0002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="02000000030000000400000030000f000300040000000000000000000f008ec4", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000e1f4655fe2f4655fe2f4655f000000000000040008", 0x1d, 0x4200}, {&(0x7f0000012700)="20000000d4c49a2e07", 0x9, 0x4280}], 0x0, &(0x7f0000013a00)) [ 637.994166] EXT4-fs (loop5): corrupt root inode, run e2fsck [ 638.060204] EXT4-fs (loop5): mount failed 19:26:30 executing program 3: set_mempolicy(0x2, &(0x7f0000000000)=0x9, 0x90) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x4c032, 0xffffffffffffffff, 0x2d00000000000000) 19:26:30 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)=ANY=[@ANYBLOB="300000001000070100dd2174ffff27de00000000", @ANYRES32=0x0, @ANYBLOB="00000000fffff00008001b00000000000500100005"], 0x30}}, 0x0) 19:26:30 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8d000000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="02000000030000000400000030000f000300040000000000000000000f008ec4", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000e1f4655fe2f4655fe2f4655f00000000000004", 0x1b, 0x4200}, {&(0x7f0000012700)="20000000d4c49a2e07", 0x9, 0x4280}], 0x0, &(0x7f0000013a00)) 19:26:30 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xa7010000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="02000000030000000400000030000f000300040000000000000000000f008ec4", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000e1f4655fe2f4655fe2f4655f000000000000040008", 0x1d, 0x4200}, {&(0x7f0000012700)="20000000d4c49a2e07", 0x9, 0x4280}], 0x0, &(0x7f0000013a00)) 19:26:30 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xad000000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="02000000030000000400000030000f000300040000000000000000000f008ec4", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000e1f4655fe2f4655fe2f4655f000000000000040008", 0x1d, 0x4200}, {&(0x7f0000012700)="20000000d4c49a2e07", 0x9, 0x4280}], 0x0, &(0x7f0000013a00)) 19:26:30 executing program 3: set_mempolicy(0x2, &(0x7f0000000000)=0x9, 0x90) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x4c032, 0xffffffffffffffff, 0x2d01000000000000) [ 638.560976] EXT4-fs (loop5): corrupt root inode, run e2fsck [ 638.568244] EXT4-fs (loop5): mount failed 19:26:30 executing program 2: socket(0x11, 0x0, 0x0) r0 = socket$vsock_stream(0x28, 0x1, 0x0) r1 = dup(r0) connect$vsock_stream(r1, &(0x7f0000000000)={0x28, 0x0, 0x0, @my=0x0}, 0x10) sendmsg$nl_route(r1, 0x0, 0x4008094) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000180)='/dev/hwrng\x00', 0x0, 0x0) read$FUSE(r2, &(0x7f0000000700), 0xfce3) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0x0) 19:26:30 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)=ANY=[@ANYBLOB="300000001000070100dd2174ffff27de00000000", @ANYRES32=0x0, @ANYBLOB="000000000000000108001b00000000000500100005"], 0x30}}, 0x0) 19:26:30 executing program 3: set_mempolicy(0x2, &(0x7f0000000000)=0x9, 0x90) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x4c032, 0xffffffffffffffff, 0x2e00000000000000) 19:26:30 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xa7020000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="02000000030000000400000030000f000300040000000000000000000f008ec4", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000e1f4655fe2f4655fe2f4655f000000000000040008", 0x1d, 0x4200}, {&(0x7f0000012700)="20000000d4c49a2e07", 0x9, 0x4280}], 0x0, &(0x7f0000013a00)) 19:26:30 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8d010000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="02000000030000000400000030000f000300040000000000000000000f008ec4", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000e1f4655fe2f4655fe2f4655f00000000000004", 0x1b, 0x4200}, {&(0x7f0000012700)="20000000d4c49a2e07", 0x9, 0x4280}], 0x0, &(0x7f0000013a00)) 19:26:30 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xad010000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="02000000030000000400000030000f000300040000000000000000000f008ec4", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000e1f4655fe2f4655fe2f4655f000000000000040008", 0x1d, 0x4200}, {&(0x7f0000012700)="20000000d4c49a2e07", 0x9, 0x4280}], 0x0, &(0x7f0000013a00)) 19:26:30 executing program 3: set_mempolicy(0x2, &(0x7f0000000000)=0x9, 0x90) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x4c032, 0xffffffffffffffff, 0x2e01000000000000) 19:26:30 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)=ANY=[@ANYBLOB="300000001000070100dd2174ffff27de00000000", @ANYRES32=0x0, @ANYBLOB="000000000000000208001b00000000000500100005"], 0x30}}, 0x0) 19:26:31 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)=ANY=[@ANYBLOB="300000001000070100dd2174ffff27de00000000", @ANYRES32=0x0, @ANYBLOB="000000000000000308001b00000000000500100005"], 0x30}}, 0x0) [ 638.968106] EXT4-fs (loop5): corrupt root inode, run e2fsck [ 638.984521] EXT4-fs (loop5): mount failed 19:26:31 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xa7030000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="02000000030000000400000030000f000300040000000000000000000f008ec4", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000e1f4655fe2f4655fe2f4655f000000000000040008", 0x1d, 0x4200}, {&(0x7f0000012700)="20000000d4c49a2e07", 0x9, 0x4280}], 0x0, &(0x7f0000013a00)) 19:26:31 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xad020000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="02000000030000000400000030000f000300040000000000000000000f008ec4", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000e1f4655fe2f4655fe2f4655f000000000000040008", 0x1d, 0x4200}, {&(0x7f0000012700)="20000000d4c49a2e07", 0x9, 0x4280}], 0x0, &(0x7f0000013a00)) 19:26:31 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8d020000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="02000000030000000400000030000f000300040000000000000000000f008ec4", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000e1f4655fe2f4655fe2f4655f00000000000004", 0x1b, 0x4200}, {&(0x7f0000012700)="20000000d4c49a2e07", 0x9, 0x4280}], 0x0, &(0x7f0000013a00)) [ 639.226900] EXT4-fs (loop5): corrupt root inode, run e2fsck [ 639.251486] EXT4-fs (loop5): mount failed [ 639.341743] EXT4-fs (loop5): corrupt root inode, run e2fsck [ 639.348617] EXT4-fs (loop5): mount failed 19:26:31 executing program 2: socket(0x11, 0x0, 0x0) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000180)='/dev/hwrng\x00', 0x0, 0x0) r1 = syz_open_dev$dmmidi(&(0x7f00000000c0)='/dev/dmmidi#\x00', 0x100000001, 0x100) ioctl$KVM_SET_REGS(r0, 0x4090ae82, &(0x7f00000001c0)={[0xffffffffffffffef, 0x7, 0x0, 0x5, 0x98, 0x5dea, 0x7e36, 0x7, 0x400, 0x6, 0x1ff, 0xfffffffffffffffa, 0x100, 0x1f, 0x9, 0x1], 0x4, 0x41}) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000100)={&(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffd000/0x1000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffb000/0x1000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000000000)="4af45f2b709076849d8a7eaa0d108a7836a80664146278f35dafd1ce75b3d30c979d11439d6d59c4ce8dfc48aeb0e9f01c6c628a460c9ee3bbd19380b31066658e4bcf133a83747ccd3e228d32794dfa987a85317ab83a9341a726c1c4f0c83bbbe32ea18fcbc8bfe6f10d8580c6ad00b0cac4409dc0409b0105db95ab4e15f767a776d59b791f98322225b729c584d5b8a663f8", 0x94, r1}, 0x68) read$FUSE(r0, &(0x7f0000000700), 0xfce3) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0x0) 19:26:31 executing program 3: set_mempolicy(0x2, &(0x7f0000000000)=0x9, 0x90) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x4c032, 0xffffffffffffffff, 0x2f00000000000000) 19:26:31 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)=ANY=[@ANYBLOB="300000001000070100dd2174ffff27de00000000", @ANYRES32=0x0, @ANYBLOB="000000000000000408001b00000000000500100005"], 0x30}}, 0x0) 19:26:31 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xa8000000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="02000000030000000400000030000f000300040000000000000000000f008ec4", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000e1f4655fe2f4655fe2f4655f000000000000040008", 0x1d, 0x4200}, {&(0x7f0000012700)="20000000d4c49a2e07", 0x9, 0x4280}], 0x0, &(0x7f0000013a00)) 19:26:31 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xad030000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="02000000030000000400000030000f000300040000000000000000000f008ec4", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000e1f4655fe2f4655fe2f4655f000000000000040008", 0x1d, 0x4200}, {&(0x7f0000012700)="20000000d4c49a2e07", 0x9, 0x4280}], 0x0, &(0x7f0000013a00)) 19:26:31 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8d030000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="02000000030000000400000030000f000300040000000000000000000f008ec4", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000e1f4655fe2f4655fe2f4655f00000000000004", 0x1b, 0x4200}, {&(0x7f0000012700)="20000000d4c49a2e07", 0x9, 0x4280}], 0x0, &(0x7f0000013a00)) 19:26:31 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)=ANY=[@ANYBLOB="300000001000070100dd2174ffff27de00000000", @ANYRES32=0x0, @ANYBLOB="000000000000000508001b00000000000500100005"], 0x30}}, 0x0) 19:26:31 executing program 3: set_mempolicy(0x2, &(0x7f0000000000)=0x9, 0x90) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x4c032, 0xffffffffffffffff, 0x2f01000000000000) 19:26:31 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)=ANY=[@ANYBLOB="300000001000070100dd2174ffff27de00000000", @ANYRES32=0x0, @ANYBLOB="000000000000000608001b00000000000500100005"], 0x30}}, 0x0) 19:26:31 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)=ANY=[@ANYBLOB="300000001000070100dd2174ffff27de00000000", @ANYRES32=0x0, @ANYBLOB="000000000000000708001b00000000000500100005"], 0x30}}, 0x0) 19:26:31 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xa8010000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="02000000030000000400000030000f000300040000000000000000000f008ec4", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000e1f4655fe2f4655fe2f4655f000000000000040008", 0x1d, 0x4200}, {&(0x7f0000012700)="20000000d4c49a2e07", 0x9, 0x4280}], 0x0, &(0x7f0000013a00)) [ 639.675709] EXT4-fs (loop5): corrupt root inode, run e2fsck [ 639.727987] EXT4-fs (loop5): mount failed 19:26:31 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)=ANY=[@ANYBLOB="300000001000070100dd2174ffff27de00000000", @ANYRES32=0x0, @ANYBLOB="000000000000000808001b00000000000500100005"], 0x30}}, 0x0) [ 639.843175] EXT4-fs (loop5): corrupt root inode, run e2fsck [ 639.849128] EXT4-fs (loop5): mount failed 19:26:32 executing program 2: socket(0x11, 0x4, 0x4) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000180)='/dev/hwrng\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f0000000700), 0xfce3) 19:26:32 executing program 3: set_mempolicy(0x2, &(0x7f0000000000)=0x9, 0x90) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x4c032, 0xffffffffffffffff, 0x3000000000000000) 19:26:32 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8e000000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="02000000030000000400000030000f000300040000000000000000000f008ec4", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000e1f4655fe2f4655fe2f4655f00000000000004", 0x1b, 0x4200}, {&(0x7f0000012700)="20000000d4c49a2e07", 0x9, 0x4280}], 0x0, &(0x7f0000013a00)) 19:26:32 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xae000000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="02000000030000000400000030000f000300040000000000000000000f008ec4", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000e1f4655fe2f4655fe2f4655f000000000000040008", 0x1d, 0x4200}, {&(0x7f0000012700)="20000000d4c49a2e07", 0x9, 0x4280}], 0x0, &(0x7f0000013a00)) 19:26:32 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)=ANY=[@ANYBLOB="300000001000070100dd2174ffff27de00000000", @ANYRES32=0x0, @ANYBLOB="000000000000000908001b00000000000500100005"], 0x30}}, 0x0) 19:26:32 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xa8020000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="02000000030000000400000030000f000300040000000000000000000f008ec4", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000e1f4655fe2f4655fe2f4655f000000000000040008", 0x1d, 0x4200}, {&(0x7f0000012700)="20000000d4c49a2e07", 0x9, 0x4280}], 0x0, &(0x7f0000013a00)) [ 640.172719] EXT4-fs (loop5): corrupt root inode, run e2fsck [ 640.191035] EXT4-fs (loop5): mount failed 19:26:32 executing program 3: set_mempolicy(0x2, &(0x7f0000000000)=0x9, 0x90) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x4c032, 0xffffffffffffffff, 0x3001000000000000) 19:26:32 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xae010000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="02000000030000000400000030000f000300040000000000000000000f008ec4", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000e1f4655fe2f4655fe2f4655f000000000000040008", 0x1d, 0x4200}, {&(0x7f0000012700)="20000000d4c49a2e07", 0x9, 0x4280}], 0x0, &(0x7f0000013a00)) 19:26:32 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)=ANY=[@ANYBLOB="300000001000070100dd2174ffff27de00000000", @ANYRES32=0x0, @ANYBLOB="000000000000000a08001b00000000000500100005"], 0x30}}, 0x0) 19:26:32 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8e010000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="02000000030000000400000030000f000300040000000000000000000f008ec4", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000e1f4655fe2f4655fe2f4655f00000000000004", 0x1b, 0x4200}, {&(0x7f0000012700)="20000000d4c49a2e07", 0x9, 0x4280}], 0x0, &(0x7f0000013a00)) 19:26:32 executing program 3: set_mempolicy(0x2, &(0x7f0000000000)=0x9, 0x90) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x4c032, 0xffffffffffffffff, 0x3100000000000000) 19:26:32 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)=ANY=[@ANYBLOB="300000001000070100dd2174ffff27de00000000", @ANYRES32=0x0, @ANYBLOB="000000000000000c08001b00000000000500100005"], 0x30}}, 0x0) [ 640.551519] EXT4-fs (loop5): corrupt root inode, run e2fsck [ 640.582043] EXT4-fs (loop5): mount failed 19:26:32 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)=ANY=[@ANYBLOB="300000001000070100dd2174ffff27de00000000", @ANYRES32=0x0, @ANYBLOB="000000000000000e08001b00000000000500100005"], 0x30}}, 0x0) 19:26:32 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xa8030000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="02000000030000000400000030000f000300040000000000000000000f008ec4", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000e1f4655fe2f4655fe2f4655f000000000000040008", 0x1d, 0x4200}, {&(0x7f0000012700)="20000000d4c49a2e07", 0x9, 0x4280}], 0x0, &(0x7f0000013a00)) 19:26:32 executing program 3: set_mempolicy(0x2, &(0x7f0000000000)=0x9, 0x90) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x4c032, 0xffffffffffffffff, 0x3101000000000000) 19:26:32 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xae020000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="02000000030000000400000030000f000300040000000000000000000f008ec4", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000e1f4655fe2f4655fe2f4655f000000000000040008", 0x1d, 0x4200}, {&(0x7f0000012700)="20000000d4c49a2e07", 0x9, 0x4280}], 0x0, &(0x7f0000013a00)) 19:26:32 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8e020000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="02000000030000000400000030000f000300040000000000000000000f008ec4", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000e1f4655fe2f4655fe2f4655f00000000000004", 0x1b, 0x4200}, {&(0x7f0000012700)="20000000d4c49a2e07", 0x9, 0x4280}], 0x0, &(0x7f0000013a00)) 19:26:32 executing program 2: r0 = socket(0x11, 0x0, 0x0) r1 = socket$vsock_stream(0x28, 0x1, 0x0) r2 = dup(r1) getsockopt$IP_SET_OP_VERSION(r1, 0x1, 0x53, &(0x7f0000000000), &(0x7f0000000040)=0x8) r3 = openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}, 0x0, 0x0, 0x0, 0x1, 0x8000000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$llc_int(r0, 0x10c, 0x1, &(0x7f00000000c0), &(0x7f0000000100)=0x4) r4 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000180)='/dev/hwrng\x00', 0x0, 0x0) ioctl$MON_IOCX_GET(r2, 0x40189206, &(0x7f0000000640)={0xffffffffffffffff, &(0x7f00000005c0)=""/84, 0x54}) read$FUSE(r4, &(0x7f0000000700), 0xfce3) r5 = socket$vsock_stream(0x28, 0x1, 0x0) r6 = dup(r5) connect$vsock_stream(r6, &(0x7f0000000000)={0x28, 0x0, 0x0, @my=0x0}, 0x10) r7 = socket$vsock_stream(0x28, 0x1, 0x0) dup(r7) connect$vsock_stream(r7, &(0x7f0000000580)={0x28, 0x0, 0x2710, @my=0x1}, 0x10) ioctl$BINDER_WRITE_READ(r6, 0xc0306201, &(0x7f0000000540)={0x6c, 0x0, &(0x7f00000003c0)=[@reply={0x40406301, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x58, 0x18, &(0x7f0000000280)={@flat=@weak_handle={0x77682a85, 0x100a, 0x2}, @ptr={0x70742a85, 0x0, &(0x7f00000001c0)=""/148, 0x94, 0x1, 0x1}, @fd={0x66642a85, 0x0, r3}}, &(0x7f0000000380)={0x0, 0x18, 0x40}}}, @release={0x40046306, 0x3}, @free_buffer, @acquire_done], 0xfe, 0x0, &(0x7f0000000440)="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"}) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x41, &(0x7f0000000140)=0x808, 0x4) 19:26:32 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xae030000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="02000000030000000400000030000f000300040000000000000000000f008ec4", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000e1f4655fe2f4655fe2f4655f000000000000040008", 0x1d, 0x4200}, {&(0x7f0000012700)="20000000d4c49a2e07", 0x9, 0x4280}], 0x0, &(0x7f0000013a00)) 19:26:32 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)=ANY=[@ANYBLOB="300000001000070100dd2174ffff27de00000000", @ANYRES32=0x0, @ANYBLOB="000000000000001008001b00000000000500100005"], 0x30}}, 0x0) 19:26:32 executing program 3: set_mempolicy(0x2, &(0x7f0000000000)=0x9, 0x90) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x4c032, 0xffffffffffffffff, 0x3200000000000000) 19:26:33 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xa9000000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="02000000030000000400000030000f000300040000000000000000000f008ec4", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000e1f4655fe2f4655fe2f4655f000000000000040008", 0x1d, 0x4200}, {&(0x7f0000012700)="20000000d4c49a2e07", 0x9, 0x4280}], 0x0, &(0x7f0000013a00)) [ 640.977739] EXT4-fs (loop5): corrupt root inode, run e2fsck [ 641.012465] EXT4-fs (loop5): mount failed 19:26:33 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)=ANY=[@ANYBLOB="300000001000070100dd2174ffff27de00000000", @ANYRES32=0x0, @ANYBLOB="0000000000000d3c08001b00000000000500100005"], 0x30}}, 0x0) 19:26:33 executing program 3: set_mempolicy(0x2, &(0x7f0000000000)=0x9, 0x90) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x4c032, 0xffffffffffffffff, 0x3201000000000000) [ 641.196106] EXT4-fs: failed to create workqueue [ 641.201288] EXT4-fs (loop5): mount failed 19:26:33 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xaf000000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="02000000030000000400000030000f000300040000000000000000000f008ec4", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000e1f4655fe2f4655fe2f4655f000000000000040008", 0x1d, 0x4200}, {&(0x7f0000012700)="20000000d4c49a2e07", 0x9, 0x4280}], 0x0, &(0x7f0000013a00)) 19:26:33 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)=ANY=[@ANYBLOB="300000001000070100dd2174ffff27de00000000", @ANYRES32=0x0, @ANYBLOB="000000000000006008001b00000000000500100005"], 0x30}}, 0x0) 19:26:33 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xa9010000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="02000000030000000400000030000f000300040000000000000000000f008ec4", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000e1f4655fe2f4655fe2f4655f000000000000040008", 0x1d, 0x4200}, {&(0x7f0000012700)="20000000d4c49a2e07", 0x9, 0x4280}], 0x0, &(0x7f0000013a00)) 19:26:33 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8e030000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="02000000030000000400000030000f000300040000000000000000000f008ec4", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000e1f4655fe2f4655fe2f4655f00000000000004", 0x1b, 0x4200}, {&(0x7f0000012700)="20000000d4c49a2e07", 0x9, 0x4280}], 0x0, &(0x7f0000013a00)) 19:26:33 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)=ANY=[@ANYBLOB="300000001000070100dd2174ffff27de00000000", @ANYRES32=0x0, @ANYBLOB="000000000000586508001b00000000000500100005"], 0x30}}, 0x0) 19:26:33 executing program 2: socket(0x11, 0x0, 0x0) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffffffffffffffe, 0xffffffffffffffff, 0x0) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000180)='/dev/hwrng\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0xfce3) socket(0x2c, 0x80000, 0x100) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x3) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x4, 0x0, 0x0, 0x48, 0x0, 0xb441, 0x1000, 0x4, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x7fff, 0x0, @perf_config_ext={0x7f, 0x401}, 0x0, 0x5, 0xe0, 0xd, 0x6, 0x1}, r1, 0x4, r0, 0x2) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0x0) 19:26:33 executing program 3: set_mempolicy(0x2, &(0x7f0000000000)=0x9, 0x90) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x4c032, 0xffffffffffffffff, 0x3300000000000000) 19:26:33 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xa9020000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="02000000030000000400000030000f000300040000000000000000000f008ec4", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000e1f4655fe2f4655fe2f4655f000000000000040008", 0x1d, 0x4200}, {&(0x7f0000012700)="20000000d4c49a2e07", 0x9, 0x4280}], 0x0, &(0x7f0000013a00)) 19:26:33 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)=ANY=[@ANYBLOB="300000001000070100dd2174ffff27de00000000", @ANYRES32=0x0, @ANYBLOB="000000000000008108001b00000000000500100005"], 0x30}}, 0x0) 19:26:33 executing program 3: set_mempolicy(0x2, &(0x7f0000000000)=0x9, 0x90) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x4c032, 0xffffffffffffffff, 0x3301000000000000) 19:26:33 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)=ANY=[@ANYBLOB="300000001000070100dd2174ffff27de00000000", @ANYRES32=0x0, @ANYBLOB="00000000ffffa88808001b00000000000500100005"], 0x30}}, 0x0) [ 641.587454] EXT4-fs (loop5): corrupt root inode, run e2fsck [ 641.607788] EXT4-fs (loop5): mount failed 19:26:33 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xa9030000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="02000000030000000400000030000f000300040000000000000000000f008ec4", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000e1f4655fe2f4655fe2f4655f000000000000040008", 0x1d, 0x4200}, {&(0x7f0000012700)="20000000d4c49a2e07", 0x9, 0x4280}], 0x0, &(0x7f0000013a00)) 19:26:33 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xaf010000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="02000000030000000400000030000f000300040000000000000000000f008ec4", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000e1f4655fe2f4655fe2f4655f000000000000040008", 0x1d, 0x4200}, {&(0x7f0000012700)="20000000d4c49a2e07", 0x9, 0x4280}], 0x0, &(0x7f0000013a00)) 19:26:33 executing program 2: socket(0x11, 0x0, 0x0) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x1e2, 0x0, 0x6}, 0x0, 0x1, 0xffffffffffffffff, 0x0) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000180)='/dev/hwrng\x00', 0x0, 0x0) read$FUSE(r1, &(0x7f0000000700), 0xfce3) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0x0) fsetxattr(r0, &(0x7f0000000000)=@known='trusted.overlay.opaque\x00', &(0x7f0000000040)='/dev/hwrng\x00', 0xb, 0x2) 19:26:33 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)=ANY=[@ANYBLOB="300000001000070100dd2174ffff27de00000000", @ANYRES32=0x0, @ANYBLOB="00000000ffffff9e08001b00000000000500100005"], 0x30}}, 0x0) 19:26:33 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8f000000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="02000000030000000400000030000f000300040000000000000000000f008ec4", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000e1f4655fe2f4655fe2f4655f00000000000004", 0x1b, 0x4200}, {&(0x7f0000012700)="20000000d4c49a2e07", 0x9, 0x4280}], 0x0, &(0x7f0000013a00)) 19:26:33 executing program 3: set_mempolicy(0x2, &(0x7f0000000000)=0x9, 0x90) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x4c032, 0xffffffffffffffff, 0x3400000000000000) 19:26:33 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)=ANY=[@ANYBLOB="300000001000070100dd2174ffff27de00000000", @ANYRES32=0x0, @ANYBLOB="00000000ffffffc308001b00000000000500100005"], 0x30}}, 0x0) 19:26:33 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)=ANY=[@ANYBLOB="300000001000070100dd2174ffff27de00000000", @ANYRES32=0x0, @ANYBLOB="00000000fffffff008001b00000000000500100005"], 0x30}}, 0x0) 19:26:33 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)=ANY=[@ANYBLOB="300000001000070100dd2174ffff27de00000000", @ANYRES32=0x0, @ANYBLOB="00000000fffffffe08001b00000000000500100005"], 0x30}}, 0x0) 19:26:34 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xaa000000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="02000000030000000400000030000f000300040000000000000000000f008ec4", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000e1f4655fe2f4655fe2f4655f000000000000040008", 0x1d, 0x4200}, {&(0x7f0000012700)="20000000d4c49a2e07", 0x9, 0x4280}], 0x0, &(0x7f0000013a00)) 19:26:34 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)=ANY=[@ANYBLOB="300000001000070100dd2174ffff27de00000000", @ANYRES32=0x0, @ANYBLOB="0000000088a8ffff08001b00000000000500100005"], 0x30}}, 0x0) 19:26:34 executing program 3: set_mempolicy(0x2, &(0x7f0000000000)=0x9, 0x90) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x4c032, 0xffffffffffffffff, 0x3401000000000000) 19:26:34 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)=ANY=[@ANYBLOB="300000001000070100dd2174ffff27de00000000", @ANYRES32=0x0, @ANYBLOB="0000000000f0ffff08001b00000000000500100005"], 0x30}}, 0x0) [ 642.037062] EXT4-fs (loop5): corrupt root inode, run e2fsck [ 642.051040] EXT4-fs (loop5): mount failed 19:26:34 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xaf020000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="02000000030000000400000030000f000300040000000000000000000f008ec4", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000e1f4655fe2f4655fe2f4655f000000000000040008", 0x1d, 0x4200}, {&(0x7f0000012700)="20000000d4c49a2e07", 0x9, 0x4280}], 0x0, &(0x7f0000013a00)) 19:26:34 executing program 2: socket(0x11, 0x0, 0x0) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$vsock_stream(0x28, 0x1, 0x0) dup(r0) ioctl$sock_proto_private(r0, 0x89e3, &(0x7f0000000000)="0689976057b1b55f3418542aa0c426b08c5173d8f9878262c31c1b31b402af6b52c4ed431a9acfd98c5832950103d13f122dd28d82570a4c94ec57ec3a14808489cae789a6c41874a33bb2d22ba74ce9fada9037f2def9e9eb67") r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000180)='/dev/hwrng\x00', 0x0, 0x0) read$FUSE(r1, &(0x7f0000000700), 0xfce3) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0x0) 19:26:34 executing program 3: set_mempolicy(0x2, &(0x7f0000000000)=0x9, 0x90) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x4c032, 0xffffffffffffffff, 0x3500000000000000) [ 642.149932] EXT4-fs (loop5): corrupt root inode, run e2fsck [ 642.162184] EXT4-fs (loop5): mount failed 19:26:34 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)=ANY=[@ANYBLOB="300000001000070100dd2174ffff27de00000000", @ANYRES32=0x0, @ANYBLOB="000000007fffffff08001b00000000000500100005"], 0x30}}, 0x0) 19:26:34 executing program 3: set_mempolicy(0x2, &(0x7f0000000000)=0x9, 0x90) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x4c032, 0xffffffffffffffff, 0x3501000000000000) 19:26:34 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xaa010000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="02000000030000000400000030000f000300040000000000000000000f008ec4", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000e1f4655fe2f4655fe2f4655f000000000000040008", 0x1d, 0x4200}, {&(0x7f0000012700)="20000000d4c49a2e07", 0x9, 0x4280}], 0x0, &(0x7f0000013a00)) 19:26:34 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8f010000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="02000000030000000400000030000f000300040000000000000000000f008ec4", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000e1f4655fe2f4655fe2f4655f00000000000004", 0x1b, 0x4200}, {&(0x7f0000012700)="20000000d4c49a2e07", 0x9, 0x4280}], 0x0, &(0x7f0000013a00)) 19:26:34 executing program 3: set_mempolicy(0x2, &(0x7f0000000000)=0x9, 0x90) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x4c032, 0xffffffffffffffff, 0x3600000000000000) 19:26:34 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)=ANY=[@ANYBLOB="300000001000070100dd2174ffff27de00000000", @ANYRES32=0x0, @ANYBLOB="000000009effffff08001b00000000000500100005"], 0x30}}, 0x0) 19:26:34 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xaf030000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="02000000030000000400000030000f000300040000000000000000000f008ec4", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000e1f4655fe2f4655fe2f4655f000000000000040008", 0x1d, 0x4200}, {&(0x7f0000012700)="20000000d4c49a2e07", 0x9, 0x4280}], 0x0, &(0x7f0000013a00)) 19:26:34 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)=ANY=[@ANYBLOB="300000001000070100dd2174ffff27de00000000", @ANYRES32=0x0, @ANYBLOB="00000000c3ffffff08001b00000000000500100005"], 0x30}}, 0x0) [ 642.510937] EXT4-fs (loop5): corrupt root inode, run e2fsck [ 642.535140] EXT4-fs (loop5): mount failed 19:26:34 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xaa020000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="02000000030000000400000030000f000300040000000000000000000f008ec4", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000e1f4655fe2f4655fe2f4655f000000000000040008", 0x1d, 0x4200}, {&(0x7f0000012700)="20000000d4c49a2e07", 0x9, 0x4280}], 0x0, &(0x7f0000013a00)) 19:26:34 executing program 3: set_mempolicy(0x2, &(0x7f0000000000)=0x9, 0x90) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x4c032, 0xffffffffffffffff, 0x3601000000000000) 19:26:34 executing program 2: sendmsg$NLBL_MGMT_C_VERSION(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000080)={&(0x7f00000001c0)=ANY=[@ANYBLOB="0e4baad58079b79e4fba839e140d1c124f080e72b2706947817b092885e9ae907796e425556a5a28eea2e1391e213d0be76c6c54a3813c654b32727995b7469cab5d7fa66e2aec551b802504fa08263adba6676516d2ccec651ba5deec831856932812c9a561aca2f41c86761352d21f4a4969967100f5aca1f58afc289332b8bb4420f4dea0d48aa705be2bed94c83d7f21fa7f2392a472e0cd8f78dedf0621999ac82d8a801649bb88a3d9a19565b25d02ecdffae5264671af58c394638c2deb9d28d4f7ea8448f4999166959d9d35b229c23fdc51e68e41654a45f6394c130602abe5ba5fcc624cd5758ca86c7f7455be266b1a15ed5a3a976f334eafa24b31f0ce4c625f8776a9ec917f32521bcf2a1524ae", @ANYRES16=0x0, @ANYBLOB="00012dbd7000ffdbdf25080000000800040003000000"], 0x1c}, 0x1, 0x0, 0x0, 0x20}, 0x4000890) socket(0x11, 0x0, 0x0) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000180)='/dev/hwrng\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f0000000700), 0xfce3) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0x0) 19:26:34 executing program 3: set_mempolicy(0x2, &(0x7f0000000000)=0x9, 0x90) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x4c032, 0xffffffffffffffff, 0x3700000000000000) 19:26:34 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8f020000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="02000000030000000400000030000f000300040000000000000000000f008ec4", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000e1f4655fe2f4655fe2f4655f00000000000004", 0x1b, 0x4200}, {&(0x7f0000012700)="20000000d4c49a2e07", 0x9, 0x4280}], 0x0, &(0x7f0000013a00)) 19:26:34 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xb0000000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="02000000030000000400000030000f000300040000000000000000000f008ec4", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000e1f4655fe2f4655fe2f4655f000000000000040008", 0x1d, 0x4200}, {&(0x7f0000012700)="20000000d4c49a2e07", 0x9, 0x4280}], 0x0, &(0x7f0000013a00)) 19:26:34 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)=ANY=[@ANYBLOB="300000001000070100dd2174ffff27de00000000", @ANYRES32=0x0, @ANYBLOB="00000000f0ffffff08001b00000000000500100005"], 0x30}}, 0x0) [ 642.827657] EXT4-fs (loop5): corrupt root inode, run e2fsck [ 642.833650] EXT4-fs (loop5): mount failed 19:26:34 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)=ANY=[@ANYBLOB="300000001000070100dd2174ffff27de00000000", @ANYRES32=0x0, @ANYBLOB="00000000feffffff08001b00000000000500100005"], 0x30}}, 0x0) 19:26:34 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xaa030000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="02000000030000000400000030000f000300040000000000000000000f008ec4", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000e1f4655fe2f4655fe2f4655f000000000000040008", 0x1d, 0x4200}, {&(0x7f0000012700)="20000000d4c49a2e07", 0x9, 0x4280}], 0x0, &(0x7f0000013a00)) 19:26:34 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xb0010000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="02000000030000000400000030000f000300040000000000000000000f008ec4", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000e1f4655fe2f4655fe2f4655f000000000000040008", 0x1d, 0x4200}, {&(0x7f0000012700)="20000000d4c49a2e07", 0x9, 0x4280}], 0x0, &(0x7f0000013a00)) 19:26:34 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8f030000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="02000000030000000400000030000f000300040000000000000000000f008ec4", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000e1f4655fe2f4655fe2f4655f00000000000004", 0x1b, 0x4200}, {&(0x7f0000012700)="20000000d4c49a2e07", 0x9, 0x4280}], 0x0, &(0x7f0000013a00)) 19:26:34 executing program 3: set_mempolicy(0x2, &(0x7f0000000000)=0x9, 0x90) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x4c032, 0xffffffffffffffff, 0x3701000000000000) 19:26:35 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)=ANY=[@ANYBLOB="300000001000070100dd2174ffff27de00000000", @ANYRES32=0x0, @ANYBLOB="000000000000000900001b00000000000500100005"], 0x30}}, 0x0) 19:26:35 executing program 2: socket(0x11, 0x0, 0x0) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x6}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000180)='/dev/hwrng\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f0000000700), 0xfce3) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0x0) [ 643.033168] nla_parse: 7 callbacks suppressed [ 643.033180] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.0'. 19:26:35 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)=ANY=[@ANYBLOB="300000001000070100dd2174ffff27de00000000", @ANYRES32=0x0, @ANYBLOB="000000000000000c00001b00000000000500100005"], 0x30}}, 0x0) 19:26:35 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xab000000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="02000000030000000400000030000f000300040000000000000000000f008ec4", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000e1f4655fe2f4655fe2f4655f000000000000040008", 0x1d, 0x4200}, {&(0x7f0000012700)="20000000d4c49a2e07", 0x9, 0x4280}], 0x0, &(0x7f0000013a00)) 19:26:35 executing program 3: set_mempolicy(0x2, &(0x7f0000000000)=0x9, 0x90) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x4c032, 0xffffffffffffffff, 0x3800000000000000) 19:26:35 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)=ANY=[@ANYBLOB="300000001000070100dd2174ffff27de00000000", @ANYRES32=0x0, @ANYBLOB="000000000000000001001b00000000000500100005"], 0x30}}, 0x0) [ 643.217755] EXT4-fs (loop5): corrupt root inode, run e2fsck [ 643.243020] EXT4-fs (loop5): mount failed [ 643.269953] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.0'. 19:26:35 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xb0020000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="02000000030000000400000030000f000300040000000000000000000f008ec4", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000e1f4655fe2f4655fe2f4655f000000000000040008", 0x1d, 0x4200}, {&(0x7f0000012700)="20000000d4c49a2e07", 0x9, 0x4280}], 0x0, &(0x7f0000013a00)) 19:26:35 executing program 3: set_mempolicy(0x2, &(0x7f0000000000)=0x9, 0x90) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x4c032, 0xffffffffffffffff, 0x3801000000000000) 19:26:35 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x90000000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="02000000030000000400000030000f000300040000000000000000000f008ec4", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000e1f4655fe2f4655fe2f4655f00000000000004", 0x1b, 0x4200}, {&(0x7f0000012700)="20000000d4c49a2e07", 0x9, 0x4280}], 0x0, &(0x7f0000013a00)) 19:26:35 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)=ANY=[@ANYBLOB="300000001000070100dd2174ffff27de00000000", @ANYRES32=0x0, @ANYBLOB="000000000000000002001b00000000000500100005"], 0x30}}, 0x0) 19:26:35 executing program 3: set_mempolicy(0x2, &(0x7f0000000000)=0x9, 0x90) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x4c032, 0xffffffffffffffff, 0x3900000000000000) [ 643.498503] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.0'. 19:26:35 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)=ANY=[@ANYBLOB="300000001000070100dd2174ffff27de00000000", @ANYRES32=0x0, @ANYBLOB="000000000000000003001b00000000000500100005"], 0x30}}, 0x0) 19:26:35 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xb0030000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="02000000030000000400000030000f000300040000000000000000000f008ec4", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000e1f4655fe2f4655fe2f4655f000000000000040008", 0x1d, 0x4200}, {&(0x7f0000012700)="20000000d4c49a2e07", 0x9, 0x4280}], 0x0, &(0x7f0000013a00)) [ 643.621352] EXT4-fs (loop5): corrupt root inode, run e2fsck [ 643.650887] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.0'. [ 643.651644] EXT4-fs (loop5): mount failed 19:26:35 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)=ANY=[@ANYBLOB="300000001000070100dd2174ffff27de00000000", @ANYRES32=0x0, @ANYBLOB="000000000000000c04001b00000000000500100005"], 0x30}}, 0x0) 19:26:35 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xab010000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="02000000030000000400000030000f000300040000000000000000000f008ec4", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000e1f4655fe2f4655fe2f4655f000000000000040008", 0x1d, 0x4200}, {&(0x7f0000012700)="20000000d4c49a2e07", 0x9, 0x4280}], 0x0, &(0x7f0000013a00)) 19:26:35 executing program 3: set_mempolicy(0x2, &(0x7f0000000000)=0x9, 0x90) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x4c032, 0xffffffffffffffff, 0x3901000000000000) 19:26:35 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xb1000000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="02000000030000000400000030000f000300040000000000000000000f008ec4", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000e1f4655fe2f4655fe2f4655f000000000000040008", 0x1d, 0x4200}, {&(0x7f0000012700)="20000000d4c49a2e07", 0x9, 0x4280}], 0x0, &(0x7f0000013a00)) [ 643.758795] netlink: 'syz-executor.0': attribute type 27 has an invalid length. 19:26:35 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)=ANY=[@ANYBLOB="300000001000070100dd2174ffff27de00000000", @ANYRES32=0x0, @ANYBLOB="000000000000000e04001b00000000000500100005"], 0x30}}, 0x0) 19:26:35 executing program 3: set_mempolicy(0x2, &(0x7f0000000000)=0x9, 0x90) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x4c032, 0xffffffffffffffff, 0x3a00000000000000) 19:26:35 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xab020000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="02000000030000000400000030000f000300040000000000000000000f008ec4", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000e1f4655fe2f4655fe2f4655f000000000000040008", 0x1d, 0x4200}, {&(0x7f0000012700)="20000000d4c49a2e07", 0x9, 0x4280}], 0x0, &(0x7f0000013a00)) [ 643.888036] EXT4-fs (loop5): corrupt root inode, run e2fsck [ 643.907812] EXT4-fs (loop5): mount failed [ 643.913575] netlink: 'syz-executor.0': attribute type 27 has an invalid length. 19:26:36 executing program 2: openat$kvm(0xffffffffffffff9c, 0x0, 0xc000, 0x0) r0 = socket$vsock_stream(0x28, 0x1, 0x0) r1 = dup(r0) connect$vsock_stream(r1, &(0x7f0000000000)={0x28, 0x0, 0x0, @my=0x0}, 0x10) ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) perf_event_open(&(0x7f0000000300)={0x2, 0x24, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff, 0x1, @perf_config_ext, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8, 0x220}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000180)='/dev/hwrng\x00', 0x0, 0x0) read$FUSE(r2, &(0x7f0000000700), 0xfce3) r3 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_stream(r3, &(0x7f0000000040)={0x28, 0x0, 0x1, @host}, 0x10) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x5, &(0x7f0000000080)=0xfffff800, 0x4) r4 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000800)='/dev/loop-control\x00', 0x0, 0x0) r5 = ioctl$LOOP_CTL_GET_FREE(r4, 0x4c82) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, r5) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r5) 19:26:36 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x90010000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="02000000030000000400000030000f000300040000000000000000000f008ec4", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000e1f4655fe2f4655fe2f4655f00000000000004", 0x1b, 0x4200}, {&(0x7f0000012700)="20000000d4c49a2e07", 0x9, 0x4280}], 0x0, &(0x7f0000013a00)) 19:26:36 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)=ANY=[@ANYBLOB="300000001000070100dd2174ffff27de00000000", @ANYRES32=0x0, @ANYBLOB="000000000000000005001b00000000000500100005"], 0x30}}, 0x0) 19:26:36 executing program 3: set_mempolicy(0x2, &(0x7f0000000000)=0x9, 0x90) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x4c032, 0xffffffffffffffff, 0x3a01000000000000) 19:26:36 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xb1010000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="02000000030000000400000030000f000300040000000000000000000f008ec4", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000e1f4655fe2f4655fe2f4655f000000000000040008", 0x1d, 0x4200}, {&(0x7f0000012700)="20000000d4c49a2e07", 0x9, 0x4280}], 0x0, &(0x7f0000013a00)) [ 643.991179] netlink: 'syz-executor.0': attribute type 27 has an invalid length. 19:26:36 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)=ANY=[@ANYBLOB="300000001000070100dd2174ffff27de00000000", @ANYRES32=0x0, @ANYBLOB="000000000000000007001b00000000000500100005"], 0x30}}, 0x0) 19:26:36 executing program 3: set_mempolicy(0x2, &(0x7f0000000000)=0x9, 0x90) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x4c032, 0xffffffffffffffff, 0x3b00000000000000) 19:26:36 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)=ANY=[@ANYBLOB="300000001000070100dd2174ffff27de00000000", @ANYRES32=0x0, @ANYBLOB="000000000002000008001b00000000000500100005"], 0x30}}, 0x0) 19:26:36 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)=ANY=[@ANYBLOB="300000001000070100dd2174ffff27de00000000", @ANYRES32=0x0, @ANYBLOB="000000000003000008001b00000000000500100005"], 0x30}}, 0x0) [ 644.095821] netlink: 'syz-executor.0': attribute type 27 has an invalid length. 19:26:36 executing program 2: socket(0x11, 0x0, 0x0) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000180)='/dev/hwrng\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f0000000700), 0xfce3) r1 = socket$vsock_stream(0x28, 0x1, 0x0) r2 = dup(r1) connect$vsock_stream(r2, &(0x7f0000000000)={0x28, 0x0, 0x0, @my=0x0}, 0x10) r3 = socket$vsock_stream(0x28, 0x1, 0x0) r4 = dup(r3) connect$vsock_stream(r4, &(0x7f0000000000)={0x28, 0x0, 0x0, @my=0x0}, 0x10) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) ioctl$LOOP_CTL_ADD(r4, 0x4c80, 0x1) r5 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000000)='/dev/cuse\x00', 0x2, 0x0) read$FUSE(r5, &(0x7f0000002740)={0x2020}, 0x2020) 19:26:36 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xb1020000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="02000000030000000400000030000f000300040000000000000000000f008ec4", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000e1f4655fe2f4655fe2f4655f000000000000040008", 0x1d, 0x4200}, {&(0x7f0000012700)="20000000d4c49a2e07", 0x9, 0x4280}], 0x0, &(0x7f0000013a00)) [ 644.177211] EXT4-fs (loop5): corrupt root inode, run e2fsck [ 644.200863] EXT4-fs (loop5): mount failed 19:26:36 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xab030000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="02000000030000000400000030000f000300040000000000000000000f008ec4", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000e1f4655fe2f4655fe2f4655f000000000000040008", 0x1d, 0x4200}, {&(0x7f0000012700)="20000000d4c49a2e07", 0x9, 0x4280}], 0x0, &(0x7f0000013a00)) 19:26:36 executing program 3: set_mempolicy(0x2, &(0x7f0000000000)=0x9, 0x90) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x4c032, 0xffffffffffffffff, 0x3b01000000000000) [ 644.378734] EXT4-fs (loop5): corrupt root inode, run e2fsck [ 644.394323] EXT4-fs (loop5): mount failed 19:26:36 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x90020000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="02000000030000000400000030000f000300040000000000000000000f008ec4", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000e1f4655fe2f4655fe2f4655f00000000000004", 0x1b, 0x4200}, {&(0x7f0000012700)="20000000d4c49a2e07", 0x9, 0x4280}], 0x0, &(0x7f0000013a00)) 19:26:36 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)=ANY=[@ANYBLOB="300000001000070100dd2174ffff27de00000000", @ANYRES32=0x0, @ANYBLOB="000000000004000008001b00000000000500100005"], 0x30}}, 0x0) 19:26:36 executing program 3: set_mempolicy(0x2, &(0x7f0000000000)=0x9, 0x90) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x4c032, 0xffffffffffffffff, 0x3c00000000000000) 19:26:36 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xb1030000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="02000000030000000400000030000f000300040000000000000000000f008ec4", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000e1f4655fe2f4655fe2f4655f000000000000040008", 0x1d, 0x4200}, {&(0x7f0000012700)="20000000d4c49a2e07", 0x9, 0x4280}], 0x0, &(0x7f0000013a00)) 19:26:36 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xac000000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="02000000030000000400000030000f000300040000000000000000000f008ec4", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000e1f4655fe2f4655fe2f4655f000000000000040008", 0x1d, 0x4200}, {&(0x7f0000012700)="20000000d4c49a2e07", 0x9, 0x4280}], 0x0, &(0x7f0000013a00)) 19:26:36 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)=ANY=[@ANYBLOB="300000001000070100dd2174ffff27de00000000", @ANYRES32=0x0, @ANYBLOB="000000000005000008001b00000000000500100005"], 0x30}}, 0x0) 19:26:36 executing program 3: set_mempolicy(0x2, &(0x7f0000000000)=0x9, 0x90) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x4c032, 0xffffffffffffffff, 0x3c01000000000000) 19:26:36 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)=ANY=[@ANYBLOB="300000001000070100dd2174ffff27de00000000", @ANYRES32=0x0, @ANYBLOB="000000000006000008001b00000000000500100005"], 0x30}}, 0x0) [ 644.702527] EXT4-fs (loop5): corrupt root inode, run e2fsck [ 644.715406] EXT4-fs (loop5): mount failed 19:26:36 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xb2000000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="02000000030000000400000030000f000300040000000000000000000f008ec4", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000e1f4655fe2f4655fe2f4655f000000000000040008", 0x1d, 0x4200}, {&(0x7f0000012700)="20000000d4c49a2e07", 0x9, 0x4280}], 0x0, &(0x7f0000013a00)) 19:26:36 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)=ANY=[@ANYBLOB="300000001000070100dd2174ffff27de00000000", @ANYRES32=0x0, @ANYBLOB="000000000007000008001b00000000000500100005"], 0x30}}, 0x0) 19:26:36 executing program 3: set_mempolicy(0x2, &(0x7f0000000000)=0x9, 0x90) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x4c032, 0xffffffffffffffff, 0x3d00000000000000) 19:26:36 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x90030000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="02000000030000000400000030000f000300040000000000000000000f008ec4", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000e1f4655fe2f4655fe2f4655f00000000000004", 0x1b, 0x4200}, {&(0x7f0000012700)="20000000d4c49a2e07", 0x9, 0x4280}], 0x0, &(0x7f0000013a00)) 19:26:36 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)=ANY=[@ANYBLOB="300000001000070100dd2174ffff27de00000000", @ANYRES32=0x0, @ANYBLOB="000000000008000008001b00000000000500100005"], 0x30}}, 0x0) 19:26:36 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xac010000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="02000000030000000400000030000f000300040000000000000000000f008ec4", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000e1f4655fe2f4655fe2f4655f000000000000040008", 0x1d, 0x4200}, {&(0x7f0000012700)="20000000d4c49a2e07", 0x9, 0x4280}], 0x0, &(0x7f0000013a00)) 19:26:36 executing program 3: set_mempolicy(0x2, &(0x7f0000000000)=0x9, 0x90) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x4c032, 0xffffffffffffffff, 0x3d01000000000000) 19:26:36 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xb2010000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="02000000030000000400000030000f000300040000000000000000000f008ec4", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000e1f4655fe2f4655fe2f4655f000000000000040008", 0x1d, 0x4200}, {&(0x7f0000012700)="20000000d4c49a2e07", 0x9, 0x4280}], 0x0, &(0x7f0000013a00)) [ 644.894260] EXT4-fs (loop5): corrupt root inode, run e2fsck [ 644.913651] EXT4-fs (loop5): mount failed 19:26:37 executing program 3: set_mempolicy(0x2, &(0x7f0000000000)=0x9, 0x90) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x4c032, 0xffffffffffffffff, 0x3e00000000000000) 19:26:37 executing program 2: socket(0x11, 0x0, 0x0) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000180)='/dev/hwrng\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f0000000700), 0xfce3) read$FUSE(r0, &(0x7f0000004740)={0x2020, 0x0, 0x0, 0x0}, 0x2020) write$FUSE_INIT(r0, &(0x7f0000000600)={0x50, 0x0, r1, {0x7, 0x20, 0x4a, 0x2000000, 0xfffb, 0x3, 0x9a11, 0x3}}, 0x50) r3 = perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x8}, 0x1496d, 0x0, 0x0, 0x7, 0x0, 0x0, 0x88}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open$cgroup(&(0x7f0000000280)={0x2, 0x70, 0x3, 0x80, 0x81, 0x2, 0x0, 0x9, 0x6c2, 0xb, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x5, 0x4, @perf_bp={&(0x7f0000000180), 0x6}, 0x41840, 0x40, 0xffffffff, 0x6, 0xf26d, 0x7, 0x3}, 0xffffffffffffffff, 0xffffffffffffffff, r3, 0x9) r4 = socket$vsock_stream(0x28, 0x1, 0x0) r5 = dup(r4) connect$vsock_stream(r5, &(0x7f0000000000)={0x28, 0x0, 0x0, @my=0x0}, 0x10) r6 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080)='/dev/fuse\x00', 0x42, 0x0) mount$fuse(0x0, &(0x7f00000020c0)='./file0\x00', &(0x7f0000002100)='fuse\x00', 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB='\x00\x00\x00', @ANYRESHEX=r6, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) read$FUSE(r6, &(0x7f00000077c0)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_INIT(r6, &(0x7f0000000080)={0x50, 0x0, r7, {0x7, 0x1f, 0x0, 0x110008}}, 0x50) getresgid(&(0x7f0000000100), &(0x7f0000000680)=0x0, &(0x7f00000006c0)) write$FUSE_ENTRY(r5, &(0x7f0000006780)={0x90, 0x0, r7, {0x0, 0x3, 0x347b3d67, 0xfffffffffffffff9, 0x3f, 0x5, {0x1, 0x9, 0x80000001, 0xffffffffffffff01, 0x10001, 0xfffffffffffffff7, 0x35c, 0xc, 0x8, 0x1000, 0x5, r2, r8, 0xb0ba, 0xbe}}}, 0x90) ioctl$INCFS_IOC_FILL_BLOCKS(r3, 0x80106720, &(0x7f00000005c0)={0xa, &(0x7f0000000480)=[{0x68000000, 0xe2, &(0x7f0000000000)="8aa6fbe5106bb1415b42dc4a96567bb045512ae7a01db4b0da2e8cc9e87e30b741ad64498867e8163dab1273cffd36ee565e0b139b702fd40cf3fdd2b13545e97325b62f1d5721c4624e8a2bdf088e0e48f9a99853552abaa618b925f5aa7ee794e298ad4f750085e41e0a79665970e0e2dccdd87afdc9a8d2f33f2c93323beab1b757b80f33450a972506f1f4e4cadbe33adc94030062c2a4b05eadd19e665676120c9b67982ad117f99727f4006ca9f71c7e4873aa74f79a3862c4e80012186ff231f24a85d1b406a75ba1a73326e1a389a37c635899328b0e2393bd83039ec06e", 0x1}, {0x1, 0x0, &(0x7f0000000100), 0x1}, {0x7, 0x1, &(0x7f0000000140)='V', 0x0, 0x1}, {0x1f, 0x9e, &(0x7f00000001c0)="72a7bfc9002a65aab2c41f61ddb909093b21ed081d593d2ea0399ff81996984495f9bef638ed9210b819d59d611cf9edd3823301a1b463d6ba56bd71d3d6f21f42b6c145759abf8b4d551095348f4671413d305f1c8406fdf45fc3f78c76d6c4f857fe4df38df5458103f1d7a27a2a4b9b68594c66f9684e3652986de71976b02db4f4ce06d034218a09a92580d7b2e6cd413d9d970093093b79cb78c6e4", 0x0, 0x1}, {0x63ddd2e9, 0x20, &(0x7f0000000280)="c4da819b46b6c27e2421801a318c3b4c42027f3270b668b3654496437553a389", 0x1}, {0xde0, 0x1000, &(0x7f0000002740)="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", 0x1}, {0x8, 0x1000, &(0x7f0000003740)="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", 0x1}, {0x4, 0x2c, &(0x7f00000002c0)="05873fad67188454e0f5539cd992d5fe4cd8ef9c5ca4dc6e20e292d8a094a52f1735becfd38543f71d3cc137", 0x1}, {0x7f, 0x62, &(0x7f0000000380)="34b2555bb11066ceb1793162aea9e4d60ae622ea4cde1cdefb2565788b62c7775ff94a778df7714a7780f81892bdbdae1e49015b9c4e4149784d89b5c9b2f8bd149db7ffffda3c61c61d5b6dd87e9b190896cb523e066a06a4557a520b0f3d07053a", 0x1, 0x1}, {0x0, 0x6b, &(0x7f0000000400)="a83bff03829ce0dfcad8d1dddbb0c5bc14ba2ab2e2f9a2eaf538943d3f18678523f4b5f6aabec09b53164d2f922193853232f8e2c1dc2d6ca2b7d67888c67dac7ded99ac0023786a34731e0b3177221400a20e87e39e26e952765f214ec641bf94618db7ffea4dc4dbf7c2", 0x1, 0x1}]}) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0x0) 19:26:37 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)=ANY=[@ANYBLOB="300000001000070100dd2174ffff27de00000000", @ANYRES32=0x0, @ANYBLOB="000000000009000008001b00000000000500100005"], 0x30}}, 0x0) 19:26:37 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)=ANY=[@ANYBLOB="300000001000070100dd2174ffff27de00000000", @ANYRES32=0x0, @ANYBLOB="00000000000a000008001b00000000000500100005"], 0x30}}, 0x0) 19:26:37 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)=ANY=[@ANYBLOB="300000001000070100dd2174ffff27de00000000", @ANYRES32=0x0, @ANYBLOB="00000000000c000008001b00000000000500100005"], 0x30}}, 0x0) [ 645.100168] EXT4-fs: failed to create workqueue [ 645.110532] EXT4-fs (loop5): mount failed 19:26:37 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x91000000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="02000000030000000400000030000f000300040000000000000000000f008ec4", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000e1f4655fe2f4655fe2f4655f00000000000004", 0x1b, 0x4200}, {&(0x7f0000012700)="20000000d4c49a2e07", 0x9, 0x4280}], 0x0, &(0x7f0000013a00)) 19:26:37 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xac020000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="02000000030000000400000030000f000300040000000000000000000f008ec4", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000e1f4655fe2f4655fe2f4655f000000000000040008", 0x1d, 0x4200}, {&(0x7f0000012700)="20000000d4c49a2e07", 0x9, 0x4280}], 0x0, &(0x7f0000013a00)) 19:26:37 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)=ANY=[@ANYBLOB="300000001000070100dd2174ffff27de00000000", @ANYRES32=0x0, @ANYBLOB="00000000000e000008001b00000000000500100005"], 0x30}}, 0x0) 19:26:37 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x91010000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="02000000030000000400000030000f000300040000000000000000000f008ec4", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000e1f4655fe2f4655fe2f4655f00000000000004", 0x1b, 0x4200}, {&(0x7f0000012700)="20000000d4c49a2e07", 0x9, 0x4280}], 0x0, &(0x7f0000013a00)) 19:26:37 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xb2020000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="02000000030000000400000030000f000300040000000000000000000f008ec4", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000e1f4655fe2f4655fe2f4655f000000000000040008", 0x1d, 0x4200}, {&(0x7f0000012700)="20000000d4c49a2e07", 0x9, 0x4280}], 0x0, &(0x7f0000013a00)) 19:26:37 executing program 3: set_mempolicy(0x2, &(0x7f0000000000)=0x9, 0x90) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x4c032, 0xffffffffffffffff, 0x3e01000000000000) 19:26:37 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)=ANY=[@ANYBLOB="300000001000070100dd2174ffff27de00000000", @ANYRES32=0x0, @ANYBLOB="000000000010000008001b00000000000500100005"], 0x30}}, 0x0) 19:26:37 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)=ANY=[@ANYBLOB="300000001000070100dd2174ffff27de00000000", @ANYRES32=0x0, @ANYBLOB="000000000060000008001b00000000000500100005"], 0x30}}, 0x0) [ 645.446410] EXT4-fs (loop5): corrupt root inode, run e2fsck [ 645.478667] EXT4-fs (loop5): mount failed 19:26:37 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xac030000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="02000000030000000400000030000f000300040000000000000000000f008ec4", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000e1f4655fe2f4655fe2f4655f000000000000040008", 0x1d, 0x4200}, {&(0x7f0000012700)="20000000d4c49a2e07", 0x9, 0x4280}], 0x0, &(0x7f0000013a00)) 19:26:37 executing program 3: set_mempolicy(0x2, &(0x7f0000000000)=0x9, 0x90) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x4c032, 0xffffffffffffffff, 0x3f00000000000000) 19:26:37 executing program 2: socket(0x11, 0x0, 0x0) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x7f, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x40000000, 0xffffffffffffffff, 0x0) write(r0, &(0x7f0000000200)="c20afca7", 0x4) perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x2, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x7, 0x0, 0xfffffffd}, 0x0, 0xffffffffffffffff, r0, 0x0) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000180)='/dev/hwrng\x00', 0x0, 0x0) read$FUSE(r1, &(0x7f0000000700), 0xfce3) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0x0) [ 645.540462] EXT4-fs (loop5): corrupt root inode, run e2fsck [ 645.546526] EXT4-fs (loop5): mount failed 19:26:37 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x91020000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="02000000030000000400000030000f000300040000000000000000000f008ec4", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000e1f4655fe2f4655fe2f4655f00000000000004", 0x1b, 0x4200}, {&(0x7f0000012700)="20000000d4c49a2e07", 0x9, 0x4280}], 0x0, &(0x7f0000013a00)) 19:26:37 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)=ANY=[@ANYBLOB="300000001000070100dd2174ffff27de00000000", @ANYRES32=0x0, @ANYBLOB="0000000000f0000008001b00000000000500100005"], 0x30}}, 0x0) 19:26:37 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xb2030000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="02000000030000000400000030000f000300040000000000000000000f008ec4", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000e1f4655fe2f4655fe2f4655f000000000000040008", 0x1d, 0x4200}, {&(0x7f0000012700)="20000000d4c49a2e07", 0x9, 0x4280}], 0x0, &(0x7f0000013a00)) 19:26:37 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xad000000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="02000000030000000400000030000f000300040000000000000000000f008ec4", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000e1f4655fe2f4655fe2f4655f000000000000040008", 0x1d, 0x4200}, {&(0x7f0000012700)="20000000d4c49a2e07", 0x9, 0x4280}], 0x0, &(0x7f0000013a00)) 19:26:37 executing program 3: set_mempolicy(0x2, &(0x7f0000000000)=0x9, 0x90) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x4c032, 0xffffffffffffffff, 0x3f01000000000000) 19:26:37 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)=ANY=[@ANYBLOB="300000001000070100dd2174ffff27de00000000", @ANYRES32=0x0, @ANYBLOB="000000000000030008001b00000000000500100005"], 0x30}}, 0x0) 19:26:37 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)=ANY=[@ANYBLOB="300000001000070100dd2174ffff27de00000000", @ANYRES32=0x0, @ANYBLOB="000000000000050008001b00000000000500100005"], 0x30}}, 0x0) 19:26:37 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)=ANY=[@ANYBLOB="300000001000070100dd2174ffff27de00000000", @ANYRES32=0x0, @ANYBLOB="000000000000060008001b00000000000500100005"], 0x30}}, 0x0) 19:26:37 executing program 2: socket(0x11, 0x0, 0x0) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000180)='/dev/hwrng\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f0000000700), 0xfce3) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0x0) r1 = perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x8}, 0x1496d, 0x0, 0x0, 0x7, 0x0, 0x0, 0x88}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open$cgroup(&(0x7f0000000280)={0x2, 0x70, 0x3, 0x80, 0x81, 0x2, 0x0, 0x9, 0x6c2, 0xb, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x5, 0x4, @perf_bp={&(0x7f0000000180), 0x6}, 0x41840, 0x40, 0xffffffff, 0x6, 0xf26d, 0x7, 0x3}, 0xffffffffffffffff, 0xffffffffffffffff, r1, 0x9) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x2400, 0x200) 19:26:37 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)=ANY=[@ANYBLOB="300000001000070100dd2174ffff27de00000000", @ANYRES32=0x0, @ANYBLOB="000000000000070008001b00000000000500100005"], 0x30}}, 0x0) [ 645.868178] EXT4-fs (loop5): corrupt root inode, run e2fsck [ 645.901045] EXT4-fs (loop5): mount failed 19:26:38 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x91030000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="02000000030000000400000030000f000300040000000000000000000f008ec4", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000e1f4655fe2f4655fe2f4655f00000000000004", 0x1b, 0x4200}, {&(0x7f0000012700)="20000000d4c49a2e07", 0x9, 0x4280}], 0x0, &(0x7f0000013a00)) 19:26:38 executing program 3: set_mempolicy(0x2, &(0x7f0000000000)=0x9, 0x90) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x4c032, 0xffffffffffffffff, 0x4000000000000000) 19:26:38 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)=ANY=[@ANYBLOB="300000001000070100dd2174ffff27de00000000", @ANYRES32=0x0, @ANYBLOB="000000000000090008001b00000000000500100005"], 0x30}}, 0x0) 19:26:38 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xad010000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="02000000030000000400000030000f000300040000000000000000000f008ec4", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000e1f4655fe2f4655fe2f4655f000000000000040008", 0x1d, 0x4200}, {&(0x7f0000012700)="20000000d4c49a2e07", 0x9, 0x4280}], 0x0, &(0x7f0000013a00)) 19:26:38 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xb3000000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="02000000030000000400000030000f000300040000000000000000000f008ec4", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000e1f4655fe2f4655fe2f4655f000000000000040008", 0x1d, 0x4200}, {&(0x7f0000012700)="20000000d4c49a2e07", 0x9, 0x4280}], 0x0, &(0x7f0000013a00)) 19:26:38 executing program 3: set_mempolicy(0x2, &(0x7f0000000000)=0x9, 0x90) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x4c032, 0xffffffffffffffff, 0x4001000000000000) 19:26:38 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)=ANY=[@ANYBLOB="300000001000070100dd2174ffff27de00000000", @ANYRES32=0x0, @ANYBLOB="0000000000000a0008001b00000000000500100005"], 0x30}}, 0x0) [ 646.186266] EXT4-fs (loop5): corrupt root inode, run e2fsck [ 646.214157] EXT4-fs (loop5): mount failed 19:26:38 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xad020000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="02000000030000000400000030000f000300040000000000000000000f008ec4", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000e1f4655fe2f4655fe2f4655f000000000000040008", 0x1d, 0x4200}, {&(0x7f0000012700)="20000000d4c49a2e07", 0x9, 0x4280}], 0x0, &(0x7f0000013a00)) 19:26:38 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x92000000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="02000000030000000400000030000f000300040000000000000000000f008ec4", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000e1f4655fe2f4655fe2f4655f00000000000004", 0x1b, 0x4200}, {&(0x7f0000012700)="20000000d4c49a2e07", 0x9, 0x4280}], 0x0, &(0x7f0000013a00)) 19:26:38 executing program 3: set_mempolicy(0x2, &(0x7f0000000000)=0x9, 0x90) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x4c032, 0xffffffffffffffff, 0x4100000000000000) 19:26:38 executing program 2: socket(0x11, 0x0, 0x0) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000180)='/dev/hwrng\x00', 0x0, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='net/anycast6\x00') read$FUSE(0xffffffffffffffff, &(0x7f0000000380)={0x2020}, 0x2020) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm_plock\x00', 0x400, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x2, 0x70, 0x81, 0xf4, 0x7f, 0x18, 0x0, 0x0, 0x8050, 0x8, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x2, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1ff, 0x5d987b82e4610a8a, @perf_config_ext={0xfff, 0xd7b}, 0x900, 0x7, 0x1, 0x2, 0x9, 0x81, 0x81}, r1, 0xf, r0, 0x6) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0x0) 19:26:38 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)=ANY=[@ANYBLOB="300000001000070100dd2174ffff27de00000000", @ANYRES32=0x0, @ANYBLOB="0000000000000c0008001b00000000000500100005"], 0x30}}, 0x0) 19:26:38 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)=ANY=[@ANYBLOB="300000001000070100dd2174ffff27de00000000", @ANYRES32=0x0, @ANYBLOB="00000000003c0d0008001b00000000000500100005"], 0x30}}, 0x0) 19:26:38 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xad030000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="02000000030000000400000030000f000300040000000000000000000f008ec4", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000e1f4655fe2f4655fe2f4655f000000000000040008", 0x1d, 0x4200}, {&(0x7f0000012700)="20000000d4c49a2e07", 0x9, 0x4280}], 0x0, &(0x7f0000013a00)) 19:26:38 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xb3010000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="02000000030000000400000030000f000300040000000000000000000f008ec4", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000e1f4655fe2f4655fe2f4655f000000000000040008", 0x1d, 0x4200}, {&(0x7f0000012700)="20000000d4c49a2e07", 0x9, 0x4280}], 0x0, &(0x7f0000013a00)) 19:26:38 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)=ANY=[@ANYBLOB="300000001000070100dd2174ffff27de00000000", @ANYRES32=0x0, @ANYBLOB="0000000000000e0008001b00000000000500100005"], 0x30}}, 0x0) [ 646.504844] EXT4-fs (loop5): corrupt root inode, run e2fsck [ 646.522429] EXT4-fs (loop5): mount failed 19:26:38 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)=ANY=[@ANYBLOB="300000001000070100dd2174ffff27de00000000", @ANYRES32=0x0, @ANYBLOB="00000000000d3c0008001b00000000000500100005"], 0x30}}, 0x0) 19:26:38 executing program 3: set_mempolicy(0x2, &(0x7f0000000000)=0x9, 0x90) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x4c032, 0xffffffffffffffff, 0x4101000000000000) 19:26:38 executing program 2: socket(0x11, 0x0, 0x0) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f0000000700), 0xfce3) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0x0) 19:26:38 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xb3020000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="02000000030000000400000030000f000300040000000000000000000f008ec4", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000e1f4655fe2f4655fe2f4655f000000000000040008", 0x1d, 0x4200}, {&(0x7f0000012700)="20000000d4c49a2e07", 0x9, 0x4280}], 0x0, &(0x7f0000013a00)) 19:26:38 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x92010000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="02000000030000000400000030000f000300040000000000000000000f008ec4", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000e1f4655fe2f4655fe2f4655f00000000000004", 0x1b, 0x4200}, {&(0x7f0000012700)="20000000d4c49a2e07", 0x9, 0x4280}], 0x0, &(0x7f0000013a00)) 19:26:38 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xae000000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="02000000030000000400000030000f000300040000000000000000000f008ec4", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000e1f4655fe2f4655fe2f4655f000000000000040008", 0x1d, 0x4200}, {&(0x7f0000012700)="20000000d4c49a2e07", 0x9, 0x4280}], 0x0, &(0x7f0000013a00)) 19:26:38 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)=ANY=[@ANYBLOB="300000001000070100dd2174ffff27de00000000", @ANYRES32=0x0, @ANYBLOB="000000000065580008001b00000000000500100005"], 0x30}}, 0x0) 19:26:38 executing program 3: set_mempolicy(0x2, &(0x7f0000000000)=0x9, 0x90) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x4c032, 0xffffffffffffffff, 0x4200000000000000) 19:26:38 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)=ANY=[@ANYBLOB="300000001000070100dd2174ffff27de00000000", @ANYRES32=0x0, @ANYBLOB="000000000000600008001b00000000000500100005"], 0x30}}, 0x0) 19:26:38 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)=ANY=[@ANYBLOB="300000001000070100dd2174ffff27de00000000", @ANYRES32=0x0, @ANYBLOB="000000000058650008001b00000000000500100005"], 0x30}}, 0x0) 19:26:38 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xb3030000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="02000000030000000400000030000f000300040000000000000000000f008ec4", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000e1f4655fe2f4655fe2f4655f000000000000040008", 0x1d, 0x4200}, {&(0x7f0000012700)="20000000d4c49a2e07", 0x9, 0x4280}], 0x0, &(0x7f0000013a00)) 19:26:38 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xae010000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="02000000030000000400000030000f000300040000000000000000000f008ec4", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000e1f4655fe2f4655fe2f4655f000000000000040008", 0x1d, 0x4200}, {&(0x7f0000012700)="20000000d4c49a2e07", 0x9, 0x4280}], 0x0, &(0x7f0000013a00)) [ 646.875174] EXT4-fs (loop5): corrupt root inode, run e2fsck [ 646.883216] EXT4-fs (loop5): mount failed 19:26:39 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)=ANY=[@ANYBLOB="300000001000070100dd2174ffff27de00000000", @ANYRES32=0x0, @ANYBLOB="000000000000810008001b00000000000500100005"], 0x30}}, 0x0) 19:26:39 executing program 3: set_mempolicy(0x2, &(0x7f0000000000)=0x9, 0x90) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x4c032, 0xffffffffffffffff, 0x4201000000000000) 19:26:39 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x92020000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="02000000030000000400000030000f000300040000000000000000000f008ec4", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000e1f4655fe2f4655fe2f4655f00000000000004", 0x1b, 0x4200}, {&(0x7f0000012700)="20000000d4c49a2e07", 0x9, 0x4280}], 0x0, &(0x7f0000013a00)) 19:26:39 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)=ANY=[@ANYBLOB="300000001000070100dd2174ffff27de00000000", @ANYRES32=0x0, @ANYBLOB="000000000000f00008001b00000000000500100005"], 0x30}}, 0x0) 19:26:39 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xb4000000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="02000000030000000400000030000f000300040000000000000000000f008ec4", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000e1f4655fe2f4655fe2f4655f000000000000040008", 0x1d, 0x4200}, {&(0x7f0000012700)="20000000d4c49a2e07", 0x9, 0x4280}], 0x0, &(0x7f0000013a00)) [ 647.133729] EXT4-fs (loop5): corrupt root inode, run e2fsck [ 647.159014] EXT4-fs (loop5): mount failed 19:26:39 executing program 3: set_mempolicy(0x2, &(0x7f0000000000)=0x9, 0x90) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x4c032, 0xffffffffffffffff, 0x4300000000000000) 19:26:39 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xae020000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="02000000030000000400000030000f000300040000000000000000000f008ec4", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000e1f4655fe2f4655fe2f4655f000000000000040008", 0x1d, 0x4200}, {&(0x7f0000012700)="20000000d4c49a2e07", 0x9, 0x4280}], 0x0, &(0x7f0000013a00)) 19:26:39 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x92030000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="02000000030000000400000030000f000300040000000000000000000f008ec4", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000e1f4655fe2f4655fe2f4655f00000000000004", 0x1b, 0x4200}, {&(0x7f0000012700)="20000000d4c49a2e07", 0x9, 0x4280}], 0x0, &(0x7f0000013a00)) 19:26:39 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)=ANY=[@ANYBLOB="300000001000070100dd2174ffff27de00000000", @ANYRES32=0x0, @ANYBLOB="000000000000000c08001b00000000000500100005"], 0x30}}, 0x0) 19:26:39 executing program 3: set_mempolicy(0x2, &(0x7f0000000000)=0x9, 0x90) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x4c032, 0xffffffffffffffff, 0x4301000000000000) 19:26:39 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)=ANY=[@ANYBLOB="300000001000070100dd2174ffff27de00000000", @ANYRES32=0x0, @ANYBLOB="000000000000000e08001b00000000000500100005"], 0x30}}, 0x0) 19:26:39 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xb4010000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="02000000030000000400000030000f000300040000000000000000000f008ec4", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000e1f4655fe2f4655fe2f4655f000000000000040008", 0x1d, 0x4200}, {&(0x7f0000012700)="20000000d4c49a2e07", 0x9, 0x4280}], 0x0, &(0x7f0000013a00)) 19:26:39 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)=ANY=[@ANYBLOB="300000001000070100dd2174ffff27de00000000", @ANYRES32=0x0, @ANYBLOB="000000000000000c0c001b00000000000500100005"], 0x30}}, 0x0) 19:26:39 executing program 3: set_mempolicy(0x2, &(0x7f0000000000)=0x9, 0x90) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x4c032, 0xffffffffffffffff, 0x4400000000000000) 19:26:39 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xae030000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="02000000030000000400000030000f000300040000000000000000000f008ec4", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000e1f4655fe2f4655fe2f4655f000000000000040008", 0x1d, 0x4200}, {&(0x7f0000012700)="20000000d4c49a2e07", 0x9, 0x4280}], 0x0, &(0x7f0000013a00)) [ 647.489323] EXT4-fs (loop5): corrupt root inode, run e2fsck [ 647.526310] EXT4-fs (loop5): mount failed 19:26:39 executing program 2: socket(0x11, 0x0, 0x0) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000180)='/dev/hwrng\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0xfce3) syz_fuse_handle_req(0xffffffffffffffff, &(0x7f0000000440)="32790bfd6a0178f368fe052d860ad6b1629ff80d48935eb038f49e064b84710fd487a57f8cfe882c27445b8cba117e80a1e95da52662ba05f51779f833a0b439950a843402a272fe5241dc259f596687d851a9c70481d8e95803cd39671fece0ef64766de9e716322b8c977a1ecdfc27af53793f72d12b39186fbb5655719ceb97056b08dc2873b51458e4ee721c621b97f80d3f9489f5773f72ae6b711d68ebe598d9b49f5ac987f8e1448038076907543888a48dfd25a413198773f74cdb12f0e79a220096a6ab2e53faeb08ba2ce04fdcca2af9cc41264643badec075334973890574893ea9037741107f64051ac1f1a679dfcd31f413b9d4ea44cc11b2f2c5a251d53dbb6f4158123b143b4a177e930961f9863f760162a45327c82e145b911f0f625ff835c082603cc21e045cf2f1cd81324457aae48b8fbede104896e77a069af65ed3211a20915f2b78e5d0b1c52941c2700f94f628359213ef4ae73ef86c8f3bded16f3aa6b8297a9801878726988b094042b9b999e08d6a6449ff918de2a6d1e424139f3b2b743c0c3a17288f5b9842d4342b6b62d04ac4ca3d309eb0395c3e2167718f7d83abdf3b1ca414ccab471f4f7fa390078be76d5e51ada8a70d681af8d72e6c30a5c5157b41ef80e2e8b61441d74f59a277f5986353f2c08a471c36c7a26a189b4097ca2ce511c35b0367f02ced166da507cfec36320a41e826ee650b67dd2530eeab1ba2f73a7dafe0c4a2b6088ca363e3428602158ce84d69e830c0c098cded853bb207a95f6cea31be1577cd3c3d30e1b3ef6dc3ce35dd04248ae9c36afa4e5faf04ea87170f19043b2d7321c9d5e4a83c0ffc379a032bd126acc3e803fcf52e63181dc5fb49ddf07ad7cf3d81a72e45be75ff09105c0ecc171707c96ee0fdf46c477ce2c9a07aea88cd339f2909b7b523a7ddc074ac33138f9be547337ead3ff6ea1d30c409ef5a0060c0f951ca924abd13fe28fc94794218300765b1cf1d9f06063a5b795dfc214cdbec241046dbecfb1a86172c86864df1933cb48c64b1866667b4c56f8ab89786b1bfbd19aa8a49ac08e894d1f75c34b8064bf6740e4fea8808f4a03a5e7a71cb7b62300cf13fb861a3677d092a644a02c4385db4bbf75ecf4a412ef5dcc41793e1fc01e6df10a864fb283bf2d2f5efa6485420d1b37f416018f58885c0dc56e4f1bbded624cf38a47c169c7addb26bd979e8e26322e720bc775a14b52d0c8ccaadec3aea65a048552b4732218d68ec53dad004fd04086b07dd7a5cfc02298ffe5b6fb2adfa6fbbd37d8f13ca44a715e1e6a055ba4a9a16e09b8cad7139d574d600aa793e5cb33f52e634056ebd757e96df312f34f882bcc5561486af232d054b5972c01f4bafaa096a4f3aec0640a2f330ffffc34b724f2908559d40bce21e90c6c8681fee34fb4a30a5e56420c314d6a819314c962d3628e7258ca99da2a3530886ef867c993758e75aa248e16be28bc352909d3c9604cddde557feeb131b5e439b88b65633ecf6329e33ee8023e04d5b83671a821fa77290e139fe4dd65de0d2356a8e77bb4f2d964affca6ee6cabbf059990307127a544673501a29bd760d90827586c60529a7bf8de6fc0296f4bc8a6d8507d8ebdbfa5cd4a69e0bbe2702caa80c422ee5bc5a75a14992d9064e19e71fdaacfc591fc0be05a722e448e34354086a2b9ff2d626dcd227b09c0afc2199e8ae75338a175870ab2f4e4caef056651cb3d7633d4132c56025e3bdef451c5322e1a01c401cf1864d19db67f0c96f27d029097b0095f706c9c94a73cf72b9750dfbe6cc2d2be568616aee537ac37596a26bfbdfe1eb49270f212123e0bbd35b6e37bea31ca03d9342d3ff4402b8bd78e762d77829921f53f411de843904ae9bf827ec68dd9954aaf80dbea717aa920d189d11a4cbccaf5a25b3315a818e632cc8aa79dd6143572136845e44dfb1461e20658a43c0741ebbc37d7a7f73bf3a46ed36307d24d574e8ed82c2c1192ad6b88c546417804fd72398c77993fb646f57ea79c0c26f46d44ffd26096e30eb40d5c6f6ff7c35fd9bd65b7f84d54f225d2c376b8d12bfaf4e80f18854bd29d4a90dd4d213167cdf42a0a2cdbdb73901cb276a19b7e0ce451eac215c270c4deda18c06d0dc10d813998199185d837dd2af107c8a74a392e13184b43b0220e8a57264ee4c589a0c80111a6ecf2764d211a3a7c6d6637e9ba7415eaebf454e282c15461b8d836e4e250b8dcd2fda3fe6f5e9bd78abae49c8529a74f135cdc0a2cacb76041816216328cafa905c2e81bcee52ab3e64343edaf4b3d5e7ce50d3fed596ea1b4f271315ba2ab1c37f65ca276b7599afbea220478d510312c2698d9ad103d6cfa48d636a1a07131cdc03e5a26785591fa6d684bff2e0b95c971450f0dc37a5c179f17b119cdc1e4fc794f038ecdb996ec9fd11f789440e2675a8414b5db3dfa1bd31923c666edb67ed8bebb2e55f1792dbabfff2773c174740d87bde3bcb7333ad479d9c29bac0f5b3352e5a66d5c067b3cd352f98d29f28bcfca666c026b77ba8296779b9be04ab65d80d1d093f5b126480e2b164f0bd4abc1cd5542876bf5a9e39a1c0cd6ca284917c349345803827bcaac38a40ab58a7a896ca09561cb9e78127afdfc059633d3ca89d325c3fd972eae5444d49912b647eafa9453285f5163a43162a241cc3f708f1318fd1300522daf243b3534d6c85c3c36882e4e35cfb8637ccb266e14615f046a392496dfcfebb0c6afdbec5ff21da841a8f34749df7304aa2506f4d066c8df296df5408ff503b5753bf69be13a3ad0b74a17e0afcfff80cbd861545088ca1f51b0186a3a116d23a5668b14f5c5e29aea515889eeb6bf7f32b4ec99ad4dfc0d4d4e04e92b6edf46fb7e37179b8e6ff22651a9a3c9bb6662f0233ca6e2d1ead914cc9c4ec5d2308bae816c83aaf8c002201e1c617132e267afcc2f404928a077455d61f4fe0d9127e08e7df7a8efeab9ec92235d1860903cc82d724c14571052c149db86799445b24b99010440d9f405c9143a4c12e25ca85f1c45e64fffb8be281bae8d94bcc7ab9dfbd6b82ca823c571a5da4174b92a5484169bee11a9c5f03aa5d6ca25c08aad0ff1e4ddbd37ce3b1e96d5dc0711414dd7092c7b8555c4f5c4109e2dfb3012c6f2597044434d4bd61f06b763e244e774e6c0dea1b8193097733df1717b9baa218544bd71958caf52e90ed055c7245a336a4716fc46b39610f500c9ae2bd92427bb21e2f82f76bf311c5b018f35430de708053c08fc8807bef5b52f534aa65b378268c78d995a2c6eedca97ca38e1b549bf74f85a3a19c17ebd4e641dea9efd9256c74ff0c4bd363835391a293838e21b01b31a19f704234daf930f8f53939d639fb1ba9c3ea016eab92d4c470e2416dc29e724e14ef73774d799a8200d493a5ac3756b41caebc176137aa30a834e9051b79ad2a0e065bff70eb5fdedd3f073c68d281151788c3322a0c0179258add2f59b0c077b0190f2580e346ad36325cfa592aba24f21dd40bf8a1738fd7f5ed45429949b3c83b3cc6eef1c19b7b60fe41bb01c05a57a0445671fa18c3741340f16ecbba2c1e2e491198c1d95a015a2e510e3463366fe546bd7c9e858038d9eedde4cc226b35ef855d89f019b817438f873130ea12d433768cef91da5cf234a27271fe3cd180653698e2f0624d1dba6155ab03a99fe101ca4bbc005d852c49a0e30474360fd3eb0ca73764a124598078fdd8938caa5a856f649af4936c93ab9f68d96dc58ad6e19792ba7457c12193eafc56d966acfda1f096782f40b2962efa0da26f2b5b47a6b6306c3857f9118147680e025827b80cb2fac992203064e642d4bf3ff7425a898def46c7c568136ae502e8e9c104854f596cb6c38807dc5bfce1ec1d891e23eea8b68db28a4cdaa370a7240005cc7e4b7794e04c95d8e70d06478324c0a175f3ff4701ce66ba207cbe11f18d1896ff9a12fafa061e99cc166f0cc1a0fb1c8ccb35a2ff858164343a065e027cd0669f0aace74df56658dd66bbdef33e1a0594673cedbfcfa8f116add7bbc6bcd655294b5b6528d0f5bfc0625d98fa1c726d0a1b63d99cc99b3f43bf8c1c9622a4b9063fdf1d6ce77c9478895fe87e2c541c73da015ebfeceac817f95f188f65e59e1f79a8866f64f0fb4f3ce886f3a65e0a4d9ab9db6b5f701e5b8607207a166e38a61a093983fedbea7d9fa2f7833fa4f797fa418df3f98a156a9ebc7ccfdbe9ba2c5bf739821b8b354b54d7a8a15b38d6f4f9c7a7e5514688db6f01a91842d2a5ccdf050aee37e33281c4a98b21d12a13d3da4ae77f3f2a7217ef4a6e1a0439d72938262a5402488c44feac17c1b205c9af0fbf92de40b355cc2811c8377bc5ee3960d72d437215585a217f49f84c2f99a1dcd19ad80f90e1b9dca876e0b39871a5d8beade8d7921c05569f458781e9f484725cf326012bf71aeeb46bcc5e53e25350d9df78214ad319319c71e8b88dd9a88c9d680e86a094d708109018683e284fe966f0ef9949ddfdb96cd016cb36660456118b76d2b10eb5b19294899c45400c18e676dbc8e49d68fc6a0b94b1254223b3c2409e2422346bf59d7b8b10eafe7d075fdc8287661ec00a0696e99465bf9cc4eeb2add9dcadc936502e8108073577e48f3fd62603ddb6d67da319449d1a4b831072424631f4b4c82db88d79f9e32085d4137aa0708e595ac309ae11479460b7286df1196b5bf62a00950183b68a19087b765667488fb1c90afde6c09ae8dce21764dfcebff0fccac9a449fe18aee41970b1e66ee778efc0232b9aa0550e65a520bf7c4e91b299c46891d3a017e98f966c56f9459bf70e8afb760cc77ae0ad89f3d865f9867e0d1f909eedb91f2de45473eb5d74df7dfb92e604cf326dd28f8bd725c0978b5f8ad475338dec205fb15fbc395b6c91717112498db1fc0a505b6ff2833f7707285cf519002e396a2c8202d12f281bb99abecadd1ba7df2c5ed97e651fc86d4f7d18202296fbcf338539444a5d169ed42ceab2bc44d4e01355d030bffa9f46455f64bef6f8ba877c443555bd94701d30af9457bfb1f7327191dd6113c70d05b5da2c16d792e497cc74ef58f0ab887d4fb6b0ced3a2f03959ab84e0af61c79df024ffb2732340b96667c8e2ec069cc20040b5a655ea767311eb882f00f0f111e1ff68392f3e30d4777e478bcf75c2c4dbd6b045db2a43d869c7f84f294b97ad9a67201f5232f2d1b6b44184b6364a7a52e0a08d6888eb1d53c009b5ef4bfaee569959a309c6b868a413ab4e39bffc53b491b62a1afdb476e1a5d20d53e23b8663ac60257e15eb04de5ea1344f6aa5894a2059f86602b9bc1313b81f6bdfb6c8af90a3cf5bf683e5087c473f6f54b8114a4c3784f03961313537db4ad0c02fc8ad8add7d4745e11a211f6eb6a69bc284e4ad5ccec98ba9e0ca9ff8f7955bb892529ca431d24ac1e231ef983d3e954e732476e433acc1274a576838de0a9e85652b19ed01fc55abf86fd08f13208687cb7aa7fa7c568c67ddd3b2ead9552e4cceb7b409e25ee3646f5732715c427b90619f3a5a2b43dd4f7768d8366ff8c18e2d20d101b1dbddadfa6382cf73c57fb2df3d4b312a1c39f38cba939658e996050a6a4fab6932b28603cb37d97a67d6b9e26746597dcfa3660d7609b8cc0db50e8e064e551ebbed9dcc5f713b3f644c28d67e71365c9b8add66e58be7940cb4642b085840ea9753bbd8e9f7682c0bc8539546aa2389d42a29f1b898081e6530ec4471d521adb77e258291e69697842b2cc13a1e9c270af841ec6a7c8f6039e612caac40a275cef8c4140c4ca2c927be76722d1066824c792aed400a6efe5c06029ef13c9707c9a7905acf90ad823b213d5a9115cba945d135bf4e3f014f0dbfcdcc2ade65f1741014e4220807a76dc54c7d7d4b0cc8935616d501349484245080463ccc5031be28751ceb5830261b813fdde4d09fd454cb1606a5e7637fd48c1da2033cfea44d5cf259f38275835e8659054b1ff50153a82598ef5466da6a58e79ae2cf7f88bbff78de8cbd948841cf7ae965b7933148fec5069358c0648afbfac33e9e90898e8d5c931a26109ecb572fb70ca8e6a97382710e99f2ac577706b7aa2e9f4e2c508c92cd0463e641de6283a1d627ff3baa6cf4072764f4e97abfb2906d9b431b3cf5fd1f4b0bb1decbde705dea0639097788b4d827c56c0da8dd862602d0e0c278d05f3269884ade5315184dea28c187402bd9c592abdb7d436beaeae46f9213ee27eb56debcf5a8ebd044b17a86ad2f7d1ef1de841a009d0226589e19227dde13543947c59a72d21a72c4a5bd2100fcf2e673cd8423363bc5a1e66af6d1d29c2900c485d735fa83055c579849feb85430b53ac50cdd5ccab1ab5511ba540254e5b7187ccb60b1a956fbba87d53cfac3660b76e0b7c22d8d4acffd9aba66686f0ff5f8298963cb85e43cdb370f6fc8adc2821a1626b17ffa35d0629a06b712185bfa863d46736d142e31e91ef0881d1dd0b79909d7bc2ff3f6ecf089ef2c45ba284739547863a35836a2963001a3f7dfa6195ce2ab339fbd932f0a78b62bf0d05d33609dcf8ff177d6fc72ccd0265ab4eca1c117cb72a7b00e3f5a89220bd6790666ad6bac29435fa8702c240881979d0b301355d36d1c2f8efe9af1f11dfc7c274232fd2a26e3275b799886af80a4c9583e427a523398cfd91d10b5e15428c9a48240425d31a6725d02fb7880c27a176d5ebf12c4d8840843d2288277afef2d6544995dce1384c990fe28d25cc61d95aafb8d19b15fe5d5f9d741f753256db9ecdb276239e8e9490e89ade16b5a3abd3a25fc9e10ece39f1102dfdf730d14160ab4db0d999c34de808ed5adb9fcb866c081937591ac4dd76c15cbcbed7011d91d489626c66c4571c371d55640835d8eb9ee4ecdac38c82d543165d5cf922c866d02ad7608bcd16a15c2e716219cd46452ce42fa907ce7697e8ea6a16c1f53ab407f6fc57bb1b3851292e130b1224780e5fb6ed5cfa113bd1e5b009abf4b9cd39308505e61844ce80dff5b85f72a277404db1a59c397348c04e29f9b578f421c9ab871ac029d11ebe5f26afbdea3dc69f57e48d3ee38afeadd47ece0e813d5693e58b59ecfba8170d88784a30824de6c4b56231d77ceb187efe99c41f4daa530eae44352b32432ff48bd7cff185322609f5fa9ac867023aeeaf4f4a4b33df663bdfeabd3d30b6fe9fb699a29dd2c6244cb457ae8ebf567e689d59f9001bb519e1ed9fe5ed64256a4d2279da107e83477e594294de8f4f99041c00b90bca9f26c83b217d73178bdad6a306874459840ef088719d32787b6073a775dedce33b52f5ed90b896dfd90159a67ac972a8a3d2363da894782aaa5aa72031bd05cf6dd6fc71f4fe63972fa4960b48c023db72b42edefeafb920042df17187712b0e8fb84a86579e9e9b50f0a8977af70c1b1442fbe5bcf3c1eaa4d202b3f7c8d07b41ce2cfa3eaf4fc3197575a0a6cf4617fb0e09952ae880cece90f6e727976c105a005ae7d544e435bf60d01886f4cc299a4fd6f2d5e96864cf30b1d58735e53411dc7e2e0a206de2de281b0e56d74662e5563c27d1170ac5813b3bc24eb11d8cc59c78964a249fc70bff8e4b1a8fc571e51fb99abf2b0bebb174f7b141ef0c675a120530cf66236d13d081aeea277eaf6672d92805027c31418cfaf490fdc8259ae4aa4e495b36f5c653795102416ea879a76b0f14e9d36bbd5fd2b66329a073b635a6cf9004fb3c81c681b47595c53ba84965d15edfc1f02a04e7bc6895b946a3d98459a66f2b8646b57a2ff2e98af844c4e53eb5f0966d01e8d992f181c8f155d85af2e214aedd22f5fb20c702daf4e3402dd3d79b9960feeb6b35aa42c40fd5243e9eab10f0d58d4f70ecaf770a0e87aa4e1c8d718e578e8faf0a123c7db04b63eb5e0da60339838d8fd8754520130ab12452bb3903f8d17c0c99cc555873c9794bc771be02a2dc8eb3b40c8f436b639a41ead811a18adf8afe181f39dd7fc4f3cdfddfea6d4f0bb5f0df8143744e9d54180fcb97dd25a7f27fd0e9256b5e15a252c3d53243233fe14394972ec08e49e7a901fcc80a8d642ee0d35a126d23b25b84fae4f24df8c5fa824c8073a833cb248ef9547e944ad585d2927d815054627084974ed1e74ddaf0a7ee33bcef4d55a45205e6d8d7a6e6ba6cfffecfccc64b4ab275f74cc07f7e5b9f446c742a6cc39c05f3875a3f5927ca262ceddcd248dbefc212d24b22c90594f6a3f5ce2e36b404032d3e643104f38ec0f86dca7599c6c220a5ab2c0cdf48371719f12e57820337499851cf90a80b8631879155c061d127ab62f20afc2d7e571cb359127d4381d31e76a0027cc143d365db4b689f9d6bbe72272fbc5750ebbf93751cdb5377bfabe6a3e7385f3c8fcd8b88156677962b0b821230397aab5db2f0d6a83f9840a451ca23daeff7c45e7ba38245b4ab961ac27de3268c8f068ce26a0b532f8442437bf64425e0de0f7dcdbbd42b8ceaf255c0555e5f87dba81b5724bcc9ec30c6c73ba889a9cb1338dad5f548ec0bd27a320fe29b511dde9e0a500b7f416d78366da659c75fcaa87dcf4102027e0cf7d0a27a5ba6087286b12fb98eabb2a3187a9231b120f2a44b4ccded415f49bf14d200485da99c69ea77ba7dbeb3e1f8b2ca6ebbf0d69641990ec811ca18abba2fad6a5e3a3bbd00acb3ae06b7088a7c5ab3b1ff0b82fe9b6bfb08d98cc6f61d225277b061b98790d7fa10b4b0054255771747b9cb0f98be03d5e08ab9b5a18a9b9edb9b09e449ea71d2ba1fa600dd357982475f6e3d5b34224c176a4ccd3bf0b351b9f0194bd1ed82d443122fa01189101f206cbd4604c8075e817b0a7935309f59461179c63e833fe9c57e9d3d17afdb78466dd020f63cad73aa9b281de2254a466919ff8dcbecfe531a1e6a9c67ac8a2c61db01df635bab42ccfb236581ae913a91f2913ec9adc36e68519d82861640b3052163a0149ccd6c46f25bfc2d13077afb26d90ff2d9f2164d75db850c390c6a76624e44826400d122276dad83aecefe051121e82356b1075a6766268cd626f3396051b185ec69d48dc42394d55cb526938411ddde216461800f8d82951453d6567aed902dc8a5cb88d1bd2ddfc7ef3de9685f763b958d4c0cf7a4aad3f91c9ed615336bb3da927d68eb974766ada75aa9f2b260485751a093341d95dfa9443524d866b94e5ebed6a7b8ed7b18a1268bdda283ecf26c28e30e24e0274488a84ef52cb5510e8dcfbfa75106a2939f35f683d880005a60d80b369b71c04d7a65fe98334dda6dc3a15ccebd90a0411332a4fedfbe286be262283526f6869505e0e4b68836b72fa7ad312c2425c91f610896836a8fc337f044e8b36bbf15e85dd9deb693b072db0612ccec32beb780eeb33e7a68fd9f6251021b213d96af1afbe53c945ee881b2cbd480586c69d43374a6c96d85165a341cad898e0c6fe647fdd7475854a50472196e325ed16ed741a9f6642eb4247a0a0830603937859f1682825df9ea4ef5b7c494556dc7004064f3a676ed0050e06c509e40841ff421b3b1515949b585a10ba4426a7a2ffb03b2f1fbcbf58691ee5a2658cf8b67ce3fc08fc86e3598a22c9b0632097dc7da81a1e02773ea0f110f4b706079df4d51e3e81d117d45f205db448cbcff657368adc100dc2feea17f2fb7f097f46efe6da23961326301ac25c2f07340f3933fa03bc7246f26f6305e654a6f8162bfc9513d68fae95ef4538b75ffd573ef73db79914b229442f8a6117c5fc9592cdb46cf26641b1b15097c4850fb0da3df0654a3185dbc36872f359da22f763a4cd1e5fefffa7437bbfad1353af6f178e48be9f89d095f78c26e3164a7ee642fbba82a567b004e146cc66d08a6ee1ad96287a6e5094de580976f1bc2625c78cbfebcc3fd8d168be6dfe73eb1d6dcc6251c14a7b4d98e68d7f4ed6b8353c26005d27a07b2802806d85236e326bfb70fe1d1a148859e07bfcda1d6951eddb218524ef12262be8ace7f0d992d6ad4d9edfdc9656684b8818f67cb6ff8624e22a62d50238319485715460108456acd7e76c74fad5c6976536fed00059589282f19665f288356f4b46f736453ab815cf30a1f38b3b67bf4cc9ef17d277463d5e6d7e0aa8af5abc71ba1113c7636807f4ff11627ea6bf71049a6b009f4c7a4a4436d35d9060cdb382e3e90ed0f55eccd49dca7666107bf1e61030abb167a946d3b3bda2c503b0fe0ead32e2f661ea43fbdf1211bfe66e1e759b37c8ec5c3fc6b07f0260aa01e560005331224f657ad753e20f9246b16a82101cd555464fd98e5f37a5fb318849e0cc755b030499270056d309254a3d8def43a1e7af7065b5d20c7e7602b1926d7ac208a0db78c158ac692566db015f172c7a221455c0dea1dc725782e71e959884869d2e8b170f5a96df27510a7701e86cc4a52d13b979a33c4e3c74652a76b8c2a061bde22a8b7c2143e6122d416f31508d4ebe36d6374aadcdd5383fe86159a5401ee1c377f3d5fb86293c7562de3937cc7e7d10fedf556486fe7e57516581e30717c19c1b61a9a95178450d918a638a26c8d65871d6dcb372cdb4f573fc24518094a620f1e91f09442af2b5e07c9dc4b038f1626d5779b0409072e0c62cd8d55f274c8860b1e14f778abcf2c5f4336a3bc4bba315a93f9dcfb786ddb1a5a06a2a549894035aa388fe76c6edbad1111975c30282e61be3a5e799cfc4a8f0a43ef424e8b31641f024b3b9159e7d1fe302581b1217cd35e87d73f6e551a84038e995399012c9acfc0fa9d5a843329ae2316b131c7c61d04496bcdf8478abf22aebed312a5181ebe59eac4d598e79b3d0983e9c3cda4b7b785743c80a0140679a19fc743e98c9ace4984bacb2ce9551ade1bd379a98c3fd18b725e8fe3fad9372bfa820de8d94558b2c4bf272792d17fce71906e7c1f674f42b9be7de3796c6faaed01efe1c922aecabe414c03f31dabb711a6fac789738277d77c3359a643b390e7fc24bb9c5d55e6daf51f3f187869ddd70cb27ebd5dafb26854be84c5293a8b54e24d28c997475143a992eedee2c97867a5a0049fcaca1763cbb198bf06acf20c7a7a5f8e4d05ede85faab8eaa170f1ad92cedd50f5507a0a4b61abfa0627fe456893d617c470d3b6083892b0313c349066b8fd662a23b5b464fd1dacb7b7aaea6c617211588d19b6ac605cfb638e26d8dd4e19bb737bef11d22500a21e72e93a1de78b59ca427e27daaa30c615794153c10cafe766a8956f0ce94d0632ed5347febc2b2a71d93f7df77f3764096003664d63497063891da69bf579df0e5da9d49d6e8114c72963711ad151fa7c71787fc8f54d553ddd8b9811c53a9a18a7ffc8ffb33236c6d33ada6b33897789e73068dfcd24a981b39e56b2ea944560869a5f43168434d7e834d9fcb5879d7b51dce7e247c44627528e8e1ee8fa1e9127d181b207af2331cb6e6a02e70fa088e2e8058b909124f5d819f6ff7da71ba83ed6f4126b44d86f1a57f2b60a8e0b4d3ccbba8112d", 0x2000, &(0x7f0000002f80)={&(0x7f0000000340)={0x50, 0x0, 0x2000000000000000, {0x7, 0x20, 0x80000001, 0x840180, 0x9, 0x683c, 0x2, 0x3}}, &(0x7f0000000240)={0x18, 0xfffffffffffffffe, 0x1, {0x8}}, &(0x7f00000003c0)={0x18, 0x0, 0xd96, {0x3e}}, &(0x7f0000002440)={0x18, 0x0, 0x0, {0x2}}, &(0x7f0000002480)={0x18, 0x0, 0x9, {0x1}}, &(0x7f00000024c0)={0x28, 0x0, 0x2, {{0x81, 0x101, 0x1}}}, &(0x7f0000002500)={0x60, 0x0, 0x7, {{0x3aa, 0x7ff, 0x2, 0x1000, 0x7, 0xc85, 0xfa, 0xfff}}}, &(0x7f0000002580)={0x18, 0x0, 0x8, {0x3ff}}, &(0x7f00000025c0)=ANY=[@ANYBLOB="1a0049f3619d0000f9ffffffffffffff4e4c424c5f4d474d5400"], &(0x7f0000002600)={0x20, 0x0, 0xeab}, &(0x7f0000002640)={0x78, 0xffffffffffffffda, 0x40, {0x6, 0xd23f, 0x0, {0x2, 0x40, 0x3, 0x8, 0x8, 0xfff, 0x9, 0x5, 0x4, 0x4000, 0x7, 0x0, 0xffffffffffffffff, 0x100, 0x7}}}, &(0x7f0000002780)={0x90, 0x0, 0x1, {0x5, 0x0, 0x93a, 0x3, 0x800, 0x3, {0x2, 0x80000000, 0x10001, 0x18c0, 0x4, 0x101, 0x1, 0x6, 0x4, 0x8000, 0xfffffffb, 0x0, 0x0, 0x80000000, 0x57e}}}, &(0x7f0000002840)=ANY=[@ANYBLOB="a80000000b0000000300000000000000000000000000000003000000000000000400003a06000000776730000000000004000000000000000000000000000000040000000800000077673000000000000000000000000000ff0000000000000000000000070000000300000000000000b900000000000000040000004200000077673000000000000400000000000000000000000000000004000000250d0000777de70000000000"], &(0x7f0000002fc0)=ANY=[@ANYBLOB="3003000000000000090000000000000001000000000000000300000000000000ad00000000000000020000000000000001000000f8ffffff060000000000000032feffffffffffff40000000000000002b06000000000000b5000000000000000400000000000000832c6d5705000000090000000040000005000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="01040000010000000000000001000000000000000800000000000000040000000400000077673000000000000600000000000000000000000000000040000000000000000500000000000000010400000200000001000000000000000300000000000000cb09000000000000f8ffffffffffffff0800000000000000018000000000000000080000020000000000000000c00000aa0c0000", @ANYRES32=0xee00, @ANYBLOB="b82d920b3207db763638086ff2e63ad72a19e19946d2b1f9bd7426d42cdc57bb5f1b4f15411459660854df960e95b464f8956c6f4968b1a50436f3ea6f356809c31f8e73c3ad523f8fc1bea990fcec8e3992d6304c9f6b69f5f5d7f4235f0ce4500206a29f0427e121b96e3c57bca6a9ce05ab6d831ebc4e01b516c25e86a4558be9d2a313e3a2e5ed88e03f973e5e34709d1f1dd69ac86f30", @ANYBLOB="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", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="80ae00000400000000000000060000000000000001000000000000000a000000000000002f6465762f727463300000000000000000000000000000000000000000000000f8ffffffffffffff0800000000000000000000000000008005000000000000007f00000000000000f60000000000000006000000000000000600000000000000000000000000000000000000f00f00009400000000800000ffffff7f", @ANYRES32, @ANYRES32=0x0, @ANYBLOB="13030000030000000000000002000000000000007b0000000000000000000000ceb30000040000000000000001000000000000000000000000000000070000000000000000100000fd00000000000000000000000700000000000000050000000000000002000000000000000300000000000000feffffffffffffffffffffff01800000800000000010000005000000", @ANYRES32=0x0, @ANYRESDEC, @ANYBLOB="05000000000000000000000005000000000000007f0000000000000002000000090000002b3a000000000000"], &(0x7f0000002e80)={0xa0, 0x0, 0x2, {{0x5, 0x3, 0x40, 0x3, 0x8, 0x7, {0x6, 0x7, 0x4, 0x5, 0x4, 0x4, 0x6, 0x200, 0x4, 0x1000, 0x1f, 0xee01, 0x0, 0x6}}, {0x0, 0x10}}}, &(0x7f0000002f40)={0x20, 0x0, 0x100000001, {0x3, 0x0, 0x2, 0xfff}}}) r3 = socket$unix(0x1, 0x2, 0x0) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setuid(r4) r5 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffffe}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000001, 0x0, @perf_config_ext={0x0, 0x4}, 0x0, 0x8000000}, 0x0, 0xffffffffffffffff, r5, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x6}, 0x404, 0x0, 0x0, 0x1}, 0x0, 0xff7fffffffffffff, r5, 0x2) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x800}, 0x0, 0xffffffffffffffff, r5, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x2400, 0x36) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) chown(&(0x7f0000000100)='./file0\x00', r7, r8) msgctl$IPC_SET(0x0, 0x1, &(0x7f0000000440)={{0x3, 0x0, 0x0, 0x0, r8}, 0x0, 0x0, 0x0, 0x100, 0x9}) syz_fuse_handle_req(0xffffffffffffffff, &(0x7f0000000440)="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", 0x2000, &(0x7f0000002f80)={&(0x7f0000000340)={0x50, 0x0, 0x2000000000000000, {0x7, 0x20, 0x80000001, 0x840180, 0x9, 0x683c, 0x2, 0x3}}, &(0x7f0000000240)={0x18, 0xfffffffffffffffe, 0x1, {0xc}}, &(0x7f00000003c0)={0x18, 0x0, 0xd96, {0x3e}}, &(0x7f0000002440)={0x18, 0x0, 0x0, {0x2}}, &(0x7f0000002480)={0x18, 0x0, 0x9, {0x1}}, &(0x7f00000024c0)={0x28, 0x0, 0x2, {{0x81, 0x101, 0x1, r6}}}, &(0x7f0000002500)={0x60, 0x0, 0x7, {{0x3aa, 0x7ff, 0x2, 0x1003, 0x7, 0xc85, 0xfa, 0xfff}}}, &(0x7f0000002580)={0x18, 0x0, 0x8, {0x3ff}}, &(0x7f00000025c0)=ANY=[@ANYBLOB="1a0049f3619d0000f9ffffffffffffff4e4c424c5f4d474d5400"], &(0x7f0000002600)={0x20, 0x0, 0xeab}, &(0x7f0000002640)={0x78, 0xffffffffffffffda, 0x40, {0x6, 0xd23f, 0x0, {0x2, 0x40, 0x3, 0x8, 0x8, 0xfff, 0x9, 0x5, 0x4, 0x4000, 0x7, 0x0, 0xffffffffffffffff, 0x100, 0x7}}}, &(0x7f0000002780)={0x90, 0x0, 0x1, {0x5, 0x0, 0x93a, 0x3, 0x800, 0x3, {0x2, 0x80000000, 0x10001, 0x18c0, 0x4, 0x101, 0x1, 0x6, 0x4, 0x8000, 0xffffffff, 0x0, 0x0, 0x80000000, 0x57e}}}, &(0x7f0000002840)=ANY=[@ANYBLOB="a80000000b0000000300000000000000000000000000000003000000000000000400003a06000000776730000000000004000000000000000000000000000000040000000800000077673000000000000000000000000000ff0000000000000000000000070000000300000000000000b900000000000000040000004200000077673000000000000400000000000000000000000000000004000000250d0000777de70000000000"], &(0x7f0000002fc0)=ANY=[@ANYBLOB="3003000000000000090000000000000001000000000000000300000000000000ad00000000000000020000000000000001000000f8ffffff060000000000000032feffffffffffff40000000000000002b06000000000000b5000000000000000400000000000000832c6d5705000000090000000040000005000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="01040000010000000000000001000000000000000800000000000000040000000400000077673000000000000600000000000000000000000000000040000000000000000500000000000000010400000200000001000000000000000300000000000000cb09000000000000f8ffffffffffffff0800000000000000018000000000000000080000020000000000000000c00000aa0c0000", @ANYRES32=0xee00, @ANYBLOB="b82d920b3207db763638086ff2e63ad72a19e19946d2b1f9bd7426d42cdc57bb5f1b4f15411459660854df960e95b464f8956c6f4968b1a50436f3ea6f356809c31f8e73c3ad523f8fc1bea990fcec8e3992d6304c9f6b69f5f5d7f4235f0ce4500206a29f0427e121b96e3c57bca6a9ce05ab6d831ebc4e01b516c25e86a4558be9d2a313e3a2e5ed88e03f973e5e34709d1f1dd69ac86f30", @ANYBLOB="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", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="80ae00000400000000000000060000000000000001000000000000000a000000000000002f6465762f727463300000000000000000000000000000000000000000000000f8ffffffffffffff0800000000000000000000000000008005000000000000007f00000000000000f60000000000000006000000000000000600000000000000000000000000000000000000f00f00009400000000800000ffffff7f", @ANYRES32, @ANYRES32=0x0, @ANYBLOB="13030000030000000000000002000000000000007b0000000000000000000000ceb30000040000000000000001000000000000000000000000000000070000000000000000100000fd00000000000000000000000700000000000000050000000000000002000000000000000300000000000000feffffffffffffffffffffff01800000800000000010000005000000", @ANYRES32=0x0, @ANYRESDEC=r5, @ANYBLOB="05000000000000000000000005000000000000007f0000000000000002000000090000002b3a000000000000"], &(0x7f0000002e80)={0xa0, 0x0, 0x2, {{0x5, 0x3, 0x40, 0x3, 0x8, 0x7, {0x6, 0x7, 0x4, 0x5, 0x4, 0x4, 0x6, 0x200, 0x4, 0x1000, 0x1f, 0xee01, r8, 0x6}}, {0x0, 0x10}}}, &(0x7f0000002f40)={0x20, 0x0, 0xfffffffe, {0x3, 0x0, 0x2, 0xfff}}}) syz_fuse_handle_req(0xffffffffffffffff, &(0x7f0000002740)="6096335b76c8321bb48d448c611f802d45a5b738bf058c1fe0c0d7972b2cb8ef89ee103a25995f36b3c5c8dbc73e46448ff29621d9ae350f6ed9f24b5fbe0c391a8957dcb116edf37a9efc434b180e1e0762a94fe9ce40d0b0b9394dd7b1a135ed8f3017da95389807cf1ba96126f2a987ade697ffa033562946ce56c4ca45ca58b0f7d38a701ab797d7bfdfc704e21946fd9f048e741745715a3ce3b518c86b92307a7290d5e6f55b6f830bfa723b6486ca919d4d4c9bc328abd3c0ac5a31115da95936197074a74574245dc673b7e6e704d2b1a8f155b6c63bc7aa254a69cf9e46d3fd4ed4735ec4000a52013d74196a617df3fe37049729508742a982985bf645e9733669bc37f43f7caa71aedd89af597b1456eb64442fc7b55cb3aa0d1d23254df2dde46f347f11177edb21ec02087d58e6ff565b28abe64dbcaa78ab41ea24048bd059168b7900699ef3b4dbd82d18c7300f4d2140e52a140a02527fff137f6a0ec457775b40c900f014ee951ce8936553064a3d61a92d82704752d9f6ad8dab07fbfee793b0551090c34464746f65a9a522634db97c809ea8ccd2b7bf791956161aa847d0cf7336ce56cd83b38dfe33c523d625769cb3edb81f4329756be07aa0ae6601ee90eca45b208ea4fc4408318e90f6d0d5f60843780d14ba75223698f7e4fd476f3b8f93ad16e488af4adbc42e2136cffbece0b69d270721bf30626c325d5f2490240c894f012502a0c21bef92db4213c073ed2e61831681bee9b5f71aa5fde984e46dba39ae2d31ba1ded93cbaf1ab7d11f13c82c8f4c5e1b4be633467f3e8684e8c61d08a04919cbf7412a49f073a90aaa287bd3238db33c6f60733ef94269d5cd29b77629837fc5a4cab72a145076571c17612c1dccdd1e0bf9ce8aed6680f02671094aae8e9768e844af85b6310e566da2a16f4ed07d7efec6415abc0f57c75779c3e9c1daf1be2223693fe45a78f78909c10e7ff8037042bd160e5b5b6e2d46b85d4fdf12ecb12252777a40e1bd2a355e4368266658fcad3cdbbbffaaae67acb6e70b7def2d0172c23a266bfb43b8c9777248c5de4f1bdfc44d5404072b2b6b70ebb110626ba789c2ffb97ef8224d3cf8cc35a93336604a1b52090250e95934974af4d53afd68c3bb679f0cfbb3b0c0ab18e08317fdcf00f1ebe19f23797cd22966ca6a0365c87cc8d9317e84d5afd47009c78a38a40f11e1b460b3acab9e4a27d2ed8200166395eb75ca295d86989d83866a2037a1a3ebf2bd950e8385f66833953c4d0acfe69c63e0cde0488e2cd7732db3c25acf818deccf80dfccbc8856d64194232aa9ab96c5f651a8dd503cf26c83c63c41d9043e8d322d975bb5b9c18af9d5fc1514ec04a8111d5898bd175ac928a5a1b8089a3ece5a737828756d8045ef06ad8bdac76256e2fd1f4c642ae74b5fb4de35afa71ac9d854cfb3cb122bff45c8164892dc19138a712a2a7ec8df58290bf43ad8d7870462ad1f80e6b339e054ecc44e307b687caae200d325e062781057098faf1f9f5bb34b9d536aee3f53582ec40cc647abc5200c176f1f655c88c78dd18bc3962ae9fa3691a314fabb5dbf0bed8dd9662b017390a2c76d1f8b7889550303beff188c051bc713e26a0658bd349852f2bf907fbd6cafc555a40a31602588ac251acccfaa5f0c67cc77f3f47ccdfcdc25c7c2b736bff389d667b0d2aa6421d766190c0a04f09312b31e66a9e2ad49bb077ecff6b8467e0eb3d1d022b617a2da3320e5d232fe83d989e3886313d7343821f1deee5410a4867ee21022b43dd62b09d88ea3b19e0d7714bba3ab34218ecff3d2ca8409bdaf48aa551cec0ec5c119b9d59a3021e5cd9957c5803da7081ee1ebfb29ff7ea38fdcab1c117c497b521c4bdeb74438a98dae3ad2974a848e47379022e1da821f47e00c3366b19c1e0d1327a60cf8192414439b8ad6483ad7ef3c334c582aa2792fb4f051f38793693e23ed23827d0a76e08c21a2b6d66d5e90006c82bb7f2c11167bc3a2161f38414c9522f3b17c605d8f284127ce70fbca29ee75a2e2a60129e3e217a0e7fcbc0706a1ec36a87717e96c9f27218f82bf2c65383afb0481d52d4d19aa50a1ed1402e4ea5ef3718d8bc6ca04051b05665e042171c0cf84c5a0134711056057b517d63103baaedeae6e33dc610fd5b852b6d86880d6a09e85f5597b5db306272771706268d4315ffcb1a01965026bdf16c20bdad605bd7dab4d7a7e8ab0b28ea9e248c0277b2ac98472f7cc044a2c610083f7062de4ad359a4258f6f1d9221df6fe62c3f7deabebba2f52d213f33733ac7ab2679ff041ba966a444e920c7be2ff532e11c713bb51bbd8c1fa16672a31487457b76f9f559f2c5f0a49056d831bc72e76ee40200cdd6fcac965816a02f66e4efc4d13ddcdb8d28978cdaf8e9eb095fecc56ec849f8bdddd92ccf8dcd3fea707a994df0817371c07bab1d9beb29a18d8c32f243852880a9d9c413083b1a95f22ac55d7aaef722ff93b8c20a80f4d658be7b1478b8d9f2f24ac7b1389f855d38313b257cb7c65146e62bcb3c9bfa762b6d8afce99e2aba375886b2f7b1aaf0ad4ba2c6ae7a427184330aecc37d28e962d65e50ef6ea90afaad053076e3916a2811681e1185a181e95177e4ae75a4e163e5a2210067250e6384fcf0aad7dcd52188c32b6c9a92ff477de9a7d680f2442723bcc20758a72dc7b37dda6588db889077110fcc23dbbcf5e689ea63278a77bc3c774024d579ad8d6edb884d804cd9f5576ae7f6202e65f8e12aa71b5d0b4928d5b1075b9e9c5d1f69dbc693965e6ea6ced098a39ddca2e570c46bd49d05b921046cd81038a944292e747d27c7589087768c49ca6f4d2b41bb31805d399d1e1a06e4277ca5b6bd38d8964ce4876804830b4d526ea6e33a058088e92b471f511da89b49e8e73f47dfeda01e4d55841678f1c11e9ca9d6480d1c3a116801d07c40db9a58a5d5831b3de0d34b3e73c38ed9b4ed6a6de7bb030c3f1e25868c5ee2d79b21a3b8ff608865171788d209fad05eea6daf9b0a5f74540b4ac8310d5a43fc27af506e829a5e19590439ce94826e74d4c11d1ddf236bf56f9c18e58e6369bd2c8988b268cc22dc72a6ce8d294792a72c9f459af82f1dc30ccde92a7f5fbcb02186d8c2a4ebc16b261259ea9e97c2e45f4fb00b6737f30164530c8e41b6439197db51d458a98a3ef5223ade77b18d0eac8b56cd7a3b7f44cdcedb455973db77f65a8e4a883639d7e81358207c9081fdeee811f44822df44b5a38f26df80c7e1586a15ac6764c103225006b66b318fdbb6f69bdb6c68ffb38b0b4c0976f711a2bbf404a3b52a7011d12f325c8297c29706290507acf882aee6b2dddc334a2c4d44c9662337daad5dc3e056c51be9972412b0ae5b8f50a77e80e25414cc80263de9d7573db5c486dceabe3289dc0df79faefe4ddaa1041e812435c7a6f77de534c335b08bc6ea2e090a9012fc76f89b7b254aab1e63eab57454575544320abb88494d9facc0069292bffd68b0f7547135834cf37355a4234f44cde8daece2bee6a1114708b2850fb67f3ec88559ca56cab297a785a005af70b8ef856268ef6db975fca03c3717b8de10560c5b92336922e2de40be68fe3f2af29f2eb53bc5b957aee633b080a53249208c3715853e3786c1e10da3790a4a31d79e24a3bc245294488f06c474a0822e37f8230362077e882ef5be73e0d07c3b53517c6bf990a1d98b2d95aabe5a215b4523a7654447dd279aa7280d1671e02dd6ad1badd47d073fcf6ca9859ad720951e9f2fa9a8e309180ef87401040dc193070c26345a584ec329f7a4236dbc320f647f744b7a8647aa223da3a836c9e66d273026af5b69c026acc8f39a7efc4fdc9bdd396f3f0269a5f5f8e8a9fc446a9ddd882e660b4b40a8e4e3ab860db3cd7c538e9c7d6d4b5793b7ce3f263c1e8a6f42982456f8c37773544b5a0051c2e21227876caeaa0b969a58bb87a86b44dab59bf9807bab4ee38ab9bb90f59a3a59553d4c79bd4cfeba18975ef1aaf873a6a6ac3d1a88dbd8dfcf6223b5665d03394f54026cac6539230f1faf4c80ffe3f55fed034d8c773d8f64e2bd3046ba2ab8644ebb81f8fc8b8e80b19d11edcd8daee6fed45a76e60c292581a0438f61d775027ded6376df6448be365b3805fe9a8aab906aa896a0ca95b50c039c293b841f92c23968a8cc2cef54ec2eff411be06b28c2424ba79596c38c638850eb82d417aa4d7df53298e29dd2e74b2482fb266ad0beeff205ef6540438d5d26ae6e7311455c10120a7402daef9732be4c9a2c44f1b22b3593fb52801ad97849f6006a2794ff65949b4f944e9cbdff59cdfb074736798ccb9eb96583efe7e86857aefdd79aa2f4ba77c02c8476c7ad2ef699bd899e23262766900be55b39ee67b43ff83a25d564c264433293925709a9656bfc73f22ed974d59bd2f2a8fbcfdb7398a8c205b5f96edfbfe0506243236ba934e945aaf36d60bdbeb5e33d76f54da2830fc6df6335f9dfa51d82fb169f53cc99bc195ca0a2911fab31f8813d3d1facb680b8c2a3c36e0aae2f52b4aaca778d09a7cf72f43ea552397df66a7281c9bd9b4d3ba04c69a79fef72ce5e338b95775d6301fe57592bd9af90225d3f80d0cf5a2bcb897fee99aae8f87d4f3bf15e3aac2016185172447c52b2c5f4e73b561c08cc3ba9612676b01a32fca2587d1080cff6c74ec51614e0050fcafb65b189d8ba4ad3d313a2ebfaa1130b89d8c092549c199bb512d16ac5c310c5695a73333cba6739dd2ccfa384a1e7afad196914a3c2ca577cbe09bbcb37caa5e7ddb11a0b385e1eab799b881ed1226d4b64836836c8736e5e0f36751a2ea37b1a1de418f5e38e4e82e77d2abdbc68de8a9c7890361639a6730c7dbec5a884ecf51edbf5a0cfd2fb6d6f0d4ef658ce31082079ce1f90abe0a5d5e14fe5383d943571eb0121a7b20c0e2e763791edc80eb807946f973b4a243a8496d09d9c18984ffe771af74ed2757febbadffb3df84e58a87796df59e4c75be418853a658ead8952d82a89cecbc2d851ba1b10993207b223e67c71fc63f4fdfbbcde1c46ddcf503aa9589354e79104ccca58adc292e2a2469a4484ff251b92b315a8db6fe16688d70f6ef0d7bd6ee7c524dbdec89df06cac08cfcd58ff68fc086253aed722027915635f150dea5f46e242950b6f866763d7377f15027f949828353a318465124533ccdb1734900e1152c9be3536a31a32c74cdab2b36d2c71b90ed3bab991c40868f42cd03e405f8bd7dee201f84c17340ec84161ad43c52a46d3e2dac95b773cc80bfd66c852a1969f34c10fc5989fd758dd84361afd6d0f7b8f23f657c0f575ad5536f297021997607e7685bb2f13bedf4243a4b3582f16127cda7b3d26797b95c8244d5012b77b1f52133369c8334843da5534318e3eb716f71c548e9fac8a43fd9417bf38143157934ccd8f153c02dbc020a60656d5f86de894083df4e022331769aea0caae8b815cc091c3ed30a27a254a1b20edd5b05a19912e919e92d797f214c89994a8ca127f127dd1c3d46af635e42f0bd539146d0732aa1b2a71dd256100295fe652b83b043fdb548feefb15c6217720c05520e2cd8f81460c1c64b5fa798529fd4a59416c8385a2694edd617da7ef9a85cd0d85939a29ccae33f4e528c379bfbbef3eb5def2b40d3696dbc03042b5da26b0b0dd045eefa330a2bdbb71d377c46970448ca63cd06f264b91ee4d9b5d2c4d8526052f441f0a9814328ad4f31377bec59e23617323497e3ea9f553d7b4e930c88d5c6f375b60fdfdb523550c0cf64d9c6d3d4e98fa2c8d57b41eb384df51e36298d83830e8e627553a89f6c76f887bd6c1b33de3c1f08c4d8899c9e6c39378169294169736106166837a94bf08d6f3c6277a752a3a609950c6be1474113c8e829486f08b695ba1240f044ed94906acea05deb5a4f53cfdccb87779e60f5e7b7915cde3df9fccbb08b5fa84c709249fa81a55ce9c582f4668b86d75b7d28482e942bb950b6ab7b4d26440c092b5d9e9dcbf502a9ef9a034120b2c543dd5f954540763e00077191f8bda989b477755e838037a9b498592bd7379fa963486d4f0eb39535060f672232eb4960b1dc9ad7bc95cf4f7214c6b21dc230adc3690574cd91c62063c4c8eb0ab06a5e2ba90179ad757c22d6f0ce400c55682b79b16fa534d07fc5144e0cb2203051955a62be17b7ad3174ecdec07f9d6348ccd9b7ac7a781f93e9db920f879f7d350ce1746d64ae335e4b749f0fe53a9ba5ddfc8e08715aadd2e86c9b8da1d2394b4523c234950cfea37d3be0a7e87a40fdf24f4df9fdca547fe72cde2fa2d200fdfd11896c9fcf70a629e85937cfd5d82eb349fe7f6fa400233f6fd3df6b21e00ba823e51672d5cfbb1ce02ed3e9c1fc89a24efae8b130e39b682c4aa141201477c3c8d9dbc5c0c9f1ba3cb64f6f81a91a0ca127847bb092ac10a1c9f81af222964742b5e742f4a2c95e6e6035fc10090323dfab85f7a894ef09f10fdfa9f16c14bce55e65c467b9eeb54ba4973158c7b36e8a894c6c85bb46c110d124d96be80c8662f5f807aa7c9be3931a41716b3f142a4a2d26966918ff25b6dd8842c2c61097fd113299d35b55ab1b0f29f3713fd37287300779ec84f951c12baeeec08dd0f69dccf2e1382e81bb780f64621c1424839219e16abf9982268bc9421d3b23df696947d4b76ae6885e244be6f37b5c9c9c694ac0ee09f9b10f9c4a604d380d8279a3d76ebbd21ba776e316dc74788dc252e937adff9b1d3fc4d275e8e529b2417736de64b6528ecff6b8801a7e0da78b1624bdc092561da72eb3388200fbe151667c33707ffc56ef96d624bd5fa679f9f2c56afe15d61f5b191419dc832254150c4e3d4922c29d9798f88c1320caa432589a45f3aa04def8efbdbd368fef025068e600e7cfedbd64fb5a69fdfb100b916fced04406ba3fb2a1f2fb3c745cb49fc607e504e22c386872397c8fa504f273d3000285002a9a7bb96fe4fb34a3dc9dfe1c89aab5ef68a6d0418f6bbb4329b849a70c7127b2b7f4950a84c184936ea97ee651309917f00e6e044b49e08084efb82016c24dd6fecf64f033d28671b0687d10d7af6f21674526aeab2f9ae9ddea7f08ac49c968a404141170b7afadc3d3e5151eccb9fe3e9b7aa4795e632526a590c430dc2f0bd175fbd4e722ed7e0aa59d9f915d9003fc469088eb0758d829949b65fba3157f20955e69b590df3fb1211dd7dcdcd3e5923c3c47e7029e80acf7640636ef79055e06c3e39ace33344167fb31750ab473f59834a50c2db739090ef28f6a7b98629ace06c45284ef1ea752d425b61239a8849d200128f74d7d60d87f718cdcad771b415a821925801219af593265c7edb9194fc75d071653fb574b288768f52f70362ab7a16669d6a350af1a3fa0141ba44d9a88b04bf62dc3a798f3ab0ce79ab21716c44b8d8e0ca6911becca53af95a82ca9eb74192644c54422f0ae18519bf41bb806515c99f028b9d3884bfa8d81f7ea607c2376d3d4c3d14766fff6898b5381642644e7969a8604900fd898e84615942f9947badb9d491ba60ee8607f6689b40be2dae8393f655aa33872d3b6763126967874462a086d02040b5585db78f124560fb230cc2c51c1232e436bed4107d554be43fd19dbdbc0588cb9f10860d11b244c6c270d28988a708a2600e978ee5131a42a82b22a681899183e23cce859049db13adeac1aa2936c26bcbbae9f4a0eb33ae69539ef2444714a9e260fcbccb1080d84949705554cbf31286f38e3ecd43184209f617ae235bf7eea84a6cf5a57ee8d83edc052e1636ea0d9b0ef13d31a895041db3292ff1a651cef4f53d93024e519cf6f4dca2063433e7958cd40049aecfa96bc18dd1ae0037b95bc223f38eb806b01e4fa66426c502db73090a07b61ef69728dc7171e76bdb1259ae6bf45e4f920cd1a404c4eb299b7e697d0a1cdcfdab98d0983221d50daabe5bb9c1f1b363aa8e92cf6d8cb40e81929213edab68c9ffb881194f253f652e75e209af9137dd128a566ea98e5805df81d16810b5c17abad377480e6522d25d585ca16689884b09a5aba62f2dc8a3671f41bf6b27b9541e5993d7c2cc699f7735dac34b4fd50d297d5b4c96e318c40a2bfa8da83c164e5ad19b14bd00f633e4f9ca3079a7dbadbf6d7a58e80213509e535fdbd4f53f878f0b57b3a3db3bae3e02cb55d672f15740c69675b45abae739782b63d0df27feb4320e5c349226b8bcaa66f873d762e518e60ff93bc2dc9fb421ca9d8c78cd27331b7f711be0edb60fc3a9fca42b891253bf6009a6ea93a628704d4308febeecf6d39f45f059170a247cf3732c4bd86d52c1627faabdbf1d925a6723d930a7cb25d1ebc00b9a913a6e710b2ac915b1bb3e3e31fab1bf6e3052a804767af8e421718e3810434b38c8f46589d7d0bc068fa859570b4e541f56698a93c40478f2efd25e184c3cff4e0958bf6d093e8d6d2a4f4156669cdedeac73adf4bed3c89520f1695ee90a42f8918f994c808ac9ee6b152d527dae45a7fee6450851bf6ecae5f057889d0f798bb4d480801e51654f0a9b2ce6195ddd01fe0a09bdb54a876e34f5ba1a257808a1df811be928209befb8d70d7b7ea1995e19db439de527412a8b2722dc27a76f1ed48e6c6c378321e7a5ff71e774af3227d7b39ac29b39d5c42e16716299399890e5652d758ae60b3d1079edc87bf7f69d4af1c9f9c77375ea9816be92f04148cde6d6ee2c8b2757f8be7b44219234325fa405e17a05328f24b852671ab37c991b3942bc46706ac948762e43324ce52e74d4375dd283e4bda9a22888f1992d2361ba14b54455c5c7ec9d6e651d75d8e10dcfabfac34aa4a7576cd2d05aa58bcc43fd1265a794400b95a7bb57c808675258c82351016d365c34993e8c7550d2d118054732e66eeb47a9c49b9c0db7bac81ce2c4163ffb361ac95d643ef4b8e5c76c7933e4cd08f52f9487a250f6a11880ccac0b8ba9815446ea4a9a6222387f97dd43139574179cf2fed9e8918bb429babfbd27de38312cb2a976a157259b4fdad055da8ef0a91e2b3d14e4ace726e3f48fca6d9091465a1e09f142883a0d1e1ebf49f568b27daee66b037e26b7deb31de88208917ba903e48f3bc9eac54d7311e86f67bfee2e20bba18867b260b19e004f43b98fff4f6f19a63f49cd992295fc38a9512ac10edfcd2b0c738af89c46ec30f4047be91d966d83027f4a3519006a2b7c30a7259c60666285ab04db0c54fa0ca69526dc129d243d1735e3681b43a02b4d2dad28d2194cdbecf29587b3b4e237819feb06fae7ee278c22a3e83aa708d17592312f7e88a335089eca959197c463e027289390d19a4085f0f139f0f401224c35480c244b42a1ff77ecefd07e2786b3982bf7337667d8ef31713e8b3db57f843db7fc99a67bcd44939770736851d8ea5f98443b307c5032cf0ed25f2f85c410e646b8b1e249c6d10ece06eb966c389a8d835dd9bec97182364a4e5f3dc1e266fe74d90edafb9a8eada15f648faaf9ac0a3a5b1803f4d9b7f9da5baa4a2ef5a4712f1ae55aac2a201d1249812923473a634af24474ba6531bb068b39e514d317e2210700759f2bfe56a0dc694b601e215dbabc681b951eb4ecc5b847a560234f52eb9736dbd59a6b5a78304d49c884629b00311d9fc2eef465e42eb4d7269c4c36d430dcb2c48b95e13029b12ba4c88d60658bd425d01017e8e960115ddbb18655deccd3ac67420bedb8f9a1534cd945ad36a542708fdbe07bed4db2a1963cddf68e9ae27b203c648b4f28f9535a9843aa7db332b46fc921739850563ac4db1ccf2c91396ad5040283c5bffaeffc31cf9c8fd81d08cc94514320f6868363bf4c20019aeaccad935a23b20e7819ed8f1a4536a5f5c184624bd5c33caf4f6000c42afae369433119ce64e1014f9ed9f95345027564f3549d6cb8571f579fe87d3c9315c8912adfcdd36872d53e57cda6ebb96dca0af4f4cae5d91bfe5f8b33df85e13bd8dd23bd2d86775d875657e4b3ecdf523b06508204e428f39ad6497261d59d6c0f10eabacf628f5e807591182a90b82fe1d74a35d70ad026493a2b4721092495f1ec3a8865bb2cb3e5b50b6a8256ad21e15a07d97e87ff45d44d518e8a06f2d618ce8f4c7cce7603a10294d927ccc8fd7982c0a2ac5f187389dff234c03a74c9ec3bd5e96867ec1929e81a9eb4f23552bd62d3bb5af4f3cdc6a3fc12486717a8a4235fbacc0c4e22f174ae1a17477817451142a59cd4db524d4c2d9971bcc241c04c718ec905e3564694f1184a606c6f3623e5a363e8cd474030d562eadfa9fdc457beba359c3abf42b5b3c8730acff0ff776aac62042db6d203004a349550826c95069f83689738708e0a74dfd9c03c53dcd1fd752760c307c1854d99250bea3785a27ab222066274b40980acc5108fa083cb4ffc8a690a98658a64300cc1bf20676666343dabbc9f94aa49788eb3d0fe0d81593d5270d50b9b253ea9e5424468cd3fa234d8f02f931e05d5e1250733f3a8817e40d2b294b8883931256e90f9da3c574c389d8f4234a584bab230aff09e021be5f141514c2a87c3dc150ad1023659da25b738bdfd7f29f0c567e5adccfb24b33b9b37f99bd5a30aeaf81dc602f9c0318f1a1814044b9096c5dd1c3a857484ac3ab04cae33bc8169dc25198d0da890f8f9a5e7ae7d32202d0732776f821acd24430b78cd2135c6297314931c6aebbc250df695c63c2efbf08f5489cbf6882e2978eb593bc3e7cfee0b490ac4a395970debcbda086202a6ab7ea0de27715f3aea4fe76a8925ba149c76cd4fead920db639923550d4e38f023214fe96a9bca156c214c1d49aa1c1ac879cf59ba9cbe11caaedfa4aff83b637fd91b79477d4ab95f34865dcc8af5ec8067ab7e811644de6350d0c031331a59a053d1dd8e82d114622e4718b3d87c5ffca5c3e6c691dcd89a71a11e05470135f25632c23cb25c3e3358ada68e924ac0a87acc6abbc68b8a712ffa114baa9e7a8c32a7b11b4f85ca62ddde328b9dd44dd5670041e626b14a6e14a2ac55d82bc7101ede6a7c4a608c4c53eea9b575212e42657e5a2003a56a87e04f599bce95e3d040ba8cba517c3e61b1d2d1f803785c85624c26cb9c42f9bcf27ecebf7268e8d8386ba579fad78b3a71c489214892d819865e5adbfbd90de51fec1219cbdb7ded0f818d30da508b77c59d510bdf51393a67b6a06bc730d0b4ef99e345ca28169fa8439f861e69901f3fc64077b7c9b0b1090e27637f02ed2401669cc0414eff6d3d3ccc0e319a101e6fdb49cad99894cdd050939caeea377aa66bf2d5436d16a9652487c7c4af5e21c7c421f300d236749c3b7506958f8be06831add611a050a699afd3aeaf7f1cf8b202bcb60422d7bba19138bae57bdd06ab7b5d74b04369088797a0328428cd306f65f3f8806fefa33529af6ca2a44aa2038caca7249f11f3aa5b2c171b386896132848e57161a0cec85e808fb421bdbd8bc9f6d643a41f12628e76ac3010ff247", 0x2000, &(0x7f0000004980)={&(0x7f0000000000)={0x50, 0x0, 0xffff, {0x7, 0x20, 0xf4, 0x4000, 0x9, 0x9, 0x4, 0x9}}, &(0x7f0000000080)={0x18, 0x0, 0x2, {0x1}}, &(0x7f00000000c0)={0x18, 0x0, 0x800, {0xfff}}, &(0x7f0000000100)={0x18, 0x0, 0x4, {0x20}}, &(0x7f0000000140)={0x18, 0x0, 0x2}, &(0x7f00000001c0)={0x28, 0x0, 0x3ff, {{0x6, 0x6, 0x2, r2}}}, &(0x7f0000000200)={0x60, 0xfffffffffffffffe, 0x7, {{0x1, 0x0, 0x0, 0xf7, 0x64, 0x81, 0x9c, 0xff}}}, &(0x7f0000000280)={0x18, 0x0, 0x0, {0x6}}, &(0x7f00000002c0)={0x18, 0x0, 0x81, {',\x01$![*:\x00'}}, &(0x7f0000000380)={0x20, 0x0, 0x9, {0x0, 0x5}}, &(0x7f0000000440)={0x78, 0x7fffffffffffffed, 0x0, {0x7f, 0xfffffff8, 0x0, {0x6, 0x0, 0x14, 0x100000001, 0x9, 0x8000, 0x9, 0xffffb9a1, 0xffff, 0xa000, 0x9, r1, 0x0, 0x0, 0xfffffe01}}}, &(0x7f00000004c0)={0x90, 0xfffffffffffffffe, 0x0, {0x2, 0x1, 0x76, 0x401, 0x10000, 0x0, {0x6, 0x1, 0x10001, 0x5, 0x100, 0x7, 0x5, 0x3, 0x6, 0x6000, 0x6, 0x0, 0xffffffffffffffff, 0xdf, 0x2}}}, &(0x7f0000000580)={0x50, 0x0, 0x80000001, [{0x6, 0x9, 0x0, 0x10001}, {0x3, 0x33, 0x9, 0x3, '^-/#g&[)$'}]}, &(0x7f0000004740)={0x158, 0xfffffffffffffff5, 0x5, [{{0x5, 0x2, 0x2, 0x7, 0x1d, 0xffffffff, {0x4, 0x0, 0x1, 0xef4, 0x1f, 0x2, 0xab69, 0x0, 0x3, 0x4000, 0x0, 0x0, 0x0, 0x8000, 0xc8ed}}, {0x0, 0x100000001, 0x2, 0xb91, '$%'}}, {{0x4, 0x0, 0x100, 0x9, 0x0, 0x1, {0x6, 0x1f, 0x7, 0x4, 0x0, 0x40000000, 0x3, 0x200, 0x7c7f, 0x4000, 0x8, r1, 0x0, 0x6c, 0x4}}, {0x6, 0x7ff, 0xb, 0x4, '/dev/hwrng\x00'}}]}, &(0x7f00000048c0)={0xa0, 0xffffffffffffffda, 0x0, {{0x3, 0x3, 0x4, 0x1, 0x74fc, 0x9, {0x0, 0x7, 0xfff, 0x850, 0x9, 0x6, 0x4, 0x0, 0x0, 0xa000, 0x1, r4, r8, 0x3, 0x8001}}, {0x0, 0x8}}}, &(0x7f00000006c0)={0x20, 0x0, 0x9, {0x1ff, 0x4, 0x7e0, 0xffffffa7}}}) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0x0) [ 647.562449] netlink: 'syz-executor.0': attribute type 27 has an invalid length. [ 647.570820] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.0'. 19:26:39 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)=ANY=[@ANYBLOB="300000001000070100dd2174ffff27de00000000", @ANYRES32=0x0, @ANYBLOB="000000000000000e0c001b00000000000500100005"], 0x30}}, 0x0) [ 647.651216] netlink: 'syz-executor.0': attribute type 27 has an invalid length. [ 647.663768] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.0'. 19:26:39 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xb4020000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="02000000030000000400000030000f000300040000000000000000000f008ec4", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000e1f4655fe2f4655fe2f4655f000000000000040008", 0x1d, 0x4200}, {&(0x7f0000012700)="20000000d4c49a2e07", 0x9, 0x4280}], 0x0, &(0x7f0000013a00)) 19:26:39 executing program 3: set_mempolicy(0x2, &(0x7f0000000000)=0x9, 0x90) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x4c032, 0xffffffffffffffff, 0x4401000000000000) [ 647.741604] EXT4-fs (loop5): corrupt root inode, run e2fsck [ 647.778383] EXT4-fs (loop5): mount failed 19:26:39 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)=ANY=[@ANYBLOB="300000001000070100dd2174ffff27de00000000", @ANYRES32=0x0, @ANYBLOB="000000000000000010001b00000000000500100005"], 0x30}}, 0x0) 19:26:39 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x93000000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="02000000030000000400000030000f000300040000000000000000000f008ec4", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000e1f4655fe2f4655fe2f4655f00000000000004", 0x1b, 0x4200}, {&(0x7f0000012700)="20000000d4c49a2e07", 0x9, 0x4280}], 0x0, &(0x7f0000013a00)) 19:26:39 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xaf000000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="02000000030000000400000030000f000300040000000000000000000f008ec4", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000e1f4655fe2f4655fe2f4655f000000000000040008", 0x1d, 0x4200}, {&(0x7f0000012700)="20000000d4c49a2e07", 0x9, 0x4280}], 0x0, &(0x7f0000013a00)) 19:26:40 executing program 3: set_mempolicy(0x2, &(0x7f0000000000)=0x9, 0x90) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x4c032, 0xffffffffffffffff, 0x4500000000000000) 19:26:40 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)=ANY=[@ANYBLOB="300000001000070100dd2174ffff27de00000000", @ANYRES32=0x0, @ANYBLOB="000000000000000910001b00000000000500100005"], 0x30}}, 0x0) [ 647.969408] netlink: 'syz-executor.0': attribute type 27 has an invalid length. 19:26:40 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xb4030000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="02000000030000000400000030000f000300040000000000000000000f008ec4", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000e1f4655fe2f4655fe2f4655f000000000000040008", 0x1d, 0x4200}, {&(0x7f0000012700)="20000000d4c49a2e07", 0x9, 0x4280}], 0x0, &(0x7f0000013a00)) 19:26:40 executing program 3: set_mempolicy(0x2, &(0x7f0000000000)=0x9, 0x90) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x4c032, 0xffffffffffffffff, 0x4501000000000000) 19:26:40 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)=ANY=[@ANYBLOB="300000001000070100dd2174ffff27de00000000", @ANYRES32=0x0, @ANYBLOB="000000000000000c10001b00000000000500100005"], 0x30}}, 0x0) 19:26:40 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xaf010000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="02000000030000000400000030000f000300040000000000000000000f008ec4", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000e1f4655fe2f4655fe2f4655f000000000000040008", 0x1d, 0x4200}, {&(0x7f0000012700)="20000000d4c49a2e07", 0x9, 0x4280}], 0x0, &(0x7f0000013a00)) 19:26:40 executing program 2: r0 = socket(0x11, 0x0, 0x0) r1 = openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) r2 = perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x1, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x100000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000180)='/dev/hwrng\x00', 0x0, 0x0) r4 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x7f, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x40000000, 0xffffffffffffffff, 0x0) write(r4, &(0x7f0000000200)="c20afca7", 0x4) r5 = syz_init_net_socket$rose(0xb, 0x5, 0x0) r6 = openat$random(0xffffffffffffff9c, &(0x7f0000000140)='/dev/urandom\x00', 0x30101, 0x0) r7 = dup3(r1, r4, 0x80000) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r8, 0x8933, &(0x7f0000000300)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000500)=ANY=[@ANYBLOB="440000e8d3544c9d30b8050010000000000000005ec069d2ee1ef9380b6832559d0dd85f6be652fc9902000000f0d312f61473b1a176d1332c2f947ec59c16e668f6a32ad1880facc6ad645e976b53c0ff8ebc2bbbd01d1d7c1dd47bfb9a4ed19fa2ec169346c7e7aa994d56b9aeb375214044f5e2aa4722e0893c1ae3f442845d1acd8147b849a7caf1e32e8e358eed896e8e42168daf39102e3390ebcba0f40633d3bfd0cf70df0478c117a3da2dde8dae310428cf7e635b83821819f165dffb4f64c2e241976252e04472529c2457dd5890dc5bfd381c878a32e53a442fdf50a0c26a9671ebc839c32c34eaab34470147f5263a6f75ce2e4f3ff6e408f01a8084475b4ee8edc2a9c01ef118d94aa1c151d5da371caaccd082ac5a46f07ba0a1b322e9441b9b6759da2bbee6025344", @ANYRES32=r9, @ANYBLOB="000000000000000024001280110001006272696467655f736c617665000000000c0005800500200001000000"], 0x44}}, 0x0) sendmsg$nl_route_sched(r7, &(0x7f0000000440)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000400)={&(0x7f00000003c0)=ANY=[@ANYBLOB="40000000280000022abd7000fdbbdf2500000000", @ANYRES32=r9, @ANYBLOB="00000b0007000f0000000a00080001007366620008000100647272000c0002000800010001000100"], 0x40}}, 0x4000000) r10 = epoll_create1(0x80000) ioctl$FIDEDUPERANGE(r2, 0xc0189436, &(0x7f00000001c0)={0x5, 0x8000, 0x9, 0x0, 0x0, [{{r3}, 0x1f}, {{}, 0x9}, {{r4}, 0xffffffff}, {{r5}, 0x5}, {{r6}, 0xffffffff}, {{r10}, 0x3}, {{r0}, 0x4}, {{r0}, 0x5}, {{r2}, 0xfffffffffffffff9}]}) fcntl$getownex(r1, 0x10, &(0x7f0000000080)={0x0, 0x0}) setsockopt$packet_fanout_data(0xffffffffffffffff, 0x107, 0x16, &(0x7f0000000480)={0x5, &(0x7f0000000100)=[{0x800, 0x6, 0x89, 0xffff0122}, {0x9d22, 0x1, 0x7, 0x5}, {0x6, 0x81, 0x6, 0x4}, {0x9, 0xd3, 0x7f, 0x200}, {0x7, 0x84, 0x3, 0x6}]}, 0x10) perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x3, 0xdd, 0x15, 0x0, 0x7, 0x20, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x6, 0x4, @perf_bp={&(0x7f00000004c0), 0x2}, 0xa04, 0x2, 0x1, 0x5, 0x3f, 0xfffffffc}, r11, 0xd, r3, 0x0) read$FUSE(r3, &(0x7f0000000700), 0xfce3) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0x0) [ 648.230420] EXT4-fs (loop5): corrupt root inode, run e2fsck [ 648.236842] EXT4-fs (loop5): mount failed 19:26:40 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)=ANY=[@ANYBLOB="300000001000070100dd2174ffff27de00000000", @ANYRES32=0x0, @ANYBLOB="000000000000000e10001b00000000000500100005"], 0x30}}, 0x0) [ 648.272174] netlink: 'syz-executor.0': attribute type 27 has an invalid length. 19:26:40 executing program 3: set_mempolicy(0x2, &(0x7f0000000000)=0x9, 0x90) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x4c032, 0xffffffffffffffff, 0x4600000000000000) 19:26:40 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x93010000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="02000000030000000400000030000f000300040000000000000000000f008ec4", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000e1f4655fe2f4655fe2f4655f00000000000004", 0x1b, 0x4200}, {&(0x7f0000012700)="20000000d4c49a2e07", 0x9, 0x4280}], 0x0, &(0x7f0000013a00)) 19:26:40 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xb5000000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="02000000030000000400000030000f000300040000000000000000000f008ec4", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000e1f4655fe2f4655fe2f4655f000000000000040008", 0x1d, 0x4200}, {&(0x7f0000012700)="20000000d4c49a2e07", 0x9, 0x4280}], 0x0, &(0x7f0000013a00)) 19:26:40 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xaf020000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="02000000030000000400000030000f000300040000000000000000000f008ec4", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000e1f4655fe2f4655fe2f4655f000000000000040008", 0x1d, 0x4200}, {&(0x7f0000012700)="20000000d4c49a2e07", 0x9, 0x4280}], 0x0, &(0x7f0000013a00)) [ 648.361251] netlink: 'syz-executor.0': attribute type 27 has an invalid length. 19:26:40 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)=ANY=[@ANYBLOB="300000001000070100dd2174ffff27de00000000", @ANYRES32=0x0, @ANYBLOB="000000000000000c14001b00000000000500100005"], 0x30}}, 0x0) 19:26:40 executing program 3: set_mempolicy(0x2, &(0x7f0000000000)=0x9, 0x90) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x4c032, 0xffffffffffffffff, 0x4601000000000000) 19:26:40 executing program 2: socket(0x11, 0x0, 0x0) socket(0x1f, 0x3, 0xffffffdc) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000180)='/dev/hwrng\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f0000000700), 0xfce3) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0x0) [ 648.511547] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.0'. [ 648.521147] EXT4-fs (loop5): corrupt root inode, run e2fsck [ 648.528981] EXT4-fs (loop5): mount failed 19:26:40 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)=ANY=[@ANYBLOB="300000001000070100dd2174ffff27de00000000", @ANYRES32=0x0, @ANYBLOB="000000000000000e14001b00000000000500100005"], 0x30}}, 0x0) 19:26:40 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xaf030000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="02000000030000000400000030000f000300040000000000000000000f008ec4", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000e1f4655fe2f4655fe2f4655f000000000000040008", 0x1d, 0x4200}, {&(0x7f0000012700)="20000000d4c49a2e07", 0x9, 0x4280}], 0x0, &(0x7f0000013a00)) [ 648.625342] EXT4-fs (loop5): corrupt root inode, run e2fsck [ 648.644768] EXT4-fs (loop5): mount failed 19:26:40 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xb5010000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="02000000030000000400000030000f000300040000000000000000000f008ec4", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000e1f4655fe2f4655fe2f4655f000000000000040008", 0x1d, 0x4200}, {&(0x7f0000012700)="20000000d4c49a2e07", 0x9, 0x4280}], 0x0, &(0x7f0000013a00)) 19:26:40 executing program 3: set_mempolicy(0x2, &(0x7f0000000000)=0x9, 0x90) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x4c032, 0xffffffffffffffff, 0x4700000000000000) [ 648.671522] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.0'. 19:26:40 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x93020000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="02000000030000000400000030000f000300040000000000000000000f008ec4", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000e1f4655fe2f4655fe2f4655f00000000000004", 0x1b, 0x4200}, {&(0x7f0000012700)="20000000d4c49a2e07", 0x9, 0x4280}], 0x0, &(0x7f0000013a00)) 19:26:40 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)=ANY=[@ANYBLOB="300000001000070100dd2174ffff27de00000000", @ANYRES32=0x0, @ANYBLOB="000000000000000c18001b00000000000500100005"], 0x30}}, 0x0) 19:26:40 executing program 3: set_mempolicy(0x2, &(0x7f0000000000)=0x9, 0x90) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x4c032, 0xffffffffffffffff, 0x4701000000000000) 19:26:40 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)=ANY=[@ANYBLOB="300000001000070100dd2174ffff27de00000000", @ANYRES32=0x0, @ANYBLOB="000000000000000e18001b00000000000500100005"], 0x30}}, 0x0) [ 648.849504] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.0'. 19:26:41 executing program 3: set_mempolicy(0x2, &(0x7f0000000000)=0x9, 0x90) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x4c032, 0xffffffffffffffff, 0x4800000000000000) 19:26:41 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xb0000000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="02000000030000000400000030000f000300040000000000000000000f008ec4", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000e1f4655fe2f4655fe2f4655f000000000000040008", 0x1d, 0x4200}, {&(0x7f0000012700)="20000000d4c49a2e07", 0x9, 0x4280}], 0x0, &(0x7f0000013a00)) 19:26:41 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xb5020000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="02000000030000000400000030000f000300040000000000000000000f008ec4", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000e1f4655fe2f4655fe2f4655f000000000000040008", 0x1d, 0x4200}, {&(0x7f0000012700)="20000000d4c49a2e07", 0x9, 0x4280}], 0x0, &(0x7f0000013a00)) 19:26:41 executing program 2: socket(0x11, 0x0, 0x0) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = creat(&(0x7f00000003c0)='./file0\x00', 0x120) r1 = syz_mount_image$hfsplus(&(0x7f0000000000)='hfsplus\x00', &(0x7f0000000040)='./file0\x00', 0x2, 0x0, &(0x7f00000001c0), 0x1302045, &(0x7f0000000280)={[{@decompose='decompose'}, {@nodecompose='nodecompose'}], [{@fsmagic={'fsmagic', 0x3d, 0x80000000}}, {@fowner_lt={'fowner<', 0xee01}}]}) name_to_handle_at(r1, &(0x7f0000000200)='./file0\x00', &(0x7f0000000380)={0x8, 0x8}, &(0x7f0000000500), 0x1800) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000140)='nl80211\x00') ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f0000000240)={'wlan1\x00', 0x0}) r5 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_NEW_INTERFACE(r5, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)={0x44, r3, 0x11, 0x0, 0x0, {{}, {@void, @val={0x8, 0x3, r4}, @void}}, [@NL80211_ATTR_IFNAME={0x14, 0x4, 'dummy0\x00'}, @NL80211_ATTR_IFNAME={0x14, 0x6, 'syzkaller0\x00'}]}, 0x44}}, 0x0) sendmsg$NL80211_CMD_STOP_NAN(r0, &(0x7f00000004c0)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x14, r3, 0x602, 0x70bd25, 0x25dfdbfc, {{}, {@void, @void}}, ["", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4004004}, 0x80) perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000180)='/dev/hwrng\x00', 0x0, 0x0) read$FUSE(r6, &(0x7f0000000700), 0xfce3) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0x0) 19:26:41 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)=ANY=[@ANYBLOB="300000001000070100dd2174ffff27de00000000", @ANYRES32=0x0, @ANYBLOB="000000000000000c1c001b00000000000500100005"], 0x30}}, 0x0) 19:26:41 executing program 3: set_mempolicy(0x2, &(0x7f0000000000)=0x9, 0x90) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x4c032, 0xffffffffffffffff, 0x4801000000000000) [ 649.074059] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.0'. 19:26:41 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)=ANY=[@ANYBLOB="300000001000070100dd2174ffff27de00000000", @ANYRES32=0x0, @ANYBLOB="000000000000000e1c001b00000000000500100005"], 0x30}}, 0x0) [ 649.119234] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.0'. [ 649.148399] EXT4-fs (loop5): corrupt root inode, run e2fsck [ 649.155278] EXT4-fs (loop5): mount failed [ 649.166048] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.0'. 19:26:41 executing program 3: set_mempolicy(0x2, &(0x7f0000000000)=0x9, 0x90) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x4c032, 0xffffffffffffffff, 0x4900000000000000) [ 649.240818] EXT4-fs (loop5): corrupt root inode, run e2fsck [ 649.254993] EXT4-fs (loop5): mount failed 19:26:41 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x93030000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="02000000030000000400000030000f000300040000000000000000000f008ec4", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000e1f4655fe2f4655fe2f4655f00000000000004", 0x1b, 0x4200}, {&(0x7f0000012700)="20000000d4c49a2e07", 0x9, 0x4280}], 0x0, &(0x7f0000013a00)) 19:26:41 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)=ANY=[@ANYBLOB="300000001000070100dd2174ffff27de00000000", @ANYRES32=0x0, @ANYBLOB="000000000000000020001b00000000000500100005"], 0x30}}, 0x0) 19:26:41 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xb0010000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="02000000030000000400000030000f000300040000000000000000000f008ec4", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000e1f4655fe2f4655fe2f4655f000000000000040008", 0x1d, 0x4200}, {&(0x7f0000012700)="20000000d4c49a2e07", 0x9, 0x4280}], 0x0, &(0x7f0000013a00)) 19:26:41 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xb5030000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="02000000030000000400000030000f000300040000000000000000000f008ec4", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000e1f4655fe2f4655fe2f4655f000000000000040008", 0x1d, 0x4200}, {&(0x7f0000012700)="20000000d4c49a2e07", 0x9, 0x4280}], 0x0, &(0x7f0000013a00)) 19:26:41 executing program 3: set_mempolicy(0x2, &(0x7f0000000000)=0x9, 0x90) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x4c032, 0xffffffffffffffff, 0x4901000000000000) 19:26:41 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)=ANY=[@ANYBLOB="300000001000070100dd2174ffff27de00000000", @ANYRES32=0x0, @ANYBLOB="000000000000000c20001b00000000000500100005"], 0x30}}, 0x0) [ 649.500608] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.0'. 19:26:41 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xb0020000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="02000000030000000400000030000f000300040000000000000000000f008ec4", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000e1f4655fe2f4655fe2f4655f000000000000040008", 0x1d, 0x4200}, {&(0x7f0000012700)="20000000d4c49a2e07", 0x9, 0x4280}], 0x0, &(0x7f0000013a00)) [ 649.658646] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.0'. 19:26:41 executing program 2: socket(0x11, 0x0, 0x0) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x40100, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000180)='/dev/hwrng\x00', 0x0, 0x0) read$FUSE(r1, &(0x7f0000000700), 0xfce3) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0x0) 19:26:41 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xb6000000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="02000000030000000400000030000f000300040000000000000000000f008ec4", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000e1f4655fe2f4655fe2f4655f000000000000040008", 0x1d, 0x4200}, {&(0x7f0000012700)="20000000d4c49a2e07", 0x9, 0x4280}], 0x0, &(0x7f0000013a00)) 19:26:41 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)=ANY=[@ANYBLOB="300000001000070100dd2174ffff27de00000000", @ANYRES32=0x0, @ANYBLOB="000000000000000e20001b00000000000500100005"], 0x30}}, 0x0) 19:26:41 executing program 3: set_mempolicy(0x2, &(0x7f0000000000)=0x9, 0x90) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x4c032, 0xffffffffffffffff, 0x4a00000000000000) [ 649.753284] EXT4-fs (loop5): corrupt root inode, run e2fsck [ 649.767090] EXT4-fs (loop5): mount failed 19:26:41 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)=ANY=[@ANYBLOB="300000001000070100dd2174ffff27de00000000", @ANYRES32=0x0, @ANYBLOB="000000000000000c24001b00000000000500100005"], 0x30}}, 0x0) [ 649.815429] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.0'. [ 649.882026] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.0'. [ 650.016071] EXT4-fs (loop5): corrupt root inode, run e2fsck [ 650.024313] EXT4-fs (loop5): mount failed 19:26:42 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x94000000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="02000000030000000400000030000f000300040000000000000000000f008ec4", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000e1f4655fe2f4655fe2f4655f00000000000004", 0x1b, 0x4200}, {&(0x7f0000012700)="20000000d4c49a2e07", 0x9, 0x4280}], 0x0, &(0x7f0000013a00)) 19:26:42 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)=ANY=[@ANYBLOB="300000001000070100dd2174ffff27de00000000", @ANYRES32=0x0, @ANYBLOB="000000000000000e24001b00000000000500100005"], 0x30}}, 0x0) 19:26:42 executing program 3: set_mempolicy(0x2, &(0x7f0000000000)=0x9, 0x90) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x4c032, 0xffffffffffffffff, 0x4a01000000000000) 19:26:42 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xb6010000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="02000000030000000400000030000f000300040000000000000000000f008ec4", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000e1f4655fe2f4655fe2f4655f000000000000040008", 0x1d, 0x4200}, {&(0x7f0000012700)="20000000d4c49a2e07", 0x9, 0x4280}], 0x0, &(0x7f0000013a00)) 19:26:42 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xb0030000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="02000000030000000400000030000f000300040000000000000000000f008ec4", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000e1f4655fe2f4655fe2f4655f000000000000040008", 0x1d, 0x4200}, {&(0x7f0000012700)="20000000d4c49a2e07", 0x9, 0x4280}], 0x0, &(0x7f0000013a00)) 19:26:42 executing program 2: socket(0x11, 0x0, 0x0) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000300)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000180)='/dev/hwrng\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f0000000700), 0xfce3) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0x0) 19:26:42 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xb6020000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="02000000030000000400000030000f000300040000000000000000000f008ec4", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000e1f4655fe2f4655fe2f4655f000000000000040008", 0x1d, 0x4200}, {&(0x7f0000012700)="20000000d4c49a2e07", 0x9, 0x4280}], 0x0, &(0x7f0000013a00)) 19:26:42 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)=ANY=[@ANYBLOB="300000001000070100dd2174ffff27de00000000", @ANYRES32=0x0, @ANYBLOB="000000000000000025001b00000000000500100005"], 0x30}}, 0x0) 19:26:42 executing program 3: set_mempolicy(0x2, &(0x7f0000000000)=0x9, 0x90) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x4c032, 0xffffffffffffffff, 0x4b00000000000000) 19:26:42 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xb1000000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="02000000030000000400000030000f000300040000000000000000000f008ec4", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000e1f4655fe2f4655fe2f4655f000000000000040008", 0x1d, 0x4200}, {&(0x7f0000012700)="20000000d4c49a2e07", 0x9, 0x4280}], 0x0, &(0x7f0000013a00)) [ 650.363705] EXT4-fs (loop5): corrupt root inode, run e2fsck [ 650.411148] EXT4-fs (loop5): mount failed 19:26:42 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)=ANY=[@ANYBLOB="300000001000070100dd2174ffff27de00000000", @ANYRES32=0x0, @ANYBLOB="000000000000000928001b00000000000500100005"], 0x30}}, 0x0) 19:26:42 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x94010000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="02000000030000000400000030000f000300040000000000000000000f008ec4", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000e1f4655fe2f4655fe2f4655f00000000000004", 0x1b, 0x4200}, {&(0x7f0000012700)="20000000d4c49a2e07", 0x9, 0x4280}], 0x0, &(0x7f0000013a00)) 19:26:42 executing program 3: set_mempolicy(0x2, &(0x7f0000000000)=0x9, 0x90) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x4c032, 0xffffffffffffffff, 0x4b01000000000000) 19:26:42 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)=ANY=[@ANYBLOB="300000001000070100dd2174ffff27de00000000", @ANYRES32=0x0, @ANYBLOB="000000000000000c28001b00000000000500100005"], 0x30}}, 0x0) 19:26:42 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xb6030000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="02000000030000000400000030000f000300040000000000000000000f008ec4", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000e1f4655fe2f4655fe2f4655f000000000000040008", 0x1d, 0x4200}, {&(0x7f0000012700)="20000000d4c49a2e07", 0x9, 0x4280}], 0x0, &(0x7f0000013a00)) 19:26:42 executing program 2: socket(0x11, 0x0, 0x0) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000180)='/dev/hwrng\x00', 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x6}, 0x1496d, 0x0, 0x0, 0x7, 0x0, 0x0, 0x88}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open$cgroup(&(0x7f0000000280)={0x2, 0x70, 0x3, 0x80, 0x81, 0x2, 0x0, 0x9, 0x6c2, 0xb, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x5, 0x4, @perf_bp={&(0x7f0000000180), 0x6}, 0x41840, 0x40, 0xffffffff, 0x6, 0xf26d, 0x7, 0x3}, 0xffffffffffffffff, 0xffffffffffffffff, r1, 0x9) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xc0, 0x66, 0x5, 0x6, 0x0, 0x9, 0x0, 0x8, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x81, 0x1, @perf_bp, 0x510, 0x3ff, 0x9, 0x42c3425ba504fa5d, 0xe5a, 0x9, 0x6}, 0x0, 0xd, r1, 0x8) read$FUSE(r0, &(0x7f0000000700), 0xfce3) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0x0) 19:26:42 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xb1010000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="02000000030000000400000030000f000300040000000000000000000f008ec4", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000e1f4655fe2f4655fe2f4655f000000000000040008", 0x1d, 0x4200}, {&(0x7f0000012700)="20000000d4c49a2e07", 0x9, 0x4280}], 0x0, &(0x7f0000013a00)) 19:26:42 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xb1020000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="02000000030000000400000030000f000300040000000000000000000f008ec4", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000e1f4655fe2f4655fe2f4655f000000000000040008", 0x1d, 0x4200}, {&(0x7f0000012700)="20000000d4c49a2e07", 0x9, 0x4280}], 0x0, &(0x7f0000013a00)) 19:26:43 executing program 3: set_mempolicy(0x2, &(0x7f0000000000)=0x9, 0x90) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x4c032, 0xffffffffffffffff, 0x4c00000000000000) 19:26:43 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)=ANY=[@ANYBLOB="300000001000070100dd2174ffff27de00000000", @ANYRES32=0x0, @ANYBLOB="00000000000000092c001b00000000000500100005"], 0x30}}, 0x0) 19:26:43 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xb7000000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="02000000030000000400000030000f000300040000000000000000000f008ec4", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000e1f4655fe2f4655fe2f4655f000000000000040008", 0x1d, 0x4200}, {&(0x7f0000012700)="20000000d4c49a2e07", 0x9, 0x4280}], 0x0, &(0x7f0000013a00)) [ 650.922750] EXT4-fs (loop5): corrupt root inode, run e2fsck [ 650.951986] EXT4-fs (loop5): mount failed 19:26:43 executing program 3: set_mempolicy(0x2, &(0x7f0000000000)=0x9, 0x90) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x4c032, 0xffffffffffffffff, 0x4c01000000000000) 19:26:43 executing program 3: set_mempolicy(0x2, &(0x7f0000000000)=0x9, 0x90) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x4c032, 0xffffffffffffffff, 0x4d00000000000000) [ 651.163145] EXT4-fs (loop5): corrupt root inode, run e2fsck [ 651.169317] EXT4-fs (loop5): mount failed 19:26:43 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x94020000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="02000000030000000400000030000f000300040000000000000000000f008ec4", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000e1f4655fe2f4655fe2f4655f00000000000004", 0x1b, 0x4200}, {&(0x7f0000012700)="20000000d4c49a2e07", 0x9, 0x4280}], 0x0, &(0x7f0000013a00)) 19:26:43 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xb1030000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="02000000030000000400000030000f000300040000000000000000000f008ec4", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000e1f4655fe2f4655fe2f4655f000000000000040008", 0x1d, 0x4200}, {&(0x7f0000012700)="20000000d4c49a2e07", 0x9, 0x4280}], 0x0, &(0x7f0000013a00)) 19:26:43 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)=ANY=[@ANYBLOB="300000001000070100dd2174ffff27de00000000", @ANYRES32=0x0, @ANYBLOB="000000000000000c2c001b00000000000500100005"], 0x30}}, 0x0) 19:26:43 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)=ANY=[@ANYBLOB="300000001000070100dd2174ffff27de00000000", @ANYRES32=0x0, @ANYBLOB="000000000000000c30001b00000000000500100005"], 0x30}}, 0x0) 19:26:43 executing program 2: r0 = socket(0x11, 0x0, 0x0) socket(0x1e, 0x3, 0x1000) r1 = openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000180)='/dev/hwrng\x00', 0x0, 0x0) r3 = getpid() r4 = dup2(r0, r1) ioctl$KVM_CREATE_VM(r4, 0xae01, 0x0) ptrace$peeksig(0x4209, r3, &(0x7f00000003c0)={0x4, 0x0, 0x7}, &(0x7f0000000780)=[{}, {}, {}, {}, {}, {}, {}]) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3, 0x0, 0x3, 0xfd, 0x0, 0x10000, 0x420, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x100, 0x1, @perf_bp, 0x4000, 0x4, 0xd998, 0x5, 0x7, 0x1ff, 0x9}, r3, 0xf, 0xffffffffffffffff, 0x2) read$FUSE(r2, &(0x7f0000000700), 0xfce3) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0x0) 19:26:43 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)=ANY=[@ANYBLOB="300000001000070100dd2174ffff27de00000000", @ANYRES32=0x0, @ANYBLOB="000000000000000e30001b00000000000500100005"], 0x30}}, 0x0) 19:26:43 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xb7010000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="02000000030000000400000030000f000300040000000000000000000f008ec4", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000e1f4655fe2f4655fe2f4655f000000000000040008", 0x1d, 0x4200}, {&(0x7f0000012700)="20000000d4c49a2e07", 0x9, 0x4280}], 0x0, &(0x7f0000013a00)) 19:26:43 executing program 3: set_mempolicy(0x2, &(0x7f0000000000)=0x9, 0x90) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x4c032, 0xffffffffffffffff, 0x4d01000000000000) [ 651.434955] EXT4-fs (loop5): corrupt root inode, run e2fsck [ 651.448698] EXT4-fs (loop5): mount failed 19:26:43 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)=ANY=[@ANYBLOB="300000001000070100dd2174ffff27de00000000", @ANYRES32=0x0, @ANYBLOB="000000000000000c34001b00000000000500100005"], 0x30}}, 0x0) 19:26:43 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xb2000000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="02000000030000000400000030000f000300040000000000000000000f008ec4", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000e1f4655fe2f4655fe2f4655f000000000000040008", 0x1d, 0x4200}, {&(0x7f0000012700)="20000000d4c49a2e07", 0x9, 0x4280}], 0x0, &(0x7f0000013a00)) 19:26:43 executing program 3: set_mempolicy(0x2, &(0x7f0000000000)=0x9, 0x90) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x4c032, 0xffffffffffffffff, 0x4e00000000000000) [ 651.553314] EXT4-fs (loop5): corrupt root inode, run e2fsck [ 651.567939] EXT4-fs (loop5): mount failed 19:26:43 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)=ANY=[@ANYBLOB="300000001000070100dd2174ffff27de00000000", @ANYRES32=0x0, @ANYBLOB="000000000000000e34001b00000000000500100005"], 0x30}}, 0x0) 19:26:43 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x94030000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="02000000030000000400000030000f000300040000000000000000000f008ec4", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000e1f4655fe2f4655fe2f4655f00000000000004", 0x1b, 0x4200}, {&(0x7f0000012700)="20000000d4c49a2e07", 0x9, 0x4280}], 0x0, &(0x7f0000013a00)) 19:26:43 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xb7020000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="02000000030000000400000030000f000300040000000000000000000f008ec4", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000e1f4655fe2f4655fe2f4655f000000000000040008", 0x1d, 0x4200}, {&(0x7f0000012700)="20000000d4c49a2e07", 0x9, 0x4280}], 0x0, &(0x7f0000013a00)) 19:26:43 executing program 3: set_mempolicy(0x2, &(0x7f0000000000)=0x9, 0x90) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x4c032, 0xffffffffffffffff, 0x4e01000000000000) 19:26:43 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)=ANY=[@ANYBLOB="300000001000070100dd2174ffff27de00000000", @ANYRES32=0x0, @ANYBLOB="000000000000000c38001b00000000000500100005"], 0x30}}, 0x0) [ 651.880686] EXT4-fs (loop5): corrupt root inode, run e2fsck [ 651.919793] EXT4-fs (loop5): mount failed 19:26:44 executing program 2: socket(0x11, 0x0, 0x0) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x3, 0x70, 0x2f, 0x0, 0xd7, 0x1, 0x0, 0x2cb4, 0x48100, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x3, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0xce, 0x2, @perf_bp={&(0x7f0000000000), 0x5}, 0x10041, 0x2, 0x10000, 0x12a4f9cde3eb5b7a, 0x7fff, 0x2, 0x81}, 0x0, 0x5, r0, 0x8) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000180)='/dev/hwrng\x00', 0x0, 0x0) read$FUSE(r1, &(0x7f0000000700), 0xfce3) 19:26:44 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xb2010000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="02000000030000000400000030000f000300040000000000000000000f008ec4", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000e1f4655fe2f4655fe2f4655f000000000000040008", 0x1d, 0x4200}, {&(0x7f0000012700)="20000000d4c49a2e07", 0x9, 0x4280}], 0x0, &(0x7f0000013a00)) 19:26:44 executing program 3: set_mempolicy(0x2, &(0x7f0000000000)=0x9, 0x90) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x4c032, 0xffffffffffffffff, 0x4f00000000000000) 19:26:44 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x95000000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="02000000030000000400000030000f000300040000000000000000000f008ec4", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000e1f4655fe2f4655fe2f4655f00000000000004", 0x1b, 0x4200}, {&(0x7f0000012700)="20000000d4c49a2e07", 0x9, 0x4280}], 0x0, &(0x7f0000013a00)) 19:26:44 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xb7030000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="02000000030000000400000030000f000300040000000000000000000f008ec4", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000e1f4655fe2f4655fe2f4655f000000000000040008", 0x1d, 0x4200}, {&(0x7f0000012700)="20000000d4c49a2e07", 0x9, 0x4280}], 0x0, &(0x7f0000013a00)) 19:26:44 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)=ANY=[@ANYBLOB="300000001000070100dd2174ffff27de00000000", @ANYRES32=0x0, @ANYBLOB="000000000000000e38001b00000000000500100005"], 0x30}}, 0x0) 19:26:44 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)=ANY=[@ANYBLOB="300000001000070100dd2174ffff27de00000000", @ANYRES32=0x0, @ANYBLOB="000000000000000c3c001b00000000000500100005"], 0x30}}, 0x0) 19:26:44 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)=ANY=[@ANYBLOB="300000001000070100dd2174ffff27de00000000", @ANYRES32=0x0, @ANYBLOB="000000000000000e3c001b00000000000500100005"], 0x30}}, 0x0) 19:26:44 executing program 3: set_mempolicy(0x2, &(0x7f0000000000)=0x9, 0x90) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x4c032, 0xffffffffffffffff, 0x4f01000000000000) 19:26:44 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xb2020000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="02000000030000000400000030000f000300040000000000000000000f008ec4", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000e1f4655fe2f4655fe2f4655f000000000000040008", 0x1d, 0x4200}, {&(0x7f0000012700)="20000000d4c49a2e07", 0x9, 0x4280}], 0x0, &(0x7f0000013a00)) 19:26:44 executing program 3: set_mempolicy(0x2, &(0x7f0000000000)=0x9, 0x90) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x4c032, 0xffffffffffffffff, 0x5000000000000000) 19:26:44 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)=ANY=[@ANYBLOB="300000001000070100dd2174ffff27de00000000", @ANYRES32=0x0, @ANYBLOB="000000000000000040001b00000000000500100005"], 0x30}}, 0x0) [ 652.231590] EXT4-fs (loop5): corrupt root inode, run e2fsck [ 652.254229] EXT4-fs (loop5): mount failed [ 652.433030] EXT4-fs (loop5): corrupt root inode, run e2fsck [ 652.441194] EXT4-fs (loop5): mount failed 19:26:44 executing program 2: socket(0x11, 0x0, 0x0) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x3f, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext, 0x0, 0x0, 0x400, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000180)='/dev/hwrng\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f0000000700), 0xfce3) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0x0) 19:26:44 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xb8000000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="02000000030000000400000030000f000300040000000000000000000f008ec4", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000e1f4655fe2f4655fe2f4655f000000000000040008", 0x1d, 0x4200}, {&(0x7f0000012700)="20000000d4c49a2e07", 0x9, 0x4280}], 0x0, &(0x7f0000013a00)) 19:26:44 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)=ANY=[@ANYBLOB="300000001000070100dd2174ffff27de00000000", @ANYRES32=0x0, @ANYBLOB="000000000000000c40001b00000000000500100005"], 0x30}}, 0x0) 19:26:44 executing program 3: set_mempolicy(0x2, &(0x7f0000000000)=0x9, 0x90) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x4c032, 0xffffffffffffffff, 0x5001000000000000) 19:26:44 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xb2030000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="02000000030000000400000030000f000300040000000000000000000f008ec4", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000e1f4655fe2f4655fe2f4655f000000000000040008", 0x1d, 0x4200}, {&(0x7f0000012700)="20000000d4c49a2e07", 0x9, 0x4280}], 0x0, &(0x7f0000013a00)) 19:26:44 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x95010000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="02000000030000000400000030000f000300040000000000000000000f008ec4", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000e1f4655fe2f4655fe2f4655f00000000000004", 0x1b, 0x4200}, {&(0x7f0000012700)="20000000d4c49a2e07", 0x9, 0x4280}], 0x0, &(0x7f0000013a00)) 19:26:44 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)=ANY=[@ANYBLOB="300000001000070100dd2174ffff27de00000000", @ANYRES32=0x0, @ANYBLOB="000000000000000e40001b00000000000500100005"], 0x30}}, 0x0) 19:26:44 executing program 3: set_mempolicy(0x2, &(0x7f0000000000)=0x9, 0x90) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x4c032, 0xffffffffffffffff, 0x5100000000000000) 19:26:44 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)=ANY=[@ANYBLOB="300000001000070100dd2174ffff27de00000000", @ANYRES32=0x0, @ANYBLOB="000000000000000c44001b00000000000500100005"], 0x30}}, 0x0) 19:26:44 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xb8010000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="02000000030000000400000030000f000300040000000000000000000f008ec4", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000e1f4655fe2f4655fe2f4655f000000000000040008", 0x1d, 0x4200}, {&(0x7f0000012700)="20000000d4c49a2e07", 0x9, 0x4280}], 0x0, &(0x7f0000013a00)) 19:26:44 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xb3000000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="02000000030000000400000030000f000300040000000000000000000f008ec4", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000e1f4655fe2f4655fe2f4655f000000000000040008", 0x1d, 0x4200}, {&(0x7f0000012700)="20000000d4c49a2e07", 0x9, 0x4280}], 0x0, &(0x7f0000013a00)) 19:26:44 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)=ANY=[@ANYBLOB="300000001000070100dd2174ffff27de00000000", @ANYRES32=0x0, @ANYBLOB="000000000000000e44001b00000000000500100005"], 0x30}}, 0x0) [ 652.706961] EXT4-fs (loop5): corrupt root inode, run e2fsck [ 652.727277] EXT4-fs (loop5): mount failed [ 652.859772] EXT4-fs (loop5): corrupt root inode, run e2fsck [ 652.877608] EXT4-fs (loop5): mount failed 19:26:44 executing program 2: socket(0x11, 0x0, 0x0) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x4482, 0x0) read$FUSE(r0, &(0x7f0000000700), 0xfce3) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0x0) 19:26:44 executing program 3: set_mempolicy(0x2, &(0x7f0000000000)=0x9, 0x90) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x4c032, 0xffffffffffffffff, 0x5101000000000000) 19:26:44 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)=ANY=[@ANYBLOB="300000001000070100dd2174ffff27de00000000", @ANYRES32=0x0, @ANYBLOB="000000000000000c48001b00000000000500100005"], 0x30}}, 0x0) 19:26:44 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xb8020000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="02000000030000000400000030000f000300040000000000000000000f008ec4", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000e1f4655fe2f4655fe2f4655f000000000000040008", 0x1d, 0x4200}, {&(0x7f0000012700)="20000000d4c49a2e07", 0x9, 0x4280}], 0x0, &(0x7f0000013a00)) 19:26:44 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xb3010000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="02000000030000000400000030000f000300040000000000000000000f008ec4", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000e1f4655fe2f4655fe2f4655f000000000000040008", 0x1d, 0x4200}, {&(0x7f0000012700)="20000000d4c49a2e07", 0x9, 0x4280}], 0x0, &(0x7f0000013a00)) 19:26:44 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x95020000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="02000000030000000400000030000f000300040000000000000000000f008ec4", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000e1f4655fe2f4655fe2f4655f00000000000004", 0x1b, 0x4200}, {&(0x7f0000012700)="20000000d4c49a2e07", 0x9, 0x4280}], 0x0, &(0x7f0000013a00)) 19:26:45 executing program 3: set_mempolicy(0x2, &(0x7f0000000000)=0x9, 0x90) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x4c032, 0xffffffffffffffff, 0x5200000000000000) 19:26:45 executing program 2: socket(0x11, 0x0, 0x0) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x40010}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000180)='/dev/hwrng\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f0000000700), 0xfce3) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0x0) 19:26:45 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)=ANY=[@ANYBLOB="300000001000070100dd2174ffff27de00000000", @ANYRES32=0x0, @ANYBLOB="000000000000000e48001b00000000000500100005"], 0x30}}, 0x0) 19:26:45 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)=ANY=[@ANYBLOB="300000001000070100dd2174ffff27de00000000", @ANYRES32=0x0, @ANYBLOB="000000000000000c4c001b00000000000500100005"], 0x30}}, 0x0) 19:26:45 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)=ANY=[@ANYBLOB="300000001000070100dd2174ffff27de00000000", @ANYRES32=0x0, @ANYBLOB="000000000000000e4c001b00000000000500100005"], 0x30}}, 0x0) 19:26:45 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)=ANY=[@ANYBLOB="300000001000070100dd2174ffff27de00000000", @ANYRES32=0x0, @ANYBLOB="000000000000000b50001b00000000000500100005"], 0x30}}, 0x0) [ 653.117157] EXT4-fs (loop5): corrupt root inode, run e2fsck [ 653.140775] EXT4-fs (loop5): mount failed 19:26:45 executing program 3: set_mempolicy(0x2, &(0x7f0000000000)=0x9, 0x90) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x4c032, 0xffffffffffffffff, 0x5201000000000000) 19:26:45 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xb8030000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="02000000030000000400000030000f000300040000000000000000000f008ec4", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000e1f4655fe2f4655fe2f4655f000000000000040008", 0x1d, 0x4200}, {&(0x7f0000012700)="20000000d4c49a2e07", 0x9, 0x4280}], 0x0, &(0x7f0000013a00)) 19:26:45 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xb3020000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="02000000030000000400000030000f000300040000000000000000000f008ec4", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000e1f4655fe2f4655fe2f4655f000000000000040008", 0x1d, 0x4200}, {&(0x7f0000012700)="20000000d4c49a2e07", 0x9, 0x4280}], 0x0, &(0x7f0000013a00)) 19:26:45 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)=ANY=[@ANYBLOB="300000001000070100dd2174ffff27de00000000", @ANYRES32=0x0, @ANYBLOB="000000000000000c50001b00000000000500100005"], 0x30}}, 0x0) 19:26:45 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x95030000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="02000000030000000400000030000f000300040000000000000000000f008ec4", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000e1f4655fe2f4655fe2f4655f00000000000004", 0x1b, 0x4200}, {&(0x7f0000012700)="20000000d4c49a2e07", 0x9, 0x4280}], 0x0, &(0x7f0000013a00)) 19:26:45 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)=ANY=[@ANYBLOB="300000001000070100dd2174ffff27de00000000", @ANYRES32=0x0, @ANYBLOB="000000000000000e50001b00000000000500100005"], 0x30}}, 0x0) 19:26:45 executing program 3: set_mempolicy(0x2, &(0x7f0000000000)=0x9, 0x90) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x4c032, 0xffffffffffffffff, 0x5300000000000000) [ 653.447131] EXT4-fs (loop5): corrupt root inode, run e2fsck [ 653.515404] EXT4-fs (loop5): mount failed [ 653.661917] EXT4-fs (loop5): corrupt root inode, run e2fsck [ 653.671866] EXT4-fs (loop5): mount failed 19:26:45 executing program 3: set_mempolicy(0x2, &(0x7f0000000000)=0x9, 0x90) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x4c032, 0xffffffffffffffff, 0x5301000000000000) 19:26:45 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)=ANY=[@ANYBLOB="300000001000070100dd2174ffff27de00000000", @ANYRES32=0x0, @ANYBLOB="000000000000000b54001b00000000000500100005"], 0x30}}, 0x0) 19:26:45 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xb9000000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="02000000030000000400000030000f000300040000000000000000000f008ec4", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000e1f4655fe2f4655fe2f4655f000000000000040008", 0x1d, 0x4200}, {&(0x7f0000012700)="20000000d4c49a2e07", 0x9, 0x4280}], 0x0, &(0x7f0000013a00)) 19:26:45 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xb3030000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="02000000030000000400000030000f000300040000000000000000000f008ec4", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000e1f4655fe2f4655fe2f4655f000000000000040008", 0x1d, 0x4200}, {&(0x7f0000012700)="20000000d4c49a2e07", 0x9, 0x4280}], 0x0, &(0x7f0000013a00)) 19:26:45 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x96000000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="02000000030000000400000030000f000300040000000000000000000f008ec4", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000e1f4655fe2f4655fe2f4655f00000000000004", 0x1b, 0x4200}, {&(0x7f0000012700)="20000000d4c49a2e07", 0x9, 0x4280}], 0x0, &(0x7f0000013a00)) 19:26:45 executing program 2: socket(0x11, 0x0, 0x0) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000180)='/dev/hwrng\x00', 0x0, 0x0) r1 = socket$vsock_stream(0x28, 0x1, 0x0) r2 = dup(r1) r3 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x75f, 0x103382) r4 = memfd_create(&(0x7f0000000240)='.^\xc5', 0x0) pwritev(r4, &(0x7f0000000540)=[{&(0x7f0000000000)='B', 0x1}], 0x1, 0x81805, 0x0) ioctl$LOOP_CHANGE_FD(r3, 0x4c00, r4) dup(r4) connect$vsock_stream(r2, &(0x7f0000000000)={0x28, 0x0, 0x0, @my=0x0}, 0x10) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'tunl0\x00', &(0x7f0000000040)={'syztnl0\x00', 0x0, 0x20, 0x40, 0x3, 0x8, {{0x1a, 0x4, 0x3, 0x7, 0x68, 0x66, 0x0, 0x9, 0x2f, 0x0, @remote, @private=0xa010100, {[@ssrr={0x89, 0x1b, 0x96, [@private=0xa010100, @multicast2, @rand_addr=0x64010102, @multicast1, @loopback, @loopback]}, @lsrr={0x83, 0x2b, 0x7b, [@private=0xa010101, @rand_addr=0x64010101, @rand_addr=0x64010102, @broadcast, @dev={0xac, 0x14, 0x14, 0xa}, @remote, @loopback, @remote, @multicast1, @rand_addr=0x64010101]}, @ssrr={0x89, 0xb, 0xb7, [@loopback, @initdev={0xac, 0x1e, 0x0, 0x0}]}]}}}}}) sendmsg$nl_route(r2, &(0x7f0000000240)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000140)={&(0x7f00000001c0)=ANY=[@ANYBLOB="7c0000001900060426bd7000ffdbdf251d01020015000200010000c008020000f62fbae6bdc4f4450300000015000300030000e008010000b8cbf7850df7219d020000001500020004000085080100006ab40af526a4b8d60200000015000100030000e006030000ff1c3214786fd4c80700000008000a00", @ANYRES32=r5, @ANYBLOB], 0x7c}, 0x1, 0x0, 0x0, 0x4000}, 0x4000) read$FUSE(r0, &(0x7f0000000700), 0xfce3) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0x0) r6 = socket$vsock_stream(0x28, 0x1, 0x0) dup(r6) bind$vsock_stream(r6, &(0x7f0000000280)={0x28, 0x0, 0x2711, @host}, 0x10) 19:26:45 executing program 3: set_mempolicy(0x2, &(0x7f0000000000)=0x9, 0x90) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x4c032, 0xffffffffffffffff, 0x5400000000000000) 19:26:45 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)=ANY=[@ANYBLOB="300000001000070100dd2174ffff27de00000000", @ANYRES32=0x0, @ANYBLOB="000000000000000c54001b00000000000500100005"], 0x30}}, 0x0) 19:26:45 executing program 3: set_mempolicy(0x2, &(0x7f0000000000)=0x9, 0x90) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x4c032, 0xffffffffffffffff, 0x5401000000000000) 19:26:45 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)=ANY=[@ANYBLOB="300000001000070100dd2174ffff27de00000000", @ANYRES32=0x0, @ANYBLOB="000000000000000e54001b00000000000500100005"], 0x30}}, 0x0) [ 653.910995] nla_parse: 26 callbacks suppressed [ 653.911006] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.0'. [ 653.971785] EXT4-fs mount: 108 callbacks suppressed [ 653.971801] EXT4-fs (loop1): mounted filesystem without journal. Opts: ,errors=continue [ 653.973085] EXT4-fs (loop5): corrupt root inode, run e2fsck [ 653.997336] EXT4-fs (loop5): mount failed [ 654.008206] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue 19:26:46 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x96010000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="02000000030000000400000030000f000300040000000000000000000f008ec4", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000e1f4655fe2f4655fe2f4655f00000000000004", 0x1b, 0x4200}, {&(0x7f0000012700)="20000000d4c49a2e07", 0x9, 0x4280}], 0x0, &(0x7f0000013a00)) 19:26:46 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xb4000000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="02000000030000000400000030000f000300040000000000000000000f008ec4", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000e1f4655fe2f4655fe2f4655f000000000000040008", 0x1d, 0x4200}, {&(0x7f0000012700)="20000000d4c49a2e07", 0x9, 0x4280}], 0x0, &(0x7f0000013a00)) [ 654.064630] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.0'. 19:26:46 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xb9010000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="02000000030000000400000030000f000300040000000000000000000f008ec4", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000e1f4655fe2f4655fe2f4655f000000000000040008", 0x1d, 0x4200}, {&(0x7f0000012700)="20000000d4c49a2e07", 0x9, 0x4280}], 0x0, &(0x7f0000013a00)) 19:26:46 executing program 3: set_mempolicy(0x2, &(0x7f0000000000)=0x9, 0x90) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x4c032, 0xffffffffffffffff, 0x5500000000000000) 19:26:46 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)=ANY=[@ANYBLOB="300000001000070100dd2174ffff27de00000000", @ANYRES32=0x0, @ANYBLOB="000000000000000c58001b00000000000500100005"], 0x30}}, 0x0) [ 654.176204] EXT4-fs (loop5): corrupt root inode, run e2fsck [ 654.212701] EXT4-fs (loop1): mounted filesystem without journal. Opts: ,errors=continue [ 654.227064] EXT4-fs (loop5): mount failed [ 654.260257] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.0'. 19:26:46 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)=ANY=[@ANYBLOB="300000001000070100dd2174ffff27de00000000", @ANYRES32=0x0, @ANYBLOB="000000000000000e58001b00000000000500100005"], 0x30}}, 0x0) 19:26:46 executing program 3: set_mempolicy(0x2, &(0x7f0000000000)=0x9, 0x90) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x4c032, 0xffffffffffffffff, 0x5501000000000000) [ 654.357300] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue [ 654.389115] EXT4-fs (loop5): corrupt root inode, run e2fsck [ 654.421827] EXT4-fs (loop5): mount failed [ 654.430883] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.0'. 19:26:46 executing program 3: set_mempolicy(0x2, &(0x7f0000000000)=0x9, 0x90) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x4c032, 0xffffffffffffffff, 0x5600000000000000) 19:26:46 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xb4010000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="02000000030000000400000030000f000300040000000000000000000f008ec4", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000e1f4655fe2f4655fe2f4655f000000000000040008", 0x1d, 0x4200}, {&(0x7f0000012700)="20000000d4c49a2e07", 0x9, 0x4280}], 0x0, &(0x7f0000013a00)) 19:26:46 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xb9020000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="02000000030000000400000030000f000300040000000000000000000f008ec4", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000e1f4655fe2f4655fe2f4655f000000000000040008", 0x1d, 0x4200}, {&(0x7f0000012700)="20000000d4c49a2e07", 0x9, 0x4280}], 0x0, &(0x7f0000013a00)) 19:26:46 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)=ANY=[@ANYBLOB="300000001000070100dd2174ffff27de00000000", @ANYRES32=0x0, @ANYBLOB="000000000000000b5c001b00000000000500100005"], 0x30}}, 0x0) 19:26:46 executing program 2: socket(0x11, 0x0, 0x0) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000180)='/dev/hwrng\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f0000000700), 0xfce3) r1 = socket$vsock_stream(0x28, 0x1, 0x0) r2 = dup(r1) connect$vsock_stream(r2, &(0x7f0000000000)={0x28, 0x0, 0x0, @my=0x0}, 0x10) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r0, &(0x7f0000000000)={0x80002000}) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0x0) 19:26:46 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x96020000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="02000000030000000400000030000f000300040000000000000000000f008ec4", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000e1f4655fe2f4655fe2f4655f00000000000004", 0x1b, 0x4200}, {&(0x7f0000012700)="20000000d4c49a2e07", 0x9, 0x4280}], 0x0, &(0x7f0000013a00)) [ 654.709880] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.0'. [ 654.744632] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue 19:26:46 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)=ANY=[@ANYBLOB="300000001000070100dd2174ffff27de00000000", @ANYRES32=0x0, @ANYBLOB="000000000000000c5c001b00000000000500100005"], 0x30}}, 0x0) [ 654.751449] EXT4-fs (loop1): mounted filesystem without journal. Opts: ,errors=continue 19:26:46 executing program 3: set_mempolicy(0x2, &(0x7f0000000000)=0x9, 0x90) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x4c032, 0xffffffffffffffff, 0x5601000000000000) 19:26:46 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xb9030000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="02000000030000000400000030000f000300040000000000000000000f008ec4", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000e1f4655fe2f4655fe2f4655f000000000000040008", 0x1d, 0x4200}, {&(0x7f0000012700)="20000000d4c49a2e07", 0x9, 0x4280}], 0x0, &(0x7f0000013a00)) [ 654.840207] EXT4-fs (loop5): corrupt root inode, run e2fsck [ 654.848010] EXT4-fs (loop5): mount failed 19:26:46 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xb4020000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="02000000030000000400000030000f000300040000000000000000000f008ec4", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000e1f4655fe2f4655fe2f4655f000000000000040008", 0x1d, 0x4200}, {&(0x7f0000012700)="20000000d4c49a2e07", 0x9, 0x4280}], 0x0, &(0x7f0000013a00)) [ 654.881164] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.0'. 19:26:47 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x96030000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="02000000030000000400000030000f000300040000000000000000000f008ec4", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000e1f4655fe2f4655fe2f4655f00000000000004", 0x1b, 0x4200}, {&(0x7f0000012700)="20000000d4c49a2e07", 0x9, 0x4280}], 0x0, &(0x7f0000013a00)) 19:26:47 executing program 3: set_mempolicy(0x2, &(0x7f0000000000)=0x9, 0x90) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x4c032, 0xffffffffffffffff, 0x5700000000000000) 19:26:47 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)=ANY=[@ANYBLOB="300000001000070100dd2174ffff27de00000000", @ANYRES32=0x0, @ANYBLOB="000000000000000e5c001b00000000000500100005"], 0x30}}, 0x0) 19:26:47 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)=ANY=[@ANYBLOB="300000001000070100dd2174ffff27de00000000", @ANYRES32=0x0, @ANYBLOB="000000000000000960001b00000000000500100005"], 0x30}}, 0x0) [ 655.017714] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.0'. [ 655.081423] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue [ 655.131720] EXT4-fs (loop5): corrupt root inode, run e2fsck 19:26:47 executing program 3: set_mempolicy(0x2, &(0x7f0000000000)=0x9, 0x90) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x4c032, 0xffffffffffffffff, 0x5701000000000000) [ 655.181626] EXT4-fs (loop5): mount failed [ 655.184218] EXT4-fs (loop1): mounted filesystem without journal. Opts: ,errors=continue [ 655.207077] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.0'. 19:26:47 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xba000000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="02000000030000000400000030000f000300040000000000000000000f008ec4", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000e1f4655fe2f4655fe2f4655f000000000000040008", 0x1d, 0x4200}, {&(0x7f0000012700)="20000000d4c49a2e07", 0x9, 0x4280}], 0x0, &(0x7f0000013a00)) 19:26:47 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xb4030000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="02000000030000000400000030000f000300040000000000000000000f008ec4", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000e1f4655fe2f4655fe2f4655f000000000000040008", 0x1d, 0x4200}, {&(0x7f0000012700)="20000000d4c49a2e07", 0x9, 0x4280}], 0x0, &(0x7f0000013a00)) 19:26:47 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x97000000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="02000000030000000400000030000f000300040000000000000000000f008ec4", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000e1f4655fe2f4655fe2f4655f00000000000004", 0x1b, 0x4200}, {&(0x7f0000012700)="20000000d4c49a2e07", 0x9, 0x4280}], 0x0, &(0x7f0000013a00)) 19:26:47 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)=ANY=[@ANYBLOB="300000001000070100dd2174ffff27de00000000", @ANYRES32=0x0, @ANYBLOB="000000000000000b60001b00000000000500100005"], 0x30}}, 0x0) 19:26:47 executing program 3: set_mempolicy(0x2, &(0x7f0000000000)=0x9, 0x90) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x4c032, 0xffffffffffffffff, 0x5800000000000000) [ 655.401716] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue 19:26:47 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xba010000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="02000000030000000400000030000f000300040000000000000000000f008ec4", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000e1f4655fe2f4655fe2f4655f000000000000040008", 0x1d, 0x4200}, {&(0x7f0000012700)="20000000d4c49a2e07", 0x9, 0x4280}], 0x0, &(0x7f0000013a00)) 19:26:47 executing program 2: socket(0x11, 0x0, 0x0) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x2, 0x0, 0x80000000050d, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000000), 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000180)='/dev/hwrng\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f0000000700), 0xfce3) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0x0) r1 = perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x8}, 0x1496d, 0x0, 0x0, 0x7, 0x0, 0x0, 0x88}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open$cgroup(&(0x7f0000000280)={0x2, 0x70, 0x3, 0x80, 0x81, 0x2, 0x0, 0x9, 0x6c2, 0xb, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x5, 0x4, @perf_bp={&(0x7f0000000180), 0x6}, 0x41840, 0x40, 0xffffffff, 0x6, 0xf26d, 0x7, 0x3}, 0xffffffffffffffff, 0xffffffffffffffff, r1, 0x9) splice(r1, &(0x7f0000000040)=0x8, r0, &(0x7f0000000080)=0x3, 0xc5, 0x4) [ 655.498500] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.0'. [ 655.535561] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue 19:26:47 executing program 3: set_mempolicy(0x2, &(0x7f0000000000)=0x9, 0x90) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x4c032, 0xffffffffffffffff, 0x5801000000000000) [ 655.537247] EXT4-fs (loop5): corrupt root inode, run e2fsck 19:26:47 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)=ANY=[@ANYBLOB="300000001000070100dd2174ffff27de00000000", @ANYRES32=0x0, @ANYBLOB="000000000000000c60001b00000000000500100005"], 0x30}}, 0x0) 19:26:47 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xba020000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="02000000030000000400000030000f000300040000000000000000000f008ec4", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000e1f4655fe2f4655fe2f4655f000000000000040008", 0x1d, 0x4200}, {&(0x7f0000012700)="20000000d4c49a2e07", 0x9, 0x4280}], 0x0, &(0x7f0000013a00)) [ 655.579939] EXT4-fs (loop1): mounted filesystem without journal. Opts: ,errors=continue [ 655.600539] EXT4-fs (loop5): mount failed 19:26:47 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xb5000000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="02000000030000000400000030000f000300040000000000000000000f008ec4", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000e1f4655fe2f4655fe2f4655f000000000000040008", 0x1d, 0x4200}, {&(0x7f0000012700)="20000000d4c49a2e07", 0x9, 0x4280}], 0x0, &(0x7f0000013a00)) 19:26:47 executing program 3: set_mempolicy(0x2, &(0x7f0000000000)=0x9, 0x90) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x4c032, 0xffffffffffffffff, 0x5900000000000000) 19:26:47 executing program 2: r0 = socket(0x11, 0x0, 0x0) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpeername$packet(r0, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f00000000c0)=0x14) sendmsg$nl_route(r0, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000280)={&(0x7f00000001c0)=@ipv4_deladdr={0x98, 0x15, 0x10, 0x70bd28, 0x25dfdbfd, {0x2, 0x10, 0x4c, 0x0, r1}, [@IFA_LABEL={0x14, 0x3, 'netdevsim0\x00'}, @IFA_FLAGS={0x8, 0x8, 0x8}, @IFA_FLAGS={0x8, 0x8, 0x2}, @IFA_CACHEINFO={0x14, 0x6, {0x1, 0x3, 0x3, 0xc03f}}, @IFA_LABEL={0x14, 0x3, 'nr0\x00'}, @IFA_ADDRESS={0x8, 0x1, @loopback}, @IFA_LOCAL={0x8, 0x2, @multicast2}, @IFA_FLAGS={0x8, 0x8, 0x770}, @IFA_LABEL={0x14, 0x3, 'bridge_slave_0\x00'}, @IFA_ADDRESS={0x8, 0x1, @loopback}]}, 0x98}}, 0x8114) r2 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000180)='/dev/hwrng\x00', 0x0, 0x0) read$FUSE(r2, &(0x7f0000000700), 0xfce3) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0x0) accept4(r2, 0x0, &(0x7f0000000040), 0x80800) 19:26:47 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)=ANY=[@ANYBLOB="300000001000070100dd2174ffff27de00000000", @ANYRES32=0x0, @ANYBLOB="000000000000000e60001b00000000000500100005"], 0x30}}, 0x0) [ 655.650967] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.0'. [ 655.764016] EXT4-fs (loop5): corrupt root inode, run e2fsck [ 655.774108] EXT4-fs (loop5): mount failed [ 655.792194] EXT4-fs (loop1): mounted filesystem without journal. Opts: ,errors=continue 19:26:47 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x97010000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="02000000030000000400000030000f000300040000000000000000000f008ec4", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000e1f4655fe2f4655fe2f4655f00000000000004", 0x1b, 0x4200}, {&(0x7f0000012700)="20000000d4c49a2e07", 0x9, 0x4280}], 0x0, &(0x7f0000013a00)) 19:26:47 executing program 3: set_mempolicy(0x2, &(0x7f0000000000)=0x9, 0x90) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x4c032, 0xffffffffffffffff, 0x5901000000000000) 19:26:47 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)=ANY=[@ANYBLOB="300000001000070100dd2174ffff27de00000000", @ANYRES32=0x0, @ANYBLOB="000000000000000c64001b00000000000500100005"], 0x30}}, 0x0) 19:26:47 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xb5010000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="02000000030000000400000030000f000300040000000000000000000f008ec4", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000e1f4655fe2f4655fe2f4655f000000000000040008", 0x1d, 0x4200}, {&(0x7f0000012700)="20000000d4c49a2e07", 0x9, 0x4280}], 0x0, &(0x7f0000013a00)) [ 655.885909] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue [ 655.952371] EXT4-fs (loop5): corrupt root inode, run e2fsck 19:26:48 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xba030000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="02000000030000000400000030000f000300040000000000000000000f008ec4", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000e1f4655fe2f4655fe2f4655f000000000000040008", 0x1d, 0x4200}, {&(0x7f0000012700)="20000000d4c49a2e07", 0x9, 0x4280}], 0x0, &(0x7f0000013a00)) 19:26:48 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)=ANY=[@ANYBLOB="300000001000070100dd2174ffff27de00000000", @ANYRES32=0x0, @ANYBLOB="000000000000000e64001b00000000000500100005"], 0x30}}, 0x0) [ 656.012875] EXT4-fs (loop5): mount failed 19:26:48 executing program 3: set_mempolicy(0x2, &(0x7f0000000000)=0x9, 0x90) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x4c032, 0xffffffffffffffff, 0x5a00000000000000) 19:26:48 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)=ANY=[@ANYBLOB="300000001000070100dd2174ffff27de00000000", @ANYRES32=0x0, @ANYBLOB="000000000000000c68001b00000000000500100005"], 0x30}}, 0x0) 19:26:48 executing program 2: socket(0x11, 0x0, 0x0) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x8}, 0x1496d, 0x0, 0x0, 0x7, 0x0, 0x0, 0x88}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open$cgroup(&(0x7f0000000280)={0x2, 0x70, 0x3, 0x80, 0x81, 0x2, 0x0, 0x9, 0x6c2, 0xb, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x5, 0x4, @perf_bp={&(0x7f0000000180), 0x6}, 0x41840, 0x40, 0xffffffff, 0x6, 0xf26d, 0x7, 0x3}, 0xffffffffffffffff, 0xffffffffffffffff, r0, 0x9) ioctl$F2FS_IOC_DEFRAGMENT(r0, 0xc010f508, &(0x7f0000000000)={0x800, 0x5}) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000180)='/dev/hwrng\x00', 0x0, 0x0) sendmsg$DEVLINK_CMD_TRAP_GET(r1, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000100)={&(0x7f0000000080)={0x4c, 0x0, 0x122, 0x70bd26, 0x25dfdbfd, {}, [{@pci={{0x8, 0x1, 'pci\x00'}, {0x11, 0x2, '0000:00:10.0\x00'}}, {0x1c, 0x82, 'source_mac_is_multicast\x00'}}]}, 0x4c}, 0x1, 0x0, 0x0, 0x40c0}, 0xc080) read$FUSE(r1, &(0x7f0000000700), 0xfce3) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0x0) [ 656.095513] EXT4-fs (loop1): mounted filesystem without journal. Opts: ,errors=continue 19:26:48 executing program 3: set_mempolicy(0x2, &(0x7f0000000000)=0x9, 0x90) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x4c032, 0xffffffffffffffff, 0x5a01000000000000) 19:26:48 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)=ANY=[@ANYBLOB="300000001000070100dd2174ffff27de00000000", @ANYRES32=0x0, @ANYBLOB="000000000000000e68001b00000000000500100005"], 0x30}}, 0x0) 19:26:48 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xb5020000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="02000000030000000400000030000f000300040000000000000000000f008ec4", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000e1f4655fe2f4655fe2f4655f000000000000040008", 0x1d, 0x4200}, {&(0x7f0000012700)="20000000d4c49a2e07", 0x9, 0x4280}], 0x0, &(0x7f0000013a00)) [ 656.192554] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue 19:26:48 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x97020000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="02000000030000000400000030000f000300040000000000000000000f008ec4", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000e1f4655fe2f4655fe2f4655f00000000000004", 0x1b, 0x4200}, {&(0x7f0000012700)="20000000d4c49a2e07", 0x9, 0x4280}], 0x0, &(0x7f0000013a00)) 19:26:48 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)=ANY=[@ANYBLOB="300000001000070100dd2174ffff27de00000000", @ANYRES32=0x0, @ANYBLOB="000000000000000c6c001b00000000000500100005"], 0x30}}, 0x0) 19:26:48 executing program 3: set_mempolicy(0x2, &(0x7f0000000000)=0x9, 0x90) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x4c032, 0xffffffffffffffff, 0x5b00000000000000) 19:26:48 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xbb000000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="02000000030000000400000030000f000300040000000000000000000f008ec4", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000e1f4655fe2f4655fe2f4655f000000000000040008", 0x1d, 0x4200}, {&(0x7f0000012700)="20000000d4c49a2e07", 0x9, 0x4280}], 0x0, &(0x7f0000013a00)) [ 656.340853] EXT4-fs (loop5): corrupt root inode, run e2fsck [ 656.369713] EXT4-fs (loop5): mount failed 19:26:48 executing program 3: set_mempolicy(0x2, &(0x7f0000000000)=0x9, 0x90) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x4c032, 0xffffffffffffffff, 0x5b01000000000000) 19:26:48 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)=ANY=[@ANYBLOB="300000001000070100dd2174ffff27de00000000", @ANYRES32=0x0, @ANYBLOB="000000000000000e6c001b00000000000500100005"], 0x30}}, 0x0) [ 656.421988] EXT4-fs (loop1): mounted filesystem without journal. Opts: ,errors=continue 19:26:48 executing program 3: set_mempolicy(0x2, &(0x7f0000000000)=0x9, 0x90) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x4c032, 0xffffffffffffffff, 0x5c00000000000000) [ 656.571445] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue 19:26:48 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x97030000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="02000000030000000400000030000f000300040000000000000000000f008ec4", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000e1f4655fe2f4655fe2f4655f00000000000004", 0x1b, 0x4200}, {&(0x7f0000012700)="20000000d4c49a2e07", 0x9, 0x4280}], 0x0, &(0x7f0000013a00)) 19:26:48 executing program 2: socket(0x11, 0x0, 0x0) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000180)='/dev/hwrng\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f0000000700), 0xfce3) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0x0) r1 = socket$vsock_stream(0x28, 0x1, 0x0) r2 = dup(r1) connect$vsock_stream(r2, &(0x7f0000000000)={0x28, 0x0, 0x0, @my=0x0}, 0x10) bind$netlink(r2, &(0x7f0000000000)={0x10, 0x0, 0x25dfdbff, 0x2000}, 0xc) 19:26:48 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xb5030000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="02000000030000000400000030000f000300040000000000000000000f008ec4", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000e1f4655fe2f4655fe2f4655f000000000000040008", 0x1d, 0x4200}, {&(0x7f0000012700)="20000000d4c49a2e07", 0x9, 0x4280}], 0x0, &(0x7f0000013a00)) 19:26:48 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xbb010000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="02000000030000000400000030000f000300040000000000000000000f008ec4", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000e1f4655fe2f4655fe2f4655f000000000000040008", 0x1d, 0x4200}, {&(0x7f0000012700)="20000000d4c49a2e07", 0x9, 0x4280}], 0x0, &(0x7f0000013a00)) 19:26:48 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)=ANY=[@ANYBLOB="300000001000070100dd2174ffff27de00000000", @ANYRES32=0x0, @ANYBLOB="000000000000000b70001b00000000000500100005"], 0x30}}, 0x0) 19:26:48 executing program 3: set_mempolicy(0x2, &(0x7f0000000000)=0x9, 0x90) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x4c032, 0xffffffffffffffff, 0x5c01000000000000) [ 656.779513] EXT4-fs (loop5): corrupt root inode, run e2fsck [ 656.807560] EXT4-fs (loop5): mount failed 19:26:48 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)=ANY=[@ANYBLOB="300000001000070100dd2174ffff27de00000000", @ANYRES32=0x0, @ANYBLOB="000000000000000c70001b00000000000500100005"], 0x30}}, 0x0) 19:26:48 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x98000000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="02000000030000000400000030000f000300040000000000000000000f008ec4", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000e1f4655fe2f4655fe2f4655f00000000000004", 0x1b, 0x4200}, {&(0x7f0000012700)="20000000d4c49a2e07", 0x9, 0x4280}], 0x0, &(0x7f0000013a00)) 19:26:48 executing program 3: set_mempolicy(0x2, &(0x7f0000000000)=0x9, 0x90) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x4c032, 0xffffffffffffffff, 0x5d00000000000000) [ 656.935880] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue [ 656.985996] EXT4-fs (loop1): mounted filesystem without journal. Opts: ,errors=continue [ 657.105437] EXT4-fs (loop5): corrupt root inode, run e2fsck 19:26:49 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)=ANY=[@ANYBLOB="300000001000070100dd2174ffff27de00000000", @ANYRES32=0x0, @ANYBLOB="000000000000000e70001b00000000000500100005"], 0x30}}, 0x0) 19:26:49 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xbb020000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="02000000030000000400000030000f000300040000000000000000000f008ec4", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000e1f4655fe2f4655fe2f4655f000000000000040008", 0x1d, 0x4200}, {&(0x7f0000012700)="20000000d4c49a2e07", 0x9, 0x4280}], 0x0, &(0x7f0000013a00)) 19:26:49 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xb6000000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="02000000030000000400000030000f000300040000000000000000000f008ec4", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000e1f4655fe2f4655fe2f4655f000000000000040008", 0x1d, 0x4200}, {&(0x7f0000012700)="20000000d4c49a2e07", 0x9, 0x4280}], 0x0, &(0x7f0000013a00)) [ 657.132740] EXT4-fs (loop5): mount failed 19:26:49 executing program 3: set_mempolicy(0x2, &(0x7f0000000000)=0x9, 0x90) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x4c032, 0xffffffffffffffff, 0x5d01000000000000) [ 657.354156] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue 19:26:49 executing program 2: socket(0x28, 0x80000, 0x8105) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x1, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, @perf_bp={&(0x7f0000000000), 0x4}, 0x800}, 0x0, 0x7, 0xffffffffffffffff, 0x0) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000180)='/dev/hwrng\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f0000000700), 0xfce3) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0x0) 19:26:49 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)=ANY=[@ANYBLOB="300000001000070100dd2174ffff27de00000000", @ANYRES32=0x0, @ANYBLOB="000000000000000c74001b00000000000500100005"], 0x30}}, 0x0) 19:26:49 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xb6010000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="02000000030000000400000030000f000300040000000000000000000f008ec4", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000e1f4655fe2f4655fe2f4655f000000000000040008", 0x1d, 0x4200}, {&(0x7f0000012700)="20000000d4c49a2e07", 0x9, 0x4280}], 0x0, &(0x7f0000013a00)) 19:26:49 executing program 3: set_mempolicy(0x2, &(0x7f0000000000)=0x9, 0x90) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x4c032, 0xffffffffffffffff, 0x5e00000000000000) 19:26:49 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x98010000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="02000000030000000400000030000f000300040000000000000000000f008ec4", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000e1f4655fe2f4655fe2f4655f00000000000004", 0x1b, 0x4200}, {&(0x7f0000012700)="20000000d4c49a2e07", 0x9, 0x4280}], 0x0, &(0x7f0000013a00)) 19:26:49 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xbb030000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="02000000030000000400000030000f000300040000000000000000000f008ec4", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000e1f4655fe2f4655fe2f4655f000000000000040008", 0x1d, 0x4200}, {&(0x7f0000012700)="20000000d4c49a2e07", 0x9, 0x4280}], 0x0, &(0x7f0000013a00)) 19:26:49 executing program 3: set_mempolicy(0x2, &(0x7f0000000000)=0x9, 0x90) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x4c032, 0xffffffffffffffff, 0x5e01000000000000) 19:26:49 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)=ANY=[@ANYBLOB="300000001000070100dd2174ffff27de00000000", @ANYRES32=0x0, @ANYBLOB="000000000000000e74001b00000000000500100005"], 0x30}}, 0x0) [ 657.609670] EXT4-fs (loop1): mounted filesystem without journal. Opts: ,errors=continue [ 657.630173] EXT4-fs (loop5): corrupt root inode, run e2fsck [ 657.666531] EXT4-fs (loop5): mount failed 19:26:49 executing program 3: set_mempolicy(0x2, &(0x7f0000000000)=0x9, 0x90) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x4c032, 0xffffffffffffffff, 0x5f00000000000000) 19:26:49 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xb6020000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="02000000030000000400000030000f000300040000000000000000000f008ec4", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000e1f4655fe2f4655fe2f4655f000000000000040008", 0x1d, 0x4200}, {&(0x7f0000012700)="20000000d4c49a2e07", 0x9, 0x4280}], 0x0, &(0x7f0000013a00)) 19:26:49 executing program 2: socket(0x11, 0x0, 0x0) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x4, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000180)='/dev/hwrng\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f0000000700), 0xfce3) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0x0) [ 657.701618] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue 19:26:49 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)=ANY=[@ANYBLOB="300000001000070100dd2174ffff27de00000000", @ANYRES32=0x0, @ANYBLOB="000000000000000c78001b00000000000500100005"], 0x30}}, 0x0) 19:26:49 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xbc000000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="02000000030000000400000030000f000300040000000000000000000f008ec4", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000e1f4655fe2f4655fe2f4655f000000000000040008", 0x1d, 0x4200}, {&(0x7f0000012700)="20000000d4c49a2e07", 0x9, 0x4280}], 0x0, &(0x7f0000013a00)) [ 657.807174] EXT4-fs (loop5): corrupt root inode, run e2fsck [ 657.838533] EXT4-fs (loop5): mount failed 19:26:49 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)=ANY=[@ANYBLOB="300000001000070100dd2174ffff27de00000000", @ANYRES32=0x0, @ANYBLOB="000000000000000e78001b00000000000500100005"], 0x30}}, 0x0) 19:26:49 executing program 3: set_mempolicy(0x2, &(0x7f0000000000)=0x9, 0x90) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x4c032, 0xffffffffffffffff, 0x5f01000000000000) 19:26:50 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)=ANY=[@ANYBLOB="300000001000070100dd2174ffff27de00000000", @ANYRES32=0x0, @ANYBLOB="000000000000000c7c001b00000000000500100005"], 0x30}}, 0x0) 19:26:50 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x98020000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="02000000030000000400000030000f000300040000000000000000000f008ec4", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000e1f4655fe2f4655fe2f4655f00000000000004", 0x1b, 0x4200}, {&(0x7f0000012700)="20000000d4c49a2e07", 0x9, 0x4280}], 0x0, &(0x7f0000013a00)) 19:26:50 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)=ANY=[@ANYBLOB="300000001000070100dd2174ffff27de00000000", @ANYRES32=0x0, @ANYBLOB="000000000000000e7c001b00000000000500100005"], 0x30}}, 0x0) [ 658.021311] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue [ 658.049733] EXT4-fs (loop1): mounted filesystem without journal. Opts: ,errors=continue 19:26:50 executing program 2: socket(0x11, 0x0, 0x0) r0 = getpid() ptrace$peeksig(0x4209, r0, &(0x7f00000003c0)={0x4, 0x0, 0x7}, &(0x7f0000000780)=[{}, {}, {}, {}, {}, {}, {}]) perf_event_open(&(0x7f0000000000)={0x4, 0x70, 0x27, 0x12, 0x1, 0x0, 0x0, 0xdb, 0x23440, 0x9, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x80000001, 0x1, @perf_config_ext={0xffff, 0x100000000}, 0x688, 0x4000000100000001, 0x6f, 0x0, 0x1, 0x26eb, 0x5}, r0, 0x2, 0xffffffffffffffff, 0x8) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000180)='/dev/hwrng\x00', 0x0, 0x0) read$FUSE(r1, &(0x7f0000000700), 0xfce3) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0x0) 19:26:50 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xbc010000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="02000000030000000400000030000f000300040000000000000000000f008ec4", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000e1f4655fe2f4655fe2f4655f000000000000040008", 0x1d, 0x4200}, {&(0x7f0000012700)="20000000d4c49a2e07", 0x9, 0x4280}], 0x0, &(0x7f0000013a00)) 19:26:50 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xb6030000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="02000000030000000400000030000f000300040000000000000000000f008ec4", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000e1f4655fe2f4655fe2f4655f000000000000040008", 0x1d, 0x4200}, {&(0x7f0000012700)="20000000d4c49a2e07", 0x9, 0x4280}], 0x0, &(0x7f0000013a00)) 19:26:50 executing program 3: set_mempolicy(0x2, &(0x7f0000000000)=0x9, 0x90) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x4c032, 0xffffffffffffffff, 0x6000000000000000) 19:26:50 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)=ANY=[@ANYBLOB="300000001000070100dd2174ffff27de00000000", @ANYRES32=0x0, @ANYBLOB="000000000000000c80001b00000000000500100005"], 0x30}}, 0x0) 19:26:50 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)=ANY=[@ANYBLOB="300000001000070100dd2174ffff27de00000000", @ANYRES32=0x0, @ANYBLOB="000000000000000e80001b00000000000500100005"], 0x30}}, 0x0) [ 658.274560] EXT4-fs (loop5): corrupt root inode, run e2fsck [ 658.281685] EXT4-fs (loop5): mount failed [ 658.373707] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue [ 658.381852] EXT4-fs (loop1): mounted filesystem without journal. Opts: ,errors=continue 19:26:50 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x98030000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="02000000030000000400000030000f000300040000000000000000000f008ec4", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000e1f4655fe2f4655fe2f4655f00000000000004", 0x1b, 0x4200}, {&(0x7f0000012700)="20000000d4c49a2e07", 0x9, 0x4280}], 0x0, &(0x7f0000013a00)) 19:26:50 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)=ANY=[@ANYBLOB="300000001000070100dd2174ffff27de00000000", @ANYRES32=0x0, @ANYBLOB="000000000000000c84001b00000000000500100005"], 0x30}}, 0x0) 19:26:50 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xb7000000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="02000000030000000400000030000f000300040000000000000000000f008ec4", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000e1f4655fe2f4655fe2f4655f000000000000040008", 0x1d, 0x4200}, {&(0x7f0000012700)="20000000d4c49a2e07", 0x9, 0x4280}], 0x0, &(0x7f0000013a00)) 19:26:50 executing program 2: socket(0x11, 0x0, 0x0) r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x8c02, 0x0) sendto$unix(r0, &(0x7f0000000040)="f2791a1cb22d9b459f63e6c9c9cc62", 0xf, 0x8000, &(0x7f0000000080)=@file={0x1, './file0\x00'}, 0x6e) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000180)='/dev/hwrng\x00', 0x0, 0x0) openat$cgroup_ro(r1, &(0x7f0000000100)='freezer.self_freezing\x00', 0x0, 0x0) read$FUSE(r1, &(0x7f0000000700), 0xfce3) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x2400, 0x1) 19:26:50 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xbc020000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="02000000030000000400000030000f000300040000000000000000000f008ec4", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000e1f4655fe2f4655fe2f4655f000000000000040008", 0x1d, 0x4200}, {&(0x7f0000012700)="20000000d4c49a2e07", 0x9, 0x4280}], 0x0, &(0x7f0000013a00)) 19:26:50 executing program 3: set_mempolicy(0x2, &(0x7f0000000000)=0x9, 0x90) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x4c032, 0xffffffffffffffff, 0x6001000000000000) 19:26:50 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)=ANY=[@ANYBLOB="300000001000070100dd2174ffff27de00000000", @ANYRES32=0x0, @ANYBLOB="000000000000000e84001b00000000000500100005"], 0x30}}, 0x0) [ 658.639472] EXT4-fs (loop5): corrupt root inode, run e2fsck [ 658.650376] EXT4-fs (loop5): mount failed 19:26:50 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)=ANY=[@ANYBLOB="300000001000070100dd2174ffff27de00000000", @ANYRES32=0x0, @ANYBLOB="000000000000000b88001b00000000000500100005"], 0x30}}, 0x0) 19:26:50 executing program 3: set_mempolicy(0x2, &(0x7f0000000000)=0x9, 0x90) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x4c032, 0xffffffffffffffff, 0x6100000000000000) 19:26:50 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)=ANY=[@ANYBLOB="300000001000070100dd2174ffff27de00000000", @ANYRES32=0x0, @ANYBLOB="000000000000000c88001b00000000000500100005"], 0x30}}, 0x0) [ 658.809705] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue [ 658.827289] EXT4-fs (loop1): mounted filesystem without journal. Opts: ,errors=continue [ 658.844182] EXT4-fs (loop5): corrupt root inode, run e2fsck [ 658.850827] EXT4-fs (loop5): mount failed 19:26:51 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xb7010000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="02000000030000000400000030000f000300040000000000000000000f008ec4", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000e1f4655fe2f4655fe2f4655f000000000000040008", 0x1d, 0x4200}, {&(0x7f0000012700)="20000000d4c49a2e07", 0x9, 0x4280}], 0x0, &(0x7f0000013a00)) 19:26:51 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xbc030000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="02000000030000000400000030000f000300040000000000000000000f008ec4", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000e1f4655fe2f4655fe2f4655f000000000000040008", 0x1d, 0x4200}, {&(0x7f0000012700)="20000000d4c49a2e07", 0x9, 0x4280}], 0x0, &(0x7f0000013a00)) 19:26:51 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x99000000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="02000000030000000400000030000f000300040000000000000000000f008ec4", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000e1f4655fe2f4655fe2f4655f00000000000004", 0x1b, 0x4200}, {&(0x7f0000012700)="20000000d4c49a2e07", 0x9, 0x4280}], 0x0, &(0x7f0000013a00)) [ 658.952489] nla_parse: 21 callbacks suppressed [ 658.952499] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.0'. 19:26:51 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)=ANY=[@ANYBLOB="300000001000070100dd2174ffff27de00000000", @ANYRES32=0x0, @ANYBLOB="000000000000000e88001b00000000000500100005"], 0x30}}, 0x0) 19:26:51 executing program 3: set_mempolicy(0x2, &(0x7f0000000000)=0x9, 0x90) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x4c032, 0xffffffffffffffff, 0x6101000000000000) [ 659.111900] EXT4-fs (loop5): corrupt root inode, run e2fsck [ 659.130138] EXT4-fs (loop5): mount failed [ 659.143815] EXT4-fs (loop1): mounted filesystem without journal. Opts: ,errors=continue 19:26:51 executing program 2: socket(0x11, 0x0, 0x0) perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000180)='/dev/hwrng\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f0000000700), 0xfce3) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0x0) ioctl$KVM_PPC_ALLOCATE_HTAB(r0, 0xc004aea7, &(0x7f0000000000)=0x4) 19:26:51 executing program 3: set_mempolicy(0x2, &(0x7f0000000000)=0x9, 0x90) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x4c032, 0xffffffffffffffff, 0x6200000000000000) 19:26:51 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)=ANY=[@ANYBLOB="300000001000070100dd2174ffff27de00000000", @ANYRES32=0x0, @ANYBLOB="000000000000000b8c001b00000000000500100005"], 0x30}}, 0x0) [ 659.162791] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.0'. [ 659.223702] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue 19:26:51 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xbd000000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="02000000030000000400000030000f000300040000000000000000000f008ec4", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000e1f4655fe2f4655fe2f4655f000000000000040008", 0x1d, 0x4200}, {&(0x7f0000012700)="20000000d4c49a2e07", 0x9, 0x4280}], 0x0, &(0x7f0000013a00)) 19:26:51 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xb7020000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="02000000030000000400000030000f000300040000000000000000000f008ec4", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000e1f4655fe2f4655fe2f4655f000000000000040008", 0x1d, 0x4200}, {&(0x7f0000012700)="20000000d4c49a2e07", 0x9, 0x4280}], 0x0, &(0x7f0000013a00)) [ 659.271262] EXT4-fs (loop5): corrupt root inode, run e2fsck [ 659.285750] EXT4-fs (loop5): mount failed 19:26:51 executing program 3: set_mempolicy(0x2, &(0x7f0000000000)=0x9, 0x90) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x4c032, 0xffffffffffffffff, 0x6201000000000000) [ 659.341506] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.0'. 19:26:51 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x99010000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="02000000030000000400000030000f000300040000000000000000000f008ec4", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000e1f4655fe2f4655fe2f4655f00000000000004", 0x1b, 0x4200}, {&(0x7f0000012700)="20000000d4c49a2e07", 0x9, 0x4280}], 0x0, &(0x7f0000013a00)) 19:26:51 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)=ANY=[@ANYBLOB="300000001000070100dd2174ffff27de00000000", @ANYRES32=0x0, @ANYBLOB="000000000000000e8c001b00000000000500100005"], 0x30}}, 0x0) [ 659.501164] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue 19:26:51 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)=ANY=[@ANYBLOB="300000001000070100dd2174ffff27de00000000", @ANYRES32=0x0, @ANYBLOB="000000000000000e90001b00000000000500100005"], 0x30}}, 0x0) [ 659.607839] EXT4-fs (loop1): mounted filesystem without journal. Opts: ,errors=continue [ 659.608098] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.0'. 19:26:51 executing program 3: set_mempolicy(0x2, &(0x7f0000000000)=0x9, 0x90) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x4c032, 0xffffffffffffffff, 0x6300000000000000) 19:26:51 executing program 2: r0 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x75f, 0x103382) r1 = memfd_create(&(0x7f0000000040)='\xf8,\xa8\xb1\xfb\xa7\xfa\xc9=\xe2Z\xbd\x00\x00\x00\x00\x00\x00\xa3e\xd8\x93\xbeUIS\x8a\xfe\xc1m;\xe4\xf7\xad\xb1`\xcd\x1a\xfef\x13sn\xfa', 0x0) pwritev(r1, &(0x7f0000000540)=[{&(0x7f0000000000)='B', 0x1}], 0x1, 0x81805, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) r2 = perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x8}, 0x1496d, 0x0, 0x0, 0x7, 0x0, 0x0, 0x88}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open$cgroup(&(0x7f0000000280)={0x2, 0x70, 0x3, 0x80, 0x81, 0x2, 0x0, 0x9, 0x6c2, 0xb, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x5, 0x4, @perf_bp={&(0x7f0000000180), 0x6}, 0x41840, 0x40, 0xffffffff, 0x6, 0xf26d, 0x7, 0x3}, 0xffffffffffffffff, 0xffffffffffffffff, r2, 0x9) sendfile(r1, r2, &(0x7f0000000000)=0x1000, 0xffffffff00000000) r3 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm_plock\x00', 0x20000, 0x0) r4 = syz_init_net_socket$nl_rdma(0xffffffffffffffff, 0x3, 0x14) ioctl$LOOP_CHANGE_FD(r3, 0x4c06, r4) socket(0x11, 0x0, 0x0) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000180)='/dev/hwrng\x00', 0x0, 0x0) read$FUSE(r5, &(0x7f0000000700), 0xfce3) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0x0) 19:26:51 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xbd010000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="02000000030000000400000030000f000300040000000000000000000f008ec4", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000e1f4655fe2f4655fe2f4655f000000000000040008", 0x1d, 0x4200}, {&(0x7f0000012700)="20000000d4c49a2e07", 0x9, 0x4280}], 0x0, &(0x7f0000013a00)) [ 659.704424] EXT4-fs (loop5): corrupt root inode, run e2fsck [ 659.724948] EXT4-fs (loop5): mount failed 19:26:51 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xb7030000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="02000000030000000400000030000f000300040000000000000000000f008ec4", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000e1f4655fe2f4655fe2f4655f000000000000040008", 0x1d, 0x4200}, {&(0x7f0000012700)="20000000d4c49a2e07", 0x9, 0x4280}], 0x0, &(0x7f0000013a00)) [ 659.747087] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.0'. 19:26:51 executing program 3: set_mempolicy(0x2, &(0x7f0000000000)=0x9, 0x90) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x4c032, 0xffffffffffffffff, 0x6301000000000000) 19:26:51 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)=ANY=[@ANYBLOB="300000001000070100dd2174ffff27de00000000", @ANYRES32=0x0, @ANYBLOB="000000000000000c94001b00000000000500100005"], 0x30}}, 0x0) [ 659.889581] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.0'. [ 659.929982] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue [ 659.949614] EXT4-fs (loop5): corrupt root inode, run e2fsck [ 659.955924] EXT4-fs (loop5): mount failed 19:26:52 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xbd020000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="02000000030000000400000030000f000300040000000000000000000f008ec4", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000e1f4655fe2f4655fe2f4655f000000000000040008", 0x1d, 0x4200}, {&(0x7f0000012700)="20000000d4c49a2e07", 0x9, 0x4280}], 0x0, &(0x7f0000013a00)) 19:26:52 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)=ANY=[@ANYBLOB="300000001000070100dd2174ffff27de00000000", @ANYRES32=0x0, @ANYBLOB="000000000000000e94001b00000000000500100005"], 0x30}}, 0x0) 19:26:52 executing program 3: set_mempolicy(0x2, &(0x7f0000000000)=0x9, 0x90) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x4c032, 0xffffffffffffffff, 0x6400000000000000) 19:26:52 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x99020000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="02000000030000000400000030000f000300040000000000000000000f008ec4", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000e1f4655fe2f4655fe2f4655f00000000000004", 0x1b, 0x4200}, {&(0x7f0000012700)="20000000d4c49a2e07", 0x9, 0x4280}], 0x0, &(0x7f0000013a00)) 19:26:52 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)=ANY=[@ANYBLOB="300000001000070100dd2174ffff27de00000000", @ANYRES32=0x0, @ANYBLOB="000000000000000e98001b00000000000500100005"], 0x30}}, 0x0) [ 660.110416] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.0'. 19:26:52 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)=ANY=[@ANYBLOB="300000001000070100dd2174ffff27de00000000", @ANYRES32=0x0, @ANYBLOB="000000000000000c9c001b00000000000500100005"], 0x30}}, 0x0) [ 660.152117] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.0'. [ 660.160437] EXT4-fs (loop1): mounted filesystem without journal. Opts: ,errors=continue 19:26:52 executing program 3: set_mempolicy(0x2, &(0x7f0000000000)=0x9, 0x90) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x4c032, 0xffffffffffffffff, 0x6401000000000000) [ 660.228324] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.0'. 19:26:52 executing program 2: r0 = syz_open_dev$swradio(&(0x7f0000000040)='/dev/swradio#\x00', 0x1, 0x2) ioctl$VIDIOC_S_FREQUENCY(r0, 0x402c5639, &(0x7f0000000080)={0x8, 0x5, 0x5}) socket(0x5, 0x80000, 0x9) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000180)='/dev/hwrng\x00', 0x0, 0x0) read$FUSE(r1, &(0x7f0000000700), 0xfce3) ioctl$EXT4_IOC_GROUP_ADD(0xffffffffffffffff, 0x40286608, &(0x7f0000000000)={0x1, 0xc2, 0xfffffffffffff001, 0x3, 0x8, 0x7}) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0x0) 19:26:52 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xb8000000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="02000000030000000400000030000f000300040000000000000000000f008ec4", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000e1f4655fe2f4655fe2f4655f000000000000040008", 0x1d, 0x4200}, {&(0x7f0000012700)="20000000d4c49a2e07", 0x9, 0x4280}], 0x0, &(0x7f0000013a00)) 19:26:52 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)=ANY=[@ANYBLOB="300000001000070100dd2174ffff27de00000000", @ANYRES32=0x0, @ANYBLOB="000000000000000ca0001b00000000000500100005"], 0x30}}, 0x0) [ 660.367831] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.0'. 19:26:52 executing program 3: set_mempolicy(0x2, &(0x7f0000000000)=0x9, 0x90) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x4c032, 0xffffffffffffffff, 0x6500000000000000) 19:26:52 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)=ANY=[@ANYBLOB="300000001000070100dd2174ffff27de00000000", @ANYRES32=0x0, @ANYBLOB="000000000000000ea0001b00000000000500100005"], 0x30}}, 0x0) [ 660.448491] EXT4-fs (loop5): corrupt root inode, run e2fsck [ 660.475441] EXT4-fs (loop1): mounted filesystem without journal. Opts: ,errors=continue [ 660.505947] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue [ 660.527658] EXT4-fs (loop5): mount failed 19:26:52 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xbd030000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="02000000030000000400000030000f000300040000000000000000000f008ec4", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000e1f4655fe2f4655fe2f4655f000000000000040008", 0x1d, 0x4200}, {&(0x7f0000012700)="20000000d4c49a2e07", 0x9, 0x4280}], 0x0, &(0x7f0000013a00)) 19:26:52 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xb8010000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="02000000030000000400000030000f000300040000000000000000000f008ec4", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000e1f4655fe2f4655fe2f4655f000000000000040008", 0x1d, 0x4200}, {&(0x7f0000012700)="20000000d4c49a2e07", 0x9, 0x4280}], 0x0, &(0x7f0000013a00)) 19:26:52 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x99030000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="02000000030000000400000030000f000300040000000000000000000f008ec4", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000e1f4655fe2f4655fe2f4655f00000000000004", 0x1b, 0x4200}, {&(0x7f0000012700)="20000000d4c49a2e07", 0x9, 0x4280}], 0x0, &(0x7f0000013a00)) 19:26:52 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)=ANY=[@ANYBLOB="300000001000070100dd2174ffff27de00000000", @ANYRES32=0x0, @ANYBLOB="0000000000000009a4001b00000000000500100005"], 0x30}}, 0x0) 19:26:52 executing program 3: set_mempolicy(0x2, &(0x7f0000000000)=0x9, 0x90) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x4c032, 0xffffffffffffffff, 0x6501000000000000) [ 660.780555] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue 19:26:52 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xbe000000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="02000000030000000400000030000f000300040000000000000000000f008ec4", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000e1f4655fe2f4655fe2f4655f000000000000040008", 0x1d, 0x4200}, {&(0x7f0000012700)="20000000d4c49a2e07", 0x9, 0x4280}], 0x0, &(0x7f0000013a00)) 19:26:52 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)=ANY=[@ANYBLOB="300000001000070100dd2174ffff27de00000000", @ANYRES32=0x0, @ANYBLOB="000000000000000bc0001b00000000000500100005"], 0x30}}, 0x0) [ 660.850001] EXT4-fs (loop5): corrupt root inode, run e2fsck [ 660.850884] EXT4-fs (loop1): mounted filesystem without journal. Opts: ,errors=continue [ 660.874269] EXT4-fs (loop5): mount failed [ 661.057212] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue 19:26:53 executing program 2: socket(0x11, 0x0, 0x0) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000180)='/dev/hwrng\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f0000000700), 0xfce3) r1 = socket$vsock_stream(0x28, 0x1, 0x0) getsockopt(r1, 0x2, 0x2ac, &(0x7f0000000040)=""/76, &(0x7f00000000c0)=0x4c) r2 = dup(r1) connect$vsock_stream(r2, &(0x7f0000000000)={0x28, 0x0, 0x0, @my=0x0}, 0x10) bind$inet6(r2, &(0x7f0000000000)={0xa, 0x4e22, 0x8, @dev={0xfe, 0x80, [], 0x12}, 0x100}, 0x1c) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0x0) 19:26:53 executing program 3: set_mempolicy(0x2, &(0x7f0000000000)=0x9, 0x90) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x4c032, 0xffffffffffffffff, 0x6600000000000000) 19:26:53 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x9a000000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="02000000030000000400000030000f000300040000000000000000000f008ec4", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000e1f4655fe2f4655fe2f4655f00000000000004", 0x1b, 0x4200}, {&(0x7f0000012700)="20000000d4c49a2e07", 0x9, 0x4280}], 0x0, &(0x7f0000013a00)) 19:26:53 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xb8020000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="02000000030000000400000030000f000300040000000000000000000f008ec4", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000e1f4655fe2f4655fe2f4655f000000000000040008", 0x1d, 0x4200}, {&(0x7f0000012700)="20000000d4c49a2e07", 0x9, 0x4280}], 0x0, &(0x7f0000013a00)) 19:26:53 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)=ANY=[@ANYBLOB="300000001000070100dd2174ffff27de00000000", @ANYRES32=0x0, @ANYBLOB="000000000000000dd4001b00000000000500100005"], 0x30}}, 0x0) 19:26:53 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xbe010000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="02000000030000000400000030000f000300040000000000000000000f008ec4", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000e1f4655fe2f4655fe2f4655f000000000000040008", 0x1d, 0x4200}, {&(0x7f0000012700)="20000000d4c49a2e07", 0x9, 0x4280}], 0x0, &(0x7f0000013a00)) 19:26:53 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)=ANY=[@ANYBLOB="300000001000070100dd2174ffff27de00000000", @ANYRES32=0x0, @ANYBLOB="000000000000000ddc001b00000000000500100005"], 0x30}}, 0x0) 19:26:53 executing program 3: set_mempolicy(0x2, &(0x7f0000000000)=0x9, 0x90) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x4c032, 0xffffffffffffffff, 0x6601000000000000) [ 661.375171] EXT4-fs (loop5): corrupt root inode, run e2fsck [ 661.380943] EXT4-fs (loop5): mount failed [ 661.429777] EXT4-fs (loop1): mounted filesystem without journal. Opts: ,errors=continue [ 661.450321] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue 19:26:53 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)=ANY=[@ANYBLOB="300000001000070100dd2174ffff27de00000000", @ANYRES32=0x0, @ANYBLOB="000000000000000be8001b00000000000500100005"], 0x30}}, 0x0) 19:26:53 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xb8030000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="02000000030000000400000030000f000300040000000000000000000f008ec4", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000e1f4655fe2f4655fe2f4655f000000000000040008", 0x1d, 0x4200}, {&(0x7f0000012700)="20000000d4c49a2e07", 0x9, 0x4280}], 0x0, &(0x7f0000013a00)) 19:26:53 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xbe020000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="02000000030000000400000030000f000300040000000000000000000f008ec4", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000e1f4655fe2f4655fe2f4655f000000000000040008", 0x1d, 0x4200}, {&(0x7f0000012700)="20000000d4c49a2e07", 0x9, 0x4280}], 0x0, &(0x7f0000013a00)) 19:26:53 executing program 3: set_mempolicy(0x2, &(0x7f0000000000)=0x9, 0x90) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x4c032, 0xffffffffffffffff, 0x6700000000000000) 19:26:53 executing program 2: socket(0x11, 0x0, 0x0) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0xfc, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x129cbaa4}, 0xffffffffffffffff, 0x5, 0xffffffffffffffff, 0x0) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000180)='/dev/hwrng\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f0000000700), 0xfce3) r1 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x401, 0x2442) writev(r1, &(0x7f0000000140)=[{&(0x7f0000000040)="abbc66bb5cc9985e77c9379038a45fa69f5ce98a969dcbba661bcaa8be080f50c633e716ceb28a2ba4053ae7641713d60cb938392af0c981a690d0f5646aa50ae079c9ccaf305c184724bb90ba91100905e4753d07d1b6419cc5dce23ca53d594d15bf50e25c8b1e56c468394c070231900be3aa965b890f239bb9267c10c1028e6d95df7577e29f528b3cb7a3c9b441ac7d04f5474306717c6f23530d0bf0cdee4c51b086cc1e59f43509157441e8234d1b77b23d33580b227a97b4c4f35b240a4137649bc7bf56", 0xc8}], 0x1) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0x0) 19:26:53 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)=ANY=[@ANYBLOB="300000001000070100dd2174ffff27de00000000", @ANYRES32=0x0, @ANYBLOB="000000000000000bec001b00000000000500100005"], 0x30}}, 0x0) [ 661.645065] EXT4-fs (loop5): corrupt root inode, run e2fsck [ 661.650959] EXT4-fs (loop5): mount failed 19:26:53 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x9a010000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="02000000030000000400000030000f000300040000000000000000000f008ec4", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000e1f4655fe2f4655fe2f4655f00000000000004", 0x1b, 0x4200}, {&(0x7f0000012700)="20000000d4c49a2e07", 0x9, 0x4280}], 0x0, &(0x7f0000013a00)) 19:26:53 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)=ANY=[@ANYBLOB="300000001000070100dd2174ffff27de00000000", @ANYRES32=0x0, @ANYBLOB="0000000000000008f0001b00000000000500100005"], 0x30}}, 0x0) 19:26:53 executing program 3: set_mempolicy(0x2, &(0x7f0000000000)=0x9, 0x90) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x4c032, 0xffffffffffffffff, 0x6701000000000000) 19:26:53 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)=ANY=[@ANYBLOB="300000001000070100dd2174ffff27de00000000", @ANYRES32=0x0, @ANYBLOB="000000000000000bf0001b00000000000500100005"], 0x30}}, 0x0) [ 661.856238] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue [ 661.888105] EXT4-fs (loop5): corrupt root inode, run e2fsck 19:26:53 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xbe030000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="02000000030000000400000030000f000300040000000000000000000f008ec4", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000e1f4655fe2f4655fe2f4655f000000000000040008", 0x1d, 0x4200}, {&(0x7f0000012700)="20000000d4c49a2e07", 0x9, 0x4280}], 0x0, &(0x7f0000013a00)) 19:26:53 executing program 3: set_mempolicy(0x2, &(0x7f0000000000)=0x9, 0x90) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x4c032, 0xffffffffffffffff, 0x6800000000000000) [ 661.905504] EXT4-fs (loop5): mount failed [ 661.906133] EXT4-fs (loop1): mounted filesystem without journal. Opts: ,errors=continue 19:26:53 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)=ANY=[@ANYBLOB="300000001000070100dd2174ffff27de00000000", @ANYRES32=0x0, @ANYBLOB="0000000000000008f4001b00000000000500100005"], 0x30}}, 0x0) 19:26:54 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xb9000000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="02000000030000000400000030000f000300040000000000000000000f008ec4", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000e1f4655fe2f4655fe2f4655f000000000000040008", 0x1d, 0x4200}, {&(0x7f0000012700)="20000000d4c49a2e07", 0x9, 0x4280}], 0x0, &(0x7f0000013a00)) 19:26:54 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)=ANY=[@ANYBLOB="300000001000070100dd2174ffff27de00000000", @ANYRES32=0x0, @ANYBLOB="000000000000000bf4001b00000000000500100005"], 0x30}}, 0x0) 19:26:54 executing program 2: socket(0x11, 0x0, 0x0) r0 = openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$F2FS_IOC_PRECACHE_EXTENTS(r0, 0xf50f, 0x0) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000180)='/dev/hwrng\x00', 0x0, 0x0) read$FUSE(r1, &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0xfce3) r3 = open(&(0x7f00000001c0)='./file0\x00', 0x10041, 0x100) r4 = perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x8}, 0x1496d, 0x0, 0x0, 0x7, 0x0, 0x0, 0x88}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open$cgroup(&(0x7f0000000280)={0x2, 0x70, 0x3, 0x80, 0x81, 0x2, 0x0, 0x9, 0x6c2, 0xb, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x5, 0x4, @perf_bp={&(0x7f0000000180), 0x6}, 0x41840, 0x40, 0xffffffff, 0x6, 0xf26d, 0x7, 0x3}, 0xffffffffffffffff, 0xffffffffffffffff, r4, 0x9) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r3, 0x2405, r4) r5 = socket$vsock_stream(0x28, 0x1, 0x0) perf_event_open(&(0x7f0000000100)={0x0, 0x70, 0x9, 0x4, 0x2, 0x1, 0x0, 0x929, 0x36079, 0x5, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x3, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x9fc, 0x1, @perf_bp={&(0x7f00000000c0), 0x2}, 0x40000, 0x100000000, 0x9, 0x1, 0x800, 0x706a, 0x2}, r2, 0x7, 0xffffffffffffffff, 0x0) r6 = dup(r5) connect$vsock_stream(r6, &(0x7f0000000000)={0x28, 0x0, 0x0, @my=0x0}, 0x10) ioctl$SNDCTL_TMR_TEMPO(r6, 0xc0045405, &(0x7f0000000080)=0x132) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0x0) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x3, 0x5, 0xc0, 0x9, 0x0, 0x10000000, 0x209, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x9, 0x2, @perf_config_ext={0x3, 0x4}, 0x2420, 0x5, 0x5, 0x8, 0x4, 0x0, 0x2}, 0xffffffffffffffff, 0x2, 0xffffffffffffffff, 0x2) r7 = syz_genetlink_get_family_id$devlink(&(0x7f0000000080)='devlink\x00') sendmsg$DEVLINK_CMD_SB_OCC_SNAPSHOT(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x900000}, 0xc, &(0x7f0000000140)={&(0x7f0000000040)={0xf4, r7, 0x800, 0x70bd26, 0x25dfdbfc, {}, [{@nsim={{0xe, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0xb, 0xfffffffd}}, {@nsim={{0xe, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0xb, 0xfe000000}}, {@pci={{0x8, 0x1, 'pci\x00'}, {0x11, 0x2, '0000:00:10.0\x00'}}, {0x8, 0xb, 0x6}}, {@pci={{0x8, 0x1, 'pci\x00'}, {0x11, 0x2, '0000:00:10.0\x00'}}, {0x8, 0xb, 0x3}}, {@pci={{0x8, 0x1, 'pci\x00'}, {0x11, 0x2, '0000:00:10.0\x00'}}, {0x8, 0xb, 0x100}}, {@pci={{0x8, 0x1, 'pci\x00'}, {0x11, 0x2, '0000:00:10.0\x00'}}, {0x8, 0xb, 0x20}}]}, 0xf4}, 0x1, 0x0, 0x0, 0x4000001}, 0x4010) sendmsg$DEVLINK_CMD_SB_POOL_SET(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000240)={&(0x7f0000000380)={0x8c, r7, 0x400, 0x70bd27, 0x25dfdbfe, {}, [{@pci={{0x8, 0x1, 'pci\x00'}, {0x11, 0x2, '0000:00:10.0\x00'}}, {0x8, 0xb, 0x4}, {0x6, 0x11, 0x8}, {0x8, 0x13, 0x8000}, {0x5}}, {@pci={{0x8, 0x1, 'pci\x00'}, {0x11, 0x2, '0000:00:10.0\x00'}}, {0x8, 0xb, 0x6}, {0x6, 0x11, 0x7}, {0x8}, {0x5}}]}, 0x8c}, 0x1, 0x0, 0x0, 0x80}, 0x20054180) 19:26:54 executing program 3: set_mempolicy(0x2, &(0x7f0000000000)=0x9, 0x90) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x4c032, 0xffffffffffffffff, 0x6801000000000000) [ 662.070752] EXT4-fs (loop5): corrupt root inode, run e2fsck [ 662.095766] EXT4-fs (loop5): mount failed 19:26:54 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x9a020000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="02000000030000000400000030000f000300040000000000000000000f008ec4", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000e1f4655fe2f4655fe2f4655f00000000000004", 0x1b, 0x4200}, {&(0x7f0000012700)="20000000d4c49a2e07", 0x9, 0x4280}], 0x0, &(0x7f0000013a00)) 19:26:54 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)=ANY=[@ANYBLOB="300000001000070100dd2174ffff27de00000000", @ANYRES32=0x0, @ANYBLOB="000000000000000bf8001b00000000000500100005"], 0x30}}, 0x0) 19:26:54 executing program 3: set_mempolicy(0x2, &(0x7f0000000000)=0x9, 0x90) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x4c032, 0xffffffffffffffff, 0x6900000000000000) [ 662.261054] EXT4-fs (loop1): mounted filesystem without journal. Opts: ,errors=continue [ 662.282663] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue 19:26:54 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xbf000000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="02000000030000000400000030000f000300040000000000000000000f008ec4", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000e1f4655fe2f4655fe2f4655f000000000000040008", 0x1d, 0x4200}, {&(0x7f0000012700)="20000000d4c49a2e07", 0x9, 0x4280}], 0x0, &(0x7f0000013a00)) 19:26:54 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xb9010000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="02000000030000000400000030000f000300040000000000000000000f008ec4", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000e1f4655fe2f4655fe2f4655f000000000000040008", 0x1d, 0x4200}, {&(0x7f0000012700)="20000000d4c49a2e07", 0x9, 0x4280}], 0x0, &(0x7f0000013a00)) 19:26:54 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)=ANY=[@ANYBLOB="300000001000070100dd2174ffff27de00000000", @ANYRES32=0x0, @ANYBLOB="0000000000000008fc001b00000000000500100005"], 0x30}}, 0x0) [ 662.359288] EXT4-fs (loop5): corrupt root inode, run e2fsck [ 662.392232] EXT4-fs (loop5): mount failed 19:26:54 executing program 3: set_mempolicy(0x2, &(0x7f0000000000)=0x9, 0x90) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x4c032, 0xffffffffffffffff, 0x6901000000000000) 19:26:54 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)=ANY=[@ANYBLOB="300000001000070100dd2174ffff27de00000000", @ANYRES32=0x0, @ANYBLOB="000000000000000bfc001b00000000000500100005"], 0x30}}, 0x0) 19:26:54 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)=ANY=[@ANYBLOB="300000001000070100dd2174ffff27de00000000", @ANYRES32=0x0, @ANYBLOB="000000000000020008001b00000000000500100005"], 0x30}}, 0x0) 19:26:54 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)=ANY=[@ANYBLOB="300000001000070100dd2174ffff27de00000000", @ANYRES32=0x0, @ANYBLOB="000000000000030008001b00000000000500100005"], 0x30}}, 0x0) [ 662.670810] EXT4-fs (loop5): corrupt root inode, run e2fsck [ 662.688160] EXT4-fs (loop5): mount failed 19:26:54 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x9a030000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="02000000030000000400000030000f000300040000000000000000000f008ec4", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000e1f4655fe2f4655fe2f4655f00000000000004", 0x1b, 0x4200}, {&(0x7f0000012700)="20000000d4c49a2e07", 0x9, 0x4280}], 0x0, &(0x7f0000013a00)) 19:26:54 executing program 2: socket(0x11, 0x0, 0x0) openat$kvm(0xffffffffffffff9c, 0x0, 0x4d80, 0x0) perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x8}, 0x1496d, 0x0, 0x0, 0x7, 0x0, 0x0, 0x88}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open$cgroup(&(0x7f0000000280)={0x2, 0x70, 0x3, 0x80, 0x81, 0x2, 0x0, 0x9, 0x6c2, 0xb, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x5, 0x4, @perf_bp={&(0x7f0000000180), 0x6}, 0x41840, 0x40, 0xffffffff, 0x6, 0xf26d, 0x7, 0x3}, 0xffffffffffffffff, 0xffffffffffffffff, r0, 0x9) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0xa6) r1 = perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x8}, 0x1496d, 0x0, 0x0, 0x7, 0x0, 0x0, 0x88}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open$cgroup(&(0x7f0000000280)={0x2, 0x70, 0x3, 0x80, 0x81, 0x2, 0x0, 0x9, 0x6c2, 0xb, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x5, 0x4, @perf_bp={&(0x7f0000000180), 0x6}, 0x41840, 0x40, 0xffffffff, 0x6, 0xf26d, 0x7, 0x3}, 0xffffffffffffffff, 0xffffffffffffffff, r1, 0x9) ioctl$FS_IOC_FSGETXATTR(r1, 0x801c581f, &(0x7f0000000000)={0x8, 0x5, 0x6, 0x4, 0x7ff}) r2 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000180)='/dev/hwrng\x00', 0x0, 0x0) read$FUSE(r2, &(0x7f0000000700), 0xfce3) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0x0) 19:26:54 executing program 3: set_mempolicy(0x2, &(0x7f0000000000)=0x9, 0x90) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x4c032, 0xffffffffffffffff, 0x6a00000000000000) 19:26:54 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)=ANY=[@ANYBLOB="300000001000070100dd2174ffff27de00000000", @ANYRES32=0x0, @ANYBLOB="000000000000040008001b00000000000500100005"], 0x30}}, 0x0) [ 662.766907] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue 19:26:54 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xbf010000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="02000000030000000400000030000f000300040000000000000000000f008ec4", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000e1f4655fe2f4655fe2f4655f000000000000040008", 0x1d, 0x4200}, {&(0x7f0000012700)="20000000d4c49a2e07", 0x9, 0x4280}], 0x0, &(0x7f0000013a00)) [ 662.832085] EXT4-fs (loop1): mounted filesystem without journal. Opts: ,errors=continue 19:26:54 executing program 3: set_mempolicy(0x2, &(0x7f0000000000)=0x9, 0x90) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x4c032, 0xffffffffffffffff, 0x6a01000000000000) 19:26:55 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xb9020000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="02000000030000000400000030000f000300040000000000000000000f008ec4", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000e1f4655fe2f4655fe2f4655f000000000000040008", 0x1d, 0x4200}, {&(0x7f0000012700)="20000000d4c49a2e07", 0x9, 0x4280}], 0x0, &(0x7f0000013a00)) 19:26:55 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)=ANY=[@ANYBLOB="300000001000070100dd2174ffff27de00000000", @ANYRES32=0x0, @ANYBLOB="000000000000050008001b00000000000500100005"], 0x30}}, 0x0) [ 662.961928] EXT4-fs (loop5): corrupt root inode, run e2fsck [ 662.990141] EXT4-fs (loop5): mount failed 19:26:55 executing program 3: set_mempolicy(0x2, &(0x7f0000000000)=0x9, 0x90) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x4c032, 0xffffffffffffffff, 0x6b00000000000000) 19:26:55 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x9b000000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="02000000030000000400000030000f000300040000000000000000000f008ec4", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000e1f4655fe2f4655fe2f4655f00000000000004", 0x1b, 0x4200}, {&(0x7f0000012700)="20000000d4c49a2e07", 0x9, 0x4280}], 0x0, &(0x7f0000013a00)) [ 663.115511] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue 19:26:55 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)=ANY=[@ANYBLOB="300000001000070100dd2174ffff27de00000000", @ANYRES32=0x0, @ANYBLOB="000000000000060008001b00000000000500100005"], 0x30}}, 0x0) 19:26:55 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xbf020000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="02000000030000000400000030000f000300040000000000000000000f008ec4", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000e1f4655fe2f4655fe2f4655f000000000000040008", 0x1d, 0x4200}, {&(0x7f0000012700)="20000000d4c49a2e07", 0x9, 0x4280}], 0x0, &(0x7f0000013a00)) 19:26:55 executing program 3: set_mempolicy(0x2, &(0x7f0000000000)=0x9, 0x90) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x4c032, 0xffffffffffffffff, 0x6b01000000000000) [ 663.298472] EXT4-fs (loop5): corrupt root inode, run e2fsck [ 663.315520] EXT4-fs (loop1): mounted filesystem without journal. Opts: ,errors=continue 19:26:55 executing program 2: recvmsg$can_bcm(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000000)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @initdev}}}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000080)=""/103, 0x67}, {&(0x7f0000000100)=""/99, 0x63}, {&(0x7f00000001c0)=""/39, 0x27}, {&(0x7f0000000200)=""/217, 0xd9}], 0x4, &(0x7f0000002740)=""/4096, 0x1000}, 0x22) sendto$inet(r0, &(0x7f0000000400)="438162d473a81629cce123b8577f9ba67129781de997fbf44d4e340cb6706deb9d9412caac78695efb4df6452456426a09b5f08706a1457df994ac423ae2f3cdcb50135589537ff012b28168f96c2aff509d79b0c29aefb2d942a92f40b7cfb9b1d15b7b4cb575d0bb3d28e8a0cc84896aab44b13f09dd383113a436760ed8673a7ec9d2cdd6f2e16f0dad120f4b237e5aacfa5350c5a523b5918d1af30b54f2820b706d1bf6571c71fdea3382ded7c9b81c4a47b3dcdd7c980b946f8d6847386616066b7bacfc5423d004713a1809b5c95f0d1cddc07878580a9593530a59e672ba517c381246a2ba4e", 0xea, 0x20000000, &(0x7f0000000500)={0x2, 0x4e24, @multicast1}, 0x10) socket(0x11, 0x0, 0x0) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000180)='/dev/hwrng\x00', 0x0, 0x0) listen(r0, 0x8) read$FUSE(r1, &(0x7f0000000700), 0xfce3) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0x0) [ 663.353405] EXT4-fs (loop5): mount failed 19:26:55 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xb9030000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="02000000030000000400000030000f000300040000000000000000000f008ec4", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000e1f4655fe2f4655fe2f4655f000000000000040008", 0x1d, 0x4200}, {&(0x7f0000012700)="20000000d4c49a2e07", 0x9, 0x4280}], 0x0, &(0x7f0000013a00)) 19:26:55 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x9b010000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="02000000030000000400000030000f000300040000000000000000000f008ec4", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000e1f4655fe2f4655fe2f4655f00000000000004", 0x1b, 0x4200}, {&(0x7f0000012700)="20000000d4c49a2e07", 0x9, 0x4280}], 0x0, &(0x7f0000013a00)) 19:26:55 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)=ANY=[@ANYBLOB="300000001000070100dd2174ffff27de00000000", @ANYRES32=0x0, @ANYBLOB="000000000000070008001b00000000000500100005"], 0x30}}, 0x0) 19:26:55 executing program 3: set_mempolicy(0x2, &(0x7f0000000000)=0x9, 0x90) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x4c032, 0xffffffffffffffff, 0x6c00000000000000) 19:26:55 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)=ANY=[@ANYBLOB="300000001000070100dd2174ffff27de00000000", @ANYRES32=0x0, @ANYBLOB="000000000000080008001b00000000000500100005"], 0x30}}, 0x0) [ 663.566316] EXT4-fs (loop5): corrupt root inode, run e2fsck [ 663.583145] EXT4-fs (loop1): mounted filesystem without journal. Opts: ,errors=continue [ 663.602234] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue 19:26:55 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xbf030000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="02000000030000000400000030000f000300040000000000000000000f008ec4", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000e1f4655fe2f4655fe2f4655f000000000000040008", 0x1d, 0x4200}, {&(0x7f0000012700)="20000000d4c49a2e07", 0x9, 0x4280}], 0x0, &(0x7f0000013a00)) [ 663.631984] EXT4-fs (loop5): mount failed 19:26:55 executing program 3: set_mempolicy(0x2, &(0x7f0000000000)=0x9, 0x90) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x4c032, 0xffffffffffffffff, 0x6c01000000000000) 19:26:55 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)=ANY=[@ANYBLOB="300000001000070100dd2174ffff27de00000000", @ANYRES32=0x0, @ANYBLOB="000000000000090008001b00000000000500100005"], 0x30}}, 0x0) 19:26:55 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xba000000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="02000000030000000400000030000f000300040000000000000000000f008ec4", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000e1f4655fe2f4655fe2f4655f000000000000040008", 0x1d, 0x4200}, {&(0x7f0000012700)="20000000d4c49a2e07", 0x9, 0x4280}], 0x0, &(0x7f0000013a00)) 19:26:55 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)=ANY=[@ANYBLOB="300000001000070100dd2174ffff27de00000000", @ANYRES32=0x0, @ANYBLOB="0000000000000a0008001b00000000000500100005"], 0x30}}, 0x0) [ 663.750243] EXT4-fs (loop5): corrupt root inode, run e2fsck [ 663.762279] EXT4-fs (loop5): mount failed 19:26:55 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x9b020000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="02000000030000000400000030000f000300040000000000000000000f008ec4", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000e1f4655fe2f4655fe2f4655f00000000000004", 0x1b, 0x4200}, {&(0x7f0000012700)="20000000d4c49a2e07", 0x9, 0x4280}], 0x0, &(0x7f0000013a00)) [ 663.869840] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue [ 663.911718] EXT4-fs (loop1): mounted filesystem without journal. Opts: ,errors=continue 19:26:56 executing program 2: r0 = socket(0x11, 0x0, 0x0) setsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(r0, 0x84, 0x7, &(0x7f0000000000)={0x401}, 0x4) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000180)='/dev/hwrng\x00', 0x0, 0x0) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0x0) 19:26:56 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)=ANY=[@ANYBLOB="300000001000070100dd2174ffff27de00000000", @ANYRES32=0x0, @ANYBLOB="0000000000000c0008001b00000000000500100005"], 0x30}}, 0x0) 19:26:56 executing program 3: set_mempolicy(0x2, &(0x7f0000000000)=0x9, 0x90) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x4c032, 0xffffffffffffffff, 0x6d00000000000000) 19:26:56 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc0000000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="02000000030000000400000030000f000300040000000000000000000f008ec4", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000e1f4655fe2f4655fe2f4655f000000000000040008", 0x1d, 0x4200}, {&(0x7f0000012700)="20000000d4c49a2e07", 0x9, 0x4280}], 0x0, &(0x7f0000013a00)) 19:26:56 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xba010000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="02000000030000000400000030000f000300040000000000000000000f008ec4", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000e1f4655fe2f4655fe2f4655f000000000000040008", 0x1d, 0x4200}, {&(0x7f0000012700)="20000000d4c49a2e07", 0x9, 0x4280}], 0x0, &(0x7f0000013a00)) [ 664.019747] EXT4-fs (loop5): corrupt root inode, run e2fsck [ 664.026621] EXT4-fs (loop5): mount failed 19:26:56 executing program 3: set_mempolicy(0x2, &(0x7f0000000000)=0x9, 0x90) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x4c032, 0xffffffffffffffff, 0x6d01000000000000) 19:26:56 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)=ANY=[@ANYBLOB="300000001000070100dd2174ffff27de00000000", @ANYRES32=0x0, @ANYBLOB="0000000000000e0008001b00000000000500100005"], 0x30}}, 0x0) 19:26:56 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)=ANY=[@ANYBLOB="300000001000070100dd2174ffff27de00000000", @ANYRES32=0x0, @ANYBLOB="000000000000100008001b00000000000500100005"], 0x30}}, 0x0) 19:26:56 executing program 3: set_mempolicy(0x2, &(0x7f0000000000)=0x9, 0x90) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x4c032, 0xffffffffffffffff, 0x6e00000000000000) [ 664.177911] EXT4-fs (loop5): corrupt root inode, run e2fsck [ 664.207519] EXT4-fs (loop5): mount failed 19:26:56 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)=ANY=[@ANYBLOB="300000001000070100dd2174ffff27de00000000", @ANYRES32=0x0, @ANYBLOB="000000000000600008001b00000000000500100005"], 0x30}}, 0x0) 19:26:56 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x9b030000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="02000000030000000400000030000f000300040000000000000000000f008ec4", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000e1f4655fe2f4655fe2f4655f00000000000004", 0x1b, 0x4200}, {&(0x7f0000012700)="20000000d4c49a2e07", 0x9, 0x4280}], 0x0, &(0x7f0000013a00)) [ 664.289599] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue [ 664.363703] EXT4-fs (loop1): mounted filesystem without journal. Opts: ,errors=continue 19:26:56 executing program 3: set_mempolicy(0x2, &(0x7f0000000000)=0x9, 0x90) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x4c032, 0xffffffffffffffff, 0x6e01000000000000) 19:26:56 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)=ANY=[@ANYBLOB="300000001000070100dd2174ffff27de00000000", @ANYRES32=0x0, @ANYBLOB="000000000000f00008001b00000000000500100005"], 0x30}}, 0x0) 19:26:56 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc0010000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="02000000030000000400000030000f000300040000000000000000000f008ec4", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000e1f4655fe2f4655fe2f4655f000000000000040008", 0x1d, 0x4200}, {&(0x7f0000012700)="20000000d4c49a2e07", 0x9, 0x4280}], 0x0, &(0x7f0000013a00)) 19:26:56 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xba020000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="02000000030000000400000030000f000300040000000000000000000f008ec4", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000e1f4655fe2f4655fe2f4655f000000000000040008", 0x1d, 0x4200}, {&(0x7f0000012700)="20000000d4c49a2e07", 0x9, 0x4280}], 0x0, &(0x7f0000013a00)) 19:26:56 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)=ANY=[@ANYBLOB="300000001000070100dd2174ffff27de00000000", @ANYRES32=0x0, @ANYBLOB="000000000000000308001b00000000000500100005"], 0x30}}, 0x0) [ 664.564010] EXT4-fs (loop5): corrupt root inode, run e2fsck [ 664.577478] EXT4-fs (loop5): mount failed 19:26:56 executing program 2: r0 = socket(0x11, 0x0, 0x0) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = accept$inet6(r0, 0x0, &(0x7f0000000000)) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000000080)={0x7, &(0x7f0000000040)=[{0x3, 0x8, 0xff, 0x3}, {0x7f, 0x3, 0x4}, {0x8, 0x1f, 0xff, 0x9}, {0x3, 0x5, 0x8, 0x3ff}, {0x6, 0x34, 0x80, 0x7}, {0xecb, 0x8, 0x3, 0x20}, {0x8, 0x1f, 0xff, 0x1}]}, 0x10) r2 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000180)='/dev/hwrng\x00', 0x0, 0x0) read$FUSE(r2, &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0}, 0xfce3) connect$vsock_stream(0xffffffffffffffff, &(0x7f0000000000)={0x28, 0x0, 0x0, @my=0x0}, 0x10) read$FUSE(0xffffffffffffffff, &(0x7f0000002740)={0x2020, 0x0, 0x0}, 0x2020) r5 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffffe}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000001, 0x0, @perf_config_ext={0x0, 0x4}, 0x0, 0x8000000}, 0x0, 0xffffffffffffffff, r5, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x6}, 0x404, 0x0, 0x0, 0x1}, 0x0, 0xff7fffffffffffff, r5, 0x2) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x800}, 0x0, 0xffffffffffffffff, r5, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x2400, 0x36) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) chown(&(0x7f0000000100)='./file0\x00', r7, r8) msgctl$IPC_SET(0x0, 0x1, &(0x7f0000000440)={{0x3, 0x0, 0x0, 0x0, r8}, 0x0, 0x0, 0x0, 0x100, 0x9}) syz_fuse_handle_req(0xffffffffffffffff, &(0x7f0000000440)="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", 0x2000, &(0x7f0000002f80)={&(0x7f0000000340)={0x50, 0x0, 0x2000000000000000, {0x7, 0x20, 0x80000001, 0x840180, 0x9, 0x683c, 0x2, 0x3}}, &(0x7f0000000240)={0x18, 0xfffffffffffffffe, 0x1, {0x8}}, &(0x7f00000003c0)={0x18, 0x0, 0xd96, {0x3e}}, &(0x7f0000002440)={0x18, 0x0, 0x0, {0x2}}, &(0x7f0000002480)={0x18, 0x0, 0x9, {0x1}}, &(0x7f00000024c0)={0x28, 0x0, 0x2, {{0x81, 0x101, 0x1, r6}}}, &(0x7f0000002500)={0x60, 0x0, 0x7, {{0x3aa, 0x7ff, 0x2, 0x1000, 0x7, 0xc85, 0xfa, 0xfff}}}, &(0x7f0000002580)={0x18, 0x0, 0x8, {0x3ff}}, &(0x7f00000025c0)=ANY=[@ANYBLOB="1a0049f3619d0000f9ffffffffffffff4e4c424c5f4d474d5400"], &(0x7f0000002600)={0x20, 0x0, 0xeab}, &(0x7f0000002640)={0x78, 0xffffffffffffffda, 0x40, {0x6, 0xd23f, 0x0, {0x2, 0x40, 0x3, 0x8, 0x8, 0xfff, 0x9, 0x5, 0x4, 0x4000, 0x7, 0x0, 0xffffffffffffffff, 0x100, 0x7}}}, &(0x7f0000002780)={0x90, 0x0, 0x1, {0x5, 0x0, 0x93a, 0x3, 0x800, 0x3, {0x2, 0x80000000, 0x10001, 0x18c0, 0x4, 0x101, 0x1, 0x6, 0x4, 0x8000, 0xfffffffb, 0x0, 0x0, 0x80000000, 0x57e}}}, &(0x7f0000002840)=ANY=[@ANYBLOB="a80000000b0000000300000000000000000000000000000003000000000000000400003a06000000776730000000000004000000000000000000000000000000040000000800000077673000000000000000000000000000ff0000000000000000000000070000000300000000000000b900000000000000040000004200000077673000000000000400000000000000000000000000000004000000250d0000777de70000000000"], &(0x7f0000002fc0)=ANY=[@ANYBLOB="3003000000000000090000000000000001000000000000000300000000000000ad00000000000000020000000000000001000000f8ffffff060000000000000032feffffffffffff40000000000000002b06000000000000b5000000000000000400000000000000832c6d5705000000090000000040000005000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="01040000010000000000000001000000000000000800000000000000040000000400000077673000000000000600000000000000000000000000000040000000000000000500000000000000010400000200000001000000000000000300000000000000cb09000000000000f8ffffffffffffff0800000000000000018000000000000000080000020000000000000000c00000aa0c0000", @ANYRES32=0xee00, @ANYBLOB="b82d920b3207db763638086ff2e63ad72a19e19946d2b1f9bd7426d42cdc57bb5f1b4f15411459660854df960e95b464f8956c6f4968b1a50436f3ea6f356809c31f8e73c3ad523f8fc1bea990fcec8e3992d6304c9f6b69f5f5d7f4235f0ce4500206a29f0427e121b96e3c57bca6a9ce05ab6d831ebc4e01b516c25e86a4558be9d2a313e3a2e5ed88e03f973e5e34709d1f1dd69ac86f30", @ANYBLOB="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", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="80ae00000400000000000000060000000000000001000000000000000a000000000000002f6465762f727463300000000000000000000000000000000000000000000000f8ffffffffffffff0800000000000000000000000000008005000000000000007f00000000000000f60000000000000006000000000000000600000000000000000000000000000000000000f00f00009400000000800000ffffff7f", @ANYRES32, @ANYRES32=0x0, @ANYBLOB="13030000030000000000000002000000000000007b0000000000000000000000ceb30000040000000000000001000000000000000000000000000000070000000000000000100000fd00000000000000000000000700000000000000050000000000000002000000000000000300000000000000feffffffffffffffffffffff01800000800000000010000005000000", @ANYRES32=0x0, @ANYRESDEC=r5, @ANYBLOB="05000000000000000000000005000000000000007f0000000000000002000000090000002b3a000000000000"], &(0x7f0000002e80)={0xa0, 0x0, 0x2, {{0x5, 0x3, 0x40, 0x3, 0x8, 0x7, {0x6, 0x7, 0x4, 0x5, 0x4, 0x4, 0x6, 0x200, 0x4, 0x1000, 0x1f, 0xee01, r8, 0x6}}, {0x0, 0x10}}}, &(0x7f0000002f40)={0x20, 0x0, 0x100000001, {0x3, 0x0, 0x2, 0xfff}}}) write$FUSE_CREATE_OPEN(0xffffffffffffffff, &(0x7f00000000c0)={0xa0, 0x0, r4, {{0x1, 0x0, 0x200, 0x100000001, 0x9, 0x3ff, {0x0, 0x5, 0xffffffffffffffe0, 0x5, 0x4, 0x100, 0x200, 0x0, 0x7, 0x0, 0x1e88, r3, r8, 0xfffffffe, 0x9}}, {0x0, 0xa}}}, 0xa0) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0x0) 19:26:56 executing program 3: set_mempolicy(0x2, &(0x7f0000000000)=0x9, 0x90) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x4c032, 0xffffffffffffffff, 0x6f00000000000000) [ 664.622770] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue 19:26:56 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x9c000000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="02000000030000000400000030000f000300040000000000000000000f008ec4", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000e1f4655fe2f4655fe2f4655f00000000000004", 0x1b, 0x4200}, {&(0x7f0000012700)="20000000d4c49a2e07", 0x9, 0x4280}], 0x0, &(0x7f0000013a00)) [ 664.671005] EXT4-fs (loop1): mounted filesystem without journal. Opts: ,errors=continue 19:26:56 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc0020000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="02000000030000000400000030000f000300040000000000000000000f008ec4", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000e1f4655fe2f4655fe2f4655f000000000000040008", 0x1d, 0x4200}, {&(0x7f0000012700)="20000000d4c49a2e07", 0x9, 0x4280}], 0x0, &(0x7f0000013a00)) 19:26:56 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)=ANY=[@ANYBLOB="300000001000070100dd2174ffff27de00000000", @ANYRES32=0x0, @ANYBLOB="000000000000000508001b00000000000500100005"], 0x30}}, 0x0) 19:26:56 executing program 3: set_mempolicy(0x2, &(0x7f0000000000)=0x9, 0x90) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x4c032, 0xffffffffffffffff, 0x6f01000000000000) 19:26:56 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xba030000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="02000000030000000400000030000f000300040000000000000000000f008ec4", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000e1f4655fe2f4655fe2f4655f000000000000040008", 0x1d, 0x4200}, {&(0x7f0000012700)="20000000d4c49a2e07", 0x9, 0x4280}], 0x0, &(0x7f0000013a00)) [ 664.861276] EXT4-fs (loop5): corrupt root inode, run e2fsck [ 664.882475] EXT4-fs (loop5): mount failed 19:26:57 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x9c010000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="02000000030000000400000030000f000300040000000000000000000f008ec4", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000e1f4655fe2f4655fe2f4655f00000000000004", 0x1b, 0x4200}, {&(0x7f0000012700)="20000000d4c49a2e07", 0x9, 0x4280}], 0x0, &(0x7f0000013a00)) 19:26:57 executing program 3: set_mempolicy(0x2, &(0x7f0000000000)=0x9, 0x90) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x4c032, 0xffffffffffffffff, 0x7000000000000000) 19:26:57 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)=ANY=[@ANYBLOB="300000001000070100dd2174ffff27de00000000", @ANYRES32=0x0, @ANYBLOB="000000000000000608001b00000000000500100005"], 0x30}}, 0x0) [ 665.055687] EXT4-fs (loop1): mounted filesystem without journal. Opts: ,errors=continue [ 665.056851] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue 19:26:57 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc0030000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="02000000030000000400000030000f000300040000000000000000000f008ec4", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000e1f4655fe2f4655fe2f4655f000000000000040008", 0x1d, 0x4200}, {&(0x7f0000012700)="20000000d4c49a2e07", 0x9, 0x4280}], 0x0, &(0x7f0000013a00)) 19:26:57 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xbb000000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="02000000030000000400000030000f000300040000000000000000000f008ec4", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000e1f4655fe2f4655fe2f4655f000000000000040008", 0x1d, 0x4200}, {&(0x7f0000012700)="20000000d4c49a2e07", 0x9, 0x4280}], 0x0, &(0x7f0000013a00)) [ 665.163948] EXT4-fs (loop5): corrupt root inode, run e2fsck [ 665.178306] EXT4-fs (loop5): mount failed [ 665.378013] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue [ 665.390022] EXT4-fs (loop1): mounted filesystem without journal. Opts: ,errors=continue 19:26:57 executing program 2: fstat(0xffffffffffffffff, &(0x7f0000000000)) socket(0x11, 0x0, 0x0) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000180)='/dev/hwrng\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f0000000700), 0xfce3) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/sys/net/ipv4/vs/sync_qlen_max\x00', 0x2, 0x0) ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0x0) 19:26:57 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x9c020000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="02000000030000000400000030000f000300040000000000000000000f008ec4", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000e1f4655fe2f4655fe2f4655f00000000000004", 0x1b, 0x4200}, {&(0x7f0000012700)="20000000d4c49a2e07", 0x9, 0x4280}], 0x0, &(0x7f0000013a00)) 19:26:57 executing program 3: set_mempolicy(0x2, &(0x7f0000000000)=0x9, 0x90) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x4c032, 0xffffffffffffffff, 0x7001000000000000) 19:26:57 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)=ANY=[@ANYBLOB="300000001000070100dd2174ffff27de00000000", @ANYRES32=0x0, @ANYBLOB="000000000000000708001b00000000000500100005"], 0x30}}, 0x0) 19:26:57 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc1000000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="02000000030000000400000030000f000300040000000000000000000f008ec4", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000e1f4655fe2f4655fe2f4655f000000000000040008", 0x1d, 0x4200}, {&(0x7f0000012700)="20000000d4c49a2e07", 0x9, 0x4280}], 0x0, &(0x7f0000013a00)) 19:26:57 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xbb010000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="02000000030000000400000030000f000300040000000000000000000f008ec4", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000e1f4655fe2f4655fe2f4655f000000000000040008", 0x1d, 0x4200}, {&(0x7f0000012700)="20000000d4c49a2e07", 0x9, 0x4280}], 0x0, &(0x7f0000013a00)) 19:26:57 executing program 3: set_mempolicy(0x2, &(0x7f0000000000)=0x9, 0x90) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x4c032, 0xffffffffffffffff, 0x7100000000000000) 19:26:57 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)=ANY=[@ANYBLOB="300000001000070100dd2174ffff27de00000000", @ANYRES32=0x0, @ANYBLOB="000000000000000908001b00000000000500100005"], 0x30}}, 0x0) [ 665.575046] EXT4-fs (loop5): corrupt root inode, run e2fsck [ 665.616352] EXT4-fs (loop5): mount failed 19:26:57 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x9c030000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="02000000030000000400000030000f000300040000000000000000000f008ec4", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000e1f4655fe2f4655fe2f4655f00000000000004", 0x1b, 0x4200}, {&(0x7f0000012700)="20000000d4c49a2e07", 0x9, 0x4280}], 0x0, &(0x7f0000013a00)) [ 665.667495] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue 19:26:57 executing program 3: set_mempolicy(0x2, &(0x7f0000000000)=0x9, 0x90) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x4c032, 0xffffffffffffffff, 0x7101000000000000) 19:26:57 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)=ANY=[@ANYBLOB="300000001000070100dd2174ffff27de00000000", @ANYRES32=0x0, @ANYBLOB="000000000000000a08001b00000000000500100005"], 0x30}}, 0x0) [ 665.763333] EXT4-fs (loop1): mounted filesystem without journal. Opts: ,errors=continue 19:26:57 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xbb020000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="02000000030000000400000030000f000300040000000000000000000f008ec4", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000e1f4655fe2f4655fe2f4655f000000000000040008", 0x1d, 0x4200}, {&(0x7f0000012700)="20000000d4c49a2e07", 0x9, 0x4280}], 0x0, &(0x7f0000013a00)) [ 665.863270] EXT4-fs (loop5): corrupt root inode, run e2fsck [ 665.889022] EXT4-fs (loop5): mount failed 19:26:58 executing program 2: r0 = socket(0x11, 0x0, 0x0) openat$kvm(0xffffffffffffff9c, 0x0, 0xa2a040, 0x0) perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$isdn(r0, &(0x7f0000000080)={0x22, 0x21, 0x7, 0x40, 0x1f}, 0x6) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000180)='/dev/hwrng\x00', 0x0, 0x0) ioctl$VT_SETMODE(0xffffffffffffffff, 0x5602, &(0x7f0000000000)={0x1, 0x6, 0x100, 0xa6, 0x4}) read$FUSE(r1, &(0x7f0000000700), 0xfce3) ioctl$TIOCEXCL(r1, 0x540c) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0x0) 19:26:58 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc1010000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="02000000030000000400000030000f000300040000000000000000000f008ec4", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000e1f4655fe2f4655fe2f4655f000000000000040008", 0x1d, 0x4200}, {&(0x7f0000012700)="20000000d4c49a2e07", 0x9, 0x4280}], 0x0, &(0x7f0000013a00)) 19:26:58 executing program 3: set_mempolicy(0x2, &(0x7f0000000000)=0x9, 0x90) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x4c032, 0xffffffffffffffff, 0x7200000000000000) 19:26:58 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)=ANY=[@ANYBLOB="300000001000070100dd2174ffff27de00000000", @ANYRES32=0x0, @ANYBLOB="000000000000000c08001b00000000000500100005"], 0x30}}, 0x0) 19:26:58 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x9d000000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="02000000030000000400000030000f000300040000000000000000000f008ec4", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000e1f4655fe2f4655fe2f4655f00000000000004", 0x1b, 0x4200}, {&(0x7f0000012700)="20000000d4c49a2e07", 0x9, 0x4280}], 0x0, &(0x7f0000013a00)) 19:26:58 executing program 3: set_mempolicy(0x2, &(0x7f0000000000)=0x9, 0x90) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x4c032, 0xffffffffffffffff, 0x7201000000000000) [ 666.069269] EXT4-fs (loop1): mounted filesystem without journal. Opts: ,errors=continue 19:26:58 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)=ANY=[@ANYBLOB="300000001000070100dd2174ffff27de00000000", @ANYRES32=0x0, @ANYBLOB="0000000000003c0d08001b00000000000500100005"], 0x30}}, 0x0) 19:26:58 executing program 3: set_mempolicy(0x2, &(0x7f0000000000)=0x9, 0x90) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x4c032, 0xffffffffffffffff, 0x7300000000000000) 19:26:58 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xbb030000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="02000000030000000400000030000f000300040000000000000000000f008ec4", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000e1f4655fe2f4655fe2f4655f000000000000040008", 0x1d, 0x4200}, {&(0x7f0000012700)="20000000d4c49a2e07", 0x9, 0x4280}], 0x0, &(0x7f0000013a00)) 19:26:58 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc1020000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="02000000030000000400000030000f000300040000000000000000000f008ec4", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000e1f4655fe2f4655fe2f4655f000000000000040008", 0x1d, 0x4200}, {&(0x7f0000012700)="20000000d4c49a2e07", 0x9, 0x4280}], 0x0, &(0x7f0000013a00)) [ 666.206109] EXT4-fs (loop5): corrupt root inode, run e2fsck [ 666.236785] EXT4-fs (loop5): mount failed 19:26:58 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)=ANY=[@ANYBLOB="300000001000070100dd2174ffff27de00000000", @ANYRES32=0x0, @ANYBLOB="000000000000000e08001b00000000000500100005"], 0x30}}, 0x0) [ 666.372935] EXT4-fs (loop5): corrupt root inode, run e2fsck [ 666.379093] EXT4-fs (loop5): mount failed 19:26:58 executing program 3: set_mempolicy(0x2, &(0x7f0000000000)=0x9, 0x90) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x4c032, 0xffffffffffffffff, 0x7301000000000000) 19:26:58 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x9d010000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="02000000030000000400000030000f000300040000000000000000000f008ec4", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000e1f4655fe2f4655fe2f4655f00000000000004", 0x1b, 0x4200}, {&(0x7f0000012700)="20000000d4c49a2e07", 0x9, 0x4280}], 0x0, &(0x7f0000013a00)) 19:26:58 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)=ANY=[@ANYBLOB="300000001000070100dd2174ffff27de00000000", @ANYRES32=0x0, @ANYBLOB="0000000000000d3c08001b00000000000500100005"], 0x30}}, 0x0) 19:26:58 executing program 3: set_mempolicy(0x2, &(0x7f0000000000)=0x9, 0x90) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x4c032, 0xffffffffffffffff, 0x7400000000000000) 19:26:58 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xbc000000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="02000000030000000400000030000f000300040000000000000000000f008ec4", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000e1f4655fe2f4655fe2f4655f000000000000040008", 0x1d, 0x4200}, {&(0x7f0000012700)="20000000d4c49a2e07", 0x9, 0x4280}], 0x0, &(0x7f0000013a00)) 19:26:58 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc1030000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="02000000030000000400000030000f000300040000000000000000000f008ec4", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000e1f4655fe2f4655fe2f4655f000000000000040008", 0x1d, 0x4200}, {&(0x7f0000012700)="20000000d4c49a2e07", 0x9, 0x4280}], 0x0, &(0x7f0000013a00)) 19:26:58 executing program 3: set_mempolicy(0x2, &(0x7f0000000000)=0x9, 0x90) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x4c032, 0xffffffffffffffff, 0x7401000000000000) 19:26:58 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)=ANY=[@ANYBLOB="300000001000070100dd2174ffff27de00000000", @ANYRES32=0x0, @ANYBLOB="000000000000655808001b00000000000500100005"], 0x30}}, 0x0) 19:26:58 executing program 2: r0 = socket(0x11, 0x0, 0x0) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000180)='/dev/hwrng\x00', 0x0, 0x0) r3 = dup2(r2, r1) r4 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000800)='/dev/loop-control\x00', 0x0, 0x0) r5 = ioctl$LOOP_CTL_GET_FREE(r4, 0x4c82) ioctl$sock_SIOCSIFVLAN_SET_VLAN_NAME_TYPE_CMD(r0, 0x8983, &(0x7f00000000c0)={0x6, 'virt_wifi0\x00', {0xf1da}, 0xe2}) r6 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x7f, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x40000000, 0xffffffffffffffff, 0x0) write(r6, &(0x7f0000000200)="c20afca7", 0x4) ioctl$PERF_EVENT_IOC_PERIOD(r6, 0x40082404, &(0x7f0000000000)=0xffffffff) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, r5) ioctl$LOOP_CTL_ADD(r3, 0x4c80, r5) read$FUSE(r2, &(0x7f0000000700), 0xfce3) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0x0) 19:26:58 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xbc010000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="02000000030000000400000030000f000300040000000000000000000f008ec4", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000e1f4655fe2f4655fe2f4655f000000000000040008", 0x1d, 0x4200}, {&(0x7f0000012700)="20000000d4c49a2e07", 0x9, 0x4280}], 0x0, &(0x7f0000013a00)) [ 666.873988] EXT4-fs (loop5): corrupt root inode, run e2fsck [ 666.920243] EXT4-fs (loop5): mount failed 19:26:59 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc2000000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="02000000030000000400000030000f000300040000000000000000000f008ec4", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000e1f4655fe2f4655fe2f4655f000000000000040008", 0x1d, 0x4200}, {&(0x7f0000012700)="20000000d4c49a2e07", 0x9, 0x4280}], 0x0, &(0x7f0000013a00)) 19:26:59 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)=ANY=[@ANYBLOB="300000001000070100dd2174ffff27de00000000", @ANYRES32=0x0, @ANYBLOB="000000000000006008001b00000000000500100005"], 0x30}}, 0x0) 19:26:59 executing program 3: set_mempolicy(0x2, &(0x7f0000000000)=0x9, 0x90) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x4c032, 0xffffffffffffffff, 0x7500000000000000) 19:26:59 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x9d020000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="02000000030000000400000030000f000300040000000000000000000f008ec4", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000e1f4655fe2f4655fe2f4655f00000000000004", 0x1b, 0x4200}, {&(0x7f0000012700)="20000000d4c49a2e07", 0x9, 0x4280}], 0x0, &(0x7f0000013a00)) 19:26:59 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xbc020000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="02000000030000000400000030000f000300040000000000000000000f008ec4", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000e1f4655fe2f4655fe2f4655f000000000000040008", 0x1d, 0x4200}, {&(0x7f0000012700)="20000000d4c49a2e07", 0x9, 0x4280}], 0x0, &(0x7f0000013a00)) 19:26:59 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xbc030000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="02000000030000000400000030000f000300040000000000000000000f008ec4", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000e1f4655fe2f4655fe2f4655f000000000000040008", 0x1d, 0x4200}, {&(0x7f0000012700)="20000000d4c49a2e07", 0x9, 0x4280}], 0x0, &(0x7f0000013a00)) 19:26:59 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)=ANY=[@ANYBLOB="300000001000070100dd2174ffff27de00000000", @ANYRES32=0x0, @ANYBLOB="000000000000586508001b00000000000500100005"], 0x30}}, 0x0) 19:26:59 executing program 3: set_mempolicy(0x2, &(0x7f0000000000)=0x9, 0x90) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x4c032, 0xffffffffffffffff, 0x7501000000000000) 19:26:59 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)=ANY=[@ANYBLOB="300000001000070100dd2174ffff27de00000000", @ANYRES32=0x0, @ANYBLOB="000000000000008108001b00000000000500100005"], 0x30}}, 0x0) [ 667.221104] EXT4-fs (loop5): corrupt root inode, run e2fsck [ 667.260279] EXT4-fs (loop5): mount failed 19:26:59 executing program 2: r0 = socket(0x11, 0x0, 0x0) setsockopt$sock_int(r0, 0x1, 0x20, &(0x7f0000000100)=0x1, 0x4) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x0, 0xa000000}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000080), 0x10) perf_event_open(&(0x7f0000000000)={0x4, 0x70, 0x1, 0x8, 0x3f, 0x0, 0x0, 0x0, 0x40040, 0xe, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x2, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x80000, 0x1, @perf_config_ext={0x7, 0x81}, 0x12801, 0x81, 0x7f, 0x3, 0x9, 0x3, 0x8}, 0xffffffffffffffff, 0x10, r1, 0x0) r2 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000180)='/dev/hwrng\x00', 0x0, 0x0) read$FUSE(r2, &(0x7f0000000700), 0x8d1) r3 = socket$vsock_stream(0x28, 0x1, 0x0) r4 = dup(r3) connect$vsock_stream(r4, &(0x7f0000000000)={0x28, 0x0, 0x0, @my=0x0}, 0x10) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(r4, 0x84, 0x1e, &(0x7f00000000c0)=0x6, 0x4) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0x0) 19:26:59 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc2010000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="02000000030000000400000030000f000300040000000000000000000f008ec4", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000e1f4655fe2f4655fe2f4655f000000000000040008", 0x1d, 0x4200}, {&(0x7f0000012700)="20000000d4c49a2e07", 0x9, 0x4280}], 0x0, &(0x7f0000013a00)) 19:26:59 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xbd000000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="02000000030000000400000030000f000300040000000000000000000f008ec4", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000e1f4655fe2f4655fe2f4655f000000000000040008", 0x1d, 0x4200}, {&(0x7f0000012700)="20000000d4c49a2e07", 0x9, 0x4280}], 0x0, &(0x7f0000013a00)) 19:26:59 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xbd010000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="02000000030000000400000030000f000300040000000000000000000f008ec4", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000e1f4655fe2f4655fe2f4655f000000000000040008", 0x1d, 0x4200}, {&(0x7f0000012700)="20000000d4c49a2e07", 0x9, 0x4280}], 0x0, &(0x7f0000013a00)) 19:26:59 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)=ANY=[@ANYBLOB="300000001000070100dd2174ffff27de00000000", @ANYRES32=0x0, @ANYBLOB="00000000000000f008001b00000000000500100005"], 0x30}}, 0x0) [ 667.447951] EXT4-fs (loop5): corrupt root inode, run e2fsck [ 667.457742] EXT4-fs (loop5): mount failed 19:26:59 executing program 3: set_mempolicy(0x2, &(0x7f0000000000)=0x9, 0x90) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x4c032, 0xffffffffffffffff, 0x7600000000000000) 19:26:59 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x9d030000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="02000000030000000400000030000f000300040000000000000000000f008ec4", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000e1f4655fe2f4655fe2f4655f00000000000004", 0x1b, 0x4200}, {&(0x7f0000012700)="20000000d4c49a2e07", 0x9, 0x4280}], 0x0, &(0x7f0000013a00)) 19:26:59 executing program 2: socket(0x11, 0x0, 0x0) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000180)='/dev/hwrng\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f0000000700), 0xfce3) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0x0) 19:26:59 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc2020000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="02000000030000000400000030000f000300040000000000000000000f008ec4", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000e1f4655fe2f4655fe2f4655f000000000000040008", 0x1d, 0x4200}, {&(0x7f0000012700)="20000000d4c49a2e07", 0x9, 0x4280}], 0x0, &(0x7f0000013a00)) 19:26:59 executing program 3: set_mempolicy(0x2, &(0x7f0000000000)=0x9, 0x90) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x4c032, 0xffffffffffffffff, 0x7601000000000000) 19:26:59 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)=ANY=[@ANYBLOB="300000001000070100dd2174ffff27de00000000", @ANYRES32=0x0, @ANYBLOB="000000000000000900001b00000000000500100005"], 0x30}}, 0x0) 19:26:59 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xbd020000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="02000000030000000400000030000f000300040000000000000000000f008ec4", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000e1f4655fe2f4655fe2f4655f000000000000040008", 0x1d, 0x4200}, {&(0x7f0000012700)="20000000d4c49a2e07", 0x9, 0x4280}], 0x0, &(0x7f0000013a00)) [ 667.715076] nla_parse: 14 callbacks suppressed [ 667.715896] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.0'. 19:26:59 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xbd030000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="02000000030000000400000030000f000300040000000000000000000f008ec4", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000e1f4655fe2f4655fe2f4655f000000000000040008", 0x1d, 0x4200}, {&(0x7f0000012700)="20000000d4c49a2e07", 0x9, 0x4280}], 0x0, &(0x7f0000013a00)) 19:26:59 executing program 3: set_mempolicy(0x2, &(0x7f0000000000)=0x9, 0x90) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x4c032, 0xffffffffffffffff, 0x7700000000000000) [ 667.819712] EXT4-fs (loop5): corrupt root inode, run e2fsck [ 667.828471] EXT4-fs (loop5): mount failed 19:26:59 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)=ANY=[@ANYBLOB="300000001000070100dd2174ffff27de00000000", @ANYRES32=0x0, @ANYBLOB="000000000000000c00001b00000000000500100005"], 0x30}}, 0x0) 19:27:00 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x9e000000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="02000000030000000400000030000f000300040000000000000000000f008ec4", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000e1f4655fe2f4655fe2f4655f00000000000004", 0x1b, 0x4200}, {&(0x7f0000012700)="20000000d4c49a2e07", 0x9, 0x4280}], 0x0, &(0x7f0000013a00)) 19:27:00 executing program 3: set_mempolicy(0x2, &(0x7f0000000000)=0x9, 0x90) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x4c032, 0xffffffffffffffff, 0x7701000000000000) 19:27:00 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc2030000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="02000000030000000400000030000f000300040000000000000000000f008ec4", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000e1f4655fe2f4655fe2f4655f000000000000040008", 0x1d, 0x4200}, {&(0x7f0000012700)="20000000d4c49a2e07", 0x9, 0x4280}], 0x0, &(0x7f0000013a00)) 19:27:00 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xbe000000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="02000000030000000400000030000f000300040000000000000000000f008ec4", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000e1f4655fe2f4655fe2f4655f000000000000040008", 0x1d, 0x4200}, {&(0x7f0000012700)="20000000d4c49a2e07", 0x9, 0x4280}], 0x0, &(0x7f0000013a00)) [ 668.067625] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.0'. 19:27:00 executing program 2: r0 = socket(0x11, 0x0, 0x0) setsockopt$sock_int(r0, 0x1, 0x20, &(0x7f0000000100)=0x1, 0x4) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x0, 0xa000000}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000080), 0x10) perf_event_open(&(0x7f0000000000)={0x4, 0x70, 0x1, 0x8, 0x3f, 0x0, 0x0, 0x0, 0x40040, 0xe, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x2, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x80000, 0x1, @perf_config_ext={0x7, 0x81}, 0x12801, 0x81, 0x7f, 0x3, 0x9, 0x3, 0x8}, 0xffffffffffffffff, 0x10, r1, 0x0) r2 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000180)='/dev/hwrng\x00', 0x0, 0x0) read$FUSE(r2, &(0x7f0000000700), 0x8d1) r3 = socket$vsock_stream(0x28, 0x1, 0x0) r4 = dup(r3) connect$vsock_stream(r4, &(0x7f0000000000)={0x28, 0x0, 0x0, @my=0x0}, 0x10) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(r4, 0x84, 0x1e, &(0x7f00000000c0)=0x6, 0x4) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0x0) 19:27:00 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)=ANY=[@ANYBLOB="300000001000070100dd2174ffff27de00000000", @ANYRES32=0x0, @ANYBLOB="000000000000000003001b00000000000500100005"], 0x30}}, 0x0) 19:27:00 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xbe010000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="02000000030000000400000030000f000300040000000000000000000f008ec4", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000e1f4655fe2f4655fe2f4655f000000000000040008", 0x1d, 0x4200}, {&(0x7f0000012700)="20000000d4c49a2e07", 0x9, 0x4280}], 0x0, &(0x7f0000013a00)) 19:27:00 executing program 3: set_mempolicy(0x2, &(0x7f0000000000)=0x9, 0x90) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x4c032, 0xffffffffffffffff, 0x7800000000000000) [ 668.215771] EXT4-fs (loop5): corrupt root inode, run e2fsck [ 668.221721] EXT4-fs (loop5): mount failed 19:27:00 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc3000000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="02000000030000000400000030000f000300040000000000000000000f008ec4", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000e1f4655fe2f4655fe2f4655f000000000000040008", 0x1d, 0x4200}, {&(0x7f0000012700)="20000000d4c49a2e07", 0x9, 0x4280}], 0x0, &(0x7f0000013a00)) [ 668.257197] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.0'. 19:27:00 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xbe020000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="02000000030000000400000030000f000300040000000000000000000f008ec4", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000e1f4655fe2f4655fe2f4655f000000000000040008", 0x1d, 0x4200}, {&(0x7f0000012700)="20000000d4c49a2e07", 0x9, 0x4280}], 0x0, &(0x7f0000013a00)) 19:27:00 executing program 3: set_mempolicy(0x2, &(0x7f0000000000)=0x9, 0x90) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x4c032, 0xffffffffffffffff, 0x7801000000000000) 19:27:00 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)=ANY=[@ANYBLOB="300000001000070100dd2174ffff27de00000000", @ANYRES32=0x0, @ANYBLOB="000000000000000c04001b00000000000500100005"], 0x30}}, 0x0) [ 668.368962] EXT4-fs (loop5): corrupt root inode, run e2fsck [ 668.411181] EXT4-fs (loop5): mount failed 19:27:00 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x9e010000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="02000000030000000400000030000f000300040000000000000000000f008ec4", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000e1f4655fe2f4655fe2f4655f00000000000004", 0x1b, 0x4200}, {&(0x7f0000012700)="20000000d4c49a2e07", 0x9, 0x4280}], 0x0, &(0x7f0000013a00)) 19:27:00 executing program 2: r0 = socket(0x11, 0x0, 0x0) setsockopt$sock_int(r0, 0x1, 0x20, &(0x7f0000000100)=0x1, 0x4) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x0, 0xa000000}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000080), 0x10) perf_event_open(&(0x7f0000000000)={0x4, 0x70, 0x1, 0x8, 0x3f, 0x0, 0x0, 0x0, 0x40040, 0xe, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x2, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x80000, 0x1, @perf_config_ext={0x7, 0x81}, 0x12801, 0x81, 0x7f, 0x3, 0x9, 0x3, 0x8}, 0xffffffffffffffff, 0x10, r1, 0x0) r2 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000180)='/dev/hwrng\x00', 0x0, 0x0) read$FUSE(r2, &(0x7f0000000700), 0x8d1) r3 = socket$vsock_stream(0x28, 0x1, 0x0) r4 = dup(r3) connect$vsock_stream(r4, &(0x7f0000000000)={0x28, 0x0, 0x0, @my=0x0}, 0x10) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(r4, 0x84, 0x1e, &(0x7f00000000c0)=0x6, 0x4) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0x0) 19:27:00 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xbe030000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="02000000030000000400000030000f000300040000000000000000000f008ec4", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000e1f4655fe2f4655fe2f4655f000000000000040008", 0x1d, 0x4200}, {&(0x7f0000012700)="20000000d4c49a2e07", 0x9, 0x4280}], 0x0, &(0x7f0000013a00)) 19:27:00 executing program 3: set_mempolicy(0x2, &(0x7f0000000000)=0x9, 0x90) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x4c032, 0xffffffffffffffff, 0x7900000000000000) [ 668.462527] netlink: 'syz-executor.0': attribute type 27 has an invalid length. 19:27:00 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)=ANY=[@ANYBLOB="300000001000070100dd2174ffff27de00000000", @ANYRES32=0x0, @ANYBLOB="000000000000000e04001b00000000000500100005"], 0x30}}, 0x0) 19:27:00 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xbf000000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="02000000030000000400000030000f000300040000000000000000000f008ec4", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000e1f4655fe2f4655fe2f4655f000000000000040008", 0x1d, 0x4200}, {&(0x7f0000012700)="20000000d4c49a2e07", 0x9, 0x4280}], 0x0, &(0x7f0000013a00)) 19:27:00 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xbf010000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="02000000030000000400000030000f000300040000000000000000000f008ec4", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000e1f4655fe2f4655fe2f4655f000000000000040008", 0x1d, 0x4200}, {&(0x7f0000012700)="20000000d4c49a2e07", 0x9, 0x4280}], 0x0, &(0x7f0000013a00)) 19:27:00 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc3010000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="02000000030000000400000030000f000300040000000000000000000f008ec4", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000e1f4655fe2f4655fe2f4655f000000000000040008", 0x1d, 0x4200}, {&(0x7f0000012700)="20000000d4c49a2e07", 0x9, 0x4280}], 0x0, &(0x7f0000013a00)) 19:27:00 executing program 2: r0 = socket(0x11, 0x0, 0x0) setsockopt$sock_int(r0, 0x1, 0x20, &(0x7f0000000100)=0x1, 0x4) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x0, 0xa000000}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000080), 0x10) perf_event_open(&(0x7f0000000000)={0x4, 0x70, 0x1, 0x8, 0x3f, 0x0, 0x0, 0x0, 0x40040, 0xe, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x2, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x80000, 0x1, @perf_config_ext={0x7, 0x81}, 0x12801, 0x81, 0x7f, 0x3, 0x9, 0x3, 0x8}, 0xffffffffffffffff, 0x10, r1, 0x0) r2 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000180)='/dev/hwrng\x00', 0x0, 0x0) read$FUSE(r2, &(0x7f0000000700), 0x8d1) r3 = socket$vsock_stream(0x28, 0x1, 0x0) r4 = dup(r3) connect$vsock_stream(r4, &(0x7f0000000000)={0x28, 0x0, 0x0, @my=0x0}, 0x10) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(r4, 0x84, 0x1e, &(0x7f00000000c0)=0x6, 0x4) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0x0) [ 668.643000] netlink: 'syz-executor.0': attribute type 27 has an invalid length. 19:27:00 executing program 3: set_mempolicy(0x2, &(0x7f0000000000)=0x9, 0x90) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x4c032, 0xffffffffffffffff, 0x7901000000000000) 19:27:00 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xbf020000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="02000000030000000400000030000f000300040000000000000000000f008ec4", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000e1f4655fe2f4655fe2f4655f000000000000040008", 0x1d, 0x4200}, {&(0x7f0000012700)="20000000d4c49a2e07", 0x9, 0x4280}], 0x0, &(0x7f0000013a00)) 19:27:00 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)=ANY=[@ANYBLOB="300000001000070100dd2174ffff27de00000000", @ANYRES32=0x0, @ANYBLOB="000000000000000005001b00000000000500100005"], 0x30}}, 0x0) [ 668.791754] EXT4-fs (loop5): corrupt root inode, run e2fsck [ 668.817219] EXT4-fs (loop5): mount failed [ 668.883626] netlink: 'syz-executor.0': attribute type 27 has an invalid length. [ 668.951666] EXT4-fs (loop5): corrupt root inode, run e2fsck [ 668.957815] EXT4-fs (loop5): mount failed 19:27:01 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x9e020000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="02000000030000000400000030000f000300040000000000000000000f008ec4", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000e1f4655fe2f4655fe2f4655f00000000000004", 0x1b, 0x4200}, {&(0x7f0000012700)="20000000d4c49a2e07", 0x9, 0x4280}], 0x0, &(0x7f0000013a00)) 19:27:01 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc3020000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="02000000030000000400000030000f000300040000000000000000000f008ec4", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000e1f4655fe2f4655fe2f4655f000000000000040008", 0x1d, 0x4200}, {&(0x7f0000012700)="20000000d4c49a2e07", 0x9, 0x4280}], 0x0, &(0x7f0000013a00)) 19:27:01 executing program 2: set_mempolicy(0x2, &(0x7f0000000000)=0x9, 0x90) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x4c032, 0xffffffffffffffff, 0x7701000000000000) 19:27:01 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xbf030000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="02000000030000000400000030000f000300040000000000000000000f008ec4", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000e1f4655fe2f4655fe2f4655f000000000000040008", 0x1d, 0x4200}, {&(0x7f0000012700)="20000000d4c49a2e07", 0x9, 0x4280}], 0x0, &(0x7f0000013a00)) 19:27:01 executing program 3: set_mempolicy(0x2, &(0x7f0000000000)=0x9, 0x90) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x4c032, 0xffffffffffffffff, 0x7a00000000000000) 19:27:01 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)=ANY=[@ANYBLOB="300000001000070100dd2174ffff27de00000000", @ANYRES32=0x0, @ANYBLOB="000000000000000007001b00000000000500100005"], 0x30}}, 0x0) 19:27:01 executing program 3: set_mempolicy(0x2, &(0x7f0000000000)=0x9, 0x90) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x4c032, 0xffffffffffffffff, 0x7a01000000000000) 19:27:01 executing program 2: r0 = socket(0x11, 0x0, 0x0) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000180)='/dev/hwrng\x00', 0x0, 0x0) r3 = dup2(r2, r1) r4 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000800)='/dev/loop-control\x00', 0x0, 0x0) r5 = ioctl$LOOP_CTL_GET_FREE(r4, 0x4c82) ioctl$sock_SIOCSIFVLAN_SET_VLAN_NAME_TYPE_CMD(r0, 0x8983, &(0x7f00000000c0)={0x6, 'virt_wifi0\x00', {0xf1da}, 0xe2}) r6 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x7f, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x40000000, 0xffffffffffffffff, 0x0) write(r6, &(0x7f0000000200)="c20afca7", 0x4) ioctl$PERF_EVENT_IOC_PERIOD(r6, 0x40082404, &(0x7f0000000000)=0xffffffff) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, r5) ioctl$LOOP_CTL_ADD(r3, 0x4c80, r5) read$FUSE(r2, &(0x7f0000000700), 0xfce3) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0x0) [ 669.091848] netlink: 'syz-executor.0': attribute type 27 has an invalid length. 19:27:01 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc3030000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="02000000030000000400000030000f000300040000000000000000000f008ec4", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000e1f4655fe2f4655fe2f4655f000000000000040008", 0x1d, 0x4200}, {&(0x7f0000012700)="20000000d4c49a2e07", 0x9, 0x4280}], 0x0, &(0x7f0000013a00)) 19:27:01 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)=ANY=[@ANYBLOB="300000001000070100dd2174ffff27de00000000", @ANYRES32=0x0, @ANYBLOB="000000000000000208001b00000000000500100005"], 0x30}}, 0x0) 19:27:01 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc0000000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="02000000030000000400000030000f000300040000000000000000000f008ec4", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000e1f4655fe2f4655fe2f4655f000000000000040008", 0x1d, 0x4200}, {&(0x7f0000012700)="20000000d4c49a2e07", 0x9, 0x4280}], 0x0, &(0x7f0000013a00)) [ 669.180264] EXT4-fs (loop5): corrupt root inode, run e2fsck [ 669.215811] EXT4-fs (loop5): mount failed 19:27:01 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x9e030000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="02000000030000000400000030000f000300040000000000000000000f008ec4", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000e1f4655fe2f4655fe2f4655f00000000000004", 0x1b, 0x4200}, {&(0x7f0000012700)="20000000d4c49a2e07", 0x9, 0x4280}], 0x0, &(0x7f0000013a00)) 19:27:01 executing program 3: set_mempolicy(0x2, &(0x7f0000000000)=0x9, 0x90) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x4c032, 0xffffffffffffffff, 0x7b00000000000000) 19:27:01 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)=ANY=[@ANYBLOB="300000001000070100dd2174ffff27de00000000", @ANYRES32=0x0, @ANYBLOB="000000000000000308001b00000000000500100005"], 0x30}}, 0x0) 19:27:01 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc0010000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="02000000030000000400000030000f000300040000000000000000000f008ec4", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000e1f4655fe2f4655fe2f4655f000000000000040008", 0x1d, 0x4200}, {&(0x7f0000012700)="20000000d4c49a2e07", 0x9, 0x4280}], 0x0, &(0x7f0000013a00)) 19:27:01 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc4000000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="02000000030000000400000030000f000300040000000000000000000f008ec4", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000e1f4655fe2f4655fe2f4655f000000000000040008", 0x1d, 0x4200}, {&(0x7f0000012700)="20000000d4c49a2e07", 0x9, 0x4280}], 0x0, &(0x7f0000013a00)) 19:27:01 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)=ANY=[@ANYBLOB="300000001000070100dd2174ffff27de00000000", @ANYRES32=0x0, @ANYBLOB="000000000000000408001b00000000000500100005"], 0x30}}, 0x0) 19:27:01 executing program 3: set_mempolicy(0x2, &(0x7f0000000000)=0x9, 0x90) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x4c032, 0xffffffffffffffff, 0x7b01000000000000) 19:27:01 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc0030000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="02000000030000000400000030000f000300040000000000000000000f008ec4", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000e1f4655fe2f4655fe2f4655f000000000000040008", 0x1d, 0x4200}, {&(0x7f0000012700)="20000000d4c49a2e07", 0x9, 0x4280}], 0x0, &(0x7f0000013a00)) 19:27:01 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc0020000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="02000000030000000400000030000f000300040000000000000000000f008ec4", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000e1f4655fe2f4655fe2f4655f000000000000040008", 0x1d, 0x4200}, {&(0x7f0000012700)="20000000d4c49a2e07", 0x9, 0x4280}], 0x0, &(0x7f0000013a00)) 19:27:01 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)=ANY=[@ANYBLOB="300000001000070100dd2174ffff27de00000000", @ANYRES32=0x0, @ANYBLOB="000000000000000508001b00000000000500100005"], 0x30}}, 0x0) 19:27:01 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc0030000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="02000000030000000400000030000f000300040000000000000000000f008ec4", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000e1f4655fe2f4655fe2f4655f000000000000040008", 0x1d, 0x4200}, {&(0x7f0000012700)="20000000d4c49a2e07", 0x9, 0x4280}], 0x0, &(0x7f0000013a00)) [ 669.555694] EXT4-fs (loop5): corrupt root inode, run e2fsck [ 669.579867] EXT4-fs (loop5): mount failed 19:27:01 executing program 3: set_mempolicy(0x2, &(0x7f0000000000)=0x9, 0x90) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x4c032, 0xffffffffffffffff, 0x7c00000000000000) [ 669.718728] EXT4-fs (loop5): corrupt root inode, run e2fsck [ 669.726898] EXT4-fs (loop5): mount failed 19:27:01 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x9f000000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="02000000030000000400000030000f000300040000000000000000000f008ec4", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000e1f4655fe2f4655fe2f4655f00000000000004", 0x1b, 0x4200}, {&(0x7f0000012700)="20000000d4c49a2e07", 0x9, 0x4280}], 0x0, &(0x7f0000013a00)) 19:27:01 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)=ANY=[@ANYBLOB="300000001000070100dd2174ffff27de00000000", @ANYRES32=0x0, @ANYBLOB="000000000000000608001b00000000000500100005"], 0x30}}, 0x0) 19:27:01 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc1000000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="02000000030000000400000030000f000300040000000000000000000f008ec4", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000e1f4655fe2f4655fe2f4655f000000000000040008", 0x1d, 0x4200}, {&(0x7f0000012700)="20000000d4c49a2e07", 0x9, 0x4280}], 0x0, &(0x7f0000013a00)) 19:27:01 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc4010000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="02000000030000000400000030000f000300040000000000000000000f008ec4", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000e1f4655fe2f4655fe2f4655f000000000000040008", 0x1d, 0x4200}, {&(0x7f0000012700)="20000000d4c49a2e07", 0x9, 0x4280}], 0x0, &(0x7f0000013a00)) 19:27:01 executing program 2: socket(0x11, 0x0, 0x0) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000180)='/dev/hwrng\x00', 0x0, 0x0) r1 = socket$vsock_stream(0x28, 0x1, 0x0) r2 = dup(r1) r3 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x75f, 0x103382) r4 = memfd_create(&(0x7f0000000240)='.^\xc5', 0x0) pwritev(r4, &(0x7f0000000540)=[{&(0x7f0000000000)='B', 0x1}], 0x1, 0x81805, 0x0) ioctl$LOOP_CHANGE_FD(r3, 0x4c00, r4) dup(r4) connect$vsock_stream(r2, &(0x7f0000000000)={0x28, 0x0, 0x0, @my=0x0}, 0x10) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'tunl0\x00', &(0x7f0000000040)={'syztnl0\x00', 0x0, 0x20, 0x40, 0x3, 0x8, {{0x1a, 0x4, 0x3, 0x7, 0x68, 0x66, 0x0, 0x9, 0x2f, 0x0, @remote, @private=0xa010100, {[@ssrr={0x89, 0x1b, 0x96, [@private=0xa010100, @multicast2, @rand_addr=0x64010102, @multicast1, @loopback, @loopback]}, @lsrr={0x83, 0x2b, 0x7b, [@private=0xa010101, @rand_addr=0x64010101, @rand_addr=0x64010102, @broadcast, @dev={0xac, 0x14, 0x14, 0xa}, @remote, @loopback, @remote, @multicast1, @rand_addr=0x64010101]}, @ssrr={0x89, 0xb, 0xb7, [@loopback, @initdev={0xac, 0x1e, 0x0, 0x0}]}]}}}}}) sendmsg$nl_route(r2, &(0x7f0000000240)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000140)={&(0x7f00000001c0)=ANY=[@ANYBLOB="7c0000001900060426bd7000ffdbdf251d01020015000200010000c008020000f62fbae6bdc4f4450300000015000300030000e008010000b8cbf7850df7219d020000001500020004000085080100006ab40af526a4b8d60200000015000100030000e006030000ff1c3214786fd4c80700000008000a00", @ANYRES32=r5, @ANYBLOB], 0x7c}, 0x1, 0x0, 0x0, 0x4000}, 0x4000) read$FUSE(r0, &(0x7f0000000700), 0xfce3) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0x0) r6 = socket$vsock_stream(0x28, 0x1, 0x0) dup(r6) bind$vsock_stream(r6, &(0x7f0000000280)={0x28, 0x0, 0x2711, @host}, 0x10) 19:27:01 executing program 3: set_mempolicy(0x2, &(0x7f0000000000)=0x9, 0x90) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x4c032, 0xffffffffffffffff, 0x7c01000000000000) 19:27:01 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)=ANY=[@ANYBLOB="300000001000070100dd2174ffff27de00000000", @ANYRES32=0x0, @ANYBLOB="000000000000000708001b00000000000500100005"], 0x30}}, 0x0) 19:27:01 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc1010000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="02000000030000000400000030000f000300040000000000000000000f008ec4", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000e1f4655fe2f4655fe2f4655f000000000000040008", 0x1d, 0x4200}, {&(0x7f0000012700)="20000000d4c49a2e07", 0x9, 0x4280}], 0x0, &(0x7f0000013a00)) 19:27:01 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)=ANY=[@ANYBLOB="300000001000070100dd2174ffff27de00000000", @ANYRES32=0x0, @ANYBLOB="000000000000000808001b00000000000500100005"], 0x30}}, 0x0) 19:27:02 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)=ANY=[@ANYBLOB="300000001000070100dd2174ffff27de00000000", @ANYRES32=0x0, @ANYBLOB="000000000000000908001b00000000000500100005"], 0x30}}, 0x0) 19:27:02 executing program 3: set_mempolicy(0x2, &(0x7f0000000000)=0x9, 0x90) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x4c032, 0xffffffffffffffff, 0x7d00000000000000) 19:27:02 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc1020000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="02000000030000000400000030000f000300040000000000000000000f008ec4", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000e1f4655fe2f4655fe2f4655f000000000000040008", 0x1d, 0x4200}, {&(0x7f0000012700)="20000000d4c49a2e07", 0x9, 0x4280}], 0x0, &(0x7f0000013a00)) [ 670.086794] EXT4-fs (loop5): corrupt root inode, run e2fsck [ 670.096283] EXT4-fs (loop5): mount failed 19:27:02 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x9f010000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="02000000030000000400000030000f000300040000000000000000000f008ec4", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000e1f4655fe2f4655fe2f4655f00000000000004", 0x1b, 0x4200}, {&(0x7f0000012700)="20000000d4c49a2e07", 0x9, 0x4280}], 0x0, &(0x7f0000013a00)) 19:27:02 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc4020000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="02000000030000000400000030000f000300040000000000000000000f008ec4", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000e1f4655fe2f4655fe2f4655f000000000000040008", 0x1d, 0x4200}, {&(0x7f0000012700)="20000000d4c49a2e07", 0x9, 0x4280}], 0x0, &(0x7f0000013a00)) 19:27:02 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)=ANY=[@ANYBLOB="300000001000070100dd2174ffff27de00000000", @ANYRES32=0x0, @ANYBLOB="000000000000000a08001b00000000000500100005"], 0x30}}, 0x0) 19:27:02 executing program 3: set_mempolicy(0x2, &(0x7f0000000000)=0x9, 0x90) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x4c032, 0xffffffffffffffff, 0x7d01000000000000) [ 670.371378] EXT4-fs (loop5): corrupt root inode, run e2fsck [ 670.411139] EXT4-fs (loop5): mount failed 19:27:02 executing program 2: set_mempolicy(0x2, &(0x7f0000000000)=0x9, 0x90) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x4c032, 0xffffffffffffffff, 0x4b00000000000000) 19:27:02 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc1030000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="02000000030000000400000030000f000300040000000000000000000f008ec4", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000e1f4655fe2f4655fe2f4655f000000000000040008", 0x1d, 0x4200}, {&(0x7f0000012700)="20000000d4c49a2e07", 0x9, 0x4280}], 0x0, &(0x7f0000013a00)) 19:27:02 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)=ANY=[@ANYBLOB="300000001000070100dd2174ffff27de00000000", @ANYRES32=0x0, @ANYBLOB="000000000000000c08001b00000000000500100005"], 0x30}}, 0x0) 19:27:02 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc4030000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="02000000030000000400000030000f000300040000000000000000000f008ec4", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000e1f4655fe2f4655fe2f4655f000000000000040008", 0x1d, 0x4200}, {&(0x7f0000012700)="20000000d4c49a2e07", 0x9, 0x4280}], 0x0, &(0x7f0000013a00)) 19:27:02 executing program 3: set_mempolicy(0x2, &(0x7f0000000000)=0x9, 0x90) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x4c032, 0xffffffffffffffff, 0x7e00000000000000) 19:27:02 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x9f020000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="02000000030000000400000030000f000300040000000000000000000f008ec4", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000e1f4655fe2f4655fe2f4655f00000000000004", 0x1b, 0x4200}, {&(0x7f0000012700)="20000000d4c49a2e07", 0x9, 0x4280}], 0x0, &(0x7f0000013a00)) 19:27:02 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc2000000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="02000000030000000400000030000f000300040000000000000000000f008ec4", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000e1f4655fe2f4655fe2f4655f000000000000040008", 0x1d, 0x4200}, {&(0x7f0000012700)="20000000d4c49a2e07", 0x9, 0x4280}], 0x0, &(0x7f0000013a00)) 19:27:02 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)=ANY=[@ANYBLOB="300000001000070100dd2174ffff27de00000000", @ANYRES32=0x0, @ANYBLOB="000000000000000e08001b00000000000500100005"], 0x30}}, 0x0) 19:27:02 executing program 3: set_mempolicy(0x2, &(0x7f0000000000)=0x9, 0x90) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x4c032, 0xffffffffffffffff, 0x7e01000000000000) 19:27:02 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)=ANY=[@ANYBLOB="300000001000070100dd2174ffff27de00000000", @ANYRES32=0x0, @ANYBLOB="000000000058650008001b00000000000500100005"], 0x30}}, 0x0) [ 670.687909] EXT4-fs (loop5): corrupt root inode, run e2fsck [ 670.718495] EXT4-fs (loop5): mount failed 19:27:02 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc5000000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="02000000030000000400000030000f000300040000000000000000000f008ec4", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000e1f4655fe2f4655fe2f4655f000000000000040008", 0x1d, 0x4200}, {&(0x7f0000012700)="20000000d4c49a2e07", 0x9, 0x4280}], 0x0, &(0x7f0000013a00)) 19:27:02 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)=ANY=[@ANYBLOB="300000001000070100dd2174ffff27de00000000", @ANYRES32=0x0, @ANYBLOB="000000000000001008001b00000000000500100005"], 0x30}}, 0x0) 19:27:02 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc2010000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="02000000030000000400000030000f000300040000000000000000000f008ec4", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000e1f4655fe2f4655fe2f4655f000000000000040008", 0x1d, 0x4200}, {&(0x7f0000012700)="20000000d4c49a2e07", 0x9, 0x4280}], 0x0, &(0x7f0000013a00)) 19:27:02 executing program 3: set_mempolicy(0x2, &(0x7f0000000000)=0x9, 0x90) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x4c032, 0xffffffffffffffff, 0x7f00000000000000) 19:27:02 executing program 2: socket(0x11, 0x0, 0x0) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000180)='/dev/hwrng\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f0000000700), 0xfce3) read$FUSE(r0, &(0x7f0000004740)={0x2020, 0x0, 0x0, 0x0}, 0x2020) write$FUSE_INIT(r0, &(0x7f0000000600)={0x50, 0x0, r1, {0x7, 0x20, 0x4a, 0x2000000, 0xfffb, 0x3, 0x9a11, 0x3}}, 0x50) r3 = perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x8}, 0x1496d, 0x0, 0x0, 0x7, 0x0, 0x0, 0x88}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open$cgroup(&(0x7f0000000280)={0x2, 0x70, 0x3, 0x80, 0x81, 0x2, 0x0, 0x9, 0x6c2, 0xb, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x5, 0x4, @perf_bp={&(0x7f0000000180), 0x6}, 0x41840, 0x40, 0xffffffff, 0x6, 0xf26d, 0x7, 0x3}, 0xffffffffffffffff, 0xffffffffffffffff, r3, 0x9) r4 = socket$vsock_stream(0x28, 0x1, 0x0) r5 = dup(r4) connect$vsock_stream(r5, &(0x7f0000000000)={0x28, 0x0, 0x0, @my=0x0}, 0x10) r6 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080)='/dev/fuse\x00', 0x42, 0x0) mount$fuse(0x0, &(0x7f00000020c0)='./file0\x00', &(0x7f0000002100)='fuse\x00', 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB='\x00\x00\x00', @ANYRESHEX=r6, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) read$FUSE(r6, &(0x7f00000077c0)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_INIT(r6, &(0x7f0000000080)={0x50, 0x0, r7, {0x7, 0x1f, 0x0, 0x110008}}, 0x50) getresgid(&(0x7f0000000100), &(0x7f0000000680)=0x0, &(0x7f00000006c0)) write$FUSE_ENTRY(r5, &(0x7f0000006780)={0x90, 0x0, r7, {0x0, 0x3, 0x347b3d67, 0xfffffffffffffff9, 0x3f, 0x5, {0x1, 0x9, 0x80000001, 0xffffffffffffff01, 0x10001, 0xfffffffffffffff7, 0x35c, 0xc, 0x8, 0x1000, 0x5, r2, r8, 0xb0ba, 0xbe}}}, 0x90) ioctl$INCFS_IOC_FILL_BLOCKS(r3, 0x80106720, &(0x7f00000005c0)={0xa, &(0x7f0000000480)=[{0x68000000, 0xe2, &(0x7f0000000000)="8aa6fbe5106bb1415b42dc4a96567bb045512ae7a01db4b0da2e8cc9e87e30b741ad64498867e8163dab1273cffd36ee565e0b139b702fd40cf3fdd2b13545e97325b62f1d5721c4624e8a2bdf088e0e48f9a99853552abaa618b925f5aa7ee794e298ad4f750085e41e0a79665970e0e2dccdd87afdc9a8d2f33f2c93323beab1b757b80f33450a972506f1f4e4cadbe33adc94030062c2a4b05eadd19e665676120c9b67982ad117f99727f4006ca9f71c7e4873aa74f79a3862c4e80012186ff231f24a85d1b406a75ba1a73326e1a389a37c635899328b0e2393bd83039ec06e", 0x1}, {0x1, 0x0, &(0x7f0000000100), 0x1}, {0x7, 0x1, &(0x7f0000000140)='V', 0x0, 0x1}, {0x1f, 0x9e, &(0x7f00000001c0)="72a7bfc9002a65aab2c41f61ddb909093b21ed081d593d2ea0399ff81996984495f9bef638ed9210b819d59d611cf9edd3823301a1b463d6ba56bd71d3d6f21f42b6c145759abf8b4d551095348f4671413d305f1c8406fdf45fc3f78c76d6c4f857fe4df38df5458103f1d7a27a2a4b9b68594c66f9684e3652986de71976b02db4f4ce06d034218a09a92580d7b2e6cd413d9d970093093b79cb78c6e4", 0x0, 0x1}, {0x63ddd2e9, 0x20, &(0x7f0000000280)="c4da819b46b6c27e2421801a318c3b4c42027f3270b668b3654496437553a389", 0x1}, {0xde0, 0x1000, &(0x7f0000002740)="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", 0x1}, {0x8, 0x1000, &(0x7f0000003740)="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", 0x1}, {0x4, 0x2c, &(0x7f00000002c0)="05873fad67188454e0f5539cd992d5fe4cd8ef9c5ca4dc6e20e292d8a094a52f1735becfd38543f71d3cc137", 0x1}, {0x7f, 0x62, &(0x7f0000000380)="34b2555bb11066ceb1793162aea9e4d60ae622ea4cde1cdefb2565788b62c7775ff94a778df7714a7780f81892bdbdae1e49015b9c4e4149784d89b5c9b2f8bd149db7ffffda3c61c61d5b6dd87e9b190896cb523e066a06a4557a520b0f3d07053a", 0x1, 0x1}, {0x0, 0x6b, &(0x7f0000000400)="a83bff03829ce0dfcad8d1dddbb0c5bc14ba2ab2e2f9a2eaf538943d3f18678523f4b5f6aabec09b53164d2f922193853232f8e2c1dc2d6ca2b7d67888c67dac7ded99ac0023786a34731e0b3177221400a20e87e39e26e952765f214ec641bf94618db7ffea4dc4dbf7c2", 0x1, 0x1}]}) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0x0) [ 670.864575] EXT4-fs (loop5): corrupt root inode, run e2fsck [ 670.870582] EXT4-fs (loop5): mount failed 19:27:02 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)=ANY=[@ANYBLOB="300000001000070100dd2174ffff27de00000000", @ANYRES32=0x0, @ANYBLOB="000000000000006008001b00000000000500100005"], 0x30}}, 0x0) 19:27:02 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc2020000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="02000000030000000400000030000f000300040000000000000000000f008ec4", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000e1f4655fe2f4655fe2f4655f000000000000040008", 0x1d, 0x4200}, {&(0x7f0000012700)="20000000d4c49a2e07", 0x9, 0x4280}], 0x0, &(0x7f0000013a00)) 19:27:03 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x9f030000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="02000000030000000400000030000f000300040000000000000000000f008ec4", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000e1f4655fe2f4655fe2f4655f00000000000004", 0x1b, 0x4200}, {&(0x7f0000012700)="20000000d4c49a2e07", 0x9, 0x4280}], 0x0, &(0x7f0000013a00)) 19:27:03 executing program 3: set_mempolicy(0x2, &(0x7f0000000000)=0x9, 0x90) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x4c032, 0xffffffffffffffff, 0x7f01000000000000) 19:27:03 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)=ANY=[@ANYBLOB="300000001000070100dd2174ffff27de00000000", @ANYRES32=0x0, @ANYBLOB="000000000000000c0c001b00000000000500100005"], 0x30}}, 0x0) 19:27:03 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc5010000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="02000000030000000400000030000f000300040000000000000000000f008ec4", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000e1f4655fe2f4655fe2f4655f000000000000040008", 0x1d, 0x4200}, {&(0x7f0000012700)="20000000d4c49a2e07", 0x9, 0x4280}], 0x0, &(0x7f0000013a00)) 19:27:03 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc2030000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="02000000030000000400000030000f000300040000000000000000000f008ec4", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000e1f4655fe2f4655fe2f4655f000000000000040008", 0x1d, 0x4200}, {&(0x7f0000012700)="20000000d4c49a2e07", 0x9, 0x4280}], 0x0, &(0x7f0000013a00)) [ 671.215612] EXT4-fs (loop5): corrupt root inode, run e2fsck [ 671.221504] EXT4-fs (loop5): mount failed [ 671.237321] netlink: 'syz-executor.0': attribute type 27 has an invalid length. 19:27:03 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc3000000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="02000000030000000400000030000f000300040000000000000000000f008ec4", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000e1f4655fe2f4655fe2f4655f000000000000040008", 0x1d, 0x4200}, {&(0x7f0000012700)="20000000d4c49a2e07", 0x9, 0x4280}], 0x0, &(0x7f0000013a00)) 19:27:03 executing program 3: set_mempolicy(0x2, &(0x7f0000000000)=0x9, 0x90) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x4c032, 0xffffffffffffffff, 0x8000000000000000) [ 671.299021] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.0'. [ 671.334428] EXT4-fs (loop5): corrupt root inode, run e2fsck [ 671.376881] EXT4-fs (loop5): mount failed 19:27:03 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc3010000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="02000000030000000400000030000f000300040000000000000000000f008ec4", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000e1f4655fe2f4655fe2f4655f000000000000040008", 0x1d, 0x4200}, {&(0x7f0000012700)="20000000d4c49a2e07", 0x9, 0x4280}], 0x0, &(0x7f0000013a00)) 19:27:03 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)=ANY=[@ANYBLOB="300000001000070100dd2174ffff27de00000000", @ANYRES32=0x0, @ANYBLOB="000000000000000e0c001b00000000000500100005"], 0x30}}, 0x0) [ 671.490597] netlink: 'syz-executor.0': attribute type 27 has an invalid length. [ 671.506551] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.0'. 19:27:03 executing program 2: socket(0x11, 0x0, 0x0) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000180)='/dev/hwrng\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f0000000700), 0xfce3) read$FUSE(r0, &(0x7f0000004740)={0x2020, 0x0, 0x0, 0x0}, 0x2020) write$FUSE_INIT(r0, &(0x7f0000000600)={0x50, 0x0, r1, {0x7, 0x20, 0x4a, 0x2000000, 0xfffb, 0x3, 0x9a11, 0x3}}, 0x50) r3 = perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x8}, 0x1496d, 0x0, 0x0, 0x7, 0x0, 0x0, 0x88}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open$cgroup(&(0x7f0000000280)={0x2, 0x70, 0x3, 0x80, 0x81, 0x2, 0x0, 0x9, 0x6c2, 0xb, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x5, 0x4, @perf_bp={&(0x7f0000000180), 0x6}, 0x41840, 0x40, 0xffffffff, 0x6, 0xf26d, 0x7, 0x3}, 0xffffffffffffffff, 0xffffffffffffffff, r3, 0x9) r4 = socket$vsock_stream(0x28, 0x1, 0x0) r5 = dup(r4) connect$vsock_stream(r5, &(0x7f0000000000)={0x28, 0x0, 0x0, @my=0x0}, 0x10) r6 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080)='/dev/fuse\x00', 0x42, 0x0) mount$fuse(0x0, &(0x7f00000020c0)='./file0\x00', &(0x7f0000002100)='fuse\x00', 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB='\x00\x00\x00', @ANYRESHEX=r6, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) read$FUSE(r6, &(0x7f00000077c0)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_INIT(r6, &(0x7f0000000080)={0x50, 0x0, r7, {0x7, 0x1f, 0x0, 0x110008}}, 0x50) getresgid(&(0x7f0000000100), &(0x7f0000000680)=0x0, &(0x7f00000006c0)) write$FUSE_ENTRY(r5, &(0x7f0000006780)={0x90, 0x0, r7, {0x0, 0x3, 0x347b3d67, 0xfffffffffffffff9, 0x3f, 0x5, {0x1, 0x9, 0x80000001, 0xffffffffffffff01, 0x10001, 0xfffffffffffffff7, 0x35c, 0xc, 0x8, 0x1000, 0x5, r2, r8, 0xb0ba, 0xbe}}}, 0x90) ioctl$INCFS_IOC_FILL_BLOCKS(r3, 0x80106720, &(0x7f00000005c0)={0xa, &(0x7f0000000480)=[{0x68000000, 0xe2, &(0x7f0000000000)="8aa6fbe5106bb1415b42dc4a96567bb045512ae7a01db4b0da2e8cc9e87e30b741ad64498867e8163dab1273cffd36ee565e0b139b702fd40cf3fdd2b13545e97325b62f1d5721c4624e8a2bdf088e0e48f9a99853552abaa618b925f5aa7ee794e298ad4f750085e41e0a79665970e0e2dccdd87afdc9a8d2f33f2c93323beab1b757b80f33450a972506f1f4e4cadbe33adc94030062c2a4b05eadd19e665676120c9b67982ad117f99727f4006ca9f71c7e4873aa74f79a3862c4e80012186ff231f24a85d1b406a75ba1a73326e1a389a37c635899328b0e2393bd83039ec06e", 0x1}, {0x1, 0x0, &(0x7f0000000100), 0x1}, {0x7, 0x1, &(0x7f0000000140)='V', 0x0, 0x1}, {0x1f, 0x9e, &(0x7f00000001c0)="72a7bfc9002a65aab2c41f61ddb909093b21ed081d593d2ea0399ff81996984495f9bef638ed9210b819d59d611cf9edd3823301a1b463d6ba56bd71d3d6f21f42b6c145759abf8b4d551095348f4671413d305f1c8406fdf45fc3f78c76d6c4f857fe4df38df5458103f1d7a27a2a4b9b68594c66f9684e3652986de71976b02db4f4ce06d034218a09a92580d7b2e6cd413d9d970093093b79cb78c6e4", 0x0, 0x1}, {0x63ddd2e9, 0x20, &(0x7f0000000280)="c4da819b46b6c27e2421801a318c3b4c42027f3270b668b3654496437553a389", 0x1}, {0xde0, 0x1000, &(0x7f0000002740)="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", 0x1}, {0x8, 0x1000, &(0x7f0000003740)="041c8bff3820a41a80f4ba9350e8c15b9f9e8d5243e73b177bd08a300925e7896dc85981d493ab3573cb278b5bd202399f1eba9c66773b5bb0a1ab95bbadc5c5d1e657cd69eae54227989246727c0d6694a84cf0c8c3c493a73a16a37fe11d1d9416c6c0c4b0f6591bff55be388c36b564bbc463133ae6289ad933670219905b833f422f82d4f0f265e492dc2305997eabb6e4e037cacbfe46f728718c084217c5ff6051007ddbae48e4df2f118ed414140424148de49f048d84f25b8ac1761dd4e49b4213c3672efefff9184eb43d2568d4383f919ef8a7b896a0f2a10fc3ed5685edf8f9e4d0ab2657bbba5c2c94ce3a8ac5d3980aee9312124092c2689e35e50660f5f55b39851424b9189a806a49bc98d6adc30ff926e91ac734c820945d8ad40a1aee0676a457e403873e661c9b23e356676e99f3fa4a49ad61bd62a39ab086a0d5c73bca2e8eae5853097e5490057b68cefc82c0f905b64ede93216b47661ef18d7aa259c1faafc81fc3fa160378d81503f1189c9e9465d1c5d2b2136c7f7e75a0646b30ae64188433663d65045706e0cc81ee59d25e45719c2c9423eb2d1d39576a9719d3c44b450cbe10a0d1cf5afb0a4376a54c0ff59e58f26abda0bc46a2f094f992673e3615a9ec39fc8abf169b6db0bc3843e516b94700de75be4fcdba12c969b860faaa663020fd3dc237fda689bef4ad0e3fdba724db7963b38d95091e2fd118f01111631c83872b5f90d1a39a1915449cece387e4ab57719a5b02b73778ea37f2528ac5f2dde7b2df8388b4b68de960791c9fd6c9846fb134067423b29c026a28cbcdfc656e236ecde0496331df09528bdf922b165effd258ad907ba0eea09d40eebf4a9fc7547c0be5f3713574b6bad49284e0d244aa8383ccd15aea979c4e0f69bcf12d97d5ebb38b391adb18a0c7e05010ad3fe02b0336eaafd44ab66731806bf18be3193afab793790e011b2f2ac00ddaeec4eddc2d34e7951ac0bb3ad0c04c64b3d7e5291f215c81aab52b7b212c41719d18c27c9580ca01461d41a1ae9e2878f3dd4d995c207434adf1dc9568ff58221cf238621503c2984fa6069aa2f6f31f0ab9b3af8d77b7b1a99702ced5a574046deddef9a5ff432b14b75d8043429ce6fcd599e87cda6f944149d67091f088f27d6601a0d408647080ae9a5e9487d1d75a33f5183eebbfcb47bcbc8b957c3b0b5fbfcd0c5854d3413f588d188e67b098aac696c9498ff0833e3fb0e8c7865bb5f412bf5cb206dfef0d5f3beb5b11b8950c1e386146a7672339c8848b979859161dae8f3b6f9b3a2b0ee116e3ce558fa863b6be34bc09b2527dd0cd77613637b9d01e05858160d6850788a474f12470d6fab1bf03e0a60cfc990cd857d864261d2a8689f9959fa0d1210e215b2a8644c5a404552780ed87abcec70b9b730ce499141f7171858a3eae8c1888f6682c4a9d2edb03d933e45dbda2921dabe6b2eb9278fc24705049be5aa23e90943613db89ad5927da846416de99c47496c32959552efcb30ea7cca729a60bb38ed18b9aef229d643f630c060bf93ea2486dd46279fc36ac59cbcb81c9e9768dd47ba68e9e28e346f86be92577db586ed1b57b4a377d561d0864a591a8bbb629e7da191120a7d1f9713b368e94a59b489b6477b18f5e908ee9964d1c8bd5d5caefb46265567c8bd2fe0850e59d5deeeb696faee8bbbfc2b6918c69992ef36c716ab74ff6815897738190665447ba7c3e5f4883a950a83f5c4387ad7867e731a926674220174bc15b74ac20d8bbac3aafe83c7a96f205852f585e6a9c5bf5842f3d1cdefe6f7d2d596c2919044cb0a747b3b7760739621cb7310d1a7a787d5ecded6c33179f695d254492acca6810cdb9b2c1788579a16fd5bd5b4f665cfcda652234eba14d327c96102f1b01551a82a11b8d29aeb7e25b007a4225a456b200d9453f60f36d32afe539d1837d2b60ec456379efaafb8b06ddebf8af153a2f39d9b2145162470c163e9ae2d339d3f29227bbd8630b8e87a972cd7aa0a60e4240fadd23354f0cc254a8ccd55518644792605f6cef6ec51549972b52dc9124f6ea067ad01f469381568bff207dedd86da35438f11205ea9317f32688705562a7f66799710118b56fe1a1a3eaeed0b12f6bbc40bec1583ec6dafdcb10e74ce79cc31d7e3ecb22faa8c3b9ec6211bd1a2bc3fb90745498ce8e82b2dbccff9f0bd5541b38d8274c02eb211f97d81a17138456b6a55293514125f357bbe3327eec773128e338063d2a7df79756aae2fa34240876d92f1885b66ca4ed1b9a6eca8d6da3780947d8c7dd92e535335fa0e347e8cfacbff72bf26b6a572036838fdd1f69f1817c7755795855b3e161500e8eaefea3cf9ddb6da79144c025e66689fcdfdfa621f94673522e2bebe9d6da80aba04de58967b286ae4b426ead7398571f02dbd566db06fa8e96a85c41031477546d7d64bcbbf51b57c3e99f5eefa5b226a88e978b2f520233acbc8c892f5c1604fafdf092cb1123907746fdca37f00779a687fa5a70a32417d5ca99d8061bf585aad5872c8d2c2686e2bc5f544655fc3fb1879d2db3e06ad5f066020443412046598713b464bb8278f5414764a7445081fe452d7c1de773ab9c03816704dcbced2b27261a645ecff843afad50f5c1473df0b8534592b72d8802e3c61016359eba7a34b55730804f1129f94917434ed91861a5b6bd19f30eca5cc9909bb2e34ef8eeec23a342f4fdcf1bc82a703cb0b76b8a8964c504897dbada0ddbd0540168df166280c1af22f52a348a2b662bfb7ed75ea1262bc8c8a5f3e1fb28a87ef715827fef2039e0cbb0f5199d85473ab329b183a65617d00c586264da283941c2de85183bb65264935e91ba552e5a03cf0325473af8cdb501603053ccefcaa08d096bc138e759c66011e92c1e61c42be3ad197b95dc01fcac72ba0838485f75c442d4ad55dbd61fc5e55469085a288cb39683ee50efad2565d438e7d6e2eb4f961502b169016e3bdf40b27277004c78eb29a38aee45a5583080c9a0066999b2077f6169b3b4e4b9e64ffb178596a1dd15d4aa90cf50ee2f58cd51fc4a19e1ef5d65ed9cb75c5c10ac4450f04f214b7fe4613b701f1407db4832274c125f811a1eaaeb8f92ff3df41d0e33277efbf76bc3ccf54cbadb8a0987ead2bc1ac05fc5ccdfc6c02d4de622f4bb115d381c5e2c0ed534ec71709db03645094acc7ee7984841d8b02776f3f23eb4e9a624ff0ea0cbbfbe65be5caf99d7e58dbca63e0535847ba4732dc460803bb0ac72c2796262f7ac0c46979fc35fc0eea892886065d8a2371a97e05197f7180436a3a797380427eaeb6244e10b2822f99111f6918984a3b89181dee2bbbf49f64c7ee5a11adc5610bc89abc472115ff6157c0b5007686d70d479121ad2d17eb76386005bb0eeae4631e906e167c523bc40621989d9e3fe5c2e32a483b4aab1d0c39244afc02640df6432ca337a448357e05371b725273bd28c6297397965ab4075d7fa635542625c9ba4e3d892f522a51117ee8e112c0a7e462a02110b0a589913cc063203ad9fe4406c76eb66d931be17daedd4ce427a07c3211014b291ad0560d1753cbb974fb3cc6115ed7a7c70f88ef781f5541008aad621e5800bd28e021a18e80c6a01b45bd94599588c29252f91a89b6af85a777a2cfb67d07f8f10b6084517d09a180254bbc0edf722a4507a6811cce1d9fbe3ad03261896459e87b3b3e74051945987c800cb79ac98bc1f794a186daf41a8e5c2d2f571048ad223482334decf7bea1687ec695514177f4439bf9ccf5fd0743182f386c4dc002daa782549bc41158d79814a7e2152a91a7ee9b8997530ff573c4290cd34396e598535c95754be2f1051df5c7ba83c92a9e675e17c4093155cc2c3c54e59c79179451ebc96ad906c2700b50e157af04163d8a9955ee5e72161138d81f8c8d2fb131d81af67fb3853b3a3b577e33617f0fac4d5527330f757da423b435f6152e1978ba3200cf2786117dcfef790fc6f8992bc61be35d848d137e07a1b0793807b81e4378ccac4fa96072fac669d6b0481b5d41a01d5c4fe69e35adb05e237e1ea60583a218d10da82a4baa112c282c7301d8415705926458618d42b3c2e8fd92cd36ccbeb0c92d0113955f208699434644bc0cbdbac9443a81e21301eccbbed0c2f837adc67340764f85f1ce53868d00522263c891cda45c6b9460a022960dc11f210cb689d3b900c5567f8cc3c91a74bce509ab1d5a75b279d8125586f967a0e116049fbe1d7f182c4a2f3accb2fc08cb5368580d61f87736a842ee7b2992f9af3349b3cda0ea60e624077bf4c2b42167f6afed5211e21608f8530180f1caf7d9b3b3aac4cd6853ab936dde02637f448043d9cba0f9b04a56b952329f9a1087ae22cd02ec467dbf5711b21e691f2f959ac40fc117a9f923c110ef2cd76b21d962fba35eb77127f96b897273c1acfb15e5a59e631a38265eb8a4e90c2f7428e99be1f9f2d586591463a74ad71d5861c025203fe7387778a2a89b381ed6f3a13c47502c911f27c2f5cab72ddf10cc4de925caaeb8ba8490d0247a56242feceae6e8cd5d924ca6d6f9e4d8247d67bd5f999306b5be3d54d7d38f2173aed3d401c796e1773cf8fa423463d256d8fae83aef9524a20e6ca41a865b346967a71a830ed372e5cce3c183515edebcfac0904424918dded35b20a0dfd4aa5d145f4869a9b9bb5345629df4e32b26ee2acc04cae5963101cb6ede0ebe2fc7dfb2c39eec96d8d22fa3267a0072ba521a439a4e9e36b528cc22f13ac883c09fe9d19ae64ee0c772eef630db3f245e0c686d5038ea2185a050ca81b6f695ad9f4da869e6db149eafe7af3241ce47dc7894521bf67cc215620ded406a137c827b48fb50456019ee7898fc838810d915936191f5974bcc9998f039ed5f1e612b78678bf28eeae3eea97cc789c83cbb1bde9b824c5c5fecbf3a245324a0ff3887379be75665501cd05fc576775a65fb68de420a38272a5673a39f21f63d34d41686d443a4a9b90dd7ccd27881ad2a5a0c5d02ccee242ad521473b878a982deee5bf7edf80de515355ae3458a704216636543710dd79bd169eb366709fd8507ecb3d7c751423a5ac0b9ad0cfd8dde62af84f02ac75bf97a7ea413a2d052ef1371b0d30856d2d383d6a0edc99c3dbabbeb7d80bee945f17a6d77750310822f1482cb11df95f2b30b3e5394b1597ea1a92390b6d401bd92b5b58786b8898e28c15012eab23fc3c7e1ae4d264ea33be296a8e4489b20a7feafaedee39b0a67cabe1ea04c0390d1760aec84ce7a7bb055889fa9dec3938fda4d0997d1c96ffb026e56004eabb067535fbdeb92cf9e98dc562dfc21ea93fb835853d00470dedeffd0e86a0fd28fde95361b69034ae59c9230f8b4455f50fe292ded886858cfd127d5ec4527122a9d90b03a28ed9882e518212c71a2ce68cd067f46a0b5c71bd8ed7a097ba031ae4ef3153f805f05f7ae21cb4411206675d5f034ac0ada93d63e354416f61b6a9c6f8be7b2ad00e1dfe98804015c7f80115b151d9cb38d227ba64bb806904ec5b270e08d1622accb2df0d161c6f0adbd9fe1a10c6f4f6f4b9f396a83a6a08be20def870042d781b8202996546671b7245728a633333b0f55624fc41ea0a781624a85950b27dcce47a8bd5a109ee52621071e748f65f1917696ea19af6193836561004023370711c5ed8bdf7f36e0466f6a173374b5dec967d53fcfa47de28bd6eeeafd213fdd60cca85fec912a1e832e", 0x1}, {0x4, 0x2c, &(0x7f00000002c0)="05873fad67188454e0f5539cd992d5fe4cd8ef9c5ca4dc6e20e292d8a094a52f1735becfd38543f71d3cc137", 0x1}, {0x7f, 0x62, &(0x7f0000000380)="34b2555bb11066ceb1793162aea9e4d60ae622ea4cde1cdefb2565788b62c7775ff94a778df7714a7780f81892bdbdae1e49015b9c4e4149784d89b5c9b2f8bd149db7ffffda3c61c61d5b6dd87e9b190896cb523e066a06a4557a520b0f3d07053a", 0x1, 0x1}, {0x0, 0x6b, &(0x7f0000000400)="a83bff03829ce0dfcad8d1dddbb0c5bc14ba2ab2e2f9a2eaf538943d3f18678523f4b5f6aabec09b53164d2f922193853232f8e2c1dc2d6ca2b7d67888c67dac7ded99ac0023786a34731e0b3177221400a20e87e39e26e952765f214ec641bf94618db7ffea4dc4dbf7c2", 0x1, 0x1}]}) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0x0) 19:27:03 executing program 3: set_mempolicy(0x2, &(0x7f0000000000)=0x9, 0x90) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x4c032, 0xffffffffffffffff, 0x8001000000000000) 19:27:03 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc5020000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="02000000030000000400000030000f000300040000000000000000000f008ec4", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000e1f4655fe2f4655fe2f4655f000000000000040008", 0x1d, 0x4200}, {&(0x7f0000012700)="20000000d4c49a2e07", 0x9, 0x4280}], 0x0, &(0x7f0000013a00)) 19:27:03 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xa0000000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="02000000030000000400000030000f000300040000000000000000000f008ec4", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000e1f4655fe2f4655fe2f4655f00000000000004", 0x1b, 0x4200}, {&(0x7f0000012700)="20000000d4c49a2e07", 0x9, 0x4280}], 0x0, &(0x7f0000013a00)) 19:27:03 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)=ANY=[@ANYBLOB="300000001000070100dd2174ffff27de00000000", @ANYRES32=0x0, @ANYBLOB="000000000000000910001b00000000000500100005"], 0x30}}, 0x0) 19:27:03 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc3020000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="02000000030000000400000030000f000300040000000000000000000f008ec4", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000e1f4655fe2f4655fe2f4655f000000000000040008", 0x1d, 0x4200}, {&(0x7f0000012700)="20000000d4c49a2e07", 0x9, 0x4280}], 0x0, &(0x7f0000013a00)) 19:27:03 executing program 3: set_mempolicy(0x2, &(0x7f0000000000)=0x9, 0x90) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x4c032, 0xffffffffffffffff, 0x8100000000000000) [ 671.632102] netlink: 'syz-executor.0': attribute type 27 has an invalid length. 19:27:03 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)=ANY=[@ANYBLOB="300000001000070100dd2174ffff27de00000000", @ANYRES32=0x0, @ANYBLOB="000000000000000c10001b00000000000500100005"], 0x30}}, 0x0) 19:27:03 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc3030000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="02000000030000000400000030000f000300040000000000000000000f008ec4", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000e1f4655fe2f4655fe2f4655f000000000000040008", 0x1d, 0x4200}, {&(0x7f0000012700)="20000000d4c49a2e07", 0x9, 0x4280}], 0x0, &(0x7f0000013a00)) [ 671.740945] EXT4-fs (loop5): corrupt root inode, run e2fsck 19:27:03 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc5030000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="02000000030000000400000030000f000300040000000000000000000f008ec4", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000e1f4655fe2f4655fe2f4655f000000000000040008", 0x1d, 0x4200}, {&(0x7f0000012700)="20000000d4c49a2e07", 0x9, 0x4280}], 0x0, &(0x7f0000013a00)) [ 671.803291] EXT4-fs (loop5): mount failed [ 671.809373] netlink: 'syz-executor.0': attribute type 27 has an invalid length. 19:27:03 executing program 3: set_mempolicy(0x2, &(0x7f0000000000)=0x9, 0x90) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x4c032, 0xffffffffffffffff, 0x8101000000000000) 19:27:03 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xa0010000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="02000000030000000400000030000f000300040000000000000000000f008ec4", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000e1f4655fe2f4655fe2f4655f00000000000004", 0x1b, 0x4200}, {&(0x7f0000012700)="20000000d4c49a2e07", 0x9, 0x4280}], 0x0, &(0x7f0000013a00)) [ 672.071233] EXT4-fs (loop5): corrupt root inode, run e2fsck [ 672.077763] EXT4-fs (loop5): mount failed 19:27:04 executing program 2: socket(0x11, 0x0, 0x0) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000180)='/dev/hwrng\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f0000000700), 0xfce3) read$FUSE(r0, &(0x7f0000004740)={0x2020, 0x0, 0x0, 0x0}, 0x2020) write$FUSE_INIT(r0, &(0x7f0000000600)={0x50, 0x0, r1, {0x7, 0x20, 0x4a, 0x2000000, 0xfffb, 0x3, 0x9a11, 0x3}}, 0x50) r3 = perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x8}, 0x1496d, 0x0, 0x0, 0x7, 0x0, 0x0, 0x88}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open$cgroup(&(0x7f0000000280)={0x2, 0x70, 0x3, 0x80, 0x81, 0x2, 0x0, 0x9, 0x6c2, 0xb, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x5, 0x4, @perf_bp={&(0x7f0000000180), 0x6}, 0x41840, 0x40, 0xffffffff, 0x6, 0xf26d, 0x7, 0x3}, 0xffffffffffffffff, 0xffffffffffffffff, r3, 0x9) r4 = socket$vsock_stream(0x28, 0x1, 0x0) r5 = dup(r4) connect$vsock_stream(r5, &(0x7f0000000000)={0x28, 0x0, 0x0, @my=0x0}, 0x10) r6 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080)='/dev/fuse\x00', 0x42, 0x0) mount$fuse(0x0, &(0x7f00000020c0)='./file0\x00', &(0x7f0000002100)='fuse\x00', 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB='\x00\x00\x00', @ANYRESHEX=r6, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) read$FUSE(r6, &(0x7f00000077c0)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_INIT(r6, &(0x7f0000000080)={0x50, 0x0, r7, {0x7, 0x1f, 0x0, 0x110008}}, 0x50) getresgid(&(0x7f0000000100), &(0x7f0000000680)=0x0, &(0x7f00000006c0)) write$FUSE_ENTRY(r5, &(0x7f0000006780)={0x90, 0x0, r7, {0x0, 0x3, 0x347b3d67, 0xfffffffffffffff9, 0x3f, 0x5, {0x1, 0x9, 0x80000001, 0xffffffffffffff01, 0x10001, 0xfffffffffffffff7, 0x35c, 0xc, 0x8, 0x1000, 0x5, r2, r8, 0xb0ba, 0xbe}}}, 0x90) ioctl$INCFS_IOC_FILL_BLOCKS(r3, 0x80106720, &(0x7f00000005c0)={0xa, &(0x7f0000000480)=[{0x68000000, 0xe2, &(0x7f0000000000)="8aa6fbe5106bb1415b42dc4a96567bb045512ae7a01db4b0da2e8cc9e87e30b741ad64498867e8163dab1273cffd36ee565e0b139b702fd40cf3fdd2b13545e97325b62f1d5721c4624e8a2bdf088e0e48f9a99853552abaa618b925f5aa7ee794e298ad4f750085e41e0a79665970e0e2dccdd87afdc9a8d2f33f2c93323beab1b757b80f33450a972506f1f4e4cadbe33adc94030062c2a4b05eadd19e665676120c9b67982ad117f99727f4006ca9f71c7e4873aa74f79a3862c4e80012186ff231f24a85d1b406a75ba1a73326e1a389a37c635899328b0e2393bd83039ec06e", 0x1}, {0x1, 0x0, &(0x7f0000000100), 0x1}, {0x7, 0x1, &(0x7f0000000140)='V', 0x0, 0x1}, {0x1f, 0x9e, &(0x7f00000001c0)="72a7bfc9002a65aab2c41f61ddb909093b21ed081d593d2ea0399ff81996984495f9bef638ed9210b819d59d611cf9edd3823301a1b463d6ba56bd71d3d6f21f42b6c145759abf8b4d551095348f4671413d305f1c8406fdf45fc3f78c76d6c4f857fe4df38df5458103f1d7a27a2a4b9b68594c66f9684e3652986de71976b02db4f4ce06d034218a09a92580d7b2e6cd413d9d970093093b79cb78c6e4", 0x0, 0x1}, {0x63ddd2e9, 0x20, &(0x7f0000000280)="c4da819b46b6c27e2421801a318c3b4c42027f3270b668b3654496437553a389", 0x1}, {0xde0, 0x1000, &(0x7f0000002740)="59db2b7e02462d5f12c54d9e95c74724ebc0077720985c50cdcc7217188a000b26d78f43cdd67f42f0956782ffae78cc34248a82550ae38e916457025a684c5d8beceedfaab07e6dd2769a8dcfaa438bf4d0686ac7d1aab664b202ad2ce080834b5ff80f52fd9ce0646cb9e75ed083120322bf301607fd9b62c01b306425f2175fece56c842daba1715bd5fe3dac0f95aa5f665cf37c6f594fe2b6159a7b6f754d4a38aa9d9320c5be231636cdd1f117435932af3db09851a3cf192b081088e75657bdf63d88230ead107333a1c6aca96ca5fcde163c30e06633630b7a03c896cdc1c8d9e9fd68d6d9d8d240bf8057d9278624659a338e497e73d87854064b32051f7a97045332bbbb24849a42deadbf30f003207f6fef247c900ec1480abee15d4e84f07732b0cc43febfbc9dea3f06b282783776f3b823cc9312cbdb98e004da57b7470559a8a3fd92d2e0d3f069cc7d95b2d4c3b77b7391a3e734c6eb014efe035e8431e3d2010828391317de8037c7a807acc5369bfbff5c66585906904c122e8769e3da275e791bc9256b8612fa35b829140cbecda4ba07f41994376a05cd97f276150c510cbb6cdba4e81cae701702ad0f65f4519199951636788493368cdd18befd93c02e8633168a6c4640e803db5dbbea9d4c1b9b24e7382cf9c5f99cf99b415f192d0783e05eafa6e35d15fcc72a17103b96d5bdf24e836d747526e0f7ba45efa3dcb4c95626be459544e9ca05b283d37e1eaa829f5049c2072b4842a7add06f7df955ae0d0e48e20ce5407da305466e9b5431e7748bfa09e0ecbf392338e1eadc374f6741e7b5546aeda1d1a0bea4234a02c08c313c87bc7b27c3a8a914b41bf0168d39df417dfb0d10ed0e067a7e1d8e33a0ce7a3f529e17e9a70f57ebd48345798c9066df6607d2d2c4719cb0dd74c669b9c3d01e238db8e39ee72498d4c48b2ba01a5495c3c4d8c35ed53601b948bfc3b6bfbe19078469a0fad00f12000d02d5b5fe527c7407fc9696584b0d2fc5fa2e23eea1637baf5f5d9fd4e947e2e8953ebd77702324e43b8e6f5903568ebecf737dea3af6f92a1659ab5f3572c8ab300154f9d4291c555f8bb87f13a7f8f688f58083e2822fcece7c9a4088fbf00cf68dccbbf6d2f1106eb097ee3e85c40ca05e60881118894caba3b301467dee44d6712d09bab54b7b60ba13455d88d2147825b6c23fb93bbca09df2c14b37c3f85606bde510cb7e65693b57b3abc993240a14931e48a08a88baef6d3b93f6f1b1cd5b769f8d37dd3ddd1e9c29888e62c83b68451fa232bbfee8d6ad1c29e4b6371d6a664b96b1f214f785613499f95b8b40febd4302895cafc526c26234ba339c1bc1cbdef9d131e604a167a2d8bcd736a9fdd41165abd67b9748a9c5e0b5f00aec59a73fb8c7cf01c25a9358fdfe54a0b63af8c56b8ab75c4f415c074b7a6b9b0fdc2fe9c5dedf16d98670ad0c45d8bcfdc29be90f0aa2a1e896179598d1a48bb6b67bb39a6cee750fb680769e43e58d581128f0a22effead5674d918a80e5de3aa7e240e6c0bf6da9c0a07b2b5e8e2adaac2f20583d23bff0879a0bffa37775f12dee0de9feffd0008967f873cf0a421601885c355a8e8690b17dfe617c39111d5fc3a12d9083976dfa6d1140d9648c06fe42eb2a8840bd299c57bf6269793e008acf8707588725ec89a84edbcd080139def798871d6d6d3bba2d0a484e144ca2ce389c85808469bfb334c9dcb2d7c2d0bb8f461d4c7049d0acb0be8eac401daf358e3bf1cbb2a84e5cb94675be29b773a51d785ddb5487e56041b7f0d1c3dfcc56544d5a2f4f8f20ad17920904c22b5ec59ced02cd6248b6d35780bf0c52da91b2c1ee6684119e387fef63a3c8969fb9daa51d17151c4ed3af8a69bd802c7bcb15889914c7123b7945c150e7183eb451b7921c36e0ebd6c7551fd6edf309bf2c2fa5034a7492824aa906aeb3f899ff6a71b1d19018cdce4c9bcaeff364db01d0e2bd7e2f276afc3628a0bc842688d9707de8d5bab7dd2e3a21fbb38f2f1e3bfe3308fca07503a1773ce2b547347ef264b74d0f40421427c2df4af3859fc65e07f7c308640683d7a8926ed9d4db721e6035ed803c10083e592cefc7c0cd64a51d475a1c7dfb894e686cd5394df0747b86f555316dacca9a7ffb79e22b2cf54622daf0b3294ff04b0c4694dbb04c5d03de899956d6b6de15b6e20f4b4d3da1ddec2aa396bf34b367e91e762f3d9743fcd866c426993dffa8e7e244cf1894d283f961195de4e616dea8660888671221e2b5c4daf424cc23617cd54c0cca53b44e9180a057fb15f6c55d37032c1bc6b00682c719b40dec167a18613f9f7f588450b6e5254b3e7e8edc84cc116833d9f13313f8d35fac2f12406483b92a3c6904c38152becf95792487eedb9c27111e59f8e72e54603ac334f4281248e158bfaa6f1f53c4360d401215b029d7bec290e1dc609053f862f28c14892691cf550ded907e24d61a11c0a77638c63e30a1255a6aa4603284a4beb9b3ebc02c37a2c62f7406567c5c8af5d1b724274954b0332d2f24197278d197bd2b063a51dc29c498ffd117251fd65b209dc8eaacecfe25ff72997b71c1e22f7e84149add04dc7db4f33167a1b5f24be64d05a029b98e424c462916d97639396efc3fea1ef95a2bf2ee380a123523735b440f946756118c7f13142d6ea3255e5eac98b4b8c2386ea142b943b57f391f8b4ff907c4e36816f83e2a5b033c605acd618c0f36cfe95f55bd499c92e826bf6a8b8525d4a1437a1e567b136ff5af814febdc0eb18a1b1bdd85278c319ed4cc457e9e2fc0fbdaf1bf14e0d024544fdb0e5fb17b19cb229e91b1bf1d0f8320cdeec33c29e215f5dee75d0e67f990d1eeeee2973479ce5fbf60599eac5dd3faa85f31f0cd75746c20b8932b5365bd9e9f1c93966f1bcff376913526e721d77f546f66be741326b89ce3f935bf98622fdf997acab7b26cba62ca1cb9f498eebd6c7ee6f0e9d32af551f93ae986990f62bce665497f8354e683886e211aca03c629857b43d3c5cf45b72ed177d261e8eb018811261fdfb493b36a6b3eb7c42ed8d8c647ca0ee4f55a7c6a79a97d6a4ebc39c872313ed7dd783a9af19f43b8e722773976c894979ee10a410b822390b6b44a20e760d1319ef5f8c8afd71b6b6a0ba546ac23df3acd50cc225f4d40413f8beb475ee0ddcf40545e4276fa061b63d3ddb7932bc2e34da414d1a4aa937dbcb2320d5346f6541e7ffaa268b0cc378f0af675ddbd345c8becb8b84887f20c97962e9c884338afce331690d8e6f08a73feb1b4cdbd6e2dde5fd553f2c67ae084c90c68f88c4f436933a62c621d0cd9a922d655d24009e7539114cc6e7dec793cad761f69a71c2175f124c6ff9065e3230433740a8d93d3338713b2ad8894929b9b83548bb594b0ee94deb700e89df138440c9f51fcd20bded9922504e7af79a65e565ddae2a713c0730f6f9ce14a335c9aa287cd135af8661fc480c30779baf22091737860e68df1c9d4f979159458b32a0f8e307bc828432b740bdcdd45bf90c86952df61dba2723cf10fdba302c07b5e173a4166a5c137564c9c6cd1fd427cbea13f44a26292cdacfad11a403d7ba37b1dbd93781a9897999d501d7b1fc2e6105ae252eb6fbe77a6c93ee0d5b991e164dcad3bb7043489bff32b71a80b45d94e0d106648d739507cf1861210d5fd0052b7cfa5226f6539471b043aca169dab9811b8ed07bad74713f26d6a1bdabf73e50ca80f361d908e96aab7f153f62381c321c70a79a963c7aa1949d895a96b12f00aea13ffc9bb698a77d7ecbf80002117de866908ae3fc540a4afdff8809e3713dc3d4dc4b5d208116c4958237a5a95198108d14c96afdee9a833a2ddd17c801ba50cb64b25b5d2a9f7a5714b767d44b5b321b54f5b7dbbf696e04a94a17398698fb11ded45d1fcefa76bb8590d517db4278a6b7f3e823971f03d3cb08ae465f3f71707d83a0074d8ed05533ed1f32fee9c041e64aab98d90614d2738e68acd8c57070531253d0e44c9298b2117f81dccab3b8d18864488e801692577c46e19b706a13c282c24de654d9631a58d91b0335f0a169c768ee433e983b40701a6a7a10eee76216345c3ffcb3af55d277156a18294eb48e5ebc4a427829de2dd69213277ef8578a787c39dfd0b0f53752e341e590377624332ef10b7daf5f8992a23f86db1c772f002d0da0d132ccc72bc4bae3245e56ae52bc42cd76bdabe069e5ec98d8b966420ca36f19c55bb36706d18047030c14bfc1449b160f88e0e3daec15154041e885b39574e1c9bc7f90e48d1eec66993c50106440c5e434c038c6aec203cf59dc677a4a2fdf2b444b56a7d05f6676f77ee652cc948d1671be897851e3f7dcc7fe78dede4029b3e2a6df8775336df3668e1d398790053a4cc8ee192573407eda232d9be9bd4846e3b23b9402cbaf64a439ebbf9d1d83668d76e21300ccdf1f28330340e27828407ffd3c9e8b6028360d9e6e0dbec8d3eac10aeef09d6324ebd4cef7c6fabb7cf982aa828b6b72f42dd375db2f803b4240f1be4507680ecedfe25e6c87c7a0a14f2a40b9544c334b15ab8814a3716c248782e078be5a25856427c02fb73c26ee4c9bed0e18861809198053fc8e8744f3b75ea65a1835d22ef832f8b06669fc1884cb80e0f5ec69fd7be0dcdc8217afbfdfb944797455cae2c132d48970917b055b767c75d22846d280d423475568e4a3194911631eb98aa021ebb9da438d5c1ed42b39265db3ad161331bdb6448e37be2e5d3cce190e0e2e7fc24aeb2d087216b0bfed9df5f477fbe736de0b5132f8b12c11ec6081f3423d2fd227e9e2fd2bedd8aa6a862501fa8d20f572deac29f89cfab40e65e96740e098992ff23ee1fb6b6cacd27a70cd5816edcd6d3340457ac21f50fee17426dbed07f066482905d514b55b5a87501a9e0f7039a9c74acb0648dc8f9a6b23de5d223277c1cc70d37e2fd3dd55679e18724ec418a62edbf18e9f082ac9c3a03bad96f1711adc68b86725b4ac86093d6a1b72666e672bef576569c7d455139325733509e31fdd098fb870e2ac80604e2f38ef3127e13735b35ef1c30756d66bcec11f9bf7262ffac482b9fecca028349f008dac469b7b2ede936ba7b51f041262d8fd67fbc7714bb970016aadfe115b37fa64b7ac125b4f7dce665b80e8b43cc7f83745c39e58558112240567689430d159b9249ec88aa6877a326f8723d2d80909c7452f7e51bcec43ac8fa19385db1cc5444726a66979def735a8258aeb9ff40dd6f100fb091cfd9dc1b5d18c92f43fd6408141dc25e536894ba22c4d7d982ce9ad37a34cfab9c2e346c8c9cc38e683f6933fd0d5cf7b49a768e0decc45f4f14d6e1393106d19877e7811a2ad552f233fdb7a774c3a6ca3faa82772e19d613c28fb54b4caeef39ff8a494189da95fd67088d09207b35e65b44ff3d3153eba73a49d17014798735ca1ab9db0157f5c73c7daafffe3a4b74fb83a08a526c85e16cdf8c0a4f701d51af7282728a604f07c6044de34d84988eb795fcaaf276277161acba79c3592ecca8329dcc806badc739a890b690af3b14a242b7d16da875dcb718b94de790c1802a64e5d98ad7196852f1d0902d5c2dff4aa7209bc6fac93d93b45069201c371ebe5b7e595b380e017eff50dcf0c5c3c15beb9d392320e86367cf622b92bcf13012461f60ca2628f92ba0aa2aa81e914a25fee0ac73fa5a037748f2c5fc314b176a50405b3593d135d182b2b70c650b29", 0x1}, {0x8, 0x1000, &(0x7f0000003740)="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", 0x1}, {0x4, 0x2c, &(0x7f00000002c0)="05873fad67188454e0f5539cd992d5fe4cd8ef9c5ca4dc6e20e292d8a094a52f1735becfd38543f71d3cc137", 0x1}, {0x7f, 0x62, &(0x7f0000000380)="34b2555bb11066ceb1793162aea9e4d60ae622ea4cde1cdefb2565788b62c7775ff94a778df7714a7780f81892bdbdae1e49015b9c4e4149784d89b5c9b2f8bd149db7ffffda3c61c61d5b6dd87e9b190896cb523e066a06a4557a520b0f3d07053a", 0x1, 0x1}, {0x0, 0x6b, &(0x7f0000000400)="a83bff03829ce0dfcad8d1dddbb0c5bc14ba2ab2e2f9a2eaf538943d3f18678523f4b5f6aabec09b53164d2f922193853232f8e2c1dc2d6ca2b7d67888c67dac7ded99ac0023786a34731e0b3177221400a20e87e39e26e952765f214ec641bf94618db7ffea4dc4dbf7c2", 0x1, 0x1}]}) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0x0) 19:27:04 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)=ANY=[@ANYBLOB="300000001000070100dd2174ffff27de00000000", @ANYRES32=0x0, @ANYBLOB="000000000000000e10001b00000000000500100005"], 0x30}}, 0x0) 19:27:04 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc4000000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="02000000030000000400000030000f000300040000000000000000000f008ec4", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000e1f4655fe2f4655fe2f4655f000000000000040008", 0x1d, 0x4200}, {&(0x7f0000012700)="20000000d4c49a2e07", 0x9, 0x4280}], 0x0, &(0x7f0000013a00)) 19:27:04 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc6000000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="02000000030000000400000030000f000300040000000000000000000f008ec4", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000e1f4655fe2f4655fe2f4655f000000000000040008", 0x1d, 0x4200}, {&(0x7f0000012700)="20000000d4c49a2e07", 0x9, 0x4280}], 0x0, &(0x7f0000013a00)) 19:27:04 executing program 3: set_mempolicy(0x2, &(0x7f0000000000)=0x9, 0x90) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x4c032, 0xffffffffffffffff, 0x8200000000000000) [ 672.176725] EXT4-fs (loop5): corrupt root inode, run e2fsck [ 672.184277] EXT4-fs (loop5): mount failed 19:27:04 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xa0020000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="02000000030000000400000030000f000300040000000000000000000f008ec4", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000e1f4655fe2f4655fe2f4655f00000000000004", 0x1b, 0x4200}, {&(0x7f0000012700)="20000000d4c49a2e07", 0x9, 0x4280}], 0x0, &(0x7f0000013a00)) 19:27:04 executing program 3: set_mempolicy(0x2, &(0x7f0000000000)=0x9, 0x90) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x4c032, 0xffffffffffffffff, 0x8201000000000000) 19:27:04 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc4010000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="02000000030000000400000030000f000300040000000000000000000f008ec4", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000e1f4655fe2f4655fe2f4655f000000000000040008", 0x1d, 0x4200}, {&(0x7f0000012700)="20000000d4c49a2e07", 0x9, 0x4280}], 0x0, &(0x7f0000013a00)) [ 672.271860] netlink: 'syz-executor.0': attribute type 27 has an invalid length. 19:27:04 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)=ANY=[@ANYBLOB="300000001000070100dd2174ffff27de00000000", @ANYRES32=0x0, @ANYBLOB="000000000000000c14001b00000000000500100005"], 0x30}}, 0x0) 19:27:04 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc6010000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="02000000030000000400000030000f000300040000000000000000000f008ec4", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000e1f4655fe2f4655fe2f4655f000000000000040008", 0x1d, 0x4200}, {&(0x7f0000012700)="20000000d4c49a2e07", 0x9, 0x4280}], 0x0, &(0x7f0000013a00)) 19:27:04 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc4020000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="02000000030000000400000030000f000300040000000000000000000f008ec4", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000e1f4655fe2f4655fe2f4655f000000000000040008", 0x1d, 0x4200}, {&(0x7f0000012700)="20000000d4c49a2e07", 0x9, 0x4280}], 0x0, &(0x7f0000013a00)) [ 672.478984] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.0'. 19:27:04 executing program 3: set_mempolicy(0x2, &(0x7f0000000000)=0x9, 0x90) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x4c032, 0xffffffffffffffff, 0x8300000000000000) [ 672.530417] EXT4-fs (loop5): corrupt root inode, run e2fsck [ 672.540391] EXT4-fs (loop5): mount failed 19:27:04 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8c030000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="02000000030000000400000030000f000300040000000000000000000f008ec4", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000e1f4655fe2f4655fe2f4655f00000000000004", 0x1b, 0x4200}, {&(0x7f0000012700)="20000000d4c49a2e07", 0x9, 0x4280}], 0x0, &(0x7f0000013a00)) 19:27:04 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)=ANY=[@ANYBLOB="300000001000070100dd2174ffff27de00000000", @ANYRES32=0x0, @ANYBLOB="000000000000000e14001b00000000000500100005"], 0x30}}, 0x0) 19:27:04 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xa0030000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="02000000030000000400000030000f000300040000000000000000000f008ec4", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000e1f4655fe2f4655fe2f4655f00000000000004", 0x1b, 0x4200}, {&(0x7f0000012700)="20000000d4c49a2e07", 0x9, 0x4280}], 0x0, &(0x7f0000013a00)) 19:27:04 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc4030000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="02000000030000000400000030000f000300040000000000000000000f008ec4", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000e1f4655fe2f4655fe2f4655f000000000000040008", 0x1d, 0x4200}, {&(0x7f0000012700)="20000000d4c49a2e07", 0x9, 0x4280}], 0x0, &(0x7f0000013a00)) 19:27:04 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc6020000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="02000000030000000400000030000f000300040000000000000000000f008ec4", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000e1f4655fe2f4655fe2f4655f000000000000040008", 0x1d, 0x4200}, {&(0x7f0000012700)="20000000d4c49a2e07", 0x9, 0x4280}], 0x0, &(0x7f0000013a00)) 19:27:04 executing program 3: set_mempolicy(0x2, &(0x7f0000000000)=0x9, 0x90) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x4c032, 0xffffffffffffffff, 0x8301000000000000) 19:27:04 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)=ANY=[@ANYBLOB="300000001000070100dd2174ffff27de00000000", @ANYRES32=0x0, @ANYBLOB="000000000000000c18001b00000000000500100005"], 0x30}}, 0x0) [ 672.755367] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.0'. 19:27:04 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc5000000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="02000000030000000400000030000f000300040000000000000000000f008ec4", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000e1f4655fe2f4655fe2f4655f000000000000040008", 0x1d, 0x4200}, {&(0x7f0000012700)="20000000d4c49a2e07", 0x9, 0x4280}], 0x0, &(0x7f0000013a00)) [ 672.820371] EXT4-fs (loop2): corrupt root inode, run e2fsck [ 672.829157] EXT4-fs (loop2): mount failed 19:27:04 executing program 3: set_mempolicy(0x2, &(0x7f0000000000)=0x9, 0x90) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x4c032, 0xffffffffffffffff, 0x8400000000000000) [ 672.862521] EXT4-fs (loop5): corrupt root inode, run e2fsck 19:27:04 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc6030000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="02000000030000000400000030000f000300040000000000000000000f008ec4", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000e1f4655fe2f4655fe2f4655f000000000000040008", 0x1d, 0x4200}, {&(0x7f0000012700)="20000000d4c49a2e07", 0x9, 0x4280}], 0x0, &(0x7f0000013a00)) [ 672.920162] EXT4-fs (loop5): mount failed [ 672.933636] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.0'. 19:27:05 executing program 2: r0 = socket(0x11, 0x0, 0x0) r1 = openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f0000000700), 0xfce3) r2 = socket$vsock_stream(0x28, 0x1, 0x0) r3 = dup(r2) connect$vsock_stream(r3, &(0x7f0000000000)={0x28, 0x0, 0x0, @my=0x0}, 0x10) syz_kvm_setup_cpu$x86(r3, 0xffffffffffffffff, &(0x7f0000fe7000/0x18000)=nil, &(0x7f0000000140)=[@text16={0x10, &(0x7f0000000100)="16b83a018ed8660f38cf090fc7ba00000f20c06635020000000f22c0257f62ab0f01cf0f20c06635040000000f22c00f01c5", 0x32}], 0x1, 0x8, &(0x7f0000000180)=[@efer={0x2, 0x8100}], 0x1) sendmsg$RDMA_NLDEV_CMD_RES_PD_GET(r0, &(0x7f00000000c0)={&(0x7f0000000000), 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x40, 0x140e, 0x100, 0x70bd28, 0x25dfdbfe, "", [@RDMA_NLDEV_ATTR_DEV_INDEX={0x8}, @RDMA_NLDEV_ATTR_PORT_INDEX={0x8, 0x3, 0x2}, @RDMA_NLDEV_ATTR_RES_PDN={0x8}, @RDMA_NLDEV_ATTR_DEV_INDEX={0x8, 0x1, 0x1}, @RDMA_NLDEV_ATTR_PORT_INDEX={0x8, 0x3, 0x1}, @RDMA_NLDEV_ATTR_RES_PDN={0x8}]}, 0x40}, 0x1, 0x0, 0x0, 0x4000080}, 0x1) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0x0) 19:27:05 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc5010000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="02000000030000000400000030000f000300040000000000000000000f008ec4", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000e1f4655fe2f4655fe2f4655f000000000000040008", 0x1d, 0x4200}, {&(0x7f0000012700)="20000000d4c49a2e07", 0x9, 0x4280}], 0x0, &(0x7f0000013a00)) 19:27:05 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)=ANY=[@ANYBLOB="300000001000070100dd2174ffff27de00000000", @ANYRES32=0x0, @ANYBLOB="000000000000000e18001b00000000000500100005"], 0x30}}, 0x0) 19:27:05 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc5020000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="02000000030000000400000030000f000300040000000000000000000f008ec4", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000e1f4655fe2f4655fe2f4655f000000000000040008", 0x1d, 0x4200}, {&(0x7f0000012700)="20000000d4c49a2e07", 0x9, 0x4280}], 0x0, &(0x7f0000013a00)) [ 673.049898] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.0'. [ 673.109985] EXT4-fs (loop5): corrupt root inode, run e2fsck [ 673.119717] EXT4-fs (loop5): mount failed 19:27:05 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xa1000000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="02000000030000000400000030000f000300040000000000000000000f008ec4", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000e1f4655fe2f4655fe2f4655f00000000000004", 0x1b, 0x4200}, {&(0x7f0000012700)="20000000d4c49a2e07", 0x9, 0x4280}], 0x0, &(0x7f0000013a00)) 19:27:05 executing program 3: set_mempolicy(0x2, &(0x7f0000000000)=0x9, 0x90) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x4c032, 0xffffffffffffffff, 0x8401000000000000) 19:27:05 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)=ANY=[@ANYBLOB="300000001000070100dd2174ffff27de00000000", @ANYRES32=0x0, @ANYBLOB="000000000000000c1c001b00000000000500100005"], 0x30}}, 0x0) 19:27:05 executing program 2: r0 = socket(0x11, 0x0, 0x0) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000180)='/dev/hwrng\x00', 0xb0700, 0x0) write(0xffffffffffffffff, &(0x7f0000000580)="c2367d4f5d97f061b5f954d5eb4d8e80530ed842f4b657850c5a8c89984eddb97fee547ae0ee5b7131ec1f00924686eab62462a7b3afbe9fa23f016c1a97df2573bd990725dcb392dcb0655ec80f0564551cd9ffadaebd62d256c52367659f475965c6971d5b9069d883776a758282cba81e2d50bf713bef00000000000000", 0x7f) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, &(0x7f0000000380)={0x0, 0x0, 0x4, 0x0, [], [{0x5, 0x40, 0x0, 0x5, 0x0, 0x3ff}, {0x7, 0x9, 0x8, 0x401, 0xfffffffffffffff9, 0x5}], [[], [], [], []]}) read$FUSE(r1, &(0x7f0000000700), 0xfce3) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0x0) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000)='/dev/fuse\x00', 0x2, 0x0) r3 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x75f, 0x103382) r4 = memfd_create(&(0x7f0000000240)='.^\xc5', 0x0) pwritev(r4, &(0x7f0000000540)=[{&(0x7f0000000000)='B', 0x1}], 0x1, 0x81805, 0x0) ioctl$LOOP_CHANGE_FD(r3, 0x4c00, r4) sendfile(r3, r3, 0x0, 0x24002da8) ioctl$LOOP_SET_STATUS(r3, 0x4c02, &(0x7f00000000c0)={0x0, {}, 0x0, {}, 0x21, 0x0, 0x11, 0x18, "5b6e292720ad1c122716751da9bf189513d65d4796c07a6a60c48e0a829f91b97739809d64e869ae16798a40aad614fac6a21d3dcf2b3e871587f53cd809f98e", "f8b699c929b92ee722240b5b4c44a41eb88c87cff1866be0bec480ebc5c2189e", [0x0, 0x2b]}) r5 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x75f, 0x103382) r6 = memfd_create(&(0x7f0000000240)='.^\xc5', 0x0) pwritev(r6, &(0x7f0000000540)=[{&(0x7f0000000000)='B', 0x1}], 0x1, 0x81805, 0x0) ioctl$LOOP_CHANGE_FD(r5, 0x4c00, r6) poll(&(0x7f0000000040)=[{r2, 0xe405}, {r3, 0x100}, {r0, 0x2}, {r6, 0x942a}, {r1}], 0x5, 0x3812) 19:27:05 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc7000000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="02000000030000000400000030000f000300040000000000000000000f008ec4", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000e1f4655fe2f4655fe2f4655f000000000000040008", 0x1d, 0x4200}, {&(0x7f0000012700)="20000000d4c49a2e07", 0x9, 0x4280}], 0x0, &(0x7f0000013a00)) 19:27:05 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc5030000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="02000000030000000400000030000f000300040000000000000000000f008ec4", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000e1f4655fe2f4655fe2f4655f000000000000040008", 0x1d, 0x4200}, {&(0x7f0000012700)="20000000d4c49a2e07", 0x9, 0x4280}], 0x0, &(0x7f0000013a00)) 19:27:05 executing program 3: set_mempolicy(0x2, &(0x7f0000000000)=0x9, 0x90) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x4c032, 0xffffffffffffffff, 0x8500000000000000) [ 673.221897] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.0'. 19:27:05 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)=ANY=[@ANYBLOB="300000001000070100dd2174ffff27de00000000", @ANYRES32=0x0, @ANYBLOB="000000000000000e1c001b00000000000500100005"], 0x30}}, 0x0) 19:27:05 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc6000000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="02000000030000000400000030000f000300040000000000000000000f008ec4", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000e1f4655fe2f4655fe2f4655f000000000000040008", 0x1d, 0x4200}, {&(0x7f0000012700)="20000000d4c49a2e07", 0x9, 0x4280}], 0x0, &(0x7f0000013a00)) [ 673.327160] EXT4-fs (loop5): corrupt root inode, run e2fsck [ 673.370844] EXT4-fs (loop5): mount failed 19:27:05 executing program 3: set_mempolicy(0x2, &(0x7f0000000000)=0x9, 0x90) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x4c032, 0xffffffffffffffff, 0x8501000000000000) 19:27:05 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc7010000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="02000000030000000400000030000f000300040000000000000000000f008ec4", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000e1f4655fe2f4655fe2f4655f000000000000040008", 0x1d, 0x4200}, {&(0x7f0000012700)="20000000d4c49a2e07", 0x9, 0x4280}], 0x0, &(0x7f0000013a00)) 19:27:05 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc6010000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="02000000030000000400000030000f000300040000000000000000000f008ec4", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000e1f4655fe2f4655fe2f4655f000000000000040008", 0x1d, 0x4200}, {&(0x7f0000012700)="20000000d4c49a2e07", 0x9, 0x4280}], 0x0, &(0x7f0000013a00)) [ 673.448771] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.0'. [ 673.526171] EXT4-fs (loop5): corrupt root inode, run e2fsck [ 673.567718] EXT4-fs (loop5): mount failed 19:27:05 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)=ANY=[@ANYBLOB="300000001000070100dd2174ffff27de00000000", @ANYRES32=0x0, @ANYBLOB="000000000000000020001b00000000000500100005"], 0x30}}, 0x0) 19:27:05 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xa1010000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="02000000030000000400000030000f000300040000000000000000000f008ec4", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000e1f4655fe2f4655fe2f4655f00000000000004", 0x1b, 0x4200}, {&(0x7f0000012700)="20000000d4c49a2e07", 0x9, 0x4280}], 0x0, &(0x7f0000013a00)) 19:27:05 executing program 3: set_mempolicy(0x2, &(0x7f0000000000)=0x9, 0x90) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x4c032, 0xffffffffffffffff, 0x8600000000000000) [ 673.803161] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.0'. [ 673.910624] EXT4-fs (loop5): corrupt root inode, run e2fsck [ 673.951389] EXT4-fs (loop5): mount failed [ 674.057665] EXT4-fs (loop5): corrupt root inode, run e2fsck [ 674.093219] EXT4-fs (loop5): mount failed 19:27:06 executing program 2 (fault-call:13 fault-nth:0): perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0xb6, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8020}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x0, 0x0) r3 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000180)='/dev/hwrng\x00', 0x0, 0x0) read$FUSE(r3, &(0x7f0000000700), 0xfce3) ioctl$BLKPG(r3, 0x1269, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0}) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) socket(0x1d, 0x80000, 0x1) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000540)=0x14) r5 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r5, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000280)=ANY=[@ANYBLOB="3000000024000b0f00"/20, @ANYRES32=r4, @ANYBLOB="ff00000000000000000000e4070001007069650004700200df329e91a7001df00e69c06a95499c88a548ce06aac2a1ea1277d7eef90367edad25e73c20eda73114b9fd2461b6b35fb5262900ff9e"], 0x30}}, 0x0) 19:27:06 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc6020000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="02000000030000000400000030000f000300040000000000000000000f008ec4", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000e1f4655fe2f4655fe2f4655f000000000000040008", 0x1d, 0x4200}, {&(0x7f0000012700)="20000000d4c49a2e07", 0x9, 0x4280}], 0x0, &(0x7f0000013a00)) 19:27:06 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc7020000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="02000000030000000400000030000f000300040000000000000000000f008ec4", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000e1f4655fe2f4655fe2f4655f000000000000040008", 0x1d, 0x4200}, {&(0x7f0000012700)="20000000d4c49a2e07", 0x9, 0x4280}], 0x0, &(0x7f0000013a00)) 19:27:06 executing program 3: set_mempolicy(0x2, &(0x7f0000000000)=0x9, 0x90) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x4c032, 0xffffffffffffffff, 0x8601000000000000) 19:27:06 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)=ANY=[@ANYBLOB="300000001000070100dd2174ffff27de00000000", @ANYRES32=0x0, @ANYBLOB="000000000000000c20001b00000000000500100005"], 0x30}}, 0x0) 19:27:06 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xa1020000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="02000000030000000400000030000f000300040000000000000000000f008ec4", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000e1f4655fe2f4655fe2f4655f00000000000004", 0x1b, 0x4200}, {&(0x7f0000012700)="20000000d4c49a2e07", 0x9, 0x4280}], 0x0, &(0x7f0000013a00)) [ 674.311838] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.0'. [ 674.336448] EXT4-fs (loop5): corrupt root inode, run e2fsck 19:27:06 executing program 3: set_mempolicy(0x2, &(0x7f0000000000)=0x9, 0x90) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x4c032, 0xffffffffffffffff, 0x8700000000000000) 19:27:06 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)=ANY=[@ANYBLOB="300000001000070100dd2174ffff27de00000000", @ANYRES32=0x0, @ANYBLOB="000000000000000e20001b00000000000500100005"], 0x30}}, 0x0) [ 674.360421] EXT4-fs (loop5): mount failed 19:27:06 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc7030000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="02000000030000000400000030000f000300040000000000000000000f008ec4", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000e1f4655fe2f4655fe2f4655f000000000000040008", 0x1d, 0x4200}, {&(0x7f0000012700)="20000000d4c49a2e07", 0x9, 0x4280}], 0x0, &(0x7f0000013a00)) 19:27:06 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc6030000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="02000000030000000400000030000f000300040000000000000000000f008ec4", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000e1f4655fe2f4655fe2f4655f000000000000040008", 0x1d, 0x4200}, {&(0x7f0000012700)="20000000d4c49a2e07", 0x9, 0x4280}], 0x0, &(0x7f0000013a00)) [ 674.439972] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.0'. 19:27:06 executing program 3: set_mempolicy(0x2, &(0x7f0000000000)=0x9, 0x90) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x4c032, 0xffffffffffffffff, 0x8701000000000000) 19:27:06 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc7000000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="02000000030000000400000030000f000300040000000000000000000f008ec4", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000e1f4655fe2f4655fe2f4655f000000000000040008", 0x1d, 0x4200}, {&(0x7f0000012700)="20000000d4c49a2e07", 0x9, 0x4280}], 0x0, &(0x7f0000013a00)) [ 674.526508] FAULT_INJECTION: forcing a failure. [ 674.526508] name failslab, interval 1, probability 0, space 0, times 0 [ 674.545969] CPU: 0 PID: 17071 Comm: syz-executor.2 Not tainted 4.19.167-syzkaller #0 [ 674.553887] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 674.564203] Call Trace: [ 674.566804] dump_stack+0x1fc/0x2fe [ 674.570447] should_fail.cold+0xa/0x14 [ 674.574347] ? setup_fault_attr+0x200/0x200 [ 674.577288] EXT4-fs (loop5): corrupt root inode, run e2fsck [ 674.578672] ? lock_acquire+0x170/0x3c0 [ 674.584648] EXT4-fs (loop5): mount failed [ 674.588371] __should_failslab+0x115/0x180 [ 674.588390] should_failslab+0x5/0xf [ 674.600430] kmem_cache_alloc_trace+0x284/0x380 [ 674.605086] ? loop_queue_work+0x20c0/0x20c0 [ 674.609479] loop_add+0x4e/0x8a0 [ 674.612831] loop_control_ioctl+0x16c/0x480 [ 674.617137] ? loop_lookup+0x1d0/0x1d0 [ 674.621019] ? do_vfs_ioctl+0xc2d/0x12e0 [ 674.625078] ? loop_lookup+0x1d0/0x1d0 [ 674.628947] do_vfs_ioctl+0xcdb/0x12e0 [ 674.632820] ? lock_downgrade+0x720/0x720 [ 674.636952] ? ioctl_preallocate+0x200/0x200 [ 674.641345] ? __fget+0x356/0x510 [ 674.644780] ? do_dup2+0x450/0x450 [ 674.648330] ? vfs_write+0x393/0x540 [ 674.652039] ? fput+0x2b/0x190 [ 674.655225] ksys_ioctl+0x9b/0xc0 [ 674.658662] __x64_sys_ioctl+0x6f/0xb0 [ 674.662549] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 674.667111] do_syscall_64+0xf9/0x620 [ 674.670894] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 674.676064] RIP: 0033:0x45e219 [ 674.679704] Code: 0d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 674.698601] RSP: 002b:00007f1b82d17c68 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 674.706312] RAX: ffffffffffffffda RBX: 0000000000000009 RCX: 000000000045e219 [ 674.713580] RDX: 0000000000000000 RSI: 0000000000004c80 RDI: 0000000000000007 [ 674.721786] RBP: 00007f1b82d17ca0 R08: 0000000000000000 R09: 0000000000000000 [ 674.729036] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 674.736373] R13: 00007ffca1b4a27f R14: 00007f1b82d189c0 R15: 000000000119c034 19:27:06 executing program 2 (fault-call:13 fault-nth:1): perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0xb6, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8020}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x0, 0x0) r3 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000180)='/dev/hwrng\x00', 0x0, 0x0) read$FUSE(r3, &(0x7f0000000700), 0xfce3) ioctl$BLKPG(r3, 0x1269, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0}) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) socket(0x1d, 0x80000, 0x1) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000540)=0x14) r5 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r5, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000280)=ANY=[@ANYBLOB="3000000024000b0f00"/20, @ANYRES32=r4, @ANYBLOB="ff00000000000000000000e4070001007069650004700200df329e91a7001df00e69c06a95499c88a548ce06aac2a1ea1277d7eef90367edad25e73c20eda73114b9fd2461b6b35fb5262900ff9e"], 0x30}}, 0x0) 19:27:06 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)=ANY=[@ANYBLOB="300000001000070100dd2174ffff27de00000000", @ANYRES32=0x0, @ANYBLOB="000000000000000c24001b00000000000500100005"], 0x30}}, 0x0) 19:27:06 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc7010000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="02000000030000000400000030000f000300040000000000000000000f008ec4", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000e1f4655fe2f4655fe2f4655f000000000000040008", 0x1d, 0x4200}, {&(0x7f0000012700)="20000000d4c49a2e07", 0x9, 0x4280}], 0x0, &(0x7f0000013a00)) 19:27:06 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xa1030000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="02000000030000000400000030000f000300040000000000000000000f008ec4", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000e1f4655fe2f4655fe2f4655f00000000000004", 0x1b, 0x4200}, {&(0x7f0000012700)="20000000d4c49a2e07", 0x9, 0x4280}], 0x0, &(0x7f0000013a00)) 19:27:06 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc8000000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="02000000030000000400000030000f000300040000000000000000000f008ec4", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000e1f4655fe2f4655fe2f4655f000000000000040008", 0x1d, 0x4200}, {&(0x7f0000012700)="20000000d4c49a2e07", 0x9, 0x4280}], 0x0, &(0x7f0000013a00)) 19:27:06 executing program 3: set_mempolicy(0x2, &(0x7f0000000000)=0x9, 0x90) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x4c032, 0xffffffffffffffff, 0x8800000000000000) 19:27:06 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc7020000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="02000000030000000400000030000f000300040000000000000000000f008ec4", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000e1f4655fe2f4655fe2f4655f000000000000040008", 0x1d, 0x4200}, {&(0x7f0000012700)="20000000d4c49a2e07", 0x9, 0x4280}], 0x0, &(0x7f0000013a00)) 19:27:06 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)=ANY=[@ANYBLOB="300000001000070100dd2174ffff27de00000000", @ANYRES32=0x0, @ANYBLOB="000000000000000e24001b00000000000500100005"], 0x30}}, 0x0) [ 674.908674] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.0'. [ 674.989905] EXT4-fs (loop5): corrupt root inode, run e2fsck [ 675.008934] EXT4-fs (loop5): mount failed 19:27:07 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc7030000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="02000000030000000400000030000f000300040000000000000000000f008ec4", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000e1f4655fe2f4655fe2f4655f000000000000040008", 0x1d, 0x4200}, {&(0x7f0000012700)="20000000d4c49a2e07", 0x9, 0x4280}], 0x0, &(0x7f0000013a00)) 19:27:07 executing program 3: set_mempolicy(0x2, &(0x7f0000000000)=0x9, 0x90) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x4c032, 0xffffffffffffffff, 0x8801000000000000) [ 675.072022] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.0'. 19:27:07 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc8000000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="02000000030000000400000030000f000300040000000000000000000f008ec4", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000e1f4655fe2f4655fe2f4655f000000000000040008", 0x1d, 0x4200}, {&(0x7f0000012700)="20000000d4c49a2e07", 0x9, 0x4280}], 0x0, &(0x7f0000013a00)) [ 675.117548] FAULT_INJECTION: forcing a failure. [ 675.117548] name failslab, interval 1, probability 0, space 0, times 0 [ 675.142531] EXT4-fs (loop5): corrupt root inode, run e2fsck [ 675.147659] CPU: 0 PID: 17109 Comm: syz-executor.2 Not tainted 4.19.167-syzkaller #0 [ 675.156166] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 675.165359] EXT4-fs (loop5): mount failed [ 675.165552] Call Trace: [ 675.172288] dump_stack+0x1fc/0x2fe [ 675.175931] should_fail.cold+0xa/0x14 [ 675.179835] ? setup_fault_attr+0x200/0x200 [ 675.184163] ? lock_acquire+0x170/0x3c0 [ 675.188153] __should_failslab+0x115/0x180 [ 675.192398] should_failslab+0x5/0xf [ 675.196126] kmem_cache_alloc_node_trace+0x244/0x3b0 [ 675.201234] __kmalloc_node+0x38/0x70 [ 675.205037] blk_mq_alloc_tag_set+0x330/0xa30 [ 675.209527] loop_add+0x26d/0x8a0 [ 675.212984] loop_control_ioctl+0x16c/0x480 19:27:07 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc8010000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="02000000030000000400000030000f000300040000000000000000000f008ec4", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000e1f4655fe2f4655fe2f4655f000000000000040008", 0x1d, 0x4200}, {&(0x7f0000012700)="20000000d4c49a2e07", 0x9, 0x4280}], 0x0, &(0x7f0000013a00)) [ 675.217305] ? loop_lookup+0x1d0/0x1d0 [ 675.221197] ? ksys_write+0x241/0x2a0 [ 675.225008] ? loop_lookup+0x1d0/0x1d0 [ 675.228901] do_vfs_ioctl+0xcdb/0x12e0 [ 675.232805] ? lock_downgrade+0x720/0x720 [ 675.236961] ? check_preemption_disabled+0x41/0x280 [ 675.241982] ? ioctl_preallocate+0x200/0x200 [ 675.246404] ? __fget+0x356/0x510 [ 675.249854] ? do_dup2+0x450/0x450 [ 675.253376] ? vfs_write+0x393/0x540 [ 675.257124] ? fput+0x2b/0x190 [ 675.260302] ksys_ioctl+0x9b/0xc0 [ 675.263739] __x64_sys_ioctl+0x6f/0xb0 [ 675.267606] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 675.272171] do_syscall_64+0xf9/0x620 [ 675.275961] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 675.281178] RIP: 0033:0x45e219 [ 675.284352] Code: 0d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 675.303233] RSP: 002b:00007f1b82d38c68 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 675.310921] RAX: ffffffffffffffda RBX: 0000000000000009 RCX: 000000000045e219 [ 675.318181] RDX: 0000000000000000 RSI: 0000000000004c80 RDI: 0000000000000007 [ 675.325440] RBP: 00007f1b82d38ca0 R08: 0000000000000000 R09: 0000000000000000 [ 675.332722] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 675.340011] R13: 00007ffca1b4a27f R14: 00007f1b82d399c0 R15: 000000000119bf8c 19:27:07 executing program 2 (fault-call:13 fault-nth:2): perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0xb6, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8020}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x0, 0x0) r3 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000180)='/dev/hwrng\x00', 0x0, 0x0) read$FUSE(r3, &(0x7f0000000700), 0xfce3) ioctl$BLKPG(r3, 0x1269, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0}) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) socket(0x1d, 0x80000, 0x1) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000540)=0x14) r5 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r5, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000280)=ANY=[@ANYBLOB="3000000024000b0f00"/20, @ANYRES32=r4, @ANYBLOB="ff00000000000000000000e4070001007069650004700200df329e91a7001df00e69c06a95499c88a548ce06aac2a1ea1277d7eef90367edad25e73c20eda73114b9fd2461b6b35fb5262900ff9e"], 0x30}}, 0x0) 19:27:07 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc8020000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="02000000030000000400000030000f000300040000000000000000000f008ec4", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000e1f4655fe2f4655fe2f4655f000000000000040008", 0x1d, 0x4200}, {&(0x7f0000012700)="20000000d4c49a2e07", 0x9, 0x4280}], 0x0, &(0x7f0000013a00)) 19:27:07 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)=ANY=[@ANYBLOB="300000001000070100dd2174ffff27de00000000", @ANYRES32=0x0, @ANYBLOB="000000000000000025001b00000000000500100005"], 0x30}}, 0x0) 19:27:07 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xa2000000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="02000000030000000400000030000f000300040000000000000000000f008ec4", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000e1f4655fe2f4655fe2f4655f00000000000004", 0x1b, 0x4200}, {&(0x7f0000012700)="20000000d4c49a2e07", 0x9, 0x4280}], 0x0, &(0x7f0000013a00)) 19:27:07 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc8010000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="02000000030000000400000030000f000300040000000000000000000f008ec4", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000e1f4655fe2f4655fe2f4655f000000000000040008", 0x1d, 0x4200}, {&(0x7f0000012700)="20000000d4c49a2e07", 0x9, 0x4280}], 0x0, &(0x7f0000013a00)) 19:27:07 executing program 3: set_mempolicy(0x2, &(0x7f0000000000)=0x9, 0x90) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x4c032, 0xffffffffffffffff, 0x8900000000000000) 19:27:07 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)=ANY=[@ANYBLOB="300000001000070100dd2174ffff27de00000000", @ANYRES32=0x0, @ANYBLOB="000000000000000928001b00000000000500100005"], 0x30}}, 0x0) 19:27:07 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc8030000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="02000000030000000400000030000f000300040000000000000000000f008ec4", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000e1f4655fe2f4655fe2f4655f000000000000040008", 0x1d, 0x4200}, {&(0x7f0000012700)="20000000d4c49a2e07", 0x9, 0x4280}], 0x0, &(0x7f0000013a00)) [ 675.605305] EXT4-fs (loop5): corrupt root inode, run e2fsck [ 675.613516] EXT4-fs (loop5): mount failed 19:27:07 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc8020000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="02000000030000000400000030000f000300040000000000000000000f008ec4", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000e1f4655fe2f4655fe2f4655f000000000000040008", 0x1d, 0x4200}, {&(0x7f0000012700)="20000000d4c49a2e07", 0x9, 0x4280}], 0x0, &(0x7f0000013a00)) [ 675.656678] FAULT_INJECTION: forcing a failure. [ 675.656678] name failslab, interval 1, probability 0, space 0, times 0 [ 675.725713] CPU: 1 PID: 17152 Comm: syz-executor.2 Not tainted 4.19.167-syzkaller #0 [ 675.733626] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 675.742978] Call Trace: [ 675.745585] dump_stack+0x1fc/0x2fe [ 675.749232] should_fail.cold+0xa/0x14 [ 675.753221] ? setup_fault_attr+0x200/0x200 [ 675.757549] ? lock_acquire+0x170/0x3c0 [ 675.761539] __should_failslab+0x115/0x180 [ 675.765781] should_failslab+0x5/0xf [ 675.769515] kmem_cache_alloc_node_trace+0x244/0x3b0 19:27:07 executing program 3: set_mempolicy(0x2, &(0x7f0000000000)=0x9, 0x90) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x4c032, 0xffffffffffffffff, 0x8901000000000000) [ 675.774626] __kmalloc_node+0x38/0x70 [ 675.778440] blk_mq_alloc_tag_set+0x3c2/0xa30 [ 675.782953] loop_add+0x26d/0x8a0 [ 675.786415] loop_control_ioctl+0x16c/0x480 [ 675.790745] ? loop_lookup+0x1d0/0x1d0 [ 675.794624] ? rcu_nmi_exit+0xb3/0x180 [ 675.798555] ? ksys_write+0x241/0x2a0 [ 675.802350] ? loop_lookup+0x1d0/0x1d0 [ 675.806231] do_vfs_ioctl+0xcdb/0x12e0 [ 675.810112] ? lock_downgrade+0x720/0x720 [ 675.814246] ? check_preemption_disabled+0x41/0x280 [ 675.819258] ? ioctl_preallocate+0x200/0x200 [ 675.823664] ? __fget+0x356/0x510 [ 675.827109] ? do_dup2+0x450/0x450 [ 675.830633] ? vfs_write+0x393/0x540 [ 675.834331] ? fput+0x2b/0x190 [ 675.837510] ksys_ioctl+0x9b/0xc0 [ 675.840962] __x64_sys_ioctl+0x6f/0xb0 [ 675.844849] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 675.849438] do_syscall_64+0xf9/0x620 [ 675.853237] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 675.858407] RIP: 0033:0x45e219 19:27:07 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc9000000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="02000000030000000400000030000f000300040000000000000000000f008ec4", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000e1f4655fe2f4655fe2f4655f000000000000040008", 0x1d, 0x4200}, {&(0x7f0000012700)="20000000d4c49a2e07", 0x9, 0x4280}], 0x0, &(0x7f0000013a00)) 19:27:07 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)=ANY=[@ANYBLOB="300000001000070100dd2174ffff27de00000000", @ANYRES32=0x0, @ANYBLOB="000000000000000c28001b00000000000500100005"], 0x30}}, 0x0) [ 675.861595] Code: 0d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 675.880487] RSP: 002b:00007f1b82d17c68 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 675.888177] RAX: ffffffffffffffda RBX: 0000000000000009 RCX: 000000000045e219 [ 675.895524] RDX: 0000000000000000 RSI: 0000000000004c80 RDI: 0000000000000007 [ 675.902793] RBP: 00007f1b82d17ca0 R08: 0000000000000000 R09: 0000000000000000 [ 675.910058] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 675.917311] R13: 00007ffca1b4a27f R14: 00007f1b82d189c0 R15: 000000000119c034 19:27:08 executing program 2 (fault-call:13 fault-nth:3): perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0xb6, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8020}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x0, 0x0) r3 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000180)='/dev/hwrng\x00', 0x0, 0x0) read$FUSE(r3, &(0x7f0000000700), 0xfce3) ioctl$BLKPG(r3, 0x1269, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0}) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) socket(0x1d, 0x80000, 0x1) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000540)=0x14) r5 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r5, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000280)=ANY=[@ANYBLOB="3000000024000b0f00"/20, @ANYRES32=r4, @ANYBLOB="ff00000000000000000000e4070001007069650004700200df329e91a7001df00e69c06a95499c88a548ce06aac2a1ea1277d7eef90367edad25e73c20eda73114b9fd2461b6b35fb5262900ff9e"], 0x30}}, 0x0) 19:27:08 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc9010000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="02000000030000000400000030000f000300040000000000000000000f008ec4", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000e1f4655fe2f4655fe2f4655f000000000000040008", 0x1d, 0x4200}, {&(0x7f0000012700)="20000000d4c49a2e07", 0x9, 0x4280}], 0x0, &(0x7f0000013a00)) 19:27:08 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)=ANY=[@ANYBLOB="300000001000070100dd2174ffff27de00000000", @ANYRES32=0x0, @ANYBLOB="00000000000000092c001b00000000000500100005"], 0x30}}, 0x0) 19:27:08 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xa2010000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="02000000030000000400000030000f000300040000000000000000000f008ec4", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000e1f4655fe2f4655fe2f4655f00000000000004", 0x1b, 0x4200}, {&(0x7f0000012700)="20000000d4c49a2e07", 0x9, 0x4280}], 0x0, &(0x7f0000013a00)) 19:27:08 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc9020000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="02000000030000000400000030000f000300040000000000000000000f008ec4", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000e1f4655fe2f4655fe2f4655f000000000000040008", 0x1d, 0x4200}, {&(0x7f0000012700)="20000000d4c49a2e07", 0x9, 0x4280}], 0x0, &(0x7f0000013a00)) 19:27:08 executing program 3: set_mempolicy(0x2, &(0x7f0000000000)=0x9, 0x90) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x4c032, 0xffffffffffffffff, 0x8a00000000000000) 19:27:08 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc9030000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="02000000030000000400000030000f000300040000000000000000000f008ec4", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000e1f4655fe2f4655fe2f4655f000000000000040008", 0x1d, 0x4200}, {&(0x7f0000012700)="20000000d4c49a2e07", 0x9, 0x4280}], 0x0, &(0x7f0000013a00)) 19:27:08 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)=ANY=[@ANYBLOB="300000001000070100dd2174ffff27de00000000", @ANYRES32=0x0, @ANYBLOB="000000000000000c2c001b00000000000500100005"], 0x30}}, 0x0) 19:27:08 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc8030000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="02000000030000000400000030000f000300040000000000000000000f008ec4", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000e1f4655fe2f4655fe2f4655f000000000000040008", 0x1d, 0x4200}, {&(0x7f0000012700)="20000000d4c49a2e07", 0x9, 0x4280}], 0x0, &(0x7f0000013a00)) [ 676.245951] EXT4-fs (loop5): corrupt root inode, run e2fsck [ 676.246528] FAULT_INJECTION: forcing a failure. [ 676.246528] name failslab, interval 1, probability 0, space 0, times 0 [ 676.283186] EXT4-fs (loop5): mount failed 19:27:08 executing program 3: set_mempolicy(0x2, &(0x7f0000000000)=0x9, 0x90) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x4c032, 0xffffffffffffffff, 0x8a01000000000000) [ 676.344219] CPU: 1 PID: 17187 Comm: syz-executor.2 Not tainted 4.19.167-syzkaller #0 [ 676.352137] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 676.361492] Call Trace: [ 676.364078] dump_stack+0x1fc/0x2fe [ 676.367692] should_fail.cold+0xa/0x14 [ 676.371574] ? setup_fault_attr+0x200/0x200 [ 676.375890] ? lock_acquire+0x170/0x3c0 [ 676.379849] __should_failslab+0x115/0x180 [ 676.384068] should_failslab+0x5/0xf [ 676.387784] kmem_cache_alloc_node_trace+0x244/0x3b0 [ 676.393022] blk_mq_init_tags+0x6a/0x2b0 [ 676.397123] blk_mq_alloc_rq_map+0x9d/0x230 [ 676.401453] __blk_mq_alloc_rq_map+0xa3/0x3b0 [ 676.405948] blk_mq_alloc_tag_set+0x589/0xa30 [ 676.410434] loop_add+0x26d/0x8a0 [ 676.413879] loop_control_ioctl+0x16c/0x480 [ 676.418292] ? loop_lookup+0x1d0/0x1d0 [ 676.422184] ? loop_lookup+0x1d0/0x1d0 [ 676.426079] do_vfs_ioctl+0xcdb/0x12e0 [ 676.429959] ? lock_downgrade+0x720/0x720 [ 676.434142] ? check_preemption_disabled+0x41/0x280 [ 676.439144] ? ioctl_preallocate+0x200/0x200 [ 676.443550] ? __fget+0x356/0x510 [ 676.447004] ? do_dup2+0x450/0x450 [ 676.450536] ? __fdget+0xc/0x230 [ 676.453904] ksys_ioctl+0x9b/0xc0 [ 676.457347] __x64_sys_ioctl+0x6f/0xb0 [ 676.461216] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 676.465781] do_syscall_64+0xf9/0x620 [ 676.469566] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 676.474745] RIP: 0033:0x45e219 [ 676.477930] Code: 0d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 676.496824] RSP: 002b:00007f1b82d17c68 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 676.504532] RAX: ffffffffffffffda RBX: 0000000000000009 RCX: 000000000045e219 [ 676.511794] RDX: 0000000000000000 RSI: 0000000000004c80 RDI: 0000000000000007 [ 676.519053] RBP: 00007f1b82d17ca0 R08: 0000000000000000 R09: 0000000000000000 [ 676.526397] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000003 [ 676.533654] R13: 00007ffca1b4a27f R14: 00007f1b82d189c0 R15: 000000000119c034 19:27:08 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)=ANY=[@ANYBLOB="300000001000070100dd2174ffff27de00000000", @ANYRES32=0x0, @ANYBLOB="000000000000000c30001b00000000000500100005"], 0x30}}, 0x0) 19:27:08 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xca000000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="02000000030000000400000030000f000300040000000000000000000f008ec4", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000e1f4655fe2f4655fe2f4655f000000000000040008", 0x1d, 0x4200}, {&(0x7f0000012700)="20000000d4c49a2e07", 0x9, 0x4280}], 0x0, &(0x7f0000013a00)) [ 676.589381] blk-mq: reduced tag depth (128 -> 64) 19:27:08 executing program 2 (fault-call:13 fault-nth:4): perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0xb6, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8020}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x0, 0x0) r3 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000180)='/dev/hwrng\x00', 0x0, 0x0) read$FUSE(r3, &(0x7f0000000700), 0xfce3) ioctl$BLKPG(r3, 0x1269, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0}) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) socket(0x1d, 0x80000, 0x1) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000540)=0x14) r5 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r5, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000280)=ANY=[@ANYBLOB="3000000024000b0f00"/20, @ANYRES32=r4, @ANYBLOB="ff00000000000000000000e4070001007069650004700200df329e91a7001df00e69c06a95499c88a548ce06aac2a1ea1277d7eef90367edad25e73c20eda73114b9fd2461b6b35fb5262900ff9e"], 0x30}}, 0x0) 19:27:08 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)=ANY=[@ANYBLOB="300000001000070100dd2174ffff27de00000000", @ANYRES32=0x0, @ANYBLOB="000000000000000e30001b00000000000500100005"], 0x30}}, 0x0) 19:27:08 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xca010000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="02000000030000000400000030000f000300040000000000000000000f008ec4", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000e1f4655fe2f4655fe2f4655f000000000000040008", 0x1d, 0x4200}, {&(0x7f0000012700)="20000000d4c49a2e07", 0x9, 0x4280}], 0x0, &(0x7f0000013a00)) [ 676.847091] EXT4-fs (loop5): corrupt root inode, run e2fsck [ 676.855329] EXT4-fs (loop5): mount failed 19:27:09 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xa2020000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="02000000030000000400000030000f000300040000000000000000000f008ec4", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000e1f4655fe2f4655fe2f4655f00000000000004", 0x1b, 0x4200}, {&(0x7f0000012700)="20000000d4c49a2e07", 0x9, 0x4280}], 0x0, &(0x7f0000013a00)) 19:27:09 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)=ANY=[@ANYBLOB="300000001000070100dd2174ffff27de00000000", @ANYRES32=0x0, @ANYBLOB="000000000000000c34001b00000000000500100005"], 0x30}}, 0x0) 19:27:09 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xca020000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="02000000030000000400000030000f000300040000000000000000000f008ec4", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000e1f4655fe2f4655fe2f4655f000000000000040008", 0x1d, 0x4200}, {&(0x7f0000012700)="20000000d4c49a2e07", 0x9, 0x4280}], 0x0, &(0x7f0000013a00)) 19:27:09 executing program 3: set_mempolicy(0x2, &(0x7f0000000000)=0x9, 0x90) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x4c032, 0xffffffffffffffff, 0x8b00000000000000) 19:27:09 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc9000000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="02000000030000000400000030000f000300040000000000000000000f008ec4", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000e1f4655fe2f4655fe2f4655f000000000000040008", 0x1d, 0x4200}, {&(0x7f0000012700)="20000000d4c49a2e07", 0x9, 0x4280}], 0x0, &(0x7f0000013a00)) 19:27:09 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xca030000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="02000000030000000400000030000f000300040000000000000000000f008ec4", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000e1f4655fe2f4655fe2f4655f000000000000040008", 0x1d, 0x4200}, {&(0x7f0000012700)="20000000d4c49a2e07", 0x9, 0x4280}], 0x0, &(0x7f0000013a00)) 19:27:09 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)=ANY=[@ANYBLOB="300000001000070100dd2174ffff27de00000000", @ANYRES32=0x0, @ANYBLOB="000000000000000e34001b00000000000500100005"], 0x30}}, 0x0) 19:27:09 executing program 3: set_mempolicy(0x2, &(0x7f0000000000)=0x9, 0x90) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x4c032, 0xffffffffffffffff, 0x8b01000000000000) 19:27:09 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xcb000000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="02000000030000000400000030000f000300040000000000000000000f008ec4", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000e1f4655fe2f4655fe2f4655f000000000000040008", 0x1d, 0x4200}, {&(0x7f0000012700)="20000000d4c49a2e07", 0x9, 0x4280}], 0x0, &(0x7f0000013a00)) [ 677.252746] FAULT_INJECTION: forcing a failure. [ 677.252746] name failslab, interval 1, probability 0, space 0, times 0 [ 677.270053] CPU: 1 PID: 17217 Comm: syz-executor.2 Not tainted 4.19.167-syzkaller #0 [ 677.277966] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 677.287321] Call Trace: [ 677.289908] dump_stack+0x1fc/0x2fe [ 677.293533] should_fail.cold+0xa/0x14 [ 677.297452] ? setup_fault_attr+0x200/0x200 [ 677.301770] ? lock_acquire+0x170/0x3c0 [ 677.305741] __should_failslab+0x115/0x180 [ 677.309960] should_failslab+0x5/0xf [ 677.313657] kmem_cache_alloc_node_trace+0x244/0x3b0 [ 677.318746] __kmalloc_node+0x38/0x70 [ 677.322581] sbitmap_init_node+0x123/0x440 [ 677.326801] sbitmap_queue_init_node+0x37/0x6c0 [ 677.331460] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 677.336464] blk_mq_init_tags+0x10d/0x2b0 [ 677.340598] blk_mq_alloc_rq_map+0x9d/0x230 [ 677.344943] __blk_mq_alloc_rq_map+0xa3/0x3b0 [ 677.349471] blk_mq_alloc_tag_set+0x589/0xa30 [ 677.353957] loop_add+0x26d/0x8a0 [ 677.357402] loop_control_ioctl+0x16c/0x480 [ 677.361715] ? loop_lookup+0x1d0/0x1d0 [ 677.365586] ? ksys_write+0x241/0x2a0 [ 677.369368] ? loop_lookup+0x1d0/0x1d0 [ 677.373240] do_vfs_ioctl+0xcdb/0x12e0 [ 677.377113] ? lock_downgrade+0x720/0x720 [ 677.381279] ? check_preemption_disabled+0x41/0x280 [ 677.386290] ? ioctl_preallocate+0x200/0x200 [ 677.390684] ? __fget+0x356/0x510 [ 677.394164] ? do_dup2+0x450/0x450 [ 677.397697] ? vfs_write+0x393/0x540 [ 677.401411] ? fput+0x2b/0x190 [ 677.404600] ksys_ioctl+0x9b/0xc0 [ 677.408037] __x64_sys_ioctl+0x6f/0xb0 [ 677.411940] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 677.416515] do_syscall_64+0xf9/0x620 [ 677.420338] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 677.425525] RIP: 0033:0x45e219 [ 677.428718] Code: 0d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 677.447636] RSP: 002b:00007f1b82d38c68 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 677.455340] RAX: ffffffffffffffda RBX: 0000000000000009 RCX: 000000000045e219 [ 677.462678] RDX: 0000000000000000 RSI: 0000000000004c80 RDI: 0000000000000007 [ 677.469954] RBP: 00007f1b82d38ca0 R08: 0000000000000000 R09: 0000000000000000 [ 677.477220] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 677.484585] R13: 00007ffca1b4a27f R14: 00007f1b82d399c0 R15: 000000000119bf8c [ 677.499556] blk-mq: reduced tag depth (128 -> 64) 19:27:09 executing program 2 (fault-call:13 fault-nth:5): perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0xb6, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8020}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x0, 0x0) r3 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000180)='/dev/hwrng\x00', 0x0, 0x0) read$FUSE(r3, &(0x7f0000000700), 0xfce3) ioctl$BLKPG(r3, 0x1269, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0}) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) socket(0x1d, 0x80000, 0x1) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000540)=0x14) r5 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r5, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000280)=ANY=[@ANYBLOB="3000000024000b0f00"/20, @ANYRES32=r4, @ANYBLOB="ff00000000000000000000e4070001007069650004700200df329e91a7001df00e69c06a95499c88a548ce06aac2a1ea1277d7eef90367edad25e73c20eda73114b9fd2461b6b35fb5262900ff9e"], 0x30}}, 0x0) 19:27:09 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)=ANY=[@ANYBLOB="300000001000070100dd2174ffff27de00000000", @ANYRES32=0x0, @ANYBLOB="000000000000000c38001b00000000000500100005"], 0x30}}, 0x0) 19:27:09 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xcb010000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="02000000030000000400000030000f000300040000000000000000000f008ec4", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000e1f4655fe2f4655fe2f4655f000000000000040008", 0x1d, 0x4200}, {&(0x7f0000012700)="20000000d4c49a2e07", 0x9, 0x4280}], 0x0, &(0x7f0000013a00)) [ 677.628745] EXT4-fs (loop5): corrupt root inode, run e2fsck [ 677.636222] EXT4-fs (loop5): mount failed [ 677.770006] EXT4-fs (loop5): corrupt root inode, run e2fsck [ 677.775847] EXT4-fs (loop5): mount failed 19:27:09 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xa2030000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="02000000030000000400000030000f000300040000000000000000000f008ec4", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000e1f4655fe2f4655fe2f4655f00000000000004", 0x1b, 0x4200}, {&(0x7f0000012700)="20000000d4c49a2e07", 0x9, 0x4280}], 0x0, &(0x7f0000013a00)) 19:27:09 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc9010000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="02000000030000000400000030000f000300040000000000000000000f008ec4", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000e1f4655fe2f4655fe2f4655f000000000000040008", 0x1d, 0x4200}, {&(0x7f0000012700)="20000000d4c49a2e07", 0x9, 0x4280}], 0x0, &(0x7f0000013a00)) 19:27:09 executing program 3: set_mempolicy(0x2, &(0x7f0000000000)=0x9, 0x90) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x4c032, 0xffffffffffffffff, 0x8c00000000000000) 19:27:09 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)=ANY=[@ANYBLOB="300000001000070100dd2174ffff27de00000000", @ANYRES32=0x0, @ANYBLOB="000000000000000e38001b00000000000500100005"], 0x30}}, 0x0) 19:27:09 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xcb020000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="02000000030000000400000030000f000300040000000000000000000f008ec4", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000e1f4655fe2f4655fe2f4655f000000000000040008", 0x1d, 0x4200}, {&(0x7f0000012700)="20000000d4c49a2e07", 0x9, 0x4280}], 0x0, &(0x7f0000013a00)) [ 677.837190] FAULT_INJECTION: forcing a failure. [ 677.837190] name failslab, interval 1, probability 0, space 0, times 0 [ 677.861901] CPU: 1 PID: 17267 Comm: syz-executor.2 Not tainted 4.19.167-syzkaller #0 [ 677.869929] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 677.879287] Call Trace: [ 677.881886] dump_stack+0x1fc/0x2fe [ 677.885523] should_fail.cold+0xa/0x14 [ 677.889427] ? setup_fault_attr+0x200/0x200 [ 677.893759] ? lock_acquire+0x170/0x3c0 [ 677.897753] __should_failslab+0x115/0x180 [ 677.898628] nla_parse: 10 callbacks suppressed [ 677.898636] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.0'. [ 677.901993] should_failslab+0x5/0xf [ 677.902010] kmem_cache_alloc_node_trace+0x244/0x3b0 [ 677.902030] sbitmap_queue_init_node+0x240/0x6c0 [ 677.902054] blk_mq_init_tags+0x10d/0x2b0 [ 677.902072] blk_mq_alloc_rq_map+0x9d/0x230 [ 677.902089] __blk_mq_alloc_rq_map+0xa3/0x3b0 [ 677.902108] blk_mq_alloc_tag_set+0x589/0xa30 [ 677.902132] loop_add+0x26d/0x8a0 [ 677.902150] loop_control_ioctl+0x16c/0x480 [ 677.953987] ? loop_lookup+0x1d0/0x1d0 [ 677.957897] ? ksys_write+0x241/0x2a0 [ 677.961709] ? loop_lookup+0x1d0/0x1d0 [ 677.965606] do_vfs_ioctl+0xcdb/0x12e0 [ 677.969501] ? lock_downgrade+0x720/0x720 [ 677.973655] ? check_preemption_disabled+0x41/0x280 [ 677.978679] ? ioctl_preallocate+0x200/0x200 [ 677.983104] ? __fget+0x356/0x510 [ 677.986568] ? do_dup2+0x450/0x450 [ 677.990114] ? vfs_write+0x393/0x540 [ 677.993835] ? fput+0x2b/0x190 [ 677.997037] ksys_ioctl+0x9b/0xc0 [ 678.000513] __x64_sys_ioctl+0x6f/0xb0 [ 678.004403] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 678.009000] do_syscall_64+0xf9/0x620 [ 678.012809] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 678.018002] RIP: 0033:0x45e219 19:27:09 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xcb030000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="02000000030000000400000030000f000300040000000000000000000f008ec4", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000e1f4655fe2f4655fe2f4655f000000000000040008", 0x1d, 0x4200}, {&(0x7f0000012700)="20000000d4c49a2e07", 0x9, 0x4280}], 0x0, &(0x7f0000013a00)) 19:27:10 executing program 3: set_mempolicy(0x2, &(0x7f0000000000)=0x9, 0x90) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x4c032, 0xffffffffffffffff, 0x8c01000000000000) 19:27:10 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xcc000000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="02000000030000000400000030000f000300040000000000000000000f008ec4", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000e1f4655fe2f4655fe2f4655f000000000000040008", 0x1d, 0x4200}, {&(0x7f0000012700)="20000000d4c49a2e07", 0x9, 0x4280}], 0x0, &(0x7f0000013a00)) 19:27:10 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)=ANY=[@ANYBLOB="300000001000070100dd2174ffff27de00000000", @ANYRES32=0x0, @ANYBLOB="000000000000000c3c001b00000000000500100005"], 0x30}}, 0x0) [ 678.021202] Code: 0d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 678.040107] RSP: 002b:00007f1b82d38c68 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 678.047827] RAX: ffffffffffffffda RBX: 0000000000000009 RCX: 000000000045e219 [ 678.055101] RDX: 0000000000000000 RSI: 0000000000004c80 RDI: 0000000000000007 [ 678.062460] RBP: 00007f1b82d38ca0 R08: 0000000000000000 R09: 0000000000000000 [ 678.069737] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000005 [ 678.077117] R13: 00007ffca1b4a27f R14: 00007f1b82d399c0 R15: 000000000119bf8c [ 678.099233] blk-mq: reduced tag depth (128 -> 64) [ 678.149346] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.0'. 19:27:10 executing program 2 (fault-call:13 fault-nth:6): perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0xb6, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8020}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x0, 0x0) r3 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000180)='/dev/hwrng\x00', 0x0, 0x0) read$FUSE(r3, &(0x7f0000000700), 0xfce3) ioctl$BLKPG(r3, 0x1269, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0}) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) socket(0x1d, 0x80000, 0x1) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000540)=0x14) r5 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r5, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000280)=ANY=[@ANYBLOB="3000000024000b0f00"/20, @ANYRES32=r4, @ANYBLOB="ff00000000000000000000e4070001007069650004700200df329e91a7001df00e69c06a95499c88a548ce06aac2a1ea1277d7eef90367edad25e73c20eda73114b9fd2461b6b35fb5262900ff9e"], 0x30}}, 0x0) 19:27:10 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xcc010000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="02000000030000000400000030000f000300040000000000000000000f008ec4", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000e1f4655fe2f4655fe2f4655f000000000000040008", 0x1d, 0x4200}, {&(0x7f0000012700)="20000000d4c49a2e07", 0x9, 0x4280}], 0x0, &(0x7f0000013a00)) 19:27:10 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)=ANY=[@ANYBLOB="300000001000070100dd2174ffff27de00000000", @ANYRES32=0x0, @ANYBLOB="000000000000000e3c001b00000000000500100005"], 0x30}}, 0x0) [ 678.239670] EXT4-fs (loop5): corrupt root inode, run e2fsck [ 678.248606] EXT4-fs (loop5): mount failed [ 678.271988] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.0'. [ 678.322637] EXT4-fs (loop5): corrupt root inode, run e2fsck [ 678.329604] EXT4-fs (loop5): mount failed 19:27:10 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xa3000000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="02000000030000000400000030000f000300040000000000000000000f008ec4", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000e1f4655fe2f4655fe2f4655f00000000000004", 0x1b, 0x4200}, {&(0x7f0000012700)="20000000d4c49a2e07", 0x9, 0x4280}], 0x0, &(0x7f0000013a00)) 19:27:10 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc9020000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="02000000030000000400000030000f000300040000000000000000000f008ec4", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000e1f4655fe2f4655fe2f4655f000000000000040008", 0x1d, 0x4200}, {&(0x7f0000012700)="20000000d4c49a2e07", 0x9, 0x4280}], 0x0, &(0x7f0000013a00)) 19:27:10 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xcc020000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="02000000030000000400000030000f000300040000000000000000000f008ec4", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000e1f4655fe2f4655fe2f4655f000000000000040008", 0x1d, 0x4200}, {&(0x7f0000012700)="20000000d4c49a2e07", 0x9, 0x4280}], 0x0, &(0x7f0000013a00)) 19:27:10 executing program 3: set_mempolicy(0x2, &(0x7f0000000000)=0x9, 0x90) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x4c032, 0xffffffffffffffff, 0x8d00000000000000) 19:27:10 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)=ANY=[@ANYBLOB="300000001000070100dd2174ffff27de00000000", @ANYRES32=0x0, @ANYBLOB="000000000000000040001b00000000000500100005"], 0x30}}, 0x0) [ 678.454940] FAULT_INJECTION: forcing a failure. [ 678.454940] name failslab, interval 1, probability 0, space 0, times 0 [ 678.473192] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.0'. [ 678.478977] CPU: 1 PID: 17317 Comm: syz-executor.2 Not tainted 4.19.167-syzkaller #0 [ 678.489808] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 678.499167] Call Trace: [ 678.501766] dump_stack+0x1fc/0x2fe 19:27:10 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xcc030000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="02000000030000000400000030000f000300040000000000000000000f008ec4", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000e1f4655fe2f4655fe2f4655f000000000000040008", 0x1d, 0x4200}, {&(0x7f0000012700)="20000000d4c49a2e07", 0x9, 0x4280}], 0x0, &(0x7f0000013a00)) 19:27:10 executing program 3: set_mempolicy(0x2, &(0x7f0000000000)=0x9, 0x90) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x4c032, 0xffffffffffffffff, 0x8d01000000000000) [ 678.505419] should_fail.cold+0xa/0x14 [ 678.509332] ? setup_fault_attr+0x200/0x200 [ 678.513663] ? lock_acquire+0x170/0x3c0 [ 678.517663] __should_failslab+0x115/0x180 [ 678.521904] should_failslab+0x5/0xf [ 678.525624] kmem_cache_alloc_node_trace+0x244/0x3b0 [ 678.530737] sbitmap_queue_init_node+0x240/0x6c0 [ 678.535512] blk_mq_init_tags+0x16f/0x2b0 [ 678.539653] blk_mq_alloc_rq_map+0x9d/0x230 [ 678.543981] __blk_mq_alloc_rq_map+0xa3/0x3b0 [ 678.548490] blk_mq_alloc_tag_set+0x589/0xa30 19:27:10 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xcd000000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="02000000030000000400000030000f000300040000000000000000000f008ec4", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000e1f4655fe2f4655fe2f4655f000000000000040008", 0x1d, 0x4200}, {&(0x7f0000012700)="20000000d4c49a2e07", 0x9, 0x4280}], 0x0, &(0x7f0000013a00)) 19:27:10 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xcd010000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="02000000030000000400000030000f000300040000000000000000000f008ec4", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000e1f4655fe2f4655fe2f4655f000000000000040008", 0x1d, 0x4200}, {&(0x7f0000012700)="20000000d4c49a2e07", 0x9, 0x4280}], 0x0, &(0x7f0000013a00)) [ 678.553007] loop_add+0x26d/0x8a0 [ 678.556471] loop_control_ioctl+0x16c/0x480 [ 678.560797] ? loop_lookup+0x1d0/0x1d0 [ 678.564691] ? ksys_write+0x241/0x2a0 [ 678.568501] ? loop_lookup+0x1d0/0x1d0 [ 678.572397] do_vfs_ioctl+0xcdb/0x12e0 [ 678.576297] ? lock_downgrade+0x720/0x720 [ 678.580445] ? check_preemption_disabled+0x41/0x280 [ 678.585469] ? ioctl_preallocate+0x200/0x200 [ 678.589889] ? __fget+0x356/0x510 [ 678.593356] ? do_dup2+0x450/0x450 [ 678.596902] ? vfs_write+0x393/0x540 [ 678.600631] ? fput+0x2b/0x190 [ 678.603840] ksys_ioctl+0x9b/0xc0 [ 678.607333] __x64_sys_ioctl+0x6f/0xb0 [ 678.611225] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 678.615813] do_syscall_64+0xf9/0x620 [ 678.619640] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 678.624829] RIP: 0033:0x45e219 [ 678.628030] Code: 0d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 678.647049] RSP: 002b:00007f1b82d38c68 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 678.654777] RAX: ffffffffffffffda RBX: 0000000000000009 RCX: 000000000045e219 [ 678.662115] RDX: 0000000000000000 RSI: 0000000000004c80 RDI: 0000000000000007 [ 678.669364] RBP: 00007f1b82d38ca0 R08: 0000000000000000 R09: 0000000000000000 [ 678.676615] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000006 [ 678.683866] R13: 00007ffca1b4a27f R14: 00007f1b82d399c0 R15: 000000000119bf8c [ 678.705515] blk-mq: reduced tag depth (128 -> 64) 19:27:10 executing program 2 (fault-call:13 fault-nth:7): perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0xb6, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8020}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x0, 0x0) r3 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000180)='/dev/hwrng\x00', 0x0, 0x0) read$FUSE(r3, &(0x7f0000000700), 0xfce3) ioctl$BLKPG(r3, 0x1269, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0}) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) socket(0x1d, 0x80000, 0x1) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000540)=0x14) r5 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r5, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000280)=ANY=[@ANYBLOB="3000000024000b0f00"/20, @ANYRES32=r4, @ANYBLOB="ff00000000000000000000e4070001007069650004700200df329e91a7001df00e69c06a95499c88a548ce06aac2a1ea1277d7eef90367edad25e73c20eda73114b9fd2461b6b35fb5262900ff9e"], 0x30}}, 0x0) 19:27:10 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xcd020000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="02000000030000000400000030000f000300040000000000000000000f008ec4", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000e1f4655fe2f4655fe2f4655f000000000000040008", 0x1d, 0x4200}, {&(0x7f0000012700)="20000000d4c49a2e07", 0x9, 0x4280}], 0x0, &(0x7f0000013a00)) 19:27:10 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)=ANY=[@ANYBLOB="300000001000070100dd2174ffff27de00000000", @ANYRES32=0x0, @ANYBLOB="000000000000000c40001b00000000000500100005"], 0x30}}, 0x0) [ 678.817571] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.0'. [ 678.885288] EXT4-fs (loop5): corrupt root inode, run e2fsck [ 678.895114] EXT4-fs (loop5): mount failed [ 678.990066] FAULT_INJECTION: forcing a failure. [ 678.990066] name failslab, interval 1, probability 0, space 0, times 0 [ 679.002342] CPU: 1 PID: 17368 Comm: syz-executor.2 Not tainted 4.19.167-syzkaller #0 [ 679.010328] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 679.019672] Call Trace: [ 679.022270] dump_stack+0x1fc/0x2fe [ 679.026024] should_fail.cold+0xa/0x14 [ 679.029920] ? retint_kernel+0x2d/0x2d [ 679.033821] ? setup_fault_attr+0x200/0x200 [ 679.038160] __should_failslab+0x115/0x180 [ 679.042403] should_failslab+0x5/0xf [ 679.046117] kmem_cache_alloc_node_trace+0x244/0x3b0 [ 679.051227] __kmalloc_node+0x38/0x70 [ 679.055122] blk_mq_alloc_rq_map+0xdf/0x230 [ 679.059489] __blk_mq_alloc_rq_map+0xa3/0x3b0 [ 679.063983] blk_mq_alloc_tag_set+0x589/0xa30 [ 679.068488] loop_add+0x26d/0x8a0 [ 679.071935] loop_control_ioctl+0x16c/0x480 [ 679.076289] ? loop_lookup+0x1d0/0x1d0 [ 679.080177] ? loop_lookup+0x1d0/0x1d0 [ 679.084059] do_vfs_ioctl+0xcdb/0x12e0 [ 679.087943] ? lock_downgrade+0x720/0x720 [ 679.092075] ? check_preemption_disabled+0x41/0x280 [ 679.097085] ? ioctl_preallocate+0x200/0x200 [ 679.101500] ? __fget+0x356/0x510 [ 679.104959] ? do_dup2+0x450/0x450 [ 679.108500] ? rcu_nmi_exit+0xb3/0x180 [ 679.112394] ksys_ioctl+0x9b/0xc0 [ 679.115898] __x64_sys_ioctl+0x6f/0xb0 [ 679.119769] do_syscall_64+0xf9/0x620 [ 679.123568] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 679.128749] RIP: 0033:0x45e219 [ 679.131923] Code: 0d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 679.150964] RSP: 002b:00007f1b82cf6c68 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 679.158659] RAX: ffffffffffffffda RBX: 0000000000000009 RCX: 000000000045e219 [ 679.165923] RDX: 0000000000000000 RSI: 0000000000004c80 RDI: 0000000000000007 [ 679.173183] RBP: 00007f1b82cf6ca0 R08: 0000000000000000 R09: 0000000000000000 [ 679.180434] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000007 [ 679.187685] R13: 00007ffca1b4a27f R14: 00007f1b82cf79c0 R15: 000000000119c0dc [ 679.237137] blk-mq: reduced tag depth (128 -> 64) [ 679.315190] EXT4-fs: failed to create workqueue 19:27:11 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xa3010000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="02000000030000000400000030000f000300040000000000000000000f008ec4", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000e1f4655fe2f4655fe2f4655f00000000000004", 0x1b, 0x4200}, {&(0x7f0000012700)="20000000d4c49a2e07", 0x9, 0x4280}], 0x0, &(0x7f0000013a00)) 19:27:11 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc9030000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="02000000030000000400000030000f000300040000000000000000000f008ec4", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000e1f4655fe2f4655fe2f4655f000000000000040008", 0x1d, 0x4200}, {&(0x7f0000012700)="20000000d4c49a2e07", 0x9, 0x4280}], 0x0, &(0x7f0000013a00)) 19:27:11 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xcd030000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="02000000030000000400000030000f000300040000000000000000000f008ec4", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000e1f4655fe2f4655fe2f4655f000000000000040008", 0x1d, 0x4200}, {&(0x7f0000012700)="20000000d4c49a2e07", 0x9, 0x4280}], 0x0, &(0x7f0000013a00)) 19:27:11 executing program 3: set_mempolicy(0x2, &(0x7f0000000000)=0x9, 0x90) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x4c032, 0xffffffffffffffff, 0x8e00000000000000) 19:27:11 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)=ANY=[@ANYBLOB="300000001000070100dd2174ffff27de00000000", @ANYRES32=0x0, @ANYBLOB="000000000000000e40001b00000000000500100005"], 0x30}}, 0x0) [ 679.353412] EXT4-fs (loop5): mount failed 19:27:11 executing program 2 (fault-call:13 fault-nth:8): perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0xb6, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8020}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x0, 0x0) r3 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000180)='/dev/hwrng\x00', 0x0, 0x0) read$FUSE(r3, &(0x7f0000000700), 0xfce3) ioctl$BLKPG(r3, 0x1269, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0}) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) socket(0x1d, 0x80000, 0x1) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000540)=0x14) r5 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r5, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000280)=ANY=[@ANYBLOB="3000000024000b0f00"/20, @ANYRES32=r4, @ANYBLOB="ff00000000000000000000e4070001007069650004700200df329e91a7001df00e69c06a95499c88a548ce06aac2a1ea1277d7eef90367edad25e73c20eda73114b9fd2461b6b35fb5262900ff9e"], 0x30}}, 0x0) 19:27:11 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xa3020000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="02000000030000000400000030000f000300040000000000000000000f008ec4", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000e1f4655fe2f4655fe2f4655f00000000000004", 0x1b, 0x4200}, {&(0x7f0000012700)="20000000d4c49a2e07", 0x9, 0x4280}], 0x0, &(0x7f0000013a00)) 19:27:11 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xce000000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="02000000030000000400000030000f000300040000000000000000000f008ec4", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000e1f4655fe2f4655fe2f4655f000000000000040008", 0x1d, 0x4200}, {&(0x7f0000012700)="20000000d4c49a2e07", 0x9, 0x4280}], 0x0, &(0x7f0000013a00)) 19:27:11 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xce010000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="02000000030000000400000030000f000300040000000000000000000f008ec4", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000e1f4655fe2f4655fe2f4655f000000000000040008", 0x1d, 0x4200}, {&(0x7f0000012700)="20000000d4c49a2e07", 0x9, 0x4280}], 0x0, &(0x7f0000013a00)) [ 679.499428] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.0'. 19:27:11 executing program 3: set_mempolicy(0x2, &(0x7f0000000000)=0x9, 0x90) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x4c032, 0xffffffffffffffff, 0x8e01000000000000) [ 679.578069] EXT4-fs (loop5): corrupt root inode, run e2fsck [ 679.611853] EXT4-fs (loop5): mount failed 19:27:11 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xca000000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="02000000030000000400000030000f000300040000000000000000000f008ec4", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000e1f4655fe2f4655fe2f4655f000000000000040008", 0x1d, 0x4200}, {&(0x7f0000012700)="20000000d4c49a2e07", 0x9, 0x4280}], 0x0, &(0x7f0000013a00)) 19:27:11 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xce020000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="02000000030000000400000030000f000300040000000000000000000f008ec4", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000e1f4655fe2f4655fe2f4655f000000000000040008", 0x1d, 0x4200}, {&(0x7f0000012700)="20000000d4c49a2e07", 0x9, 0x4280}], 0x0, &(0x7f0000013a00)) 19:27:11 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)=ANY=[@ANYBLOB="300000001000070100dd2174ffff27de00000000", @ANYRES32=0x0, @ANYBLOB="000000000000000c44001b00000000000500100005"], 0x30}}, 0x0) 19:27:11 executing program 3: set_mempolicy(0x2, &(0x7f0000000000)=0x9, 0x90) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x4c032, 0xffffffffffffffff, 0x8f00000000000000) [ 679.718076] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.0'. 19:27:11 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xce030000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="02000000030000000400000030000f000300040000000000000000000f008ec4", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000e1f4655fe2f4655fe2f4655f000000000000040008", 0x1d, 0x4200}, {&(0x7f0000012700)="20000000d4c49a2e07", 0x9, 0x4280}], 0x0, &(0x7f0000013a00)) 19:27:11 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)=ANY=[@ANYBLOB="300000001000070100dd2174ffff27de00000000", @ANYRES32=0x0, @ANYBLOB="000000000000000e44001b00000000000500100005"], 0x30}}, 0x0) [ 679.835528] FAULT_INJECTION: forcing a failure. [ 679.835528] name failslab, interval 1, probability 0, space 0, times 0 [ 679.846308] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.0'. [ 679.854983] CPU: 0 PID: 17406 Comm: syz-executor.2 Not tainted 4.19.167-syzkaller #0 [ 679.863336] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 679.872692] Call Trace: [ 679.875293] dump_stack+0x1fc/0x2fe [ 679.878937] should_fail.cold+0xa/0x14 19:27:11 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)=ANY=[@ANYBLOB="300000001000070100dd2174ffff27de00000000", @ANYRES32=0x0, @ANYBLOB="000000000000000c48001b00000000000500100005"], 0x30}}, 0x0) [ 679.882837] ? setup_fault_attr+0x200/0x200 [ 679.887183] __should_failslab+0x115/0x180 [ 679.891428] should_failslab+0x5/0xf [ 679.893816] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.0'. [ 679.895155] kmem_cache_alloc_node_trace+0x244/0x3b0 [ 679.895175] __kmalloc_node+0x38/0x70 [ 679.895191] blk_mq_alloc_rq_map+0x120/0x230 [ 679.895208] __blk_mq_alloc_rq_map+0xa3/0x3b0 [ 679.921552] ? blk_mq_alloc_tag_set+0x51d/0xa30 [ 679.926233] blk_mq_alloc_tag_set+0x589/0xa30 [ 679.930733] loop_add+0x26d/0x8a0 [ 679.934194] loop_control_ioctl+0x16c/0x480 [ 679.938524] ? loop_lookup+0x1d0/0x1d0 [ 679.942427] ? loop_lookup+0x1d0/0x1d0 [ 679.946309] do_vfs_ioctl+0xcdb/0x12e0 [ 679.950204] ? lock_downgrade+0x720/0x720 [ 679.954339] ? check_preemption_disabled+0x41/0x280 [ 679.959341] ? ioctl_preallocate+0x200/0x200 [ 679.963789] ? __fget+0x356/0x510 [ 679.967262] ? do_dup2+0x450/0x450 [ 679.970791] ? vfs_write+0x393/0x540 [ 679.974493] ? fput+0x2b/0x190 [ 679.977670] ksys_ioctl+0x9b/0xc0 [ 679.981136] __x64_sys_ioctl+0x6f/0xb0 [ 679.985014] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 679.989597] do_syscall_64+0xf9/0x620 [ 679.993391] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 679.998569] RIP: 0033:0x45e219 [ 680.001747] Code: 0d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 680.020797] RSP: 002b:00007f1b82cf6c68 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 680.028487] RAX: ffffffffffffffda RBX: 0000000000000009 RCX: 000000000045e219 [ 680.035829] RDX: 0000000000000000 RSI: 0000000000004c80 RDI: 0000000000000007 [ 680.043091] RBP: 00007f1b82cf6ca0 R08: 0000000000000000 R09: 0000000000000000 [ 680.050369] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000008 [ 680.057632] R13: 00007ffca1b4a27f R14: 00007f1b82cf79c0 R15: 000000000119c0dc [ 680.089695] blk-mq: reduced tag depth (128 -> 64) 19:27:12 executing program 2 (fault-call:13 fault-nth:9): perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0xb6, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8020}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x0, 0x0) r3 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000180)='/dev/hwrng\x00', 0x0, 0x0) read$FUSE(r3, &(0x7f0000000700), 0xfce3) ioctl$BLKPG(r3, 0x1269, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0}) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) socket(0x1d, 0x80000, 0x1) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000540)=0x14) r5 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r5, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000280)=ANY=[@ANYBLOB="3000000024000b0f00"/20, @ANYRES32=r4, @ANYBLOB="ff00000000000000000000e4070001007069650004700200df329e91a7001df00e69c06a95499c88a548ce06aac2a1ea1277d7eef90367edad25e73c20eda73114b9fd2461b6b35fb5262900ff9e"], 0x30}}, 0x0) 19:27:12 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)=ANY=[@ANYBLOB="300000001000070100dd2174ffff27de00000000", @ANYRES32=0x0, @ANYBLOB="000000000000000e48001b00000000000500100005"], 0x30}}, 0x0) 19:27:12 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xcf000000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="02000000030000000400000030000f000300040000000000000000000f008ec4", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000e1f4655fe2f4655fe2f4655f000000000000040008", 0x1d, 0x4200}, {&(0x7f0000012700)="20000000d4c49a2e07", 0x9, 0x4280}], 0x0, &(0x7f0000013a00)) 19:27:12 executing program 3: set_mempolicy(0x2, &(0x7f0000000000)=0x9, 0x90) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x4c032, 0xffffffffffffffff, 0x8f01000000000000) 19:27:12 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xa3030000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="02000000030000000400000030000f000300040000000000000000000f008ec4", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000e1f4655fe2f4655fe2f4655f00000000000004", 0x1b, 0x4200}, {&(0x7f0000012700)="20000000d4c49a2e07", 0x9, 0x4280}], 0x0, &(0x7f0000013a00)) 19:27:12 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xca010000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="02000000030000000400000030000f000300040000000000000000000f008ec4", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000e1f4655fe2f4655fe2f4655f000000000000040008", 0x1d, 0x4200}, {&(0x7f0000012700)="20000000d4c49a2e07", 0x9, 0x4280}], 0x0, &(0x7f0000013a00)) 19:27:12 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xcf010000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="02000000030000000400000030000f000300040000000000000000000f008ec4", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000e1f4655fe2f4655fe2f4655f000000000000040008", 0x1d, 0x4200}, {&(0x7f0000012700)="20000000d4c49a2e07", 0x9, 0x4280}], 0x0, &(0x7f0000013a00)) [ 680.350067] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.0'. 19:27:12 executing program 3: set_mempolicy(0x2, &(0x7f0000000000)=0x9, 0x90) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x4c032, 0xffffffffffffffff, 0x9000000000000000) [ 680.414113] EXT4-fs (loop5): corrupt root inode, run e2fsck [ 680.454155] EXT4-fs (loop5): mount failed 19:27:12 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)=ANY=[@ANYBLOB="300000001000070100dd2174ffff27de00000000", @ANYRES32=0x0, @ANYBLOB="000000000000000c4c001b00000000000500100005"], 0x30}}, 0x0) 19:27:12 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xcf020000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="02000000030000000400000030000f000300040000000000000000000f008ec4", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000e1f4655fe2f4655fe2f4655f000000000000040008", 0x1d, 0x4200}, {&(0x7f0000012700)="20000000d4c49a2e07", 0x9, 0x4280}], 0x0, &(0x7f0000013a00)) 19:27:12 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)=ANY=[@ANYBLOB="300000001000070100dd2174ffff27de00000000", @ANYRES32=0x0, @ANYBLOB="000000000000000e4c001b00000000000500100005"], 0x30}}, 0x0) 19:27:12 executing program 3: set_mempolicy(0x2, &(0x7f0000000000)=0x9, 0x90) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x4c032, 0xffffffffffffffff, 0x9001000000000000) [ 680.659443] FAULT_INJECTION: forcing a failure. [ 680.659443] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 680.679962] CPU: 0 PID: 17459 Comm: syz-executor.2 Not tainted 4.19.167-syzkaller #0 [ 680.687879] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 680.697238] Call Trace: [ 680.699840] dump_stack+0x1fc/0x2fe [ 680.703473] should_fail.cold+0xa/0x14 [ 680.707345] ? setup_fault_attr+0x200/0x200 [ 680.711708] __alloc_pages_nodemask+0x239/0x2890 [ 680.716446] ? kasan_kmalloc+0x139/0x160 [ 680.720486] ? __kmalloc_node+0x4c/0x70 [ 680.724454] ? blk_mq_alloc_rq_map+0x120/0x230 [ 680.729069] ? __blk_mq_alloc_rq_map+0xa3/0x3b0 [ 680.733717] ? blk_mq_alloc_tag_set+0x589/0xa30 [ 680.738365] ? loop_add+0x26d/0x8a0 [ 680.741972] ? loop_control_ioctl+0x16c/0x480 [ 680.746459] ? do_vfs_ioctl+0xcdb/0x12e0 [ 680.750510] ? do_syscall_64+0xf9/0x620 [ 680.754471] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 680.759818] ? mark_held_locks+0xa6/0xf0 [ 680.763862] ? cache_alloc_refill+0x95/0x340 [ 680.768254] ? gfp_pfmemalloc_allowed+0x150/0x150 [ 680.773078] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 680.777654] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 680.782394] ? retint_kernel+0x2d/0x2d [ 680.786263] ? find_next_bit+0x105/0x130 [ 680.790308] ? __cpu_to_node+0x7b/0xa0 [ 680.794195] ? blk_mq_hw_queue_to_node+0xc1/0x100 [ 680.799019] blk_mq_alloc_rqs+0x242/0x800 [ 680.803174] ? blk_mq_alloc_rq_map+0xaa/0x230 [ 680.807673] __blk_mq_alloc_rq_map+0x15b/0x3b0 [ 680.812255] blk_mq_alloc_tag_set+0x589/0xa30 [ 680.816739] loop_add+0x26d/0x8a0 [ 680.820185] loop_control_ioctl+0x16c/0x480 [ 680.824500] ? loop_lookup+0x1d0/0x1d0 [ 680.828378] ? loop_lookup+0x1d0/0x1d0 [ 680.832251] ? loop_lookup+0x1d0/0x1d0 [ 680.836121] do_vfs_ioctl+0xcdb/0x12e0 [ 680.839995] ? lock_downgrade+0x720/0x720 [ 680.844125] ? ioctl_preallocate+0x200/0x200 [ 680.848519] ? __fget+0x356/0x510 [ 680.851975] ? do_dup2+0x450/0x450 [ 680.855521] ? fput+0x2b/0x190 [ 680.858700] ksys_ioctl+0x9b/0xc0 [ 680.862136] __x64_sys_ioctl+0x6f/0xb0 [ 680.866020] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 680.870591] do_syscall_64+0xf9/0x620 [ 680.874392] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 680.879574] RIP: 0033:0x45e219 [ 680.882750] Code: 0d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 680.901644] RSP: 002b:00007f1b82cf6c68 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 680.909338] RAX: ffffffffffffffda RBX: 0000000000000009 RCX: 000000000045e219 [ 680.916596] RDX: 0000000000000000 RSI: 0000000000004c80 RDI: 0000000000000007 [ 680.923858] RBP: 00007f1b82cf6ca0 R08: 0000000000000000 R09: 0000000000000000 [ 680.931117] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000009 [ 680.938369] R13: 00007ffca1b4a27f R14: 00007f1b82cf79c0 R15: 000000000119c0dc 19:27:13 executing program 2 (fault-call:13 fault-nth:10): perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0xb6, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8020}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x0, 0x0) r3 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000180)='/dev/hwrng\x00', 0x0, 0x0) read$FUSE(r3, &(0x7f0000000700), 0xfce3) ioctl$BLKPG(r3, 0x1269, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0}) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) socket(0x1d, 0x80000, 0x1) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000540)=0x14) r5 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r5, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000280)=ANY=[@ANYBLOB="3000000024000b0f00"/20, @ANYRES32=r4, @ANYBLOB="ff00000000000000000000e4070001007069650004700200df329e91a7001df00e69c06a95499c88a548ce06aac2a1ea1277d7eef90367edad25e73c20eda73114b9fd2461b6b35fb5262900ff9e"], 0x30}}, 0x0) 19:27:13 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xcf030000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="02000000030000000400000030000f000300040000000000000000000f008ec4", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000e1f4655fe2f4655fe2f4655f000000000000040008", 0x1d, 0x4200}, {&(0x7f0000012700)="20000000d4c49a2e07", 0x9, 0x4280}], 0x0, &(0x7f0000013a00)) 19:27:13 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)=ANY=[@ANYBLOB="300000001000070100dd2174ffff27de00000000", @ANYRES32=0x0, @ANYBLOB="000000000000000b50001b00000000000500100005"], 0x30}}, 0x0) 19:27:13 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xca020000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="02000000030000000400000030000f000300040000000000000000000f008ec4", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000e1f4655fe2f4655fe2f4655f000000000000040008", 0x1d, 0x4200}, {&(0x7f0000012700)="20000000d4c49a2e07", 0x9, 0x4280}], 0x0, &(0x7f0000013a00)) [ 681.145277] EXT4-fs (loop5): corrupt root inode, run e2fsck [ 681.157009] EXT4-fs (loop5): mount failed 19:27:13 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xa4000000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="02000000030000000400000030000f000300040000000000000000000f008ec4", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000e1f4655fe2f4655fe2f4655f00000000000004", 0x1b, 0x4200}, {&(0x7f0000012700)="20000000d4c49a2e07", 0x9, 0x4280}], 0x0, &(0x7f0000013a00)) 19:27:13 executing program 3: set_mempolicy(0x2, &(0x7f0000000000)=0x9, 0x90) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x4c032, 0xffffffffffffffff, 0x9100000000000000) 19:27:13 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)=ANY=[@ANYBLOB="300000001000070100dd2174ffff27de00000000", @ANYRES32=0x0, @ANYBLOB="000000000000000c50001b00000000000500100005"], 0x30}}, 0x0) 19:27:13 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xd0000000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="02000000030000000400000030000f000300040000000000000000000f008ec4", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000e1f4655fe2f4655fe2f4655f000000000000040008", 0x1d, 0x4200}, {&(0x7f0000012700)="20000000d4c49a2e07", 0x9, 0x4280}], 0x0, &(0x7f0000013a00)) 19:27:13 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)=ANY=[@ANYBLOB="300000001000070100dd2174ffff27de00000000", @ANYRES32=0x0, @ANYBLOB="000000000000000e50001b00000000000500100005"], 0x30}}, 0x0) 19:27:13 executing program 3: set_mempolicy(0x2, &(0x7f0000000000)=0x9, 0x90) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x4c032, 0xffffffffffffffff, 0x9101000000000000) 19:27:13 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xd0010000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="02000000030000000400000030000f000300040000000000000000000f008ec4", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000e1f4655fe2f4655fe2f4655f000000000000040008", 0x1d, 0x4200}, {&(0x7f0000012700)="20000000d4c49a2e07", 0x9, 0x4280}], 0x0, &(0x7f0000013a00)) 19:27:13 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)=ANY=[@ANYBLOB="300000001000070100dd2174ffff27de00000000", @ANYRES32=0x0, @ANYBLOB="000000000000000b54001b00000000000500100005"], 0x30}}, 0x0) [ 681.482377] FAULT_INJECTION: forcing a failure. [ 681.482377] name failslab, interval 1, probability 0, space 0, times 0 [ 681.525115] CPU: 1 PID: 17483 Comm: syz-executor.2 Not tainted 4.19.167-syzkaller #0 [ 681.533038] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 681.542509] Call Trace: [ 681.545100] dump_stack+0x1fc/0x2fe [ 681.548875] should_fail.cold+0xa/0x14 [ 681.552768] ? setup_fault_attr+0x200/0x200 [ 681.557098] ? lock_acquire+0x170/0x3c0 [ 681.561098] __should_failslab+0x115/0x180 [ 681.565343] should_failslab+0x5/0xf [ 681.569064] kmem_cache_alloc_node+0x245/0x3b0 [ 681.573648] blk_alloc_queue_node+0x32/0xbd0 [ 681.578051] blk_mq_init_queue+0x44/0xa0 [ 681.582113] loop_add+0x2cb/0x8a0 [ 681.585578] loop_control_ioctl+0x16c/0x480 [ 681.589919] ? loop_lookup+0x1d0/0x1d0 [ 681.593841] ? ksys_write+0x241/0x2a0 [ 681.597653] ? loop_lookup+0x1d0/0x1d0 [ 681.601546] do_vfs_ioctl+0xcdb/0x12e0 [ 681.605437] ? lock_downgrade+0x720/0x720 [ 681.609586] ? check_preemption_disabled+0x41/0x280 [ 681.614608] ? ioctl_preallocate+0x200/0x200 [ 681.619028] ? __fget+0x356/0x510 [ 681.622490] ? do_dup2+0x450/0x450 [ 681.626035] ? vfs_write+0x393/0x540 [ 681.629852] ? fput+0x2b/0x190 [ 681.633051] ksys_ioctl+0x9b/0xc0 [ 681.636498] __x64_sys_ioctl+0x6f/0xb0 [ 681.640366] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 681.644948] do_syscall_64+0xf9/0x620 [ 681.648755] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 681.653942] RIP: 0033:0x45e219 [ 681.657137] Code: 0d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 681.676034] RSP: 002b:00007f1b82d38c68 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 681.683728] RAX: ffffffffffffffda RBX: 0000000000000009 RCX: 000000000045e219 [ 681.690989] RDX: 0000000000000000 RSI: 0000000000004c80 RDI: 0000000000000007 [ 681.698266] RBP: 00007f1b82d38ca0 R08: 0000000000000000 R09: 0000000000000000 [ 681.705527] R10: 0000000000000000 R11: 0000000000000246 R12: 000000000000000a [ 681.712812] R13: 00007ffca1b4a27f R14: 00007f1b82d399c0 R15: 000000000119bf8c [ 681.752968] EXT4-fs (loop5): corrupt root inode, run e2fsck [ 681.758955] EXT4-fs (loop5): mount failed 19:27:13 executing program 2 (fault-call:13 fault-nth:11): perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0xb6, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8020}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x0, 0x0) r3 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000180)='/dev/hwrng\x00', 0x0, 0x0) read$FUSE(r3, &(0x7f0000000700), 0xfce3) ioctl$BLKPG(r3, 0x1269, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0}) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) socket(0x1d, 0x80000, 0x1) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000540)=0x14) r5 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r5, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000280)=ANY=[@ANYBLOB="3000000024000b0f00"/20, @ANYRES32=r4, @ANYBLOB="ff00000000000000000000e4070001007069650004700200df329e91a7001df00e69c06a95499c88a548ce06aac2a1ea1277d7eef90367edad25e73c20eda73114b9fd2461b6b35fb5262900ff9e"], 0x30}}, 0x0) 19:27:13 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xd0020000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="02000000030000000400000030000f000300040000000000000000000f008ec4", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000e1f4655fe2f4655fe2f4655f000000000000040008", 0x1d, 0x4200}, {&(0x7f0000012700)="20000000d4c49a2e07", 0x9, 0x4280}], 0x0, &(0x7f0000013a00)) 19:27:13 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)=ANY=[@ANYBLOB="300000001000070100dd2174ffff27de00000000", @ANYRES32=0x0, @ANYBLOB="000000000000000c54001b00000000000500100005"], 0x30}}, 0x0) 19:27:13 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xca030000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="02000000030000000400000030000f000300040000000000000000000f008ec4", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000e1f4655fe2f4655fe2f4655f000000000000040008", 0x1d, 0x4200}, {&(0x7f0000012700)="20000000d4c49a2e07", 0x9, 0x4280}], 0x0, &(0x7f0000013a00)) 19:27:13 executing program 3: set_mempolicy(0x2, &(0x7f0000000000)=0x9, 0x90) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x4c032, 0xffffffffffffffff, 0x9200000000000000) 19:27:13 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xa4010000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="02000000030000000400000030000f000300040000000000000000000f008ec4", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000e1f4655fe2f4655fe2f4655f00000000000004", 0x1b, 0x4200}, {&(0x7f0000012700)="20000000d4c49a2e07", 0x9, 0x4280}], 0x0, &(0x7f0000013a00)) 19:27:13 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)=ANY=[@ANYBLOB="300000001000070100dd2174ffff27de00000000", @ANYRES32=0x0, @ANYBLOB="000000000000000e54001b00000000000500100005"], 0x30}}, 0x0) 19:27:14 executing program 3: set_mempolicy(0x2, &(0x7f0000000000)=0x9, 0x90) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x4c032, 0xffffffffffffffff, 0x9201000000000000) 19:27:14 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xcb000000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="02000000030000000400000030000f000300040000000000000000000f008ec4", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000e1f4655fe2f4655fe2f4655f000000000000040008", 0x1d, 0x4200}, {&(0x7f0000012700)="20000000d4c49a2e07", 0x9, 0x4280}], 0x0, &(0x7f0000013a00)) 19:27:14 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xd0030000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="02000000030000000400000030000f000300040000000000000000000f008ec4", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000e1f4655fe2f4655fe2f4655f000000000000040008", 0x1d, 0x4200}, {&(0x7f0000012700)="20000000d4c49a2e07", 0x9, 0x4280}], 0x0, &(0x7f0000013a00)) [ 681.996998] EXT4-fs (loop5): corrupt root inode, run e2fsck [ 682.031280] EXT4-fs (loop5): mount failed 19:27:14 executing program 3: set_mempolicy(0x2, &(0x7f0000000000)=0x9, 0x90) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x4c032, 0xffffffffffffffff, 0x9300000000000000) [ 682.078427] FAULT_INJECTION: forcing a failure. [ 682.078427] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 682.090256] CPU: 0 PID: 17546 Comm: syz-executor.2 Not tainted 4.19.167-syzkaller #0 [ 682.098145] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 682.107507] Call Trace: [ 682.110162] dump_stack+0x1fc/0x2fe [ 682.113833] should_fail.cold+0xa/0x14 [ 682.117720] ? setup_fault_attr+0x200/0x200 [ 682.122030] ? check_preemption_disabled+0x41/0x280 [ 682.127042] __alloc_pages_nodemask+0x239/0x2890 [ 682.131786] ? __alloc_pages_nodemask+0x1b43/0x2890 [ 682.136848] ? kasan_kmalloc+0x139/0x160 [ 682.141021] ? __lock_acquire+0x6de/0x3ff0 [ 682.145258] ? gfp_pfmemalloc_allowed+0x150/0x150 [ 682.150101] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 682.154885] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 682.159472] ? rcu_nmi_exit+0xb3/0x180 [ 682.163344] ? retint_kernel+0x2d/0x2d [ 682.167218] cache_grow_begin+0xa4/0x8a0 [ 682.171290] ? setup_fault_attr+0x200/0x200 [ 682.175617] ? lock_acquire+0x1ec/0x3c0 [ 682.179603] cache_alloc_refill+0x273/0x340 [ 682.183920] kmem_cache_alloc_node+0x39e/0x3b0 [ 682.188494] blk_alloc_queue_node+0x32/0xbd0 [ 682.192910] blk_mq_init_queue+0x44/0xa0 [ 682.196981] loop_add+0x2cb/0x8a0 [ 682.200476] loop_control_ioctl+0x16c/0x480 [ 682.204780] ? loop_lookup+0x1d0/0x1d0 [ 682.208693] ? loop_lookup+0x1d0/0x1d0 [ 682.212577] ? loop_lookup+0x1d0/0x1d0 [ 682.216459] do_vfs_ioctl+0xcdb/0x12e0 [ 682.220330] ? lock_downgrade+0x720/0x720 [ 682.224463] ? check_preemption_disabled+0x41/0x280 [ 682.229461] ? ioctl_preallocate+0x200/0x200 [ 682.233863] ? __fget+0x356/0x510 [ 682.237299] ? do_dup2+0x450/0x450 [ 682.240856] ? rcu_nmi_exit+0xb3/0x180 [ 682.244738] ksys_ioctl+0x9b/0xc0 [ 682.248180] __x64_sys_ioctl+0x6f/0xb0 [ 682.252052] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 682.256633] do_syscall_64+0xf9/0x620 [ 682.260419] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 682.265619] RIP: 0033:0x45e219 [ 682.268818] Code: 0d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 682.287704] RSP: 002b:00007f1b82d17c68 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 682.295412] RAX: ffffffffffffffda RBX: 0000000000000009 RCX: 000000000045e219 [ 682.302675] RDX: 0000000000000000 RSI: 0000000000004c80 RDI: 0000000000000007 [ 682.309942] RBP: 00007f1b82d17ca0 R08: 0000000000000000 R09: 0000000000000000 [ 682.317191] R10: 0000000000000000 R11: 0000000000000246 R12: 000000000000000b [ 682.324452] R13: 00007ffca1b4a27f R14: 00007f1b82d189c0 R15: 000000000119c034 19:27:14 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)=ANY=[@ANYBLOB="300000001000070100dd2174ffff27de00000000", @ANYRES32=0x0, @ANYBLOB="000000000000000c58001b00000000000500100005"], 0x30}}, 0x0) [ 682.546639] EXT4-fs (loop5): corrupt root inode, run e2fsck [ 682.559057] EXT4-fs (loop5): mount failed 19:27:14 executing program 2 (fault-call:13 fault-nth:12): perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0xb6, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8020}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x0, 0x0) r3 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000180)='/dev/hwrng\x00', 0x0, 0x0) read$FUSE(r3, &(0x7f0000000700), 0xfce3) ioctl$BLKPG(r3, 0x1269, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0}) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) socket(0x1d, 0x80000, 0x1) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000540)=0x14) r5 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r5, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000280)=ANY=[@ANYBLOB="3000000024000b0f00"/20, @ANYRES32=r4, @ANYBLOB="ff00000000000000000000e4070001007069650004700200df329e91a7001df00e69c06a95499c88a548ce06aac2a1ea1277d7eef90367edad25e73c20eda73114b9fd2461b6b35fb5262900ff9e"], 0x30}}, 0x0) 19:27:14 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xd1000000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="02000000030000000400000030000f000300040000000000000000000f008ec4", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000e1f4655fe2f4655fe2f4655f000000000000040008", 0x1d, 0x4200}, {&(0x7f0000012700)="20000000d4c49a2e07", 0x9, 0x4280}], 0x0, &(0x7f0000013a00)) 19:27:14 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)=ANY=[@ANYBLOB="300000001000070100dd2174ffff27de00000000", @ANYRES32=0x0, @ANYBLOB="000000000000000e58001b00000000000500100005"], 0x30}}, 0x0) 19:27:14 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xcb010000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="02000000030000000400000030000f000300040000000000000000000f008ec4", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000e1f4655fe2f4655fe2f4655f000000000000040008", 0x1d, 0x4200}, {&(0x7f0000012700)="20000000d4c49a2e07", 0x9, 0x4280}], 0x0, &(0x7f0000013a00)) 19:27:14 executing program 3: set_mempolicy(0x2, &(0x7f0000000000)=0x9, 0x90) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x4c032, 0xffffffffffffffff, 0x9301000000000000) 19:27:14 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xa4020000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="02000000030000000400000030000f000300040000000000000000000f008ec4", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000e1f4655fe2f4655fe2f4655f00000000000004", 0x1b, 0x4200}, {&(0x7f0000012700)="20000000d4c49a2e07", 0x9, 0x4280}], 0x0, &(0x7f0000013a00)) 19:27:14 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xd1010000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="02000000030000000400000030000f000300040000000000000000000f008ec4", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000e1f4655fe2f4655fe2f4655f000000000000040008", 0x1d, 0x4200}, {&(0x7f0000012700)="20000000d4c49a2e07", 0x9, 0x4280}], 0x0, &(0x7f0000013a00)) 19:27:14 executing program 3: set_mempolicy(0x2, &(0x7f0000000000)=0x9, 0x90) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x4c032, 0xffffffffffffffff, 0x9400000000000000) 19:27:14 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)=ANY=[@ANYBLOB="300000001000070100dd2174ffff27de00000000", @ANYRES32=0x0, @ANYBLOB="000000000000000b5c001b00000000000500100005"], 0x30}}, 0x0) [ 682.707872] EXT4-fs (loop5): corrupt root inode, run e2fsck [ 682.713795] EXT4-fs (loop5): mount failed 19:27:14 executing program 3: set_mempolicy(0x2, &(0x7f0000000000)=0x9, 0x90) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x4c032, 0xffffffffffffffff, 0x9401000000000000) 19:27:14 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xd1020000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="02000000030000000400000030000f000300040000000000000000000f008ec4", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000e1f4655fe2f4655fe2f4655f000000000000040008", 0x1d, 0x4200}, {&(0x7f0000012700)="20000000d4c49a2e07", 0x9, 0x4280}], 0x0, &(0x7f0000013a00)) 19:27:14 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)=ANY=[@ANYBLOB="300000001000070100dd2174ffff27de00000000", @ANYRES32=0x0, @ANYBLOB="000000000000000c5c001b00000000000500100005"], 0x30}}, 0x0) [ 682.951289] FAULT_INJECTION: forcing a failure. [ 682.951289] name failslab, interval 1, probability 0, space 0, times 0 [ 682.979971] CPU: 1 PID: 17581 Comm: syz-executor.2 Not tainted 4.19.167-syzkaller #0 [ 682.987889] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 682.997246] Call Trace: [ 682.999841] dump_stack+0x1fc/0x2fe [ 683.003485] should_fail.cold+0xa/0x14 [ 683.007383] ? setup_fault_attr+0x200/0x200 [ 683.011711] ? lock_acquire+0x170/0x3c0 [ 683.015702] __should_failslab+0x115/0x180 [ 683.019930] should_failslab+0x5/0xf [ 683.023625] kmem_cache_alloc_node_trace+0x244/0x3b0 [ 683.028720] __kmalloc_node+0x38/0x70 [ 683.032520] ? mempool_free+0x370/0x370 [ 683.036484] mempool_init_node+0x137/0x6c0 [ 683.040704] ? mempool_alloc+0x350/0x350 [ 683.044743] ? mempool_free+0x370/0x370 [ 683.048800] mempool_init+0x38/0x50 [ 683.052429] bioset_init+0x327/0x810 [ 683.056148] ? kmem_cache_alloc_node+0x351/0x3b0 [ 683.060914] blk_alloc_queue_node+0x189/0xbd0 [ 683.065419] blk_mq_init_queue+0x44/0xa0 [ 683.069581] loop_add+0x2cb/0x8a0 [ 683.073039] loop_control_ioctl+0x16c/0x480 [ 683.077373] ? loop_lookup+0x1d0/0x1d0 [ 683.081274] ? ksys_write+0x241/0x2a0 [ 683.085069] ? loop_lookup+0x1d0/0x1d0 [ 683.088938] do_vfs_ioctl+0xcdb/0x12e0 [ 683.092819] ? lock_downgrade+0x720/0x720 [ 683.096957] ? check_preemption_disabled+0x41/0x280 [ 683.102050] ? ioctl_preallocate+0x200/0x200 [ 683.106447] ? __fget+0x356/0x510 [ 683.109888] ? do_dup2+0x450/0x450 [ 683.113423] ? vfs_write+0x393/0x540 [ 683.117190] ? fput+0x2b/0x190 [ 683.120375] ksys_ioctl+0x9b/0xc0 [ 683.123876] __x64_sys_ioctl+0x6f/0xb0 [ 683.127757] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 683.132336] do_syscall_64+0xf9/0x620 [ 683.136134] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 683.141348] RIP: 0033:0x45e219 [ 683.144535] Code: 0d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 683.163420] RSP: 002b:00007f1b82d38c68 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 683.171122] RAX: ffffffffffffffda RBX: 0000000000000009 RCX: 000000000045e219 [ 683.178386] RDX: 0000000000000000 RSI: 0000000000004c80 RDI: 0000000000000007 [ 683.185637] RBP: 00007f1b82d38ca0 R08: 0000000000000000 R09: 0000000000000000 [ 683.192899] R10: 0000000000000000 R11: 0000000000000246 R12: 000000000000000c [ 683.200159] R13: 00007ffca1b4a27f R14: 00007f1b82d399c0 R15: 000000000119bf8c 19:27:15 executing program 2 (fault-call:13 fault-nth:13): perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0xb6, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8020}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x0, 0x0) r3 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000180)='/dev/hwrng\x00', 0x0, 0x0) read$FUSE(r3, &(0x7f0000000700), 0xfce3) ioctl$BLKPG(r3, 0x1269, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0}) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) socket(0x1d, 0x80000, 0x1) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000540)=0x14) r5 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r5, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000280)=ANY=[@ANYBLOB="3000000024000b0f00"/20, @ANYRES32=r4, @ANYBLOB="ff00000000000000000000e4070001007069650004700200df329e91a7001df00e69c06a95499c88a548ce06aac2a1ea1277d7eef90367edad25e73c20eda73114b9fd2461b6b35fb5262900ff9e"], 0x30}}, 0x0) 19:27:15 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xd1030000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="02000000030000000400000030000f000300040000000000000000000f008ec4", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000e1f4655fe2f4655fe2f4655f000000000000040008", 0x1d, 0x4200}, {&(0x7f0000012700)="20000000d4c49a2e07", 0x9, 0x4280}], 0x0, &(0x7f0000013a00)) 19:27:15 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)=ANY=[@ANYBLOB="300000001000070100dd2174ffff27de00000000", @ANYRES32=0x0, @ANYBLOB="000000000000000e5c001b00000000000500100005"], 0x30}}, 0x0) 19:27:15 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xcb020000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="02000000030000000400000030000f000300040000000000000000000f008ec4", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000e1f4655fe2f4655fe2f4655f000000000000040008", 0x1d, 0x4200}, {&(0x7f0000012700)="20000000d4c49a2e07", 0x9, 0x4280}], 0x0, &(0x7f0000013a00)) 19:27:15 executing program 3: set_mempolicy(0x2, &(0x7f0000000000)=0x9, 0x90) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x4c032, 0xffffffffffffffff, 0x9500000000000000) 19:27:15 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xa4030000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="02000000030000000400000030000f000300040000000000000000000f008ec4", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000e1f4655fe2f4655fe2f4655f00000000000004", 0x1b, 0x4200}, {&(0x7f0000012700)="20000000d4c49a2e07", 0x9, 0x4280}], 0x0, &(0x7f0000013a00)) 19:27:15 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xd2000000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="02000000030000000400000030000f000300040000000000000000000f008ec4", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000e1f4655fe2f4655fe2f4655f000000000000040008", 0x1d, 0x4200}, {&(0x7f0000012700)="20000000d4c49a2e07", 0x9, 0x4280}], 0x0, &(0x7f0000013a00)) 19:27:15 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)=ANY=[@ANYBLOB="300000001000070100dd2174ffff27de00000000", @ANYRES32=0x0, @ANYBLOB="000000000000000960001b00000000000500100005"], 0x30}}, 0x0) 19:27:15 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xd2010000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="02000000030000000400000030000f000300040000000000000000000f008ec4", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000e1f4655fe2f4655fe2f4655f000000000000040008", 0x1d, 0x4200}, {&(0x7f0000012700)="20000000d4c49a2e07", 0x9, 0x4280}], 0x0, &(0x7f0000013a00)) 19:27:15 executing program 3: set_mempolicy(0x2, &(0x7f0000000000)=0x9, 0x90) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x4c032, 0xffffffffffffffff, 0x9501000000000000) [ 683.430397] FAULT_INJECTION: forcing a failure. [ 683.430397] name failslab, interval 1, probability 0, space 0, times 0 [ 683.466840] CPU: 0 PID: 17625 Comm: syz-executor.2 Not tainted 4.19.167-syzkaller #0 [ 683.474763] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 683.477389] nla_parse: 12 callbacks suppressed [ 683.477397] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.0'. [ 683.484131] Call Trace: [ 683.484156] dump_stack+0x1fc/0x2fe [ 683.484177] should_fail.cold+0xa/0x14 [ 683.484194] ? setup_fault_attr+0x200/0x200 [ 683.484212] ? mempool_free+0x370/0x370 [ 683.484228] ? mempool_free+0x370/0x370 [ 683.484242] __should_failslab+0x115/0x180 [ 683.484256] should_failslab+0x5/0xf [ 683.527623] kmem_cache_alloc+0x277/0x370 [ 683.530906] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.0'. [ 683.531779] ? mempool_alloc+0x350/0x350 [ 683.531790] ? mempool_free+0x370/0x370 [ 683.531806] mempool_init_node+0x2d0/0x6c0 [ 683.552651] ? mempool_alloc+0x350/0x350 [ 683.556723] ? mempool_free+0x370/0x370 [ 683.560708] mempool_init+0x38/0x50 [ 683.561570] EXT4-fs (loop5): corrupt root inode, run e2fsck [ 683.564384] bioset_init+0x327/0x810 [ 683.564401] ? kmem_cache_alloc_node+0x351/0x3b0 19:27:15 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)=ANY=[@ANYBLOB="300000001000070100dd2174ffff27de00000000", @ANYRES32=0x0, @ANYBLOB="000000000000000b60001b00000000000500100005"], 0x30}}, 0x0) 19:27:15 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)=ANY=[@ANYBLOB="300000001000070100dd2174ffff27de00000000", @ANYRES32=0x0, @ANYBLOB="000000000000000c60001b00000000000500100005"], 0x30}}, 0x0) [ 683.564419] blk_alloc_queue_node+0x189/0xbd0 [ 683.571273] EXT4-fs (loop5): mount failed [ 683.573850] blk_mq_init_queue+0x44/0xa0 [ 683.573870] loop_add+0x2cb/0x8a0 [ 683.589544] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.0'. [ 683.591284] loop_control_ioctl+0x16c/0x480 [ 683.591300] ? loop_lookup+0x1d0/0x1d0 [ 683.591318] ? ksys_write+0x241/0x2a0 [ 683.591333] ? loop_lookup+0x1d0/0x1d0 [ 683.591348] do_vfs_ioctl+0xcdb/0x12e0 [ 683.591366] ? lock_downgrade+0x720/0x720 [ 683.627238] ? check_preemption_disabled+0x41/0x280 [ 683.632244] ? ioctl_preallocate+0x200/0x200 [ 683.636637] ? __fget+0x356/0x510 [ 683.640073] ? do_dup2+0x450/0x450 [ 683.643670] ? vfs_write+0x393/0x540 [ 683.647378] ? fput+0x2b/0x190 [ 683.650557] ksys_ioctl+0x9b/0xc0 [ 683.653993] __x64_sys_ioctl+0x6f/0xb0 [ 683.657865] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 683.662428] do_syscall_64+0xf9/0x620 [ 683.666213] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 683.671386] RIP: 0033:0x45e219 [ 683.674559] Code: 0d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 683.693537] RSP: 002b:00007f1b82d17c68 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 683.701377] RAX: ffffffffffffffda RBX: 0000000000000009 RCX: 000000000045e219 [ 683.708630] RDX: 0000000000000000 RSI: 0000000000004c80 RDI: 0000000000000007 [ 683.715928] RBP: 00007f1b82d17ca0 R08: 0000000000000000 R09: 0000000000000000 [ 683.723185] R10: 0000000000000000 R11: 0000000000000246 R12: 000000000000000d [ 683.730445] R13: 00007ffca1b4a27f R14: 00007f1b82d189c0 R15: 000000000119c034 19:27:15 executing program 2 (fault-call:13 fault-nth:14): perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0xb6, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8020}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x0, 0x0) r3 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000180)='/dev/hwrng\x00', 0x0, 0x0) read$FUSE(r3, &(0x7f0000000700), 0xfce3) ioctl$BLKPG(r3, 0x1269, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0}) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) socket(0x1d, 0x80000, 0x1) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000540)=0x14) r5 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r5, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000280)=ANY=[@ANYBLOB="3000000024000b0f00"/20, @ANYRES32=r4, @ANYBLOB="ff00000000000000000000e4070001007069650004700200df329e91a7001df00e69c06a95499c88a548ce06aac2a1ea1277d7eef90367edad25e73c20eda73114b9fd2461b6b35fb5262900ff9e"], 0x30}}, 0x0) 19:27:15 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)=ANY=[@ANYBLOB="300000001000070100dd2174ffff27de00000000", @ANYRES32=0x0, @ANYBLOB="000000000000000e60001b00000000000500100005"], 0x30}}, 0x0) 19:27:15 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xd2020000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="02000000030000000400000030000f000300040000000000000000000f008ec4", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000e1f4655fe2f4655fe2f4655f000000000000040008", 0x1d, 0x4200}, {&(0x7f0000012700)="20000000d4c49a2e07", 0x9, 0x4280}], 0x0, &(0x7f0000013a00)) 19:27:15 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xcb030000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="02000000030000000400000030000f000300040000000000000000000f008ec4", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000e1f4655fe2f4655fe2f4655f000000000000040008", 0x1d, 0x4200}, {&(0x7f0000012700)="20000000d4c49a2e07", 0x9, 0x4280}], 0x0, &(0x7f0000013a00)) 19:27:15 executing program 3: set_mempolicy(0x2, &(0x7f0000000000)=0x9, 0x90) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x4c032, 0xffffffffffffffff, 0x9600000000000000) [ 683.874569] EXT4-fs (loop5): corrupt root inode, run e2fsck [ 683.894633] EXT4-fs (loop5): mount failed [ 683.921933] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.0'. 19:27:16 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xa5000000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="02000000030000000400000030000f000300040000000000000000000f008ec4", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000e1f4655fe2f4655fe2f4655f00000000000004", 0x1b, 0x4200}, {&(0x7f0000012700)="20000000d4c49a2e07", 0x9, 0x4280}], 0x0, &(0x7f0000013a00)) 19:27:16 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xd2030000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="02000000030000000400000030000f000300040000000000000000000f008ec4", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000e1f4655fe2f4655fe2f4655f000000000000040008", 0x1d, 0x4200}, {&(0x7f0000012700)="20000000d4c49a2e07", 0x9, 0x4280}], 0x0, &(0x7f0000013a00)) 19:27:16 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)=ANY=[@ANYBLOB="300000001000070100dd2174ffff27de00000000", @ANYRES32=0x0, @ANYBLOB="000000000000000c64001b00000000000500100005"], 0x30}}, 0x0) 19:27:16 executing program 3: set_mempolicy(0x2, &(0x7f0000000000)=0x9, 0x90) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x4c032, 0xffffffffffffffff, 0x9601000000000000) 19:27:16 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xd3000000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="02000000030000000400000030000f000300040000000000000000000f008ec4", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000e1f4655fe2f4655fe2f4655f000000000000040008", 0x1d, 0x4200}, {&(0x7f0000012700)="20000000d4c49a2e07", 0x9, 0x4280}], 0x0, &(0x7f0000013a00)) [ 684.076601] FAULT_INJECTION: forcing a failure. [ 684.076601] name failslab, interval 1, probability 0, space 0, times 0 [ 684.097619] EXT4-fs mount: 45 callbacks suppressed [ 684.097634] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue [ 684.105674] CPU: 0 PID: 17659 Comm: syz-executor.2 Not tainted 4.19.167-syzkaller #0 [ 684.118841] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 684.128201] Call Trace: [ 684.130798] dump_stack+0x1fc/0x2fe [ 684.134443] should_fail.cold+0xa/0x14 [ 684.138342] ? setup_fault_attr+0x200/0x200 [ 684.142673] ? lock_acquire+0x170/0x3c0 [ 684.146665] __should_failslab+0x115/0x180 [ 684.150907] should_failslab+0x5/0xf [ 684.154626] kmem_cache_alloc+0x277/0x370 [ 684.158783] ? mempool_alloc+0x350/0x350 [ 684.162853] mempool_init_node+0x2d0/0x6c0 [ 684.167095] ? mempool_alloc+0x350/0x350 [ 684.171157] ? mempool_free+0x370/0x370 19:27:16 executing program 3: set_mempolicy(0x2, &(0x7f0000000000)=0x9, 0x90) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x4c032, 0xffffffffffffffff, 0x9700000000000000) 19:27:16 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xd3010000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="02000000030000000400000030000f000300040000000000000000000f008ec4", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000e1f4655fe2f4655fe2f4655f000000000000040008", 0x1d, 0x4200}, {&(0x7f0000012700)="20000000d4c49a2e07", 0x9, 0x4280}], 0x0, &(0x7f0000013a00)) [ 684.175137] mempool_init+0x38/0x50 [ 684.178780] bioset_init+0x327/0x810 [ 684.182505] ? kmem_cache_alloc_node+0x351/0x3b0 [ 684.187270] blk_alloc_queue_node+0x189/0xbd0 [ 684.191784] blk_mq_init_queue+0x44/0xa0 [ 684.195859] loop_add+0x2cb/0x8a0 [ 684.199327] loop_control_ioctl+0x16c/0x480 [ 684.203655] ? loop_lookup+0x1d0/0x1d0 [ 684.207552] ? ksys_write+0x241/0x2a0 [ 684.211356] ? loop_lookup+0x1d0/0x1d0 [ 684.215247] do_vfs_ioctl+0xcdb/0x12e0 [ 684.219165] ? lock_downgrade+0x720/0x720 [ 684.223320] ? check_preemption_disabled+0x41/0x280 [ 684.228347] ? ioctl_preallocate+0x200/0x200 [ 684.232769] ? __fget+0x356/0x510 [ 684.236230] ? do_dup2+0x450/0x450 [ 684.239771] ? vfs_write+0x393/0x540 [ 684.243491] ? fput+0x2b/0x190 [ 684.246683] ksys_ioctl+0x9b/0xc0 [ 684.250122] __x64_sys_ioctl+0x6f/0xb0 [ 684.254000] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 684.258573] do_syscall_64+0xf9/0x620 [ 684.262357] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 684.267530] RIP: 0033:0x45e219 [ 684.270712] Code: 0d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 684.289737] RSP: 002b:00007f1b82d38c68 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 684.297453] RAX: ffffffffffffffda RBX: 0000000000000009 RCX: 000000000045e219 [ 684.304705] RDX: 0000000000000000 RSI: 0000000000004c80 RDI: 0000000000000007 [ 684.312070] RBP: 00007f1b82d38ca0 R08: 0000000000000000 R09: 0000000000000000 [ 684.319334] R10: 0000000000000000 R11: 0000000000000246 R12: 000000000000000e [ 684.326594] R13: 00007ffca1b4a27f R14: 00007f1b82d399c0 R15: 000000000119bf8c 19:27:16 executing program 2 (fault-call:13 fault-nth:15): perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0xb6, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8020}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x0, 0x0) r3 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000180)='/dev/hwrng\x00', 0x0, 0x0) read$FUSE(r3, &(0x7f0000000700), 0xfce3) ioctl$BLKPG(r3, 0x1269, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0}) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) socket(0x1d, 0x80000, 0x1) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000540)=0x14) r5 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r5, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000280)=ANY=[@ANYBLOB="3000000024000b0f00"/20, @ANYRES32=r4, @ANYBLOB="ff00000000000000000000e4070001007069650004700200df329e91a7001df00e69c06a95499c88a548ce06aac2a1ea1277d7eef90367edad25e73c20eda73114b9fd2461b6b35fb5262900ff9e"], 0x30}}, 0x0) 19:27:16 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xd3020000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="02000000030000000400000030000f000300040000000000000000000f008ec4", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000e1f4655fe2f4655fe2f4655f000000000000040008", 0x1d, 0x4200}, {&(0x7f0000012700)="20000000d4c49a2e07", 0x9, 0x4280}], 0x0, &(0x7f0000013a00)) 19:27:16 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)=ANY=[@ANYBLOB="300000001000070100dd2174ffff27de00000000", @ANYRES32=0x0, @ANYBLOB="000000000000000e64001b00000000000500100005"], 0x30}}, 0x0) [ 684.407050] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.0'. 19:27:16 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xd3030000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="02000000030000000400000030000f000300040000000000000000000f008ec4", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000e1f4655fe2f4655fe2f4655f000000000000040008", 0x1d, 0x4200}, {&(0x7f0000012700)="20000000d4c49a2e07", 0x9, 0x4280}], 0x0, &(0x7f0000013a00)) 19:27:16 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xcc000000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="02000000030000000400000030000f000300040000000000000000000f008ec4", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000e1f4655fe2f4655fe2f4655f000000000000040008", 0x1d, 0x4200}, {&(0x7f0000012700)="20000000d4c49a2e07", 0x9, 0x4280}], 0x0, &(0x7f0000013a00)) [ 684.567981] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue [ 684.601038] EXT4-fs (loop5): corrupt root inode, run e2fsck [ 684.606806] EXT4-fs (loop5): mount failed [ 684.633951] FAULT_INJECTION: forcing a failure. [ 684.633951] name failslab, interval 1, probability 0, space 0, times 0 [ 684.648211] CPU: 1 PID: 17703 Comm: syz-executor.2 Not tainted 4.19.167-syzkaller #0 [ 684.656111] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 684.665572] Call Trace: [ 684.668170] dump_stack+0x1fc/0x2fe [ 684.671800] should_fail.cold+0xa/0x14 [ 684.675690] ? setup_fault_attr+0x200/0x200 [ 684.680061] ? lock_acquire+0x170/0x3c0 [ 684.684038] __should_failslab+0x115/0x180 [ 684.688310] should_failslab+0x5/0xf [ 684.692019] kmem_cache_alloc_node_trace+0x244/0x3b0 [ 684.697116] __kmalloc_node+0x38/0x70 [ 684.700920] ? mempool_free+0x370/0x370 [ 684.704887] mempool_init_node+0x137/0x6c0 [ 684.709110] ? mempool_alloc+0x350/0x350 [ 684.713164] ? mempool_free+0x370/0x370 [ 684.717220] mempool_init+0x38/0x50 [ 684.720848] bioset_init+0x532/0x810 [ 684.724562] ? kmem_cache_alloc_node+0x351/0x3b0 [ 684.729315] blk_alloc_queue_node+0x189/0xbd0 [ 684.733814] ? blk_alloc_queue_node+0x2/0xbd0 [ 684.738312] blk_mq_init_queue+0x44/0xa0 [ 684.742371] loop_add+0x2cb/0x8a0 [ 684.745809] loop_control_ioctl+0x16c/0x480 [ 684.750111] ? loop_lookup+0x1d0/0x1d0 [ 684.753991] ? rcu_nmi_exit+0xb3/0x180 [ 684.757877] ? retint_kernel+0x2d/0x2d [ 684.761752] ? loop_lookup+0x1d0/0x1d0 [ 684.765623] do_vfs_ioctl+0xcdb/0x12e0 [ 684.769496] ? lock_downgrade+0x720/0x720 [ 684.773636] ? check_preemption_disabled+0x41/0x280 [ 684.778652] ? ioctl_preallocate+0x200/0x200 [ 684.783060] ? __fget+0x356/0x510 [ 684.786510] ? do_dup2+0x450/0x450 [ 684.790039] ? ksys_write+0x24b/0x2a0 [ 684.793833] ? fput+0x2b/0x190 [ 684.797018] ksys_ioctl+0x9b/0xc0 [ 684.800456] __x64_sys_ioctl+0x6f/0xb0 [ 684.804326] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 684.808903] do_syscall_64+0xf9/0x620 [ 684.812698] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 684.817876] RIP: 0033:0x45e219 [ 684.821061] Code: 0d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 684.840134] RSP: 002b:00007f1b82d17c68 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 684.847881] RAX: ffffffffffffffda RBX: 0000000000000009 RCX: 000000000045e219 [ 684.855139] RDX: 0000000000000000 RSI: 0000000000004c80 RDI: 0000000000000007 [ 684.862398] RBP: 00007f1b82d17ca0 R08: 0000000000000000 R09: 0000000000000000 [ 684.869651] R10: 0000000000000000 R11: 0000000000000246 R12: 000000000000000f [ 684.876910] R13: 00007ffca1b4a27f R14: 00007f1b82d189c0 R15: 000000000119c034 19:27:17 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xa5010000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="02000000030000000400000030000f000300040000000000000000000f008ec4", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000e1f4655fe2f4655fe2f4655f00000000000004", 0x1b, 0x4200}, {&(0x7f0000012700)="20000000d4c49a2e07", 0x9, 0x4280}], 0x0, &(0x7f0000013a00)) 19:27:17 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)=ANY=[@ANYBLOB="300000001000070100dd2174ffff27de00000000", @ANYRES32=0x0, @ANYBLOB="000000000000000c68001b00000000000500100005"], 0x30}}, 0x0) 19:27:17 executing program 3: set_mempolicy(0x2, &(0x7f0000000000)=0x9, 0x90) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x4c032, 0xffffffffffffffff, 0x9701000000000000) 19:27:17 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xd4000000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="02000000030000000400000030000f000300040000000000000000000f008ec4", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000e1f4655fe2f4655fe2f4655f000000000000040008", 0x1d, 0x4200}, {&(0x7f0000012700)="20000000d4c49a2e07", 0x9, 0x4280}], 0x0, &(0x7f0000013a00)) 19:27:17 executing program 2 (fault-call:13 fault-nth:16): perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0xb6, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8020}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x0, 0x0) r3 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000180)='/dev/hwrng\x00', 0x0, 0x0) read$FUSE(r3, &(0x7f0000000700), 0xfce3) ioctl$BLKPG(r3, 0x1269, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0}) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) socket(0x1d, 0x80000, 0x1) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000540)=0x14) r5 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r5, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000280)=ANY=[@ANYBLOB="3000000024000b0f00"/20, @ANYRES32=r4, @ANYBLOB="ff00000000000000000000e4070001007069650004700200df329e91a7001df00e69c06a95499c88a548ce06aac2a1ea1277d7eef90367edad25e73c20eda73114b9fd2461b6b35fb5262900ff9e"], 0x30}}, 0x0) 19:27:17 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xcc010000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="02000000030000000400000030000f000300040000000000000000000f008ec4", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000e1f4655fe2f4655fe2f4655f000000000000040008", 0x1d, 0x4200}, {&(0x7f0000012700)="20000000d4c49a2e07", 0x9, 0x4280}], 0x0, &(0x7f0000013a00)) [ 684.993804] EXT4-fs (loop5): corrupt root inode, run e2fsck [ 685.003626] EXT4-fs (loop5): mount failed 19:27:17 executing program 3: set_mempolicy(0x2, &(0x7f0000000000)=0x9, 0x90) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x4c032, 0xffffffffffffffff, 0x9800000000000000) 19:27:17 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xd4010000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="02000000030000000400000030000f000300040000000000000000000f008ec4", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000e1f4655fe2f4655fe2f4655f000000000000040008", 0x1d, 0x4200}, {&(0x7f0000012700)="20000000d4c49a2e07", 0x9, 0x4280}], 0x0, &(0x7f0000013a00)) [ 685.136533] EXT4-fs (loop5): corrupt root inode, run e2fsck [ 685.143145] EXT4-fs (loop5): mount failed [ 685.169695] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.0'. 19:27:17 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xa5020000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="02000000030000000400000030000f000300040000000000000000000f008ec4", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000e1f4655fe2f4655fe2f4655f00000000000004", 0x1b, 0x4200}, {&(0x7f0000012700)="20000000d4c49a2e07", 0x9, 0x4280}], 0x0, &(0x7f0000013a00)) [ 685.202521] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue 19:27:17 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xcc020000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="02000000030000000400000030000f000300040000000000000000000f008ec4", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000e1f4655fe2f4655fe2f4655f000000000000040008", 0x1d, 0x4200}, {&(0x7f0000012700)="20000000d4c49a2e07", 0x9, 0x4280}], 0x0, &(0x7f0000013a00)) [ 685.288464] FAULT_INJECTION: forcing a failure. [ 685.288464] name failslab, interval 1, probability 0, space 0, times 0 19:27:17 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xd4020000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="02000000030000000400000030000f000300040000000000000000000f008ec4", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000e1f4655fe2f4655fe2f4655f000000000000040008", 0x1d, 0x4200}, {&(0x7f0000012700)="20000000d4c49a2e07", 0x9, 0x4280}], 0x0, &(0x7f0000013a00)) 19:27:17 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)=ANY=[@ANYBLOB="300000001000070100dd2174ffff27de00000000", @ANYRES32=0x0, @ANYBLOB="000000000000000e68001b00000000000500100005"], 0x30}}, 0x0) [ 685.332367] CPU: 1 PID: 17736 Comm: syz-executor.2 Not tainted 4.19.167-syzkaller #0 [ 685.340283] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 685.349642] Call Trace: [ 685.352242] dump_stack+0x1fc/0x2fe [ 685.355885] should_fail.cold+0xa/0x14 [ 685.359785] ? setup_fault_attr+0x200/0x200 [ 685.364109] ? lock_acquire+0x170/0x3c0 [ 685.368090] ? mempool_free+0x370/0x370 [ 685.372073] ? mempool_free+0x370/0x370 [ 685.376064] __should_failslab+0x115/0x180 [ 685.376791] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.0'. [ 685.380309] should_failslab+0x5/0xf [ 685.380325] kmem_cache_alloc+0x277/0x370 [ 685.380342] ? mempool_alloc+0x350/0x350 [ 685.380353] ? mempool_free+0x370/0x370 [ 685.380368] mempool_init_node+0x2d0/0x6c0 [ 685.409023] ? mempool_alloc+0x350/0x350 [ 685.413092] ? mempool_free+0x370/0x370 [ 685.417067] mempool_init+0x38/0x50 [ 685.420697] bioset_init+0x532/0x810 [ 685.424417] ? kmem_cache_alloc_node+0x351/0x3b0 19:27:17 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xd4030000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="02000000030000000400000030000f000300040000000000000000000f008ec4", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000e1f4655fe2f4655fe2f4655f000000000000040008", 0x1d, 0x4200}, {&(0x7f0000012700)="20000000d4c49a2e07", 0x9, 0x4280}], 0x0, &(0x7f0000013a00)) 19:27:17 executing program 3: set_mempolicy(0x2, &(0x7f0000000000)=0x9, 0x90) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x4c032, 0xffffffffffffffff, 0x9801000000000000) 19:27:17 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)=ANY=[@ANYBLOB="300000001000070100dd2174ffff27de00000000", @ANYRES32=0x0, @ANYBLOB="000000000000000c6c001b00000000000500100005"], 0x30}}, 0x0) [ 685.429200] blk_alloc_queue_node+0x189/0xbd0 [ 685.433706] blk_mq_init_queue+0x44/0xa0 [ 685.437780] loop_add+0x2cb/0x8a0 [ 685.441247] loop_control_ioctl+0x16c/0x480 [ 685.445576] ? loop_lookup+0x1d0/0x1d0 [ 685.449476] ? loop_lookup+0x1d0/0x1d0 [ 685.453374] do_vfs_ioctl+0xcdb/0x12e0 [ 685.457271] ? lock_downgrade+0x720/0x720 [ 685.461423] ? check_preemption_disabled+0x41/0x280 [ 685.466447] ? ioctl_preallocate+0x200/0x200 [ 685.470877] ? __fget+0x356/0x510 [ 685.474345] ? do_dup2+0x450/0x450 [ 685.477897] ? rcu_nmi_exit+0xb3/0x180 [ 685.481802] ksys_ioctl+0x9b/0xc0 [ 685.485266] __x64_sys_ioctl+0x6f/0xb0 [ 685.489178] do_syscall_64+0xf9/0x620 [ 685.492987] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 685.498179] RIP: 0033:0x45e219 [ 685.501374] Code: 0d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 685.510596] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.0'. 19:27:17 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xd5000000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="02000000030000000400000030000f000300040000000000000000000f008ec4", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000e1f4655fe2f4655fe2f4655f000000000000040008", 0x1d, 0x4200}, {&(0x7f0000012700)="20000000d4c49a2e07", 0x9, 0x4280}], 0x0, &(0x7f0000013a00)) [ 685.520270] RSP: 002b:00007f1b82d17c68 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 685.520284] RAX: ffffffffffffffda RBX: 0000000000000009 RCX: 000000000045e219 [ 685.520291] RDX: 0000000000000000 RSI: 0000000000004c80 RDI: 0000000000000007 [ 685.520299] RBP: 00007f1b82d17ca0 R08: 0000000000000000 R09: 0000000000000000 [ 685.520307] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000010 [ 685.520316] R13: 00007ffca1b4a27f R14: 00007f1b82d189c0 R15: 000000000119c034 19:27:17 executing program 2 (fault-call:13 fault-nth:17): perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0xb6, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8020}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x0, 0x0) r3 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000180)='/dev/hwrng\x00', 0x0, 0x0) read$FUSE(r3, &(0x7f0000000700), 0xfce3) ioctl$BLKPG(r3, 0x1269, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0}) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) socket(0x1d, 0x80000, 0x1) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000540)=0x14) r5 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r5, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000280)=ANY=[@ANYBLOB="3000000024000b0f00"/20, @ANYRES32=r4, @ANYBLOB="ff00000000000000000000e4070001007069650004700200df329e91a7001df00e69c06a95499c88a548ce06aac2a1ea1277d7eef90367edad25e73c20eda73114b9fd2461b6b35fb5262900ff9e"], 0x30}}, 0x0) 19:27:17 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xd5010000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="02000000030000000400000030000f000300040000000000000000000f008ec4", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000e1f4655fe2f4655fe2f4655f000000000000040008", 0x1d, 0x4200}, {&(0x7f0000012700)="20000000d4c49a2e07", 0x9, 0x4280}], 0x0, &(0x7f0000013a00)) 19:27:17 executing program 3: set_mempolicy(0x2, &(0x7f0000000000)=0x9, 0x90) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x4c032, 0xffffffffffffffff, 0x9900000000000000) 19:27:17 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)=ANY=[@ANYBLOB="300000001000070100dd2174ffff27de00000000", @ANYRES32=0x0, @ANYBLOB="000000000000000e6c001b00000000000500100005"], 0x30}}, 0x0) 19:27:17 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xa5030000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="02000000030000000400000030000f000300040000000000000000000f008ec4", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000e1f4655fe2f4655fe2f4655f00000000000004", 0x1b, 0x4200}, {&(0x7f0000012700)="20000000d4c49a2e07", 0x9, 0x4280}], 0x0, &(0x7f0000013a00)) [ 685.661751] EXT4-fs (loop5): corrupt root inode, run e2fsck [ 685.667622] EXT4-fs (loop5): mount failed [ 685.737642] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue 19:27:17 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xcc030000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="02000000030000000400000030000f000300040000000000000000000f008ec4", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000e1f4655fe2f4655fe2f4655f000000000000040008", 0x1d, 0x4200}, {&(0x7f0000012700)="20000000d4c49a2e07", 0x9, 0x4280}], 0x0, &(0x7f0000013a00)) 19:27:17 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xd5020000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="02000000030000000400000030000f000300040000000000000000000f008ec4", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000e1f4655fe2f4655fe2f4655f000000000000040008", 0x1d, 0x4200}, {&(0x7f0000012700)="20000000d4c49a2e07", 0x9, 0x4280}], 0x0, &(0x7f0000013a00)) 19:27:17 executing program 3: set_mempolicy(0x2, &(0x7f0000000000)=0x9, 0x90) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x4c032, 0xffffffffffffffff, 0x9901000000000000) [ 685.782357] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.0'. 19:27:17 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)=ANY=[@ANYBLOB="300000001000070100dd2174ffff27de00000000", @ANYRES32=0x0, @ANYBLOB="000000000000000b70001b00000000000500100005"], 0x30}}, 0x0) 19:27:17 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xd5030000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="02000000030000000400000030000f000300040000000000000000000f008ec4", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000e1f4655fe2f4655fe2f4655f000000000000040008", 0x1d, 0x4200}, {&(0x7f0000012700)="20000000d4c49a2e07", 0x9, 0x4280}], 0x0, &(0x7f0000013a00)) [ 685.874275] EXT4-fs (loop5): corrupt root inode, run e2fsck [ 685.877590] FAULT_INJECTION: forcing a failure. [ 685.877590] name failslab, interval 1, probability 0, space 0, times 0 [ 685.887547] EXT4-fs (loop5): mount failed [ 685.959966] CPU: 0 PID: 17779 Comm: syz-executor.2 Not tainted 4.19.167-syzkaller #0 [ 685.968004] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 685.975809] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.0'. [ 685.977354] Call Trace: [ 685.977376] dump_stack+0x1fc/0x2fe [ 685.977399] should_fail.cold+0xa/0x14 [ 685.977414] ? setup_fault_attr+0x200/0x200 [ 685.977436] __should_failslab+0x115/0x180 [ 686.004597] should_failslab+0x5/0xf 19:27:18 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xd6000000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="02000000030000000400000030000f000300040000000000000000000f008ec4", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000e1f4655fe2f4655fe2f4655f000000000000040008", 0x1d, 0x4200}, {&(0x7f0000012700)="20000000d4c49a2e07", 0x9, 0x4280}], 0x0, &(0x7f0000013a00)) 19:27:18 executing program 3: set_mempolicy(0x2, &(0x7f0000000000)=0x9, 0x90) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x4c032, 0xffffffffffffffff, 0x9a00000000000000) [ 686.008321] kmem_cache_alloc+0x277/0x370 [ 686.012480] ? mempool_alloc+0x350/0x350 [ 686.016549] mempool_init_node+0x2d0/0x6c0 [ 686.020799] ? mempool_alloc+0x350/0x350 [ 686.024866] ? mempool_free+0x370/0x370 [ 686.028846] mempool_init+0x38/0x50 [ 686.032481] bioset_init+0x532/0x810 [ 686.036206] ? kmem_cache_alloc_node+0x351/0x3b0 [ 686.040977] blk_alloc_queue_node+0x189/0xbd0 [ 686.045486] ? blk_mq_init_queue+0xd/0xa0 [ 686.049643] blk_mq_init_queue+0x44/0xa0 [ 686.053750] loop_add+0x2cb/0x8a0 [ 686.057213] loop_control_ioctl+0x16c/0x480 [ 686.061539] ? loop_lookup+0x1d0/0x1d0 [ 686.065440] ? loop_lookup+0x1d0/0x1d0 [ 686.069337] do_vfs_ioctl+0xcdb/0x12e0 [ 686.073248] ? lock_downgrade+0x720/0x720 [ 686.077380] ? check_preemption_disabled+0x41/0x280 [ 686.082419] ? ioctl_preallocate+0x200/0x200 [ 686.086830] ? __fget+0x356/0x510 [ 686.090280] ? do_dup2+0x450/0x450 [ 686.093827] ? fput+0x2b/0x190 [ 686.097017] ksys_ioctl+0x9b/0xc0 [ 686.100455] __x64_sys_ioctl+0x6f/0xb0 [ 686.104324] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 686.108898] do_syscall_64+0xf9/0x620 [ 686.112688] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 686.117862] RIP: 0033:0x45e219 [ 686.121091] Code: 0d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 686.140193] RSP: 002b:00007f1b82d17c68 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 686.147894] RAX: ffffffffffffffda RBX: 0000000000000009 RCX: 000000000045e219 [ 686.155155] RDX: 0000000000000000 RSI: 0000000000004c80 RDI: 0000000000000007 [ 686.162411] RBP: 00007f1b82d17ca0 R08: 0000000000000000 R09: 0000000000000000 [ 686.169673] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000011 [ 686.176937] R13: 00007ffca1b4a27f R14: 00007f1b82d189c0 R15: 000000000119c034 19:27:18 executing program 2 (fault-call:13 fault-nth:18): perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0xb6, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8020}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x0, 0x0) r3 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000180)='/dev/hwrng\x00', 0x0, 0x0) read$FUSE(r3, &(0x7f0000000700), 0xfce3) ioctl$BLKPG(r3, 0x1269, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0}) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) socket(0x1d, 0x80000, 0x1) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000540)=0x14) r5 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r5, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000280)=ANY=[@ANYBLOB="3000000024000b0f00"/20, @ANYRES32=r4, @ANYBLOB="ff00000000000000000000e4070001007069650004700200df329e91a7001df00e69c06a95499c88a548ce06aac2a1ea1277d7eef90367edad25e73c20eda73114b9fd2461b6b35fb5262900ff9e"], 0x30}}, 0x0) 19:27:18 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)=ANY=[@ANYBLOB="300000001000070100dd2174ffff27de00000000", @ANYRES32=0x0, @ANYBLOB="000000000000000c70001b00000000000500100005"], 0x30}}, 0x0) 19:27:18 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xd6010000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="02000000030000000400000030000f000300040000000000000000000f008ec4", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000e1f4655fe2f4655fe2f4655f000000000000040008", 0x1d, 0x4200}, {&(0x7f0000012700)="20000000d4c49a2e07", 0x9, 0x4280}], 0x0, &(0x7f0000013a00)) 19:27:18 executing program 3: set_mempolicy(0x2, &(0x7f0000000000)=0x9, 0x90) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x4c032, 0xffffffffffffffff, 0x9a01000000000000) [ 686.367225] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue [ 686.376122] EXT4-fs (loop5): corrupt root inode, run e2fsck [ 686.405451] EXT4-fs (loop5): mount failed 19:27:18 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xa6000000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="02000000030000000400000030000f000300040000000000000000000f008ec4", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000e1f4655fe2f4655fe2f4655f00000000000004", 0x1b, 0x4200}, {&(0x7f0000012700)="20000000d4c49a2e07", 0x9, 0x4280}], 0x0, &(0x7f0000013a00)) 19:27:18 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xcd000000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="02000000030000000400000030000f000300040000000000000000000f008ec4", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000e1f4655fe2f4655fe2f4655f000000000000040008", 0x1d, 0x4200}, {&(0x7f0000012700)="20000000d4c49a2e07", 0x9, 0x4280}], 0x0, &(0x7f0000013a00)) 19:27:18 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)=ANY=[@ANYBLOB="300000001000070100dd2174ffff27de00000000", @ANYRES32=0x0, @ANYBLOB="000000000000000e70001b00000000000500100005"], 0x30}}, 0x0) 19:27:18 executing program 3: set_mempolicy(0x2, &(0x7f0000000000)=0x9, 0x90) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x4c032, 0xffffffffffffffff, 0x9b00000000000000) 19:27:18 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xd6020000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="02000000030000000400000030000f000300040000000000000000000f008ec4", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000e1f4655fe2f4655fe2f4655f000000000000040008", 0x1d, 0x4200}, {&(0x7f0000012700)="20000000d4c49a2e07", 0x9, 0x4280}], 0x0, &(0x7f0000013a00)) [ 686.554689] FAULT_INJECTION: forcing a failure. [ 686.554689] name failslab, interval 1, probability 0, space 0, times 0 19:27:18 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)=ANY=[@ANYBLOB="300000001000070100dd2174ffff27de00000000", @ANYRES32=0x0, @ANYBLOB="000000000000000c74001b00000000000500100005"], 0x30}}, 0x0) 19:27:18 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)=ANY=[@ANYBLOB="300000001000070100dd2174ffff27de00000000", @ANYRES32=0x0, @ANYBLOB="000000000000000e74001b00000000000500100005"], 0x30}}, 0x0) [ 686.595423] CPU: 0 PID: 17816 Comm: syz-executor.2 Not tainted 4.19.167-syzkaller #0 [ 686.603344] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 686.612709] Call Trace: [ 686.615321] dump_stack+0x1fc/0x2fe [ 686.618968] should_fail.cold+0xa/0x14 [ 686.622875] ? setup_fault_attr+0x200/0x200 [ 686.627201] ? lock_acquire+0x170/0x3c0 [ 686.631191] __should_failslab+0x115/0x180 [ 686.635696] should_failslab+0x5/0xf [ 686.639419] kmem_cache_alloc_node_trace+0x244/0x3b0 19:27:18 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)=ANY=[@ANYBLOB="300000001000070100dd2174ffff27de00000000", @ANYRES32=0x0, @ANYBLOB="000000000000000c78001b00000000000500100005"], 0x30}}, 0x0) [ 686.644543] bdi_alloc_node+0x5c/0xd0 [ 686.648352] blk_alloc_queue_node+0x1af/0xbd0 [ 686.652864] blk_mq_init_queue+0x44/0xa0 [ 686.656931] loop_add+0x2cb/0x8a0 [ 686.660391] loop_control_ioctl+0x16c/0x480 [ 686.664720] ? loop_lookup+0x1d0/0x1d0 [ 686.668618] ? ksys_write+0x241/0x2a0 [ 686.672430] ? loop_lookup+0x1d0/0x1d0 [ 686.676328] do_vfs_ioctl+0xcdb/0x12e0 [ 686.680220] ? lock_downgrade+0x720/0x720 [ 686.684409] ? check_preemption_disabled+0x41/0x280 [ 686.689430] ? ioctl_preallocate+0x200/0x200 [ 686.693847] ? __fget+0x356/0x510 [ 686.697312] ? do_dup2+0x450/0x450 [ 686.700849] ? vfs_write+0x393/0x540 [ 686.704548] ? fput+0x2b/0x190 [ 686.707728] ksys_ioctl+0x9b/0xc0 [ 686.711168] __x64_sys_ioctl+0x6f/0xb0 [ 686.715051] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 686.719618] do_syscall_64+0xf9/0x620 [ 686.723408] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 686.728580] RIP: 0033:0x45e219 [ 686.731758] Code: 0d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 686.750644] RSP: 002b:00007f1b82d38c68 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 686.758334] RAX: ffffffffffffffda RBX: 0000000000000009 RCX: 000000000045e219 [ 686.765586] RDX: 0000000000000000 RSI: 0000000000004c80 RDI: 0000000000000007 [ 686.772837] RBP: 00007f1b82d38ca0 R08: 0000000000000000 R09: 0000000000000000 [ 686.780092] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000012 [ 686.787360] R13: 00007ffca1b4a27f R14: 00007f1b82d399c0 R15: 000000000119bf8c 19:27:18 executing program 2 (fault-call:13 fault-nth:19): perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0xb6, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8020}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x0, 0x0) r3 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000180)='/dev/hwrng\x00', 0x0, 0x0) read$FUSE(r3, &(0x7f0000000700), 0xfce3) ioctl$BLKPG(r3, 0x1269, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0}) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) socket(0x1d, 0x80000, 0x1) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000540)=0x14) r5 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r5, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000280)=ANY=[@ANYBLOB="3000000024000b0f00"/20, @ANYRES32=r4, @ANYBLOB="ff00000000000000000000e4070001007069650004700200df329e91a7001df00e69c06a95499c88a548ce06aac2a1ea1277d7eef90367edad25e73c20eda73114b9fd2461b6b35fb5262900ff9e"], 0x30}}, 0x0) 19:27:18 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)=ANY=[@ANYBLOB="300000001000070100dd2174ffff27de00000000", @ANYRES32=0x0, @ANYBLOB="000000000000000e78001b00000000000500100005"], 0x30}}, 0x0) 19:27:18 executing program 3: set_mempolicy(0x2, &(0x7f0000000000)=0x9, 0x90) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x4c032, 0xffffffffffffffff, 0x9b01000000000000) 19:27:18 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xd6030000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="02000000030000000400000030000f000300040000000000000000000f008ec4", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000e1f4655fe2f4655fe2f4655f000000000000040008", 0x1d, 0x4200}, {&(0x7f0000012700)="20000000d4c49a2e07", 0x9, 0x4280}], 0x0, &(0x7f0000013a00)) [ 686.934531] EXT4-fs (loop5): corrupt root inode, run e2fsck [ 686.935164] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue [ 686.943637] EXT4-fs (loop5): mount failed [ 687.030378] EXT4-fs (loop5): corrupt root inode, run e2fsck [ 687.044277] EXT4-fs (loop5): mount failed 19:27:19 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xa6010000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="02000000030000000400000030000f000300040000000000000000000f008ec4", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000e1f4655fe2f4655fe2f4655f00000000000004", 0x1b, 0x4200}, {&(0x7f0000012700)="20000000d4c49a2e07", 0x9, 0x4280}], 0x0, &(0x7f0000013a00)) 19:27:19 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xcd010000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="02000000030000000400000030000f000300040000000000000000000f008ec4", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000e1f4655fe2f4655fe2f4655f000000000000040008", 0x1d, 0x4200}, {&(0x7f0000012700)="20000000d4c49a2e07", 0x9, 0x4280}], 0x0, &(0x7f0000013a00)) 19:27:19 executing program 3: set_mempolicy(0x2, &(0x7f0000000000)=0x9, 0x90) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x4c032, 0xffffffffffffffff, 0x9c00000000000000) 19:27:19 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xd7000000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="02000000030000000400000030000f000300040000000000000000000f008ec4", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000e1f4655fe2f4655fe2f4655f000000000000040008", 0x1d, 0x4200}, {&(0x7f0000012700)="20000000d4c49a2e07", 0x9, 0x4280}], 0x0, &(0x7f0000013a00)) 19:27:19 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)=ANY=[@ANYBLOB="300000001000070100dd2174ffff27de00000000", @ANYRES32=0x0, @ANYBLOB="000000000000000c7c001b00000000000500100005"], 0x30}}, 0x0) [ 687.233121] FAULT_INJECTION: forcing a failure. [ 687.233121] name failslab, interval 1, probability 0, space 0, times 0 [ 687.282628] CPU: 0 PID: 17863 Comm: syz-executor.2 Not tainted 4.19.167-syzkaller #0 [ 687.290630] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 687.299990] Call Trace: [ 687.302591] dump_stack+0x1fc/0x2fe [ 687.306221] should_fail.cold+0xa/0x14 [ 687.310093] ? setup_fault_attr+0x200/0x200 [ 687.314396] ? lock_acquire+0x170/0x3c0 [ 687.318359] __should_failslab+0x115/0x180 [ 687.322574] should_failslab+0x5/0xf [ 687.326267] kmem_cache_alloc_trace+0x284/0x380 [ 687.330929] wb_congested_get_create+0x180/0x3a0 [ 687.336380] wb_init+0x4a7/0x770 [ 687.339736] ? __raw_spin_lock_init+0x28/0x100 [ 687.344303] bdi_init+0x29c/0x410 [ 687.347738] bdi_alloc_node+0x76/0xd0 [ 687.351523] blk_alloc_queue_node+0x1af/0xbd0 [ 687.356017] blk_mq_init_queue+0x44/0xa0 [ 687.360074] loop_add+0x2cb/0x8a0 [ 687.363536] loop_control_ioctl+0x16c/0x480 [ 687.367839] ? loop_lookup+0x1d0/0x1d0 [ 687.371713] ? loop_lookup+0x1d0/0x1d0 [ 687.375600] do_vfs_ioctl+0xcdb/0x12e0 [ 687.379475] ? lock_downgrade+0x720/0x720 [ 687.383603] ? check_preemption_disabled+0x41/0x280 [ 687.388604] ? ioctl_preallocate+0x200/0x200 [ 687.392996] ? __fget+0x356/0x510 [ 687.396455] ? do_dup2+0x450/0x450 [ 687.399987] ? vfs_write+0x393/0x540 [ 687.403684] ? fput+0x2b/0x190 [ 687.406876] ksys_ioctl+0x9b/0xc0 [ 687.410334] __x64_sys_ioctl+0x6f/0xb0 [ 687.414204] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 687.418769] do_syscall_64+0xf9/0x620 [ 687.422553] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 687.427742] RIP: 0033:0x45e219 [ 687.430927] Code: 0d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 687.449927] RSP: 002b:00007f1b82d17c68 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 687.457648] RAX: ffffffffffffffda RBX: 0000000000000009 RCX: 000000000045e219 [ 687.464904] RDX: 0000000000000000 RSI: 0000000000004c80 RDI: 0000000000000007 [ 687.472156] RBP: 00007f1b82d17ca0 R08: 0000000000000000 R09: 0000000000000000 19:27:19 executing program 3: set_mempolicy(0x2, &(0x7f0000000000)=0x9, 0x90) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x4c032, 0xffffffffffffffff, 0x9c01000000000000) 19:27:19 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)=ANY=[@ANYBLOB="300000001000070100dd2174ffff27de00000000", @ANYRES32=0x0, @ANYBLOB="000000000000000e7c001b00000000000500100005"], 0x30}}, 0x0) 19:27:19 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xd7010000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="02000000030000000400000030000f000300040000000000000000000f008ec4", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000e1f4655fe2f4655fe2f4655f000000000000040008", 0x1d, 0x4200}, {&(0x7f0000012700)="20000000d4c49a2e07", 0x9, 0x4280}], 0x0, &(0x7f0000013a00)) [ 687.479410] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000013 [ 687.486665] R13: 00007ffca1b4a27f R14: 00007f1b82d189c0 R15: 000000000119c034 19:27:19 executing program 2 (fault-call:13 fault-nth:20): perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0xb6, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8020}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x0, 0x0) r3 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000180)='/dev/hwrng\x00', 0x0, 0x0) read$FUSE(r3, &(0x7f0000000700), 0xfce3) ioctl$BLKPG(r3, 0x1269, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0}) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) socket(0x1d, 0x80000, 0x1) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000540)=0x14) r5 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r5, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000280)=ANY=[@ANYBLOB="3000000024000b0f00"/20, @ANYRES32=r4, @ANYBLOB="ff00000000000000000000e4070001007069650004700200df329e91a7001df00e69c06a95499c88a548ce06aac2a1ea1277d7eef90367edad25e73c20eda73114b9fd2461b6b35fb5262900ff9e"], 0x30}}, 0x0) 19:27:19 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)=ANY=[@ANYBLOB="300000001000070100dd2174ffff27de00000000", @ANYRES32=0x0, @ANYBLOB="000000000000000c80001b00000000000500100005"], 0x30}}, 0x0) 19:27:19 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xd7020000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="02000000030000000400000030000f000300040000000000000000000f008ec4", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000e1f4655fe2f4655fe2f4655f000000000000040008", 0x1d, 0x4200}, {&(0x7f0000012700)="20000000d4c49a2e07", 0x9, 0x4280}], 0x0, &(0x7f0000013a00)) [ 687.629461] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue [ 687.650982] EXT4-fs (loop5): corrupt root inode, run e2fsck [ 687.656777] EXT4-fs (loop5): mount failed 19:27:19 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xcd020000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="02000000030000000400000030000f000300040000000000000000000f008ec4", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000e1f4655fe2f4655fe2f4655f000000000000040008", 0x1d, 0x4200}, {&(0x7f0000012700)="20000000d4c49a2e07", 0x9, 0x4280}], 0x0, &(0x7f0000013a00)) [ 687.797464] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue [ 687.807514] EXT4-fs (loop5): corrupt root inode, run e2fsck [ 687.818066] EXT4-fs (loop5): mount failed 19:27:19 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xa6020000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="02000000030000000400000030000f000300040000000000000000000f008ec4", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000e1f4655fe2f4655fe2f4655f00000000000004", 0x1b, 0x4200}, {&(0x7f0000012700)="20000000d4c49a2e07", 0x9, 0x4280}], 0x0, &(0x7f0000013a00)) 19:27:19 executing program 3: set_mempolicy(0x2, &(0x7f0000000000)=0x9, 0x90) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x4c032, 0xffffffffffffffff, 0x9d00000000000000) 19:27:19 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xd7030000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="02000000030000000400000030000f000300040000000000000000000f008ec4", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000e1f4655fe2f4655fe2f4655f000000000000040008", 0x1d, 0x4200}, {&(0x7f0000012700)="20000000d4c49a2e07", 0x9, 0x4280}], 0x0, &(0x7f0000013a00)) 19:27:19 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)=ANY=[@ANYBLOB="300000001000070100dd2174ffff27de00000000", @ANYRES32=0x0, @ANYBLOB="000000000000000e80001b00000000000500100005"], 0x30}}, 0x0) 19:27:19 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xcd030000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="02000000030000000400000030000f000300040000000000000000000f008ec4", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000e1f4655fe2f4655fe2f4655f000000000000040008", 0x1d, 0x4200}, {&(0x7f0000012700)="20000000d4c49a2e07", 0x9, 0x4280}], 0x0, &(0x7f0000013a00)) 19:27:20 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xd8000000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="02000000030000000400000030000f000300040000000000000000000f008ec4", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000e1f4655fe2f4655fe2f4655f000000000000040008", 0x1d, 0x4200}, {&(0x7f0000012700)="20000000d4c49a2e07", 0x9, 0x4280}], 0x0, &(0x7f0000013a00)) 19:27:20 executing program 3: set_mempolicy(0x2, &(0x7f0000000000)=0x9, 0x90) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x4c032, 0xffffffffffffffff, 0x9d01000000000000) [ 687.935574] FAULT_INJECTION: forcing a failure. [ 687.935574] name failslab, interval 1, probability 0, space 0, times 0 [ 688.003704] CPU: 1 PID: 17896 Comm: syz-executor.2 Not tainted 4.19.167-syzkaller #0 [ 688.011640] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 688.021001] Call Trace: [ 688.023646] dump_stack+0x1fc/0x2fe [ 688.027289] should_fail.cold+0xa/0x14 [ 688.031199] ? setup_fault_attr+0x200/0x200 [ 688.035531] ? lock_acquire+0x170/0x3c0 [ 688.039532] __should_failslab+0x115/0x180 [ 688.043785] should_failslab+0x5/0xf [ 688.047508] kmem_cache_alloc_trace+0x284/0x380 [ 688.052174] blk_alloc_queue_stats+0x3c/0x100 [ 688.056652] blk_alloc_queue_node+0x1eb/0xbd0 [ 688.061151] blk_mq_init_queue+0x44/0xa0 [ 688.065217] loop_add+0x2cb/0x8a0 [ 688.068666] loop_control_ioctl+0x16c/0x480 [ 688.072973] ? loop_lookup+0x1d0/0x1d0 [ 688.076850] ? ksys_write+0x241/0x2a0 [ 688.080663] ? loop_lookup+0x1d0/0x1d0 [ 688.084554] do_vfs_ioctl+0xcdb/0x12e0 [ 688.088440] ? lock_downgrade+0x720/0x720 [ 688.092573] ? check_preemption_disabled+0x41/0x280 [ 688.097634] ? ioctl_preallocate+0x200/0x200 [ 688.102056] ? __fget+0x356/0x510 [ 688.105506] ? do_dup2+0x450/0x450 [ 688.109064] ? vfs_write+0x393/0x540 [ 688.112881] ? fput+0x2b/0x190 [ 688.116198] ksys_ioctl+0x9b/0xc0 [ 688.119672] __x64_sys_ioctl+0x6f/0xb0 [ 688.123557] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 688.128126] do_syscall_64+0xf9/0x620 [ 688.131946] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 688.137127] RIP: 0033:0x45e219 19:27:20 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)=ANY=[@ANYBLOB="300000001000070100dd2174ffff27de00000000", @ANYRES32=0x0, @ANYBLOB="000000000000000c84001b00000000000500100005"], 0x30}}, 0x0) [ 688.140318] Code: 0d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 688.159208] RSP: 002b:00007f1b82d38c68 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 688.166908] RAX: ffffffffffffffda RBX: 0000000000000009 RCX: 000000000045e219 [ 688.174600] RDX: 0000000000000000 RSI: 0000000000004c80 RDI: 0000000000000007 [ 688.181867] RBP: 00007f1b82d38ca0 R08: 0000000000000000 R09: 0000000000000000 [ 688.189130] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000014 [ 688.196492] R13: 00007ffca1b4a27f R14: 00007f1b82d399c0 R15: 000000000119bf8c 19:27:20 executing program 2 (fault-call:13 fault-nth:21): perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0xb6, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8020}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x0, 0x0) r3 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000180)='/dev/hwrng\x00', 0x0, 0x0) read$FUSE(r3, &(0x7f0000000700), 0xfce3) ioctl$BLKPG(r3, 0x1269, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0}) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) socket(0x1d, 0x80000, 0x1) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000540)=0x14) r5 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r5, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000280)=ANY=[@ANYBLOB="3000000024000b0f00"/20, @ANYRES32=r4, @ANYBLOB="ff00000000000000000000e4070001007069650004700200df329e91a7001df00e69c06a95499c88a548ce06aac2a1ea1277d7eef90367edad25e73c20eda73114b9fd2461b6b35fb5262900ff9e"], 0x30}}, 0x0) 19:27:20 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xd8010000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="02000000030000000400000030000f000300040000000000000000000f008ec4", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000e1f4655fe2f4655fe2f4655f000000000000040008", 0x1d, 0x4200}, {&(0x7f0000012700)="20000000d4c49a2e07", 0x9, 0x4280}], 0x0, &(0x7f0000013a00)) [ 688.266786] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue [ 688.282281] EXT4-fs (loop5): corrupt root inode, run e2fsck [ 688.292484] EXT4-fs (loop5): mount failed 19:27:20 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xce000000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="02000000030000000400000030000f000300040000000000000000000f008ec4", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000e1f4655fe2f4655fe2f4655f000000000000040008", 0x1d, 0x4200}, {&(0x7f0000012700)="20000000d4c49a2e07", 0x9, 0x4280}], 0x0, &(0x7f0000013a00)) 19:27:20 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xa6030000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="02000000030000000400000030000f000300040000000000000000000f008ec4", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000e1f4655fe2f4655fe2f4655f00000000000004", 0x1b, 0x4200}, {&(0x7f0000012700)="20000000d4c49a2e07", 0x9, 0x4280}], 0x0, &(0x7f0000013a00)) 19:27:20 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)=ANY=[@ANYBLOB="300000001000070100dd2174ffff27de00000000", @ANYRES32=0x0, @ANYBLOB="000000000000000e84001b00000000000500100005"], 0x30}}, 0x0) 19:27:20 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xd8020000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="02000000030000000400000030000f000300040000000000000000000f008ec4", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000e1f4655fe2f4655fe2f4655f000000000000040008", 0x1d, 0x4200}, {&(0x7f0000012700)="20000000d4c49a2e07", 0x9, 0x4280}], 0x0, &(0x7f0000013a00)) 19:27:20 executing program 3: set_mempolicy(0x2, &(0x7f0000000000)=0x9, 0x90) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x4c032, 0xffffffffffffffff, 0x9e00000000000000) 19:27:20 executing program 3: set_mempolicy(0x2, &(0x7f0000000000)=0x9, 0x90) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x4c032, 0xffffffffffffffff, 0x9e01000000000000) [ 688.524097] FAULT_INJECTION: forcing a failure. [ 688.524097] name failslab, interval 1, probability 0, space 0, times 0 [ 688.548684] nla_parse: 12 callbacks suppressed [ 688.548695] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.0'. [ 688.564400] CPU: 1 PID: 17940 Comm: syz-executor.2 Not tainted 4.19.167-syzkaller #0 [ 688.567978] EXT4-fs (loop5): corrupt root inode, run e2fsck [ 688.572296] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 688.572303] Call Trace: [ 688.572324] dump_stack+0x1fc/0x2fe [ 688.572346] should_fail.cold+0xa/0x14 [ 688.572362] ? setup_fault_attr+0x200/0x200 [ 688.572378] ? lock_acquire+0x170/0x3c0 [ 688.572402] __should_failslab+0x115/0x180 [ 688.572417] should_failslab+0x5/0xf [ 688.572431] kmem_cache_alloc_node_trace+0x244/0x3b0 [ 688.572448] blkg_alloc+0x92/0x630 [ 688.572465] blkcg_init_queue+0x24/0x540 [ 688.572481] blk_alloc_queue_node+0x7b6/0xbd0 [ 688.579964] EXT4-fs (loop5): mount failed [ 688.587541] blk_mq_init_queue+0x44/0xa0 [ 688.587558] loop_add+0x2cb/0x8a0 [ 688.587575] loop_control_ioctl+0x16c/0x480 [ 688.587590] ? loop_lookup+0x1d0/0x1d0 [ 688.587608] ? ksys_write+0x241/0x2a0 [ 688.587622] ? loop_lookup+0x1d0/0x1d0 [ 688.587637] do_vfs_ioctl+0xcdb/0x12e0 [ 688.587652] ? lock_downgrade+0x720/0x720 [ 688.587665] ? check_preemption_disabled+0x41/0x280 [ 688.587678] ? ioctl_preallocate+0x200/0x200 [ 688.587695] ? __fget+0x356/0x510 [ 688.587710] ? do_dup2+0x450/0x450 [ 688.683078] ? vfs_write+0x393/0x540 [ 688.686788] ? fput+0x2b/0x190 [ 688.689968] ksys_ioctl+0x9b/0xc0 [ 688.693407] __x64_sys_ioctl+0x6f/0xb0 [ 688.697280] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 688.701854] do_syscall_64+0xf9/0x620 [ 688.705648] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 688.710828] RIP: 0033:0x45e219 [ 688.714014] Code: 0d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 688.732935] RSP: 002b:00007f1b82d38c68 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 688.740639] RAX: ffffffffffffffda RBX: 0000000000000009 RCX: 000000000045e219 [ 688.747913] RDX: 0000000000000000 RSI: 0000000000004c80 RDI: 0000000000000007 [ 688.755175] RBP: 00007f1b82d38ca0 R08: 0000000000000000 R09: 0000000000000000 [ 688.762434] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000015 19:27:20 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xd8030000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="02000000030000000400000030000f000300040000000000000000000f008ec4", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000e1f4655fe2f4655fe2f4655f000000000000040008", 0x1d, 0x4200}, {&(0x7f0000012700)="20000000d4c49a2e07", 0x9, 0x4280}], 0x0, &(0x7f0000013a00)) 19:27:20 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)=ANY=[@ANYBLOB="300000001000070100dd2174ffff27de00000000", @ANYRES32=0x0, @ANYBLOB="000000000000000b88001b00000000000500100005"], 0x30}}, 0x0) [ 688.769693] R13: 00007ffca1b4a27f R14: 00007f1b82d399c0 R15: 000000000119bf8c 19:27:20 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xa7000000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="02000000030000000400000030000f000300040000000000000000000f008ec4", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000e1f4655fe2f4655fe2f4655f00000000000004", 0x1b, 0x4200}, {&(0x7f0000012700)="20000000d4c49a2e07", 0x9, 0x4280}], 0x0, &(0x7f0000013a00)) 19:27:20 executing program 2 (fault-call:13 fault-nth:22): perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0xb6, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8020}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x0, 0x0) r3 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000180)='/dev/hwrng\x00', 0x0, 0x0) read$FUSE(r3, &(0x7f0000000700), 0xfce3) ioctl$BLKPG(r3, 0x1269, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0}) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) socket(0x1d, 0x80000, 0x1) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000540)=0x14) r5 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r5, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000280)=ANY=[@ANYBLOB="3000000024000b0f00"/20, @ANYRES32=r4, @ANYBLOB="ff00000000000000000000e4070001007069650004700200df329e91a7001df00e69c06a95499c88a548ce06aac2a1ea1277d7eef90367edad25e73c20eda73114b9fd2461b6b35fb5262900ff9e"], 0x30}}, 0x0) [ 688.849436] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue 19:27:20 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xd9000000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="02000000030000000400000030000f000300040000000000000000000f008ec4", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000e1f4655fe2f4655fe2f4655f000000000000040008", 0x1d, 0x4200}, {&(0x7f0000012700)="20000000d4c49a2e07", 0x9, 0x4280}], 0x0, &(0x7f0000013a00)) 19:27:20 executing program 3: set_mempolicy(0x2, &(0x7f0000000000)=0x9, 0x90) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x4c032, 0xffffffffffffffff, 0x9f00000000000000) 19:27:21 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xce010000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="02000000030000000400000030000f000300040000000000000000000f008ec4", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000e1f4655fe2f4655fe2f4655f000000000000040008", 0x1d, 0x4200}, {&(0x7f0000012700)="20000000d4c49a2e07", 0x9, 0x4280}], 0x0, &(0x7f0000013a00)) [ 688.947471] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.0'. 19:27:21 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)=ANY=[@ANYBLOB="300000001000070100dd2174ffff27de00000000", @ANYRES32=0x0, @ANYBLOB="000000000000000c88001b00000000000500100005"], 0x30}}, 0x0) [ 689.011335] EXT4-fs (loop5): corrupt root inode, run e2fsck [ 689.041015] EXT4-fs (loop5): mount failed 19:27:21 executing program 3: set_mempolicy(0x2, &(0x7f0000000000)=0x9, 0x90) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x4c032, 0xffffffffffffffff, 0x9f01000000000000) [ 689.109429] FAULT_INJECTION: forcing a failure. [ 689.109429] name failslab, interval 1, probability 0, space 0, times 0 [ 689.146175] CPU: 1 PID: 17982 Comm: syz-executor.2 Not tainted 4.19.167-syzkaller #0 [ 689.154090] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 689.157830] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.0'. [ 689.163442] Call Trace: [ 689.163467] dump_stack+0x1fc/0x2fe [ 689.163490] should_fail.cold+0xa/0x14 [ 689.163507] ? setup_fault_attr+0x200/0x200 [ 689.163521] ? lock_acquire+0x170/0x3c0 [ 689.163545] __should_failslab+0x115/0x180 [ 689.163559] should_failslab+0x5/0xf [ 689.163571] kmem_cache_alloc_trace+0x284/0x380 [ 689.163598] blk_iolatency_init+0x47/0x2d0 [ 689.207756] blkcg_init_queue+0x1c1/0x540 [ 689.211913] blk_alloc_queue_node+0x7b6/0xbd0 [ 689.216464] blk_mq_init_queue+0x44/0xa0 [ 689.220512] loop_add+0x2cb/0x8a0 [ 689.223977] loop_control_ioctl+0x16c/0x480 [ 689.228291] ? loop_lookup+0x1d0/0x1d0 [ 689.232188] ? do_vfs_ioctl+0xbd/0x12e0 [ 689.236178] ? loop_lookup+0x1d0/0x1d0 [ 689.240054] do_vfs_ioctl+0xcdb/0x12e0 [ 689.243930] ? lock_downgrade+0x720/0x720 [ 689.248058] ? check_preemption_disabled+0x41/0x280 [ 689.253160] ? ioctl_preallocate+0x200/0x200 [ 689.257646] ? __fget+0x356/0x510 [ 689.261095] ? do_dup2+0x450/0x450 [ 689.264624] ? rcu_nmi_exit+0xb3/0x180 [ 689.268502] ksys_ioctl+0x9b/0xc0 [ 689.271954] __x64_sys_ioctl+0x6f/0xb0 [ 689.275844] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 689.280424] do_syscall_64+0xf9/0x620 [ 689.284210] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 689.289566] RIP: 0033:0x45e219 [ 689.292753] Code: 0d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 689.311773] RSP: 002b:00007f1b82d17c68 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 689.319521] RAX: ffffffffffffffda RBX: 0000000000000009 RCX: 000000000045e219 [ 689.326773] RDX: 0000000000000000 RSI: 0000000000004c80 RDI: 0000000000000007 [ 689.334034] RBP: 00007f1b82d17ca0 R08: 0000000000000000 R09: 0000000000000000 [ 689.341299] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000016 [ 689.348559] R13: 00007ffca1b4a27f R14: 00007f1b82d189c0 R15: 000000000119c034 19:27:21 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xd9010000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="02000000030000000400000030000f000300040000000000000000000f008ec4", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000e1f4655fe2f4655fe2f4655f000000000000040008", 0x1d, 0x4200}, {&(0x7f0000012700)="20000000d4c49a2e07", 0x9, 0x4280}], 0x0, &(0x7f0000013a00)) 19:27:21 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)=ANY=[@ANYBLOB="300000001000070100dd2174ffff27de00000000", @ANYRES32=0x0, @ANYBLOB="000000000000000e88001b00000000000500100005"], 0x30}}, 0x0) 19:27:21 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)=ANY=[@ANYBLOB="300000001000070100dd2174ffff27de00000000", @ANYRES32=0x0, @ANYBLOB="000000000000000b8c001b00000000000500100005"], 0x30}}, 0x0) [ 689.439984] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.0'. 19:27:21 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xd9020000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="02000000030000000400000030000f000300040000000000000000000f008ec4", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000e1f4655fe2f4655fe2f4655f000000000000040008", 0x1d, 0x4200}, {&(0x7f0000012700)="20000000d4c49a2e07", 0x9, 0x4280}], 0x0, &(0x7f0000013a00)) [ 689.498701] EXT4-fs (loop5): corrupt root inode, run e2fsck [ 689.499497] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.0'. [ 689.518223] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue 19:27:21 executing program 3: set_mempolicy(0x2, &(0x7f0000000000)=0x9, 0x90) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x4c032, 0xffffffffffffffff, 0xa000000000000000) [ 689.555614] EXT4-fs (loop5): mount failed 19:27:21 executing program 3: set_mempolicy(0x2, &(0x7f0000000000)=0x9, 0x90) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x4c032, 0xffffffffffffffff, 0xa001000000000000) 19:27:21 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xa7010000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="02000000030000000400000030000f000300040000000000000000000f008ec4", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000e1f4655fe2f4655fe2f4655f00000000000004", 0x1b, 0x4200}, {&(0x7f0000012700)="20000000d4c49a2e07", 0x9, 0x4280}], 0x0, &(0x7f0000013a00)) 19:27:21 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xce020000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="02000000030000000400000030000f000300040000000000000000000f008ec4", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000e1f4655fe2f4655fe2f4655f000000000000040008", 0x1d, 0x4200}, {&(0x7f0000012700)="20000000d4c49a2e07", 0x9, 0x4280}], 0x0, &(0x7f0000013a00)) 19:27:21 executing program 2 (fault-call:13 fault-nth:23): perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0xb6, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8020}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x0, 0x0) r3 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000180)='/dev/hwrng\x00', 0x0, 0x0) read$FUSE(r3, &(0x7f0000000700), 0xfce3) ioctl$BLKPG(r3, 0x1269, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0}) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) socket(0x1d, 0x80000, 0x1) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000540)=0x14) r5 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r5, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000280)=ANY=[@ANYBLOB="3000000024000b0f00"/20, @ANYRES32=r4, @ANYBLOB="ff00000000000000000000e4070001007069650004700200df329e91a7001df00e69c06a95499c88a548ce06aac2a1ea1277d7eef90367edad25e73c20eda73114b9fd2461b6b35fb5262900ff9e"], 0x30}}, 0x0) 19:27:21 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xd9030000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="02000000030000000400000030000f000300040000000000000000000f008ec4", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000e1f4655fe2f4655fe2f4655f000000000000040008", 0x1d, 0x4200}, {&(0x7f0000012700)="20000000d4c49a2e07", 0x9, 0x4280}], 0x0, &(0x7f0000013a00)) 19:27:21 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)=ANY=[@ANYBLOB="300000001000070100dd2174ffff27de00000000", @ANYRES32=0x0, @ANYBLOB="000000000000000e8c001b00000000000500100005"], 0x30}}, 0x0) 19:27:21 executing program 3: set_mempolicy(0x2, &(0x7f0000000000)=0x9, 0x90) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x4c032, 0xffffffffffffffff, 0xa100000000000000) [ 689.721084] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.0'. 19:27:21 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)=ANY=[@ANYBLOB="300000001000070100dd2174ffff27de00000000", @ANYRES32=0x0, @ANYBLOB="000000000000000e90001b00000000000500100005"], 0x30}}, 0x0) 19:27:21 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xda000000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="02000000030000000400000030000f000300040000000000000000000f008ec4", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000e1f4655fe2f4655fe2f4655f000000000000040008", 0x1d, 0x4200}, {&(0x7f0000012700)="20000000d4c49a2e07", 0x9, 0x4280}], 0x0, &(0x7f0000013a00)) [ 689.813309] FAULT_INJECTION: forcing a failure. [ 689.813309] name failslab, interval 1, probability 0, space 0, times 0 [ 689.853666] CPU: 0 PID: 18025 Comm: syz-executor.2 Not tainted 4.19.167-syzkaller #0 [ 689.861588] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 689.870952] Call Trace: [ 689.873552] dump_stack+0x1fc/0x2fe [ 689.877198] should_fail.cold+0xa/0x14 [ 689.880546] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.0'. [ 689.881093] ? setup_fault_attr+0x200/0x200 [ 689.893980] ? lock_acquire+0x170/0x3c0 [ 689.897970] __should_failslab+0x115/0x180 19:27:21 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)=ANY=[@ANYBLOB="300000001000070100dd2174ffff27de00000000", @ANYRES32=0x0, @ANYBLOB="000000000000000c94001b00000000000500100005"], 0x30}}, 0x0) 19:27:21 executing program 3: set_mempolicy(0x2, &(0x7f0000000000)=0x9, 0x90) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x4c032, 0xffffffffffffffff, 0xa101000000000000) [ 689.902208] should_failslab+0x5/0xf [ 689.905924] kmem_cache_alloc_node_trace+0x244/0x3b0 [ 689.911030] ? iolatency_pd_init+0x6f0/0x6f0 [ 689.915486] iolatency_pd_alloc+0x6e/0x120 [ 689.919729] blkcg_activate_policy+0x120/0x5d0 [ 689.924324] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 689.929350] blk_iolatency_init+0x123/0x2d0 [ 689.933189] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.0'. [ 689.933673] blkcg_init_queue+0x1c1/0x540 [ 689.946520] blk_alloc_queue_node+0x7b6/0xbd0 19:27:22 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)=ANY=[@ANYBLOB="300000001000070100dd2174ffff27de00000000", @ANYRES32=0x0, @ANYBLOB="000000000000000e94001b00000000000500100005"], 0x30}}, 0x0) [ 689.951032] blk_mq_init_queue+0x44/0xa0 [ 689.955109] loop_add+0x2cb/0x8a0 [ 689.958585] loop_control_ioctl+0x16c/0x480 [ 689.962915] ? loop_lookup+0x1d0/0x1d0 [ 689.966820] ? loop_lookup+0x1d0/0x1d0 [ 689.970717] do_vfs_ioctl+0xcdb/0x12e0 [ 689.974614] ? lock_downgrade+0x720/0x720 [ 689.978775] ? ioctl_preallocate+0x200/0x200 [ 689.983192] ? __fget+0x356/0x510 [ 689.983799] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.0'. [ 689.986668] ? do_dup2+0x450/0x450 [ 689.986683] ? vfs_write+0x393/0x540 19:27:22 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)=ANY=[@ANYBLOB="300000001000070100dd2174ffff27de00000000", @ANYRES32=0x0, @ANYBLOB="000000000000000e98001b00000000000500100005"], 0x30}}, 0x0) [ 689.986700] ? fput+0x2b/0x190 [ 689.986720] ksys_ioctl+0x9b/0xc0 [ 689.986736] __x64_sys_ioctl+0x6f/0xb0 [ 690.013051] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 690.017645] do_syscall_64+0xf9/0x620 [ 690.021462] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 690.026686] RIP: 0033:0x45e219 [ 690.029883] Code: 0d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 690.048800] RSP: 002b:00007f1b82d17c68 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 690.050535] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.0'. [ 690.056511] RAX: ffffffffffffffda RBX: 0000000000000009 RCX: 000000000045e219 [ 690.056520] RDX: 0000000000000000 RSI: 0000000000004c80 RDI: 0000000000000007 [ 690.056530] RBP: 00007f1b82d17ca0 R08: 0000000000000000 R09: 0000000000000000 [ 690.056538] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000017 [ 690.056548] R13: 00007ffca1b4a27f R14: 00007f1b82d189c0 R15: 000000000119c034 [ 690.153518] EXT4-fs (loop5): corrupt root inode, run e2fsck [ 690.177240] EXT4-fs (loop5): mount failed [ 690.184858] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue 19:27:22 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xa7020000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="02000000030000000400000030000f000300040000000000000000000f008ec4", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000e1f4655fe2f4655fe2f4655f00000000000004", 0x1b, 0x4200}, {&(0x7f0000012700)="20000000d4c49a2e07", 0x9, 0x4280}], 0x0, &(0x7f0000013a00)) 19:27:22 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xda010000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="02000000030000000400000030000f000300040000000000000000000f008ec4", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000e1f4655fe2f4655fe2f4655f000000000000040008", 0x1d, 0x4200}, {&(0x7f0000012700)="20000000d4c49a2e07", 0x9, 0x4280}], 0x0, &(0x7f0000013a00)) 19:27:22 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)=ANY=[@ANYBLOB="300000001000070100dd2174ffff27de00000000", @ANYRES32=0x0, @ANYBLOB="000000000000000c9c001b00000000000500100005"], 0x30}}, 0x0) 19:27:22 executing program 2 (fault-call:13 fault-nth:24): perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0xb6, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8020}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x0, 0x0) r3 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000180)='/dev/hwrng\x00', 0x0, 0x0) read$FUSE(r3, &(0x7f0000000700), 0xfce3) ioctl$BLKPG(r3, 0x1269, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0}) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) socket(0x1d, 0x80000, 0x1) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000540)=0x14) r5 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r5, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000280)=ANY=[@ANYBLOB="3000000024000b0f00"/20, @ANYRES32=r4, @ANYBLOB="ff00000000000000000000e4070001007069650004700200df329e91a7001df00e69c06a95499c88a548ce06aac2a1ea1277d7eef90367edad25e73c20eda73114b9fd2461b6b35fb5262900ff9e"], 0x30}}, 0x0) 19:27:22 executing program 3: set_mempolicy(0x2, &(0x7f0000000000)=0x9, 0x90) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x4c032, 0xffffffffffffffff, 0xa200000000000000) 19:27:22 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xce030000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="02000000030000000400000030000f000300040000000000000000000f008ec4", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000e1f4655fe2f4655fe2f4655f000000000000040008", 0x1d, 0x4200}, {&(0x7f0000012700)="20000000d4c49a2e07", 0x9, 0x4280}], 0x0, &(0x7f0000013a00)) [ 690.296586] EXT4-fs (loop5): corrupt root inode, run e2fsck [ 690.317755] EXT4-fs (loop5): mount failed 19:27:22 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)=ANY=[@ANYBLOB="300000001000070100dd2174ffff27de00000000", @ANYRES32=0x0, @ANYBLOB="000000000000000ca0001b00000000000500100005"], 0x30}}, 0x0) 19:27:22 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xda020000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="02000000030000000400000030000f000300040000000000000000000f008ec4", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000e1f4655fe2f4655fe2f4655f000000000000040008", 0x1d, 0x4200}, {&(0x7f0000012700)="20000000d4c49a2e07", 0x9, 0x4280}], 0x0, &(0x7f0000013a00)) 19:27:22 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)=ANY=[@ANYBLOB="300000001000070100dd2174ffff27de00000000", @ANYRES32=0x0, @ANYBLOB="000000000000000ea0001b00000000000500100005"], 0x30}}, 0x0) [ 690.496922] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue [ 690.507036] FAULT_INJECTION: forcing a failure. [ 690.507036] name failslab, interval 1, probability 0, space 0, times 0 [ 690.518538] CPU: 1 PID: 18064 Comm: syz-executor.2 Not tainted 4.19.167-syzkaller #0 [ 690.526415] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 690.535766] Call Trace: [ 690.538354] dump_stack+0x1fc/0x2fe [ 690.541986] should_fail.cold+0xa/0x14 [ 690.545870] ? setup_fault_attr+0x200/0x200 [ 690.550197] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 690.555230] __should_failslab+0x115/0x180 [ 690.559470] should_failslab+0x5/0xf [ 690.563190] kmem_cache_alloc_node_trace+0x57/0x3b0 [ 690.568219] iolatency_pd_alloc+0x6e/0x120 [ 690.572462] ? iolatency_pd_init+0x6f0/0x6f0 [ 690.576875] blkcg_activate_policy+0x249/0x5d0 [ 690.581477] blk_iolatency_init+0x123/0x2d0 [ 690.585811] blkcg_init_queue+0x1c1/0x540 [ 690.589971] blk_alloc_queue_node+0x7b6/0xbd0 19:27:22 executing program 3: set_mempolicy(0x2, &(0x7f0000000000)=0x9, 0x90) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x4c032, 0xffffffffffffffff, 0xa201000000000000) 19:27:22 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xda030000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="02000000030000000400000030000f000300040000000000000000000f008ec4", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000e1f4655fe2f4655fe2f4655f000000000000040008", 0x1d, 0x4200}, {&(0x7f0000012700)="20000000d4c49a2e07", 0x9, 0x4280}], 0x0, &(0x7f0000013a00)) [ 690.594482] blk_mq_init_queue+0x44/0xa0 [ 690.598551] loop_add+0x2cb/0x8a0 [ 690.602011] loop_control_ioctl+0x16c/0x480 [ 690.606339] ? loop_lookup+0x1d0/0x1d0 [ 690.610239] ? ksys_write+0x241/0x2a0 [ 690.614046] ? loop_lookup+0x1d0/0x1d0 [ 690.617947] do_vfs_ioctl+0xcdb/0x12e0 [ 690.621845] ? lock_downgrade+0x720/0x720 [ 690.626084] ? check_preemption_disabled+0x41/0x280 [ 690.631107] ? ioctl_preallocate+0x200/0x200 [ 690.635526] ? __fget+0x356/0x510 [ 690.638986] ? do_dup2+0x450/0x450 [ 690.642530] ? vfs_write+0x393/0x540 19:27:22 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)=ANY=[@ANYBLOB="300000001000070100dd2174ffff27de00000000", @ANYRES32=0x0, @ANYBLOB="0000000000000009a4001b00000000000500100005"], 0x30}}, 0x0) [ 690.646250] ? fput+0x2b/0x190 [ 690.649451] ksys_ioctl+0x9b/0xc0 [ 690.652937] __x64_sys_ioctl+0x6f/0xb0 [ 690.656832] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 690.661417] do_syscall_64+0xf9/0x620 [ 690.665224] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 690.670416] RIP: 0033:0x45e219 [ 690.673610] Code: 0d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 690.692513] RSP: 002b:00007f1b82d38c68 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 690.700231] RAX: ffffffffffffffda RBX: 0000000000000009 RCX: 000000000045e219 [ 690.707502] RDX: 0000000000000000 RSI: 0000000000004c80 RDI: 0000000000000007 [ 690.714774] RBP: 00007f1b82d38ca0 R08: 0000000000000000 R09: 0000000000000000 [ 690.722062] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000018 [ 690.729340] R13: 00007ffca1b4a27f R14: 00007f1b82d399c0 R15: 000000000119bf8c [ 690.788526] EXT4-fs (loop5): corrupt root inode, run e2fsck [ 690.796436] EXT4-fs (loop5): mount failed 19:27:22 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)=ANY=[@ANYBLOB="300000001000070100dd2174ffff27de00000000", @ANYRES32=0x0, @ANYBLOB="000000000000000bc0001b00000000000500100005"], 0x30}}, 0x0) 19:27:22 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xdb000000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="02000000030000000400000030000f000300040000000000000000000f008ec4", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000e1f4655fe2f4655fe2f4655f000000000000040008", 0x1d, 0x4200}, {&(0x7f0000012700)="20000000d4c49a2e07", 0x9, 0x4280}], 0x0, &(0x7f0000013a00)) 19:27:22 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xcf000000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="02000000030000000400000030000f000300040000000000000000000f008ec4", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000e1f4655fe2f4655fe2f4655f000000000000040008", 0x1d, 0x4200}, {&(0x7f0000012700)="20000000d4c49a2e07", 0x9, 0x4280}], 0x0, &(0x7f0000013a00)) 19:27:22 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xa7030000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="02000000030000000400000030000f000300040000000000000000000f008ec4", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000e1f4655fe2f4655fe2f4655f00000000000004", 0x1b, 0x4200}, {&(0x7f0000012700)="20000000d4c49a2e07", 0x9, 0x4280}], 0x0, &(0x7f0000013a00)) 19:27:22 executing program 2 (fault-call:13 fault-nth:25): perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0xb6, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8020}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x0, 0x0) r3 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000180)='/dev/hwrng\x00', 0x0, 0x0) read$FUSE(r3, &(0x7f0000000700), 0xfce3) ioctl$BLKPG(r3, 0x1269, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0}) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) socket(0x1d, 0x80000, 0x1) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000540)=0x14) r5 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r5, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000280)=ANY=[@ANYBLOB="3000000024000b0f00"/20, @ANYRES32=r4, @ANYBLOB="ff00000000000000000000e4070001007069650004700200df329e91a7001df00e69c06a95499c88a548ce06aac2a1ea1277d7eef90367edad25e73c20eda73114b9fd2461b6b35fb5262900ff9e"], 0x30}}, 0x0) 19:27:22 executing program 3: set_mempolicy(0x2, &(0x7f0000000000)=0x9, 0x90) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x4c032, 0xffffffffffffffff, 0xa300000000000000) 19:27:22 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)=ANY=[@ANYBLOB="300000001000070100dd2174ffff27de00000000", @ANYRES32=0x0, @ANYBLOB="000000000000000dd4001b00000000000500100005"], 0x30}}, 0x0) 19:27:23 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xdb010000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="02000000030000000400000030000f000300040000000000000000000f008ec4", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000e1f4655fe2f4655fe2f4655f000000000000040008", 0x1d, 0x4200}, {&(0x7f0000012700)="20000000d4c49a2e07", 0x9, 0x4280}], 0x0, &(0x7f0000013a00)) [ 690.996095] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue 19:27:23 executing program 3: set_mempolicy(0x2, &(0x7f0000000000)=0x9, 0x90) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x4c032, 0xffffffffffffffff, 0xa301000000000000) 19:27:23 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xcf010000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="02000000030000000400000030000f000300040000000000000000000f008ec4", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000e1f4655fe2f4655fe2f4655f000000000000040008", 0x1d, 0x4200}, {&(0x7f0000012700)="20000000d4c49a2e07", 0x9, 0x4280}], 0x0, &(0x7f0000013a00)) [ 691.063271] EXT4-fs (loop5): corrupt root inode, run e2fsck 19:27:23 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)=ANY=[@ANYBLOB="300000001000070100dd2174ffff27de00000000", @ANYRES32=0x0, @ANYBLOB="000000000000000ddc001b00000000000500100005"], 0x30}}, 0x0) [ 691.115206] EXT4-fs (loop5): mount failed 19:27:23 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xdb020000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="02000000030000000400000030000f000300040000000000000000000f008ec4", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000e1f4655fe2f4655fe2f4655f000000000000040008", 0x1d, 0x4200}, {&(0x7f0000012700)="20000000d4c49a2e07", 0x9, 0x4280}], 0x0, &(0x7f0000013a00)) 19:27:23 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)=ANY=[@ANYBLOB="300000001000070100dd2174ffff27de00000000", @ANYRES32=0x0, @ANYBLOB="000000000000000be8001b00000000000500100005"], 0x30}}, 0x0) 19:27:23 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xdb030000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="02000000030000000400000030000f000300040000000000000000000f008ec4", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000e1f4655fe2f4655fe2f4655f000000000000040008", 0x1d, 0x4200}, {&(0x7f0000012700)="20000000d4c49a2e07", 0x9, 0x4280}], 0x0, &(0x7f0000013a00)) 19:27:23 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)=ANY=[@ANYBLOB="300000001000070100dd2174ffff27de00000000", @ANYRES32=0x0, @ANYBLOB="000000000000000bec001b00000000000500100005"], 0x30}}, 0x0) [ 691.304937] FAULT_INJECTION: forcing a failure. [ 691.304937] name failslab, interval 1, probability 0, space 0, times 0 [ 691.346772] CPU: 1 PID: 18122 Comm: syz-executor.2 Not tainted 4.19.167-syzkaller #0 [ 691.354692] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 691.364050] Call Trace: [ 691.366649] dump_stack+0x1fc/0x2fe [ 691.370291] should_fail.cold+0xa/0x14 [ 691.374188] ? setup_fault_attr+0x200/0x200 [ 691.378515] ? lock_acquire+0x170/0x3c0 [ 691.382503] __should_failslab+0x115/0x180 [ 691.386743] should_failslab+0x5/0xf [ 691.390461] kmem_cache_alloc_node_trace+0x244/0x3b0 [ 691.395571] blk_throtl_init+0x7c/0x620 [ 691.399558] ? blk_iolatency_init+0x1b7/0x2d0 [ 691.404050] blkcg_init_queue+0x1e3/0x540 [ 691.408183] blk_alloc_queue_node+0x7b6/0xbd0 [ 691.412664] blk_mq_init_queue+0x44/0xa0 [ 691.416709] loop_add+0x2cb/0x8a0 [ 691.420147] loop_control_ioctl+0x16c/0x480 [ 691.424452] ? loop_lookup+0x1d0/0x1d0 [ 691.428318] ? loop_lookup+0x1d0/0x1d0 [ 691.432189] ? loop_lookup+0x1d0/0x1d0 [ 691.436057] do_vfs_ioctl+0xcdb/0x12e0 [ 691.439929] ? lock_downgrade+0x720/0x720 [ 691.444058] ? ioctl_preallocate+0x200/0x200 [ 691.448487] ? __fget+0x33e/0x510 [ 691.451929] ? __fget+0x356/0x510 [ 691.455367] ? do_dup2+0x450/0x450 [ 691.458886] ? vfs_write+0x393/0x540 [ 691.462601] ? fput+0x2b/0x190 [ 691.465789] ksys_ioctl+0x9b/0xc0 [ 691.469226] __x64_sys_ioctl+0x6f/0xb0 [ 691.473133] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 691.477703] do_syscall_64+0xf9/0x620 [ 691.481488] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 691.486656] RIP: 0033:0x45e219 [ 691.489831] Code: 0d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 691.508967] RSP: 002b:00007f1b82cf6c68 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 691.516662] RAX: ffffffffffffffda RBX: 0000000000000009 RCX: 000000000045e219 [ 691.523973] RDX: 0000000000000000 RSI: 0000000000004c80 RDI: 0000000000000007 [ 691.531227] RBP: 00007f1b82cf6ca0 R08: 0000000000000000 R09: 0000000000000000 [ 691.538611] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000019 [ 691.545866] R13: 00007ffca1b4a27f R14: 00007f1b82cf79c0 R15: 000000000119c0dc [ 691.658743] EXT4-fs (loop5): corrupt root inode, run e2fsck [ 691.664782] EXT4-fs (loop5): mount failed 19:27:23 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xa8000000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="02000000030000000400000030000f000300040000000000000000000f008ec4", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000e1f4655fe2f4655fe2f4655f00000000000004", 0x1b, 0x4200}, {&(0x7f0000012700)="20000000d4c49a2e07", 0x9, 0x4280}], 0x0, &(0x7f0000013a00)) 19:27:23 executing program 3: set_mempolicy(0x2, &(0x7f0000000000)=0x9, 0x90) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x4c032, 0xffffffffffffffff, 0xa400000000000000) 19:27:23 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xdc000000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="02000000030000000400000030000f000300040000000000000000000f008ec4", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000e1f4655fe2f4655fe2f4655f000000000000040008", 0x1d, 0x4200}, {&(0x7f0000012700)="20000000d4c49a2e07", 0x9, 0x4280}], 0x0, &(0x7f0000013a00)) 19:27:23 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)=ANY=[@ANYBLOB="300000001000070100dd2174ffff27de00000000", @ANYRES32=0x0, @ANYBLOB="0000000000000008f0001b00000000000500100005"], 0x30}}, 0x0) 19:27:23 executing program 2 (fault-call:13 fault-nth:26): perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0xb6, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8020}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x0, 0x0) r3 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000180)='/dev/hwrng\x00', 0x0, 0x0) read$FUSE(r3, &(0x7f0000000700), 0xfce3) ioctl$BLKPG(r3, 0x1269, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0}) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) socket(0x1d, 0x80000, 0x1) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000540)=0x14) r5 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r5, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000280)=ANY=[@ANYBLOB="3000000024000b0f00"/20, @ANYRES32=r4, @ANYBLOB="ff00000000000000000000e4070001007069650004700200df329e91a7001df00e69c06a95499c88a548ce06aac2a1ea1277d7eef90367edad25e73c20eda73114b9fd2461b6b35fb5262900ff9e"], 0x30}}, 0x0) [ 691.700468] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue 19:27:23 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xcf020000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="02000000030000000400000030000f000300040000000000000000000f008ec4", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000e1f4655fe2f4655fe2f4655f000000000000040008", 0x1d, 0x4200}, {&(0x7f0000012700)="20000000d4c49a2e07", 0x9, 0x4280}], 0x0, &(0x7f0000013a00)) 19:27:23 executing program 3: set_mempolicy(0x2, &(0x7f0000000000)=0x9, 0x90) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x4c032, 0xffffffffffffffff, 0xa401000000000000) 19:27:23 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)=ANY=[@ANYBLOB="300000001000070100dd2174ffff27de00000000", @ANYRES32=0x0, @ANYBLOB="000000000000000bf0001b00000000000500100005"], 0x30}}, 0x0) 19:27:23 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xdc010000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="02000000030000000400000030000f000300040000000000000000000f008ec4", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000e1f4655fe2f4655fe2f4655f000000000000040008", 0x1d, 0x4200}, {&(0x7f0000012700)="20000000d4c49a2e07", 0x9, 0x4280}], 0x0, &(0x7f0000013a00)) [ 691.836949] EXT4-fs (loop5): corrupt root inode, run e2fsck [ 691.862046] EXT4-fs (loop5): mount failed [ 691.980606] FAULT_INJECTION: forcing a failure. [ 691.980606] name failslab, interval 1, probability 0, space 0, times 0 [ 691.991837] CPU: 1 PID: 18169 Comm: syz-executor.2 Not tainted 4.19.167-syzkaller #0 [ 691.999836] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 692.009208] Call Trace: [ 692.011811] dump_stack+0x1fc/0x2fe [ 692.015468] should_fail.cold+0xa/0x14 [ 692.019368] ? setup_fault_attr+0x200/0x200 [ 692.023698] ? check_preemption_disabled+0x41/0x280 19:27:24 executing program 3: set_mempolicy(0x2, &(0x7f0000000000)=0x9, 0x90) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x4c032, 0xffffffffffffffff, 0xa500000000000000) 19:27:24 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xdc020000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="02000000030000000400000030000f000300040000000000000000000f008ec4", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000e1f4655fe2f4655fe2f4655f000000000000040008", 0x1d, 0x4200}, {&(0x7f0000012700)="20000000d4c49a2e07", 0x9, 0x4280}], 0x0, &(0x7f0000013a00)) 19:27:24 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)=ANY=[@ANYBLOB="300000001000070100dd2174ffff27de00000000", @ANYRES32=0x0, @ANYBLOB="0000000000000008f4001b00000000000500100005"], 0x30}}, 0x0) [ 692.028728] __should_failslab+0x115/0x180 [ 692.032969] should_failslab+0x5/0xf [ 692.036692] kmem_cache_alloc_node_trace+0x57/0x3b0 [ 692.041724] throtl_pd_alloc+0x6b/0x940 [ 692.045707] ? throtl_add_bio_tg+0x1f0/0x1f0 [ 692.050119] blkcg_activate_policy+0x249/0x5d0 [ 692.054720] blk_throtl_init+0x40d/0x620 [ 692.058791] blkcg_init_queue+0x1e3/0x540 [ 692.062953] blk_alloc_queue_node+0x7b6/0xbd0 [ 692.067459] ? blk_alloc_queue_node+0x2/0xbd0 [ 692.071992] blk_mq_init_queue+0x44/0xa0 [ 692.076062] loop_add+0x2cb/0x8a0 [ 692.079528] loop_control_ioctl+0x16c/0x480 [ 692.083867] ? loop_lookup+0x1d0/0x1d0 [ 692.087758] ? loop_lookup+0x1d0/0x1d0 [ 692.091655] ? loop_lookup+0x1d0/0x1d0 [ 692.095549] do_vfs_ioctl+0xcdb/0x12e0 [ 692.099440] ? lock_downgrade+0x720/0x720 [ 692.103594] ? check_preemption_disabled+0x41/0x280 [ 692.108608] ? ioctl_preallocate+0x200/0x200 [ 692.113023] ? __fget+0x356/0x510 [ 692.116484] ? do_dup2+0x450/0x450 [ 692.120028] ? rcu_nmi_exit+0xb3/0x180 [ 692.123909] ksys_ioctl+0x9b/0xc0 [ 692.127346] __x64_sys_ioctl+0x6f/0xb0 [ 692.131234] do_syscall_64+0xf9/0x620 [ 692.135068] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 692.140264] RIP: 0033:0x45e219 [ 692.143450] Code: 0d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 692.162447] RSP: 002b:00007f1b82d17c68 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 692.170159] RAX: ffffffffffffffda RBX: 0000000000000009 RCX: 000000000045e219 [ 692.177419] RDX: 0000000000000000 RSI: 0000000000004c80 RDI: 0000000000000007 [ 692.184671] RBP: 00007f1b82d17ca0 R08: 0000000000000000 R09: 0000000000000000 [ 692.191932] R10: 0000000000000000 R11: 0000000000000246 R12: 000000000000001a [ 692.199195] R13: 00007ffca1b4a27f R14: 00007f1b82d189c0 R15: 000000000119c034 [ 692.521784] EXT4-fs (loop5): corrupt root inode, run e2fsck [ 692.533678] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue [ 692.549088] EXT4-fs (loop5): mount failed 19:27:24 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xdc030000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="02000000030000000400000030000f000300040000000000000000000f008ec4", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000e1f4655fe2f4655fe2f4655f000000000000040008", 0x1d, 0x4200}, {&(0x7f0000012700)="20000000d4c49a2e07", 0x9, 0x4280}], 0x0, &(0x7f0000013a00)) 19:27:24 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)=ANY=[@ANYBLOB="300000001000070100dd2174ffff27de00000000", @ANYRES32=0x0, @ANYBLOB="000000000000000bf4001b00000000000500100005"], 0x30}}, 0x0) 19:27:24 executing program 2 (fault-call:13 fault-nth:27): perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0xb6, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8020}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x0, 0x0) r3 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000180)='/dev/hwrng\x00', 0x0, 0x0) read$FUSE(r3, &(0x7f0000000700), 0xfce3) ioctl$BLKPG(r3, 0x1269, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0}) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) socket(0x1d, 0x80000, 0x1) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000540)=0x14) r5 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r5, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000280)=ANY=[@ANYBLOB="3000000024000b0f00"/20, @ANYRES32=r4, @ANYBLOB="ff00000000000000000000e4070001007069650004700200df329e91a7001df00e69c06a95499c88a548ce06aac2a1ea1277d7eef90367edad25e73c20eda73114b9fd2461b6b35fb5262900ff9e"], 0x30}}, 0x0) 19:27:24 executing program 3: set_mempolicy(0x2, &(0x7f0000000000)=0x9, 0x90) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x4c032, 0xffffffffffffffff, 0xa501000000000000) 19:27:24 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xa8010000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="02000000030000000400000030000f000300040000000000000000000f008ec4", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000e1f4655fe2f4655fe2f4655f00000000000004", 0x1b, 0x4200}, {&(0x7f0000012700)="20000000d4c49a2e07", 0x9, 0x4280}], 0x0, &(0x7f0000013a00)) 19:27:24 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xcf030000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="02000000030000000400000030000f000300040000000000000000000f008ec4", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000e1f4655fe2f4655fe2f4655f000000000000040008", 0x1d, 0x4200}, {&(0x7f0000012700)="20000000d4c49a2e07", 0x9, 0x4280}], 0x0, &(0x7f0000013a00)) 19:27:24 executing program 3: set_mempolicy(0x2, &(0x7f0000000000)=0x9, 0x90) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x4c032, 0xffffffffffffffff, 0xa600000000000000) 19:27:24 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)=ANY=[@ANYBLOB="300000001000070100dd2174ffff27de00000000", @ANYRES32=0x0, @ANYBLOB="000000000000000bf8001b00000000000500100005"], 0x30}}, 0x0) 19:27:24 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xdd000000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="02000000030000000400000030000f000300040000000000000000000f008ec4", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000e1f4655fe2f4655fe2f4655f000000000000040008", 0x1d, 0x4200}, {&(0x7f0000012700)="20000000d4c49a2e07", 0x9, 0x4280}], 0x0, &(0x7f0000013a00)) 19:27:24 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)=ANY=[@ANYBLOB="300000001000070100dd2174ffff27de00000000", @ANYRES32=0x0, @ANYBLOB="0000000000000008fc001b00000000000500100005"], 0x30}}, 0x0) 19:27:24 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xdd010000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="02000000030000000400000030000f000300040000000000000000000f008ec4", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000e1f4655fe2f4655fe2f4655f000000000000040008", 0x1d, 0x4200}, {&(0x7f0000012700)="20000000d4c49a2e07", 0x9, 0x4280}], 0x0, &(0x7f0000013a00)) 19:27:24 executing program 3: set_mempolicy(0x2, &(0x7f0000000000)=0x9, 0x90) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x4c032, 0xffffffffffffffff, 0xa601000000000000) 19:27:24 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)=ANY=[@ANYBLOB="300000001000070100dd2174ffff27de00000000", @ANYRES32=0x0, @ANYBLOB="000000000000000bfc001b00000000000500100005"], 0x30}}, 0x0) 19:27:25 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xdd020000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="02000000030000000400000030000f000300040000000000000000000f008ec4", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000e1f4655fe2f4655fe2f4655f000000000000040008", 0x1d, 0x4200}, {&(0x7f0000012700)="20000000d4c49a2e07", 0x9, 0x4280}], 0x0, &(0x7f0000013a00)) [ 693.030867] FAULT_INJECTION: forcing a failure. [ 693.030867] name failslab, interval 1, probability 0, space 0, times 0 [ 693.054623] CPU: 0 PID: 18210 Comm: syz-executor.2 Not tainted 4.19.167-syzkaller #0 [ 693.062557] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 693.071912] Call Trace: [ 693.074495] dump_stack+0x1fc/0x2fe [ 693.078111] should_fail.cold+0xa/0x14 [ 693.081984] ? setup_fault_attr+0x200/0x200 [ 693.086286] ? lock_acquire+0x170/0x3c0 [ 693.090245] __should_failslab+0x115/0x180 [ 693.094465] should_failslab+0x5/0xf [ 693.098162] kmem_cache_alloc_trace+0x284/0x380 [ 693.102821] ? blk_mq_hctx_mark_pending+0x1f0/0x1f0 [ 693.107838] ? plug_ctx_cmp+0x100/0x100 [ 693.111818] blk_stat_alloc_callback+0x54/0x290 [ 693.116506] blk_mq_init_allocated_queue+0x80/0x1300 [ 693.121727] ? blkcg_init_queue+0x1fd/0x540 [ 693.126048] ? blk_alloc_queue_node+0x7ca/0xbd0 [ 693.130729] blk_mq_init_queue+0x5c/0xa0 [ 693.134778] loop_add+0x2cb/0x8a0 [ 693.138225] loop_control_ioctl+0x16c/0x480 [ 693.142532] ? loop_lookup+0x1d0/0x1d0 [ 693.146417] ? ksys_write+0x241/0x2a0 [ 693.150215] ? loop_lookup+0x1d0/0x1d0 [ 693.154102] do_vfs_ioctl+0xcdb/0x12e0 [ 693.157977] ? lock_downgrade+0x720/0x720 [ 693.162105] ? check_preemption_disabled+0x41/0x280 [ 693.167106] ? ioctl_preallocate+0x200/0x200 [ 693.171519] ? __fget+0x356/0x510 [ 693.174958] ? do_dup2+0x450/0x450 [ 693.178479] ? vfs_write+0x393/0x540 [ 693.182180] ? fput+0x2b/0x190 [ 693.185359] ksys_ioctl+0x9b/0xc0 [ 693.188796] __x64_sys_ioctl+0x6f/0xb0 [ 693.192668] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 693.197251] do_syscall_64+0xf9/0x620 [ 693.201036] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 693.206206] RIP: 0033:0x45e219 [ 693.209395] Code: 0d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 693.228281] RSP: 002b:00007f1b82d38c68 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 693.235988] RAX: ffffffffffffffda RBX: 0000000000000009 RCX: 000000000045e219 [ 693.243244] RDX: 0000000000000000 RSI: 0000000000004c80 RDI: 0000000000000007 [ 693.250496] RBP: 00007f1b82d38ca0 R08: 0000000000000000 R09: 0000000000000000 [ 693.257749] R10: 0000000000000000 R11: 0000000000000246 R12: 000000000000001b [ 693.265005] R13: 00007ffca1b4a27f R14: 00007f1b82d399c0 R15: 000000000119bf8c [ 693.302855] EXT4-fs (loop5): corrupt root inode, run e2fsck [ 693.308787] EXT4-fs (loop5): mount failed [ 693.317496] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue 19:27:25 executing program 2 (fault-call:13 fault-nth:28): perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0xb6, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8020}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x0, 0x0) r3 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000180)='/dev/hwrng\x00', 0x0, 0x0) read$FUSE(r3, &(0x7f0000000700), 0xfce3) ioctl$BLKPG(r3, 0x1269, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0}) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) socket(0x1d, 0x80000, 0x1) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000540)=0x14) r5 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r5, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000280)=ANY=[@ANYBLOB="3000000024000b0f00"/20, @ANYRES32=r4, @ANYBLOB="ff00000000000000000000e4070001007069650004700200df329e91a7001df00e69c06a95499c88a548ce06aac2a1ea1277d7eef90367edad25e73c20eda73114b9fd2461b6b35fb5262900ff9e"], 0x30}}, 0x0) 19:27:25 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)=ANY=[@ANYBLOB="300000001000070100dd2174ffff27de00000000", @ANYRES32=0x0, @ANYBLOB="000000000000000002001b00000000000500100005"], 0x30}}, 0x0) 19:27:25 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xdd030000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="02000000030000000400000030000f000300040000000000000000000f008ec4", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000e1f4655fe2f4655fe2f4655f000000000000040008", 0x1d, 0x4200}, {&(0x7f0000012700)="20000000d4c49a2e07", 0x9, 0x4280}], 0x0, &(0x7f0000013a00)) 19:27:25 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xa8020000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="02000000030000000400000030000f000300040000000000000000000f008ec4", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000e1f4655fe2f4655fe2f4655f00000000000004", 0x1b, 0x4200}, {&(0x7f0000012700)="20000000d4c49a2e07", 0x9, 0x4280}], 0x0, &(0x7f0000013a00)) 19:27:25 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xd0000000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="02000000030000000400000030000f000300040000000000000000000f008ec4", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000e1f4655fe2f4655fe2f4655f000000000000040008", 0x1d, 0x4200}, {&(0x7f0000012700)="20000000d4c49a2e07", 0x9, 0x4280}], 0x0, &(0x7f0000013a00)) 19:27:25 executing program 3: set_mempolicy(0x2, &(0x7f0000000000)=0x9, 0x90) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x4c032, 0xffffffffffffffff, 0xa700000000000000) 19:27:25 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)=ANY=[@ANYBLOB="300000001000070100dd2174ffff27de00000000", @ANYRES32=0x0, @ANYBLOB="000000000000000003001b00000000000500100005"], 0x30}}, 0x0) 19:27:25 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xde000000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="02000000030000000400000030000f000300040000000000000000000f008ec4", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000e1f4655fe2f4655fe2f4655f000000000000040008", 0x1d, 0x4200}, {&(0x7f0000012700)="20000000d4c49a2e07", 0x9, 0x4280}], 0x0, &(0x7f0000013a00)) 19:27:25 executing program 3: set_mempolicy(0x2, &(0x7f0000000000)=0x9, 0x90) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x4c032, 0xffffffffffffffff, 0xa701000000000000) [ 693.532738] EXT4-fs (loop5): corrupt root inode, run e2fsck [ 693.558452] EXT4-fs (loop5): mount failed [ 693.562141] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue 19:27:25 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xde010000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="02000000030000000400000030000f000300040000000000000000000f008ec4", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000e1f4655fe2f4655fe2f4655f000000000000040008", 0x1d, 0x4200}, {&(0x7f0000012700)="20000000d4c49a2e07", 0x9, 0x4280}], 0x0, &(0x7f0000013a00)) [ 693.616686] nla_parse: 17 callbacks suppressed [ 693.616695] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.0'. [ 693.635404] FAULT_INJECTION: forcing a failure. [ 693.635404] name failslab, interval 1, probability 0, space 0, times 0 [ 693.681117] CPU: 1 PID: 18269 Comm: syz-executor.2 Not tainted 4.19.167-syzkaller #0 [ 693.689042] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 693.698406] Call Trace: [ 693.701014] dump_stack+0x1fc/0x2fe [ 693.704658] should_fail.cold+0xa/0x14 [ 693.708563] ? setup_fault_attr+0x200/0x200 [ 693.712914] ? lock_acquire+0x170/0x3c0 [ 693.716948] __should_failslab+0x115/0x180 [ 693.721195] should_failslab+0x5/0xf [ 693.724915] __kmalloc+0x2ab/0x3c0 19:27:25 executing program 3: set_mempolicy(0x2, &(0x7f0000000000)=0x9, 0x90) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x4c032, 0xffffffffffffffff, 0xa800000000000000) 19:27:25 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xde020000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="02000000030000000400000030000f000300040000000000000000000f008ec4", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000e1f4655fe2f4655fe2f4655f000000000000040008", 0x1d, 0x4200}, {&(0x7f0000012700)="20000000d4c49a2e07", 0x9, 0x4280}], 0x0, &(0x7f0000013a00)) [ 693.728465] ? blk_stat_alloc_callback+0x81/0x290 [ 693.733356] ? blk_mq_hctx_mark_pending+0x1f0/0x1f0 [ 693.738383] ? plug_ctx_cmp+0x100/0x100 [ 693.742401] blk_stat_alloc_callback+0x81/0x290 [ 693.747087] blk_mq_init_allocated_queue+0x80/0x1300 [ 693.752209] ? blkcg_init_queue+0x1fd/0x540 [ 693.756540] ? blk_alloc_queue_node+0x7ca/0xbd0 [ 693.761219] blk_mq_init_queue+0x5c/0xa0 [ 693.765285] loop_add+0x2cb/0x8a0 [ 693.768736] loop_control_ioctl+0x16c/0x480 [ 693.773098] ? loop_lookup+0x1d0/0x1d0 [ 693.776996] ? loop_lookup+0x1d0/0x1d0 [ 693.780941] do_vfs_ioctl+0xcdb/0x12e0 [ 693.784825] ? lock_downgrade+0x720/0x720 [ 693.788958] ? ioctl_preallocate+0x200/0x200 [ 693.793385] ? __fget+0x356/0x510 [ 693.796822] ? do_dup2+0x450/0x450 [ 693.800353] ? vfs_write+0x393/0x540 [ 693.804057] ? fput+0x2b/0x190 [ 693.807237] ksys_ioctl+0x9b/0xc0 [ 693.810714] __x64_sys_ioctl+0x6f/0xb0 [ 693.814595] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 693.819179] do_syscall_64+0xf9/0x620 [ 693.822982] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 693.828174] RIP: 0033:0x45e219 [ 693.831359] Code: 0d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 693.850257] RSP: 002b:00007f1b82d17c68 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 693.857962] RAX: ffffffffffffffda RBX: 0000000000000009 RCX: 000000000045e219 [ 693.865226] RDX: 0000000000000000 RSI: 0000000000004c80 RDI: 0000000000000007 [ 693.872480] RBP: 00007f1b82d17ca0 R08: 0000000000000000 R09: 0000000000000000 [ 693.880008] R10: 0000000000000000 R11: 0000000000000246 R12: 000000000000001c [ 693.887277] R13: 00007ffca1b4a27f R14: 00007f1b82d189c0 R15: 000000000119c034 19:27:26 executing program 2 (fault-call:13 fault-nth:29): perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0xb6, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8020}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x0, 0x0) r3 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000180)='/dev/hwrng\x00', 0x0, 0x0) read$FUSE(r3, &(0x7f0000000700), 0xfce3) ioctl$BLKPG(r3, 0x1269, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0}) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) socket(0x1d, 0x80000, 0x1) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000540)=0x14) r5 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r5, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000280)=ANY=[@ANYBLOB="3000000024000b0f00"/20, @ANYRES32=r4, @ANYBLOB="ff00000000000000000000e4070001007069650004700200df329e91a7001df00e69c06a95499c88a548ce06aac2a1ea1277d7eef90367edad25e73c20eda73114b9fd2461b6b35fb5262900ff9e"], 0x30}}, 0x0) 19:27:26 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xde030000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="02000000030000000400000030000f000300040000000000000000000f008ec4", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000e1f4655fe2f4655fe2f4655f000000000000040008", 0x1d, 0x4200}, {&(0x7f0000012700)="20000000d4c49a2e07", 0x9, 0x4280}], 0x0, &(0x7f0000013a00)) 19:27:26 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)=ANY=[@ANYBLOB="300000001000070100dd2174ffff27de00000000", @ANYRES32=0x0, @ANYBLOB="000000000000000005001b00000000000500100005"], 0x30}}, 0x0) 19:27:26 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xd0010000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="02000000030000000400000030000f000300040000000000000000000f008ec4", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000e1f4655fe2f4655fe2f4655f000000000000040008", 0x1d, 0x4200}, {&(0x7f0000012700)="20000000d4c49a2e07", 0x9, 0x4280}], 0x0, &(0x7f0000013a00)) 19:27:26 executing program 3: set_mempolicy(0x2, &(0x7f0000000000)=0x9, 0x90) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x4c032, 0xffffffffffffffff, 0xa801000000000000) 19:27:26 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xa8030000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="02000000030000000400000030000f000300040000000000000000000f008ec4", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000e1f4655fe2f4655fe2f4655f00000000000004", 0x1b, 0x4200}, {&(0x7f0000012700)="20000000d4c49a2e07", 0x9, 0x4280}], 0x0, &(0x7f0000013a00)) [ 693.984902] EXT4-fs (loop5): corrupt root inode, run e2fsck [ 693.991103] EXT4-fs (loop5): mount failed 19:27:26 executing program 3: set_mempolicy(0x2, &(0x7f0000000000)=0x9, 0x90) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x4c032, 0xffffffffffffffff, 0xa900000000000000) 19:27:26 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)=ANY=[@ANYBLOB="300000001000070100dd2174ffff27de00000000", @ANYRES32=0x0, @ANYBLOB="000000000000000007001b00000000000500100005"], 0x30}}, 0x0) [ 694.055040] netlink: 'syz-executor.0': attribute type 27 has an invalid length. 19:27:26 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xdf000000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="02000000030000000400000030000f000300040000000000000000000f008ec4", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000e1f4655fe2f4655fe2f4655f000000000000040008", 0x1d, 0x4200}, {&(0x7f0000012700)="20000000d4c49a2e07", 0x9, 0x4280}], 0x0, &(0x7f0000013a00)) 19:27:26 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)=ANY=[@ANYBLOB="300000001000070100dd2174ffff27de00000000", @ANYRES32=0x0, @ANYBLOB="000000000000000010001b00000000000500100005"], 0x30}}, 0x0) [ 694.164556] netlink: 'syz-executor.0': attribute type 27 has an invalid length. [ 694.175153] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue [ 694.184588] EXT4-fs (loop5): corrupt root inode, run e2fsck [ 694.190836] EXT4-fs (loop5): mount failed 19:27:26 executing program 3: set_mempolicy(0x2, &(0x7f0000000000)=0x9, 0x90) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x4c032, 0xffffffffffffffff, 0xa901000000000000) 19:27:26 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xdf010000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="02000000030000000400000030000f000300040000000000000000000f008ec4", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000e1f4655fe2f4655fe2f4655f000000000000040008", 0x1d, 0x4200}, {&(0x7f0000012700)="20000000d4c49a2e07", 0x9, 0x4280}], 0x0, &(0x7f0000013a00)) [ 694.291716] EXT4-fs (loop5): corrupt root inode, run e2fsck [ 694.305581] EXT4-fs (loop5): mount failed [ 694.315503] FAULT_INJECTION: forcing a failure. [ 694.315503] name failslab, interval 1, probability 0, space 0, times 0 [ 694.348575] CPU: 0 PID: 18315 Comm: syz-executor.2 Not tainted 4.19.167-syzkaller #0 [ 694.356506] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 694.365873] Call Trace: [ 694.367513] netlink: 'syz-executor.0': attribute type 27 has an invalid length. [ 694.368470] dump_stack+0x1fc/0x2fe [ 694.368491] should_fail.cold+0xa/0x14 [ 694.368509] ? setup_fault_attr+0x200/0x200 [ 694.387792] __should_failslab+0x115/0x180 [ 694.392074] should_failslab+0x5/0xf [ 694.395922] kmem_cache_alloc_node_trace+0x244/0x3b0 [ 694.401044] __kmalloc_node+0x38/0x70 [ 694.404859] blk_mq_init_allocated_queue+0x178/0x1300 [ 694.410059] ? blkcg_init_queue+0x1fd/0x540 [ 694.414398] blk_mq_init_queue+0x5c/0xa0 [ 694.418473] loop_add+0x2cb/0x8a0 [ 694.421944] loop_control_ioctl+0x16c/0x480 [ 694.426279] ? loop_lookup+0x1d0/0x1d0 [ 694.430168] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 694.434742] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 694.439484] ? loop_lookup+0x1d0/0x1d0 [ 694.443354] do_vfs_ioctl+0xcdb/0x12e0 [ 694.447227] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 694.451966] ? ioctl_preallocate+0x200/0x200 [ 694.456360] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 694.460926] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 694.465705] ? rcu_nmi_exit+0xb3/0x180 [ 694.469579] ? retint_kernel+0x2d/0x2d [ 694.473456] ksys_ioctl+0x9b/0xc0 [ 694.476895] __x64_sys_ioctl+0x6f/0xb0 [ 694.480804] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 694.485372] do_syscall_64+0xf9/0x620 [ 694.489160] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 694.494367] RIP: 0033:0x45e219 [ 694.497546] Code: 0d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 694.516430] RSP: 002b:00007f1b82d17c68 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 694.524123] RAX: ffffffffffffffda RBX: 0000000000000009 RCX: 000000000045e219 [ 694.531394] RDX: 0000000000000000 RSI: 0000000000004c80 RDI: 0000000000000007 [ 694.538655] RBP: 00007f1b82d17ca0 R08: 0000000000000000 R09: 0000000000000000 [ 694.545910] R10: 0000000000000000 R11: 0000000000000246 R12: 000000000000001d [ 694.553162] R13: 00007ffca1b4a27f R14: 00007f1b82d189c0 R15: 000000000119c034 19:27:26 executing program 2 (fault-call:13 fault-nth:30): perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0xb6, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8020}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x0, 0x0) r3 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000180)='/dev/hwrng\x00', 0x0, 0x0) read$FUSE(r3, &(0x7f0000000700), 0xfce3) ioctl$BLKPG(r3, 0x1269, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0}) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) socket(0x1d, 0x80000, 0x1) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000540)=0x14) r5 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r5, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000280)=ANY=[@ANYBLOB="3000000024000b0f00"/20, @ANYRES32=r4, @ANYBLOB="ff00000000000000000000e4070001007069650004700200df329e91a7001df00e69c06a95499c88a548ce06aac2a1ea1277d7eef90367edad25e73c20eda73114b9fd2461b6b35fb5262900ff9e"], 0x30}}, 0x0) 19:27:26 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xd0020000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="02000000030000000400000030000f000300040000000000000000000f008ec4", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000e1f4655fe2f4655fe2f4655f000000000000040008", 0x1d, 0x4200}, {&(0x7f0000012700)="20000000d4c49a2e07", 0x9, 0x4280}], 0x0, &(0x7f0000013a00)) 19:27:26 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)=ANY=[@ANYBLOB="300000001000070100dd2174ffff27de00000000", @ANYRES32=0x0, @ANYBLOB="000000000000000025001b00000000000500100005"], 0x30}}, 0x0) 19:27:26 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xdf020000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="02000000030000000400000030000f000300040000000000000000000f008ec4", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000e1f4655fe2f4655fe2f4655f000000000000040008", 0x1d, 0x4200}, {&(0x7f0000012700)="20000000d4c49a2e07", 0x9, 0x4280}], 0x0, &(0x7f0000013a00)) 19:27:26 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xa9000000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="02000000030000000400000030000f000300040000000000000000000f008ec4", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000e1f4655fe2f4655fe2f4655f00000000000004", 0x1b, 0x4200}, {&(0x7f0000012700)="20000000d4c49a2e07", 0x9, 0x4280}], 0x0, &(0x7f0000013a00)) 19:27:26 executing program 3: set_mempolicy(0x2, &(0x7f0000000000)=0x9, 0x90) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x4c032, 0xffffffffffffffff, 0xaa00000000000000) 19:27:26 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xdf030000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="02000000030000000400000030000f000300040000000000000000000f008ec4", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000e1f4655fe2f4655fe2f4655f000000000000040008", 0x1d, 0x4200}, {&(0x7f0000012700)="20000000d4c49a2e07", 0x9, 0x4280}], 0x0, &(0x7f0000013a00)) [ 694.730741] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue [ 694.768458] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.0'. 19:27:26 executing program 3: set_mempolicy(0x2, &(0x7f0000000000)=0x9, 0x90) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x4c032, 0xffffffffffffffff, 0xaa01000000000000) 19:27:26 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xd0030000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="02000000030000000400000030000f000300040000000000000000000f008ec4", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000e1f4655fe2f4655fe2f4655f000000000000040008", 0x1d, 0x4200}, {&(0x7f0000012700)="20000000d4c49a2e07", 0x9, 0x4280}], 0x0, &(0x7f0000013a00)) 19:27:26 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)=ANY=[@ANYBLOB="300000001000070100dd2174ffff27de00000000", @ANYRES32=0x0, @ANYBLOB="0000000000000000f0081b00000000000500100005"], 0x30}}, 0x0) [ 694.841765] EXT4-fs (loop5): corrupt root inode, run e2fsck [ 694.871552] EXT4-fs (loop5): mount failed 19:27:26 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xe0000000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="02000000030000000400000030000f000300040000000000000000000f008ec4", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000e1f4655fe2f4655fe2f4655f000000000000040008", 0x1d, 0x4200}, {&(0x7f0000012700)="20000000d4c49a2e07", 0x9, 0x4280}], 0x0, &(0x7f0000013a00)) [ 694.938629] FAULT_INJECTION: forcing a failure. [ 694.938629] name failslab, interval 1, probability 0, space 0, times 0 [ 694.975508] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.0'. 19:27:27 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)=ANY=[@ANYBLOB="300000001000070100dd2174ffff27de00000000", @ANYRES32=0x0, @ANYBLOB="0000000000000000f4081b00000000000500100005"], 0x30}}, 0x0) [ 694.987254] CPU: 1 PID: 18353 Comm: syz-executor.2 Not tainted 4.19.167-syzkaller #0 [ 694.995148] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 695.004503] Call Trace: [ 695.007100] dump_stack+0x1fc/0x2fe [ 695.010744] should_fail.cold+0xa/0x14 [ 695.014637] ? setup_fault_attr+0x200/0x200 [ 695.018967] ? __mutex_add_waiter+0x160/0x160 [ 695.023480] __should_failslab+0x115/0x180 [ 695.027735] should_failslab+0x5/0xf [ 695.031458] kmem_cache_alloc_node_trace+0x244/0x3b0 [ 695.036578] __kmalloc_node+0x38/0x70 [ 695.040394] blk_mq_realloc_hw_ctxs+0x1d8/0x1000 [ 695.045164] ? kmem_cache_alloc_node_trace+0x351/0x3b0 [ 695.050506] blk_mq_init_allocated_queue+0x20c/0x1300 [ 695.055712] ? blkcg_init_queue+0x1fd/0x540 [ 695.060058] blk_mq_init_queue+0x5c/0xa0 [ 695.064130] loop_add+0x2cb/0x8a0 [ 695.067593] loop_control_ioctl+0x16c/0x480 [ 695.068485] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.0'. [ 695.072012] ? loop_lookup+0x1d0/0x1d0 [ 695.072068] ? lock_release+0x429/0x8b0 [ 695.072081] ? loop_lookup+0x1d0/0x1d0 [ 695.072097] do_vfs_ioctl+0xcdb/0x12e0 [ 695.072111] ? lock_downgrade+0x720/0x720 [ 695.072123] ? check_preemption_disabled+0x41/0x280 [ 695.072139] ? ioctl_preallocate+0x200/0x200 [ 695.109972] ? __fget+0x356/0x510 [ 695.113446] ? do_dup2+0x450/0x450 [ 695.117002] ? vfs_write+0x393/0x540 [ 695.120764] ? fput+0x2b/0x190 [ 695.123980] ksys_ioctl+0x9b/0xc0 [ 695.127437] __x64_sys_ioctl+0x6f/0xb0 [ 695.131322] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 695.136758] do_syscall_64+0xf9/0x620 [ 695.140561] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 695.145752] RIP: 0033:0x45e219 [ 695.149023] Code: 0d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 695.168017] RSP: 002b:00007f1b82d17c68 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 695.175734] RAX: ffffffffffffffda RBX: 0000000000000009 RCX: 000000000045e219 [ 695.183004] RDX: 0000000000000000 RSI: 0000000000004c80 RDI: 0000000000000007 [ 695.190270] RBP: 00007f1b82d17ca0 R08: 0000000000000000 R09: 0000000000000000 [ 695.197670] R10: 0000000000000000 R11: 0000000000000246 R12: 000000000000001e [ 695.204940] R13: 00007ffca1b4a27f R14: 00007f1b82d189c0 R15: 000000000119c034 19:27:27 executing program 2 (fault-call:13 fault-nth:31): perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0xb6, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8020}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x0, 0x0) r3 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000180)='/dev/hwrng\x00', 0x0, 0x0) read$FUSE(r3, &(0x7f0000000700), 0xfce3) ioctl$BLKPG(r3, 0x1269, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0}) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) socket(0x1d, 0x80000, 0x1) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000540)=0x14) r5 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r5, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000280)=ANY=[@ANYBLOB="3000000024000b0f00"/20, @ANYRES32=r4, @ANYBLOB="ff00000000000000000000e4070001007069650004700200df329e91a7001df00e69c06a95499c88a548ce06aac2a1ea1277d7eef90367edad25e73c20eda73114b9fd2461b6b35fb5262900ff9e"], 0x30}}, 0x0) 19:27:27 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)=ANY=[@ANYBLOB="300000001000070100dd2174ffff27de00000000", @ANYRES32=0x0, @ANYBLOB="0000000000000000fc081b00000000000500100005"], 0x30}}, 0x0) 19:27:27 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xe0010000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="02000000030000000400000030000f000300040000000000000000000f008ec4", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000e1f4655fe2f4655fe2f4655f000000000000040008", 0x1d, 0x4200}, {&(0x7f0000012700)="20000000d4c49a2e07", 0x9, 0x4280}], 0x0, &(0x7f0000013a00)) 19:27:27 executing program 3: set_mempolicy(0x2, &(0x7f0000000000)=0x9, 0x90) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x4c032, 0xffffffffffffffff, 0xab00000000000000) [ 695.250962] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue [ 695.332419] EXT4-fs: failed to create workqueue [ 695.337343] EXT4-fs (loop5): mount failed [ 695.368640] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.0'. 19:27:27 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xa9010000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="02000000030000000400000030000f000300040000000000000000000f008ec4", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000e1f4655fe2f4655fe2f4655f00000000000004", 0x1b, 0x4200}, {&(0x7f0000012700)="20000000d4c49a2e07", 0x9, 0x4280}], 0x0, &(0x7f0000013a00)) 19:27:27 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xd1000000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="02000000030000000400000030000f000300040000000000000000000f008ec4", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000e1f4655fe2f4655fe2f4655f000000000000040008", 0x1d, 0x4200}, {&(0x7f0000012700)="20000000d4c49a2e07", 0x9, 0x4280}], 0x0, &(0x7f0000013a00)) 19:27:27 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xe0020000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="02000000030000000400000030000f000300040000000000000000000f008ec4", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000e1f4655fe2f4655fe2f4655f000000000000040008", 0x1d, 0x4200}, {&(0x7f0000012700)="20000000d4c49a2e07", 0x9, 0x4280}], 0x0, &(0x7f0000013a00)) 19:27:27 executing program 3: set_mempolicy(0x2, &(0x7f0000000000)=0x9, 0x90) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x4c032, 0xffffffffffffffff, 0xab01000000000000) 19:27:27 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)=ANY=[@ANYBLOB="300000001000070100dd2174ffff27de00000000", @ANYRES32=0x0, @ANYBLOB="000000000000000000091b00000000000500100005"], 0x30}}, 0x0) [ 695.502767] FAULT_INJECTION: forcing a failure. [ 695.502767] name failslab, interval 1, probability 0, space 0, times 0 [ 695.539194] CPU: 0 PID: 18388 Comm: syz-executor.2 Not tainted 4.19.167-syzkaller #0 [ 695.546885] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.0'. [ 695.547117] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 695.547123] Call Trace: [ 695.547144] dump_stack+0x1fc/0x2fe [ 695.547164] should_fail.cold+0xa/0x14 [ 695.575364] ? setup_fault_attr+0x200/0x200 [ 695.579707] __should_failslab+0x115/0x180 [ 695.583958] should_failslab+0x5/0xf [ 695.587685] kmem_cache_alloc_node_trace+0x244/0x3b0 [ 695.592800] __kmalloc_node+0x38/0x70 [ 695.596614] blk_mq_realloc_hw_ctxs+0x568/0x1000 [ 695.601394] blk_mq_init_allocated_queue+0x20c/0x1300 [ 695.606577] ? blkcg_init_queue+0x1fd/0x540 [ 695.610891] blk_mq_init_queue+0x5c/0xa0 [ 695.614938] loop_add+0x2cb/0x8a0 [ 695.618377] loop_control_ioctl+0x16c/0x480 [ 695.622680] ? loop_lookup+0x1d0/0x1d0 [ 695.626601] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 695.631165] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 695.635905] ? rcu_nmi_exit+0xb3/0x180 [ 695.639787] ? loop_lookup+0x1d0/0x1d0 [ 695.643780] do_vfs_ioctl+0xcdb/0x12e0 [ 695.647664] ? lock_downgrade+0x720/0x720 [ 695.651797] ? check_preemption_disabled+0x41/0x280 [ 695.656804] ? ioctl_preallocate+0x200/0x200 [ 695.661245] ? __fget+0x356/0x510 [ 695.664682] ? do_dup2+0x450/0x450 [ 695.668230] ? rcu_nmi_exit+0xb3/0x180 [ 695.672124] ksys_ioctl+0x9b/0xc0 [ 695.675572] __x64_sys_ioctl+0x6f/0xb0 [ 695.679457] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 695.684037] do_syscall_64+0xf9/0x620 [ 695.687823] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 695.692996] RIP: 0033:0x45e219 [ 695.696181] Code: 0d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 695.715077] RSP: 002b:00007f1b82d17c68 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 695.722794] RAX: ffffffffffffffda RBX: 0000000000000009 RCX: 000000000045e219 [ 695.730045] RDX: 0000000000000000 RSI: 0000000000004c80 RDI: 0000000000000007 [ 695.737310] RBP: 00007f1b82d17ca0 R08: 0000000000000000 R09: 0000000000000000 [ 695.744575] R10: 0000000000000000 R11: 0000000000000246 R12: 000000000000001f [ 695.751841] R13: 00007ffca1b4a27f R14: 00007f1b82d189c0 R15: 000000000119c034 19:27:27 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xe0030000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="02000000030000000400000030000f000300040000000000000000000f008ec4", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000e1f4655fe2f4655fe2f4655f000000000000040008", 0x1d, 0x4200}, {&(0x7f0000012700)="20000000d4c49a2e07", 0x9, 0x4280}], 0x0, &(0x7f0000013a00)) 19:27:27 executing program 3: set_mempolicy(0x2, &(0x7f0000000000)=0x9, 0x90) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x4c032, 0xffffffffffffffff, 0xac00000000000000) 19:27:27 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)=ANY=[@ANYBLOB="300000001000070100dd2174ffff27de00000000", @ANYRES32=0x0, @ANYBLOB="000000000000000010091b00000000000500100005"], 0x30}}, 0x0) 19:27:27 executing program 2 (fault-call:13 fault-nth:32): perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0xb6, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8020}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x0, 0x0) r3 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000180)='/dev/hwrng\x00', 0x0, 0x0) read$FUSE(r3, &(0x7f0000000700), 0xfce3) ioctl$BLKPG(r3, 0x1269, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0}) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) socket(0x1d, 0x80000, 0x1) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000540)=0x14) r5 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r5, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000280)=ANY=[@ANYBLOB="3000000024000b0f00"/20, @ANYRES32=r4, @ANYBLOB="ff00000000000000000000e4070001007069650004700200df329e91a7001df00e69c06a95499c88a548ce06aac2a1ea1277d7eef90367edad25e73c20eda73114b9fd2461b6b35fb5262900ff9e"], 0x30}}, 0x0) 19:27:27 executing program 3: set_mempolicy(0x2, &(0x7f0000000000)=0x9, 0x90) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x4c032, 0xffffffffffffffff, 0xac01000000000000) 19:27:27 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xe1000000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="02000000030000000400000030000f000300040000000000000000000f008ec4", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000e1f4655fe2f4655fe2f4655f000000000000040008", 0x1d, 0x4200}, {&(0x7f0000012700)="20000000d4c49a2e07", 0x9, 0x4280}], 0x0, &(0x7f0000013a00)) [ 695.931244] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.0'. [ 695.959463] EXT4-fs (loop5): corrupt root inode, run e2fsck [ 695.966429] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue [ 695.976523] EXT4-fs (loop5): mount failed 19:27:28 executing program 3: set_mempolicy(0x2, &(0x7f0000000000)=0x9, 0x90) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x4c032, 0xffffffffffffffff, 0xad00000000000000) [ 696.075736] EXT4-fs (loop5): corrupt root inode, run e2fsck [ 696.085687] EXT4-fs (loop5): mount failed [ 696.200715] FAULT_INJECTION: forcing a failure. [ 696.200715] name failslab, interval 1, probability 0, space 0, times 0 [ 696.212295] CPU: 0 PID: 18426 Comm: syz-executor.2 Not tainted 4.19.167-syzkaller #0 [ 696.220174] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 696.229605] Call Trace: [ 696.232205] dump_stack+0x1fc/0x2fe [ 696.235878] should_fail.cold+0xa/0x14 [ 696.239763] ? setup_fault_attr+0x200/0x200 [ 696.244077] ? should_fail+0x142/0x7b0 [ 696.247952] __should_failslab+0x115/0x180 [ 696.252180] should_failslab+0x5/0xf [ 696.255881] kmem_cache_alloc_node_trace+0x244/0x3b0 [ 696.261074] __kmalloc_node+0x38/0x70 [ 696.264867] sbitmap_init_node+0x123/0x440 [ 696.269088] blk_mq_realloc_hw_ctxs+0x5db/0x1000 [ 696.273858] blk_mq_init_allocated_queue+0x20c/0x1300 [ 696.279032] ? blkcg_init_queue+0x1fd/0x540 [ 696.283365] blk_mq_init_queue+0x5c/0xa0 [ 696.287414] loop_add+0x2cb/0x8a0 [ 696.290870] loop_control_ioctl+0x16c/0x480 [ 696.295175] ? loop_lookup+0x1d0/0x1d0 [ 696.299046] ? finish_task_switch+0x118/0x760 [ 696.303522] ? _raw_spin_unlock_irq+0x24/0x80 [ 696.308014] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 696.312594] ? loop_lookup+0x1d0/0x1d0 [ 696.316507] do_vfs_ioctl+0xcdb/0x12e0 [ 696.320382] ? lock_downgrade+0x720/0x720 [ 696.324537] ? check_preemption_disabled+0x41/0x280 [ 696.329541] ? ioctl_preallocate+0x200/0x200 [ 696.333935] ? __fget+0x356/0x510 [ 696.337417] ? do_dup2+0x450/0x450 [ 696.340939] ? retint_kernel+0x2d/0x2d [ 696.344826] ksys_ioctl+0x9b/0xc0 [ 696.348310] __x64_sys_ioctl+0x6f/0xb0 [ 696.352200] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 696.356764] do_syscall_64+0xf9/0x620 [ 696.360587] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 696.365762] RIP: 0033:0x45e219 [ 696.368935] Code: 0d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 696.387818] RSP: 002b:00007f1b82d17c68 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 696.396056] RAX: ffffffffffffffda RBX: 0000000000000009 RCX: 000000000045e219 [ 696.403333] RDX: 0000000000000000 RSI: 0000000000004c80 RDI: 0000000000000007 [ 696.410595] RBP: 00007f1b82d17ca0 R08: 0000000000000000 R09: 0000000000000000 [ 696.417856] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000020 [ 696.425108] R13: 00007ffca1b4a27f R14: 00007f1b82d189c0 R15: 000000000119c034 19:27:28 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xa9020000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="02000000030000000400000030000f000300040000000000000000000f008ec4", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000e1f4655fe2f4655fe2f4655f00000000000004", 0x1b, 0x4200}, {&(0x7f0000012700)="20000000d4c49a2e07", 0x9, 0x4280}], 0x0, &(0x7f0000013a00)) 19:27:28 executing program 2 (fault-call:13 fault-nth:33): perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0xb6, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8020}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x0, 0x0) r3 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000180)='/dev/hwrng\x00', 0x0, 0x0) read$FUSE(r3, &(0x7f0000000700), 0xfce3) ioctl$BLKPG(r3, 0x1269, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0}) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) socket(0x1d, 0x80000, 0x1) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000540)=0x14) r5 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r5, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000280)=ANY=[@ANYBLOB="3000000024000b0f00"/20, @ANYRES32=r4, @ANYBLOB="ff00000000000000000000e4070001007069650004700200df329e91a7001df00e69c06a95499c88a548ce06aac2a1ea1277d7eef90367edad25e73c20eda73114b9fd2461b6b35fb5262900ff9e"], 0x30}}, 0x0) 19:27:28 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)=ANY=[@ANYBLOB="300000001000070100dd2174ffff27de00000000", @ANYRES32=0x0, @ANYBLOB="000000000000000028091b00000000000500100005"], 0x30}}, 0x0) 19:27:28 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xe1010000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="02000000030000000400000030000f000300040000000000000000000f008ec4", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000e1f4655fe2f4655fe2f4655f000000000000040008", 0x1d, 0x4200}, {&(0x7f0000012700)="20000000d4c49a2e07", 0x9, 0x4280}], 0x0, &(0x7f0000013a00)) 19:27:28 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xd1010000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="02000000030000000400000030000f000300040000000000000000000f008ec4", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000e1f4655fe2f4655fe2f4655f000000000000040008", 0x1d, 0x4200}, {&(0x7f0000012700)="20000000d4c49a2e07", 0x9, 0x4280}], 0x0, &(0x7f0000013a00)) 19:27:28 executing program 3: set_mempolicy(0x2, &(0x7f0000000000)=0x9, 0x90) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x4c032, 0xffffffffffffffff, 0xad01000000000000) 19:27:28 executing program 3: set_mempolicy(0x2, &(0x7f0000000000)=0x9, 0x90) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x4c032, 0xffffffffffffffff, 0xae00000000000000) [ 696.653981] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue [ 696.671850] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.0'. 19:27:28 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xe1020000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="02000000030000000400000030000f000300040000000000000000000f008ec4", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000e1f4655fe2f4655fe2f4655f000000000000040008", 0x1d, 0x4200}, {&(0x7f0000012700)="20000000d4c49a2e07", 0x9, 0x4280}], 0x0, &(0x7f0000013a00)) 19:27:28 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xd1020000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="02000000030000000400000030000f000300040000000000000000000f008ec4", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000e1f4655fe2f4655fe2f4655f000000000000040008", 0x1d, 0x4200}, {&(0x7f0000012700)="20000000d4c49a2e07", 0x9, 0x4280}], 0x0, &(0x7f0000013a00)) [ 696.764269] EXT4-fs (loop5): corrupt root inode, run e2fsck [ 696.803867] EXT4-fs (loop5): mount failed [ 696.835766] FAULT_INJECTION: forcing a failure. [ 696.835766] name failslab, interval 1, probability 0, space 0, times 0 [ 696.898399] CPU: 1 PID: 18454 Comm: syz-executor.2 Not tainted 4.19.167-syzkaller #0 [ 696.906323] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 696.915683] Call Trace: [ 696.918283] dump_stack+0x1fc/0x2fe [ 696.921933] should_fail.cold+0xa/0x14 [ 696.925860] ? setup_fault_attr+0x200/0x200 [ 696.930188] ? __mutex_add_waiter+0x160/0x160 [ 696.934695] __should_failslab+0x115/0x180 [ 696.938939] should_failslab+0x5/0xf [ 696.942663] kmem_cache_alloc_node_trace+0x244/0x3b0 [ 696.947780] __kmalloc_node+0x38/0x70 [ 696.951596] blk_mq_realloc_hw_ctxs+0x1d8/0x1000 [ 696.956362] ? kmem_cache_alloc_node_trace+0x351/0x3b0 [ 696.961655] blk_mq_init_allocated_queue+0x20c/0x1300 [ 696.966862] blk_mq_init_queue+0x5c/0xa0 [ 696.970935] loop_add+0x2cb/0x8a0 [ 696.974400] loop_control_ioctl+0x16c/0x480 [ 696.978726] ? loop_lookup+0x1d0/0x1d0 [ 696.982618] ? finish_task_switch+0x146/0x760 [ 696.987121] ? loop_lookup+0x1d0/0x1d0 [ 696.991013] do_vfs_ioctl+0xcdb/0x12e0 19:27:28 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xe1030000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="02000000030000000400000030000f000300040000000000000000000f008ec4", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000e1f4655fe2f4655fe2f4655f000000000000040008", 0x1d, 0x4200}, {&(0x7f0000012700)="20000000d4c49a2e07", 0x9, 0x4280}], 0x0, &(0x7f0000013a00)) 19:27:28 executing program 3: set_mempolicy(0x2, &(0x7f0000000000)=0x9, 0x90) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x4c032, 0xffffffffffffffff, 0xae01000000000000) [ 696.994904] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 696.999662] ? ioctl_preallocate+0x200/0x200 [ 697.004070] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 697.008653] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 697.013413] ? rcu_nmi_exit+0xb3/0x180 [ 697.017303] ? retint_kernel+0x2d/0x2d [ 697.021245] ? do_vfs_ioctl+0x16/0x12e0 [ 697.025222] ksys_ioctl+0x9b/0xc0 [ 697.028680] __x64_sys_ioctl+0x6f/0xb0 [ 697.032567] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 697.037152] do_syscall_64+0xf9/0x620 [ 697.040961] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 697.046149] RIP: 0033:0x45e219 [ 697.049340] Code: 0d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 697.068252] RSP: 002b:00007f1b82d17c68 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 697.075970] RAX: ffffffffffffffda RBX: 0000000000000009 RCX: 000000000045e219 [ 697.083245] RDX: 0000000000000000 RSI: 0000000000004c80 RDI: 0000000000000007 [ 697.090516] RBP: 00007f1b82d17ca0 R08: 0000000000000000 R09: 0000000000000000 19:27:29 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)=ANY=[@ANYBLOB="300000001000070100dd2174ffff27de00000000", @ANYRES32=0x0, @ANYBLOB="00000000000000002c091b00000000000500100005"], 0x30}}, 0x0) [ 697.097793] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000021 [ 697.105073] R13: 00007ffca1b4a27f R14: 00007f1b82d189c0 R15: 000000000119c034 [ 697.227100] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.0'. [ 697.274385] EXT4-fs (loop5): corrupt root inode, run e2fsck [ 697.311333] EXT4-fs (loop5): mount failed 19:27:29 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xa9030000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="02000000030000000400000030000f000300040000000000000000000f008ec4", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000e1f4655fe2f4655fe2f4655f00000000000004", 0x1b, 0x4200}, {&(0x7f0000012700)="20000000d4c49a2e07", 0x9, 0x4280}], 0x0, &(0x7f0000013a00)) 19:27:29 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xe2000000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="02000000030000000400000030000f000300040000000000000000000f008ec4", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000e1f4655fe2f4655fe2f4655f000000000000040008", 0x1d, 0x4200}, {&(0x7f0000012700)="20000000d4c49a2e07", 0x9, 0x4280}], 0x0, &(0x7f0000013a00)) 19:27:29 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)=ANY=[@ANYBLOB="300000001000070100dd2174ffff27de00000000", @ANYRES32=0x0, @ANYBLOB="000000000000000060091b00000000000500100005"], 0x30}}, 0x0) 19:27:29 executing program 2 (fault-call:13 fault-nth:34): perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0xb6, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8020}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x0, 0x0) r3 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000180)='/dev/hwrng\x00', 0x0, 0x0) read$FUSE(r3, &(0x7f0000000700), 0xfce3) ioctl$BLKPG(r3, 0x1269, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0}) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) socket(0x1d, 0x80000, 0x1) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000540)=0x14) r5 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r5, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000280)=ANY=[@ANYBLOB="3000000024000b0f00"/20, @ANYRES32=r4, @ANYBLOB="ff00000000000000000000e4070001007069650004700200df329e91a7001df00e69c06a95499c88a548ce06aac2a1ea1277d7eef90367edad25e73c20eda73114b9fd2461b6b35fb5262900ff9e"], 0x30}}, 0x0) 19:27:29 executing program 3: set_mempolicy(0x2, &(0x7f0000000000)=0x9, 0x90) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x4c032, 0xffffffffffffffff, 0xaf00000000000000) [ 697.382212] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue 19:27:29 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xd1030000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="02000000030000000400000030000f000300040000000000000000000f008ec4", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000e1f4655fe2f4655fe2f4655f000000000000040008", 0x1d, 0x4200}, {&(0x7f0000012700)="20000000d4c49a2e07", 0x9, 0x4280}], 0x0, &(0x7f0000013a00)) [ 697.493402] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.0'. 19:27:29 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xe2010000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="02000000030000000400000030000f000300040000000000000000000f008ec4", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000e1f4655fe2f4655fe2f4655f000000000000040008", 0x1d, 0x4200}, {&(0x7f0000012700)="20000000d4c49a2e07", 0x9, 0x4280}], 0x0, &(0x7f0000013a00)) 19:27:29 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)=ANY=[@ANYBLOB="300000001000070100dd2174ffff27de00000000", @ANYRES32=0x0, @ANYBLOB="0000000000000000a4091b00000000000500100005"], 0x30}}, 0x0) 19:27:29 executing program 3: set_mempolicy(0x2, &(0x7f0000000000)=0x9, 0x90) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x4c032, 0xffffffffffffffff, 0xaf01000000000000) [ 697.614726] EXT4-fs (loop5): corrupt root inode, run e2fsck [ 697.631459] FAULT_INJECTION: forcing a failure. [ 697.631459] name failslab, interval 1, probability 0, space 0, times 0 [ 697.661717] EXT4-fs (loop5): mount failed [ 697.691164] CPU: 0 PID: 18491 Comm: syz-executor.2 Not tainted 4.19.167-syzkaller #0 [ 697.699061] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 697.708416] Call Trace: [ 697.711030] dump_stack+0x1fc/0x2fe [ 697.714675] should_fail.cold+0xa/0x14 [ 697.718596] ? setup_fault_attr+0x200/0x200 [ 697.722939] __should_failslab+0x115/0x180 [ 697.727183] should_failslab+0x5/0xf [ 697.730902] kmem_cache_alloc_node_trace+0x244/0x3b0 [ 697.736016] __kmalloc_node+0x38/0x70 [ 697.739833] blk_alloc_flush_queue+0x120/0x300 [ 697.744426] blk_mq_realloc_hw_ctxs+0x7bc/0x1000 [ 697.749200] blk_mq_init_allocated_queue+0x20c/0x1300 [ 697.754393] ? blkcg_init_queue+0x1fd/0x540 [ 697.758730] blk_mq_init_queue+0x5c/0xa0 [ 697.762806] loop_add+0x2cb/0x8a0 [ 697.766270] loop_control_ioctl+0x16c/0x480 [ 697.770687] ? loop_lookup+0x1d0/0x1d0 [ 697.774592] ? loop_lookup+0x1d0/0x1d0 [ 697.778488] do_vfs_ioctl+0xcdb/0x12e0 [ 697.782380] ? lock_downgrade+0x720/0x720 [ 697.786529] ? check_preemption_disabled+0x41/0x280 [ 697.791555] ? ioctl_preallocate+0x200/0x200 [ 697.795984] ? __fget+0x356/0x510 [ 697.799447] ? do_dup2+0x450/0x450 [ 697.802990] ? vfs_write+0x393/0x540 [ 697.806708] ? fput+0x2b/0x190 [ 697.809918] ksys_ioctl+0x9b/0xc0 [ 697.813383] __x64_sys_ioctl+0x6f/0xb0 [ 697.817273] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 697.821863] do_syscall_64+0xf9/0x620 [ 697.825673] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 697.830858] RIP: 0033:0x45e219 [ 697.834051] Code: 0d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 697.852950] RSP: 002b:00007f1b82d17c68 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 697.860666] RAX: ffffffffffffffda RBX: 0000000000000009 RCX: 000000000045e219 [ 697.867940] RDX: 0000000000000000 RSI: 0000000000004c80 RDI: 0000000000000007 [ 697.875216] RBP: 00007f1b82d17ca0 R08: 0000000000000000 R09: 0000000000000000 [ 697.882492] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000022 [ 697.889767] R13: 00007ffca1b4a27f R14: 00007f1b82d189c0 R15: 000000000119c034 19:27:29 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)=ANY=[@ANYBLOB="300000001000070100dd2174ffff27de00000000", @ANYRES32=0x0, @ANYBLOB="0000000000000000500b1b00000000000500100005"], 0x30}}, 0x0) 19:27:29 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)=ANY=[@ANYBLOB="300000001000070100dd2174ffff27de00000000", @ANYRES32=0x0, @ANYBLOB="0000000000000000540b1b00000000000500100005"], 0x30}}, 0x0) 19:27:29 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)=ANY=[@ANYBLOB="300000001000070100dd2174ffff27de00000000", @ANYRES32=0x0, @ANYBLOB="00000000000000005c0b1b00000000000500100005"], 0x30}}, 0x0) [ 698.087718] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue [ 698.096980] EXT4-fs (loop5): corrupt root inode, run e2fsck [ 698.128339] EXT4-fs (loop5): mount failed 19:27:30 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xaa000000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="02000000030000000400000030000f000300040000000000000000000f008ec4", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000e1f4655fe2f4655fe2f4655f00000000000004", 0x1b, 0x4200}, {&(0x7f0000012700)="20000000d4c49a2e07", 0x9, 0x4280}], 0x0, &(0x7f0000013a00)) 19:27:30 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xe2020000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="02000000030000000400000030000f000300040000000000000000000f008ec4", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000e1f4655fe2f4655fe2f4655f000000000000040008", 0x1d, 0x4200}, {&(0x7f0000012700)="20000000d4c49a2e07", 0x9, 0x4280}], 0x0, &(0x7f0000013a00)) 19:27:30 executing program 2 (fault-call:13 fault-nth:35): perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0xb6, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8020}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x0, 0x0) r3 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000180)='/dev/hwrng\x00', 0x0, 0x0) read$FUSE(r3, &(0x7f0000000700), 0xfce3) ioctl$BLKPG(r3, 0x1269, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0}) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) socket(0x1d, 0x80000, 0x1) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000540)=0x14) r5 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r5, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000280)=ANY=[@ANYBLOB="3000000024000b0f00"/20, @ANYRES32=r4, @ANYBLOB="ff00000000000000000000e4070001007069650004700200df329e91a7001df00e69c06a95499c88a548ce06aac2a1ea1277d7eef90367edad25e73c20eda73114b9fd2461b6b35fb5262900ff9e"], 0x30}}, 0x0) 19:27:30 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)=ANY=[@ANYBLOB="300000001000070100dd2174ffff27de00000000", @ANYRES32=0x0, @ANYBLOB="0000000000000000600b1b00000000000500100005"], 0x30}}, 0x0) 19:27:30 executing program 3: set_mempolicy(0x2, &(0x7f0000000000)=0x9, 0x90) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x4c032, 0xffffffffffffffff, 0xb000000000000000) 19:27:30 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xd2000000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="02000000030000000400000030000f000300040000000000000000000f008ec4", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000e1f4655fe2f4655fe2f4655f000000000000040008", 0x1d, 0x4200}, {&(0x7f0000012700)="20000000d4c49a2e07", 0x9, 0x4280}], 0x0, &(0x7f0000013a00)) 19:27:30 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)=ANY=[@ANYBLOB="300000001000070100dd2174ffff27de00000000", @ANYRES32=0x0, @ANYBLOB="0000000000000000700b1b00000000000500100005"], 0x30}}, 0x0) 19:27:30 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xaa010000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="02000000030000000400000030000f000300040000000000000000000f008ec4", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000e1f4655fe2f4655fe2f4655f00000000000004", 0x1b, 0x4200}, {&(0x7f0000012700)="20000000d4c49a2e07", 0x9, 0x4280}], 0x0, &(0x7f0000013a00)) 19:27:30 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xe2030000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="02000000030000000400000030000f000300040000000000000000000f008ec4", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000e1f4655fe2f4655fe2f4655f000000000000040008", 0x1d, 0x4200}, {&(0x7f0000012700)="20000000d4c49a2e07", 0x9, 0x4280}], 0x0, &(0x7f0000013a00)) 19:27:30 executing program 3: set_mempolicy(0x2, &(0x7f0000000000)=0x9, 0x90) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x4c032, 0xffffffffffffffff, 0xb001000000000000) [ 698.415753] FAULT_INJECTION: forcing a failure. [ 698.415753] name failslab, interval 1, probability 0, space 0, times 0 [ 698.495825] CPU: 1 PID: 18532 Comm: syz-executor.2 Not tainted 4.19.167-syzkaller #0 [ 698.503750] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 698.513369] Call Trace: [ 698.515973] dump_stack+0x1fc/0x2fe [ 698.519615] should_fail.cold+0xa/0x14 [ 698.523521] ? setup_fault_attr+0x200/0x200 [ 698.527850] ? lock_acquire+0x1ec/0x3c0 [ 698.531844] __should_failslab+0x115/0x180 [ 698.536090] should_failslab+0x5/0xf [ 698.539812] kmem_cache_alloc_node_trace+0x244/0x3b0 19:27:30 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xe3000000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="02000000030000000400000030000f000300040000000000000000000f008ec4", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000e1f4655fe2f4655fe2f4655f000000000000040008", 0x1d, 0x4200}, {&(0x7f0000012700)="20000000d4c49a2e07", 0x9, 0x4280}], 0x0, &(0x7f0000013a00)) [ 698.545018] blk_mq_init_tags+0x6a/0x2b0 [ 698.549088] blk_mq_alloc_rq_map+0x9d/0x230 [ 698.553422] blk_mq_init_sched+0x219/0x730 [ 698.557700] elevator_init_mq+0xcd/0x160 [ 698.561770] blk_mq_init_allocated_queue+0xe1f/0x1300 [ 698.566976] blk_mq_init_queue+0x5c/0xa0 [ 698.571046] loop_add+0x2cb/0x8a0 [ 698.574507] loop_control_ioctl+0x16c/0x480 [ 698.578838] ? loop_lookup+0x1d0/0x1d0 [ 698.582733] ? loop_lookup+0x1d0/0x1d0 [ 698.586631] ? loop_lookup+0x1d0/0x1d0 [ 698.590523] do_vfs_ioctl+0xcdb/0x12e0 19:27:30 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xe3010000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="02000000030000000400000030000f000300040000000000000000000f008ec4", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000e1f4655fe2f4655fe2f4655f000000000000040008", 0x1d, 0x4200}, {&(0x7f0000012700)="20000000d4c49a2e07", 0x9, 0x4280}], 0x0, &(0x7f0000013a00)) [ 698.594415] ? lock_downgrade+0x720/0x720 [ 698.598567] ? ioctl_preallocate+0x200/0x200 [ 698.603328] ? __fget+0x334/0x510 [ 698.606797] ? __fget+0x356/0x510 [ 698.610263] ? do_dup2+0x450/0x450 [ 698.613809] ? rcu_nmi_exit+0xb3/0x180 [ 698.617708] ksys_ioctl+0x9b/0xc0 [ 698.621169] __x64_sys_ioctl+0x6f/0xb0 [ 698.625071] do_syscall_64+0xf9/0x620 [ 698.628879] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 698.634066] RIP: 0033:0x45e219 [ 698.637265] Code: 0d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 698.656258] RSP: 002b:00007f1b82d17c68 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 698.663979] RAX: ffffffffffffffda RBX: 0000000000000009 RCX: 000000000045e219 [ 698.671268] RDX: 0000000000000000 RSI: 0000000000004c80 RDI: 0000000000000007 [ 698.678591] RBP: 00007f1b82d17ca0 R08: 0000000000000000 R09: 0000000000000000 [ 698.685871] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000023 19:27:30 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xe3020000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="02000000030000000400000030000f000300040000000000000000000f008ec4", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000e1f4655fe2f4655fe2f4655f000000000000040008", 0x1d, 0x4200}, {&(0x7f0000012700)="20000000d4c49a2e07", 0x9, 0x4280}], 0x0, &(0x7f0000013a00)) 19:27:30 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)=ANY=[@ANYBLOB="300000001000070100dd2174ffff27de00000000", @ANYRES32=0x0, @ANYBLOB="0000000000000000880b1b00000000000500100005"], 0x30}}, 0x0) [ 698.693148] R13: 00007ffca1b4a27f R14: 00007f1b82d189c0 R15: 000000000119c034 [ 698.794024] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue 19:27:30 executing program 2 (fault-call:13 fault-nth:36): perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0xb6, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8020}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x0, 0x0) r3 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000180)='/dev/hwrng\x00', 0x0, 0x0) read$FUSE(r3, &(0x7f0000000700), 0xfce3) ioctl$BLKPG(r3, 0x1269, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0}) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) socket(0x1d, 0x80000, 0x1) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000540)=0x14) r5 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r5, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000280)=ANY=[@ANYBLOB="3000000024000b0f00"/20, @ANYRES32=r4, @ANYBLOB="ff00000000000000000000e4070001007069650004700200df329e91a7001df00e69c06a95499c88a548ce06aac2a1ea1277d7eef90367edad25e73c20eda73114b9fd2461b6b35fb5262900ff9e"], 0x30}}, 0x0) 19:27:30 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xe3030000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="02000000030000000400000030000f000300040000000000000000000f008ec4", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000e1f4655fe2f4655fe2f4655f000000000000040008", 0x1d, 0x4200}, {&(0x7f0000012700)="20000000d4c49a2e07", 0x9, 0x4280}], 0x0, &(0x7f0000013a00)) [ 698.837759] nla_parse: 6 callbacks suppressed [ 698.837769] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.0'. 19:27:30 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xd2010000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="02000000030000000400000030000f000300040000000000000000000f008ec4", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000e1f4655fe2f4655fe2f4655f000000000000040008", 0x1d, 0x4200}, {&(0x7f0000012700)="20000000d4c49a2e07", 0x9, 0x4280}], 0x0, &(0x7f0000013a00)) 19:27:30 executing program 3: set_mempolicy(0x2, &(0x7f0000000000)=0x9, 0x90) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x4c032, 0xffffffffffffffff, 0xb100000000000000) 19:27:30 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)=ANY=[@ANYBLOB="300000001000070100dd2174ffff27de00000000", @ANYRES32=0x0, @ANYBLOB="00000000000000008c0b1b00000000000500100005"], 0x30}}, 0x0) [ 698.908364] EXT4-fs (loop5): corrupt root inode, run e2fsck [ 698.948278] EXT4-fs (loop5): mount failed 19:27:31 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xaa020000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="02000000030000000400000030000f000300040000000000000000000f008ec4", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000e1f4655fe2f4655fe2f4655f00000000000004", 0x1b, 0x4200}, {&(0x7f0000012700)="20000000d4c49a2e07", 0x9, 0x4280}], 0x0, &(0x7f0000013a00)) 19:27:31 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xe4000000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="02000000030000000400000030000f000300040000000000000000000f008ec4", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000e1f4655fe2f4655fe2f4655f000000000000040008", 0x1d, 0x4200}, {&(0x7f0000012700)="20000000d4c49a2e07", 0x9, 0x4280}], 0x0, &(0x7f0000013a00)) [ 699.049160] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.0'. 19:27:31 executing program 3: set_mempolicy(0x2, &(0x7f0000000000)=0x9, 0x90) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x4c032, 0xffffffffffffffff, 0xb101000000000000) 19:27:31 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)=ANY=[@ANYBLOB="300000001000070100dd2174ffff27de00000000", @ANYRES32=0x0, @ANYBLOB="0000000000000000c00b1b00000000000500100005"], 0x30}}, 0x0) [ 699.135165] FAULT_INJECTION: forcing a failure. [ 699.135165] name failslab, interval 1, probability 0, space 0, times 0 [ 699.155981] CPU: 0 PID: 18573 Comm: syz-executor.2 Not tainted 4.19.167-syzkaller #0 [ 699.163902] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 699.173264] Call Trace: [ 699.175865] dump_stack+0x1fc/0x2fe [ 699.179509] should_fail.cold+0xa/0x14 [ 699.183409] ? setup_fault_attr+0x200/0x200 [ 699.187742] ? __should_failslab+0x53/0x180 [ 699.192079] __should_failslab+0x115/0x180 [ 699.192284] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.0'. [ 699.196321] should_failslab+0x5/0xf [ 699.196337] kmem_cache_alloc_node_trace+0x244/0x3b0 [ 699.196355] __kmalloc_node+0x38/0x70 [ 699.196374] blk_alloc_flush_queue+0x120/0x300 [ 699.222492] blk_mq_realloc_hw_ctxs+0x7bc/0x1000 [ 699.227273] blk_mq_init_allocated_queue+0x20c/0x1300 19:27:31 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)=ANY=[@ANYBLOB="300000001000070100dd2174ffff27de00000000", @ANYRES32=0x0, @ANYBLOB="0000000000000000e80b1b00000000000500100005"], 0x30}}, 0x0) 19:27:31 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)=ANY=[@ANYBLOB="300000001000070100dd2174ffff27de00000000", @ANYRES32=0x0, @ANYBLOB="0000000000000000ec0b1b00000000000500100005"], 0x30}}, 0x0) [ 699.232475] ? blk_alloc_queue_node+0x7ca/0xbd0 [ 699.237160] blk_mq_init_queue+0x5c/0xa0 [ 699.241230] loop_add+0x2cb/0x8a0 [ 699.244699] loop_control_ioctl+0x16c/0x480 [ 699.246686] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.0'. [ 699.249040] ? loop_lookup+0x1d0/0x1d0 [ 699.249063] ? do_vfs_ioctl+0xbd/0x12e0 [ 699.249078] ? loop_lookup+0x1d0/0x1d0 [ 699.249095] do_vfs_ioctl+0xcdb/0x12e0 [ 699.273252] ? lock_downgrade+0x720/0x720 [ 699.277409] ? check_preemption_disabled+0x41/0x280 [ 699.282433] ? ioctl_preallocate+0x200/0x200 [ 699.286860] ? __fget+0x356/0x510 [ 699.290326] ? do_dup2+0x450/0x450 [ 699.293874] ? fput+0x2b/0x190 [ 699.297079] ksys_ioctl+0x9b/0xc0 [ 699.300555] __x64_sys_ioctl+0x6f/0xb0 [ 699.301158] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.0'. [ 699.304466] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 699.304484] do_syscall_64+0xf9/0x620 [ 699.304503] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 699.304519] RIP: 0033:0x45e219 19:27:31 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)=ANY=[@ANYBLOB="300000001000070100dd2174ffff27de00000000", @ANYRES32=0x0, @ANYBLOB="0000000000000000f00b1b00000000000500100005"], 0x30}}, 0x0) [ 699.329798] Code: 0d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 699.348709] RSP: 002b:00007f1b82d17c68 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 699.355715] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.0'. [ 699.356430] RAX: ffffffffffffffda RBX: 0000000000000009 RCX: 000000000045e219 [ 699.372289] RDX: 0000000000000000 RSI: 0000000000004c80 RDI: 0000000000000007 [ 699.379595] RBP: 00007f1b82d17ca0 R08: 0000000000000000 R09: 0000000000000000 [ 699.386870] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000024 [ 699.394135] R13: 00007ffca1b4a27f R14: 00007f1b82d189c0 R15: 000000000119c034 [ 699.480362] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue 19:27:31 executing program 2 (fault-call:13 fault-nth:37): perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0xb6, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8020}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x0, 0x0) r3 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000180)='/dev/hwrng\x00', 0x0, 0x0) read$FUSE(r3, &(0x7f0000000700), 0xfce3) ioctl$BLKPG(r3, 0x1269, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0}) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) socket(0x1d, 0x80000, 0x1) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000540)=0x14) r5 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r5, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000280)=ANY=[@ANYBLOB="3000000024000b0f00"/20, @ANYRES32=r4, @ANYBLOB="ff00000000000000000000e4070001007069650004700200df329e91a7001df00e69c06a95499c88a548ce06aac2a1ea1277d7eef90367edad25e73c20eda73114b9fd2461b6b35fb5262900ff9e"], 0x30}}, 0x0) 19:27:31 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)=ANY=[@ANYBLOB="300000001000070100dd2174ffff27de00000000", @ANYRES32=0x0, @ANYBLOB="0000000000000000f40b1b00000000000500100005"], 0x30}}, 0x0) 19:27:31 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xd2020000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="02000000030000000400000030000f000300040000000000000000000f008ec4", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000e1f4655fe2f4655fe2f4655f000000000000040008", 0x1d, 0x4200}, {&(0x7f0000012700)="20000000d4c49a2e07", 0x9, 0x4280}], 0x0, &(0x7f0000013a00)) 19:27:31 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xe4010000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="02000000030000000400000030000f000300040000000000000000000f008ec4", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000e1f4655fe2f4655fe2f4655f000000000000040008", 0x1d, 0x4200}, {&(0x7f0000012700)="20000000d4c49a2e07", 0x9, 0x4280}], 0x0, &(0x7f0000013a00)) 19:27:31 executing program 3: set_mempolicy(0x2, &(0x7f0000000000)=0x9, 0x90) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x4c032, 0xffffffffffffffff, 0xb200000000000000) [ 699.567558] EXT4-fs (loop5): corrupt root inode, run e2fsck [ 699.582068] EXT4-fs (loop5): mount failed 19:27:31 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xaa030000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="02000000030000000400000030000f000300040000000000000000000f008ec4", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000e1f4655fe2f4655fe2f4655f00000000000004", 0x1b, 0x4200}, {&(0x7f0000012700)="20000000d4c49a2e07", 0x9, 0x4280}], 0x0, &(0x7f0000013a00)) 19:27:31 executing program 3: set_mempolicy(0x2, &(0x7f0000000000)=0x9, 0x90) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x4c032, 0xffffffffffffffff, 0xb201000000000000) [ 699.667015] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.0'. 19:27:31 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xe4020000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="02000000030000000400000030000f000300040000000000000000000f008ec4", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000e1f4655fe2f4655fe2f4655f000000000000040008", 0x1d, 0x4200}, {&(0x7f0000012700)="20000000d4c49a2e07", 0x9, 0x4280}], 0x0, &(0x7f0000013a00)) 19:27:31 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)=ANY=[@ANYBLOB="300000001000070100dd2174ffff27de00000000", @ANYRES32=0x0, @ANYBLOB="0000000000000000f80b1b00000000000500100005"], 0x30}}, 0x0) [ 699.755479] FAULT_INJECTION: forcing a failure. [ 699.755479] name failslab, interval 1, probability 0, space 0, times 0 [ 699.799716] CPU: 0 PID: 18616 Comm: syz-executor.2 Not tainted 4.19.167-syzkaller #0 [ 699.807624] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 699.816986] Call Trace: [ 699.819586] dump_stack+0x1fc/0x2fe [ 699.823227] should_fail.cold+0xa/0x14 [ 699.827133] ? setup_fault_attr+0x200/0x200 [ 699.831469] __should_failslab+0x115/0x180 [ 699.835177] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.0'. [ 699.835703] should_failslab+0x5/0xf 19:27:31 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)=ANY=[@ANYBLOB="300000001000070100dd2174ffff27de00000000", @ANYRES32=0x0, @ANYBLOB="0000000000000000fc0b1b00000000000500100005"], 0x30}}, 0x0) [ 699.835720] kmem_cache_alloc_node_trace+0x244/0x3b0 [ 699.835736] __kmalloc_node+0x38/0x70 [ 699.835757] blk_alloc_flush_queue+0x120/0x300 [ 699.861457] blk_mq_realloc_hw_ctxs+0x7bc/0x1000 [ 699.866239] blk_mq_init_allocated_queue+0x20c/0x1300 [ 699.871433] ? blkcg_init_queue+0x1fd/0x540 [ 699.875768] blk_mq_init_queue+0x5c/0xa0 [ 699.879841] loop_add+0x2cb/0x8a0 [ 699.883306] loop_control_ioctl+0x16c/0x480 [ 699.887635] ? loop_lookup+0x1d0/0x1d0 [ 699.891018] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.0'. 19:27:31 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)=ANY=[@ANYBLOB="300000001000070100dd2174ffff27de00000000", @ANYRES32=0x0, @ANYBLOB="0000000000000000000c1b00000000000500100005"], 0x30}}, 0x0) [ 699.891527] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 699.904849] ? rcu_nmi_exit+0xb3/0x180 [ 699.908745] ? loop_lookup+0x1d0/0x1d0 [ 699.912641] do_vfs_ioctl+0xcdb/0x12e0 [ 699.916539] ? lock_downgrade+0x720/0x720 [ 699.920696] ? ioctl_preallocate+0x200/0x200 [ 699.925122] ? __fget+0x356/0x510 [ 699.928589] ? do_dup2+0x450/0x450 [ 699.932133] ? vfs_write+0x393/0x540 [ 699.935852] ? fput+0x2b/0x190 [ 699.938344] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.0'. 19:27:32 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)=ANY=[@ANYBLOB="300000001000070100dd2174ffff27de00000000", @ANYRES32=0x0, @ANYBLOB="0000000000000000040c1b00000000000500100005"], 0x30}}, 0x0) [ 699.939055] ksys_ioctl+0x9b/0xc0 [ 699.951107] __x64_sys_ioctl+0x6f/0xb0 [ 699.955004] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 699.959594] do_syscall_64+0xf9/0x620 [ 699.963405] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 699.968595] RIP: 0033:0x45e219 [ 699.971793] Code: 0d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 699.990705] RSP: 002b:00007f1b82d17c68 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 699.998425] RAX: ffffffffffffffda RBX: 0000000000000009 RCX: 000000000045e219 [ 700.005699] RDX: 0000000000000000 RSI: 0000000000004c80 RDI: 0000000000000007 [ 700.012966] RBP: 00007f1b82d17ca0 R08: 0000000000000000 R09: 0000000000000000 [ 700.020242] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000025 [ 700.027515] R13: 00007ffca1b4a27f R14: 00007f1b82d189c0 R15: 000000000119c034 [ 700.127847] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue 19:27:32 executing program 2 (fault-call:13 fault-nth:38): perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0xb6, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8020}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x0, 0x0) r3 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000180)='/dev/hwrng\x00', 0x0, 0x0) read$FUSE(r3, &(0x7f0000000700), 0xfce3) ioctl$BLKPG(r3, 0x1269, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0}) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) socket(0x1d, 0x80000, 0x1) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000540)=0x14) r5 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r5, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000280)=ANY=[@ANYBLOB="3000000024000b0f00"/20, @ANYRES32=r4, @ANYBLOB="ff00000000000000000000e4070001007069650004700200df329e91a7001df00e69c06a95499c88a548ce06aac2a1ea1277d7eef90367edad25e73c20eda73114b9fd2461b6b35fb5262900ff9e"], 0x30}}, 0x0) 19:27:32 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)=ANY=[@ANYBLOB="300000001000070100dd2174ffff27de00000000", @ANYRES32=0x0, @ANYBLOB="0000000000000000080c1b00000000000500100005"], 0x30}}, 0x0) 19:27:32 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xe4030000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="02000000030000000400000030000f000300040000000000000000000f008ec4", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000e1f4655fe2f4655fe2f4655f000000000000040008", 0x1d, 0x4200}, {&(0x7f0000012700)="20000000d4c49a2e07", 0x9, 0x4280}], 0x0, &(0x7f0000013a00)) 19:27:32 executing program 3: set_mempolicy(0x2, &(0x7f0000000000)=0x9, 0x90) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x4c032, 0xffffffffffffffff, 0xb300000000000000) 19:27:32 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xd2030000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="02000000030000000400000030000f000300040000000000000000000f008ec4", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000e1f4655fe2f4655fe2f4655f000000000000040008", 0x1d, 0x4200}, {&(0x7f0000012700)="20000000d4c49a2e07", 0x9, 0x4280}], 0x0, &(0x7f0000013a00)) [ 700.177910] EXT4-fs (loop5): corrupt root inode, run e2fsck [ 700.188933] EXT4-fs (loop5): mount failed 19:27:32 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xab000000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="02000000030000000400000030000f000300040000000000000000000f008ec4", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000e1f4655fe2f4655fe2f4655f00000000000004", 0x1b, 0x4200}, {&(0x7f0000012700)="20000000d4c49a2e07", 0x9, 0x4280}], 0x0, &(0x7f0000013a00)) 19:27:32 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)=ANY=[@ANYBLOB="300000001000070100dd2174ffff27de00000000", @ANYRES32=0x0, @ANYBLOB="00000000000000000c0c1b00000000000500100005"], 0x30}}, 0x0) 19:27:32 executing program 3: set_mempolicy(0x2, &(0x7f0000000000)=0x9, 0x90) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x4c032, 0xffffffffffffffff, 0xb301000000000000) 19:27:32 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xe5000000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="02000000030000000400000030000f000300040000000000000000000f008ec4", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000e1f4655fe2f4655fe2f4655f000000000000040008", 0x1d, 0x4200}, {&(0x7f0000012700)="20000000d4c49a2e07", 0x9, 0x4280}], 0x0, &(0x7f0000013a00)) [ 700.345196] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue 19:27:32 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xd3000000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="02000000030000000400000030000f000300040000000000000000000f008ec4", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000e1f4655fe2f4655fe2f4655f000000000000040008", 0x1d, 0x4200}, {&(0x7f0000012700)="20000000d4c49a2e07", 0x9, 0x4280}], 0x0, &(0x7f0000013a00)) 19:27:32 executing program 3: set_mempolicy(0x2, &(0x7f0000000000)=0x9, 0x90) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x4c032, 0xffffffffffffffff, 0xb400000000000000) [ 700.482689] FAULT_INJECTION: forcing a failure. [ 700.482689] name failslab, interval 1, probability 0, space 0, times 0 [ 700.495002] CPU: 1 PID: 18660 Comm: syz-executor.2 Not tainted 4.19.167-syzkaller #0 [ 700.502898] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 700.512252] Call Trace: [ 700.514851] dump_stack+0x1fc/0x2fe [ 700.518494] should_fail.cold+0xa/0x14 [ 700.522398] ? retint_kernel+0x2d/0x2d [ 700.526284] ? setup_fault_attr+0x200/0x200 [ 700.530612] __should_failslab+0x115/0x180 [ 700.534845] should_failslab+0x5/0xf [ 700.538545] kmem_cache_alloc_node_trace+0x244/0x3b0 [ 700.543653] __kmalloc_node+0x38/0x70 [ 700.547447] sbitmap_init_node+0x123/0x440 [ 700.551683] sbitmap_queue_init_node+0x37/0x6c0 [ 700.556334] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 700.561350] blk_mq_init_tags+0x10d/0x2b0 [ 700.565489] blk_mq_alloc_rq_map+0x9d/0x230 [ 700.569794] blk_mq_init_sched+0x219/0x730 [ 700.574016] elevator_init_mq+0xcd/0x160 [ 700.578118] blk_mq_init_allocated_queue+0xe1f/0x1300 [ 700.583321] blk_mq_init_queue+0x5c/0xa0 [ 700.587375] loop_add+0x2cb/0x8a0 [ 700.590813] loop_control_ioctl+0x16c/0x480 [ 700.595116] ? loop_lookup+0x1d0/0x1d0 [ 700.599025] ? loop_lookup+0x1d0/0x1d0 [ 700.602908] do_vfs_ioctl+0xcdb/0x12e0 [ 700.606790] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 700.611525] ? ioctl_preallocate+0x200/0x200 [ 700.615975] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 700.620549] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 700.625312] ? rcu_nmi_exit+0xb3/0x180 [ 700.629191] ? retint_kernel+0x2d/0x2d [ 700.633115] ? __fdget+0x1bd/0x230 [ 700.636656] ksys_ioctl+0x9b/0xc0 [ 700.640105] __x64_sys_ioctl+0x6f/0xb0 [ 700.644013] do_syscall_64+0xf9/0x620 [ 700.647814] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 700.652990] RIP: 0033:0x45e219 [ 700.656166] Code: 0d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 700.675051] RSP: 002b:00007f1b82d17c68 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 19:27:32 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)=ANY=[@ANYBLOB="300000001000070100dd2174ffff27de00000000", @ANYRES32=0x0, @ANYBLOB="0000000000000000100c1b00000000000500100005"], 0x30}}, 0x0) [ 700.682755] RAX: ffffffffffffffda RBX: 0000000000000009 RCX: 000000000045e219 [ 700.690020] RDX: 0000000000000000 RSI: 0000000000004c80 RDI: 0000000000000007 [ 700.697279] RBP: 00007f1b82d17ca0 R08: 0000000000000000 R09: 0000000000000000 [ 700.704541] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000026 [ 700.711791] R13: 00007ffca1b4a27f R14: 00007f1b82d189c0 R15: 000000000119c034 19:27:32 executing program 2 (fault-call:13 fault-nth:39): perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0xb6, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8020}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x0, 0x0) r3 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000180)='/dev/hwrng\x00', 0x0, 0x0) read$FUSE(r3, &(0x7f0000000700), 0xfce3) ioctl$BLKPG(r3, 0x1269, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0}) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) socket(0x1d, 0x80000, 0x1) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000540)=0x14) r5 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r5, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000280)=ANY=[@ANYBLOB="3000000024000b0f00"/20, @ANYRES32=r4, @ANYBLOB="ff00000000000000000000e4070001007069650004700200df329e91a7001df00e69c06a95499c88a548ce06aac2a1ea1277d7eef90367edad25e73c20eda73114b9fd2461b6b35fb5262900ff9e"], 0x30}}, 0x0) 19:27:32 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xe5010000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="02000000030000000400000030000f000300040000000000000000000f008ec4", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000e1f4655fe2f4655fe2f4655f000000000000040008", 0x1d, 0x4200}, {&(0x7f0000012700)="20000000d4c49a2e07", 0x9, 0x4280}], 0x0, &(0x7f0000013a00)) 19:27:32 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)=ANY=[@ANYBLOB="300000001000070100dd2174ffff27de00000000", @ANYRES32=0x0, @ANYBLOB="0000000000000000140c1b00000000000500100005"], 0x30}}, 0x0) [ 700.855737] EXT4-fs (loop5): corrupt root inode, run e2fsck [ 700.866339] EXT4-fs (loop5): mount failed 19:27:32 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xe5020000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="02000000030000000400000030000f000300040000000000000000000f008ec4", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000e1f4655fe2f4655fe2f4655f000000000000040008", 0x1d, 0x4200}, {&(0x7f0000012700)="20000000d4c49a2e07", 0x9, 0x4280}], 0x0, &(0x7f0000013a00)) 19:27:32 executing program 3: set_mempolicy(0x2, &(0x7f0000000000)=0x9, 0x90) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x4c032, 0xffffffffffffffff, 0xb401000000000000) [ 700.964470] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue [ 700.997570] EXT4-fs (loop5): corrupt root inode, run e2fsck [ 701.007513] FAULT_INJECTION: forcing a failure. [ 701.007513] name failslab, interval 1, probability 0, space 0, times 0 [ 701.024161] EXT4-fs (loop5): mount failed [ 701.043361] CPU: 0 PID: 18692 Comm: syz-executor.2 Not tainted 4.19.167-syzkaller #0 [ 701.052498] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 701.061981] Call Trace: [ 701.064573] dump_stack+0x1fc/0x2fe [ 701.068248] should_fail.cold+0xa/0x14 [ 701.072144] ? setup_fault_attr+0x200/0x200 [ 701.076569] ? lock_acquire+0x170/0x3c0 [ 701.080568] __should_failslab+0x115/0x180 [ 701.084809] should_failslab+0x5/0xf [ 701.088518] kmem_cache_alloc_node_trace+0x244/0x3b0 [ 701.093631] sbitmap_queue_init_node+0x240/0x6c0 [ 701.098485] blk_mq_init_tags+0x16f/0x2b0 [ 701.102642] blk_mq_alloc_rq_map+0x9d/0x230 [ 701.106978] blk_mq_init_sched+0x219/0x730 [ 701.111217] elevator_init_mq+0xcd/0x160 [ 701.115265] blk_mq_init_allocated_queue+0xe1f/0x1300 [ 701.120462] blk_mq_init_queue+0x5c/0xa0 [ 701.124511] loop_add+0x2cb/0x8a0 [ 701.127949] loop_control_ioctl+0x16c/0x480 [ 701.132258] ? loop_lookup+0x1d0/0x1d0 [ 701.136131] ? ksys_write+0x241/0x2a0 [ 701.139932] ? loop_lookup+0x1d0/0x1d0 [ 701.143812] do_vfs_ioctl+0xcdb/0x12e0 [ 701.147727] ? lock_downgrade+0x720/0x720 [ 701.151868] ? check_preemption_disabled+0x41/0x280 [ 701.156886] ? ioctl_preallocate+0x200/0x200 [ 701.161284] ? __fget+0x356/0x510 [ 701.164755] ? do_dup2+0x450/0x450 [ 701.168309] ? ksys_write+0x1c3/0x2a0 [ 701.172121] ? audit_add_tree_rule.cold+0x2f/0x2f [ 701.177074] ksys_ioctl+0x9b/0xc0 [ 701.180521] __x64_sys_ioctl+0x6f/0xb0 [ 701.184394] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 701.188986] do_syscall_64+0xf9/0x620 [ 701.192797] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 701.197980] RIP: 0033:0x45e219 [ 701.201176] Code: 0d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 701.220084] RSP: 002b:00007f1b82d17c68 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 701.227799] RAX: ffffffffffffffda RBX: 0000000000000009 RCX: 000000000045e219 [ 701.235057] RDX: 0000000000000000 RSI: 0000000000004c80 RDI: 0000000000000007 [ 701.242316] RBP: 00007f1b82d17ca0 R08: 0000000000000000 R09: 0000000000000000 [ 701.249593] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000027 [ 701.256855] R13: 00007ffca1b4a27f R14: 00007f1b82d189c0 R15: 000000000119c034 19:27:33 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xab010000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="02000000030000000400000030000f000300040000000000000000000f008ec4", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000e1f4655fe2f4655fe2f4655f00000000000004", 0x1b, 0x4200}, {&(0x7f0000012700)="20000000d4c49a2e07", 0x9, 0x4280}], 0x0, &(0x7f0000013a00)) 19:27:33 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)=ANY=[@ANYBLOB="300000001000070100dd2174ffff27de00000000", @ANYRES32=0x0, @ANYBLOB="0000000000000000180c1b00000000000500100005"], 0x30}}, 0x0) 19:27:33 executing program 3: set_mempolicy(0x2, &(0x7f0000000000)=0x9, 0x90) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x4c032, 0xffffffffffffffff, 0xb500000000000000) 19:27:33 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xd3010000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="02000000030000000400000030000f000300040000000000000000000f008ec4", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000e1f4655fe2f4655fe2f4655f000000000000040008", 0x1d, 0x4200}, {&(0x7f0000012700)="20000000d4c49a2e07", 0x9, 0x4280}], 0x0, &(0x7f0000013a00)) 19:27:33 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xe5030000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="02000000030000000400000030000f000300040000000000000000000f008ec4", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000e1f4655fe2f4655fe2f4655f000000000000040008", 0x1d, 0x4200}, {&(0x7f0000012700)="20000000d4c49a2e07", 0x9, 0x4280}], 0x0, &(0x7f0000013a00)) 19:27:33 executing program 2 (fault-call:13 fault-nth:40): perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0xb6, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8020}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x0, 0x0) r3 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000180)='/dev/hwrng\x00', 0x0, 0x0) read$FUSE(r3, &(0x7f0000000700), 0xfce3) ioctl$BLKPG(r3, 0x1269, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0}) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) socket(0x1d, 0x80000, 0x1) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000540)=0x14) r5 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r5, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000280)=ANY=[@ANYBLOB="3000000024000b0f00"/20, @ANYRES32=r4, @ANYBLOB="ff00000000000000000000e4070001007069650004700200df329e91a7001df00e69c06a95499c88a548ce06aac2a1ea1277d7eef90367edad25e73c20eda73114b9fd2461b6b35fb5262900ff9e"], 0x30}}, 0x0) 19:27:33 executing program 3: set_mempolicy(0x2, &(0x7f0000000000)=0x9, 0x90) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x4c032, 0xffffffffffffffff, 0xb501000000000000) 19:27:33 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)=ANY=[@ANYBLOB="300000001000070100dd2174ffff27de00000000", @ANYRES32=0x0, @ANYBLOB="00000000000000001c0c1b00000000000500100005"], 0x30}}, 0x0) [ 701.465885] EXT4-fs (loop5): corrupt root inode, run e2fsck [ 701.502197] EXT4-fs (loop5): mount failed 19:27:33 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xe6000000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="02000000030000000400000030000f000300040000000000000000000f008ec4", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000e1f4655fe2f4655fe2f4655f000000000000040008", 0x1d, 0x4200}, {&(0x7f0000012700)="20000000d4c49a2e07", 0x9, 0x4280}], 0x0, &(0x7f0000013a00)) 19:27:33 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xab020000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="02000000030000000400000030000f000300040000000000000000000f008ec4", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000e1f4655fe2f4655fe2f4655f00000000000004", 0x1b, 0x4200}, {&(0x7f0000012700)="20000000d4c49a2e07", 0x9, 0x4280}], 0x0, &(0x7f0000013a00)) [ 701.556932] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue [ 701.584677] FAULT_INJECTION: forcing a failure. [ 701.584677] name failslab, interval 1, probability 0, space 0, times 0 [ 701.617959] CPU: 0 PID: 18724 Comm: syz-executor.2 Not tainted 4.19.167-syzkaller #0 [ 701.625877] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 701.635248] Call Trace: [ 701.637854] dump_stack+0x1fc/0x2fe [ 701.641496] should_fail.cold+0xa/0x14 [ 701.645395] ? setup_fault_attr+0x200/0x200 [ 701.649733] ? lock_acquire+0x170/0x3c0 [ 701.653730] __should_failslab+0x115/0x180 [ 701.657980] should_failslab+0x5/0xf [ 701.661694] kmem_cache_alloc_node_trace+0x244/0x3b0 [ 701.666920] sbitmap_queue_init_node+0x240/0x6c0 [ 701.671672] blk_mq_init_tags+0x10d/0x2b0 [ 701.675821] blk_mq_alloc_rq_map+0x9d/0x230 [ 701.680138] blk_mq_init_sched+0x219/0x730 [ 701.684456] elevator_init_mq+0xcd/0x160 [ 701.688504] blk_mq_init_allocated_queue+0xe1f/0x1300 [ 701.693795] blk_mq_init_queue+0x5c/0xa0 [ 701.697872] loop_add+0x2cb/0x8a0 [ 701.701340] loop_control_ioctl+0x16c/0x480 [ 701.705683] ? loop_lookup+0x1d0/0x1d0 [ 701.709579] ? loop_lookup+0x1d0/0x1d0 [ 701.713483] ? loop_lookup+0x1d0/0x1d0 19:27:33 executing program 3: set_mempolicy(0x2, &(0x7f0000000000)=0x9, 0x90) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x4c032, 0xffffffffffffffff, 0xb600000000000000) 19:27:33 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xe6010000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="02000000030000000400000030000f000300040000000000000000000f008ec4", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000e1f4655fe2f4655fe2f4655f000000000000040008", 0x1d, 0x4200}, {&(0x7f0000012700)="20000000d4c49a2e07", 0x9, 0x4280}], 0x0, &(0x7f0000013a00)) 19:27:33 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xe6020000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="02000000030000000400000030000f000300040000000000000000000f008ec4", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000e1f4655fe2f4655fe2f4655f000000000000040008", 0x1d, 0x4200}, {&(0x7f0000012700)="20000000d4c49a2e07", 0x9, 0x4280}], 0x0, &(0x7f0000013a00)) [ 701.717379] do_vfs_ioctl+0xcdb/0x12e0 [ 701.721286] ? lock_downgrade+0x720/0x720 [ 701.725441] ? check_preemption_disabled+0x41/0x280 [ 701.730465] ? ioctl_preallocate+0x200/0x200 [ 701.734883] ? __fget+0x356/0x510 [ 701.738358] ? do_dup2+0x450/0x450 [ 701.741909] ? ksys_write+0x24b/0x2a0 [ 701.745716] ? fput+0x2b/0x190 [ 701.748921] ksys_ioctl+0x9b/0xc0 [ 701.752412] __x64_sys_ioctl+0x6f/0xb0 [ 701.756307] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 701.760898] do_syscall_64+0xf9/0x620 19:27:33 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xe6030000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="02000000030000000400000030000f000300040000000000000000000f008ec4", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000e1f4655fe2f4655fe2f4655f000000000000040008", 0x1d, 0x4200}, {&(0x7f0000012700)="20000000d4c49a2e07", 0x9, 0x4280}], 0x0, &(0x7f0000013a00)) [ 701.764710] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 701.769901] RIP: 0033:0x45e219 [ 701.773097] Code: 0d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 701.792003] RSP: 002b:00007f1b82d17c68 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 701.799900] RAX: ffffffffffffffda RBX: 0000000000000009 RCX: 000000000045e219 [ 701.807268] RDX: 0000000000000000 RSI: 0000000000004c80 RDI: 0000000000000007 19:27:33 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xe7000000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="02000000030000000400000030000f000300040000000000000000000f008ec4", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000e1f4655fe2f4655fe2f4655f000000000000040008", 0x1d, 0x4200}, {&(0x7f0000012700)="20000000d4c49a2e07", 0x9, 0x4280}], 0x0, &(0x7f0000013a00)) [ 701.814549] RBP: 00007f1b82d17ca0 R08: 0000000000000000 R09: 0000000000000000 [ 701.821825] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000028 [ 701.829110] R13: 00007ffca1b4a27f R14: 00007f1b82d189c0 R15: 000000000119c034 19:27:34 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xd3020000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="02000000030000000400000030000f000300040000000000000000000f008ec4", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000e1f4655fe2f4655fe2f4655f000000000000040008", 0x1d, 0x4200}, {&(0x7f0000012700)="20000000d4c49a2e07", 0x9, 0x4280}], 0x0, &(0x7f0000013a00)) 19:27:34 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)=ANY=[@ANYBLOB="300000001000070100dd2174ffff27de00000000", @ANYRES32=0x0, @ANYBLOB="0000000000000000200c1b00000000000500100005"], 0x30}}, 0x0) 19:27:34 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xe7010000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="02000000030000000400000030000f000300040000000000000000000f008ec4", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000e1f4655fe2f4655fe2f4655f000000000000040008", 0x1d, 0x4200}, {&(0x7f0000012700)="20000000d4c49a2e07", 0x9, 0x4280}], 0x0, &(0x7f0000013a00)) 19:27:34 executing program 2 (fault-call:13 fault-nth:41): perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0xb6, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8020}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x0, 0x0) r3 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000180)='/dev/hwrng\x00', 0x0, 0x0) read$FUSE(r3, &(0x7f0000000700), 0xfce3) ioctl$BLKPG(r3, 0x1269, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0}) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) socket(0x1d, 0x80000, 0x1) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000540)=0x14) r5 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r5, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000280)=ANY=[@ANYBLOB="3000000024000b0f00"/20, @ANYRES32=r4, @ANYBLOB="ff00000000000000000000e4070001007069650004700200df329e91a7001df00e69c06a95499c88a548ce06aac2a1ea1277d7eef90367edad25e73c20eda73114b9fd2461b6b35fb5262900ff9e"], 0x30}}, 0x0) [ 701.956722] EXT4-fs (loop5): corrupt root inode, run e2fsck [ 702.000235] EXT4-fs (loop5): mount failed 19:27:34 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)=ANY=[@ANYBLOB="300000001000070100dd2174ffff27de00000000", @ANYRES32=0x0, @ANYBLOB="0000000000000000240c1b00000000000500100005"], 0x30}}, 0x0) 19:27:34 executing program 3: set_mempolicy(0x2, &(0x7f0000000000)=0x9, 0x90) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x4c032, 0xffffffffffffffff, 0xb601000000000000) [ 702.134425] EXT4-fs (loop5): corrupt root inode, run e2fsck [ 702.141334] EXT4-fs (loop5): mount failed [ 702.155959] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue 19:27:34 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xe7020000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="02000000030000000400000030000f000300040000000000000000000f008ec4", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000e1f4655fe2f4655fe2f4655f000000000000040008", 0x1d, 0x4200}, {&(0x7f0000012700)="20000000d4c49a2e07", 0x9, 0x4280}], 0x0, &(0x7f0000013a00)) 19:27:34 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)=ANY=[@ANYBLOB="300000001000070100dd2174ffff27de00000000", @ANYRES32=0x0, @ANYBLOB="0000000000000000280c1b00000000000500100005"], 0x30}}, 0x0) 19:27:34 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xab030000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="02000000030000000400000030000f000300040000000000000000000f008ec4", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000e1f4655fe2f4655fe2f4655f00000000000004", 0x1b, 0x4200}, {&(0x7f0000012700)="20000000d4c49a2e07", 0x9, 0x4280}], 0x0, &(0x7f0000013a00)) 19:27:34 executing program 3: set_mempolicy(0x2, &(0x7f0000000000)=0x9, 0x90) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x4c032, 0xffffffffffffffff, 0xb700000000000000) [ 702.232477] FAULT_INJECTION: forcing a failure. [ 702.232477] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 702.275709] CPU: 1 PID: 18759 Comm: syz-executor.2 Not tainted 4.19.167-syzkaller #0 [ 702.283630] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 702.292991] Call Trace: [ 702.295594] dump_stack+0x1fc/0x2fe [ 702.299245] should_fail.cold+0xa/0x14 [ 702.303156] ? setup_fault_attr+0x200/0x200 [ 702.307500] __alloc_pages_nodemask+0x239/0x2890 [ 702.312278] ? kasan_kmalloc+0x139/0x160 [ 702.316344] ? __kmalloc_node+0x4c/0x70 [ 702.320315] ? blk_mq_alloc_rq_map+0x120/0x230 19:27:34 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xe7030000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="02000000030000000400000030000f000300040000000000000000000f008ec4", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000e1f4655fe2f4655fe2f4655f000000000000040008", 0x1d, 0x4200}, {&(0x7f0000012700)="20000000d4c49a2e07", 0x9, 0x4280}], 0x0, &(0x7f0000013a00)) 19:27:34 executing program 3: set_mempolicy(0x2, &(0x7f0000000000)=0x9, 0x90) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x4c032, 0xffffffffffffffff, 0xb701000000000000) [ 702.324889] ? blk_mq_init_sched+0x219/0x730 [ 702.329283] ? elevator_init_mq+0xcd/0x160 [ 702.333536] ? blk_mq_init_allocated_queue+0xe1f/0x1300 [ 702.339259] ? blk_mq_init_queue+0x5c/0xa0 [ 702.343503] ? loop_add+0x2cb/0x8a0 [ 702.347135] ? ksys_ioctl+0x9b/0xc0 [ 702.350768] ? __x64_sys_ioctl+0x6f/0xb0 [ 702.354833] ? do_syscall_64+0xf9/0x620 [ 702.358922] ? should_fail+0x142/0x7b0 [ 702.363246] ? fs_reclaim_release+0xd0/0x110 [ 702.367667] ? gfp_pfmemalloc_allowed+0x150/0x150 [ 702.372513] ? setup_fault_attr+0x200/0x200 [ 702.376841] ? lock_acquire+0x170/0x3c0 [ 702.380855] ? check_preemption_disabled+0x41/0x280 [ 702.385884] ? should_fail+0x142/0x7b0 [ 702.389759] ? setup_fault_attr+0x200/0x200 [ 702.394586] ? __lockdep_init_map+0x100/0x5a0 [ 702.399094] ? find_next_bit+0x105/0x130 [ 702.403144] ? __cpu_to_node+0x7b/0xa0 [ 702.407015] ? blk_mq_hw_queue_to_node+0xc1/0x100 [ 702.411843] blk_mq_alloc_rqs+0x242/0x800 [ 702.415992] ? blk_mq_alloc_rq_map+0xaa/0x230 [ 702.420487] blk_mq_init_sched+0x26c/0x730 [ 702.424723] elevator_init_mq+0xcd/0x160 [ 702.428777] blk_mq_init_allocated_queue+0xe1f/0x1300 [ 702.433977] blk_mq_init_queue+0x5c/0xa0 [ 702.438042] loop_add+0x2cb/0x8a0 [ 702.441496] loop_control_ioctl+0x16c/0x480 [ 702.445826] ? loop_lookup+0x1d0/0x1d0 [ 702.449699] ? ksys_write+0x241/0x2a0 [ 702.453501] ? loop_lookup+0x1d0/0x1d0 [ 702.457380] do_vfs_ioctl+0xcdb/0x12e0 [ 702.461276] ? lock_downgrade+0x720/0x720 [ 702.465404] ? check_preemption_disabled+0x41/0x280 [ 702.470405] ? ioctl_preallocate+0x200/0x200 [ 702.474800] ? __fget+0x356/0x510 [ 702.478235] ? do_dup2+0x450/0x450 [ 702.481759] ? vfs_write+0x393/0x540 [ 702.485456] ? fput+0x2b/0x190 [ 702.488723] ksys_ioctl+0x9b/0xc0 [ 702.492179] __x64_sys_ioctl+0x6f/0xb0 [ 702.496052] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 702.500646] do_syscall_64+0xf9/0x620 [ 702.504441] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 702.509623] RIP: 0033:0x45e219 19:27:34 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xd3030000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="02000000030000000400000030000f000300040000000000000000000f008ec4", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000e1f4655fe2f4655fe2f4655f000000000000040008", 0x1d, 0x4200}, {&(0x7f0000012700)="20000000d4c49a2e07", 0x9, 0x4280}], 0x0, &(0x7f0000013a00)) 19:27:34 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)=ANY=[@ANYBLOB="300000001000070100dd2174ffff27de00000000", @ANYRES32=0x0, @ANYBLOB="00000000000000002c0c1b00000000000500100005"], 0x30}}, 0x0) [ 702.512799] Code: 0d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 702.531817] RSP: 002b:00007f1b82d38c68 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 702.539520] RAX: ffffffffffffffda RBX: 0000000000000009 RCX: 000000000045e219 [ 702.546774] RDX: 0000000000000000 RSI: 0000000000004c80 RDI: 0000000000000007 [ 702.554025] RBP: 00007f1b82d38ca0 R08: 0000000000000000 R09: 0000000000000000 [ 702.561281] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000029 [ 702.568541] R13: 00007ffca1b4a27f R14: 00007f1b82d399c0 R15: 000000000119bf8c 19:27:34 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xe8000000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="02000000030000000400000030000f000300040000000000000000000f008ec4", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000e1f4655fe2f4655fe2f4655f000000000000040008", 0x1d, 0x4200}, {&(0x7f0000012700)="20000000d4c49a2e07", 0x9, 0x4280}], 0x0, &(0x7f0000013a00)) 19:27:34 executing program 2 (fault-call:13 fault-nth:42): perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0xb6, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8020}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x0, 0x0) r3 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000180)='/dev/hwrng\x00', 0x0, 0x0) read$FUSE(r3, &(0x7f0000000700), 0xfce3) ioctl$BLKPG(r3, 0x1269, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0}) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) socket(0x1d, 0x80000, 0x1) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000540)=0x14) r5 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r5, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000280)=ANY=[@ANYBLOB="3000000024000b0f00"/20, @ANYRES32=r4, @ANYBLOB="ff00000000000000000000e4070001007069650004700200df329e91a7001df00e69c06a95499c88a548ce06aac2a1ea1277d7eef90367edad25e73c20eda73114b9fd2461b6b35fb5262900ff9e"], 0x30}}, 0x0) [ 702.748937] EXT4-fs (loop5): corrupt root inode, run e2fsck [ 702.768186] EXT4-fs (loop5): mount failed 19:27:34 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)=ANY=[@ANYBLOB="300000001000070100dd2174ffff27de00000000", @ANYRES32=0x0, @ANYBLOB="0000000000000000300c1b00000000000500100005"], 0x30}}, 0x0) [ 702.813288] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue 19:27:34 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xac000000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="02000000030000000400000030000f000300040000000000000000000f008ec4", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000e1f4655fe2f4655fe2f4655f00000000000004", 0x1b, 0x4200}, {&(0x7f0000012700)="20000000d4c49a2e07", 0x9, 0x4280}], 0x0, &(0x7f0000013a00)) 19:27:34 executing program 3: set_mempolicy(0x2, &(0x7f0000000000)=0x9, 0x90) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x4c032, 0xffffffffffffffff, 0xb800000000000000) 19:27:34 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xe8010000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="02000000030000000400000030000f000300040000000000000000000f008ec4", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000e1f4655fe2f4655fe2f4655f000000000000040008", 0x1d, 0x4200}, {&(0x7f0000012700)="20000000d4c49a2e07", 0x9, 0x4280}], 0x0, &(0x7f0000013a00)) 19:27:35 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xd4000000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="02000000030000000400000030000f000300040000000000000000000f008ec4", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000e1f4655fe2f4655fe2f4655f000000000000040008", 0x1d, 0x4200}, {&(0x7f0000012700)="20000000d4c49a2e07", 0x9, 0x4280}], 0x0, &(0x7f0000013a00)) 19:27:35 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)=ANY=[@ANYBLOB="300000001000070100dd2174ffff27de00000000", @ANYRES32=0x0, @ANYBLOB="0000000000000000340c1b00000000000500100005"], 0x30}}, 0x0) 19:27:35 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xe8020000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="02000000030000000400000030000f000300040000000000000000000f008ec4", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000e1f4655fe2f4655fe2f4655f000000000000040008", 0x1d, 0x4200}, {&(0x7f0000012700)="20000000d4c49a2e07", 0x9, 0x4280}], 0x0, &(0x7f0000013a00)) 19:27:35 executing program 3: set_mempolicy(0x2, &(0x7f0000000000)=0x9, 0x90) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x4c032, 0xffffffffffffffff, 0xb801000000000000) 19:27:35 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xe8030000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="02000000030000000400000030000f000300040000000000000000000f008ec4", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000e1f4655fe2f4655fe2f4655f000000000000040008", 0x1d, 0x4200}, {&(0x7f0000012700)="20000000d4c49a2e07", 0x9, 0x4280}], 0x0, &(0x7f0000013a00)) 19:27:35 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)=ANY=[@ANYBLOB="300000001000070100dd2174ffff27de00000000", @ANYRES32=0x0, @ANYBLOB="0000000000000000380c1b00000000000500100005"], 0x30}}, 0x0) [ 703.190977] FAULT_INJECTION: forcing a failure. [ 703.190977] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 703.214445] CPU: 0 PID: 18809 Comm: syz-executor.2 Not tainted 4.19.167-syzkaller #0 [ 703.222370] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 703.231733] Call Trace: [ 703.234333] dump_stack+0x1fc/0x2fe 19:27:35 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xe9000000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="02000000030000000400000030000f000300040000000000000000000f008ec4", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000e1f4655fe2f4655fe2f4655f000000000000040008", 0x1d, 0x4200}, {&(0x7f0000012700)="20000000d4c49a2e07", 0x9, 0x4280}], 0x0, &(0x7f0000013a00)) [ 703.237980] should_fail.cold+0xa/0x14 [ 703.241879] ? setup_fault_attr+0x200/0x200 [ 703.246221] __alloc_pages_nodemask+0x239/0x2890 [ 703.251000] ? kasan_kmalloc+0x139/0x160 [ 703.255067] ? __kmalloc_node+0x4c/0x70 [ 703.259048] ? blk_mq_alloc_rq_map+0x120/0x230 [ 703.263634] ? blk_mq_init_sched+0x219/0x730 [ 703.268048] ? elevator_init_mq+0xcd/0x160 [ 703.272312] ? blk_mq_init_allocated_queue+0xe1f/0x1300 [ 703.277679] ? blk_mq_init_queue+0x5c/0xa0 [ 703.281911] ? loop_add+0x2cb/0x8a0 [ 703.285523] ? ksys_ioctl+0x9b/0xc0 [ 703.289141] ? should_fail+0x142/0x7b0 [ 703.293012] ? fs_reclaim_release+0xd0/0x110 [ 703.297404] ? gfp_pfmemalloc_allowed+0x150/0x150 [ 703.302229] ? cache_alloc_refill+0x1da/0x340 [ 703.306713] ? should_fail+0x142/0x7b0 [ 703.310588] ? setup_fault_attr+0x200/0x200 [ 703.315034] ? find_next_bit+0x105/0x130 [ 703.319110] ? __cpu_to_node+0x7b/0xa0 [ 703.322998] blk_mq_alloc_rqs+0x242/0x800 [ 703.327143] blk_mq_init_sched+0x26c/0x730 [ 703.331376] elevator_init_mq+0xcd/0x160 [ 703.335627] blk_mq_init_allocated_queue+0xe1f/0x1300 [ 703.340830] blk_mq_init_queue+0x5c/0xa0 [ 703.344900] loop_add+0x2cb/0x8a0 [ 703.348346] loop_control_ioctl+0x16c/0x480 [ 703.352654] ? loop_lookup+0x1d0/0x1d0 [ 703.356532] ? ksys_write+0x241/0x2a0 [ 703.360330] ? loop_lookup+0x1d0/0x1d0 [ 703.364202] do_vfs_ioctl+0xcdb/0x12e0 [ 703.368088] ? lock_downgrade+0x720/0x720 [ 703.372217] ? check_preemption_disabled+0x41/0x280 [ 703.377216] ? ioctl_preallocate+0x200/0x200 [ 703.381607] ? __fget+0x356/0x510 [ 703.385060] ? do_dup2+0x450/0x450 [ 703.388593] ? vfs_write+0x393/0x540 [ 703.392462] ? fput+0x2b/0x190 [ 703.395641] ksys_ioctl+0x9b/0xc0 [ 703.399097] __x64_sys_ioctl+0x6f/0xb0 [ 703.403002] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 703.407581] do_syscall_64+0xf9/0x620 [ 703.411369] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 703.416558] RIP: 0033:0x45e219 [ 703.419742] Code: 0d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 703.438632] RSP: 002b:00007f1b82d38c68 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 703.446321] RAX: ffffffffffffffda RBX: 0000000000000009 RCX: 000000000045e219 [ 703.453695] RDX: 0000000000000000 RSI: 0000000000004c80 RDI: 0000000000000007 [ 703.464421] RBP: 00007f1b82d38ca0 R08: 0000000000000000 R09: 0000000000000000 [ 703.471682] R10: 0000000000000000 R11: 0000000000000246 R12: 000000000000002a [ 703.478941] R13: 00007ffca1b4a27f R14: 00007f1b82d399c0 R15: 000000000119bf8c [ 703.566742] EXT4-fs (loop5): corrupt root inode, run e2fsck [ 703.587139] EXT4-fs (loop5): mount failed 19:27:35 executing program 2 (fault-call:13 fault-nth:43): perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0xb6, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8020}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x0, 0x0) r3 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000180)='/dev/hwrng\x00', 0x0, 0x0) read$FUSE(r3, &(0x7f0000000700), 0xfce3) ioctl$BLKPG(r3, 0x1269, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0}) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) socket(0x1d, 0x80000, 0x1) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000540)=0x14) r5 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r5, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000280)=ANY=[@ANYBLOB="3000000024000b0f00"/20, @ANYRES32=r4, @ANYBLOB="ff00000000000000000000e4070001007069650004700200df329e91a7001df00e69c06a95499c88a548ce06aac2a1ea1277d7eef90367edad25e73c20eda73114b9fd2461b6b35fb5262900ff9e"], 0x30}}, 0x0) 19:27:35 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xe9010000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="02000000030000000400000030000f000300040000000000000000000f008ec4", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000e1f4655fe2f4655fe2f4655f000000000000040008", 0x1d, 0x4200}, {&(0x7f0000012700)="20000000d4c49a2e07", 0x9, 0x4280}], 0x0, &(0x7f0000013a00)) 19:27:35 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xac010000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="02000000030000000400000030000f000300040000000000000000000f008ec4", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000e1f4655fe2f4655fe2f4655f00000000000004", 0x1b, 0x4200}, {&(0x7f0000012700)="20000000d4c49a2e07", 0x9, 0x4280}], 0x0, &(0x7f0000013a00)) 19:27:35 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)=ANY=[@ANYBLOB="300000001000070100dd2174ffff27de00000000", @ANYRES32=0x0, @ANYBLOB="00000000000000003c0c1b00000000000500100005"], 0x30}}, 0x0) 19:27:35 executing program 3: set_mempolicy(0x2, &(0x7f0000000000)=0x9, 0x90) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x4c032, 0xffffffffffffffff, 0xb900000000000000) [ 703.636908] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue 19:27:35 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xd4010000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="02000000030000000400000030000f000300040000000000000000000f008ec4", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000e1f4655fe2f4655fe2f4655f000000000000040008", 0x1d, 0x4200}, {&(0x7f0000012700)="20000000d4c49a2e07", 0x9, 0x4280}], 0x0, &(0x7f0000013a00)) 19:27:35 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xe9020000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="02000000030000000400000030000f000300040000000000000000000f008ec4", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000e1f4655fe2f4655fe2f4655f000000000000040008", 0x1d, 0x4200}, {&(0x7f0000012700)="20000000d4c49a2e07", 0x9, 0x4280}], 0x0, &(0x7f0000013a00)) 19:27:35 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)=ANY=[@ANYBLOB="300000001000070100dd2174ffff27de00000000", @ANYRES32=0x0, @ANYBLOB="0000000000000000400c1b00000000000500100005"], 0x30}}, 0x0) 19:27:35 executing program 3: set_mempolicy(0x2, &(0x7f0000000000)=0x9, 0x90) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x4c032, 0xffffffffffffffff, 0xb901000000000000) 19:27:35 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xe9030000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="02000000030000000400000030000f000300040000000000000000000f008ec4", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000e1f4655fe2f4655fe2f4655f000000000000040008", 0x1d, 0x4200}, {&(0x7f0000012700)="20000000d4c49a2e07", 0x9, 0x4280}], 0x0, &(0x7f0000013a00)) [ 703.833328] EXT4-fs (loop5): corrupt root inode, run e2fsck [ 703.861861] EXT4-fs (loop5): mount failed 19:27:35 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xea000000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="02000000030000000400000030000f000300040000000000000000000f008ec4", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000e1f4655fe2f4655fe2f4655f000000000000040008", 0x1d, 0x4200}, {&(0x7f0000012700)="20000000d4c49a2e07", 0x9, 0x4280}], 0x0, &(0x7f0000013a00)) 19:27:36 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)=ANY=[@ANYBLOB="300000001000070100dd2174ffff27de00000000", @ANYRES32=0x0, @ANYBLOB="0000000000000000440c1b00000000000500100005"], 0x30}}, 0x0) [ 703.951121] nla_parse: 14 callbacks suppressed [ 703.951131] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.0'. [ 704.044896] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.0'. [ 704.101603] FAULT_INJECTION: forcing a failure. [ 704.101603] name failslab, interval 1, probability 0, space 0, times 0 [ 704.122589] CPU: 1 PID: 18859 Comm: syz-executor.2 Not tainted 4.19.167-syzkaller #0 [ 704.130539] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 704.139900] Call Trace: [ 704.142493] dump_stack+0x1fc/0x2fe [ 704.146111] should_fail.cold+0xa/0x14 [ 704.149998] ? setup_fault_attr+0x200/0x200 [ 704.154363] ? lock_acquire+0x170/0x3c0 [ 704.158325] __should_failslab+0x115/0x180 [ 704.162545] should_failslab+0x5/0xf [ 704.166247] kmem_cache_alloc_node_trace+0x244/0x3b0 [ 704.171473] elevator_alloc+0x7a/0x200 [ 704.175377] dd_init_queue+0x20/0x430 [ 704.179166] blk_mq_init_sched+0x395/0x730 [ 704.183409] elevator_init_mq+0xcd/0x160 [ 704.187465] blk_mq_init_allocated_queue+0xe1f/0x1300 [ 704.192662] blk_mq_init_queue+0x5c/0xa0 [ 704.196720] loop_add+0x2cb/0x8a0 [ 704.200160] loop_control_ioctl+0x16c/0x480 [ 704.204471] ? loop_lookup+0x1d0/0x1d0 [ 704.208376] ? ksys_write+0x241/0x2a0 [ 704.212188] ? loop_lookup+0x1d0/0x1d0 [ 704.216080] do_vfs_ioctl+0xcdb/0x12e0 [ 704.219951] ? lock_downgrade+0x720/0x720 [ 704.224079] ? check_preemption_disabled+0x41/0x280 [ 704.229076] ? ioctl_preallocate+0x200/0x200 [ 704.233481] ? __fget+0x356/0x510 [ 704.236928] ? do_dup2+0x450/0x450 [ 704.240452] ? vfs_write+0x393/0x540 [ 704.244147] ? fput+0x2b/0x190 [ 704.247326] ksys_ioctl+0x9b/0xc0 [ 704.250777] __x64_sys_ioctl+0x6f/0xb0 [ 704.254656] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 704.259229] do_syscall_64+0xf9/0x620 [ 704.263022] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 704.268190] RIP: 0033:0x45e219 [ 704.271376] Code: 0d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 704.290277] RSP: 002b:00007f1b82d38c68 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 19:27:36 executing program 2 (fault-call:13 fault-nth:44): perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0xb6, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8020}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x0, 0x0) r3 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000180)='/dev/hwrng\x00', 0x0, 0x0) read$FUSE(r3, &(0x7f0000000700), 0xfce3) ioctl$BLKPG(r3, 0x1269, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0}) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) socket(0x1d, 0x80000, 0x1) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000540)=0x14) r5 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r5, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000280)=ANY=[@ANYBLOB="3000000024000b0f00"/20, @ANYRES32=r4, @ANYBLOB="ff00000000000000000000e4070001007069650004700200df329e91a7001df00e69c06a95499c88a548ce06aac2a1ea1277d7eef90367edad25e73c20eda73114b9fd2461b6b35fb5262900ff9e"], 0x30}}, 0x0) 19:27:36 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xea010000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="02000000030000000400000030000f000300040000000000000000000f008ec4", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000e1f4655fe2f4655fe2f4655f000000000000040008", 0x1d, 0x4200}, {&(0x7f0000012700)="20000000d4c49a2e07", 0x9, 0x4280}], 0x0, &(0x7f0000013a00)) [ 704.297999] RAX: ffffffffffffffda RBX: 0000000000000009 RCX: 000000000045e219 [ 704.305261] RDX: 0000000000000000 RSI: 0000000000004c80 RDI: 0000000000000007 [ 704.312525] RBP: 00007f1b82d38ca0 R08: 0000000000000000 R09: 0000000000000000 [ 704.319867] R10: 0000000000000000 R11: 0000000000000246 R12: 000000000000002b [ 704.327149] R13: 00007ffca1b4a27f R14: 00007f1b82d399c0 R15: 000000000119bf8c 19:27:36 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)=ANY=[@ANYBLOB="300000001000070100dd2174ffff27de00000000", @ANYRES32=0x0, @ANYBLOB="0000000000000000480c1b00000000000500100005"], 0x30}}, 0x0) 19:27:36 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xac020000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="02000000030000000400000030000f000300040000000000000000000f008ec4", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000e1f4655fe2f4655fe2f4655f00000000000004", 0x1b, 0x4200}, {&(0x7f0000012700)="20000000d4c49a2e07", 0x9, 0x4280}], 0x0, &(0x7f0000013a00)) 19:27:36 executing program 3: set_mempolicy(0x2, &(0x7f0000000000)=0x9, 0x90) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x4c032, 0xffffffffffffffff, 0xba00000000000000) [ 704.401165] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue 19:27:36 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xd4020000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="02000000030000000400000030000f000300040000000000000000000f008ec4", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000e1f4655fe2f4655fe2f4655f000000000000040008", 0x1d, 0x4200}, {&(0x7f0000012700)="20000000d4c49a2e07", 0x9, 0x4280}], 0x0, &(0x7f0000013a00)) 19:27:36 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xea020000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="02000000030000000400000030000f000300040000000000000000000f008ec4", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000e1f4655fe2f4655fe2f4655f000000000000040008", 0x1d, 0x4200}, {&(0x7f0000012700)="20000000d4c49a2e07", 0x9, 0x4280}], 0x0, &(0x7f0000013a00)) [ 704.508388] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.0'. 19:27:36 executing program 3: set_mempolicy(0x2, &(0x7f0000000000)=0x9, 0x90) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x4c032, 0xffffffffffffffff, 0xba01000000000000) 19:27:36 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)=ANY=[@ANYBLOB="300000001000070100dd2174ffff27de00000000", @ANYRES32=0x0, @ANYBLOB="00000000000000004c0c1b00000000000500100005"], 0x30}}, 0x0) 19:27:36 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xea030000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="02000000030000000400000030000f000300040000000000000000000f008ec4", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000e1f4655fe2f4655fe2f4655f000000000000040008", 0x1d, 0x4200}, {&(0x7f0000012700)="20000000d4c49a2e07", 0x9, 0x4280}], 0x0, &(0x7f0000013a00)) [ 704.595975] EXT4-fs (loop5): corrupt root inode, run e2fsck [ 704.611697] EXT4-fs (loop5): mount failed 19:27:36 executing program 3: set_mempolicy(0x2, &(0x7f0000000000)=0x9, 0x90) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x4c032, 0xffffffffffffffff, 0xbb00000000000000) [ 704.655542] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.0'. [ 704.684849] FAULT_INJECTION: forcing a failure. [ 704.684849] name failslab, interval 1, probability 0, space 0, times 0 19:27:36 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)=ANY=[@ANYBLOB="300000001000070100dd2174ffff27de00000000", @ANYRES32=0x0, @ANYBLOB="0000000000000000500c1b00000000000500100005"], 0x30}}, 0x0) [ 704.741881] CPU: 0 PID: 18912 Comm: syz-executor.2 Not tainted 4.19.167-syzkaller #0 [ 704.749789] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 704.759164] Call Trace: [ 704.761768] dump_stack+0x1fc/0x2fe [ 704.765420] should_fail.cold+0xa/0x14 [ 704.769318] ? setup_fault_attr+0x200/0x200 [ 704.772259] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.0'. [ 704.773660] __should_failslab+0x115/0x180 [ 704.773678] should_failslab+0x5/0xf [ 704.773692] kmem_cache_alloc_node_trace+0x244/0x3b0 [ 704.773711] dd_init_queue+0x94/0x430 [ 704.799541] blk_mq_init_sched+0x395/0x730 [ 704.803789] elevator_init_mq+0xcd/0x160 [ 704.807859] blk_mq_init_allocated_queue+0xe1f/0x1300 [ 704.813069] blk_mq_init_queue+0x5c/0xa0 [ 704.817137] loop_add+0x2cb/0x8a0 [ 704.820615] loop_control_ioctl+0x16c/0x480 [ 704.824946] ? loop_lookup+0x1d0/0x1d0 [ 704.828843] ? mark_held_locks+0xa6/0xf0 [ 704.832902] ? ksys_write+0x241/0x2a0 [ 704.836692] ? loop_lookup+0x1d0/0x1d0 [ 704.840577] do_vfs_ioctl+0xcdb/0x12e0 [ 704.844459] ? lock_downgrade+0x720/0x720 [ 704.848894] ? check_preemption_disabled+0x41/0x280 [ 704.853907] ? ioctl_preallocate+0x200/0x200 [ 704.858334] ? __fget+0x356/0x510 [ 704.861793] ? do_dup2+0x450/0x450 [ 704.865326] ? vfs_write+0x393/0x540 [ 704.869050] ? fput+0x2b/0x190 [ 704.872230] ksys_ioctl+0x9b/0xc0 [ 704.875669] __x64_sys_ioctl+0x6f/0xb0 [ 704.879561] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 704.884144] do_syscall_64+0xf9/0x620 [ 704.887944] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 704.893354] RIP: 0033:0x45e219 [ 704.896564] Code: 0d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 704.915473] RSP: 002b:00007f1b82d17c68 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 704.923209] RAX: ffffffffffffffda RBX: 0000000000000009 RCX: 000000000045e219 [ 704.930477] RDX: 0000000000000000 RSI: 0000000000004c80 RDI: 0000000000000007 [ 704.937734] RBP: 00007f1b82d17ca0 R08: 0000000000000000 R09: 0000000000000000 [ 704.944990] R10: 0000000000000000 R11: 0000000000000246 R12: 000000000000002c [ 704.952243] R13: 00007ffca1b4a27f R14: 00007f1b82d189c0 R15: 000000000119c034 19:27:37 executing program 2 (fault-call:13 fault-nth:45): perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0xb6, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8020}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x0, 0x0) r3 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000180)='/dev/hwrng\x00', 0x0, 0x0) read$FUSE(r3, &(0x7f0000000700), 0xfce3) ioctl$BLKPG(r3, 0x1269, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0}) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) socket(0x1d, 0x80000, 0x1) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000540)=0x14) r5 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r5, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000280)=ANY=[@ANYBLOB="3000000024000b0f00"/20, @ANYRES32=r4, @ANYBLOB="ff00000000000000000000e4070001007069650004700200df329e91a7001df00e69c06a95499c88a548ce06aac2a1ea1277d7eef90367edad25e73c20eda73114b9fd2461b6b35fb5262900ff9e"], 0x30}}, 0x0) 19:27:37 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)=ANY=[@ANYBLOB="300000001000070100dd2174ffff27de00000000", @ANYRES32=0x0, @ANYBLOB="0000000000000000540c1b00000000000500100005"], 0x30}}, 0x0) 19:27:37 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xeb000000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="02000000030000000400000030000f000300040000000000000000000f008ec4", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000e1f4655fe2f4655fe2f4655f000000000000040008", 0x1d, 0x4200}, {&(0x7f0000012700)="20000000d4c49a2e07", 0x9, 0x4280}], 0x0, &(0x7f0000013a00)) [ 705.078168] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue [ 705.096576] EXT4-fs (loop5): corrupt root inode, run e2fsck [ 705.102595] EXT4-fs (loop5): mount failed [ 705.137680] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.0'. 19:27:37 executing program 3: set_mempolicy(0x2, &(0x7f0000000000)=0x9, 0x90) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x4c032, 0xffffffffffffffff, 0xbb01000000000000) 19:27:37 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xd4030000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="02000000030000000400000030000f000300040000000000000000000f008ec4", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000e1f4655fe2f4655fe2f4655f000000000000040008", 0x1d, 0x4200}, {&(0x7f0000012700)="20000000d4c49a2e07", 0x9, 0x4280}], 0x0, &(0x7f0000013a00)) 19:27:37 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xac030000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="02000000030000000400000030000f000300040000000000000000000f008ec4", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000e1f4655fe2f4655fe2f4655f00000000000004", 0x1b, 0x4200}, {&(0x7f0000012700)="20000000d4c49a2e07", 0x9, 0x4280}], 0x0, &(0x7f0000013a00)) 19:27:37 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xeb010000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="02000000030000000400000030000f000300040000000000000000000f008ec4", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000e1f4655fe2f4655fe2f4655f000000000000040008", 0x1d, 0x4200}, {&(0x7f0000012700)="20000000d4c49a2e07", 0x9, 0x4280}], 0x0, &(0x7f0000013a00)) 19:27:37 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)=ANY=[@ANYBLOB="300000001000070100dd2174ffff27de00000000", @ANYRES32=0x0, @ANYBLOB="0000000000000000580c1b00000000000500100005"], 0x30}}, 0x0) 19:27:37 executing program 3: set_mempolicy(0x2, &(0x7f0000000000)=0x9, 0x90) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x4c032, 0xffffffffffffffff, 0xbc00000000000000) 19:27:37 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xeb020000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="02000000030000000400000030000f000300040000000000000000000f008ec4", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000e1f4655fe2f4655fe2f4655f000000000000040008", 0x1d, 0x4200}, {&(0x7f0000012700)="20000000d4c49a2e07", 0x9, 0x4280}], 0x0, &(0x7f0000013a00)) [ 705.344473] FAULT_INJECTION: forcing a failure. [ 705.344473] name failslab, interval 1, probability 0, space 0, times 0 [ 705.364909] CPU: 1 PID: 18943 Comm: syz-executor.2 Not tainted 4.19.167-syzkaller #0 [ 705.372840] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 705.382201] Call Trace: [ 705.384808] dump_stack+0x1fc/0x2fe [ 705.388466] should_fail.cold+0xa/0x14 19:27:37 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)=ANY=[@ANYBLOB="300000001000070100dd2174ffff27de00000000", @ANYRES32=0x0, @ANYBLOB="00000000000000005c0c1b00000000000500100005"], 0x30}}, 0x0) [ 705.392368] ? setup_fault_attr+0x200/0x200 [ 705.396714] __should_failslab+0x115/0x180 [ 705.400966] should_failslab+0x5/0xf [ 705.404693] kmem_cache_alloc_node_trace+0x244/0x3b0 [ 705.409808] __alloc_disk_node+0x69/0x410 [ 705.411987] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.0'. [ 705.413962] loop_add+0x39c/0x8a0 [ 705.413985] loop_control_ioctl+0x16c/0x480 [ 705.413998] ? loop_lookup+0x1d0/0x1d0 [ 705.414014] ? lock_downgrade+0x720/0x720 [ 705.438475] ? rcu_read_unlock_special+0x4ce/0xfc0 19:27:37 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)=ANY=[@ANYBLOB="300000001000070100dd2174ffff27de00000000", @ANYRES32=0x0, @ANYBLOB="0000000000000000600c1b00000000000500100005"], 0x30}}, 0x0) [ 705.443417] ? _raw_spin_unlock_irqrestore+0x79/0xe0 [ 705.448537] ? loop_lookup+0x1d0/0x1d0 [ 705.452434] do_vfs_ioctl+0xcdb/0x12e0 [ 705.456338] ? lock_downgrade+0x720/0x720 [ 705.460494] ? ioctl_preallocate+0x200/0x200 [ 705.464916] ? __fget+0x356/0x510 [ 705.468382] ? do_dup2+0x450/0x450 [ 705.471932] ? rcu_nmi_exit+0xb3/0x180 [ 705.475835] ksys_ioctl+0x9b/0xc0 [ 705.479306] __x64_sys_ioctl+0x6f/0xb0 [ 705.483201] do_syscall_64+0xf9/0x620 [ 705.486792] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.0'. [ 705.487006] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 705.487021] RIP: 0033:0x45e219 [ 705.503994] Code: 0d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 705.522902] RSP: 002b:00007f1b82d17c68 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 705.530630] RAX: ffffffffffffffda RBX: 0000000000000009 RCX: 000000000045e219 [ 705.537911] RDX: 0000000000000000 RSI: 0000000000004c80 RDI: 0000000000000007 [ 705.545177] RBP: 00007f1b82d17ca0 R08: 0000000000000000 R09: 0000000000000000 [ 705.552430] R10: 0000000000000000 R11: 0000000000000246 R12: 000000000000002d [ 705.559711] R13: 00007ffca1b4a27f R14: 00007f1b82d189c0 R15: 000000000119c034 19:27:37 executing program 2 (fault-call:13 fault-nth:46): perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0xb6, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8020}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x0, 0x0) r3 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000180)='/dev/hwrng\x00', 0x0, 0x0) read$FUSE(r3, &(0x7f0000000700), 0xfce3) ioctl$BLKPG(r3, 0x1269, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0}) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) socket(0x1d, 0x80000, 0x1) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000540)=0x14) r5 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r5, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000280)=ANY=[@ANYBLOB="3000000024000b0f00"/20, @ANYRES32=r4, @ANYBLOB="ff00000000000000000000e4070001007069650004700200df329e91a7001df00e69c06a95499c88a548ce06aac2a1ea1277d7eef90367edad25e73c20eda73114b9fd2461b6b35fb5262900ff9e"], 0x30}}, 0x0) 19:27:37 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)=ANY=[@ANYBLOB="300000001000070100dd2174ffff27de00000000", @ANYRES32=0x0, @ANYBLOB="0000000000000000640c1b00000000000500100005"], 0x30}}, 0x0) 19:27:37 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xeb030000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="02000000030000000400000030000f000300040000000000000000000f008ec4", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000e1f4655fe2f4655fe2f4655f000000000000040008", 0x1d, 0x4200}, {&(0x7f0000012700)="20000000d4c49a2e07", 0x9, 0x4280}], 0x0, &(0x7f0000013a00)) 19:27:37 executing program 3: set_mempolicy(0x2, &(0x7f0000000000)=0x9, 0x90) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x4c032, 0xffffffffffffffff, 0xbc01000000000000) [ 705.622577] EXT4-fs (loop5): corrupt root inode, run e2fsck [ 705.628614] EXT4-fs (loop5): mount failed [ 705.645707] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue [ 705.747149] EXT4-fs (loop5): corrupt root inode, run e2fsck [ 705.784816] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.0'. 19:27:37 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xec000000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="02000000030000000400000030000f000300040000000000000000000f008ec4", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000e1f4655fe2f4655fe2f4655f000000000000040008", 0x1d, 0x4200}, {&(0x7f0000012700)="20000000d4c49a2e07", 0x9, 0x4280}], 0x0, &(0x7f0000013a00)) [ 705.793638] EXT4-fs (loop5): mount failed 19:27:37 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xad000000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="02000000030000000400000030000f000300040000000000000000000f008ec4", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000e1f4655fe2f4655fe2f4655f00000000000004", 0x1b, 0x4200}, {&(0x7f0000012700)="20000000d4c49a2e07", 0x9, 0x4280}], 0x0, &(0x7f0000013a00)) 19:27:37 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xd5000000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="02000000030000000400000030000f000300040000000000000000000f008ec4", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000e1f4655fe2f4655fe2f4655f000000000000040008", 0x1d, 0x4200}, {&(0x7f0000012700)="20000000d4c49a2e07", 0x9, 0x4280}], 0x0, &(0x7f0000013a00)) 19:27:37 executing program 3: set_mempolicy(0x2, &(0x7f0000000000)=0x9, 0x90) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x4c032, 0xffffffffffffffff, 0xbd00000000000000) 19:27:37 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)=ANY=[@ANYBLOB="300000001000070100dd2174ffff27de00000000", @ANYRES32=0x0, @ANYBLOB="0000000000000000680c1b00000000000500100005"], 0x30}}, 0x0) 19:27:37 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xec010000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="02000000030000000400000030000f000300040000000000000000000f008ec4", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000e1f4655fe2f4655fe2f4655f000000000000040008", 0x1d, 0x4200}, {&(0x7f0000012700)="20000000d4c49a2e07", 0x9, 0x4280}], 0x0, &(0x7f0000013a00)) 19:27:38 executing program 3: set_mempolicy(0x2, &(0x7f0000000000)=0x9, 0x90) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x4c032, 0xffffffffffffffff, 0xbd01000000000000) [ 705.984556] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.0'. [ 705.989158] FAULT_INJECTION: forcing a failure. [ 705.989158] name failslab, interval 1, probability 0, space 0, times 0 [ 706.024818] CPU: 0 PID: 18993 Comm: syz-executor.2 Not tainted 4.19.167-syzkaller #0 [ 706.032724] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 706.042078] Call Trace: [ 706.044683] dump_stack+0x1fc/0x2fe [ 706.048326] should_fail.cold+0xa/0x14 [ 706.052240] ? setup_fault_attr+0x200/0x200 [ 706.056565] ? lock_acquire+0x170/0x3c0 [ 706.060553] __should_failslab+0x115/0x180 [ 706.064797] should_failslab+0x5/0xf [ 706.068520] kmem_cache_alloc_node_trace+0x244/0x3b0 19:27:38 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)=ANY=[@ANYBLOB="300000001000070100dd2174ffff27de00000000", @ANYRES32=0x0, @ANYBLOB="00000000000000006c0c1b00000000000500100005"], 0x30}}, 0x0) [ 706.073636] __kmalloc_node+0x38/0x70 [ 706.077445] disk_expand_part_tbl+0x1b4/0x3a0 [ 706.081954] __alloc_disk_node+0x118/0x410 [ 706.086195] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 706.090783] loop_add+0x39c/0x8a0 [ 706.094297] loop_control_ioctl+0x16c/0x480 [ 706.098612] ? loop_lookup+0x1d0/0x1d0 [ 706.102479] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 706.107043] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 706.111783] ? rcu_nmi_exit+0xb3/0x180 [ 706.115654] ? loop_lookup+0x1d0/0x1d0 [ 706.119589] do_vfs_ioctl+0xcdb/0x12e0 [ 706.123472] ? lock_downgrade+0x720/0x720 [ 706.127682] ? check_preemption_disabled+0x41/0x280 [ 706.132691] ? ioctl_preallocate+0x200/0x200 [ 706.137140] ? __fget+0x356/0x510 [ 706.140607] ? do_dup2+0x450/0x450 [ 706.144136] ? vfs_write+0x393/0x540 [ 706.147832] ? fput+0x2b/0x190 [ 706.151009] ksys_ioctl+0x9b/0xc0 [ 706.154448] __x64_sys_ioctl+0x6f/0xb0 [ 706.158318] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 706.162882] do_syscall_64+0xf9/0x620 [ 706.166666] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 706.171834] RIP: 0033:0x45e219 [ 706.175006] Code: 0d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 706.193887] RSP: 002b:00007f1b82d17c68 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 706.201582] RAX: ffffffffffffffda RBX: 0000000000000009 RCX: 000000000045e219 [ 706.208891] RDX: 0000000000000000 RSI: 0000000000004c80 RDI: 0000000000000007 [ 706.216145] RBP: 00007f1b82d17ca0 R08: 0000000000000000 R09: 0000000000000000 [ 706.223395] R10: 0000000000000000 R11: 0000000000000246 R12: 000000000000002e [ 706.230647] R13: 00007ffca1b4a27f R14: 00007f1b82d189c0 R15: 000000000119c034 19:27:38 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)=ANY=[@ANYBLOB="300000001000070100dd2174ffff27de00000000", @ANYRES32=0x0, @ANYBLOB="0000000000000000700c1b00000000000500100005"], 0x30}}, 0x0) 19:27:38 executing program 2 (fault-call:13 fault-nth:47): perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0xb6, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8020}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x0, 0x0) r3 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000180)='/dev/hwrng\x00', 0x0, 0x0) read$FUSE(r3, &(0x7f0000000700), 0xfce3) ioctl$BLKPG(r3, 0x1269, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0}) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) socket(0x1d, 0x80000, 0x1) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000540)=0x14) r5 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r5, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000280)=ANY=[@ANYBLOB="3000000024000b0f00"/20, @ANYRES32=r4, @ANYBLOB="ff00000000000000000000e4070001007069650004700200df329e91a7001df00e69c06a95499c88a548ce06aac2a1ea1277d7eef90367edad25e73c20eda73114b9fd2461b6b35fb5262900ff9e"], 0x30}}, 0x0) 19:27:38 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xec020000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="02000000030000000400000030000f000300040000000000000000000f008ec4", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000e1f4655fe2f4655fe2f4655f000000000000040008", 0x1d, 0x4200}, {&(0x7f0000012700)="20000000d4c49a2e07", 0x9, 0x4280}], 0x0, &(0x7f0000013a00)) 19:27:38 executing program 3: set_mempolicy(0x2, &(0x7f0000000000)=0x9, 0x90) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x4c032, 0xffffffffffffffff, 0xbe00000000000000) [ 706.340047] EXT4-fs (loop5): corrupt root inode, run e2fsck [ 706.345832] EXT4-fs (loop5): mount failed [ 706.389504] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue 19:27:38 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xad010000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="02000000030000000400000030000f000300040000000000000000000f008ec4", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000e1f4655fe2f4655fe2f4655f00000000000004", 0x1b, 0x4200}, {&(0x7f0000012700)="20000000d4c49a2e07", 0x9, 0x4280}], 0x0, &(0x7f0000013a00)) 19:27:38 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xd5010000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="02000000030000000400000030000f000300040000000000000000000f008ec4", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000e1f4655fe2f4655fe2f4655f000000000000040008", 0x1d, 0x4200}, {&(0x7f0000012700)="20000000d4c49a2e07", 0x9, 0x4280}], 0x0, &(0x7f0000013a00)) 19:27:38 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)=ANY=[@ANYBLOB="300000001000070100dd2174ffff27de00000000", @ANYRES32=0x0, @ANYBLOB="0000000000000000740c1b00000000000500100005"], 0x30}}, 0x0) 19:27:38 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xec030000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="02000000030000000400000030000f000300040000000000000000000f008ec4", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000e1f4655fe2f4655fe2f4655f000000000000040008", 0x1d, 0x4200}, {&(0x7f0000012700)="20000000d4c49a2e07", 0x9, 0x4280}], 0x0, &(0x7f0000013a00)) 19:27:38 executing program 3: set_mempolicy(0x2, &(0x7f0000000000)=0x9, 0x90) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x4c032, 0xffffffffffffffff, 0xbe01000000000000) [ 706.606817] FAULT_INJECTION: forcing a failure. [ 706.606817] name failslab, interval 1, probability 0, space 0, times 0 [ 706.631340] CPU: 0 PID: 19026 Comm: syz-executor.2 Not tainted 4.19.167-syzkaller #0 [ 706.639300] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 706.648651] Call Trace: [ 706.651242] dump_stack+0x1fc/0x2fe 19:27:38 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)=ANY=[@ANYBLOB="300000001000070100dd2174ffff27de00000000", @ANYRES32=0x0, @ANYBLOB="0000000000000000780c1b00000000000500100005"], 0x30}}, 0x0) 19:27:38 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xed000000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="02000000030000000400000030000f000300040000000000000000000f008ec4", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000e1f4655fe2f4655fe2f4655f000000000000040008", 0x1d, 0x4200}, {&(0x7f0000012700)="20000000d4c49a2e07", 0x9, 0x4280}], 0x0, &(0x7f0000013a00)) [ 706.654867] should_fail.cold+0xa/0x14 [ 706.658740] ? setup_fault_attr+0x200/0x200 [ 706.663056] ? lock_acquire+0x170/0x3c0 [ 706.667048] __should_failslab+0x115/0x180 [ 706.671304] should_failslab+0x5/0xf [ 706.675032] kmem_cache_alloc_node_trace+0x244/0x3b0 [ 706.680149] __alloc_disk_node+0x69/0x410 [ 706.684307] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 706.688900] loop_add+0x39c/0x8a0 [ 706.692366] loop_control_ioctl+0x16c/0x480 [ 706.696696] ? loop_lookup+0x1d0/0x1d0 [ 706.700590] ? loop_lookup+0x1d0/0x1d0 19:27:38 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xed010000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="02000000030000000400000030000f000300040000000000000000000f008ec4", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000e1f4655fe2f4655fe2f4655f000000000000040008", 0x1d, 0x4200}, {&(0x7f0000012700)="20000000d4c49a2e07", 0x9, 0x4280}], 0x0, &(0x7f0000013a00)) [ 706.704502] ? loop_lookup+0x1d0/0x1d0 [ 706.708402] do_vfs_ioctl+0xcdb/0x12e0 [ 706.712298] ? lock_downgrade+0x720/0x720 [ 706.716451] ? ioctl_preallocate+0x200/0x200 [ 706.720872] ? __fget+0x356/0x510 [ 706.724333] ? do_dup2+0x450/0x450 [ 706.727875] ? vfs_write+0x393/0x540 [ 706.731592] ? fput+0x2b/0x190 [ 706.734793] ksys_ioctl+0x9b/0xc0 [ 706.738255] __x64_sys_ioctl+0x6f/0xb0 [ 706.742146] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 706.746753] do_syscall_64+0xf9/0x620 [ 706.750562] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 706.755760] RIP: 0033:0x45e219 [ 706.758959] Code: 0d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 706.777858] RSP: 002b:00007f1b82d17c68 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 706.785566] RAX: ffffffffffffffda RBX: 0000000000000009 RCX: 000000000045e219 [ 706.792823] RDX: 0000000000000000 RSI: 0000000000004c80 RDI: 0000000000000007 [ 706.800076] RBP: 00007f1b82d17ca0 R08: 0000000000000000 R09: 0000000000000000 [ 706.807326] R10: 0000000000000000 R11: 0000000000000246 R12: 000000000000002f [ 706.814581] R13: 00007ffca1b4a27f R14: 00007f1b82d189c0 R15: 000000000119c034 19:27:38 executing program 2 (fault-call:13 fault-nth:48): perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0xb6, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8020}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x0, 0x0) r3 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000180)='/dev/hwrng\x00', 0x0, 0x0) read$FUSE(r3, &(0x7f0000000700), 0xfce3) ioctl$BLKPG(r3, 0x1269, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0}) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) socket(0x1d, 0x80000, 0x1) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000540)=0x14) r5 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r5, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000280)=ANY=[@ANYBLOB="3000000024000b0f00"/20, @ANYRES32=r4, @ANYBLOB="ff00000000000000000000e4070001007069650004700200df329e91a7001df00e69c06a95499c88a548ce06aac2a1ea1277d7eef90367edad25e73c20eda73114b9fd2461b6b35fb5262900ff9e"], 0x30}}, 0x0) 19:27:38 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xed020000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="02000000030000000400000030000f000300040000000000000000000f008ec4", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000e1f4655fe2f4655fe2f4655f000000000000040008", 0x1d, 0x4200}, {&(0x7f0000012700)="20000000d4c49a2e07", 0x9, 0x4280}], 0x0, &(0x7f0000013a00)) 19:27:38 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)=ANY=[@ANYBLOB="300000001000070100dd2174ffff27de00000000", @ANYRES32=0x0, @ANYBLOB="00000000000000007c0c1b00000000000500100005"], 0x30}}, 0x0) [ 706.987946] EXT4-fs (loop5): corrupt root inode, run e2fsck [ 706.995543] EXT4-fs (loop5): mount failed [ 706.997797] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue 19:27:39 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xad020000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="02000000030000000400000030000f000300040000000000000000000f008ec4", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000e1f4655fe2f4655fe2f4655f00000000000004", 0x1b, 0x4200}, {&(0x7f0000012700)="20000000d4c49a2e07", 0x9, 0x4280}], 0x0, &(0x7f0000013a00)) 19:27:39 executing program 3: set_mempolicy(0x2, &(0x7f0000000000)=0x9, 0x90) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x4c032, 0xffffffffffffffff, 0xbf00000000000000) 19:27:39 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xd5020000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="02000000030000000400000030000f000300040000000000000000000f008ec4", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000e1f4655fe2f4655fe2f4655f000000000000040008", 0x1d, 0x4200}, {&(0x7f0000012700)="20000000d4c49a2e07", 0x9, 0x4280}], 0x0, &(0x7f0000013a00)) 19:27:39 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xed030000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="02000000030000000400000030000f000300040000000000000000000f008ec4", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000e1f4655fe2f4655fe2f4655f000000000000040008", 0x1d, 0x4200}, {&(0x7f0000012700)="20000000d4c49a2e07", 0x9, 0x4280}], 0x0, &(0x7f0000013a00)) 19:27:39 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)=ANY=[@ANYBLOB="300000001000070100dd2174ffff27de00000000", @ANYRES32=0x0, @ANYBLOB="0000000000000000800c1b00000000000500100005"], 0x30}}, 0x0) [ 707.197305] EXT4-fs (loop5): corrupt root inode, run e2fsck 19:27:39 executing program 3: set_mempolicy(0x2, &(0x7f0000000000)=0x9, 0x90) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x4c032, 0xffffffffffffffff, 0xbf01000000000000) [ 707.247832] FAULT_INJECTION: forcing a failure. [ 707.247832] name failslab, interval 1, probability 0, space 0, times 0 [ 707.250201] EXT4-fs (loop5): mount failed [ 707.291546] CPU: 1 PID: 19067 Comm: syz-executor.2 Not tainted 4.19.167-syzkaller #0 [ 707.299469] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 707.308819] Call Trace: [ 707.311396] dump_stack+0x1fc/0x2fe [ 707.315030] should_fail.cold+0xa/0x14 [ 707.318912] ? setup_fault_attr+0x200/0x200 [ 707.323218] ? lock_acquire+0x1ec/0x3c0 [ 707.327283] __should_failslab+0x115/0x180 [ 707.331551] should_failslab+0x5/0xf [ 707.335248] kmem_cache_alloc_node_trace+0x244/0x3b0 [ 707.340362] __alloc_disk_node+0x69/0x410 [ 707.344543] loop_add+0x39c/0x8a0 [ 707.347980] loop_control_ioctl+0x16c/0x480 [ 707.352288] ? loop_lookup+0x1d0/0x1d0 [ 707.356159] ? ksys_write+0x241/0x2a0 [ 707.359953] ? loop_lookup+0x1d0/0x1d0 [ 707.363857] do_vfs_ioctl+0xcdb/0x12e0 [ 707.367725] ? lock_downgrade+0x720/0x720 [ 707.371853] ? check_preemption_disabled+0x41/0x280 [ 707.376863] ? ioctl_preallocate+0x200/0x200 [ 707.381283] ? __fget+0x356/0x510 [ 707.384732] ? do_dup2+0x450/0x450 [ 707.388252] ? vfs_write+0x393/0x540 [ 707.391959] ? fput+0x2b/0x190 [ 707.395139] ksys_ioctl+0x9b/0xc0 [ 707.398575] __x64_sys_ioctl+0x6f/0xb0 [ 707.402445] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 707.407008] do_syscall_64+0xf9/0x620 [ 707.410807] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 707.415987] RIP: 0033:0x45e219 [ 707.419172] Code: 0d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 707.438067] RSP: 002b:00007f1b82d17c68 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 707.445764] RAX: ffffffffffffffda RBX: 0000000000000009 RCX: 000000000045e219 [ 707.453019] RDX: 0000000000000000 RSI: 0000000000004c80 RDI: 0000000000000007 [ 707.460282] RBP: 00007f1b82d17ca0 R08: 0000000000000000 R09: 0000000000000000 [ 707.467545] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000030 [ 707.474798] R13: 00007ffca1b4a27f R14: 00007f1b82d189c0 R15: 000000000119c034 19:27:39 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)=ANY=[@ANYBLOB="300000001000070100dd2174ffff27de00000000", @ANYRES32=0x0, @ANYBLOB="0000000000000000840c1b00000000000500100005"], 0x30}}, 0x0) 19:27:39 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xee000000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="02000000030000000400000030000f000300040000000000000000000f008ec4", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000e1f4655fe2f4655fe2f4655f000000000000040008", 0x1d, 0x4200}, {&(0x7f0000012700)="20000000d4c49a2e07", 0x9, 0x4280}], 0x0, &(0x7f0000013a00)) 19:27:39 executing program 2 (fault-call:13 fault-nth:49): perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0xb6, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8020}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x0, 0x0) r3 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000180)='/dev/hwrng\x00', 0x0, 0x0) read$FUSE(r3, &(0x7f0000000700), 0xfce3) ioctl$BLKPG(r3, 0x1269, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0}) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) socket(0x1d, 0x80000, 0x1) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000540)=0x14) r5 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r5, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000280)=ANY=[@ANYBLOB="3000000024000b0f00"/20, @ANYRES32=r4, @ANYBLOB="ff00000000000000000000e4070001007069650004700200df329e91a7001df00e69c06a95499c88a548ce06aac2a1ea1277d7eef90367edad25e73c20eda73114b9fd2461b6b35fb5262900ff9e"], 0x30}}, 0x0) 19:27:39 executing program 3: set_mempolicy(0x2, &(0x7f0000000000)=0x9, 0x90) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x4c032, 0xffffffffffffffff, 0xc000000000000000) 19:27:39 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xee010000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="02000000030000000400000030000f000300040000000000000000000f008ec4", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000e1f4655fe2f4655fe2f4655f000000000000040008", 0x1d, 0x4200}, {&(0x7f0000012700)="20000000d4c49a2e07", 0x9, 0x4280}], 0x0, &(0x7f0000013a00)) 19:27:39 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)=ANY=[@ANYBLOB="300000001000070100dd2174ffff27de00000000", @ANYRES32=0x0, @ANYBLOB="0000000000000000880c1b00000000000500100005"], 0x30}}, 0x0) [ 707.684995] EXT4-fs (loop5): corrupt root inode, run e2fsck [ 707.694782] EXT4-fs (loop5): mount failed 19:27:39 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xd5030000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="02000000030000000400000030000f000300040000000000000000000f008ec4", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000e1f4655fe2f4655fe2f4655f000000000000040008", 0x1d, 0x4200}, {&(0x7f0000012700)="20000000d4c49a2e07", 0x9, 0x4280}], 0x0, &(0x7f0000013a00)) 19:27:39 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)=ANY=[@ANYBLOB="300000001000070100dd2174ffff27de00000000", @ANYRES32=0x0, @ANYBLOB="0000000000000000940c1b00000000000500100005"], 0x30}}, 0x0) 19:27:39 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xad030000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="02000000030000000400000030000f000300040000000000000000000f008ec4", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000e1f4655fe2f4655fe2f4655f00000000000004", 0x1b, 0x4200}, {&(0x7f0000012700)="20000000d4c49a2e07", 0x9, 0x4280}], 0x0, &(0x7f0000013a00)) 19:27:39 executing program 3: set_mempolicy(0x2, &(0x7f0000000000)=0x9, 0x90) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x4c032, 0xffffffffffffffff, 0xc001000000000000) 19:27:39 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xee020000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="02000000030000000400000030000f000300040000000000000000000f008ec4", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000e1f4655fe2f4655fe2f4655f000000000000040008", 0x1d, 0x4200}, {&(0x7f0000012700)="20000000d4c49a2e07", 0x9, 0x4280}], 0x0, &(0x7f0000013a00)) 19:27:39 executing program 3: set_mempolicy(0x2, &(0x7f0000000000)=0x9, 0x90) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x4c032, 0xffffffffffffffff, 0xc100000000000000) 19:27:39 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)=ANY=[@ANYBLOB="300000001000070100dd2174ffff27de00000000", @ANYRES32=0x0, @ANYBLOB="00000000000000009c0c1b00000000000500100005"], 0x30}}, 0x0) 19:27:39 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xee030000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="02000000030000000400000030000f000300040000000000000000000f008ec4", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000e1f4655fe2f4655fe2f4655f000000000000040008", 0x1d, 0x4200}, {&(0x7f0000012700)="20000000d4c49a2e07", 0x9, 0x4280}], 0x0, &(0x7f0000013a00)) [ 707.944142] FAULT_INJECTION: forcing a failure. [ 707.944142] name failslab, interval 1, probability 0, space 0, times 0 [ 707.964373] CPU: 1 PID: 19099 Comm: syz-executor.2 Not tainted 4.19.167-syzkaller #0 [ 707.972385] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 707.981730] Call Trace: [ 707.984337] dump_stack+0x1fc/0x2fe [ 707.987980] should_fail.cold+0xa/0x14 [ 707.991880] ? setup_fault_attr+0x200/0x200 [ 707.996208] ? lock_acquire+0x170/0x3c0 [ 708.000213] __should_failslab+0x115/0x180 [ 708.004507] should_failslab+0x5/0xf [ 708.008222] __kmalloc_track_caller+0x2a6/0x3c0 [ 708.012880] ? kvasprintf_const+0x60/0x190 [ 708.017194] kvasprintf+0xb5/0x150 [ 708.020742] ? bust_spinlocks+0xe0/0xe0 [ 708.024758] ? strchr+0x2c/0xa0 [ 708.028065] kvasprintf_const+0x60/0x190 [ 708.032243] kobject_set_name_vargs+0x56/0x150 [ 708.036811] device_create_groups_vargs+0x1b1/0x270 [ 708.041827] device_create_vargs+0x3a/0x50 [ 708.046062] bdi_register_va.part.0+0x35/0x730 [ 708.050637] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 708.055405] bdi_register+0x12a/0x140 [ 708.059214] ? bdi_register_va+0x80/0x80 [ 708.063280] ? retint_kernel+0x2d/0x2d [ 708.067180] bdi_register_owner+0x59/0x100 [ 708.071416] __device_add_disk+0xcd6/0x1070 [ 708.075767] ? blk_alloc_devt+0x2d0/0x2d0 [ 708.079922] ? device_add_disk+0xe/0x30 [ 708.083894] ? __sanitizer_cov_trace_pc+0x27/0x50 [ 708.088736] loop_add+0x626/0x8a0 [ 708.092192] loop_control_ioctl+0x16c/0x480 [ 708.096500] ? loop_lookup+0x1d0/0x1d0 [ 708.100382] ? retint_kernel+0x2d/0x2d [ 708.104289] ? loop_lookup+0x1d0/0x1d0 [ 708.108193] do_vfs_ioctl+0xcdb/0x12e0 [ 708.112089] ? lock_downgrade+0x720/0x720 [ 708.116229] ? check_preemption_disabled+0x41/0x280 [ 708.121244] ? ioctl_preallocate+0x200/0x200 [ 708.125651] ? __fget+0x356/0x510 [ 708.129101] ? do_dup2+0x450/0x450 [ 708.132642] ? vfs_write+0x393/0x540 [ 708.136356] ? fput+0x2b/0x190 [ 708.139553] ksys_ioctl+0x9b/0xc0 [ 708.143004] __x64_sys_ioctl+0x6f/0xb0 [ 708.146875] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 708.151442] do_syscall_64+0xf9/0x620 [ 708.155229] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 708.160407] RIP: 0033:0x45e219 [ 708.163616] Code: 0d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 708.182535] RSP: 002b:00007f1b82d17c68 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 708.190253] RAX: ffffffffffffffda RBX: 0000000000000009 RCX: 000000000045e219 [ 708.197519] RDX: 0000000000000000 RSI: 0000000000004c80 RDI: 0000000000000007 [ 708.204827] RBP: 00007f1b82d17ca0 R08: 0000000000000000 R09: 0000000000000000 [ 708.212204] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000031 [ 708.219466] R13: 00007ffca1b4a27f R14: 00007f1b82d189c0 R15: 000000000119c034 [ 708.277276] ------------[ cut here ]------------