0\x95\xa2\xa7\xd7,Y]E8\x83X\xf5F\xdc\x88-\xf5\xb0\xb5^\xdb\x1a\xb6\xaa\x14\xe2\xb9\rh^J-\xd1\xbaUn\x04\'l\x1b\xe0o\xdb\xc8\x91%\x1c\xb5\xbf\xb6\x90\xb4\xc2\x7f]/\xb3\xe7\xc9\'\x94\xcfIo\xdf\x04\x95\xb5\x06\x84\x1fH>\xda\xc5\x04 \x94\x88\xeb\'\xd4;6\x7f\xd9\x99-\x1b|G\x8d\xd4\xb9%\xaaQ\xa0K\x10\x03\x93\xe1\xcc\xe7m\x80\'\xf0\xa5\xed(\r\xa8\x0f&\xb1\xf3\xff0\f\x82%_\x92\x8bD\xb9\xd9\xe7\xf2\xe4\xc1i#\xdc\x87A\xb9\xc7\r\x92\xfa\x11\x11\xb5\x1f\x03\x9d\xdd\x1bj\xdf\xacg\xe3\xa0S\xd3\x8a\xe1n\x97\xea\xf5\xa0\'\v\xe9\xa0\xf1 f\xaan\xcf\xb5i\xb6d\xbc\x92\v\xd58\x16\b\xb3_:\xa4!\ny\xc4&\nWMM\xa8\xc4\v\x9f\x01o\xf4\xab&\xb6\x17\x02P\xc3!N\xa1\x86\"\xd7\x04\xf1\xc0!\xed\xff\xee$\xc89\x8cB0\xd1dD\xe0IP\x88\xa2\xf2Y\x9af$$\xf1\x81\x96\xf7P\xac\xca\x80:!\xb4\x94#\xcb^\x9f\'\x03\xe3\x93\xb9\x82\xbf\xcf\xc4\xe3\xf7\x03Oh\xf2r\xca\x8ff\xbb/\x9f*\xaf\x1a \xa5\xa0?%M\xa5\x86\x98\xfa4\'1\xc7\f<\xcc@\xe8\x8a\xac.\xde\xe4\xc7\xf5\x9ck\xa40!\xe9\x14$\xb3\x05m\xb5m\xed\ft\x93\xd8\xa3\x80\'Y\xb9\x05\xbbt|\xbe\xbcz\n\xf3\xf5p\xf8\x9f~\x1b\xd0\v\x1cQ') r6 = syz_genetlink_get_family_id$netlbl_cipso(&(0x7f0000000100)='NLBL_CIPSOv4\x00') sendmsg$NLBL_CIPSOV4_C_REMOVE(r5, &(0x7f0000000240)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000200)={&(0x7f0000001680)=ANY=[@ANYRESHEX, @ANYRES16=r6, @ANYBLOB="02002bbd7000ffdbdfa06b00002b080002149ae1b57c95a5296bc6be1198ca3b5c8c7ec3127c82016091000000", @ANYBLOB="e4b3fcdfaf28d2f54df080980ecba931899b8640680e3571ef9f074dae8564120ea7471c8734c4922298574f4abd2d6257e44b155e19c37e446191e681261f836eaf0cef84dce214261ca313fcce6833276cb1e4ba13668bbfeb3b5024ed222970f99e7b7eddabb042e3695f67e387c26fa634b4d9bfda45b262ff431c6d5678dcf7fed495c7f6bc172da0e3340200edadc95de0995d94dd27b74936480013cb1bac1bbd842f1dbd4cf73f2a5311fa106c0c63b59bfa82276f2a1aadff1ad04e31a1ad41059976b940f5452f93e868863e967bd1ffb3e1515b98a42d0ad4a943a4a1e953f73052c3a841cfcb0c79e84b5815001812b872"], 0x3}, 0x1, 0x0, 0x0, 0x4}, 0x40025) sendmsg$NLBL_CIPSOV4_C_LIST(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f00000002c0)={&(0x7f00000017c0)=ANY=[@ANYBLOB="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", @ANYRES16=r6, @ANYRESDEC=r4], 0x1d4}, 0x1, 0x0, 0x0, 0x4008000}, 0x2400c014) ioctl$BTRFS_IOC_SCRUB(r3, 0xc400941b, &(0x7f0000000280)={r4, 0x8, 0xffffffffffff0000, 0x1}) ioctl$BTRFS_IOC_SNAP_DESTROY_V2(r0, 0x5000943f, &(0x7f0000000100)={{r2}, 0x0, 0x8, @inherit={0x60, &(0x7f0000000040)={0x1, 0x3, 0x200, 0x4, {0x3, 0x3, 0x6d, 0x20, 0x1}, [0x3ff, 0x3, 0x0]}}, @devid=r4}) r7 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f00000000c0)={0x0, {0x0, 0x0, 0x0, 0x0, 0x5}}) [ 421.606885] EXT4-fs (loop3): mounted filesystem without journal. Opts: ,errors=continue 16:48:12 executing program 5: creat(&(0x7f0000000280)='./file0\x00', 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40186, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) 16:48:12 executing program 0: creat(&(0x7f0000000280)='./file0\x00', 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) 16:48:12 executing program 3 (fault-call:1 fault-nth:55): creat(&(0x7f0000000280)='./file0\x00', 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) 16:48:12 executing program 4: open(&(0x7f0000000080)='./file0\x00', 0x40c5, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) dup(r0) syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x1000, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/net/tun\x00', 0x0, 0x0) dup(r1) r2 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={0x0}}, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) r4 = dup(r3) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=ANY=[@ANYBLOB="280000001d000100000000000000000007000000", @ANYRES32=r4, @ANYBLOB="80b586000a0002"], 0x28}}, 0x0) sendmmsg$alg(r2, &(0x7f00000000c0), 0x492492492492627, 0x0) 16:48:12 executing program 2: creat(&(0x7f0000000280)='./file0\x00', 0x0) close(0xffffffffffffffff) write$binfmt_script(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40008, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) [ 421.772962] device lo entered promiscuous mode 16:48:12 executing program 0: creat(&(0x7f0000000280)='./file0\x00', 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) [ 421.849992] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue [ 421.868633] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue [ 421.872038] FAULT_INJECTION: forcing a failure. [ 421.872038] name failslab, interval 1, probability 0, space 0, times 0 [ 421.906439] CPU: 1 PID: 23870 Comm: syz-executor.3 Not tainted 4.19.169-syzkaller #0 [ 421.914343] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 421.923695] Call Trace: [ 421.926298] dump_stack+0x1fc/0x2ef [ 421.929933] should_fail.cold+0xa/0xf [ 421.933740] ? setup_fault_attr+0x200/0x200 [ 421.938063] ? lock_acquire+0x170/0x3c0 [ 421.942070] __should_failslab+0x115/0x180 [ 421.946311] should_failslab+0x5/0x10 [ 421.950121] kmem_cache_alloc_trace+0x284/0x380 [ 421.954807] prealloc_shrinker+0x8d/0x340 [ 421.954824] register_shrinker+0x13/0x40 [ 421.954840] ext4_es_register_shrinker+0x291/0x340 [ 421.954855] ext4_fill_super+0x65f7/0xc820 [ 421.954887] ? ext4_calculate_overhead+0x11c0/0x11c0 [ 421.977316] ? snprintf+0xbb/0xf0 [ 421.980786] ? wait_for_completion_io+0x10/0x10 [ 421.985460] ? set_blocksize+0x163/0x3f0 [ 421.989532] mount_bdev+0x2fc/0x3b0 [ 421.993165] ? ext4_calculate_overhead+0x11c0/0x11c0 [ 421.998271] mount_fs+0xa3/0x310 [ 422.001645] vfs_kern_mount.part.0+0x68/0x470 [ 422.006147] do_mount+0x113c/0x2f10 [ 422.009777] ? lock_acquire+0x170/0x3c0 [ 422.013753] ? check_preemption_disabled+0x41/0x280 [ 422.018772] ? copy_mount_string+0x40/0x40 [ 422.023009] ? copy_mount_options+0x59/0x380 [ 422.027419] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 422.032438] ? kmem_cache_alloc_trace+0x323/0x380 [ 422.037284] ? copy_mount_options+0x26f/0x380 [ 422.041784] ksys_mount+0xcf/0x130 [ 422.045329] __x64_sys_mount+0xba/0x150 [ 422.049304] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 422.053886] do_syscall_64+0xf9/0x620 [ 422.057689] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 422.062877] RIP: 0033:0x460c6a [ 422.066069] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 ad 89 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 8a 89 fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 422.084969] RSP: 002b:00007fb3ea55ea78 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 422.092696] RAX: ffffffffffffffda RBX: 00007fb3ea55eb10 RCX: 0000000000460c6a [ 422.099965] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007fb3ea55ead0 [ 422.107236] RBP: 00007fb3ea55ead0 R08: 00007fb3ea55eb10 R09: 0000000020000000 [ 422.107798] Y­4`Ò˜: renamed from lo [ 422.114518] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000020000000 [ 422.114527] R13: 0000000020000100 R14: 0000000020000200 R15: 0000000020013000 16:48:12 executing program 4: open(&(0x7f0000000080)='./file0\x00', 0x40c5, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$tun(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/net/tun\x00', 0x0, 0x0) dup(r2) r3 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={0x0}}, 0x0) r4 = socket$inet_udplite(0x2, 0x2, 0x88) r5 = dup(r4) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=ANY=[@ANYBLOB="280000001d000100000000000000000007000000", @ANYRES32=r5, @ANYBLOB="80b586000a0002"], 0x28}}, 0x0) sendmmsg$alg(r3, &(0x7f00000000c0), 0x492492492492627, 0x0) 16:48:12 executing program 4: open(&(0x7f0000000080)='./file0\x00', 0x40c5, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$tun(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/net/tun\x00', 0x0, 0x0) dup(r2) r3 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={0x0}}, 0x0) r4 = socket$inet_udplite(0x2, 0x2, 0x88) r5 = dup(r4) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=ANY=[@ANYBLOB="280000001d000100000000000000000007000000", @ANYRES32=r5, @ANYBLOB="80b586000a0002"], 0x28}}, 0x0) sendmmsg$alg(r3, &(0x7f00000000c0), 0x492492492492627, 0x0) 16:48:12 executing program 2: creat(&(0x7f0000000280)='./file0\x00', 0x0) close(0xffffffffffffffff) write$binfmt_script(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40009, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) 16:48:12 executing program 5: creat(&(0x7f0000000280)='./file0\x00', 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4019d, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) 16:48:12 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x9) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f00000000c0)={0x0, {0x0, 0x0, 0x0, 0x0, 0x5}}) 16:48:12 executing program 0: creat(&(0x7f0000000280)='./file0\x00', 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) 16:48:12 executing program 3 (fault-call:1 fault-nth:56): creat(&(0x7f0000000280)='./file0\x00', 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d90000000f0000000100000000000000000000000020000000200000200000002cc4645f2cc4645f0100ffff53ef0100010000002cc4645f000000000000000001000000000000000b0000008000000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e3338363633343038350000000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000000000000000000000000000000000000d9ca5cac99fd4329af4dde786c1a5d13010040000c000000000000002cc4645f", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) 16:48:12 executing program 4: open(&(0x7f0000000080)='./file0\x00', 0x40c5, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$tun(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/net/tun\x00', 0x0, 0x0) dup(r2) r3 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={0x0}}, 0x0) r4 = socket$inet_udplite(0x2, 0x2, 0x88) r5 = dup(r4) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=ANY=[@ANYBLOB="280000001d000100000000000000000007000000", @ANYRES32=r5, @ANYBLOB="80b586000a0002"], 0x28}}, 0x0) sendmmsg$alg(r3, &(0x7f00000000c0), 0x492492492492627, 0x0) [ 422.403068] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue [ 422.416092] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue 16:48:12 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x0, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f0000000040)={0xfc01, {0x7fffffff, 0x7fff, 0x3, 0x8, 0x0, 0x4}}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f00000000c0)={0x0, {0x0, 0x0, 0x0, 0x0, 0x5}}) [ 422.461111] FAULT_INJECTION: forcing a failure. [ 422.461111] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 422.482828] CPU: 0 PID: 23912 Comm: syz-executor.3 Not tainted 4.19.169-syzkaller #0 [ 422.490737] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 422.500082] Call Trace: [ 422.502679] dump_stack+0x1fc/0x2ef [ 422.506327] should_fail.cold+0xa/0xf 16:48:12 executing program 4: open(&(0x7f0000000080)='./file0\x00', 0x40c5, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x1000, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/net/tun\x00', 0x0, 0x0) dup(r0) r1 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={0x0}}, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = dup(r2) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=ANY=[@ANYBLOB="280000001d000100000000000000000007000000", @ANYRES32=r3, @ANYBLOB="80b586000a0002"], 0x28}}, 0x0) sendmmsg$alg(r1, &(0x7f00000000c0), 0x492492492492627, 0x0) [ 422.510134] ? setup_fault_attr+0x200/0x200 [ 422.514477] __alloc_pages_nodemask+0x239/0x2890 [ 422.519234] ? kasan_kmalloc+0x139/0x160 [ 422.523297] ? mark_held_locks+0xf0/0xf0 [ 422.527366] ? do_syscall_64+0xf9/0x620 [ 422.531330] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 422.536679] ? gfp_pfmemalloc_allowed+0x150/0x150 [ 422.541509] ? mark_held_locks+0xf0/0xf0 [ 422.545568] ? __debug_object_init+0x410/0x9b0 [ 422.550235] ? mark_held_locks+0xa6/0xf0 [ 422.554292] ? _raw_spin_unlock_irqrestore+0x79/0xe0 [ 422.559395] alloc_pages_current+0x193/0x2a0 [ 422.563794] ? __debug_object_init+0x410/0x9b0 [ 422.568385] get_zeroed_page+0x10/0x40 [ 422.572263] ext4_calculate_overhead+0xfb/0x11c0 [ 422.577013] ext4_fill_super+0x9681/0xc820 [ 422.581242] ? ext4_calculate_overhead+0x11c0/0x11c0 [ 422.586341] ? snprintf+0xbb/0xf0 [ 422.589831] ? wait_for_completion_io+0x10/0x10 [ 422.594492] ? set_blocksize+0x163/0x3f0 [ 422.598549] mount_bdev+0x2fc/0x3b0 [ 422.602159] ? ext4_calculate_overhead+0x11c0/0x11c0 [ 422.607277] mount_fs+0xa3/0x310 [ 422.610654] vfs_kern_mount.part.0+0x68/0x470 [ 422.615154] do_mount+0x113c/0x2f10 [ 422.618771] ? lock_acquire+0x170/0x3c0 [ 422.622754] ? check_preemption_disabled+0x41/0x280 [ 422.627760] ? copy_mount_string+0x40/0x40 [ 422.632687] ? copy_mount_options+0x59/0x380 [ 422.637086] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 422.642089] ? kmem_cache_alloc_trace+0x323/0x380 [ 422.646922] ? copy_mount_options+0x26f/0x380 [ 422.651406] ksys_mount+0xcf/0x130 [ 422.654940] __x64_sys_mount+0xba/0x150 [ 422.658922] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 422.663510] do_syscall_64+0xf9/0x620 [ 422.667314] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 422.672496] RIP: 0033:0x460c6a [ 422.675672] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 ad 89 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 8a 89 fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 422.694568] RSP: 002b:00007fb3ea55ea78 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 422.702274] RAX: ffffffffffffffda RBX: 00007fb3ea55eb10 RCX: 0000000000460c6a [ 422.709529] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007fb3ea55ead0 [ 422.716790] RBP: 00007fb3ea55ead0 R08: 00007fb3ea55eb10 R09: 0000000020000000 [ 422.724052] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000020000000 [ 422.731317] R13: 0000000020000100 R14: 0000000020000200 R15: 0000000020013000 16:48:13 executing program 5: creat(&(0x7f0000000280)='./file0\x00', 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x401c0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) 16:48:13 executing program 3 (fault-call:1 fault-nth:57): creat(&(0x7f0000000280)='./file0\x00', 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) 16:48:13 executing program 0: creat(&(0x7f0000000280)='./file0\x00', 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000004000100000c000000d90000000f0000000100000000000000000000000020000000200000200000002cc4645f2cc4645f0100ffff53ef0100010000002cc4645f000000000000000001000000000000000b0000008000000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e3338363633343038350000000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000000000000000000000000000000000000d9ca5cac99fd4329af4dde786c1a5d13010040000c000000000000002cc4645f", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) 16:48:13 executing program 2: creat(&(0x7f0000000280)='./file0\x00', 0x0) close(0xffffffffffffffff) write$binfmt_script(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4000d, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) 16:48:13 executing program 1: openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x0, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='attr/fscreate\x00') ioctl$UI_ABS_SETUP(r2, 0x401c5504, &(0x7f00000000c0)={0x6, {0x0, 0x1, 0x0, 0x400, 0x8, 0x8403}}) socket$nl_route(0x10, 0x3, 0x0) 16:48:13 executing program 4: open(&(0x7f0000000080)='./file0\x00', 0x40c5, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x1000, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/net/tun\x00', 0x0, 0x0) dup(r0) r1 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={0x0}}, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = dup(r2) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=ANY=[@ANYBLOB="280000001d000100000000000000000007000000", @ANYRES32=r3, @ANYBLOB="80b586000a0002"], 0x28}}, 0x0) sendmmsg$alg(r1, &(0x7f00000000c0), 0x492492492492627, 0x0) [ 422.929698] FAULT_INJECTION: forcing a failure. [ 422.929698] name failslab, interval 1, probability 0, space 0, times 0 16:48:13 executing program 0: creat(&(0x7f0000000280)='./file0\x00', 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000005000100000c000000d90000000f0000000100000000000000000000000020000000200000200000002cc4645f2cc4645f0100ffff53ef0100010000002cc4645f000000000000000001000000000000000b0000008000000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e3338363633343038350000000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000000000000000000000000000000000000d9ca5cac99fd4329af4dde786c1a5d13010040000c000000000000002cc4645f", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) [ 422.971017] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue [ 423.007391] CPU: 0 PID: 23938 Comm: syz-executor.3 Not tainted 4.19.169-syzkaller #0 16:48:13 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x0, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) dup(r1) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f00000000c0)={0x0, {0x0, 0x0, 0x0, 0x0, 0x5}}) [ 423.015312] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 423.024672] Call Trace: [ 423.027275] dump_stack+0x1fc/0x2ef [ 423.030916] should_fail.cold+0xa/0xf [ 423.034727] ? setup_fault_attr+0x200/0x200 [ 423.039060] ? lock_acquire+0x170/0x3c0 [ 423.043051] __should_failslab+0x115/0x180 [ 423.047296] should_failslab+0x5/0x10 [ 423.051102] __kmalloc+0x2ab/0x3c0 [ 423.054646] ? __alloc_workqueue_key+0x789/0xed0 [ 423.059419] __alloc_workqueue_key+0x789/0xed0 [ 423.064011] ? lockdep_hardirqs_on+0x3a8/0x5c0 16:48:13 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x0, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = creat(&(0x7f0000000280)='./file0\x00', 0x1) fallocate(r2, 0x1a, 0x4, 0x3a) close(r2) getpeername$netrom(r2, &(0x7f0000000040)={{0x3, @rose}, [@netrom, @netrom, @netrom, @null, @bcast, @remote, @rose]}, &(0x7f0000000100)=0x48) r3 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f00000000c0)={0x0, {0x0, 0x0, 0x0, 0x0, 0x5}}) [ 423.068610] ? workqueue_sysfs_register+0x3e0/0x3e0 [ 423.068637] ext4_fill_super+0x6edb/0xc820 [ 423.068666] ? ext4_calculate_overhead+0x11c0/0x11c0 [ 423.082976] ? snprintf+0xbb/0xf0 [ 423.086443] ? wait_for_completion_io+0x10/0x10 [ 423.091150] ? set_blocksize+0x163/0x3f0 [ 423.095232] mount_bdev+0x2fc/0x3b0 [ 423.098866] ? ext4_calculate_overhead+0x11c0/0x11c0 [ 423.103980] mount_fs+0xa3/0x310 [ 423.107379] vfs_kern_mount.part.0+0x68/0x470 [ 423.111883] do_mount+0x113c/0x2f10 [ 423.115523] ? lock_acquire+0x170/0x3c0 [ 423.119506] ? check_preemption_disabled+0x41/0x280 [ 423.124526] ? copy_mount_string+0x40/0x40 [ 423.124541] ? copy_mount_options+0x59/0x380 [ 423.124559] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 423.124573] ? kmem_cache_alloc_trace+0x323/0x380 [ 423.124591] ? copy_mount_options+0x26f/0x380 [ 423.124608] ksys_mount+0xcf/0x130 [ 423.124627] __x64_sys_mount+0xba/0x150 [ 423.138245] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 423.138261] do_syscall_64+0xf9/0x620 [ 423.138279] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 423.138293] RIP: 0033:0x460c6a 16:48:13 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x0, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) r3 = creat(&(0x7f0000000280)='./file0\x00', 0x1) r4 = openat$full(0xffffffffffffff9c, &(0x7f0000000440)='/dev/full\x00', 0x8000, 0x0) sendmsg$IPCTNL_MSG_TIMEOUT_NEW(r4, &(0x7f0000000540)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000500)={&(0x7f0000000980)=ANY=[@ANYBLOB="20000000000801010000000000000000000000090900010073797a3000000000ed80d144d0f98fbefe21e58813137e127b9e9313a1adfb9da2415b559cfdc2930fde728f54d1db58e9dada65bbade445f14818de324e818168186e40cf015f021f1b99203af00c60a7b05b8b6228cdaa2840af5e04d50860283b2e7480e9680fd21626b0706ba3d896cad4f7dd89608f7de6873ecb72d3cdae682f5448de5aafd5754681d462f9c37221245c3db0ed199658eac41067f08ae2cd22267a9c94c71a106adc3276f1306d76767383c64c037bbde4e9a8e6a6b0ce26ab105560c01798c426f6b5f718aefb06474390f35435d9728fb81e17b6e30092aa117223450b45352ce28df554e13e0bff522fc8b1170839fd74c7"], 0x20}, 0x1, 0x0, 0x0, 0x4008000}, 0x4000044) close(r3) r5 = syz_open_dev$tty20(0xc, 0x4, 0x0) r6 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/sys/net/ipv4/vs/sync_retries\x00', 0x2, 0x0) dup3(r5, r6, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r2, 0x89f5, &(0x7f00000007c0)={'sit0\x00', &(0x7f0000000740)={'syztnl1\x00', 0x0, 0x4, 0x48, 0x7, 0x1, 0x70, @private0={0xfc, 0x0, [], 0x1}, @private1, 0x7, 0x1, 0xffffffff, 0x8}}) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000800)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f00000008c0)={&(0x7f0000000940)=@ipv6_deladdrlabel={0x1c, 0x49, 0x200, 0x70bd25, 0x25dfdbfe, {0xa, 0x0, 0x30, 0x0, r7, 0x7}}, 0x1c}, 0x1, 0x0, 0x0, 0x45}, 0x4000000) r8 = creat(&(0x7f0000000280)='./file0\x00', 0x1) mount$9p_fd(0x0, &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='9p\x00', 0x108000, &(0x7f0000000640)={'trans=fd,', {'rfdno', 0x3d, r3}, 0x2c, {'wfdno', 0x3d, r4}, 0x2c, {[{@debug={'debug'}}, {@version_L='version=9p2000.L'}, {@debug={'debug', 0x3d, 0x1f}}, {@access_any='access=any'}, {@dfltgid={'dfltgid'}}, {@nodevmap='nodevmap'}, {@cache_mmap='cache=mmap'}, {@cache_fscache='cache=fscache'}]}}) close(r8) bpf$ITER_CREATE(0x21, &(0x7f0000000580)={r8}, 0x8) dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f00000000c0)={0x0, {0x0, 0x0, 0x0, 0x0, 0x5}}) ioctl$FS_IOC_GETFSMAP(r0, 0xc0c0583b, &(0x7f0000000100)=ANY=[@ANYBLOB="00000000000000000a0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000009000000070000003a490000000000000700000000000000090000000000000007000000000000000000000000000000000000000000000000000000000000000008000040000000030000000000000001000080000000000000000000000000880a00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f300"/832]) [ 423.171805] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 ad 89 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 8a 89 fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 423.190709] RSP: 002b:00007fb3ea55ea78 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 423.198409] RAX: ffffffffffffffda RBX: 00007fb3ea55eb10 RCX: 0000000000460c6a [ 423.205663] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007fb3ea55ead0 [ 423.212929] RBP: 00007fb3ea55ead0 R08: 00007fb3ea55eb10 R09: 0000000020000000 16:48:13 executing program 0: creat(&(0x7f0000000280)='./file0\x00', 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) [ 423.220194] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000020000000 [ 423.227450] R13: 0000000020000100 R14: 0000000020000200 R15: 0000000020013000 [ 423.237764] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue 16:48:13 executing program 4: open(&(0x7f0000000080)='./file0\x00', 0x40c5, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x1000, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/net/tun\x00', 0x0, 0x0) dup(r0) r1 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={0x0}}, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = dup(r2) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=ANY=[@ANYBLOB="280000001d000100000000000000000007000000", @ANYRES32=r3, @ANYBLOB="80b586000a0002"], 0x28}}, 0x0) sendmmsg$alg(r1, &(0x7f00000000c0), 0x492492492492627, 0x0) [ 423.266769] EXT4-fs: failed to create workqueue [ 423.271642] EXT4-fs (loop3): mount failed 16:48:13 executing program 5: creat(&(0x7f0000000280)='./file0\x00', 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x401c7, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) 16:48:13 executing program 2: creat(&(0x7f0000000280)='./file0\x00', 0x0) close(0xffffffffffffffff) write$binfmt_script(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4000e, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) 16:48:13 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x0, 0x0) r1 = creat(&(0x7f0000000280)='./file0\x00', 0x1) close(r1) ioctl$UI_DEV_DESTROY(r1, 0x5502) sendmsg(r1, &(0x7f0000002680)={&(0x7f0000000100)=@un=@abs={0x1, 0x0, 0x4e23}, 0x80, &(0x7f0000002440)=[{&(0x7f0000000080)="7513157326120dd0a6a415044b9fcdce8fa8a136594c0919a4fe651beabdbfa3a7e7fa3877cdb1b1ebb20ff136ff3c65d3e10f", 0x33}, {&(0x7f00000002c0)="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", 0x1000}, {&(0x7f0000000180)="9652fb28cffb4e74603f60caf098e10ff4e4f0db47904ea8eb4f76be044241259236599a6a3e664626bcfbfc8bc07182929114c201b19c6c7f8a5e2c48455dfbcc60782be093c53bf2f0bf71ccbc324ff9782ebe7a3cdb1e5b8e39d1c30d09ae14eac3b81b244a8c813ca65f9d36a0e6fb0ab6a3e56c4378934131598a6620775b2efdb5a53466535b808cb8662fcd032f0e3972f9f895d1ad8774561a5844db18eac3fa332f6d7ac1cfff5ae798a43198a0f56a585ff919f24369a7f675eff2de32df57afe907ef3a521e61b04c44d4957d5f81203b36656fb4de64c29cecedadad61776fd3c871", 0xe8}, {&(0x7f00000012c0)="be0491d305d7daaa5906e547ac9aa02e96abcb65cb6c5e5a453679a4ee648c6a4b606d8771347c9f4753e839b8be2ba7b2123c8503bf", 0x36}, {&(0x7f0000001300)="29c9e4c838d1d0c0ba1f6147cd5181f1d1493ddbcd8b68f8455d34c2c3f3ecd86504d923c8615f6aa5eb08655e1fa2025b07198751b78aa3ac963fd4c00daef05ecbd50a26b36ce03a5bf4996f9c80df46d9d209a45f18e62872d566acc42d9da0de6034b46e8f61eac8fe5adb4f0115f65412ae0ed19b2be49e68b65967330d988490eb129efdb52262a1b4249d39702f2d24edf4", 0x95}, {&(0x7f00000013c0)="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", 0x1000}, {&(0x7f00000023c0)="baca03c2bc6cd5812577dd48c8d949590e301609b5eb56a921fbd45f3d4501a3679018b03bd9c23d64b617ef773f51fd0812dd825caa1595a2070c6e259021437682e9f0986a1fc09348803ef0f11daa2e8eff0ba9a57e3861631786bd5e3c6dce9606a82b8becdcc0b4685e95925410c0400db4c389e60862c3ab70c3ad", 0x7e}], 0x7, &(0x7f00000024c0)=[{0x98, 0x11, 0x6, "84c0180a4ac44134cd5360b3d5bc1e60a12b4ee00023b9010242b385091ac5f34181337982a99e95f3e6fd99455af3092b7dd6b2c804f76e441fe8be16eca2d6579bc2ef6d1d801d6e54885c44b7b43086aa5f26c9f530cd0827c28305aae2d074a85205d19eb1587c37a308de897ddcd0dfe9950ef10cc8afbe96c5e9c00f6d0d131c56f56235"}, {0x48, 0x110, 0xffffff81, "4617e5f585d0e218124ab924666226fb8e710f0b1f7d603eef039c3f0a7c0a576d1bed6218fb2e0b9327c039c2c01ba65c"}, {0x38, 0x16, 0xffff, "b45742267125f7163c45fac6d668fce1fec29647eadfc599f9d9da09f638fa7a6cbf"}, {0x88, 0x107, 0x1, "60f238e75d53146d24a9d94a0d3489fc44467271779890d8a313ef05f32960a144daba4741cc5033bf11c7d02e2c550f958694dd92b5bb23e84757d759f131bcdfe7821a3876c14b7c1beaa229d32407e697ae30a1e6d7e04b5c8ed526871200ebb2c592dd55270d5b2c1465cb087f99e748707d2a0749e8"}], 0x1a0}, 0x40800) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r3 = dup(r2) chroot(&(0x7f0000000040)='./file0\x00') ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f00000000c0)={0x0, {0x0, 0x0, 0x0, 0x0, 0x5}}) 16:48:13 executing program 0: creat(&(0x7f0000000280)='./file0\x00', 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) 16:48:13 executing program 3 (fault-call:1 fault-nth:58): creat(&(0x7f0000000280)='./file0\x00', 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d90000000f0000000100000000000000000000000020000000200000200000002cc4645f2cc4645f0100ffff53ef0100010000002cc4645f000000000000000001000000000000000b0000008000000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e3338363633343038350000000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000000000000000000000000000000000000d9ca5cac99fd4329af4dde786c1a5d13010040000c000000000000002cc4645f", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) 16:48:14 executing program 4: open(&(0x7f0000000080)='./file0\x00', 0x40c5, 0x0) r0 = dup(0xffffffffffffffff) syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x1000, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$tun(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/net/tun\x00', 0x0, 0x0) dup(r1) r2 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={0x0}}, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) r4 = dup(r3) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=ANY=[@ANYBLOB="280000001d000100000000000000000007000000", @ANYRES32=r4, @ANYBLOB="80b586000a0002"], 0x28}}, 0x0) sendmmsg$alg(r2, &(0x7f00000000c0), 0x492492492492627, 0x0) 16:48:14 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x0, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f00000000c0)={0x0, {0x0, 0xfffffffe, 0x0, 0x0, 0x5}}) r3 = creat(&(0x7f0000000280)='./file0\x00', 0x1) close(r3) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x40082406, &(0x7f0000000040)='{-\x00') [ 423.638243] FAULT_INJECTION: forcing a failure. [ 423.638243] name failslab, interval 1, probability 0, space 0, times 0 [ 423.651778] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue 16:48:14 executing program 0: creat(&(0x7f0000000280)='./file0\x00', 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) [ 423.682850] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue [ 423.693074] CPU: 0 PID: 23992 Comm: syz-executor.3 Not tainted 4.19.169-syzkaller #0 [ 423.700990] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 423.710350] Call Trace: [ 423.712950] dump_stack+0x1fc/0x2ef [ 423.716584] should_fail.cold+0xa/0xf [ 423.716603] ? setup_fault_attr+0x200/0x200 [ 423.716619] ? lock_acquire+0x170/0x3c0 [ 423.716645] __should_failslab+0x115/0x180 16:48:14 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x0, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x0) lseek(r1, 0x8, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f00000000c0)={0x0, {0x0, 0x0, 0x0, 0x0, 0x5}}) [ 423.728732] should_failslab+0x5/0x10 [ 423.736774] kmem_cache_alloc_trace+0x284/0x380 [ 423.736794] prealloc_shrinker+0x8d/0x340 [ 423.736810] register_shrinker+0x13/0x40 [ 423.736826] ext4_es_register_shrinker+0x291/0x340 [ 423.736842] ext4_fill_super+0x65f7/0xc820 [ 423.736880] ? ext4_calculate_overhead+0x11c0/0x11c0 [ 423.736896] ? snprintf+0xbb/0xf0 [ 423.767443] ? wait_for_completion_io+0x10/0x10 [ 423.772124] ? set_blocksize+0x163/0x3f0 [ 423.776200] mount_bdev+0x2fc/0x3b0 16:48:14 executing program 4: open(&(0x7f0000000080)='./file0\x00', 0x40c5, 0x0) r0 = dup(0xffffffffffffffff) syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x1000, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$tun(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/net/tun\x00', 0x0, 0x0) dup(r1) r2 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={0x0}}, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) r4 = dup(r3) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=ANY=[@ANYBLOB="280000001d000100000000000000000007000000", @ANYRES32=r4, @ANYBLOB="80b586000a0002"], 0x28}}, 0x0) sendmmsg$alg(r2, &(0x7f00000000c0), 0x492492492492627, 0x0) [ 423.779845] ? ext4_calculate_overhead+0x11c0/0x11c0 [ 423.784954] mount_fs+0xa3/0x310 [ 423.788341] vfs_kern_mount.part.0+0x68/0x470 [ 423.792848] do_mount+0x113c/0x2f10 [ 423.796487] ? do_raw_spin_unlock+0x171/0x230 [ 423.800991] ? check_preemption_disabled+0x41/0x280 [ 423.806019] ? copy_mount_string+0x40/0x40 [ 423.810256] ? copy_mount_options+0x59/0x380 [ 423.810277] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 423.810293] ? kmem_cache_alloc_trace+0x323/0x380 [ 423.810311] ? copy_mount_options+0x26f/0x380 [ 423.810327] ksys_mount+0xcf/0x130 16:48:14 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x0, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f00000000c0)={0x0, {0x0, 0x0, 0x0, 0x0, 0x5}}) r3 = openat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x580, 0x2) ioctl$KVM_CREATE_PIT2(r3, 0x4040ae77, &(0x7f0000000080)={0x7e14a6f9}) [ 423.832679] __x64_sys_mount+0xba/0x150 [ 423.832698] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 423.832713] do_syscall_64+0xf9/0x620 [ 423.832728] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 423.832743] RIP: 0033:0x460c6a [ 423.853616] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 ad 89 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 8a 89 fb ff c3 66 0f 1f 84 00 00 00 00 00 16:48:14 executing program 5: creat(&(0x7f0000000280)='./file0\x00', 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x401cc, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d90000000f0000000100000000000000000000000020000000200000200000002cc4645f2cc4645f0100ffff53ef0100010000002cc4645f000000000000000001000000000000000b0000008000000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e3338363633343038350000000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000000000000000000000000000000000000d9ca5cac99fd4329af4dde786c1a5d13010040000c000000000000002cc4645f", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) 16:48:14 executing program 4: open(&(0x7f0000000080)='./file0\x00', 0x40c5, 0x0) r0 = dup(0xffffffffffffffff) syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x1000, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$tun(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/net/tun\x00', 0x0, 0x0) dup(r1) r2 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={0x0}}, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) r4 = dup(r3) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=ANY=[@ANYBLOB="280000001d000100000000000000000007000000", @ANYRES32=r4, @ANYBLOB="80b586000a0002"], 0x28}}, 0x0) sendmmsg$alg(r2, &(0x7f00000000c0), 0x492492492492627, 0x0) [ 423.853625] RSP: 002b:00007fb3ea55ea78 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 423.853641] RAX: ffffffffffffffda RBX: 00007fb3ea55eb10 RCX: 0000000000460c6a [ 423.853649] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007fb3ea55ead0 [ 423.853658] RBP: 00007fb3ea55ead0 R08: 00007fb3ea55eb10 R09: 0000000020000000 [ 423.853667] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000020000000 [ 423.853675] R13: 0000000020000100 R14: 0000000020000200 R15: 0000000020013000 16:48:14 executing program 2: creat(&(0x7f0000000280)='./file0\x00', 0x0) close(0xffffffffffffffff) write$binfmt_script(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40010, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) 16:48:14 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x0, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f00000000c0)={0x0, {0x0, 0x0, 0x0, 0x0, 0x5}}) r3 = creat(&(0x7f0000000280)='./file0\x00', 0x1) close(r3) ioctl$F2FS_IOC_MOVE_RANGE(r2, 0xc020f509, &(0x7f0000000040)={r2, 0x1, 0x0, 0x1000}) ioctl$VIDIOC_SUBDEV_G_FRAME_INTERVAL(r4, 0xc0305615, &(0x7f0000000080)={0x0, {0x100007, 0x6}}) 16:48:14 executing program 0: creat(&(0x7f0000000280)='./file0\x00', 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) 16:48:14 executing program 3 (fault-call:1 fault-nth:59): creat(&(0x7f0000000280)='./file0\x00', 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) 16:48:14 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup(r0) syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x1000, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$tun(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/net/tun\x00', 0x0, 0x0) dup(r2) r3 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={0x0}}, 0x0) r4 = socket$inet_udplite(0x2, 0x2, 0x88) r5 = dup(r4) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=ANY=[@ANYBLOB="280000001d000100000000000000000007000000", @ANYRES32=r5, @ANYBLOB="80b586000a0002"], 0x28}}, 0x0) sendmmsg$alg(r3, &(0x7f00000000c0), 0x492492492492627, 0x0) [ 424.117950] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue [ 424.161645] FAULT_INJECTION: forcing a failure. [ 424.161645] name failslab, interval 1, probability 0, space 0, times 0 [ 424.175317] CPU: 0 PID: 24037 Comm: syz-executor.3 Not tainted 4.19.169-syzkaller #0 [ 424.180518] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue [ 424.183221] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 424.183227] Call Trace: [ 424.183249] dump_stack+0x1fc/0x2ef [ 424.183270] should_fail.cold+0xa/0xf [ 424.183287] ? setup_fault_attr+0x200/0x200 [ 424.183303] ? lock_acquire+0x170/0x3c0 [ 424.183328] __should_failslab+0x115/0x180 [ 424.183343] should_failslab+0x5/0x10 [ 424.183357] kmem_cache_alloc_trace+0x284/0x380 [ 424.183374] mb_cache_create+0x4f/0x4c0 [ 424.183390] ext4_fill_super+0x97b1/0xc820 [ 424.183429] ? ext4_calculate_overhead+0x11c0/0x11c0 [ 424.245178] ? snprintf+0xbb/0xf0 [ 424.248623] ? wait_for_completion_io+0x10/0x10 [ 424.253282] ? set_blocksize+0x163/0x3f0 [ 424.257337] mount_bdev+0x2fc/0x3b0 [ 424.260948] ? ext4_calculate_overhead+0x11c0/0x11c0 [ 424.266049] mount_fs+0xa3/0x310 [ 424.269402] vfs_kern_mount.part.0+0x68/0x470 [ 424.273886] do_mount+0x113c/0x2f10 [ 424.277499] ? do_raw_spin_unlock+0x171/0x230 [ 424.281979] ? check_preemption_disabled+0x41/0x280 [ 424.286982] ? copy_mount_string+0x40/0x40 [ 424.291215] ? copy_mount_options+0x59/0x380 [ 424.295622] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 424.300621] ? kmem_cache_alloc_trace+0x323/0x380 [ 424.305487] ? copy_mount_options+0x26f/0x380 [ 424.309981] ksys_mount+0xcf/0x130 [ 424.313508] __x64_sys_mount+0xba/0x150 [ 424.317469] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 424.322037] do_syscall_64+0xf9/0x620 [ 424.325827] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 424.331001] RIP: 0033:0x460c6a [ 424.334179] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 ad 89 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 8a 89 fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 424.353065] RSP: 002b:00007fb3ea55ea78 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 16:48:14 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x0, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) r3 = openat$incfs(r2, &(0x7f0000000040)='.log\x00', 0x80000, 0xa) ioctl$UI_DEV_SETUP(r3, 0x405c5503, &(0x7f0000000100)={{0x4, 0x80, 0x5, 0x9}, 'syz0\x00', 0x46}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x3f) r4 = syz_mount_image$vxfs(&(0x7f0000000180)='vxfs\x00', &(0x7f00000001c0)='./file0\x00', 0xdba9, 0x3, &(0x7f0000000380)=[{&(0x7f0000000200)="922b870da34890a4d85eef231a0f6bc997a87d44a7ab36d64fc227b487cb76da68ae7cb9a5dbb36694b172e7acae13755e149418c690472106ce0d383a1a48373b389833a7e5d12d2af11defc0f5563ff8e37b9ffbf5da6abf356cc825b080cecbb7074d3ba1be75b4d04769e5ab0a35c270792e1c288a408d7afb83c5d1cecffca351f01e6c7a7b60be718f2cae1c53d9fced3082d0673cbb070ec010e92299668fd87c43b90bf0c7d53d1d", 0xac, 0x40}, {&(0x7f00000002c0)="225f5ae8d7600cc92babfd679c2ee8ff1b51687b26d7bd2fc67959fec08ad6cd845831778167e23205aceb29d049a487ec560984ed40bb737df9735d1a47586bacbb1ae994e7990d", 0x48, 0xda5}, {&(0x7f0000000340)="6afbe9ae0b19f077980dd77ead3d8588be0c05e8ad763b7f47930921d37d720f62bc08924b3dec4529de4f893fe0ecc56895", 0x32, 0x2}], 0x80000, &(0x7f0000000400)=ANY=[@ANYBLOB='.log\x00,syz0\x00,/dev/u\t\x00\x00\x00\x00\x00\x00\x00yz0\x00,,{,syz0\x00,syz0\x00,syz0\x00,uid>', @ANYRESDEC=0x0, @ANYBLOB=',seclabel,uid=', @ANYRESDEC=0x0, @ANYBLOB=',audit,\x00']) fcntl$getownex(r4, 0x10, &(0x7f0000000480)={0x0, 0x0}) r6 = creat(&(0x7f0000000280)='./file0\x00', 0x1) close(r6) ioctl$DRM_IOCTL_GET_CLIENT(r3, 0xc0286405, &(0x7f0000001bc0)={0x10000, 0x3, {r5}, {0xffffffffffffffff}, 0x2, 0x10001}) syz_mount_image$qnx4(&(0x7f0000000600)='qnx4\x00', &(0x7f0000000640)='./file0\x00', 0x3, 0x8, &(0x7f0000001b00)=[{&(0x7f0000000680)="0e6aa23f99834bcd18842e6326ee46f4260e64d3e6261fe498b36478c8aa0452017aa1c9956573bea9a229f9427542f3d9f0a00b968d261d1103e8047745cd603017ed1edcac237635f4af40adf80af086900987c2c4bc4e661f3d2b793f562473233fc95a92b9e8937e8b44d4c3530d72af4e1d502a1844b1948a5a7c5094056681f8caa20d79754b97027dc0a2199ef45322e304e5b2a1245fd7a976fb484494bd3cf4f2f0d5981a2829345ad6a6a8920492dc76e10ab408a9331752f72db0109c6b9e1c25188acbc2115b", 0xcc, 0x7fffffff}, {&(0x7f0000000780)="0d741c008c9b967112b8c20adc32430878597dec41a3b1e4efe7065154bf80b0ff294bbd810c24afcbcc1a403f9cc0e49039f8820591a239c9bcb87d003d68656bc753ecba6cb87ddf0505323f2917c3ebbde27faca8237015c77926569760fa95b4391fa089eb1b581d1446cf07423ee7cebae82d1062cbd26d8bfba46f00a457a7b791cb2b1530500019d71eb8d6a1eb198c727762c0f53d4d23017e54", 0x9e, 0x8}, {&(0x7f0000000840)="ecad9839c62b93f6587a7c8d2ba130832eb1f203c671657f45bb8cdc857dab0a2e71b2d6b1591675b921817e7ccfbd0f83fc11bcba51f4969f836e1234abdd92af219636b44e5cc670", 0x49, 0x9}, {&(0x7f00000008c0)="9d595e8b13769f17a63e4906230c1a0ff4ac78c0a5bae0", 0x17, 0x4}, {&(0x7f0000000900)="351094eb91a1a3af2895ca0b85fedfc175f8d1d6c1605a95fe949455b3780204f0332c445cbbeafb378443f79765fe15d9b3134635368c8699c492b895b4994f5774528c349ed8a6fcde558c8a861679cee844a18c900aa7bb321779f999179a5b324d387ad07292beb709a78a51c52164ac1daf71549e7cf59de40884ef24bf3c", 0x81, 0x7}, {&(0x7f00000009c0)="283bf19ffcc0d0b240d7f02a6af98f4f9da247ea593f098ee34f432e22db2ca01b3402ef07a2", 0x26, 0x7}, {&(0x7f0000000a00)="bf63f689539d2167af52bb725b4adc6abcc737e91ffd7ce53dcde2effa3afd3c68e12d74335ff91528fac82a68d783e5e94426feabe4c1aabf81e2a608711aa9f3907af798e1484cc27b6ea31d8db44f915f9a0e03b5eb2b7f87aee10db90be7dae6376d648abcfb5a96faea9e2c2bac6808ec9a90700a36be2c0bad234a7f3c8a6bfb98a2235f1daff0c9d8ea0fa5bda4cfdf0cb9d330c609d099dcf20bc39eed61e2832e215e04e40303bb719a289074975cfc7ab3c77923e5d51c6757fd0446ebb3d15a77ed38c34a4827f54f56782d0d1c7c320649734b43107aa879ac31097c78665153b58abaa3505fe9fa60403273b6a63503", 0xf6, 0x8}, {&(0x7f0000000b00)="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", 0x1000, 0xfff}], 0x2078, &(0x7f0000001c00)={[{}, {'/dev/uinput\x00'}, {'#^(^%h.*'}, {'\\*@^'}, {'/dev/uinput\x00'}, {'vxfs\x00'}, {'/dev/uinput\x00'}, {'security\x00'}, {'%[]/&'}, {'\''}], [{@fowner_lt={'fowner<', r7}}, {@subj_user={'subj_user', 0x3d, '!,,)^-'}}]}) getsockopt$IPT_SO_GET_INFO(r6, 0x0, 0x40, &(0x7f00000004c0)={'security\x00'}, &(0x7f0000000540)=0x54) r8 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000580)='/dev/vcsu\x00', 0x14d100, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r8, 0x4020ae46, &(0x7f00000005c0)={0x1ff, 0x3, 0x100000, 0x2000, &(0x7f0000ffb000/0x2000)=nil}) open(&(0x7f0000000080)='./file0\x00', 0x94000, 0x0) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f00000000c0)={0x0, {0x0, 0x0, 0x0, 0x0, 0x5}}) [ 424.360776] RAX: ffffffffffffffda RBX: 00007fb3ea55eb10 RCX: 0000000000460c6a [ 424.368029] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007fb3ea55ead0 [ 424.375284] RBP: 00007fb3ea55ead0 R08: 00007fb3ea55eb10 R09: 0000000020000000 [ 424.382553] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000020000000 [ 424.389905] R13: 0000000020000100 R14: 0000000020000200 R15: 0000000020013000 [ 424.402268] EXT4-fs (loop3): Failed to create ea_block_cache 16:48:14 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup(r0) syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x1000, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$tun(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/net/tun\x00', 0x0, 0x0) dup(r2) r3 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={0x0}}, 0x0) r4 = socket$inet_udplite(0x2, 0x2, 0x88) r5 = dup(r4) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=ANY=[@ANYBLOB="280000001d000100000000000000000007000000", @ANYRES32=r5, @ANYBLOB="80b586000a0002"], 0x28}}, 0x0) sendmmsg$alg(r3, &(0x7f00000000c0), 0x492492492492627, 0x0) 16:48:14 executing program 2: creat(&(0x7f0000000280)='./file0\x00', 0x0) close(0xffffffffffffffff) write$binfmt_script(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40014, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) 16:48:15 executing program 0: creat(&(0x7f0000000280)='./file0\x00', 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) 16:48:15 executing program 3 (fault-call:1 fault-nth:60): creat(&(0x7f0000000280)='./file0\x00', 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d90000000f0000000100000000000000000000000020000000200000200000002cc4645f2cc4645f0100ffff53ef0100010000002cc4645f000000000000000001000000000000000b0000008000000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e3338363633343038350000000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000000000000000000000000000000000000d9ca5cac99fd4329af4dde786c1a5d13010040000c000000000000002cc4645f", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) 16:48:15 executing program 5: creat(&(0x7f0000000280)='./file0\x00', 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x401cd, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) 16:48:15 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup(r0) syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x1000, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$tun(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/net/tun\x00', 0x0, 0x0) dup(r2) r3 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={0x0}}, 0x0) r4 = socket$inet_udplite(0x2, 0x2, 0x88) r5 = dup(r4) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=ANY=[@ANYBLOB="280000001d000100000000000000000007000000", @ANYRES32=r5, @ANYBLOB="80b586000a0002"], 0x28}}, 0x0) sendmmsg$alg(r3, &(0x7f00000000c0), 0x492492492492627, 0x0) 16:48:15 executing program 4: open(0x0, 0x40c5, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup(r0) syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x1000, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$tun(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/net/tun\x00', 0x0, 0x0) dup(r2) r3 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={0x0}}, 0x0) r4 = socket$inet_udplite(0x2, 0x2, 0x88) r5 = dup(r4) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=ANY=[@ANYBLOB="280000001d000100000000000000000007000000", @ANYRES32=r5, @ANYBLOB="80b586000a0002"], 0x28}}, 0x0) sendmmsg$alg(r3, &(0x7f00000000c0), 0x492492492492627, 0x0) 16:48:15 executing program 4: open(0x0, 0x40c5, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup(r0) syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x1000, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$tun(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/net/tun\x00', 0x0, 0x0) dup(r2) r3 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={0x0}}, 0x0) r4 = socket$inet_udplite(0x2, 0x2, 0x88) r5 = dup(r4) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=ANY=[@ANYBLOB="280000001d000100000000000000000007000000", @ANYRES32=r5, @ANYBLOB="80b586000a0002"], 0x28}}, 0x0) sendmmsg$alg(r3, &(0x7f00000000c0), 0x492492492492627, 0x0) [ 424.652858] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue 16:48:15 executing program 2: creat(&(0x7f0000000280)='./file0\x00', 0x0) close(0xffffffffffffffff) write$binfmt_script(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40023, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) [ 424.794461] FAULT_INJECTION: forcing a failure. [ 424.794461] name failslab, interval 1, probability 0, space 0, times 0 [ 424.809442] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue [ 424.826635] CPU: 0 PID: 24082 Comm: syz-executor.3 Not tainted 4.19.169-syzkaller #0 [ 424.834541] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 424.843900] Call Trace: [ 424.846489] dump_stack+0x1fc/0x2ef [ 424.850127] should_fail.cold+0xa/0xf [ 424.853920] ? setup_fault_attr+0x200/0x200 [ 424.858247] ? lock_acquire+0x170/0x3c0 [ 424.862227] __should_failslab+0x115/0x180 [ 424.866450] should_failslab+0x5/0x10 [ 424.870233] __kmalloc+0x2ab/0x3c0 [ 424.873780] ? mb_cache_create+0x155/0x4c0 [ 424.878001] mb_cache_create+0x155/0x4c0 [ 424.882054] ext4_fill_super+0x97b1/0xc820 [ 424.886305] ? ext4_calculate_overhead+0x11c0/0x11c0 [ 424.891401] ? snprintf+0xbb/0xf0 [ 424.894874] ? wait_for_completion_io+0x10/0x10 [ 424.899545] ? set_blocksize+0x163/0x3f0 [ 424.903615] mount_bdev+0x2fc/0x3b0 [ 424.907242] ? ext4_calculate_overhead+0x11c0/0x11c0 [ 424.912329] mount_fs+0xa3/0x310 [ 424.915688] vfs_kern_mount.part.0+0x68/0x470 [ 424.920187] do_mount+0x113c/0x2f10 [ 424.923801] ? do_raw_spin_unlock+0x171/0x230 [ 424.928281] ? check_preemption_disabled+0x41/0x280 [ 424.933284] ? copy_mount_string+0x40/0x40 [ 424.937513] ? copy_mount_options+0x59/0x380 [ 424.941909] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 424.946910] ? kmem_cache_alloc_trace+0x323/0x380 [ 424.951753] ? copy_mount_options+0x26f/0x380 [ 424.956236] ksys_mount+0xcf/0x130 [ 424.959762] __x64_sys_mount+0xba/0x150 [ 424.963724] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 424.968291] do_syscall_64+0xf9/0x620 [ 424.972078] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 424.977253] RIP: 0033:0x460c6a [ 424.980432] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 ad 89 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 8a 89 fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 424.999317] RSP: 002b:00007fb3ea55ea78 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 425.007015] RAX: ffffffffffffffda RBX: 00007fb3ea55eb10 RCX: 0000000000460c6a [ 425.014270] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007fb3ea55ead0 [ 425.021523] RBP: 00007fb3ea55ead0 R08: 00007fb3ea55eb10 R09: 0000000020000000 [ 425.028777] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000020000000 [ 425.036042] R13: 0000000020000100 R14: 0000000020000200 R15: 0000000020013000 16:48:15 executing program 0: creat(&(0x7f0000000280)='./file0\x00', 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) 16:48:15 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x0, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000000280)=@mangle={'mangle\x00', 0x1f, 0x6, 0x4e8, 0x0, 0x280, 0x368, 0xc0, 0x0, 0x450, 0x450, 0x450, 0x450, 0x450, 0x6, &(0x7f0000000200), {[{{@uncond, 0x0, 0x98, 0xc0, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}, {0xd}}]}, @inet=@DSCP={0x28, 'DSCP\x00', 0x0, {0x17}}}, {{@ip={@rand_addr=0x64010100, @private=0xa010102, 0x0, 0xffffff00, 'syzkaller0\x00', 'team_slave_1\x00', {0xff}, {}, 0x11, 0x3}, 0x0, 0x70, 0xd0}, @common=@SET={0x60, 'SET\x00', 0x0, {{0x1, [0x2, 0x0, 0x2, 0x7, 0x7, 0x4], 0x3, 0x4}, {0xffffffffffffffff, [0x2, 0x4, 0x2, 0x4, 0xc, 0x4], 0x2, 0x2}}}}, {{@ip={@remote, @multicast1, 0xff, 0x0, 'veth0_to_team\x00', 'bridge_slave_0\x00', {0xff}, {}, 0x6c, 0x0, 0x45}, 0x0, 0xc8, 0xf0, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}, {0x1}}, @common=@ah={{0x30, 'ah\x00'}, {[0x1000, 0x97]}}]}, @TTL={0x28, 'TTL\x00', 0x0, {0x2, 0x6}}}, {{@ip={@local, @broadcast, 0xff000000, 0x0, 'veth1_to_hsr\x00', 'dummy0\x00', {0xff}, {}, 0x11, 0x1, 0x35}, 0x0, 0xc0, 0xe8, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}, {0x9}}, @common=@ttl={{0x28, 'ttl\x00'}, {0x3, 0x7}}]}, @TTL={0x28, 'TTL\x00', 0x0, {0x1, 0xf9}}}, {{@ip={@dev={0xac, 0x14, 0x14, 0x13}, @loopback, 0x0, 0xff000000, 'macvlan0\x00', 'veth0_to_bridge\x00', {}, {0xff}, 0x62, 0x2, 0x1}, 0x0, 0xc0, 0xe8, 0x0, {}, [@common=@icmp={{0x28, 'icmp\x00'}, {0x15, "49c2", 0x1}}, @inet=@rpfilter={{0x28, 'rpfilter\x00'}, {0x6}}]}, @inet=@TOS={0x28, 'TOS\x00', 0x0, {0x7f, 0x4}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x548) r2 = dup(r1) getsockopt$IPT_SO_GET_ENTRIES(r1, 0x0, 0x41, &(0x7f0000000040)={'nat\x00', 0x28, "ed290b639806ce5fb93ab288f7f2799f17537990ae132250ac453a441276d583ea4e54f62f709d6f"}, &(0x7f0000000100)=0x4c) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = openat$full(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/full\x00', 0x8000, 0x0) ioctl$UI_SET_EVBIT(r3, 0x40045564, 0x12) r4 = syz_open_dev$mouse(&(0x7f0000000140)='/dev/input/mouse#\x00', 0x7, 0x20400) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x40082406, &(0x7f0000000180)='\x00') ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f00000000c0)={0x0, {0x0, 0x0, 0x0, 0x0, 0x5}}) 16:48:15 executing program 4: open(0x0, 0x40c5, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup(r0) syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x1000, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$tun(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/net/tun\x00', 0x0, 0x0) dup(r2) r3 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={0x0}}, 0x0) r4 = socket$inet_udplite(0x2, 0x2, 0x88) r5 = dup(r4) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=ANY=[@ANYBLOB="280000001d000100000000000000000007000000", @ANYRES32=r5, @ANYBLOB="80b586000a0002"], 0x28}}, 0x0) sendmmsg$alg(r3, &(0x7f00000000c0), 0x492492492492627, 0x0) [ 425.077031] EXT4-fs (loop3): Failed to create ea_block_cache 16:48:15 executing program 3 (fault-call:1 fault-nth:61): creat(&(0x7f0000000280)='./file0\x00', 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) 16:48:15 executing program 5: creat(&(0x7f0000000280)='./file0\x00', 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x401da, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) [ 425.191481] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue 16:48:15 executing program 0: creat(&(0x7f0000000280)='./file0\x00', 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) 16:48:15 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x0, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f00000000c0)={0x0, {0x0, 0x0, 0x0, 0x0, 0x5}}) [ 425.249208] x_tables: duplicate underflow at hook 1 [ 425.268150] x_tables: duplicate underflow at hook 1 [ 425.304742] FAULT_INJECTION: forcing a failure. [ 425.304742] name failslab, interval 1, probability 0, space 0, times 0 [ 425.316805] CPU: 1 PID: 24127 Comm: syz-executor.3 Not tainted 4.19.169-syzkaller #0 [ 425.324700] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 425.334062] Call Trace: [ 425.336660] dump_stack+0x1fc/0x2ef [ 425.340304] should_fail.cold+0xa/0xf [ 425.344128] ? setup_fault_attr+0x200/0x200 [ 425.348459] ? lock_acquire+0x170/0x3c0 16:48:15 executing program 2: creat(&(0x7f0000000280)='./file0\x00', 0x0) close(0xffffffffffffffff) write$binfmt_script(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4002d, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d90000000f0000000100000000000000000000000020000000200000200000002cc4645f2cc4645f0100ffff53ef0100010000002cc4645f000000000000000001000000000000000b0000008000000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e3338363633343038350000000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000000000000000000000000000000000000d9ca5cac99fd4329af4dde786c1a5d13010040000c000000000000002cc4645f", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) [ 425.352455] __should_failslab+0x115/0x180 [ 425.356706] should_failslab+0x5/0x10 [ 425.360514] kmem_cache_alloc_trace+0x284/0x380 [ 425.365193] __alloc_workqueue_key+0x7de/0xed0 [ 425.369786] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 425.374375] ? workqueue_sysfs_register+0x3e0/0x3e0 [ 425.374404] ext4_fill_super+0x6edb/0xc820 [ 425.374437] ? ext4_calculate_overhead+0x11c0/0x11c0 [ 425.388843] ? snprintf+0xbb/0xf0 [ 425.392314] ? wait_for_completion_io+0x10/0x10 [ 425.396989] ? set_blocksize+0x163/0x3f0 [ 425.401065] mount_bdev+0x2fc/0x3b0 [ 425.404700] ? ext4_calculate_overhead+0x11c0/0x11c0 [ 425.409810] mount_fs+0xa3/0x310 [ 425.413183] vfs_kern_mount.part.0+0x68/0x470 [ 425.413203] do_mount+0x113c/0x2f10 [ 425.421305] ? lock_acquire+0x170/0x3c0 [ 425.425288] ? check_preemption_disabled+0x41/0x280 [ 425.430311] ? copy_mount_string+0x40/0x40 [ 425.434553] ? copy_mount_options+0x59/0x380 [ 425.438989] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 425.444019] ? kmem_cache_alloc_trace+0x323/0x380 [ 425.448875] ? copy_mount_options+0x26f/0x380 16:48:15 executing program 1: bpf$ITER_CREATE(0x21, &(0x7f0000000040), 0x8) r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x0, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f00000000c0)={0x0, {0x0, 0x0, 0x0, 0x0, 0x5}}) [ 425.453380] ksys_mount+0xcf/0x130 [ 425.456928] __x64_sys_mount+0xba/0x150 [ 425.460911] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 425.465500] do_syscall_64+0xf9/0x620 [ 425.469312] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 425.474504] RIP: 0033:0x460c6a [ 425.477698] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 ad 89 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 8a 89 fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 425.496601] RSP: 002b:00007fb3ea55ea78 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 16:48:15 executing program 4: open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup(r0) syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x1000, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$tun(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/net/tun\x00', 0x0, 0x0) dup(r2) r3 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={0x0}}, 0x0) r4 = socket$inet_udplite(0x2, 0x2, 0x88) r5 = dup(r4) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=ANY=[@ANYBLOB="280000001d000100000000000000000007000000", @ANYRES32=r5, @ANYBLOB="80b586000a0002"], 0x28}}, 0x0) sendmmsg$alg(r3, &(0x7f00000000c0), 0x492492492492627, 0x0) 16:48:15 executing program 0: creat(&(0x7f0000000280)='./file0\x00', 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) [ 425.504316] RAX: ffffffffffffffda RBX: 00007fb3ea55eb10 RCX: 0000000000460c6a [ 425.505467] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue [ 425.511582] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007fb3ea55ead0 [ 425.511591] RBP: 00007fb3ea55ead0 R08: 00007fb3ea55eb10 R09: 0000000020000000 [ 425.511599] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000020000000 [ 425.511608] R13: 0000000020000100 R14: 0000000020000200 R15: 0000000020013000 16:48:16 executing program 4: open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup(r0) syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x1000, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$tun(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/net/tun\x00', 0x0, 0x0) dup(r2) r3 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={0x0}}, 0x0) r4 = socket$inet_udplite(0x2, 0x2, 0x88) r5 = dup(r4) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=ANY=[@ANYBLOB="280000001d000100000000000000000007000000", @ANYRES32=r5, @ANYBLOB="80b586000a0002"], 0x28}}, 0x0) sendmmsg$alg(r3, &(0x7f00000000c0), 0x492492492492627, 0x0) 16:48:16 executing program 0: creat(&(0x7f0000000280)='./file0\x00', 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000070100000c000000d90000000f0000000100000000000000000000000020000000200000200000002cc4645f2cc4645f0100ffff53ef0100010000002cc4645f000000000000000001000000000000000b0000008000000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e3338363633343038350000000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000000000000000000000000000000000000d9ca5cac99fd4329af4dde786c1a5d13010040000c000000000000002cc4645f", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) [ 425.564483] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue 16:48:16 executing program 4: open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup(r0) syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x1000, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$tun(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/net/tun\x00', 0x0, 0x0) dup(r2) r3 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={0x0}}, 0x0) r4 = socket$inet_udplite(0x2, 0x2, 0x88) r5 = dup(r4) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=ANY=[@ANYBLOB="280000001d000100000000000000000007000000", @ANYRES32=r5, @ANYBLOB="80b586000a0002"], 0x28}}, 0x0) sendmmsg$alg(r3, &(0x7f00000000c0), 0x492492492492627, 0x0) [ 425.662088] EXT4-fs: failed to create workqueue 16:48:16 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x0, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$UI_SET_FFBIT(r0, 0x4004556b, 0x4b) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket(0x25, 0x3, 0x81) r4 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r4, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r4, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(r4, 0x84, 0x73, &(0x7f0000000280)={r5, 0x0, 0x20}, &(0x7f00000000c0)=0x18) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r3, 0x84, 0x22, &(0x7f0000000040)={0x0, 0x206, 0x9, 0x401, r5}, &(0x7f0000000080)=0x10) write$binfmt_elf64(r2, &(0x7f0000000100)={{0x7f, 0x45, 0x4c, 0x46, 0x3, 0x5, 0x6, 0xfc, 0x5, 0x3, 0x3, 0x0, 0x1f5, 0x40, 0x12, 0x1, 0x91e, 0x38, 0x2, 0x8, 0x5, 0x9}, [{0x1, 0x4, 0x7f, 0x76, 0x4, 0x2, 0x2, 0x9}], "c546ad7b9e3948f1c74553107f4e4758aa6cb6a5a5b2ad4af1984d4fb63efb99c1ee64aecd276bc276b93acfacd8c4598d826a310fb3dba567ecd7c60ec9313699f7bb9ca5cb65c1e80a9502341fb5e790fc13734c569bfb1ed0d3cb614f42779f09167eb812aa894431ed01ad33aa3875671908e958305c102461172d9dcb7a", [[], [], [], [], [], [], []]}, 0x7f8) recvmsg$can_raw(r2, &(0x7f0000000c80)={&(0x7f0000000940)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast2}}}, 0x80, &(0x7f0000000b80)=[{&(0x7f00000009c0)=""/133, 0x85}, {&(0x7f0000000a80)=""/231, 0xe7}], 0x2, &(0x7f0000000bc0)=""/179, 0xb3}, 0x0) setsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r6, 0x84, 0x72, &(0x7f0000000cc0)={r5, 0x3, 0x10}, 0xc) r7 = fcntl$dupfd(r2, 0x406, r3) setsockopt$inet_sctp_SCTP_AUTH_CHUNK(r7, 0x84, 0x15, &(0x7f0000000900)={0x3}, 0x1) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f00000000c0)={0x0, {0x0, 0x0, 0x0, 0x0, 0x5}}) [ 425.682687] EXT4-fs (loop3): mount failed 16:48:16 executing program 3 (fault-call:1 fault-nth:62): creat(&(0x7f0000000280)='./file0\x00', 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) 16:48:16 executing program 5: creat(&(0x7f0000000280)='./file0\x00', 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40212, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) 16:48:16 executing program 0: creat(&(0x7f0000000280)='./file0\x00', 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) 16:48:16 executing program 2: creat(&(0x7f0000000280)='./file0\x00', 0x0) close(0xffffffffffffffff) write$binfmt_script(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40048, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) 16:48:16 executing program 4: open(&(0x7f0000000080)='./file0\x00', 0x40c5, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) r0 = dup(0xffffffffffffffff) syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x1000, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$tun(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/net/tun\x00', 0x0, 0x0) dup(r1) r2 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={0x0}}, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) r4 = dup(r3) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=ANY=[@ANYBLOB="280000001d000100000000000000000007000000", @ANYRES32=r4, @ANYBLOB="80b586000a0002"], 0x28}}, 0x0) sendmmsg$alg(r2, &(0x7f00000000c0), 0x492492492492627, 0x0) [ 425.837638] FAULT_INJECTION: forcing a failure. [ 425.837638] name failslab, interval 1, probability 0, space 0, times 0 [ 425.866757] CPU: 1 PID: 24180 Comm: syz-executor.3 Not tainted 4.19.169-syzkaller #0 [ 425.874667] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 425.883992] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue [ 425.884018] Call Trace: [ 425.894752] dump_stack+0x1fc/0x2ef [ 425.898387] should_fail.cold+0xa/0xf [ 425.902196] ? setup_fault_attr+0x200/0x200 [ 425.906518] ? lock_acquire+0x170/0x3c0 [ 425.910489] __should_failslab+0x115/0x180 [ 425.914714] should_failslab+0x5/0x10 [ 425.918500] kmem_cache_alloc_trace+0x284/0x380 [ 425.923159] __alloc_workqueue_key+0x7de/0xed0 [ 425.927730] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 425.932300] ? workqueue_sysfs_register+0x3e0/0x3e0 [ 425.937314] ext4_fill_super+0x6edb/0xc820 [ 425.941552] ? ext4_calculate_overhead+0x11c0/0x11c0 [ 425.946656] ? snprintf+0xbb/0xf0 [ 425.950101] ? wait_for_completion_io+0x10/0x10 [ 425.954756] ? set_blocksize+0x163/0x3f0 [ 425.958806] mount_bdev+0x2fc/0x3b0 [ 425.962434] ? ext4_calculate_overhead+0x11c0/0x11c0 [ 425.967522] mount_fs+0xa3/0x310 [ 425.970875] vfs_kern_mount.part.0+0x68/0x470 [ 425.975359] do_mount+0x113c/0x2f10 [ 425.978975] ? lock_acquire+0x170/0x3c0 [ 425.982938] ? check_preemption_disabled+0x41/0x280 [ 425.987946] ? copy_mount_string+0x40/0x40 [ 425.992166] ? copy_mount_options+0x59/0x380 [ 425.996560] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 426.001562] ? kmem_cache_alloc_trace+0x323/0x380 [ 426.006391] ? copy_mount_options+0x26f/0x380 [ 426.010887] ksys_mount+0xcf/0x130 [ 426.014415] __x64_sys_mount+0xba/0x150 [ 426.018374] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 426.022943] do_syscall_64+0xf9/0x620 [ 426.026729] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 426.031904] RIP: 0033:0x460c6a [ 426.035084] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 ad 89 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 8a 89 fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 426.053969] RSP: 002b:00007fb3ea55ea78 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 426.061662] RAX: ffffffffffffffda RBX: 00007fb3ea55eb10 RCX: 0000000000460c6a [ 426.068915] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007fb3ea55ead0 [ 426.076190] RBP: 00007fb3ea55ead0 R08: 00007fb3ea55eb10 R09: 0000000020000000 16:48:16 executing program 0: creat(&(0x7f0000000280)='./file0\x00', 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) [ 426.083456] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000020000000 [ 426.090708] R13: 0000000020000100 R14: 0000000020000200 R15: 0000000020013000 [ 426.117353] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue 16:48:16 executing program 4: open(&(0x7f0000000080)='./file0\x00', 0x40c5, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) r0 = dup(0xffffffffffffffff) syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x1000, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$tun(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/net/tun\x00', 0x0, 0x0) dup(r1) r2 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={0x0}}, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) r4 = dup(r3) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=ANY=[@ANYBLOB="280000001d000100000000000000000007000000", @ANYRES32=r4, @ANYBLOB="80b586000a0002"], 0x28}}, 0x0) sendmmsg$alg(r2, &(0x7f00000000c0), 0x492492492492627, 0x0) 16:48:16 executing program 2: creat(&(0x7f0000000280)='./file0\x00', 0x0) close(0xffffffffffffffff) write$binfmt_script(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4004c, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) [ 426.169379] EXT4-fs: failed to create workqueue [ 426.175454] EXT4-fs (loop3): mount failed 16:48:16 executing program 4: open(&(0x7f0000000080)='./file0\x00', 0x40c5, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) r0 = dup(0xffffffffffffffff) syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x1000, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$tun(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/net/tun\x00', 0x0, 0x0) dup(r1) r2 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={0x0}}, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) r4 = dup(r3) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=ANY=[@ANYBLOB="280000001d000100000000000000000007000000", @ANYRES32=r4, @ANYBLOB="80b586000a0002"], 0x28}}, 0x0) sendmmsg$alg(r2, &(0x7f00000000c0), 0x492492492492627, 0x0) 16:48:16 executing program 3 (fault-call:1 fault-nth:63): creat(&(0x7f0000000280)='./file0\x00', 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) 16:48:16 executing program 0: creat(&(0x7f0000000280)='./file0\x00', 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) [ 426.335758] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue [ 426.429282] FAULT_INJECTION: forcing a failure. [ 426.429282] name failslab, interval 1, probability 0, space 0, times 0 [ 426.440661] CPU: 1 PID: 24221 Comm: syz-executor.3 Not tainted 4.19.169-syzkaller #0 [ 426.448550] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 426.457914] Call Trace: [ 426.460537] dump_stack+0x1fc/0x2ef [ 426.464180] should_fail.cold+0xa/0xf [ 426.467993] ? setup_fault_attr+0x200/0x200 [ 426.472342] ? lock_acquire+0x170/0x3c0 [ 426.476334] __should_failslab+0x115/0x180 [ 426.480579] should_failslab+0x5/0x10 [ 426.484393] __kmalloc+0x2ab/0x3c0 [ 426.487937] ? __alloc_workqueue_key+0x789/0xed0 [ 426.492700] __alloc_workqueue_key+0x789/0xed0 [ 426.497293] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 426.501887] ? workqueue_sysfs_register+0x3e0/0x3e0 [ 426.506923] ext4_fill_super+0x6edb/0xc820 [ 426.511188] ? ext4_calculate_overhead+0x11c0/0x11c0 [ 426.516298] ? snprintf+0xbb/0xf0 [ 426.519771] ? wait_for_completion_io+0x10/0x10 [ 426.524450] ? set_blocksize+0x163/0x3f0 [ 426.528524] mount_bdev+0x2fc/0x3b0 [ 426.532161] ? ext4_calculate_overhead+0x11c0/0x11c0 [ 426.537272] mount_fs+0xa3/0x310 [ 426.540651] vfs_kern_mount.part.0+0x68/0x470 [ 426.545159] do_mount+0x113c/0x2f10 [ 426.548810] ? do_raw_spin_unlock+0x171/0x230 [ 426.553312] ? check_preemption_disabled+0x41/0x280 [ 426.558336] ? copy_mount_string+0x40/0x40 [ 426.562578] ? copy_mount_options+0x59/0x380 [ 426.566997] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 426.572020] ? kmem_cache_alloc_trace+0x323/0x380 [ 426.576869] ? copy_mount_options+0x26f/0x380 [ 426.581386] ksys_mount+0xcf/0x130 [ 426.584936] __x64_sys_mount+0xba/0x150 [ 426.588916] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 426.593506] do_syscall_64+0xf9/0x620 [ 426.597316] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 426.602521] RIP: 0033:0x460c6a [ 426.605717] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 ad 89 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 8a 89 fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 426.624639] RSP: 002b:00007fb3ea55ea78 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 426.632350] RAX: ffffffffffffffda RBX: 00007fb3ea55eb10 RCX: 0000000000460c6a [ 426.639628] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007fb3ea55ead0 [ 426.646903] RBP: 00007fb3ea55ead0 R08: 00007fb3ea55eb10 R09: 0000000020000000 [ 426.654177] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000020000000 [ 426.661448] R13: 0000000020000100 R14: 0000000020000200 R15: 0000000020013000 [ 426.664087] EXT4-fs: failed to create workqueue [ 426.681508] EXT4-fs (loop3): mount failed 16:48:17 executing program 2: creat(&(0x7f0000000280)='./file0\x00', 0x0) close(0xffffffffffffffff) write$binfmt_script(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40056, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) 16:48:17 executing program 5: creat(&(0x7f0000000280)='./file0\x00', 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40220, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) 16:48:17 executing program 4: open(&(0x7f0000000080)='./file0\x00', 0x40c5, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup(r0) syz_open_dev$vcsn(0x0, 0x1000, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$tun(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/net/tun\x00', 0x0, 0x0) dup(r2) r3 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={0x0}}, 0x0) r4 = socket$inet_udplite(0x2, 0x2, 0x88) r5 = dup(r4) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=ANY=[@ANYBLOB="280000001d000100000000000000000007000000", @ANYRES32=r5, @ANYBLOB="80b586000a0002"], 0x28}}, 0x0) sendmmsg$alg(r3, &(0x7f00000000c0), 0x492492492492627, 0x0) 16:48:17 executing program 0: creat(&(0x7f0000000280)='./file0\x00', 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) 16:48:17 executing program 3 (fault-call:1 fault-nth:64): creat(&(0x7f0000000280)='./file0\x00', 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) 16:48:17 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x0, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f00000000c0)={0x0, {0x0, 0x0, 0x0, 0x0, 0x5}}) ioctl$sock_ipv6_tunnel_SIOCCHGPRL(0xffffffffffffffff, 0x89f7, &(0x7f0000000080)={'ip6_vti0\x00', &(0x7f0000000100)={'syztnl1\x00', 0x0, 0x2f, 0x1, 0xaf, 0x1, 0x51, @rand_addr=' \x01\x00', @remote, 0x20, 0x7800, 0x0, 0x6}}) sendmsg$nl_route(r2, &(0x7f0000000200)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0xa0004000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)=ANY=[@ANYRESOCT, @ANYRES32=r3, @ANYBLOB="0000b473c983e7d5435f9b69"], 0x1c}}, 0x40) r4 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x0) lseek(r4, 0x8, 0x1) ftruncate(r4, 0x400) r5 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x0) lseek(r5, 0x8, 0x1) read(r5, &(0x7f0000000240)=""/31, 0x1f) lseek(r1, 0x80000001, 0x3) 16:48:17 executing program 0: creat(&(0x7f0000000280)='./file0\x00', 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) 16:48:17 executing program 4: open(&(0x7f0000000080)='./file0\x00', 0x40c5, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup(r0) syz_open_dev$vcsn(0x0, 0x1000, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$tun(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/net/tun\x00', 0x0, 0x0) dup(r2) r3 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={0x0}}, 0x0) r4 = socket$inet_udplite(0x2, 0x2, 0x88) r5 = dup(r4) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=ANY=[@ANYBLOB="280000001d000100000000000000000007000000", @ANYRES32=r5, @ANYBLOB="80b586000a0002"], 0x28}}, 0x0) sendmmsg$alg(r3, &(0x7f00000000c0), 0x492492492492627, 0x0) [ 426.809039] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue [ 426.839151] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue 16:48:17 executing program 1: bpf$BPF_LINK_UPDATE(0x1d, &(0x7f0000000100), 0x10) r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x0, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) creat(&(0x7f0000000000)='./file0\x00', 0xfd) r2 = dup(r1) r3 = creat(&(0x7f0000000040)='./file0\x00', 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000200)='nl80211\x00') ioctl$sock_SIOCGIFINDEX_80211(r4, 0x8933, &(0x7f0000000700)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_SET_INTERFACE(r4, &(0x7f0000000340)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000240)={0x24, r5, 0x5, 0x0, 0x0, {{}, {@val={0x8, 0x3, r6}, @void}}, [@NL80211_ATTR_IFTYPE={0x8, 0x5, 0x3}]}, 0x24}}, 0x0) sendmsg$NL80211_CMD_CONNECT(r3, &(0x7f0000000300)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000180)={0x10c, r5, 0x10, 0x70bd29, 0x25dfdbff, {{}, {@void, @val={0xc, 0x99, {0x677, 0x52}}}}, [@NL80211_ATTR_VHT_CAPABILITY={0x10, 0x9d, {0x80000, {0x3, 0x1a, 0x0, 0x20}}}, @NL80211_ATTR_PRIVACY={0x4}, @chandef_params=[@NL80211_ATTR_WIPHY_CHANNEL_TYPE={0x8}], @NL80211_ATTR_DISABLE_HT={0x4}, @chandef_params=[@NL80211_ATTR_WIPHY_EDMG_BW_CONFIG={0x5, 0x119, 0x4}], @NL80211_ATTR_VHT_CAPABILITY_MASK={0x10, 0xb0, {0x800, {0x1f, 0xffff, 0xff, 0x9a}}}, @fils_params=[@NL80211_ATTR_FILS_ERP_NEXT_SEQ_NUM={0x6, 0xfb, 0x5}, @NL80211_ATTR_FILS_ERP_REALM={0xac, 0xfa, "f902be2ba7fcb0f8cddb9dedaabd727738d79b75fcebfdf7749af622fb04a3c1a36ca49b5d26314c263a512521947a766290ce652b36d18789419ff374a112f3a46e81d4128c312243e6cb57b07c4b235614e88c890817d77c377116bcdbd633ba45df5b27897ddb57e50b0c1b9655a420d1f69be6b9f23c51dc8adae784f8e1612a897e328e2a0bf6c1c8aca5fca8af7aa7a2225ab3bc30f3d4981d797314bb4c794292e6a2884c"}]]}, 0x10c}, 0x1, 0x0, 0x0, 0x4000}, 0x4000000) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f00000000c0)={0x0, {0x0, 0x0, 0x0, 0x0, 0x5}}) [ 426.926714] FAULT_INJECTION: forcing a failure. [ 426.926714] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 426.938899] CPU: 0 PID: 24250 Comm: syz-executor.3 Not tainted 4.19.169-syzkaller #0 [ 426.946784] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 426.956138] Call Trace: [ 426.958739] dump_stack+0x1fc/0x2ef [ 426.962380] should_fail.cold+0xa/0xf [ 426.966189] ? setup_fault_attr+0x200/0x200 [ 426.970523] ? lock_acquire+0x170/0x3c0 [ 426.974522] ? __bpf_address_lookup+0x330/0x330 [ 426.979188] ? check_preemption_disabled+0x41/0x280 [ 426.984192] __alloc_pages_nodemask+0x239/0x2890 [ 426.988943] ? kernel_text_address+0xbd/0xf0 [ 426.993361] ? __kernel_text_address+0x9/0x30 [ 426.997849] ? unwind_get_return_address+0x51/0x90 [ 427.002826] ? __lock_acquire+0x6de/0x3ff0 [ 427.007050] ? gfp_pfmemalloc_allowed+0x150/0x150 [ 427.011884] ? kasan_kmalloc+0x139/0x160 [ 427.015944] ? mount_bdev+0x2fc/0x3b0 [ 427.019736] ? mount_fs+0xa3/0x310 [ 427.023269] ? vfs_kern_mount.part.0+0x68/0x470 [ 427.027927] ? do_mount+0x113c/0x2f10 [ 427.031710] ? ksys_mount+0xcf/0x130 [ 427.035415] ? __x64_sys_mount+0xba/0x150 [ 427.039576] ? do_syscall_64+0xf9/0x620 [ 427.043551] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 427.048918] ? mark_held_locks+0xf0/0xf0 [ 427.052972] ? kasan_kmalloc+0x139/0x160 [ 427.057034] ? __lock_acquire+0x6de/0x3ff0 [ 427.061261] cache_grow_begin+0xa4/0x8a0 [ 427.065482] ? setup_fault_attr+0x200/0x200 [ 427.069793] ? lock_acquire+0x170/0x3c0 [ 427.073763] cache_alloc_refill+0x273/0x340 [ 427.078081] kmem_cache_alloc_node+0x39e/0x3b0 [ 427.082649] alloc_unbound_pwq+0x4a4/0xc10 [ 427.086872] apply_wqattrs_prepare+0x3c0/0xa50 [ 427.091507] apply_workqueue_attrs_locked+0xc5/0x120 [ 427.096608] __alloc_workqueue_key+0x510/0xed0 [ 427.101205] ? workqueue_sysfs_register+0x3e0/0x3e0 [ 427.106247] ext4_fill_super+0x6edb/0xc820 [ 427.110478] ? ext4_calculate_overhead+0x11c0/0x11c0 [ 427.115585] ? snprintf+0xbb/0xf0 [ 427.119061] ? wait_for_completion_io+0x10/0x10 [ 427.123721] ? set_blocksize+0x163/0x3f0 [ 427.127787] mount_bdev+0x2fc/0x3b0 [ 427.131400] ? ext4_calculate_overhead+0x11c0/0x11c0 [ 427.136513] mount_fs+0xa3/0x310 [ 427.139875] vfs_kern_mount.part.0+0x68/0x470 [ 427.144364] do_mount+0x113c/0x2f10 [ 427.147978] ? copy_mount_string+0x40/0x40 [ 427.152196] ? copy_mount_options+0x1f9/0x380 [ 427.156684] ? copy_mount_options+0x1f9/0x380 [ 427.161171] ? copy_mount_options+0x26f/0x380 [ 427.165672] ksys_mount+0xcf/0x130 [ 427.169213] __x64_sys_mount+0xba/0x150 [ 427.173183] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 427.177755] do_syscall_64+0xf9/0x620 [ 427.181538] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 427.186707] RIP: 0033:0x460c6a [ 427.189878] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 ad 89 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 8a 89 fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 427.208758] RSP: 002b:00007fb3ea55ea78 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 427.216457] RAX: ffffffffffffffda RBX: 00007fb3ea55eb10 RCX: 0000000000460c6a 16:48:17 executing program 2: creat(&(0x7f0000000280)='./file0\x00', 0x0) close(0xffffffffffffffff) write$binfmt_script(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40060, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d90000000f0000000100000000000000000000000020000000200000200000002cc4645f2cc4645f0100ffff53ef0100010000002cc4645f000000000000000001000000000000000b0000008000000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e3338363633343038350000000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000000000000000000000000000000000000d9ca5cac99fd4329af4dde786c1a5d13010040000c000000000000002cc4645f", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) 16:48:17 executing program 4: open(&(0x7f0000000080)='./file0\x00', 0x40c5, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup(r0) syz_open_dev$vcsn(0x0, 0x1000, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$tun(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/net/tun\x00', 0x0, 0x0) dup(r2) r3 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={0x0}}, 0x0) r4 = socket$inet_udplite(0x2, 0x2, 0x88) r5 = dup(r4) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=ANY=[@ANYBLOB="280000001d000100000000000000000007000000", @ANYRES32=r5, @ANYBLOB="80b586000a0002"], 0x28}}, 0x0) sendmmsg$alg(r3, &(0x7f00000000c0), 0x492492492492627, 0x0) [ 427.223726] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007fb3ea55ead0 [ 427.231097] RBP: 00007fb3ea55ead0 R08: 00007fb3ea55eb10 R09: 0000000020000000 [ 427.238348] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000020000000 [ 427.245619] R13: 0000000020000100 R14: 0000000020000200 R15: 0000000020013000 [ 427.271635] EXT4-fs (loop3): mounted filesystem without journal. Opts: ,errors=continue 16:48:17 executing program 5: creat(&(0x7f0000000280)='./file0\x00', 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4024a, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) 16:48:17 executing program 0: creat(&(0x7f0000000280)='./file0\x00', 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) 16:48:17 executing program 3 (fault-call:1 fault-nth:65): creat(&(0x7f0000000280)='./file0\x00', 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d90000000f0000000100000000000000000000000020000000200000200000002cc4645f2cc4645f0100ffff53ef0100010000002cc4645f000000000000000001000000000000000b0000008000000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e3338363633343038350000000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000000000000000000000000000000000000d9ca5cac99fd4329af4dde786c1a5d13010040000c000000000000002cc4645f", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) 16:48:17 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x0, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f00000000c0)={0x0, {0x0, 0x0, 0x0, 0x0, 0x5}}) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(r2, 0xc0505405, &(0x7f0000000040)={{0x3, 0x2, 0x3, 0x3, 0xffff}, 0x8, 0x3, 0x80000000}) 16:48:17 executing program 4: open(&(0x7f0000000080)='./file0\x00', 0x40c5, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup(r0) syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$tun(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/net/tun\x00', 0x0, 0x0) dup(r2) r3 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={0x0}}, 0x0) r4 = socket$inet_udplite(0x2, 0x2, 0x88) r5 = dup(r4) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=ANY=[@ANYBLOB="280000001d000100000000000000000007000000", @ANYRES32=r5, @ANYBLOB="80b586000a0002"], 0x28}}, 0x0) sendmmsg$alg(r3, &(0x7f00000000c0), 0x492492492492627, 0x0) [ 427.467169] FAULT_INJECTION: forcing a failure. [ 427.467169] name failslab, interval 1, probability 0, space 0, times 0 [ 427.480874] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue [ 427.491039] CPU: 0 PID: 24282 Comm: syz-executor.3 Not tainted 4.19.169-syzkaller #0 [ 427.494414] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue [ 427.498932] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 427.516414] Call Trace: [ 427.519004] dump_stack+0x1fc/0x2ef [ 427.522644] should_fail.cold+0xa/0xf [ 427.526450] ? setup_fault_attr+0x200/0x200 [ 427.530779] ? lock_acquire+0x170/0x3c0 [ 427.534779] __should_failslab+0x115/0x180 [ 427.539024] should_failslab+0x5/0x10 [ 427.542832] kmem_cache_alloc_trace+0x284/0x380 [ 427.547510] __alloc_workqueue_key+0x7de/0xed0 [ 427.552102] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 427.556699] ? workqueue_sysfs_register+0x3e0/0x3e0 [ 427.561745] ext4_fill_super+0x6edb/0xc820 [ 427.566032] ? ext4_calculate_overhead+0x11c0/0x11c0 [ 427.571155] ? snprintf+0xbb/0xf0 [ 427.574604] ? wait_for_completion_io+0x10/0x10 [ 427.579257] ? set_blocksize+0x163/0x3f0 [ 427.583310] mount_bdev+0x2fc/0x3b0 [ 427.586921] ? ext4_calculate_overhead+0x11c0/0x11c0 [ 427.592010] mount_fs+0xa3/0x310 [ 427.595387] vfs_kern_mount.part.0+0x68/0x470 [ 427.599869] do_mount+0x113c/0x2f10 [ 427.603485] ? do_raw_spin_unlock+0x171/0x230 [ 427.607966] ? check_preemption_disabled+0x41/0x280 [ 427.612977] ? copy_mount_string+0x40/0x40 [ 427.617233] ? copy_mount_options+0x59/0x380 [ 427.621629] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 427.626629] ? kmem_cache_alloc_trace+0x323/0x380 [ 427.631484] ? copy_mount_options+0x26f/0x380 [ 427.635966] ksys_mount+0xcf/0x130 [ 427.639492] __x64_sys_mount+0xba/0x150 [ 427.643455] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 427.648035] do_syscall_64+0xf9/0x620 [ 427.651827] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 427.657000] RIP: 0033:0x460c6a [ 427.660178] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 ad 89 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 8a 89 fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 427.679061] RSP: 002b:00007fb3ea55ea78 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 427.686763] RAX: ffffffffffffffda RBX: 00007fb3ea55eb10 RCX: 0000000000460c6a [ 427.694033] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007fb3ea55ead0 [ 427.701285] RBP: 00007fb3ea55ead0 R08: 00007fb3ea55eb10 R09: 0000000020000000 [ 427.708539] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000020000000 16:48:18 executing program 0: creat(&(0x7f0000000280)='./file0\x00', 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) 16:48:18 executing program 4: open(&(0x7f0000000080)='./file0\x00', 0x40c5, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup(r0) syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$tun(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/net/tun\x00', 0x0, 0x0) dup(r2) r3 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={0x0}}, 0x0) r4 = socket$inet_udplite(0x2, 0x2, 0x88) r5 = dup(r4) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=ANY=[@ANYBLOB="280000001d000100000000000000000007000000", @ANYRES32=r5, @ANYBLOB="80b586000a0002"], 0x28}}, 0x0) sendmmsg$alg(r3, &(0x7f00000000c0), 0x492492492492627, 0x0) [ 427.715793] R13: 0000000020000100 R14: 0000000020000200 R15: 0000000020013000 16:48:18 executing program 5: creat(&(0x7f0000000280)='./file0\x00', 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40250, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) [ 427.752293] EXT4-fs: failed to create workqueue [ 427.758943] EXT4-fs (loop3): mount failed 16:48:18 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x0, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$FS_IOC_RESVSP(r1, 0x40305828, &(0x7f0000000040)={0x0, 0x3, 0x4, 0x7ff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f00000000c0)={0x0, {0x0, 0x0, 0x0, 0x0, 0x5}}) 16:48:18 executing program 2: creat(&(0x7f0000000280)='./file0\x00', 0x0) close(0xffffffffffffffff) write$binfmt_script(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40068, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) 16:48:18 executing program 4: open(&(0x7f0000000080)='./file0\x00', 0x40c5, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup(r0) syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$tun(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/net/tun\x00', 0x0, 0x0) dup(r2) r3 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={0x0}}, 0x0) r4 = socket$inet_udplite(0x2, 0x2, 0x88) r5 = dup(r4) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=ANY=[@ANYBLOB="280000001d000100000000000000000007000000", @ANYRES32=r5, @ANYBLOB="80b586000a0002"], 0x28}}, 0x0) sendmmsg$alg(r3, &(0x7f00000000c0), 0x492492492492627, 0x0) 16:48:18 executing program 3 (fault-call:1 fault-nth:66): creat(&(0x7f0000000280)='./file0\x00', 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) 16:48:18 executing program 0: creat(&(0x7f0000000280)='./file0\x00', 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) [ 427.919236] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue 16:48:18 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x0, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = open(&(0x7f0000000040)='./file0\x00', 0x2, 0x101) ioctl$UI_DEV_CREATE(r3, 0x5501) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f00000000c0)={0x0, {0x0, 0x0, 0x0, 0x0, 0x5}}) 16:48:18 executing program 4: open(&(0x7f0000000080)='./file0\x00', 0x40c5, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) dup(r0) syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x1000, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r1 = openat$tun(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/net/tun\x00', 0x0, 0x0) dup(r1) r2 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={0x0}}, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) r4 = dup(r3) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=ANY=[@ANYBLOB="280000001d000100000000000000000007000000", @ANYRES32=r4, @ANYBLOB="80b586000a0002"], 0x28}}, 0x0) sendmmsg$alg(r2, &(0x7f00000000c0), 0x492492492492627, 0x0) [ 428.025481] FAULT_INJECTION: forcing a failure. [ 428.025481] name failslab, interval 1, probability 0, space 0, times 0 [ 428.055581] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue [ 428.067399] CPU: 0 PID: 24327 Comm: syz-executor.3 Not tainted 4.19.169-syzkaller #0 [ 428.075299] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 428.084659] Call Trace: [ 428.087256] dump_stack+0x1fc/0x2ef [ 428.090902] should_fail.cold+0xa/0xf [ 428.094714] ? setup_fault_attr+0x200/0x200 [ 428.099050] ? lock_acquire+0x170/0x3c0 [ 428.103042] __should_failslab+0x115/0x180 [ 428.107282] should_failslab+0x5/0x10 [ 428.111094] kmem_cache_alloc_node_trace+0x244/0x3b0 [ 428.116211] init_rescuer+0xa1/0x370 [ 428.119941] __alloc_workqueue_key+0xb56/0xed0 [ 428.124542] ? workqueue_sysfs_register+0x3e0/0x3e0 [ 428.129589] ext4_fill_super+0x6edb/0xc820 [ 428.133859] ? ext4_calculate_overhead+0x11c0/0x11c0 [ 428.138972] ? snprintf+0xbb/0xf0 [ 428.142443] ? wait_for_completion_io+0x10/0x10 [ 428.147119] ? set_blocksize+0x163/0x3f0 [ 428.151208] mount_bdev+0x2fc/0x3b0 [ 428.154842] ? ext4_calculate_overhead+0x11c0/0x11c0 [ 428.159945] mount_fs+0xa3/0x310 [ 428.163318] vfs_kern_mount.part.0+0x68/0x470 [ 428.167809] do_mount+0x113c/0x2f10 [ 428.171428] ? do_raw_spin_unlock+0x171/0x230 [ 428.175910] ? check_preemption_disabled+0x41/0x280 [ 428.180924] ? copy_mount_string+0x40/0x40 [ 428.185144] ? copy_mount_options+0x59/0x380 [ 428.189537] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 428.194558] ? kmem_cache_alloc_trace+0x323/0x380 [ 428.199408] ? copy_mount_options+0x26f/0x380 [ 428.203891] ksys_mount+0xcf/0x130 [ 428.207416] __x64_sys_mount+0xba/0x150 [ 428.211401] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 428.215977] do_syscall_64+0xf9/0x620 [ 428.219771] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 428.224953] RIP: 0033:0x460c6a [ 428.228140] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 ad 89 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 8a 89 fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 428.247043] RSP: 002b:00007fb3ea55ea78 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 428.254737] RAX: ffffffffffffffda RBX: 00007fb3ea55eb10 RCX: 0000000000460c6a [ 428.261991] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007fb3ea55ead0 [ 428.269246] RBP: 00007fb3ea55ead0 R08: 00007fb3ea55eb10 R09: 0000000020000000 16:48:18 executing program 5: creat(&(0x7f0000000280)='./file0\x00', 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x402a8, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d90000000f0000000100000000000000000000000020000000200000200000002cc4645f2cc4645f0100ffff53ef0100010000002cc4645f000000000000000001000000000000000b0000008000000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e3338363633343038350000000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000000000000000000000000000000000000d9ca5cac99fd4329af4dde786c1a5d13010040000c000000000000002cc4645f", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) 16:48:18 executing program 0: creat(&(0x7f0000000280)='./file0\x00', 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) [ 428.276511] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000020000000 [ 428.283779] R13: 0000000020000100 R14: 0000000020000200 R15: 0000000020013000 16:48:18 executing program 1: openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x0, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000040)="e0e1a4d5dc592d2c63a9b44a1b4b081af8dfc3d0d55dc1d67d36a3ba6ef7c918fadc962892470e25cc887b5e51620c0c492ab9dd214370bde9fc518c5bc6cba5b6b7de253f48fd9ab2fc46324b045507513e2a0bb1dbea1855f4b71037dbcbd1678ed3f1ca20afc6718f154784d73e8daaa3b70cfae640c22b475926e73f", 0x7e) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = creat(&(0x7f0000000280)='./file0\x00', 0x1) close(0xffffffffffffffff) ioctl$UI_ABS_SETUP(r2, 0x401c5504, &(0x7f00000000c0)={0x4, {0x0, 0x0, 0x0, 0x2, 0x5}}) 16:48:18 executing program 4: open(&(0x7f0000000080)='./file0\x00', 0x40c5, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) dup(r0) syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x1000, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r1 = openat$tun(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/net/tun\x00', 0x0, 0x0) dup(r1) r2 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={0x0}}, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) r4 = dup(r3) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=ANY=[@ANYBLOB="280000001d000100000000000000000007000000", @ANYRES32=r4, @ANYBLOB="80b586000a0002"], 0x28}}, 0x0) sendmmsg$alg(r2, &(0x7f00000000c0), 0x492492492492627, 0x0) [ 428.402908] EXT4-fs: failed to create workqueue [ 428.411131] EXT4-fs (loop3): mount failed 16:48:18 executing program 0: creat(&(0x7f0000000280)='./file0\x00', 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) 16:48:18 executing program 2: creat(&(0x7f0000000280)='./file0\x00', 0x0) close(0xffffffffffffffff) write$binfmt_script(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4006c, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) [ 428.468451] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue 16:48:19 executing program 4: open(&(0x7f0000000080)='./file0\x00', 0x40c5, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) dup(r0) syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x1000, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r1 = openat$tun(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/net/tun\x00', 0x0, 0x0) dup(r1) r2 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={0x0}}, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) r4 = dup(r3) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=ANY=[@ANYBLOB="280000001d000100000000000000000007000000", @ANYRES32=r4, @ANYBLOB="80b586000a0002"], 0x28}}, 0x0) sendmmsg$alg(r2, &(0x7f00000000c0), 0x492492492492627, 0x0) 16:48:19 executing program 1: accept$alg(0xffffffffffffffff, 0x0, 0x0) r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x0, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$UI_SET_RELBIT(r0, 0x40045566, 0x4) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f00000000c0)={0x0, {0x0, 0x0, 0x0, 0x0, 0x5}}) 16:48:19 executing program 3 (fault-call:1 fault-nth:67): creat(&(0x7f0000000280)='./file0\x00', 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) 16:48:19 executing program 5: creat(&(0x7f0000000280)='./file0\x00', 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x402b6, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) [ 428.586689] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue 16:48:19 executing program 0: creat(&(0x7f0000000280)='./file0\x00', 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000020100000c000000d90000000f0000000100000000000000000000000020000000200000200000002cc4645f2cc4645f0100ffff53ef0100010000002cc4645f000000000000000001000000000000000b0000008000000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e3338363633343038350000000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000000000000000000000000000000000000d9ca5cac99fd4329af4dde786c1a5d13010040000c000000000000002cc4645f", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) 16:48:19 executing program 4: open(&(0x7f0000000080)='./file0\x00', 0x40c5, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup(r0) syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x1000, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x0) r2 = openat$tun(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/net/tun\x00', 0x0, 0x0) dup(r2) r3 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={0x0}}, 0x0) r4 = socket$inet_udplite(0x2, 0x2, 0x88) r5 = dup(r4) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=ANY=[@ANYBLOB="280000001d000100000000000000000007000000", @ANYRES32=r5, @ANYBLOB="80b586000a0002"], 0x28}}, 0x0) sendmmsg$alg(r3, &(0x7f00000000c0), 0x492492492492627, 0x0) 16:48:19 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x0, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f00000000c0)={0x0, {0x0, 0x4, 0x0, 0x10000, 0x2}}) [ 428.696097] FAULT_INJECTION: forcing a failure. [ 428.696097] name failslab, interval 1, probability 0, space 0, times 0 [ 428.731414] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue [ 428.745461] CPU: 1 PID: 24377 Comm: syz-executor.3 Not tainted 4.19.169-syzkaller #0 [ 428.753365] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 428.762775] Call Trace: [ 428.762801] dump_stack+0x1fc/0x2ef [ 428.762820] should_fail.cold+0xa/0xf [ 428.762839] ? __alloc_workqueue_key+0x5e4/0xed0 [ 428.762856] ? setup_fault_attr+0x200/0x200 [ 428.762881] __should_failslab+0x115/0x180 [ 428.762898] should_failslab+0x5/0x10 [ 428.762911] kmem_cache_alloc+0x277/0x370 [ 428.762926] ? ext4_sync_fs+0x8d0/0x8d0 [ 428.762940] ext4_alloc_inode+0x1a/0x630 [ 428.762954] ? ext4_sync_fs+0x8d0/0x8d0 [ 428.762967] alloc_inode+0x5d/0x180 [ 428.762979] iget_locked+0x193/0x480 [ 428.763002] __ext4_iget+0x279/0x3e00 [ 428.817288] ? __alloc_workqueue_key+0x92d/0xed0 [ 428.822057] ? ext4_get_projid+0x190/0x190 [ 428.826420] ? workqueue_sysfs_register+0x3e0/0x3e0 [ 428.831461] ext4_fill_super+0x6f83/0xc820 [ 428.835726] ? ext4_calculate_overhead+0x11c0/0x11c0 [ 428.840843] ? snprintf+0xbb/0xf0 [ 428.844298] ? wait_for_completion_io+0x10/0x10 [ 428.849085] ? set_blocksize+0x163/0x3f0 [ 428.853157] mount_bdev+0x2fc/0x3b0 [ 428.856771] ? ext4_calculate_overhead+0x11c0/0x11c0 [ 428.861859] mount_fs+0xa3/0x310 [ 428.865215] vfs_kern_mount.part.0+0x68/0x470 [ 428.869698] do_mount+0x113c/0x2f10 [ 428.873317] ? rcu_nmi_exit+0xb3/0x180 [ 428.877212] ? copy_mount_string+0x40/0x40 [ 428.881448] ? copy_mount_options+0x1da/0x380 [ 428.885926] ? copy_mount_options+0x1ec/0x380 [ 428.890410] ? copy_mount_options+0x26f/0x380 [ 428.894895] ksys_mount+0xcf/0x130 [ 428.898426] __x64_sys_mount+0xba/0x150 [ 428.902390] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 428.906973] do_syscall_64+0xf9/0x620 [ 428.910764] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 428.915942] RIP: 0033:0x460c6a [ 428.919124] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 ad 89 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 8a 89 fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 428.938012] RSP: 002b:00007fb3ea55ea78 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 16:48:19 executing program 4: open(&(0x7f0000000080)='./file0\x00', 0x40c5, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup(r0) syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x1000, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x0) r2 = openat$tun(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/net/tun\x00', 0x0, 0x0) dup(r2) r3 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={0x0}}, 0x0) r4 = socket$inet_udplite(0x2, 0x2, 0x88) r5 = dup(r4) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=ANY=[@ANYBLOB="280000001d000100000000000000000007000000", @ANYRES32=r5, @ANYBLOB="80b586000a0002"], 0x28}}, 0x0) sendmmsg$alg(r3, &(0x7f00000000c0), 0x492492492492627, 0x0) [ 428.945712] RAX: ffffffffffffffda RBX: 00007fb3ea55eb10 RCX: 0000000000460c6a [ 428.952965] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007fb3ea55ead0 [ 428.960217] RBP: 00007fb3ea55ead0 R08: 00007fb3ea55eb10 R09: 0000000020000000 [ 428.967473] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000020000000 [ 428.974725] R13: 0000000020000100 R14: 0000000020000200 R15: 0000000020013000 16:48:19 executing program 2: creat(&(0x7f0000000280)='./file0\x00', 0x0) close(0xffffffffffffffff) write$binfmt_script(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40070, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) 16:48:19 executing program 0: creat(&(0x7f0000000280)='./file0\x00', 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) 16:48:19 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x0, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setuid(0x0) r3 = openat$cgroup_type(r2, &(0x7f0000000a00)='cgroup.type\x00', 0x2, 0x0) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f0000000a40)={{{@in=@broadcast, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in=@private}}, &(0x7f0000000b40)=0xe8) r5 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) setregid(0x0, r6) r7 = getgid() r8 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x0) lseek(r8, 0x8, 0x1) r9 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x0) lseek(r9, 0x8, 0x1) r10 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x0) lseek(r10, 0x8, 0x1) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000000c40)={0x0, 0x0, &(0x7f00000009c0)=[{&(0x7f0000000580)={0x404, 0x12, 0x8, 0x70bd2a, 0x25dfdbfd, "", [@typed={0x8, 0x6b, 0x0, 0x0, @u32=0x1f}, @typed={0x8, 0x47, 0x0, 0x0, @pid=0xffffffffffffffff}, @nested={0xe4, 0x7b, 0x0, 0x1, [@typed={0xc, 0x53, 0x0, 0x0, @u64}, @typed={0xc, 0x5a, 0x0, 0x0, @u64=0x3f}, @generic="c0ed0a5178a01e345e5ed8e9950112003fb7c00b5fe62d8d1795400b36", @generic="41c7cc9523a3122fdf6057f4e5808fe5380cb8fc9861cf89c4b6bac9a6eb6ceca0abe3a7b478b57e27429dd4b7f04c94c6c3b63e05f8098fa0863b3f21ea2642f94b15de9ad88d6bd2393ddd7402fede4dd8920258931aa64932c2f208d6e5c1be4118be7b1b7d055e320c2195e8285a6a2714c32b1bc99d2e2483c0dad21a8b83e529f2c3e4338d599b84dc1a3981572989419b0554dbfee278d251e62e8a6c833511ee2717e96a5904ce"]}, @typed={0x8, 0xb, 0x0, 0x0, @pid}, @typed={0x8, 0x5c, 0x0, 0x0, @uid}, @generic="bb310a30355e27330fd19b79ccdb8b24d75e3ee0a2e040a128143c68fbc1eca67c94d3285789451ea4abd96fccc15eb69f42e32548fd3cc70ffd17778a05d740453e88294a119c455c9100912ce32ba601", @nested={0x15c, 0x60, 0x0, 0x1, [@typed={0x55, 0x78, 0x0, 0x0, @binary="dc3f65b3eba72293473d45e1bfaf0cfee42c3a6252733b86ca43259c49b2d04debbc301b8cf45fcb914f7c94daf294f73052aaa79204faea03361b39fd892e0c6e58f179e24eeb2160d4122a04c3397993"}, @typed={0x10, 0x80, 0x0, 0x0, @str='/dev/uinput\x00'}, @generic="63c2c42b09e6039dbdb1520036dec988c200f58d4f610bc7a2059dd6599345a98a9ed3222b4093b660ba2f104779ec92d5515b1d8fd4dcfef7d46382f120498a5a03de3e2c6bf8450bd66eaf90b30054093ee40372383cc87e01306936e5439e67193305e37d6d6c6f5b650b7eb78f1b45b8ba15422d0ed55ae8323afc22c7362a028fb4ef8fa1d56edea809d7eddc265ecbdb4de9ffdae51f9b7895a0bf5d98e62818e3cedafe6e0b59becb4e1a51ffcc2584749f13a4f19631096458cedc662b4920ad8826c91d1e351725d566e052ea4a9ff1160b5714ba781ee30f7cf34261b346d457ca263dac1732ce10867005"]}, @nested={0x135, 0x56, 0x0, 0x1, [@typed={0xae, 0x1c, 0x0, 0x0, @binary="aa5052afe357fa3f99467bfefabff2a0cbad52e5da942a7a4858316210efd32e8c9f9dfd920ab7cf754acecc757bb02ce26999f61daf1fa4a863885d45b271667f26aa480665d5bb473486e090220030dc967db2db52edcfe6dd67be32dd9ecc1066be25c0111d503d40ce37289d6671df62324f74c837de117ae565e7118b705112791cc0f4adc026ad64f3ea89bee05d06780fdd68ff21ebf8f945a7297524b1435e7c1b75e06086ad"}, @generic="7b02df8116549438f6aba5945136fdca44337a5751629496eb6442c0aab25f660e5ba65e623772ab3de3eadbccd542b158b7d95052439b5f753b3c164c1519743bb0fdf47234c371182726e6a3e1f144d334898f88d81aa27f0eb2f063d001b65c7b9d3d6b14738634f8120d4d7754cc9360a58238853bbd7e424234992c28d1b7"]}, @typed={0x8, 0x70, 0x0, 0x0, @u32=0x1}]}, 0x404}], 0x1, &(0x7f0000000b80)=[@rights={{0x1c, 0x1, 0x1, [r1, r2, r3]}}, @rights={{0x14, 0x1, 0x1, [r0]}}, @cred={{0x1c, 0x1, 0x2, {0x0, r4, r6}}}, @cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, 0xee01, r7}}}, @cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, 0x0, 0xee01}}}, @rights={{0x1c, 0x1, 0x1, [r8, r9, r10]}}], 0xb8, 0x8005}, 0x8080) write$uinput_user_dev(r2, &(0x7f0000000100)={'syz1\x00', {0x5, 0x8b1f, 0x96e, 0x7}, 0xd, [0x0, 0x4, 0xe9, 0x5, 0x100, 0x9, 0x8, 0x60, 0x7, 0x5, 0x9, 0x800, 0x2, 0x1, 0x1, 0x401, 0x7f, 0x1, 0x401, 0x3f, 0xab, 0x7, 0x3, 0x3, 0x0, 0xd0ef, 0x0, 0x7f, 0x40, 0xbf93, 0xffff, 0x2, 0x3, 0x81, 0xfffffff9, 0x2, 0xfff, 0x2, 0x9, 0x5, 0x19b0, 0x3, 0x5, 0xfffffc01, 0x9, 0x6, 0x5, 0x9, 0x5, 0x20, 0x80, 0x2, 0xa5, 0x8, 0x5, 0xeff, 0x2f3, 0xa108, 0x4, 0x1, 0x80, 0x0, 0x6, 0x7f], [0xfff, 0xab7e, 0x1, 0x5, 0x1, 0x6, 0x8, 0x2, 0xfffffff7, 0x7ff, 0x80, 0x2, 0x0, 0x800, 0x70, 0x401, 0x5, 0x0, 0x1, 0xa00000, 0x100, 0x1004, 0x7, 0x4, 0x4, 0x3, 0x15, 0x3e, 0x8001, 0x0, 0x6, 0x1, 0x3, 0x6, 0xff, 0x5a, 0x3, 0x0, 0x6d, 0x1ff, 0x6d, 0x4, 0x9, 0x0, 0x8, 0x0, 0x7fffffff, 0x5189, 0x6, 0x400, 0x800, 0x8, 0x4, 0x80, 0x60c, 0x6, 0xa, 0x81, 0x10001, 0x100, 0x4, 0x7f, 0x1ff, 0x2], [0x5952, 0x1, 0xffffffff, 0x1f, 0x3, 0x6, 0x7ffffffd, 0x8, 0x1, 0x5, 0x8, 0x200, 0x6, 0xfffffff9, 0x2, 0x2, 0x54, 0x800, 0x80000001, 0x63, 0x1, 0x7, 0x8, 0x5, 0xf4, 0x0, 0x80, 0xffff, 0x7, 0x59fc, 0x400, 0xffffff00, 0x1, 0x200, 0x9, 0x3, 0x3, 0x7fff, 0xdc000000, 0x891, 0x9, 0x5, 0x9, 0x81, 0x0, 0x3, 0x7, 0x2, 0x1, 0x0, 0x7f, 0x2, 0x82, 0x1, 0x8, 0x0, 0x10001, 0x2853978d, 0x4007f, 0x8000, 0x9, 0x800, 0xffffffff, 0xc6], [0xb01e, 0x9, 0xb19, 0x401, 0x1000, 0xfffffffc, 0xeda, 0x8, 0x8, 0x7ff, 0x2f, 0xfffffffb, 0x4a, 0xee, 0x4, 0x6, 0xfffffffa, 0x8, 0x8001, 0x0, 0x1, 0x7fff, 0x6, 0x3b, 0x3, 0xc76bc8a, 0x8, 0x5, 0x80000001, 0x7, 0x80, 0x6, 0x6, 0x80, 0x8, 0x8, 0x1f, 0x4, 0x100, 0x9, 0x9, 0x5, 0x6, 0x3, 0x9, 0x4, 0x1, 0x3ff, 0x65ea, 0xffffffff, 0x0, 0x6, 0x8, 0x2, 0x3, 0xfffffffa, 0x7fff, 0x20, 0xa8, 0x82eb, 0xa5d8, 0xe72, 0x0, 0x5]}, 0x45c) ioctl$UI_ABS_SETUP(0xffffffffffffffff, 0x401c5504, &(0x7f00000000c0)={0xffff, {0x2, 0x6, 0xc, 0x0, 0x10000, 0xffffffff}}) 16:48:19 executing program 4: open(&(0x7f0000000080)='./file0\x00', 0x40c5, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup(r0) syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x1000, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x0) r2 = openat$tun(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/net/tun\x00', 0x0, 0x0) dup(r2) r3 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={0x0}}, 0x0) r4 = socket$inet_udplite(0x2, 0x2, 0x88) r5 = dup(r4) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=ANY=[@ANYBLOB="280000001d000100000000000000000007000000", @ANYRES32=r5, @ANYBLOB="80b586000a0002"], 0x28}}, 0x0) sendmmsg$alg(r3, &(0x7f00000000c0), 0x492492492492627, 0x0) [ 429.146986] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue [ 429.184311] EXT4-fs (loop3): get root inode failed [ 429.189380] EXT4-fs (loop3): mount failed 16:48:19 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x0, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) r3 = creat(&(0x7f0000000280)='./file0\x00', 0x1) ioctl$SIOCSIFHWADDR(r2, 0x8924, &(0x7f0000000040)={'bond_slave_1\x00', @link_local}) close(r3) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f00000000c0)={0x0, {0x0, 0x0, 0x0, 0x0, 0x5}}) 16:48:19 executing program 2: creat(&(0x7f0000000280)='./file0\x00', 0x0) close(0xffffffffffffffff) write$binfmt_script(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40074, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) 16:48:19 executing program 3 (fault-call:1 fault-nth:68): creat(&(0x7f0000000280)='./file0\x00', 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) 16:48:19 executing program 5: creat(&(0x7f0000000280)='./file0\x00', 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x402d7, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) 16:48:19 executing program 0: creat(&(0x7f0000000280)='./file0\x00', 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) [ 429.399220] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue 16:48:19 executing program 4: open(&(0x7f0000000080)='./file0\x00', 0x40c5, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup(r0) syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x1000, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) dup(r2) r3 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={0x0}}, 0x0) r4 = socket$inet_udplite(0x2, 0x2, 0x88) r5 = dup(r4) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=ANY=[@ANYBLOB="280000001d000100000000000000000007000000", @ANYRES32=r5, @ANYBLOB="80b586000a0002"], 0x28}}, 0x0) sendmmsg$alg(r3, &(0x7f00000000c0), 0x492492492492627, 0x0) [ 429.452112] FAULT_INJECTION: forcing a failure. [ 429.452112] name failslab, interval 1, probability 0, space 0, times 0 [ 429.479620] CPU: 1 PID: 24438 Comm: syz-executor.3 Not tainted 4.19.169-syzkaller #0 [ 429.487530] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 429.496946] Call Trace: [ 429.499527] dump_stack+0x1fc/0x2ef [ 429.503141] should_fail.cold+0xa/0xf [ 429.506925] ? __alloc_workqueue_key+0x5e4/0xed0 [ 429.511674] ? setup_fault_attr+0x200/0x200 [ 429.516058] __should_failslab+0x115/0x180 [ 429.520287] should_failslab+0x5/0x10 [ 429.524069] kmem_cache_alloc+0x277/0x370 [ 429.528290] ? ext4_sync_fs+0x8d0/0x8d0 [ 429.532246] ext4_alloc_inode+0x1a/0x630 [ 429.536335] ? ext4_sync_fs+0x8d0/0x8d0 [ 429.540291] alloc_inode+0x5d/0x180 [ 429.543901] iget_locked+0x193/0x480 [ 429.547601] __ext4_iget+0x279/0x3e00 [ 429.551404] ? __alloc_workqueue_key+0x92d/0xed0 [ 429.556175] ? ext4_get_projid+0x190/0x190 [ 429.560396] ? workqueue_sysfs_register+0x3e0/0x3e0 [ 429.565402] ext4_fill_super+0x6f83/0xc820 [ 429.569631] ? ext4_calculate_overhead+0x11c0/0x11c0 [ 429.574739] ? snprintf+0xbb/0xf0 [ 429.578198] ? wait_for_completion_io+0x10/0x10 [ 429.583023] ? set_blocksize+0x163/0x3f0 [ 429.587072] mount_bdev+0x2fc/0x3b0 [ 429.590680] ? ext4_calculate_overhead+0x11c0/0x11c0 [ 429.595766] mount_fs+0xa3/0x310 [ 429.599120] vfs_kern_mount.part.0+0x68/0x470 [ 429.603602] do_mount+0x113c/0x2f10 [ 429.607216] ? lock_acquire+0x170/0x3c0 [ 429.611173] ? check_preemption_disabled+0x41/0x280 [ 429.616171] ? copy_mount_string+0x40/0x40 [ 429.620388] ? copy_mount_options+0x59/0x380 [ 429.624788] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 429.629791] ? kmem_cache_alloc_trace+0x323/0x380 [ 429.634617] ? copy_mount_options+0x26f/0x380 [ 429.639102] ksys_mount+0xcf/0x130 [ 429.642635] __x64_sys_mount+0xba/0x150 [ 429.646611] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 429.651200] do_syscall_64+0xf9/0x620 [ 429.654992] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 429.660170] RIP: 0033:0x460c6a [ 429.663353] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 ad 89 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 8a 89 fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 429.682244] RSP: 002b:00007fb3ea55ea78 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 429.689936] RAX: ffffffffffffffda RBX: 00007fb3ea55eb10 RCX: 0000000000460c6a 16:48:20 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x0, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f00000000c0)={0x0, {0x0, 0x0, 0x0, 0x0, 0x5}}) r3 = creat(&(0x7f0000000280)='./file0\x00', 0x1) close(r3) ioctl$UI_SET_EVBIT(r3, 0x40045564, 0x12) [ 429.697209] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007fb3ea55ead0 [ 429.704468] RBP: 00007fb3ea55ead0 R08: 00007fb3ea55eb10 R09: 0000000020000000 [ 429.711728] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000020000000 [ 429.718980] R13: 0000000020000100 R14: 0000000020000200 R15: 0000000020013000 16:48:20 executing program 2: creat(&(0x7f0000000280)='./file0\x00', 0x0) close(0xffffffffffffffff) write$binfmt_script(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40076, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) 16:48:20 executing program 0: creat(&(0x7f0000000280)='./file0\x00', 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000050100000c000000d90000000f0000000100000000000000000000000020000000200000200000002cc4645f2cc4645f0100ffff53ef0100010000002cc4645f000000000000000001000000000000000b0000008000000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e3338363633343038350000000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000000000000000000000000000000000000d9ca5cac99fd4329af4dde786c1a5d13010040000c000000000000002cc4645f", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) [ 429.761287] EXT4-fs (loop3): get root inode failed [ 429.777831] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue [ 429.816861] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue [ 429.825553] EXT4-fs (loop3): mount failed 16:48:20 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x0, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) r3 = creat(&(0x7f0000000280)='./file0\x00', 0x1) close(r3) ioctl$SCSI_IOCTL_GET_BUS_NUMBER(r3, 0x5386, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f00000000c0)={0x0, {0x0, 0x0, 0x0, 0x0, 0x5}}) 16:48:20 executing program 4: open(&(0x7f0000000080)='./file0\x00', 0x40c5, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup(r0) syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x1000, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) dup(r2) r3 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={0x0}}, 0x0) r4 = socket$inet_udplite(0x2, 0x2, 0x88) r5 = dup(r4) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=ANY=[@ANYBLOB="280000001d000100000000000000000007000000", @ANYRES32=r5, @ANYBLOB="80b586000a0002"], 0x28}}, 0x0) sendmmsg$alg(r3, &(0x7f00000000c0), 0x492492492492627, 0x0) 16:48:20 executing program 5: creat(&(0x7f0000000280)='./file0\x00', 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40300, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) 16:48:20 executing program 0: creat(&(0x7f0000000280)='./file0\x00', 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) 16:48:20 executing program 3 (fault-call:1 fault-nth:69): creat(&(0x7f0000000280)='./file0\x00', 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) 16:48:20 executing program 4: open(&(0x7f0000000080)='./file0\x00', 0x40c5, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup(r0) syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x1000, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) dup(r2) r3 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={0x0}}, 0x0) r4 = socket$inet_udplite(0x2, 0x2, 0x88) r5 = dup(r4) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=ANY=[@ANYBLOB="280000001d000100000000000000000007000000", @ANYRES32=r5, @ANYBLOB="80b586000a0002"], 0x28}}, 0x0) sendmmsg$alg(r3, &(0x7f00000000c0), 0x492492492492627, 0x0) 16:48:20 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x0, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x0) lseek(r2, 0x8, 0x1) r3 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = creat(&(0x7f0000000280)='./file0\x00', 0x1) close(r4) getsockopt$inet_sctp_SCTP_I_WANT_MAPPED_V4_ADDR(r3, 0x84, 0xc, &(0x7f0000000040), &(0x7f00000000c0)=0xfffffffffffffcfe) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f0000000100)={0x1ff, {0x0, 0x0, 0x0, 0x0, 0x5}}) 16:48:20 executing program 2: creat(&(0x7f0000000280)='./file0\x00', 0x0) close(0xffffffffffffffff) write$binfmt_script(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4007a, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) 16:48:20 executing program 0: creat(&(0x7f0000000280)='./file0\x00', 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) [ 430.127746] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue 16:48:20 executing program 4: open(&(0x7f0000000080)='./file0\x00', 0x40c5, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup(r0) syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x1000, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) openat$tun(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/net/tun\x00', 0x0, 0x0) dup(0xffffffffffffffff) r2 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={0x0}}, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) r4 = dup(r3) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=ANY=[@ANYBLOB="280000001d000100000000000000000007000000", @ANYRES32=r4, @ANYBLOB="80b586000a0002"], 0x28}}, 0x0) sendmmsg$alg(r2, &(0x7f00000000c0), 0x492492492492627, 0x0) [ 430.168956] FAULT_INJECTION: forcing a failure. [ 430.168956] name failslab, interval 1, probability 0, space 0, times 0 16:48:20 executing program 1: openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x0, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat(r1, &(0x7f0000000040)='./file0\x00', 0x202000, 0x96) ioctl$UI_ABS_SETUP(r2, 0x401c5504, &(0x7f0000000080)={0x0, {0x0, 0x0, 0x0, 0x0, 0x4}}) 16:48:20 executing program 5: creat(&(0x7f0000000280)='./file0\x00', 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40308, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d90000000f0000000100000000000000000000000020000000200000200000002cc4645f2cc4645f0100ffff53ef0100010000002cc4645f000000000000000001000000000000000b0000008000000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e3338363633343038350000000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000000000000000000000000000000000000d9ca5cac99fd4329af4dde786c1a5d13010040000c000000000000002cc4645f", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) 16:48:20 executing program 0: creat(&(0x7f0000000280)='./file0\x00', 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000080100000c000000d90000000f0000000100000000000000000000000020000000200000200000002cc4645f2cc4645f0100ffff53ef0100010000002cc4645f000000000000000001000000000000000b0000008000000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e3338363633343038350000000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000000000000000000000000000000000000d9ca5cac99fd4329af4dde786c1a5d13010040000c000000000000002cc4645f", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) [ 430.214858] CPU: 1 PID: 24493 Comm: syz-executor.3 Not tainted 4.19.169-syzkaller #0 [ 430.222781] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 430.232140] Call Trace: [ 430.234756] dump_stack+0x1fc/0x2ef [ 430.238397] should_fail.cold+0xa/0xf [ 430.242207] ? setup_fault_attr+0x200/0x200 [ 430.246536] ? mark_held_locks+0xf0/0xf0 [ 430.250604] ? kasan_kmalloc+0x139/0x160 [ 430.254681] __should_failslab+0x115/0x180 [ 430.258935] should_failslab+0x5/0x10 [ 430.258949] kmem_cache_alloc+0x3f/0x370 [ 430.258964] ? mempool_alloc+0x350/0x350 [ 430.258977] mempool_alloc+0x146/0x350 16:48:20 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x0, 0x0) write$uinput_user_dev(r0, &(0x7f0000000180)={'syz1\x00', {0x8, 0x5, 0x9, 0x9}, 0xb, [0x5, 0x7f, 0x1, 0x2, 0x7, 0x0, 0x2, 0x1, 0xfffffff7, 0xfffffffb, 0x5, 0x5, 0x4, 0x5, 0x6, 0x80000000, 0x4de4af43, 0x2b7, 0x5, 0xf02, 0x0, 0x410a874f, 0x10001, 0x6, 0x8, 0x1, 0x5, 0x10000, 0x8, 0x100, 0x6, 0x2, 0x7, 0x1, 0x0, 0x4, 0xfffffffb, 0x7fff, 0x5, 0x10001, 0x1b2f, 0x5416, 0x3, 0x0, 0xffffffff, 0x9, 0x2, 0x1, 0xf03, 0x6f, 0x7fff, 0x81, 0x88a, 0x3f, 0x7fff, 0xffffffff, 0x9, 0x2, 0x3, 0x8000, 0x40, 0x0, 0xce, 0x40], [0xde33, 0x8, 0x7fff, 0xc44, 0x52a, 0x7fffffff, 0x8, 0x5, 0x1, 0x81c8, 0xff, 0x0, 0xffff, 0x97, 0x4, 0xfd0a, 0xd9, 0x5, 0x5, 0x1, 0x80000000, 0x4, 0xff, 0x9, 0x5e74, 0x80000000, 0x5, 0x5, 0x5e7a, 0x9, 0x3, 0x7f, 0x3, 0xfb, 0x1, 0x1ff, 0x4, 0x7, 0x36ec, 0x9, 0xaf, 0x20, 0x1, 0x10000, 0x5, 0x7, 0x7fffffff, 0x2, 0x8, 0xffffffff, 0xffff, 0x4, 0x5, 0x6, 0x9, 0x1, 0x6f1c, 0x4, 0x100, 0x1, 0x4, 0x1, 0x5, 0x100], [0xe80d, 0x40, 0x4, 0x4, 0x9, 0xfffffc58, 0xe24e, 0x8, 0x7, 0x200, 0x40, 0x0, 0x9, 0x4a70, 0x4, 0x2, 0x1ff, 0x1, 0x3, 0x1, 0x6, 0x10001, 0x7, 0x10000, 0x0, 0x2, 0x3, 0xa0000000, 0x7, 0x9, 0x80000000, 0x9, 0xffffffff, 0x401, 0x4, 0x2e, 0x4, 0x0, 0x9, 0x10001, 0x7, 0x0, 0x6, 0x3, 0xffffffff, 0x2, 0x3, 0x120000, 0x800, 0x0, 0x8, 0x81, 0x1, 0x722e, 0xffffff80, 0x1, 0xffff, 0xfff, 0x800, 0xfffffffb, 0x6, 0x5, 0x11c2, 0x1f], [0x24eb, 0x0, 0x7, 0xfffffffd, 0x0, 0x4, 0x80000000, 0x63, 0xafe, 0x4b26, 0x5, 0x10001, 0x3ff, 0x1, 0x80, 0x6, 0x5, 0x3a, 0xfffffffa, 0x7, 0xdd, 0x20, 0x3f, 0x8, 0x0, 0x5, 0xfffffbff, 0x6, 0xffffc49f, 0x3, 0x2, 0x2, 0x8, 0x7fff, 0x20, 0xdf1, 0x6, 0x4, 0x4aa, 0x5, 0x7, 0x40, 0x7ff, 0x2, 0x5, 0x80000000, 0x3, 0x2, 0x8, 0x2, 0x1, 0x9, 0x1000, 0x1d0, 0x9, 0x200, 0x9, 0x1, 0x4, 0x74e, 0xca, 0x4, 0x0, 0x3]}, 0x45c) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = syz_mount_image$gfs2(&(0x7f0000000740)='gfs2\x00', &(0x7f0000000780)='./file0\x00', 0xffff, 0x1, &(0x7f0000000880)=[{&(0x7f00000007c0)="7b353b11920c56c6da75ab17db276b1d437bb974f6e58d0678761f3995beddb960d0c52d6b82ad246aebce99cff246b627ce44d3a0aadb410c79325a0b1df08a824f3da07ef4df4f565f2b9ca751016ae592142c637472e43878b1febb21c8426bf8fd1a089dfbcbff2408dd7c6e3749082c9f30dd1f7a22360782cc6d4e705e07ba6f3de208f6ecb2faea2bb36bdb3d4c84b34673a7d39f8922e8723ad68c97e7430983f021a4fbc39e973fb1b2fdf5de26d51d7ca1ad333c2174", 0xbb, 0x1}], 0x2250001, &(0x7f00000008c0)={[{@acl='acl'}], [{@subj_role={'subj_role', 0x3d, '-*$'}}, {@euid_lt={'euid<'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@appraise_type='appraise_type=imasig'}]}) dup(r2) ioctl$F2FS_IOC_GARBAGE_COLLECT(r1, 0x4004f506, &(0x7f0000000040)=0x1) r3 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r4, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000240)={0xffffffffffffffff}, 0x2}}, 0x20) r6 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_MIGRATE_ID(r6, &(0x7f0000000040)={0x12, 0x10, 0xfa00, {&(0x7f0000000000), r5, r4}}, 0x18) write$RDMA_USER_CM_CMD_REJECT(r3, &(0x7f0000000600)={0x9, 0x108, 0xfa00, {r5, 0x9, "efce2b", "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"}}, 0x110) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f00000000c0)={0x0, {0x0, 0x0, 0x0, 0x0, 0x5}}) ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f0000000100)={{0x1, 0x3, 0xffff, 0x1f}, 'syz1\x00', 0x1f}) [ 430.258995] ? mempool_resize+0x790/0x790 16:48:20 executing program 2: creat(&(0x7f0000000280)='./file0\x00', 0x0) close(0xffffffffffffffff) write$binfmt_script(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40092, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d90000000f0000000100000000000000000000000020000000200000200000002cc4645f2cc4645f0100ffff53ef0100010000002cc4645f000000000000000001000000000000000b0000008000000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e3338363633343038350000000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000000000000000000000000000000000000d9ca5cac99fd4329af4dde786c1a5d13010040000c000000000000002cc4645f", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) 16:48:20 executing program 0: creat(&(0x7f0000000280)='./file0\x00', 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) [ 430.259012] ? check_preemption_disabled+0x41/0x280 [ 430.259032] ? find_get_entry+0x4f4/0x8a0 [ 430.259057] bio_alloc_bioset+0x389/0x5e0 [ 430.259072] ? __find_get_block+0x7a6/0xde0 [ 430.259087] ? bvec_alloc+0x2f0/0x2f0 16:48:20 executing program 3 (fault-call:1 fault-nth:70): creat(&(0x7f0000000280)='./file0\x00', 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) [ 430.259103] ? lock_downgrade+0x720/0x720 [ 430.259124] submit_bh_wbc+0x141/0x760 [ 430.259142] ll_rw_block+0x1ed/0x220 [ 430.259161] __breadahead_gfp+0xb8/0x130 16:48:20 executing program 5: creat(&(0x7f0000000280)='./file0\x00', 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40352, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) [ 430.259175] ? __breadahead+0x130/0x130 [ 430.259200] __ext4_get_inode_loc+0xc16/0x10f0 [ 430.259220] ? iget_locked+0x154/0x480 [ 430.259237] __ext4_iget+0x2ef/0x3e00 [ 430.259260] ? __alloc_workqueue_key+0x92d/0xed0 16:48:21 executing program 0: creat(&(0x7f0000000280)='./file0\x00', 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000e00100000c000000d90000000f0000000100000000000000000000000020000000200000200000002cc4645f2cc4645f0100ffff53ef0100010000002cc4645f000000000000000001000000000000000b0000008000000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e3338363633343038350000000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000000000000000000000000000000000000d9ca5cac99fd4329af4dde786c1a5d13010040000c000000000000002cc4645f", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) 16:48:21 executing program 1: write$vhost_msg(0xffffffffffffffff, &(0x7f0000000180)={0x1, {&(0x7f0000000040)=""/127, 0x7f, &(0x7f0000000100)=""/96, 0x3, 0x1}}, 0x48) r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x0, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) dup(r1) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f00000000c0)={0x0, {0x0, 0x0, 0x0, 0x0, 0x5}}) [ 430.259277] ? ext4_get_projid+0x190/0x190 [ 430.259310] ext4_fill_super+0x6f83/0xc820 [ 430.259348] ? ext4_calculate_overhead+0x11c0/0x11c0 [ 430.259365] ? snprintf+0xbb/0xf0 [ 430.259388] ? wait_for_completion_io+0x10/0x10 [ 430.259400] ? set_blocksize+0x163/0x3f0 [ 430.259420] mount_bdev+0x2fc/0x3b0 [ 430.259432] ? ext4_calculate_overhead+0x11c0/0x11c0 [ 430.259446] mount_fs+0xa3/0x310 [ 430.259465] vfs_kern_mount.part.0+0x68/0x470 [ 430.259482] do_mount+0x113c/0x2f10 [ 430.259499] ? do_raw_spin_unlock+0x171/0x230 [ 430.259512] ? check_preemption_disabled+0x41/0x280 [ 430.259526] ? copy_mount_string+0x40/0x40 16:48:21 executing program 0: creat(&(0x7f0000000280)='./file0\x00', 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) [ 430.259539] ? copy_mount_options+0x59/0x380 [ 430.259555] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 430.259569] ? kmem_cache_alloc_trace+0x323/0x380 [ 430.259586] ? copy_mount_options+0x26f/0x380 [ 430.259601] ksys_mount+0xcf/0x130 [ 430.259616] __x64_sys_mount+0xba/0x150 [ 430.259631] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 430.259644] do_syscall_64+0xf9/0x620 [ 430.259660] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 430.259670] RIP: 0033:0x460c6a [ 430.259683] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 ad 89 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 8a 89 fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 430.259690] RSP: 002b:00007fb3ea55ea78 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 430.259703] RAX: ffffffffffffffda RBX: 00007fb3ea55eb10 RCX: 0000000000460c6a [ 430.259711] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007fb3ea55ead0 [ 430.259718] RBP: 00007fb3ea55ead0 R08: 00007fb3ea55eb10 R09: 0000000020000000 [ 430.259726] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000020000000 16:48:21 executing program 4: open(&(0x7f0000000080)='./file0\x00', 0x40c5, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup(r0) syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x1000, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) openat$tun(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/net/tun\x00', 0x0, 0x0) dup(0xffffffffffffffff) r2 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={0x0}}, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) r4 = dup(r3) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=ANY=[@ANYBLOB="280000001d000100000000000000000007000000", @ANYRES32=r4, @ANYBLOB="80b586000a0002"], 0x28}}, 0x0) sendmmsg$alg(r2, &(0x7f00000000c0), 0x492492492492627, 0x0) 16:48:21 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x0, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f00000000c0)={0x0, {0x0, 0x0, 0x0, 0x0, 0x5}}) r3 = openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x8101, 0x0) ioctl$UI_DEV_SETUP(r3, 0x405c5503, &(0x7f0000000100)={{0x8, 0xa3, 0x80, 0x4}, 'syz1\x00', 0x1e}) [ 430.259733] R13: 0000000020000100 R14: 0000000020000200 R15: 0000000020013000 [ 430.290274] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue [ 430.383883] EXT4-fs (loop3): mounted filesystem without journal. Opts: ,errors=continue [ 430.443861] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue [ 430.609946] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue [ 430.621878] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue [ 430.650858] FAULT_INJECTION: forcing a failure. [ 430.650858] name failslab, interval 1, probability 0, space 0, times 0 [ 430.712049] CPU: 0 PID: 24554 Comm: syz-executor.3 Not tainted 4.19.169-syzkaller #0 [ 430.750658] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 430.750663] Call Trace: [ 430.750686] dump_stack+0x1fc/0x2ef [ 430.750704] should_fail.cold+0xa/0xf [ 430.750724] ? __alloc_workqueue_key+0x5e4/0xed0 [ 430.856282] ? setup_fault_attr+0x200/0x200 [ 430.860599] __should_failslab+0x115/0x180 [ 430.864825] should_failslab+0x5/0x10 [ 430.868612] kmem_cache_alloc+0x277/0x370 [ 430.872748] ? ext4_sync_fs+0x8d0/0x8d0 [ 430.876709] ext4_alloc_inode+0x1a/0x630 [ 430.880778] ? ext4_sync_fs+0x8d0/0x8d0 [ 430.884737] alloc_inode+0x5d/0x180 [ 430.888346] iget_locked+0x193/0x480 [ 430.892064] __ext4_iget+0x279/0x3e00 [ 430.895857] ? __alloc_workqueue_key+0x92d/0xed0 [ 430.900599] ? ext4_get_projid+0x190/0x190 [ 430.904819] ? workqueue_sysfs_register+0x3e0/0x3e0 [ 430.909837] ext4_fill_super+0x6f83/0xc820 [ 430.914074] ? ext4_calculate_overhead+0x11c0/0x11c0 [ 430.919165] ? snprintf+0xbb/0xf0 [ 430.922608] ? wait_for_completion_io+0x10/0x10 [ 430.927263] ? set_blocksize+0x163/0x3f0 [ 430.931316] mount_bdev+0x2fc/0x3b0 [ 430.934929] ? ext4_calculate_overhead+0x11c0/0x11c0 [ 430.940014] mount_fs+0xa3/0x310 [ 430.943369] vfs_kern_mount.part.0+0x68/0x470 [ 430.947850] do_mount+0x113c/0x2f10 [ 430.951584] ? lock_acquire+0x170/0x3c0 [ 430.955563] ? check_preemption_disabled+0x41/0x280 [ 430.960567] ? copy_mount_string+0x40/0x40 [ 430.964790] ? copy_mount_options+0x59/0x380 [ 430.969185] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 430.974201] ? kmem_cache_alloc_trace+0x323/0x380 [ 430.979036] ? copy_mount_options+0x26f/0x380 [ 430.983524] ksys_mount+0xcf/0x130 [ 430.987065] __x64_sys_mount+0xba/0x150 [ 430.991034] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 430.995607] do_syscall_64+0xf9/0x620 [ 430.999399] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 431.004574] RIP: 0033:0x460c6a [ 431.007756] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 ad 89 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 8a 89 fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 431.026774] RSP: 002b:00007fb3ea55ea78 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 431.034466] RAX: ffffffffffffffda RBX: 00007fb3ea55eb10 RCX: 0000000000460c6a [ 431.041722] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007fb3ea55ead0 [ 431.048990] RBP: 00007fb3ea55ead0 R08: 00007fb3ea55eb10 R09: 0000000020000000 [ 431.056244] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000020000000 [ 431.063496] R13: 0000000020000100 R14: 0000000020000200 R15: 0000000020013000 [ 431.081846] EXT4-fs (loop3): get root inode failed 16:48:21 executing program 5: creat(&(0x7f0000000280)='./file0\x00', 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40390, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) 16:48:21 executing program 0: creat(&(0x7f0000000280)='./file0\x00', 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) [ 431.117738] EXT4-fs (loop3): mount failed 16:48:21 executing program 2: creat(&(0x7f0000000280)='./file0\x00', 0x0) close(0xffffffffffffffff) write$binfmt_script(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x400ba, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d90000000f0000000100000000000000000000000020000000200000200000002cc4645f2cc4645f0100ffff53ef0100010000002cc4645f000000000000000001000000000000000b0000008000000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e3338363633343038350000000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000000000000000000000000000000000000d9ca5cac99fd4329af4dde786c1a5d13010040000c000000000000002cc4645f", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) 16:48:21 executing program 3 (fault-call:1 fault-nth:71): creat(&(0x7f0000000280)='./file0\x00', 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) 16:48:21 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x0, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f00000000c0)={0x0, {0x0, 0x0, 0x0, 0x0, 0x5}}) r3 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x2, 0x0) ioctl$UI_SET_EVBIT(r3, 0x40045564, 0x18) 16:48:21 executing program 4: open(&(0x7f0000000080)='./file0\x00', 0x40c5, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup(r0) syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x1000, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) openat$tun(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/net/tun\x00', 0x0, 0x0) dup(0xffffffffffffffff) r2 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={0x0}}, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) r4 = dup(r3) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=ANY=[@ANYBLOB="280000001d000100000000000000000007000000", @ANYRES32=r4, @ANYBLOB="80b586000a0002"], 0x28}}, 0x0) sendmmsg$alg(r2, &(0x7f00000000c0), 0x492492492492627, 0x0) 16:48:21 executing program 0: creat(&(0x7f0000000280)='./file0\x00', 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) [ 431.271407] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue [ 431.282436] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue 16:48:21 executing program 4: open(&(0x7f0000000080)='./file0\x00', 0x40c5, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup(r0) syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x1000, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$tun(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/net/tun\x00', 0x0, 0x0) dup(r2) r3 = socket(0x0, 0x80002, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={0x0}}, 0x0) r4 = socket$inet_udplite(0x2, 0x2, 0x88) r5 = dup(r4) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=ANY=[@ANYBLOB="280000001d000100000000000000000007000000", @ANYRES32=r5, @ANYBLOB="80b586000a0002"], 0x28}}, 0x0) sendmmsg$alg(r3, &(0x7f00000000c0), 0x492492492492627, 0x0) 16:48:21 executing program 5: creat(&(0x7f0000000280)='./file0\x00', 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x403aa, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) [ 431.403518] FAULT_INJECTION: forcing a failure. [ 431.403518] name failslab, interval 1, probability 0, space 0, times 0 [ 431.456101] CPU: 0 PID: 24595 Comm: syz-executor.3 Not tainted 4.19.169-syzkaller #0 [ 431.464021] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 431.473379] Call Trace: [ 431.475989] dump_stack+0x1fc/0x2ef [ 431.479632] should_fail.cold+0xa/0xf [ 431.483443] ? setup_fault_attr+0x200/0x200 [ 431.487811] ? mark_held_locks+0xf0/0xf0 [ 431.487826] ? blk_queue_exit+0xf2/0x250 [ 431.487841] ? ___preempt_schedule+0x16/0x18 [ 431.487860] __should_failslab+0x115/0x180 [ 431.487876] should_failslab+0x5/0x10 [ 431.487888] kmem_cache_alloc+0x3f/0x370 [ 431.487900] ? mempool_alloc+0x350/0x350 [ 431.487912] mempool_alloc+0x146/0x350 [ 431.487929] ? mempool_resize+0x790/0x790 [ 431.487944] ? check_preemption_disabled+0x41/0x280 [ 431.487963] ? find_get_entry+0x4f4/0x8a0 [ 431.487981] bio_alloc_bioset+0x389/0x5e0 [ 431.487995] ? __find_get_block+0x7a6/0xde0 [ 431.488010] ? bvec_alloc+0x2f0/0x2f0 [ 431.488024] ? lock_downgrade+0x720/0x720 [ 431.488049] submit_bh_wbc+0x141/0x760 [ 431.488066] ll_rw_block+0x1ed/0x220 [ 431.488082] __breadahead_gfp+0xb8/0x130 [ 431.488096] ? __breadahead+0x130/0x130 [ 431.488119] __ext4_get_inode_loc+0xc16/0x10f0 [ 431.488138] ? iget_locked+0x154/0x480 [ 431.488154] __ext4_iget+0x2ef/0x3e00 [ 431.488176] ? __alloc_workqueue_key+0x92d/0xed0 [ 431.488191] ? ext4_get_projid+0x190/0x190 [ 431.488222] ext4_fill_super+0x6f83/0xc820 [ 431.488258] ? ext4_calculate_overhead+0x11c0/0x11c0 [ 431.488274] ? snprintf+0xbb/0xf0 [ 431.488294] ? wait_for_completion_io+0x10/0x10 16:48:22 executing program 4: open(&(0x7f0000000080)='./file0\x00', 0x40c5, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup(r0) syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x1000, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$tun(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/net/tun\x00', 0x0, 0x0) dup(r2) r3 = socket(0x0, 0x80002, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={0x0}}, 0x0) r4 = socket$inet_udplite(0x2, 0x2, 0x88) r5 = dup(r4) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=ANY=[@ANYBLOB="280000001d000100000000000000000007000000", @ANYRES32=r5, @ANYBLOB="80b586000a0002"], 0x28}}, 0x0) sendmmsg$alg(r3, &(0x7f00000000c0), 0x492492492492627, 0x0) [ 431.488306] ? set_blocksize+0x163/0x3f0 [ 431.488326] mount_bdev+0x2fc/0x3b0 [ 431.488339] ? ext4_calculate_overhead+0x11c0/0x11c0 [ 431.488353] mount_fs+0xa3/0x310 [ 431.488372] vfs_kern_mount.part.0+0x68/0x470 [ 431.488392] do_mount+0x113c/0x2f10 [ 431.488410] ? lock_acquire+0x170/0x3c0 [ 431.488425] ? check_preemption_disabled+0x41/0x280 [ 431.488442] ? copy_mount_string+0x40/0x40 [ 431.642153] ? copy_mount_options+0x59/0x380 [ 431.646575] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 431.651602] ? kmem_cache_alloc_trace+0x323/0x380 [ 431.656458] ? copy_mount_options+0x26f/0x380 [ 431.660963] ksys_mount+0xcf/0x130 [ 431.664512] __x64_sys_mount+0xba/0x150 [ 431.668495] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 431.673188] do_syscall_64+0xf9/0x620 [ 431.676997] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 431.682190] RIP: 0033:0x460c6a [ 431.685384] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 ad 89 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 8a 89 fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 431.704283] RSP: 002b:00007fb3ea55ea78 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 431.711993] RAX: ffffffffffffffda RBX: 00007fb3ea55eb10 RCX: 0000000000460c6a [ 431.719264] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007fb3ea55ead0 [ 431.726536] RBP: 00007fb3ea55ead0 R08: 00007fb3ea55eb10 R09: 0000000020000000 [ 431.733806] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000020000000 [ 431.741077] R13: 0000000020000100 R14: 0000000020000200 R15: 0000000020013000 [ 431.780786] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue 16:48:22 executing program 2: creat(&(0x7f0000000280)='./file0\x00', 0x0) close(0xffffffffffffffff) write$binfmt_script(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x400d6, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) 16:48:22 executing program 0: creat(&(0x7f0000000280)='./file0\x00', 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) 16:48:22 executing program 4: open(&(0x7f0000000080)='./file0\x00', 0x40c5, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup(r0) syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x1000, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$tun(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/net/tun\x00', 0x0, 0x0) dup(r2) r3 = socket(0x0, 0x80002, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={0x0}}, 0x0) r4 = socket$inet_udplite(0x2, 0x2, 0x88) r5 = dup(r4) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=ANY=[@ANYBLOB="280000001d000100000000000000000007000000", @ANYRES32=r5, @ANYBLOB="80b586000a0002"], 0x28}}, 0x0) sendmmsg$alg(r3, &(0x7f00000000c0), 0x492492492492627, 0x0) [ 431.846112] EXT4-fs (loop3): mounted filesystem without journal. Opts: ,errors=continue 16:48:22 executing program 5: creat(&(0x7f0000000280)='./file0\x00', 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x403ac, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) 16:48:22 executing program 3 (fault-call:1 fault-nth:72): creat(&(0x7f0000000280)='./file0\x00', 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) 16:48:22 executing program 0: creat(&(0x7f0000000280)='./file0\x00', 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) [ 431.983594] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue 16:48:22 executing program 4: open(&(0x7f0000000080)='./file0\x00', 0x40c5, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup(r0) syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x1000, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$tun(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/net/tun\x00', 0x0, 0x0) dup(r2) r3 = socket(0x10, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={0x0}}, 0x0) r4 = socket$inet_udplite(0x2, 0x2, 0x88) r5 = dup(r4) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=ANY=[@ANYBLOB="280000001d000100000000000000000007000000", @ANYRES32=r5, @ANYBLOB="80b586000a0002"], 0x28}}, 0x0) sendmmsg$alg(r3, &(0x7f00000000c0), 0x492492492492627, 0x0) 16:48:22 executing program 2: creat(&(0x7f0000000280)='./file0\x00', 0x0) close(0xffffffffffffffff) write$binfmt_script(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x400ee, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) [ 432.074125] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue [ 432.096258] FAULT_INJECTION: forcing a failure. [ 432.096258] name failslab, interval 1, probability 0, space 0, times 0 [ 432.133100] CPU: 1 PID: 24647 Comm: syz-executor.3 Not tainted 4.19.169-syzkaller #0 [ 432.141006] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 432.150363] Call Trace: [ 432.152956] dump_stack+0x1fc/0x2ef [ 432.156588] should_fail.cold+0xa/0xf [ 432.160395] ? setup_fault_attr+0x200/0x200 [ 432.164718] ? mark_held_locks+0xf0/0xf0 [ 432.168784] ? kasan_kmalloc+0x139/0x160 [ 432.172858] __should_failslab+0x115/0x180 [ 432.177098] should_failslab+0x5/0x10 [ 432.180912] kmem_cache_alloc+0x3f/0x370 [ 432.180929] ? mempool_alloc+0x350/0x350 [ 432.180940] mempool_alloc+0x146/0x350 [ 432.180956] ? mempool_resize+0x790/0x790 [ 432.197085] ? check_preemption_disabled+0x41/0x280 [ 432.202114] ? find_get_entry+0x4f4/0x8a0 [ 432.206269] bio_alloc_bioset+0x389/0x5e0 [ 432.210422] ? __find_get_block+0x7a6/0xde0 [ 432.214747] ? bvec_alloc+0x2f0/0x2f0 [ 432.218548] ? lock_downgrade+0x720/0x720 [ 432.222704] submit_bh_wbc+0x141/0x760 [ 432.226599] ll_rw_block+0x1ed/0x220 [ 432.230324] __breadahead_gfp+0xb8/0x130 [ 432.234391] ? __breadahead+0x130/0x130 [ 432.238383] __ext4_get_inode_loc+0xc16/0x10f0 [ 432.242970] ? iget_locked+0x154/0x480 [ 432.246862] __ext4_iget+0x2ef/0x3e00 [ 432.250672] ? __alloc_workqueue_key+0x92d/0xed0 [ 432.255433] ? ext4_get_projid+0x190/0x190 [ 432.259688] ext4_fill_super+0x6f83/0xc820 [ 432.263948] ? ext4_calculate_overhead+0x11c0/0x11c0 [ 432.269055] ? snprintf+0xbb/0xf0 [ 432.272535] ? wait_for_completion_io+0x10/0x10 [ 432.277217] ? set_blocksize+0x163/0x3f0 [ 432.281288] mount_bdev+0x2fc/0x3b0 [ 432.284916] ? ext4_calculate_overhead+0x11c0/0x11c0 [ 432.290021] mount_fs+0xa3/0x310 [ 432.293396] vfs_kern_mount.part.0+0x68/0x470 [ 432.297897] do_mount+0x113c/0x2f10 [ 432.301528] ? do_raw_spin_unlock+0x171/0x230 [ 432.306023] ? check_preemption_disabled+0x41/0x280 [ 432.311040] ? copy_mount_string+0x40/0x40 [ 432.315282] ? copy_mount_options+0x59/0x380 [ 432.319691] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 432.324710] ? kmem_cache_alloc_trace+0x323/0x380 [ 432.329560] ? copy_mount_options+0x26f/0x380 [ 432.334059] ksys_mount+0xcf/0x130 [ 432.337601] __x64_sys_mount+0xba/0x150 [ 432.341576] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 432.346159] do_syscall_64+0xf9/0x620 [ 432.349964] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 432.355161] RIP: 0033:0x460c6a [ 432.358359] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 ad 89 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 8a 89 fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 432.377254] RSP: 002b:00007fb3ea55ea78 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 432.384959] RAX: ffffffffffffffda RBX: 00007fb3ea55eb10 RCX: 0000000000460c6a [ 432.392225] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007fb3ea55ead0 [ 432.399490] RBP: 00007fb3ea55ead0 R08: 00007fb3ea55eb10 R09: 0000000020000000 [ 432.406844] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000020000000 [ 432.414112] R13: 0000000020000100 R14: 0000000020000200 R15: 0000000020013000 16:48:22 executing program 0: creat(&(0x7f0000000280)='./file0\x00', 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) 16:48:22 executing program 4: open(&(0x7f0000000080)='./file0\x00', 0x40c5, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup(r0) syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x1000, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$tun(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/net/tun\x00', 0x0, 0x0) dup(r2) r3 = socket(0x10, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={0x0}}, 0x0) r4 = socket$inet_udplite(0x2, 0x2, 0x88) r5 = dup(r4) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=ANY=[@ANYBLOB="280000001d000100000000000000000007000000", @ANYRES32=r5, @ANYBLOB="80b586000a0002"], 0x28}}, 0x0) sendmmsg$alg(r3, &(0x7f00000000c0), 0x492492492492627, 0x0) 16:48:23 executing program 5: creat(&(0x7f0000000280)='./file0\x00', 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x403c0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) [ 432.577767] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue 16:48:23 executing program 0: creat(&(0x7f0000000280)='./file0\x00', 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) 16:48:23 executing program 4: open(&(0x7f0000000080)='./file0\x00', 0x40c5, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup(r0) syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x1000, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$tun(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/net/tun\x00', 0x0, 0x0) dup(r2) r3 = socket(0x10, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={0x0}}, 0x0) r4 = socket$inet_udplite(0x2, 0x2, 0x88) r5 = dup(r4) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=ANY=[@ANYBLOB="280000001d000100000000000000000007000000", @ANYRES32=r5, @ANYBLOB="80b586000a0002"], 0x28}}, 0x0) sendmmsg$alg(r3, &(0x7f00000000c0), 0x492492492492627, 0x0) 16:48:23 executing program 2: creat(&(0x7f0000000280)='./file0\x00', 0x0) close(0xffffffffffffffff) write$binfmt_script(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x400f0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) [ 432.697264] EXT4-fs (loop3): mounted filesystem without journal. Opts: ,errors=continue [ 432.735697] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue 16:48:23 executing program 5: creat(&(0x7f0000000280)='./file0\x00', 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x403c4, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) 16:48:23 executing program 0: creat(&(0x7f0000000280)='./file0\x00', 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) 16:48:23 executing program 3 (fault-call:1 fault-nth:73): creat(&(0x7f0000000280)='./file0\x00', 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) 16:48:23 executing program 4: open(&(0x7f0000000080)='./file0\x00', 0x40c5, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup(r0) syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x1000, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$tun(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/net/tun\x00', 0x0, 0x0) dup(r2) r3 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r4 = socket$inet_udplite(0x2, 0x2, 0x88) r5 = dup(r4) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=ANY=[@ANYBLOB="280000001d000100000000000000000007000000", @ANYRES32=r5, @ANYBLOB="80b586000a0002"], 0x28}}, 0x0) sendmmsg$alg(r3, &(0x7f00000000c0), 0x492492492492627, 0x0) [ 432.968458] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue [ 432.990404] FAULT_INJECTION: forcing a failure. [ 432.990404] name failslab, interval 1, probability 0, space 0, times 0 [ 433.015444] CPU: 0 PID: 24701 Comm: syz-executor.3 Not tainted 4.19.169-syzkaller #0 [ 433.023353] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 433.032707] Call Trace: [ 433.035305] dump_stack+0x1fc/0x2ef [ 433.038951] should_fail.cold+0xa/0xf [ 433.042758] ? setup_fault_attr+0x200/0x200 [ 433.047087] ? lock_acquire+0x170/0x3c0 [ 433.051074] __should_failslab+0x115/0x180 [ 433.055321] should_failslab+0x5/0x10 [ 433.059128] kmem_cache_alloc_trace+0x284/0x380 [ 433.063816] ext4_setup_system_zone+0x149/0xac0 [ 433.068494] ? __sync_dirty_buffer+0x1ef/0x320 [ 433.073087] ? ext4_commit_super+0x6f1/0xb70 [ 433.077496] ? ext4_exit_system_zone+0x20/0x20 [ 433.082082] ? ext4_setup_super+0x5f3/0x9f0 [ 433.086418] ext4_fill_super+0x72e0/0xc820 [ 433.086453] ? ext4_calculate_overhead+0x11c0/0x11c0 [ 433.086470] ? snprintf+0xbb/0xf0 [ 433.086492] ? wait_for_completion_io+0x10/0x10 [ 433.086505] ? set_blocksize+0x163/0x3f0 [ 433.086526] mount_bdev+0x2fc/0x3b0 [ 433.086539] ? ext4_calculate_overhead+0x11c0/0x11c0 [ 433.086551] mount_fs+0xa3/0x310 [ 433.086568] vfs_kern_mount.part.0+0x68/0x470 [ 433.124511] do_mount+0x113c/0x2f10 [ 433.128128] ? lock_acquire+0x170/0x3c0 [ 433.132091] ? check_preemption_disabled+0x41/0x280 [ 433.137094] ? copy_mount_string+0x40/0x40 [ 433.141315] ? copy_mount_options+0x59/0x380 [ 433.145710] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 433.150714] ? kmem_cache_alloc_trace+0x323/0x380 [ 433.155544] ? copy_mount_options+0x26f/0x380 [ 433.160029] ksys_mount+0xcf/0x130 [ 433.163558] __x64_sys_mount+0xba/0x150 [ 433.167526] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 433.172097] do_syscall_64+0xf9/0x620 [ 433.175886] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 433.181077] RIP: 0033:0x460c6a [ 433.184255] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 ad 89 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 8a 89 fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 433.203140] RSP: 002b:00007fb3ea55ea78 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 433.210831] RAX: ffffffffffffffda RBX: 00007fb3ea55eb10 RCX: 0000000000460c6a 16:48:23 executing program 0: creat(&(0x7f0000000280)='./file0\x00', 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000200000c000000d90000000f0000000100000000000000000000000020000000200000200000002cc4645f2cc4645f0100ffff53ef0100010000002cc4645f000000000000000001000000000000000b0000008000000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e3338363633343038350000000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000000000000000000000000000000000000d9ca5cac99fd4329af4dde786c1a5d13010040000c000000000000002cc4645f", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) [ 433.218085] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007fb3ea55ead0 [ 433.225339] RBP: 00007fb3ea55ead0 R08: 00007fb3ea55eb10 R09: 0000000020000000 [ 433.232605] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000020000000 [ 433.239856] R13: 0000000020000100 R14: 0000000020000200 R15: 0000000020013000 [ 433.300218] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue 16:48:23 executing program 5: creat(&(0x7f0000000280)='./file0\x00', 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40500, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) 16:48:23 executing program 4: open(&(0x7f0000000080)='./file0\x00', 0x40c5, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup(r0) syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x1000, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$tun(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/net/tun\x00', 0x0, 0x0) dup(r2) r3 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r4 = socket$inet_udplite(0x2, 0x2, 0x88) r5 = dup(r4) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=ANY=[@ANYBLOB="280000001d000100000000000000000007000000", @ANYRES32=r5, @ANYBLOB="80b586000a0002"], 0x28}}, 0x0) sendmmsg$alg(r3, &(0x7f00000000c0), 0x492492492492627, 0x0) 16:48:23 executing program 0: creat(&(0x7f0000000280)='./file0\x00', 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) [ 433.383591] EXT4-fs (loop3): failed to initialize system zone (-12) [ 433.390114] EXT4-fs (loop3): mount failed 16:48:24 executing program 3 (fault-call:1 fault-nth:74): creat(&(0x7f0000000280)='./file0\x00', 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) 16:48:24 executing program 2: creat(&(0x7f0000000280)='./file0\x00', 0x0) close(0xffffffffffffffff) write$binfmt_script(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x400fc, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) [ 433.531411] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue 16:48:24 executing program 0: creat(&(0x7f0000000280)='./file0\x00', 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) 16:48:24 executing program 4: open(&(0x7f0000000080)='./file0\x00', 0x40c5, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup(r0) syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x1000, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$tun(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/net/tun\x00', 0x0, 0x0) dup(r2) r3 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r4 = socket$inet_udplite(0x2, 0x2, 0x88) r5 = dup(r4) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=ANY=[@ANYBLOB="280000001d000100000000000000000007000000", @ANYRES32=r5, @ANYBLOB="80b586000a0002"], 0x28}}, 0x0) sendmmsg$alg(r3, &(0x7f00000000c0), 0x492492492492627, 0x0) [ 433.652482] FAULT_INJECTION: forcing a failure. [ 433.652482] name failslab, interval 1, probability 0, space 0, times 0 [ 433.679963] CPU: 1 PID: 24732 Comm: syz-executor.3 Not tainted 4.19.169-syzkaller #0 [ 433.687875] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 433.697234] Call Trace: [ 433.699838] dump_stack+0x1fc/0x2ef [ 433.703480] should_fail.cold+0xa/0xf [ 433.707288] ? setup_fault_attr+0x200/0x200 [ 433.711617] ? lock_acquire+0x170/0x3c0 [ 433.715606] __should_failslab+0x115/0x180 [ 433.719852] should_failslab+0x5/0x10 [ 433.723664] kmem_cache_alloc_trace+0x284/0x380 [ 433.728346] ext4_setup_system_zone+0x149/0xac0 [ 433.733034] ? __sync_dirty_buffer+0x1ef/0x320 [ 433.737628] ? ext4_commit_super+0x6f1/0xb70 [ 433.742085] ? ext4_exit_system_zone+0x20/0x20 [ 433.746679] ? ext4_setup_super+0x5f3/0x9f0 [ 433.751013] ext4_fill_super+0x72e0/0xc820 [ 433.755287] ? ext4_calculate_overhead+0x11c0/0x11c0 [ 433.760399] ? snprintf+0xbb/0xf0 [ 433.763866] ? wait_for_completion_io+0x10/0x10 [ 433.767524] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue [ 433.768540] ? set_blocksize+0x163/0x3f0 [ 433.768564] mount_bdev+0x2fc/0x3b0 [ 433.768578] ? ext4_calculate_overhead+0x11c0/0x11c0 [ 433.768591] mount_fs+0xa3/0x310 [ 433.768610] vfs_kern_mount.part.0+0x68/0x470 [ 433.797335] do_mount+0x113c/0x2f10 [ 433.800975] ? lock_acquire+0x170/0x3c0 [ 433.804961] ? check_preemption_disabled+0x41/0x280 [ 433.809985] ? copy_mount_string+0x40/0x40 [ 433.814232] ? copy_mount_options+0x59/0x380 [ 433.818649] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 433.823674] ? kmem_cache_alloc_trace+0x323/0x380 [ 433.828526] ? copy_mount_options+0x26f/0x380 [ 433.833032] ksys_mount+0xcf/0x130 [ 433.836584] __x64_sys_mount+0xba/0x150 [ 433.840567] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 433.845160] do_syscall_64+0xf9/0x620 [ 433.848991] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 433.854196] RIP: 0033:0x460c6a [ 433.857392] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 ad 89 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 8a 89 fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 433.876296] RSP: 002b:00007fb3ea55ea78 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 433.884010] RAX: ffffffffffffffda RBX: 00007fb3ea55eb10 RCX: 0000000000460c6a [ 433.891289] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007fb3ea55ead0 16:48:24 executing program 5: creat(&(0x7f0000000280)='./file0\x00', 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40600, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d90000000f0000000100000000000000000000000020000000200000200000002cc4645f2cc4645f0100ffff53ef0100010000002cc4645f000000000000000001000000000000000b0000008000000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e3338363633343038350000000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000000000000000000000000000000000000d9ca5cac99fd4329af4dde786c1a5d13010040000c000000000000002cc4645f", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) [ 433.898559] RBP: 00007fb3ea55ead0 R08: 00007fb3ea55eb10 R09: 0000000020000000 [ 433.905832] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000020000000 [ 433.913107] R13: 0000000020000100 R14: 0000000020000200 R15: 0000000020013000 16:48:24 executing program 0: creat(&(0x7f0000000280)='./file0\x00', 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) 16:48:24 executing program 2: creat(&(0x7f0000000280)='./file0\x00', 0x0) close(0xffffffffffffffff) write$binfmt_script(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40106, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) 16:48:24 executing program 0: creat(&(0x7f0000000280)='./file0\x00', 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) 16:48:24 executing program 4: open(&(0x7f0000000080)='./file0\x00', 0x40c5, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup(r0) syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x1000, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$tun(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/net/tun\x00', 0x0, 0x0) dup(r2) r3 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x0) r4 = socket$inet_udplite(0x2, 0x2, 0x88) r5 = dup(r4) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=ANY=[@ANYBLOB="280000001d000100000000000000000007000000", @ANYRES32=r5, @ANYBLOB="80b586000a0002"], 0x28}}, 0x0) sendmmsg$alg(r3, &(0x7f00000000c0), 0x492492492492627, 0x0) [ 434.102716] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue [ 434.140850] EXT4-fs (loop3): failed to initialize system zone (-12) [ 434.150714] EXT4-fs (loop3): mount failed 16:48:24 executing program 5: creat(&(0x7f0000000280)='./file0\x00', 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40700, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) 16:48:24 executing program 4: open(&(0x7f0000000080)='./file0\x00', 0x40c5, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup(r0) syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x1000, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$tun(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/net/tun\x00', 0x0, 0x0) dup(r2) r3 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x0) r4 = socket$inet_udplite(0x2, 0x2, 0x88) r5 = dup(r4) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=ANY=[@ANYBLOB="280000001d000100000000000000000007000000", @ANYRES32=r5, @ANYBLOB="80b586000a0002"], 0x28}}, 0x0) sendmmsg$alg(r3, &(0x7f00000000c0), 0x492492492492627, 0x0) 16:48:24 executing program 0: creat(&(0x7f0000000280)='./file0\x00', 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000800000c000000d90000000f0000000100000000000000000000000020000000200000200000002cc4645f2cc4645f0100ffff53ef0100010000002cc4645f000000000000000001000000000000000b0000008000000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e3338363633343038350000000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000000000000000000000000000000000000d9ca5cac99fd4329af4dde786c1a5d13010040000c000000000000002cc4645f", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) [ 434.249560] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue 16:48:24 executing program 3 (fault-call:1 fault-nth:75): creat(&(0x7f0000000280)='./file0\x00', 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) [ 434.306161] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue 16:48:24 executing program 5: creat(&(0x7f0000000280)='./file0\x00', 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40803, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) 16:48:24 executing program 4: open(&(0x7f0000000080)='./file0\x00', 0x40c5, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup(r0) syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x1000, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$tun(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/net/tun\x00', 0x0, 0x0) dup(r2) r3 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x0) r4 = socket$inet_udplite(0x2, 0x2, 0x88) r5 = dup(r4) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=ANY=[@ANYBLOB="280000001d000100000000000000000007000000", @ANYRES32=r5, @ANYBLOB="80b586000a0002"], 0x28}}, 0x0) sendmmsg$alg(r3, &(0x7f00000000c0), 0x492492492492627, 0x0) 16:48:24 executing program 2: creat(&(0x7f0000000280)='./file0\x00', 0x0) close(0xffffffffffffffff) write$binfmt_script(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4010e, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) 16:48:24 executing program 0: creat(&(0x7f0000000280)='./file0\x00', 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) [ 434.481655] FAULT_INJECTION: forcing a failure. [ 434.481655] name failslab, interval 1, probability 0, space 0, times 0 [ 434.512353] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue [ 434.530722] CPU: 0 PID: 24794 Comm: syz-executor.3 Not tainted 4.19.169-syzkaller #0 [ 434.538677] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 434.548037] Call Trace: [ 434.550644] dump_stack+0x1fc/0x2ef [ 434.550663] should_fail.cold+0xa/0xf [ 434.550680] ? setup_fault_attr+0x200/0x200 [ 434.550695] ? lock_acquire+0x170/0x3c0 [ 434.550726] __should_failslab+0x115/0x180 [ 434.550743] should_failslab+0x5/0x10 [ 434.550757] kmem_cache_alloc+0x277/0x370 [ 434.550778] add_system_zone+0x10a/0x4e0 [ 434.550800] ext4_setup_system_zone+0x366/0xac0 [ 434.550821] ? ext4_commit_super+0x6f1/0xb70 [ 434.550838] ? ext4_exit_system_zone+0x20/0x20 [ 434.596320] ? ext4_setup_super+0x5f3/0x9f0 [ 434.600652] ext4_fill_super+0x72e0/0xc820 [ 434.604919] ? ext4_calculate_overhead+0x11c0/0x11c0 [ 434.610028] ? snprintf+0xbb/0xf0 [ 434.613498] ? wait_for_completion_io+0x10/0x10 [ 434.618172] ? set_blocksize+0x163/0x3f0 [ 434.622243] mount_bdev+0x2fc/0x3b0 [ 434.625883] ? ext4_calculate_overhead+0x11c0/0x11c0 [ 434.630996] mount_fs+0xa3/0x310 [ 434.634371] vfs_kern_mount.part.0+0x68/0x470 [ 434.638874] do_mount+0x113c/0x2f10 [ 434.642510] ? do_raw_spin_unlock+0x171/0x230 [ 434.647013] ? check_preemption_disabled+0x41/0x280 [ 434.652037] ? copy_mount_string+0x40/0x40 [ 434.656278] ? copy_mount_options+0x59/0x380 [ 434.660698] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 434.665721] ? kmem_cache_alloc_trace+0x323/0x380 [ 434.670573] ? copy_mount_options+0x26f/0x380 [ 434.675081] ksys_mount+0xcf/0x130 [ 434.678636] __x64_sys_mount+0xba/0x150 [ 434.682617] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 434.687206] do_syscall_64+0xf9/0x620 [ 434.691023] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 434.696215] RIP: 0033:0x460c6a [ 434.699419] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 ad 89 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 8a 89 fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 434.718321] RSP: 002b:00007fb3ea55ea78 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 16:48:25 executing program 0: creat(&(0x7f0000000280)='./file0\x00', 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) 16:48:25 executing program 4: open(&(0x7f0000000080)='./file0\x00', 0x40c5, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup(r0) syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x1000, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$tun(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/net/tun\x00', 0x0, 0x0) dup(r2) r3 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={0x0}}, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) r4 = dup(0xffffffffffffffff) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=ANY=[@ANYBLOB="280000001d000100000000000000000007000000", @ANYRES32=r4, @ANYBLOB="80b586000a0002"], 0x28}}, 0x0) sendmmsg$alg(r3, &(0x7f00000000c0), 0x492492492492627, 0x0) [ 434.726038] RAX: ffffffffffffffda RBX: 00007fb3ea55eb10 RCX: 0000000000460c6a [ 434.733310] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007fb3ea55ead0 [ 434.740586] RBP: 00007fb3ea55ead0 R08: 00007fb3ea55eb10 R09: 0000000020000000 [ 434.747854] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000020000000 [ 434.755117] R13: 0000000020000100 R14: 0000000020000200 R15: 0000000020013000 [ 434.764358] EXT4-fs (loop3): mounted filesystem without journal. Opts: ,errors=continue 16:48:25 executing program 3 (fault-call:1 fault-nth:76): creat(&(0x7f0000000280)='./file0\x00', 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) [ 434.784803] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue 16:48:25 executing program 5: creat(&(0x7f0000000280)='./file0\x00', 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40900, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) 16:48:25 executing program 4: open(&(0x7f0000000080)='./file0\x00', 0x40c5, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup(r0) syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x1000, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$tun(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/net/tun\x00', 0x0, 0x0) dup(r2) r3 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={0x0}}, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) r4 = dup(0xffffffffffffffff) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=ANY=[@ANYBLOB="280000001d000100000000000000000007000000", @ANYRES32=r4, @ANYBLOB="80b586000a0002"], 0x28}}, 0x0) sendmmsg$alg(r3, &(0x7f00000000c0), 0x492492492492627, 0x0) 16:48:25 executing program 2: creat(&(0x7f0000000280)='./file0\x00', 0x0) close(0xffffffffffffffff) write$binfmt_script(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40123, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d90000000f0000000100000000000000000000000020000000200000200000002cc4645f2cc4645f0100ffff53ef0100010000002cc4645f000000000000000001000000000000000b0000008000000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e3338363633343038350000000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000000000000000000000000000000000000d9ca5cac99fd4329af4dde786c1a5d13010040000c000000000000002cc4645f", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) 16:48:25 executing program 0: creat(&(0x7f0000000280)='./file0\x00', 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) [ 434.989281] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue [ 435.002638] FAULT_INJECTION: forcing a failure. [ 435.002638] name failslab, interval 1, probability 0, space 0, times 0 [ 435.044650] CPU: 1 PID: 24829 Comm: syz-executor.3 Not tainted 4.19.169-syzkaller #0 [ 435.052571] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 435.061937] Call Trace: [ 435.064539] dump_stack+0x1fc/0x2ef [ 435.068177] should_fail.cold+0xa/0xf [ 435.071985] ? setup_fault_attr+0x200/0x200 [ 435.076312] ? lock_acquire+0x170/0x3c0 [ 435.080300] __should_failslab+0x115/0x180 [ 435.084541] should_failslab+0x5/0x10 [ 435.088346] kmem_cache_alloc+0x277/0x370 [ 435.092503] add_system_zone+0x10a/0x4e0 [ 435.096602] ext4_setup_system_zone+0x396/0xac0 [ 435.101284] ? ext4_commit_super+0x6f1/0xb70 [ 435.105697] ? ext4_exit_system_zone+0x20/0x20 [ 435.110288] ? ext4_setup_super+0x5f3/0x9f0 [ 435.114622] ext4_fill_super+0x72e0/0xc820 [ 435.118889] ? ext4_calculate_overhead+0x11c0/0x11c0 [ 435.123998] ? snprintf+0xbb/0xf0 [ 435.127462] ? wait_for_completion_io+0x10/0x10 [ 435.132136] ? set_blocksize+0x163/0x3f0 [ 435.136206] mount_bdev+0x2fc/0x3b0 [ 435.139841] ? ext4_calculate_overhead+0x11c0/0x11c0 [ 435.144960] mount_fs+0xa3/0x310 [ 435.148338] vfs_kern_mount.part.0+0x68/0x470 [ 435.152844] do_mount+0x113c/0x2f10 [ 435.156486] ? lock_acquire+0x170/0x3c0 [ 435.160470] ? check_preemption_disabled+0x41/0x280 [ 435.165494] ? copy_mount_string+0x40/0x40 [ 435.169732] ? copy_mount_options+0x59/0x380 [ 435.174147] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 435.179168] ? kmem_cache_alloc_trace+0x323/0x380 [ 435.184027] ? copy_mount_options+0x26f/0x380 [ 435.188532] ksys_mount+0xcf/0x130 [ 435.192083] __x64_sys_mount+0xba/0x150 [ 435.196062] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 435.200647] do_syscall_64+0xf9/0x620 [ 435.204496] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 435.209684] RIP: 0033:0x460c6a [ 435.212871] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 ad 89 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 8a 89 fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 435.231767] RSP: 002b:00007fb3ea55ea78 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 435.239570] RAX: ffffffffffffffda RBX: 00007fb3ea55eb10 RCX: 0000000000460c6a [ 435.246832] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007fb3ea55ead0 [ 435.254088] RBP: 00007fb3ea55ead0 R08: 00007fb3ea55eb10 R09: 0000000020000000 [ 435.261348] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000020000000 [ 435.268606] R13: 0000000020000100 R14: 0000000020000200 R15: 0000000020013000 16:48:25 executing program 0: creat(&(0x7f0000000280)='./file0\x00', 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) 16:48:25 executing program 4: open(&(0x7f0000000080)='./file0\x00', 0x40c5, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup(r0) syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x1000, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$tun(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/net/tun\x00', 0x0, 0x0) dup(r2) r3 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={0x0}}, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) r4 = dup(0xffffffffffffffff) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=ANY=[@ANYBLOB="280000001d000100000000000000000007000000", @ANYRES32=r4, @ANYBLOB="80b586000a0002"], 0x28}}, 0x0) sendmmsg$alg(r3, &(0x7f00000000c0), 0x492492492492627, 0x0) [ 435.298887] EXT4-fs (loop3): failed to initialize system zone (-12) [ 435.306109] EXT4-fs (loop3): mount failed [ 435.409437] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue 16:48:25 executing program 3 (fault-call:1 fault-nth:77): creat(&(0x7f0000000280)='./file0\x00', 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d90000000f0000000100000000000000000000000020000000200000200000002cc4645f2cc4645f0100ffff53ef0100010000002cc4645f000000000000000001000000000000000b0000008000000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e3338363633343038350000000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000000000000000000000000000000000000d9ca5cac99fd4329af4dde786c1a5d13010040000c000000000000002cc4645f", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) 16:48:25 executing program 5: creat(&(0x7f0000000280)='./file0\x00', 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40d00, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) 16:48:25 executing program 0: creat(&(0x7f0000000280)='./file0\x00', 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) 16:48:26 executing program 2: creat(&(0x7f0000000280)='./file0\x00', 0x0) close(0xffffffffffffffff) write$binfmt_script(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40168, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) 16:48:26 executing program 4: open(&(0x7f0000000080)='./file0\x00', 0x40c5, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup(r0) syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x1000, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$tun(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/net/tun\x00', 0x0, 0x0) dup(r2) r3 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={0x0}}, 0x0) r4 = socket$inet_udplite(0x2, 0x2, 0x88) dup(r4) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) sendmmsg$alg(r3, &(0x7f00000000c0), 0x492492492492627, 0x0) [ 435.621901] FAULT_INJECTION: forcing a failure. [ 435.621901] name failslab, interval 1, probability 0, space 0, times 0 [ 435.656773] CPU: 0 PID: 24865 Comm: syz-executor.3 Not tainted 4.19.169-syzkaller #0 [ 435.664815] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 435.674171] Call Trace: [ 435.676770] dump_stack+0x1fc/0x2ef [ 435.680419] should_fail.cold+0xa/0xf [ 435.684230] ? setup_fault_attr+0x200/0x200 [ 435.688560] ? lock_acquire+0x170/0x3c0 [ 435.692555] __should_failslab+0x115/0x180 [ 435.696800] should_failslab+0x5/0x10 [ 435.700606] kmem_cache_alloc+0x277/0x370 [ 435.704777] add_system_zone+0x10a/0x4e0 [ 435.708872] ext4_setup_system_zone+0x209/0xac0 [ 435.713555] ? ext4_commit_super+0x6f1/0xb70 [ 435.717975] ? ext4_exit_system_zone+0x20/0x20 [ 435.722565] ? ext4_setup_super+0x5f3/0x9f0 [ 435.726908] ext4_fill_super+0x72e0/0xc820 [ 435.731177] ? ext4_calculate_overhead+0x11c0/0x11c0 [ 435.736293] ? snprintf+0xbb/0xf0 [ 435.739765] ? wait_for_completion_io+0x10/0x10 [ 435.740995] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue [ 435.744434] ? set_blocksize+0x163/0x3f0 [ 435.744457] mount_bdev+0x2fc/0x3b0 [ 435.744471] ? ext4_calculate_overhead+0x11c0/0x11c0 [ 435.744484] mount_fs+0xa3/0x310 [ 435.744502] vfs_kern_mount.part.0+0x68/0x470 [ 435.744517] do_mount+0x113c/0x2f10 [ 435.744536] ? retint_kernel+0x2d/0x2d [ 435.744553] ? copy_mount_string+0x40/0x40 [ 435.785075] ? copy_mount_options+0x1f9/0x380 [ 435.789579] ? write_comp_data+0x23/0x70 [ 435.793651] ? copy_mount_options+0x26f/0x380 [ 435.798159] ksys_mount+0xcf/0x130 [ 435.801702] __x64_sys_mount+0xba/0x150 [ 435.805683] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 435.810270] do_syscall_64+0xf9/0x620 [ 435.814088] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 435.819280] RIP: 0033:0x460c6a [ 435.822485] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 ad 89 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 8a 89 fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 435.841399] RSP: 002b:00007fb3ea55ea78 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 435.849112] RAX: ffffffffffffffda RBX: 00007fb3ea55eb10 RCX: 0000000000460c6a [ 435.856403] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007fb3ea55ead0 [ 435.863676] RBP: 00007fb3ea55ead0 R08: 00007fb3ea55eb10 R09: 0000000020000000 16:48:26 executing program 4: open(&(0x7f0000000080)='./file0\x00', 0x40c5, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup(r0) syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x1000, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$tun(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/net/tun\x00', 0x0, 0x0) dup(r2) r3 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={0x0}}, 0x0) r4 = socket$inet_udplite(0x2, 0x2, 0x88) dup(r4) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) sendmmsg$alg(r3, &(0x7f00000000c0), 0x492492492492627, 0x0) 16:48:26 executing program 0: creat(&(0x7f0000000280)='./file0\x00', 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) [ 435.870956] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000020000000 [ 435.878230] R13: 0000000020000100 R14: 0000000020000200 R15: 0000000020013000 [ 435.901947] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue 16:48:26 executing program 4: open(&(0x7f0000000080)='./file0\x00', 0x40c5, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup(r0) syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x1000, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$tun(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/net/tun\x00', 0x0, 0x0) dup(r2) r3 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={0x0}}, 0x0) r4 = socket$inet_udplite(0x2, 0x2, 0x88) dup(r4) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) sendmmsg$alg(r3, &(0x7f00000000c0), 0x492492492492627, 0x0) 16:48:26 executing program 3 (fault-call:1 fault-nth:78): creat(&(0x7f0000000280)='./file0\x00', 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d90000000f0000000100000000000000000000000020000000200000200000002cc4645f2cc4645f0100ffff53ef0100010000002cc4645f000000000000000001000000000000000b0000008000000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e3338363633343038350000000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000000000000000000000000000000000000d9ca5cac99fd4329af4dde786c1a5d13010040000c000000000000002cc4645f", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) [ 435.935657] EXT4-fs (loop3): failed to initialize system zone (-12) [ 435.945729] EXT4-fs (loop3): mount failed 16:48:26 executing program 2: creat(&(0x7f0000000280)='./file0\x00', 0x0) close(0xffffffffffffffff) write$binfmt_script(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40178, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d90000000f0000000100000000000000000000000020000000200000200000002cc4645f2cc4645f0100ffff53ef0100010000002cc4645f000000000000000001000000000000000b0000008000000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e3338363633343038350000000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000000000000000000000000000000000000d9ca5cac99fd4329af4dde786c1a5d13010040000c000000000000002cc4645f", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) 16:48:26 executing program 4: open(&(0x7f0000000080)='./file0\x00', 0x40c5, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup(r0) syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x1000, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$tun(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/net/tun\x00', 0x0, 0x0) dup(r2) r3 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={0x0}}, 0x0) r4 = socket$inet_udplite(0x2, 0x2, 0x88) dup(r4) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0x0) sendmmsg$alg(r3, &(0x7f00000000c0), 0x492492492492627, 0x0) 16:48:26 executing program 0: creat(&(0x7f0000000280)='./file0\x00', 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) [ 436.079887] FAULT_INJECTION: forcing a failure. [ 436.079887] name failslab, interval 1, probability 0, space 0, times 0 [ 436.104578] CPU: 0 PID: 24895 Comm: syz-executor.3 Not tainted 4.19.169-syzkaller #0 [ 436.112488] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 436.121877] Call Trace: [ 436.124482] dump_stack+0x1fc/0x2ef 16:48:26 executing program 5: creat(&(0x7f0000000280)='./file0\x00', 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40e00, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) [ 436.128127] should_fail.cold+0xa/0xf [ 436.131940] ? setup_fault_attr+0x200/0x200 [ 436.136269] ? lock_acquire+0x170/0x3c0 [ 436.140263] __should_failslab+0x115/0x180 [ 436.144508] should_failslab+0x5/0x10 [ 436.148312] kmem_cache_alloc+0x277/0x370 [ 436.152467] add_system_zone+0x10a/0x4e0 [ 436.156543] ext4_setup_system_zone+0x1c0/0xac0 [ 436.161226] ? ext4_commit_super+0x6f1/0xb70 [ 436.165659] ? ext4_exit_system_zone+0x20/0x20 [ 436.165679] ? ext4_setup_super+0x5f3/0x9f0 [ 436.165697] ext4_fill_super+0x72e0/0xc820 [ 436.165736] ? ext4_calculate_overhead+0x11c0/0x11c0 [ 436.165753] ? snprintf+0xbb/0xf0 [ 436.165775] ? wait_for_completion_io+0x10/0x10 [ 436.165788] ? set_blocksize+0x163/0x3f0 [ 436.165811] mount_bdev+0x2fc/0x3b0 [ 436.165824] ? ext4_calculate_overhead+0x11c0/0x11c0 [ 436.165839] mount_fs+0xa3/0x310 16:48:26 executing program 0: creat(&(0x7f0000000280)='./file0\x00', 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000105000c000000d90000000f0000000100000000000000000000000020000000200000200000002cc4645f2cc4645f0100ffff53ef0100010000002cc4645f000000000000000001000000000000000b0000008000000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e3338363633343038350000000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000000000000000000000000000000000000d9ca5cac99fd4329af4dde786c1a5d13010040000c000000000000002cc4645f", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) [ 436.165859] vfs_kern_mount.part.0+0x68/0x470 [ 436.165878] do_mount+0x113c/0x2f10 [ 436.165905] ? lock_acquire+0x170/0x3c0 [ 436.165921] ? check_preemption_disabled+0x41/0x280 [ 436.165938] ? copy_mount_string+0x40/0x40 [ 436.165952] ? copy_mount_options+0x59/0x380 [ 436.165969] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 436.165985] ? kmem_cache_alloc_trace+0x323/0x380 [ 436.166003] ? copy_mount_options+0x26f/0x380 16:48:26 executing program 3 (fault-call:1 fault-nth:79): creat(&(0x7f0000000280)='./file0\x00', 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) [ 436.166021] ksys_mount+0xcf/0x130 [ 436.166038] __x64_sys_mount+0xba/0x150 [ 436.166053] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 436.166068] do_syscall_64+0xf9/0x620 [ 436.166084] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 436.166096] RIP: 0033:0x460c6a 16:48:26 executing program 5: creat(&(0x7f0000000280)='./file0\x00', 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40e01, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) [ 436.166109] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 ad 89 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 8a 89 fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 436.166117] RSP: 002b:00007fb3ea55ea78 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 436.166131] RAX: ffffffffffffffda RBX: 00007fb3ea55eb10 RCX: 0000000000460c6a [ 436.166140] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007fb3ea55ead0 [ 436.166148] RBP: 00007fb3ea55ead0 R08: 00007fb3ea55eb10 R09: 0000000020000000 16:48:26 executing program 2: creat(&(0x7f0000000280)='./file0\x00', 0x0) close(0xffffffffffffffff) write$binfmt_script(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40186, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d90000000f0000000100000000000000000000000020000000200000200000002cc4645f2cc4645f0100ffff53ef0100010000002cc4645f000000000000000001000000000000000b0000008000000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e3338363633343038350000000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000000000000000000000000000000000000d9ca5cac99fd4329af4dde786c1a5d13010040000c000000000000002cc4645f", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) [ 436.166156] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000020000000 [ 436.166164] R13: 0000000020000100 R14: 0000000020000200 R15: 0000000020013000 [ 436.228597] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue 16:48:27 executing program 0: creat(&(0x7f0000000280)='./file0\x00', 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000106000c000000d90000000f0000000100000000000000000000000020000000200000200000002cc4645f2cc4645f0100ffff53ef0100010000002cc4645f000000000000000001000000000000000b0000008000000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e3338363633343038350000000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000000000000000000000000000000000000d9ca5cac99fd4329af4dde786c1a5d13010040000c000000000000002cc4645f", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) 16:48:27 executing program 4: open(&(0x7f0000000080)='./file0\x00', 0x40c5, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup(r0) syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x1000, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$tun(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/net/tun\x00', 0x0, 0x0) dup(r2) r3 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={0x0}}, 0x0) r4 = socket$inet_udplite(0x2, 0x2, 0x88) dup(r4) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0x0) sendmmsg$alg(r3, &(0x7f00000000c0), 0x492492492492627, 0x0) [ 436.284612] EXT4-fs (loop3): failed to initialize system zone (-12) [ 436.284652] EXT4-fs (loop3): mount failed [ 436.296423] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue 16:48:27 executing program 5: creat(&(0x7f0000000280)='./file0\x00', 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x41202, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) [ 436.631146] FAULT_INJECTION: forcing a failure. [ 436.631146] name failslab, interval 1, probability 0, space 0, times 0 [ 436.677906] CPU: 1 PID: 24929 Comm: syz-executor.3 Not tainted 4.19.169-syzkaller #0 [ 436.685927] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 436.695280] Call Trace: [ 436.697882] dump_stack+0x1fc/0x2ef [ 436.701525] should_fail.cold+0xa/0xf [ 436.705362] ? setup_fault_attr+0x200/0x200 [ 436.709691] ? lock_acquire+0x170/0x3c0 [ 436.713686] __should_failslab+0x115/0x180 [ 436.717932] should_failslab+0x5/0x10 [ 436.721737] kmem_cache_alloc+0x277/0x370 [ 436.725896] add_system_zone+0x10a/0x4e0 [ 436.729972] ext4_setup_system_zone+0x209/0xac0 [ 436.734671] ? ext4_commit_super+0x6f1/0xb70 [ 436.739089] ? ext4_exit_system_zone+0x20/0x20 [ 436.743678] ? ext4_setup_super+0x5f3/0x9f0 [ 436.748007] ext4_fill_super+0x72e0/0xc820 [ 436.752274] ? ext4_calculate_overhead+0x11c0/0x11c0 [ 436.757385] ? snprintf+0xbb/0xf0 [ 436.760848] ? wait_for_completion_io+0x10/0x10 [ 436.765530] ? set_blocksize+0x163/0x3f0 [ 436.769604] mount_bdev+0x2fc/0x3b0 [ 436.773235] ? ext4_calculate_overhead+0x11c0/0x11c0 [ 436.778348] mount_fs+0xa3/0x310 [ 436.781723] vfs_kern_mount.part.0+0x68/0x470 [ 436.786225] do_mount+0x113c/0x2f10 [ 436.789859] ? lock_acquire+0x170/0x3c0 [ 436.793841] ? check_preemption_disabled+0x41/0x280 [ 436.798868] ? copy_mount_string+0x40/0x40 [ 436.803107] ? copy_mount_options+0x59/0x380 [ 436.807522] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 436.812547] ? kmem_cache_alloc_trace+0x323/0x380 [ 436.817424] ? copy_mount_options+0x26f/0x380 [ 436.821931] ksys_mount+0xcf/0x130 [ 436.825482] __x64_sys_mount+0xba/0x150 [ 436.829467] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 436.834053] do_syscall_64+0xf9/0x620 [ 436.837862] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 436.843055] RIP: 0033:0x460c6a [ 436.846373] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 ad 89 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 8a 89 fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 436.865276] RSP: 002b:00007fb3ea55ea78 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 16:48:27 executing program 2: creat(&(0x7f0000000280)='./file0\x00', 0x0) close(0xffffffffffffffff) write$binfmt_script(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4019d, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d90000000f0000000100000000000000000000000020000000200000200000002cc4645f2cc4645f0100ffff53ef0100010000002cc4645f000000000000000001000000000000000b0000008000000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e3338363633343038350000000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000000000000000000000000000000000000d9ca5cac99fd4329af4dde786c1a5d13010040000c000000000000002cc4645f", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) 16:48:27 executing program 0: creat(&(0x7f0000000280)='./file0\x00', 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) [ 436.872987] RAX: ffffffffffffffda RBX: 00007fb3ea55eb10 RCX: 0000000000460c6a [ 436.880258] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007fb3ea55ead0 [ 436.887529] RBP: 00007fb3ea55ead0 R08: 00007fb3ea55eb10 R09: 0000000020000000 [ 436.894798] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000020000000 [ 436.902068] R13: 0000000020000100 R14: 0000000020000200 R15: 0000000020013000 16:48:27 executing program 4: open(&(0x7f0000000080)='./file0\x00', 0x40c5, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup(r0) syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x1000, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$tun(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/net/tun\x00', 0x0, 0x0) dup(r2) r3 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={0x0}}, 0x0) r4 = socket$inet_udplite(0x2, 0x2, 0x88) dup(r4) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0x0) sendmmsg$alg(r3, &(0x7f00000000c0), 0x492492492492627, 0x0) 16:48:27 executing program 2: creat(&(0x7f0000000280)='./file0\x00', 0x0) close(0xffffffffffffffff) write$binfmt_script(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x401c0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) 16:48:27 executing program 3 (fault-call:1 fault-nth:80): creat(&(0x7f0000000280)='./file0\x00', 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) [ 436.971204] EXT4-fs (loop3): failed to initialize system zone (-12) [ 436.977806] EXT4-fs (loop3): mount failed 16:48:27 executing program 0: creat(&(0x7f0000000280)='./file0\x00', 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000108000c000000d90000000f0000000100000000000000000000000020000000200000200000002cc4645f2cc4645f0100ffff53ef0100010000002cc4645f000000000000000001000000000000000b0000008000000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e3338363633343038350000000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000000000000000000000000000000000000d9ca5cac99fd4329af4dde786c1a5d13010040000c000000000000002cc4645f", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) 16:48:27 executing program 5: creat(&(0x7f0000000280)='./file0\x00', 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x41400, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d90000000f0000000100000000000000000000000020000000200000200000002cc4645f2cc4645f0100ffff53ef0100010000002cc4645f000000000000000001000000000000000b0000008000000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e3338363633343038350000000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000000000000000000000000000000000000d9ca5cac99fd4329af4dde786c1a5d13010040000c000000000000002cc4645f", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) [ 437.141004] FAULT_INJECTION: forcing a failure. [ 437.141004] name failslab, interval 1, probability 0, space 0, times 0 [ 437.167898] CPU: 1 PID: 24971 Comm: syz-executor.3 Not tainted 4.19.169-syzkaller #0 [ 437.175815] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 437.185171] Call Trace: [ 437.187773] dump_stack+0x1fc/0x2ef [ 437.191428] should_fail.cold+0xa/0xf [ 437.195241] ? setup_fault_attr+0x200/0x200 [ 437.199573] ? lock_acquire+0x170/0x3c0 [ 437.203566] __should_failslab+0x115/0x180 [ 437.207837] should_failslab+0x5/0x10 [ 437.211644] kmem_cache_alloc+0x277/0x370 [ 437.215805] add_system_zone+0x10a/0x4e0 [ 437.219878] ext4_setup_system_zone+0x209/0xac0 [ 437.224596] ? ext4_commit_super+0x6f1/0xb70 [ 437.229013] ? ext4_exit_system_zone+0x20/0x20 [ 437.233607] ? ext4_setup_super+0x5f3/0x9f0 [ 437.237937] ext4_fill_super+0x72e0/0xc820 [ 437.242212] ? ext4_calculate_overhead+0x11c0/0x11c0 [ 437.247321] ? snprintf+0xbb/0xf0 [ 437.250786] ? wait_for_completion_io+0x10/0x10 [ 437.255458] ? set_blocksize+0x163/0x3f0 [ 437.259532] mount_bdev+0x2fc/0x3b0 [ 437.263164] ? ext4_calculate_overhead+0x11c0/0x11c0 [ 437.268271] mount_fs+0xa3/0x310 [ 437.271648] vfs_kern_mount.part.0+0x68/0x470 [ 437.276151] do_mount+0x113c/0x2f10 [ 437.279790] ? lock_acquire+0x170/0x3c0 [ 437.283767] ? check_preemption_disabled+0x41/0x280 [ 437.288793] ? copy_mount_string+0x40/0x40 [ 437.293035] ? copy_mount_options+0x59/0x380 [ 437.297450] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 437.302473] ? kmem_cache_alloc_trace+0x323/0x380 [ 437.307322] ? copy_mount_options+0x26f/0x380 [ 437.311822] ksys_mount+0xcf/0x130 [ 437.315372] __x64_sys_mount+0xba/0x150 [ 437.319356] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 437.323939] do_syscall_64+0xf9/0x620 [ 437.327746] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 437.332935] RIP: 0033:0x460c6a [ 437.336161] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 ad 89 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 8a 89 fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 437.355060] RSP: 002b:00007fb3ea55ea78 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 437.362770] RAX: ffffffffffffffda RBX: 00007fb3ea55eb10 RCX: 0000000000460c6a [ 437.370039] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007fb3ea55ead0 [ 437.377309] RBP: 00007fb3ea55ead0 R08: 00007fb3ea55eb10 R09: 0000000020000000 [ 437.384579] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000020000000 16:48:27 executing program 4: open(&(0x7f0000000080)='./file0\x00', 0x40c5, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup(r0) syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x1000, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$tun(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/net/tun\x00', 0x0, 0x0) dup(r2) r3 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={0x0}}, 0x0) r4 = socket$inet_udplite(0x2, 0x2, 0x88) dup(r4) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={0x0, 0x28}}, 0x0) sendmmsg$alg(r3, &(0x7f00000000c0), 0x492492492492627, 0x0) [ 437.391853] R13: 0000000020000100 R14: 0000000020000200 R15: 0000000020013000 [ 437.407664] EXT4-fs (loop3): failed to initialize system zone (-12) [ 437.415053] EXT4-fs (loop3): mount failed 16:48:27 executing program 0: creat(&(0x7f0000000280)='./file0\x00', 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) 16:48:27 executing program 2: creat(&(0x7f0000000280)='./file0\x00', 0x0) close(0xffffffffffffffff) write$binfmt_script(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x401c7, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) 16:48:28 executing program 4: open(&(0x7f0000000080)='./file0\x00', 0x40c5, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup(r0) syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x1000, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$tun(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/net/tun\x00', 0x0, 0x0) dup(r2) r3 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={0x0}}, 0x0) r4 = socket$inet_udplite(0x2, 0x2, 0x88) dup(r4) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={0x0, 0x28}}, 0x0) sendmmsg$alg(r3, &(0x7f00000000c0), 0x492492492492627, 0x0) 16:48:28 executing program 3 (fault-call:1 fault-nth:81): creat(&(0x7f0000000280)='./file0\x00', 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d90000000f0000000100000000000000000000000020000000200000200000002cc4645f2cc4645f0100ffff53ef0100010000002cc4645f000000000000000001000000000000000b0000008000000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e3338363633343038350000000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000000000000000000000000000000000000d9ca5cac99fd4329af4dde786c1a5d13010040000c000000000000002cc4645f", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) 16:48:28 executing program 5: creat(&(0x7f0000000280)='./file0\x00', 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x42000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) 16:48:28 executing program 0: creat(&(0x7f0000000280)='./file0\x00', 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) 16:48:28 executing program 2: creat(&(0x7f0000000280)='./file0\x00', 0x0) close(0xffffffffffffffff) write$binfmt_script(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x401cc, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) 16:48:28 executing program 4: open(&(0x7f0000000080)='./file0\x00', 0x40c5, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup(r0) syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x1000, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$tun(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/net/tun\x00', 0x0, 0x0) dup(r2) r3 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={0x0}}, 0x0) r4 = socket$inet_udplite(0x2, 0x2, 0x88) dup(r4) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={0x0, 0x28}}, 0x0) sendmmsg$alg(r3, &(0x7f00000000c0), 0x492492492492627, 0x0) [ 437.757752] FAULT_INJECTION: forcing a failure. [ 437.757752] name failslab, interval 1, probability 0, space 0, times 0 [ 437.781637] CPU: 0 PID: 25013 Comm: syz-executor.3 Not tainted 4.19.169-syzkaller #0 [ 437.789556] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 437.799034] Call Trace: [ 437.801667] dump_stack+0x1fc/0x2ef [ 437.805310] should_fail.cold+0xa/0xf [ 437.809123] ? setup_fault_attr+0x200/0x200 [ 437.813453] ? lock_acquire+0x170/0x3c0 [ 437.817445] __should_failslab+0x115/0x180 [ 437.821689] should_failslab+0x5/0x10 [ 437.825497] kmem_cache_alloc_node_trace+0x244/0x3b0 [ 437.830611] __kmalloc_node+0x38/0x70 [ 437.834421] kvmalloc_node+0x61/0xf0 [ 437.838158] ext4_mb_alloc_groupinfo+0x112/0x4b0 [ 437.838174] ext4_mb_init+0x985/0x1790 [ 437.846826] ext4_fill_super+0x7308/0xc820 [ 437.851208] ? ext4_calculate_overhead+0x11c0/0x11c0 [ 437.856318] ? snprintf+0xbb/0xf0 [ 437.859787] ? wait_for_completion_io+0x10/0x10 [ 437.864460] ? set_blocksize+0x163/0x3f0 [ 437.868533] mount_bdev+0x2fc/0x3b0 [ 437.872167] ? ext4_calculate_overhead+0x11c0/0x11c0 [ 437.877277] mount_fs+0xa3/0x310 [ 437.880670] vfs_kern_mount.part.0+0x68/0x470 [ 437.885173] do_mount+0x113c/0x2f10 [ 437.888807] ? lock_acquire+0x170/0x3c0 [ 437.892787] ? check_preemption_disabled+0x41/0x280 [ 437.897813] ? copy_mount_string+0x40/0x40 [ 437.902054] ? copy_mount_options+0x59/0x380 [ 437.906472] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 437.911502] ? kmem_cache_alloc_trace+0x323/0x380 [ 437.916356] ? copy_mount_options+0x26f/0x380 [ 437.920876] ksys_mount+0xcf/0x130 [ 437.924426] __x64_sys_mount+0xba/0x150 [ 437.928404] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 437.932990] do_syscall_64+0xf9/0x620 [ 437.936801] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 437.941990] RIP: 0033:0x460c6a 16:48:28 executing program 4: open(&(0x7f0000000080)='./file0\x00', 0x40c5, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup(r0) syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x1000, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$tun(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/net/tun\x00', 0x0, 0x0) dup(r2) r3 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={0x0}}, 0x0) r4 = socket$inet_udplite(0x2, 0x2, 0x88) r5 = dup(r4) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=ANY=[@ANYBLOB="280000001d000100000000000000000007000000", @ANYRES32=r5], 0x28}}, 0x0) sendmmsg$alg(r3, &(0x7f00000000c0), 0x492492492492627, 0x0) [ 437.945185] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 ad 89 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 8a 89 fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 437.964091] RSP: 002b:00007fb3ea55ea78 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 437.971806] RAX: ffffffffffffffda RBX: 00007fb3ea55eb10 RCX: 0000000000460c6a [ 437.979078] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007fb3ea55ead0 [ 437.986358] RBP: 00007fb3ea55ead0 R08: 00007fb3ea55eb10 R09: 0000000020000000 [ 437.993632] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000020000000 [ 438.000901] R13: 0000000020000100 R14: 0000000020000200 R15: 0000000020013000 16:48:28 executing program 5: creat(&(0x7f0000000280)='./file0\x00', 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x42002, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d90000000f0000000100000000000000000000000020000000200000200000002cc4645f2cc4645f0100ffff53ef0100010000002cc4645f000000000000000001000000000000000b0000008000000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e3338363633343038350000000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000000000000000000000000000000000000d9ca5cac99fd4329af4dde786c1a5d13010040000c000000000000002cc4645f", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) 16:48:28 executing program 0: creat(&(0x7f0000000280)='./file0\x00', 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100030c000000d90000000f0000000100000000000000000000000020000000200000200000002cc4645f2cc4645f0100ffff53ef0100010000002cc4645f000000000000000001000000000000000b0000008000000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e3338363633343038350000000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000000000000000000000000000000000000d9ca5cac99fd4329af4dde786c1a5d13010040000c000000000000002cc4645f", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) [ 438.052345] EXT4-fs (loop3): can't allocate buddy meta group [ 438.080306] EXT4-fs (loop3): failed to initialize mballoc (-12) 16:48:28 executing program 2: creat(&(0x7f0000000280)='./file0\x00', 0x0) close(0xffffffffffffffff) write$binfmt_script(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x401cd, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) [ 438.117226] EXT4-fs (loop3): mount failed [ 438.146315] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.4'. 16:48:28 executing program 3 (fault-call:1 fault-nth:82): creat(&(0x7f0000000280)='./file0\x00', 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) 16:48:28 executing program 4: open(&(0x7f0000000080)='./file0\x00', 0x40c5, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup(r0) syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x1000, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$tun(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/net/tun\x00', 0x0, 0x0) dup(r2) r3 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={0x0}}, 0x0) r4 = socket$inet_udplite(0x2, 0x2, 0x88) r5 = dup(r4) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=ANY=[@ANYBLOB="280000001d000100000000000000000007000000", @ANYRES32=r5], 0x28}}, 0x0) sendmmsg$alg(r3, &(0x7f00000000c0), 0x492492492492627, 0x0) 16:48:28 executing program 0: creat(&(0x7f0000000280)='./file0\x00', 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) 16:48:28 executing program 5: creat(&(0x7f0000000280)='./file0\x00', 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x42300, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) [ 438.296858] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.4'. [ 438.356567] FAULT_INJECTION: forcing a failure. [ 438.356567] name failslab, interval 1, probability 0, space 0, times 0 [ 438.393798] CPU: 0 PID: 25057 Comm: syz-executor.3 Not tainted 4.19.169-syzkaller #0 16:48:28 executing program 2: creat(&(0x7f0000000280)='./file0\x00', 0x0) close(0xffffffffffffffff) write$binfmt_script(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x401da, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) [ 438.401706] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 438.411058] Call Trace: [ 438.413658] dump_stack+0x1fc/0x2ef [ 438.417293] should_fail.cold+0xa/0xf [ 438.421102] ? setup_fault_attr+0x200/0x200 [ 438.425425] ? lock_acquire+0x170/0x3c0 [ 438.429413] __should_failslab+0x115/0x180 [ 438.433658] should_failslab+0x5/0x10 [ 438.437463] __kmalloc+0x2ab/0x3c0 [ 438.441009] ? ext4_mb_init+0x114/0x1790 [ 438.445076] ext4_mb_init+0x114/0x1790 [ 438.448969] ? ext4_setup_super+0x5f3/0x9f0 [ 438.453294] ext4_fill_super+0x7308/0xc820 [ 438.457562] ? ext4_calculate_overhead+0x11c0/0x11c0 [ 438.462674] ? snprintf+0xbb/0xf0 [ 438.466166] ? wait_for_completion_io+0x10/0x10 [ 438.470838] ? set_blocksize+0x163/0x3f0 [ 438.474909] mount_bdev+0x2fc/0x3b0 [ 438.478542] ? ext4_calculate_overhead+0x11c0/0x11c0 [ 438.483655] mount_fs+0xa3/0x310 [ 438.487027] vfs_kern_mount.part.0+0x68/0x470 [ 438.491528] do_mount+0x113c/0x2f10 [ 438.495165] ? lock_acquire+0x170/0x3c0 [ 438.499149] ? check_preemption_disabled+0x41/0x280 [ 438.504173] ? copy_mount_string+0x40/0x40 [ 438.508426] ? copy_mount_options+0x59/0x380 [ 438.512842] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 438.517873] ? kmem_cache_alloc_trace+0x323/0x380 [ 438.522724] ? copy_mount_options+0x26f/0x380 [ 438.527232] ksys_mount+0xcf/0x130 [ 438.530775] __x64_sys_mount+0xba/0x150 [ 438.534756] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 438.539345] do_syscall_64+0xf9/0x620 [ 438.543159] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 438.548350] RIP: 0033:0x460c6a [ 438.551548] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 ad 89 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 8a 89 fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 438.570452] RSP: 002b:00007fb3ea55ea78 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 438.578164] RAX: ffffffffffffffda RBX: 00007fb3ea55eb10 RCX: 0000000000460c6a [ 438.585442] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007fb3ea55ead0 [ 438.592715] RBP: 00007fb3ea55ead0 R08: 00007fb3ea55eb10 R09: 0000000020000000 [ 438.599985] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000020000000 [ 438.607256] R13: 0000000020000100 R14: 0000000020000200 R15: 0000000020013000 16:48:29 executing program 0: creat(&(0x7f0000000280)='./file0\x00', 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) [ 438.668167] EXT4-fs (loop3): failed to initialize mballoc (-12) [ 438.678851] EXT4-fs (loop3): mount failed 16:48:29 executing program 2: creat(&(0x7f0000000280)='./file0\x00', 0x0) close(0xffffffffffffffff) write$binfmt_script(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40212, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) 16:48:29 executing program 4: open(&(0x7f0000000080)='./file0\x00', 0x40c5, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup(r0) syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x1000, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$tun(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/net/tun\x00', 0x0, 0x0) dup(r2) r3 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={0x0}}, 0x0) r4 = socket$inet_udplite(0x2, 0x2, 0x88) r5 = dup(r4) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=ANY=[@ANYBLOB="280000001d000100000000000000000007000000", @ANYRES32=r5], 0x28}}, 0x0) sendmmsg$alg(r3, &(0x7f00000000c0), 0x492492492492627, 0x0) 16:48:29 executing program 5: creat(&(0x7f0000000280)='./file0\x00', 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x42301, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) 16:48:29 executing program 0: creat(&(0x7f0000000280)='./file0\x00', 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) 16:48:29 executing program 3 (fault-call:1 fault-nth:83): creat(&(0x7f0000000280)='./file0\x00', 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) [ 438.863168] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.4'. 16:48:29 executing program 4: open(&(0x7f0000000080)='./file0\x00', 0x40c5, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup(r0) syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x1000, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$tun(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/net/tun\x00', 0x0, 0x0) dup(r2) r3 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={0x0}}, 0x0) r4 = socket$inet_udplite(0x2, 0x2, 0x88) r5 = dup(r4) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=ANY=[@ANYBLOB="280000001d000100000000000000000007000000", @ANYRES32=r5, @ANYBLOB], 0x28}}, 0x0) sendmmsg$alg(r3, &(0x7f00000000c0), 0x492492492492627, 0x0) 16:48:29 executing program 0: creat(&(0x7f0000000280)='./file0\x00', 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) [ 438.997591] FAULT_INJECTION: forcing a failure. [ 438.997591] name failslab, interval 1, probability 0, space 0, times 0 [ 439.057238] CPU: 0 PID: 25103 Comm: syz-executor.3 Not tainted 4.19.169-syzkaller #0 [ 439.065161] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 439.074516] Call Trace: [ 439.077113] dump_stack+0x1fc/0x2ef [ 439.080752] should_fail.cold+0xa/0xf [ 439.084565] ? setup_fault_attr+0x200/0x200 [ 439.088895] ? lock_acquire+0x170/0x3c0 [ 439.092882] __should_failslab+0x115/0x180 [ 439.097122] should_failslab+0x5/0x10 [ 439.100925] kmem_cache_alloc_node_trace+0x244/0x3b0 [ 439.106038] __kmalloc_node+0x38/0x70 [ 439.109846] kvmalloc_node+0x61/0xf0 [ 439.113565] ext4_alloc_flex_bg_array+0x1b8/0x620 [ 439.118421] ext4_fill_super+0xbddf/0xc820 [ 439.122690] ? ext4_calculate_overhead+0x11c0/0x11c0 [ 439.127805] ? snprintf+0xbb/0xf0 [ 439.131281] ? wait_for_completion_io+0x10/0x10 [ 439.135953] ? set_blocksize+0x163/0x3f0 [ 439.140028] mount_bdev+0x2fc/0x3b0 [ 439.143666] ? ext4_calculate_overhead+0x11c0/0x11c0 [ 439.148771] mount_fs+0xa3/0x310 [ 439.152149] vfs_kern_mount.part.0+0x68/0x470 [ 439.156656] do_mount+0x113c/0x2f10 [ 439.160293] ? lock_acquire+0x170/0x3c0 [ 439.164277] ? check_preemption_disabled+0x41/0x280 [ 439.169302] ? copy_mount_string+0x40/0x40 [ 439.173547] ? copy_mount_options+0x59/0x380 [ 439.177967] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 439.182990] ? kmem_cache_alloc_trace+0x323/0x380 [ 439.187842] ? copy_mount_options+0x26f/0x380 [ 439.192344] ksys_mount+0xcf/0x130 [ 439.195889] __x64_sys_mount+0xba/0x150 [ 439.199869] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 439.204454] do_syscall_64+0xf9/0x620 [ 439.208265] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 439.213455] RIP: 0033:0x460c6a [ 439.216649] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 ad 89 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 8a 89 fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 439.235552] RSP: 002b:00007fb3ea55ea78 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 439.243280] RAX: ffffffffffffffda RBX: 00007fb3ea55eb10 RCX: 0000000000460c6a [ 439.243290] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007fb3ea55ead0 [ 439.243299] RBP: 00007fb3ea55ead0 R08: 00007fb3ea55eb10 R09: 0000000020000000 [ 439.243307] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000020000000 [ 439.243315] R13: 0000000020000100 R14: 0000000020000200 R15: 0000000020013000 [ 439.294167] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.4'. [ 439.299522] EXT4-fs (loop3): not enough memory for 1 flex groups [ 439.299532] EXT4-fs (loop3): unable to initialize flex_bg meta info! [ 439.299700] EXT4-fs (loop3): mount failed [ 439.322935] kasan: CONFIG_KASAN_INLINE enabled [ 439.322950] kasan: GPF could be caused by NULL-ptr deref or user memory access [ 439.322964] general protection fault: 0000 [#1] PREEMPT SMP KASAN [ 439.322976] CPU: 0 PID: 25103 Comm: syz-executor.3 Not tainted 4.19.169-syzkaller #0 [ 439.322983] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 439.322997] RIP: 0010:mount_fs+0xe0/0x310 [ 439.323008] Code: 81 fc 00 f0 ff ff 0f 87 eb 01 00 00 e8 19 16 bf ff 49 8d bc 24 c8 00 00 00 48 b8 00 00 00 00 00 fc ff df 48 89 fa 48 c1 ea 03 <80> 3c 02 00 0f 85 ed 01 00 00 4d 8b ac 24 c8 00 00 00 4d 85 ed 0f [ 439.323014] RSP: 0018:ffff88804cc07ce0 EFLAGS: 00010202 [ 439.323024] RAX: dffffc0000000000 RBX: ffffffff8a0a8b40 RCX: ffffc9000c228000 [ 439.323031] RDX: 0000000000000019 RSI: ffffffff81a34437 RDI: 00000000000000c8 [ 439.323038] RBP: 0000000000000000 R08: 0000000000400000 R09: fffffffffffff000 [ 439.323045] R10: 0000000000000007 R11: 0000000000000000 R12: 0000000000000000 [ 439.323052] R13: ffff88805409e400 R14: 0000000000000000 R15: ffff888097b00000 [ 439.323061] FS: 00007fb3ea55f700(0000) GS:ffff8880ba000000(0000) knlGS:0000000000000000 [ 439.323068] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 439.323075] CR2: 0000001b30323000 CR3: 00000000a63d7000 CR4: 00000000001406f0 [ 439.323085] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 439.323092] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 439.323095] Call Trace: [ 439.323113] vfs_kern_mount.part.0+0x68/0x470 [ 439.323126] do_mount+0x113c/0x2f10 [ 439.323141] ? lock_acquire+0x170/0x3c0 [ 439.323154] ? check_preemption_disabled+0x41/0x280 [ 439.323167] ? copy_mount_string+0x40/0x40 [ 439.323179] ? copy_mount_options+0x59/0x380 [ 439.323192] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 439.323205] ? kmem_cache_alloc_trace+0x323/0x380 [ 439.323219] ? copy_mount_options+0x26f/0x380 [ 439.323239] ksys_mount+0xcf/0x130 [ 439.323252] __x64_sys_mount+0xba/0x150 [ 439.323265] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 439.323277] do_syscall_64+0xf9/0x620 [ 439.323291] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 439.323299] RIP: 0033:0x460c6a [ 439.323309] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 ad 89 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 8a 89 fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 439.323315] RSP: 002b:00007fb3ea55ea78 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 439.323325] RAX: ffffffffffffffda RBX: 00007fb3ea55eb10 RCX: 0000000000460c6a [ 439.323331] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007fb3ea55ead0 [ 439.323338] RBP: 00007fb3ea55ead0 R08: 00007fb3ea55eb10 R09: 0000000020000000 [ 439.323345] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000020000000 [ 439.323352] R13: 0000000020000100 R14: 0000000020000200 R15: 0000000020013000 [ 439.323362] Modules linked in: [ 439.323376] ---[ end trace 71e61cf9533fc832 ]--- [ 439.323386] RIP: 0010:mount_fs+0xe0/0x310 [ 439.323397] Code: 81 fc 00 f0 ff ff 0f 87 eb 01 00 00 e8 19 16 bf ff 49 8d bc 24 c8 00 00 00 48 b8 00 00 00 00 00 fc ff df 48 89 fa 48 c1 ea 03 <80> 3c 02 00 0f 85 ed 01 00 00 4d 8b ac 24 c8 00 00 00 4d 85 ed 0f [ 439.323403] RSP: 0018:ffff88804cc07ce0 EFLAGS: 00010202 [ 439.323413] RAX: dffffc0000000000 RBX: ffffffff8a0a8b40 RCX: ffffc9000c228000 [ 439.323419] RDX: 0000000000000019 RSI: ffffffff81a34437 RDI: 00000000000000c8 [ 439.323426] RBP: 0000000000000000 R08: 0000000000400000 R09: fffffffffffff000 [ 439.323432] R10: 0000000000000007 R11: 0000000000000000 R12: 0000000000000000 [ 439.323439] R13: ffff88805409e400 R14: 0000000000000000 R15: ffff888097b00000 [ 439.323449] FS: 00007fb3ea55f700(0000) GS:ffff8880ba000000(0000) knlGS:0000000000000000 [ 439.323456] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 439.323463] CR2: 0000001b30323000 CR3: 00000000a63d7000 CR4: 00000000001406f0 [ 439.323473] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 439.323480] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 439.323485] Kernel panic - not syncing: Fatal exception [ 439.324272] Kernel Offset: disabled [ 439.753719] Rebooting in 86400 seconds..