000000000000000000000000000003000000000000000", 0x40, 0x540}, {&(0x7f0000010300)="02000000030000000400000066000f000300040000000000000000000f007f5c", 0x20, 0x800}, {&(0x7f0000011500)="ed41000000080000d9f4655fdaf4655fdaf4655f000000000000040004", 0x1d, 0x2200}, {0x0}, {&(0x7f0000011900)="ed8100001a040000daf4655fdaf4655fdaf4655f000000000000010004000000000000000100000014000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000039c34d38000000000000000000000000000000000000000000000000200000007412ab417412ab417412ab41daf4655f7412ab410000000000000000", 0xa0, 0x3800}], 0x0, &(0x7f0000012c00)) 13:22:34 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TCSBRKP(r2, 0x80045439, 0xc04a01) r3 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_opts(r3, 0x6, 0x1, 0x0, &(0x7f0000000000)) mmap(&(0x7f000018e000/0x11000)=nil, 0x11000, 0x1000008, 0x30, r3, 0x34b95000) r4 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef0100010000002bc4645f000000000000000001000000000000000b0000000001000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e373836333438323637", 0xa2, 0x400}, {&(0x7f0000010100)="0000000000000000000000002f527b43270a4164871303f1137e5908010040000c000000000000002bc4645f", 0x2c, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000500000000000000000000000000000000000000040100004d", 0x39, 0x540}, {&(0x7f0000000040)="00000000000000000000000000000000000000000000000000000000787371fe", 0x20, 0x7e0}, {&(0x7f0000010400)="0200000012000000220000002d000f00030004000000000031245cf20f0062e6000000000000000000000000000000000000000000000000d4189ee9", 0x3c, 0x1000}, {&(0x7f0000012f00)="ed410000001000002bc4645f2bc4645f2bc4645f00000000000004000800000000000800050000000af3010004000000000000000000000001000000030000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002f49000020004f3f54a9d2a254a9d2a2000000002bc4645f", 0x94, 0x22100}], 0x0, &(0x7f0000000300)=ANY=[]) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) statx(r4, &(0x7f0000000340)='./file1\x00', 0x0, 0x0, 0x0) ptrace$setregs(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000080)) r5 = clone3(&(0x7f0000000440)={0x40000, &(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000140), {0xa}, &(0x7f0000000380)=""/149, 0x95, &(0x7f0000000180)=""/86, &(0x7f00000002c0)=[0xffffffffffffffff, 0x0, 0x0], 0x3}, 0x58) sched_setattr(r5, &(0x7f0000000300)={0x38, 0x3, 0x11, 0x7, 0x3ff, 0x9, 0x62e21598, 0x200, 0xffffff80, 0x1cfa}, 0x0) [ 234.710440][T10206] EXT4-fs (loop4): mounting with "discard" option, but the device does not support discard [ 234.730151][T10196] F2FS-fs (loop0): Failed to get valid F2FS checkpoint [ 234.741256][T10222] FAULT_INJECTION: forcing a failure. [ 234.741256][T10222] name failslab, interval 1, probability 0, space 0, times 0 [ 234.750404][T10206] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue [ 234.754063][T10222] CPU: 1 PID: 10222 Comm: syz-executor.5 Not tainted 5.4.125-syzkaller-00016-gae94e015273b #0 [ 234.772886][T10222] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 234.773611][T10197] F2FS-fs (loop2): f2fs_check_nid_range: out-of-range nid=1, run fsck to fix. [ 234.782926][T10222] Call Trace: [ 234.782944][T10222] dump_stack+0x1d8/0x24e [ 234.782954][T10222] ? devkmsg_release+0x11c/0x11c [ 234.782964][T10222] ? show_regs_print_info+0x12/0x12 [ 234.782973][T10222] ? _atomic_dec_and_lock+0x1e4/0x2c0 [ 234.782984][T10222] should_fail+0x6f6/0x860 [ 234.782998][T10222] ? setup_fault_attr+0x3d0/0x3d0 [ 234.824236][T10222] ? iput+0x2f8/0x810 [ 234.828192][T10222] ? alloc_super+0x56/0x750 [ 234.832678][T10222] should_failslab+0x5/0x20 [ 234.837154][T10222] kmem_cache_alloc_trace+0x39/0x2b0 [ 234.842413][T10222] ? _raw_spin_trylock_bh+0x1a0/0x1a0 [ 234.847754][T10222] ? mount_bdev+0x340/0x340 [ 234.852228][T10222] alloc_super+0x56/0x750 [ 234.856542][T10222] ? mount_bdev+0x340/0x340 [ 234.861016][T10222] sget+0x20e/0x4e0 [ 234.864795][T10222] ? test_bdev_super+0x40/0x40 [ 234.869559][T10222] mount_bdev+0xe3/0x340 [ 234.873774][T10222] ? ext4_mount+0x40/0x40 [ 234.878078][T10222] legacy_get_tree+0xde/0x170 [ 234.882726][T10222] ? ext4_lazyinit_thread+0xd40/0xd40 [ 234.888067][T10222] vfs_get_tree+0x83/0x260 [ 234.892543][T10222] do_mount+0x19d0/0x2670 [ 234.896853][T10222] ? copy_mount_string+0x30/0x30 [ 234.901765][T10222] ? copy_mount_options+0x59/0x300 [ 234.906845][T10222] ? copy_mount_options+0x59/0x300 [ 234.911929][T10222] ? kmem_cache_alloc_trace+0x139/0x2b0 [ 234.917445][T10222] ? copy_mount_options+0x273/0x300 [ 234.922615][T10222] ksys_mount+0xc2/0xf0 [ 234.926742][T10222] __x64_sys_mount+0xb1/0xc0 [ 234.931304][T10222] do_syscall_64+0xcb/0x1e0 [ 234.935791][T10222] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 234.941655][T10222] RIP: 0033:0x467b1a [ 234.945527][T10222] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 234.965187][T10222] RSP: 002b:00007f3059253fa8 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 234.973580][T10222] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 0000000000467b1a [ 234.981521][T10222] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007f3059254000 [ 234.989467][T10222] RBP: 00007f3059254040 R08: 00007f3059254040 R09: 0000000020000000 [ 234.997413][T10222] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000020000000 [ 235.005356][T10222] R13: 0000000020000100 R14: 00007f3059254000 R15: 0000000020012c00 [ 235.043112][T10206] ext4 filesystem being mounted at /root/syzkaller-testdir756229767/syzkaller.YUione/367/file0 supports timestamps until 2038 (0x7fffffff) [ 235.060978][T10197] F2FS-fs (loop2): f2fs_check_nid_range: out-of-range nid=2, run fsck to fix. 13:22:35 executing program 4: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000002, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x31) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) waitid$P_PIDFD(0x3, r0, &(0x7f0000000500), 0x9, &(0x7f0000000580)) ptrace$cont(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='pids.events\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x12, r1, 0x0) ftruncate(r1, 0x1000673) ioctl$KDSKBENT(r1, 0x4b47, &(0x7f00000002c0)={0x2, 0x81, 0x5}) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x88400, 0x1a8) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0xd0265000) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) exit_group(0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x31, 0xffffffffffffffff, 0x0) time(&(0x7f0000000180)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x140015da, 0x9, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c190000ce1900000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800)) 13:22:35 executing program 3: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef0100010000002bc4645f000000000000000001000000000000000b0000000001000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e373836333438323637", 0xa2, 0x400}, {&(0x7f0000010100)="0000000000000000000000002f527b43270a4164871303f1137e5908010040000c000000000000002bc4645f", 0x2c, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000500000000000000000000000000000000000000040100004d", 0x39, 0x540}, {&(0x7f0000000040)="00000000000000000000000000000000000000000000000000000000787371fe", 0x20, 0x7e0}, {&(0x7f0000010400)="0200000012000000220000002d000f00030004000000000031245cf20f0062e6000000000000000000000000000000000000000000000000d4189ee9", 0x3c, 0x1000}, {&(0x7f0000012f00)="ed410000001000002bc4645f2bc4645f2bc4645f00000000000004000800000000000800050000000af3010004000000000000000000000001000000030000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002f49000020004f3f54a9d2a254a9d2a2000000002bc4645f", 0x94, 0x22100}], 0x0, &(0x7f0000000300)=ANY=[]) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x200, 0x65) statx(r0, &(0x7f0000000340)='./file1\x00', 0x0, 0x0, 0x0) ptrace$setregs(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000080)) 13:22:35 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_mount_image$f2fs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0xe, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}, {&(0x7f0000010500)='\x00\x00\x00\x00', 0x4, 0xc80}, {&(0x7f0000010700)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e00000010000003000000010000000200000018b2e346f95e497f827e0a", 0x77, 0x1400}, {0x0}, {&(0x7f0000010e00)="d73cd47a0000000000100000000000000b000000000000000d0000001000000012000000170000001600000015000000ffffffffffffffffffffffffffffffffffffffff03000600000000000000000000000000140000000100000000000000ffffffffffffffffffffffffffffffffffffffff05000000000000000000000000000000c5010000060000000100000007000000070000000a0000004000000040000000fc0f00"/181, 0xb5, 0x200000}, {&(0x7f0000010f00)="0000000000000000000000000000000000000000000000000000000009f7a5bb", 0x20, 0x200fe0}, {&(0x7f0000011000)="00000000000000000000000000000000000000000000000000000006", 0x1c, 0x2011e0}, {0x0, 0x0, 0x2012e0}, {&(0x7f0000011400)="000000000000000000000000000000000000000000160000000510ec", 0x1c, 0x201320}, {&(0x7f0000011500)="00000017000000020c60", 0xa, 0x201380}, {&(0x7f0000011600)}, {&(0x7f0000011800)}, {&(0x7f0000011c00)="0000000000000000000000000000000000000000000000000000000009f7a5bb", 0x20, 0x205fe0}, {0x0, 0x0, 0x401320}], 0x0, &(0x7f0000014b00)) 13:22:35 executing program 5 (fault-call:0 fault-nth:49): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000660000000f000000000000000100000001000000004000000040000020000000daf4655fdaf4655f0100ffff53ef010001000000d9f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010100)}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000100000000000000000000000000000000000000000000003000000000000000", 0x40, 0x540}, {&(0x7f0000010300)="02000000030000000400000066000f000300040000000000000000000f007f5c", 0x20, 0x800}, {&(0x7f0000011500)="ed41000000080000d9f4655fdaf4655fdaf4655f000000000000040004", 0x1d, 0x2200}, {0x0}, {&(0x7f0000011900)="ed8100001a040000daf4655fdaf4655fdaf4655f000000000000010004000000000000000100000014000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000039c34d38000000000000000000000000000000000000000000000000200000007412ab417412ab417412ab41daf4655f7412ab410000000000000000", 0xa0, 0x3800}], 0x0, &(0x7f0000012c00)) [ 235.103726][T10197] F2FS-fs (loop2): Failed to read root inode 13:22:35 executing program 3: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x6, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef0100010000002bc4645f000000000000000001000000000000000b0000000001000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e373836333438323637", 0xa2, 0x400}, {&(0x7f0000010100)="0000000000000000000000002f527b43270a4164871303f1137e5908010040000c000000000000002bc4645f", 0x2c, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000500000000000000000000000000000000000000040100004d", 0x39, 0x540}, {&(0x7f0000000040)="00000000000000000000000000000000000000000000000000000000787371fe", 0x20, 0x7e0}, {&(0x7f0000010400)="0200000012000000220000002d000f00030004000000000031245cf20f0062e6000000000000000000000000000000000000000000000000d4189ee9", 0x3c, 0x1000}, {&(0x7f0000012f00)="ed410000001000002bc4645f2bc4645f2bc4645f00000000000004000800000000000800050000000af3010004000000000000000002000001000000030000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002f49000020004f3f54a9d2a254a9d2a2000000002bc4645f", 0x94, 0x22100}], 0x0, &(0x7f0000000300)=ANY=[]) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) statx(r0, &(0x7f0000000340)='./file1\x00', 0x0, 0x0, 0x0) ptrace$setregs(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000080)) [ 235.201081][T10231] [EXT4 FS bs=1024, gc=1, bpg=8192, ipg=32, mo=e802e01c, mo2=0006] [ 235.209238][T10231] System zones: 1-2, 19-19, 35-38, 46-46 [ 235.216360][T10231] EXT4-fs (loop4): mounting with "discard" option, but the device does not support discard [ 235.235191][T10238] F2FS-fs (loop0): invalid crc_offset: 0 [ 235.237033][T10231] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue [ 235.254377][T10242] FAULT_INJECTION: forcing a failure. [ 235.254377][T10242] name failslab, interval 1, probability 0, space 0, times 0 [ 235.274075][T10238] F2FS-fs (loop0): invalid crc_offset: 0 [ 235.274142][T10231] ext4 filesystem being mounted at /root/syzkaller-testdir756229767/syzkaller.YUione/368/file0 supports timestamps until 2038 (0x7fffffff) [ 235.280072][T10238] F2FS-fs (loop0): Failed to get valid F2FS checkpoint [ 235.301432][T10242] CPU: 1 PID: 10242 Comm: syz-executor.5 Not tainted 5.4.125-syzkaller-00016-gae94e015273b #0 [ 235.311656][T10242] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 235.321697][T10242] Call Trace: [ 235.324975][T10242] dump_stack+0x1d8/0x24e [ 235.329295][T10242] ? devkmsg_release+0x11c/0x11c [ 235.334217][T10242] ? show_regs_print_info+0x12/0x12 [ 235.339400][T10242] ? _atomic_dec_and_lock+0x1e4/0x2c0 [ 235.344863][T10242] should_fail+0x6f6/0x860 [ 235.349269][T10242] ? setup_fault_attr+0x3d0/0x3d0 [ 235.354316][T10242] ? iput+0x2f8/0x810 [ 235.358290][T10242] ? alloc_super+0x56/0x750 [ 235.362780][T10242] should_failslab+0x5/0x20 [ 235.367271][T10242] kmem_cache_alloc_trace+0x39/0x2b0 [ 235.372535][T10242] ? _raw_spin_trylock_bh+0x1a0/0x1a0 [ 235.377887][T10242] ? mount_bdev+0x340/0x340 [ 235.382378][T10242] alloc_super+0x56/0x750 [ 235.386887][T10242] ? mount_bdev+0x340/0x340 [ 235.391384][T10242] sget+0x20e/0x4e0 [ 235.395179][T10242] ? test_bdev_super+0x40/0x40 [ 235.399928][T10242] mount_bdev+0xe3/0x340 [ 235.404162][T10242] ? ext4_mount+0x40/0x40 [ 235.408484][T10242] legacy_get_tree+0xde/0x170 [ 235.413150][T10242] ? ext4_lazyinit_thread+0xd40/0xd40 [ 235.418507][T10242] vfs_get_tree+0x83/0x260 [ 235.422912][T10242] do_mount+0x19d0/0x2670 [ 235.427219][T10242] ? copy_mount_string+0x30/0x30 [ 235.432123][T10242] ? copy_mount_options+0x59/0x300 [ 235.437198][T10242] ? copy_mount_options+0x59/0x300 [ 235.442295][T10242] ? kmem_cache_alloc_trace+0x139/0x2b0 [ 235.447819][T10242] ? copy_mount_options+0x273/0x300 [ 235.453158][T10242] ksys_mount+0xc2/0xf0 [ 235.457284][T10242] __x64_sys_mount+0xb1/0xc0 [ 235.461860][T10242] do_syscall_64+0xcb/0x1e0 [ 235.466443][T10242] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 235.472308][T10242] RIP: 0033:0x467b1a [ 235.476174][T10242] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 235.495745][T10242] RSP: 002b:00007f3059253fa8 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 235.504180][T10242] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 0000000000467b1a [ 235.512138][T10242] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007f3059254000 [ 235.520083][T10242] RBP: 00007f3059254040 R08: 00007f3059254040 R09: 0000000020000000 [ 235.528063][T10242] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000020000000 [ 235.536007][T10242] R13: 0000000020000100 R14: 00007f3059254000 R15: 0000000020012c00 13:22:35 executing program 2: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffff, 0xffffffffffffffff, 0x0) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) read(r0, 0x0, 0x0) syz_mount_image$f2fs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x11, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}, {&(0x7f0000010500)='\x00\x00\x00\x00', 0x4, 0xc80}, {&(0x7f0000010700)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e00000010000003000000010000000200000018b2e346f95e497f827e0a", 0x77, 0x1400}, {0x0}, {&(0x7f0000010e00)="d73cd47a0000000000100000000000000b000000000000000d0000001000000012000000170000001600000015000000ffffffffffffffffffffffffffffffffffffffff03000600000000000000000000000000140000000100000000000000ffffffffffffffffffffffffffffffffffffffff05000000000000000000000000000000c5010000060000000100000007000000070000000a0000004000000040000000fc0f00"/181, 0xb5, 0x200000}, {&(0x7f0000010f00)="0000000000000000000000000000000000000000000000000000000009f7a5bb", 0x20, 0x200fe0}, {&(0x7f0000011000)="00000000000000000000000000000000000000000000000000000006", 0x1c, 0x2011e0}, {0x0, 0x0, 0x2012e0}, {&(0x7f0000011400)="000000000000000000000000000000000000000000160000000510ec", 0x1c, 0x201320}, {&(0x7f0000011500)="00000017000000020c60", 0xa, 0x201380}, {&(0x7f0000011600)}, {&(0x7f0000011800)}, {&(0x7f0000011b00)="0000000000000000000000000000000000000000000000000000000100000000d73cd47a0000000000100000000000000b000000000000000d0000001000000012000000170000001600000015000000ffffffffffffffffffffffffffffffffffffffff03000600000000000000000000000000140000000100000000000000ffffffffffffffffffffffffffffffffffffffff05000000000000000000000000000000c5010000060000000100000007000000070000000a0000004000000040000000fc0f", 0xc6, 0x204fe0}, {&(0x7f0000011c00)="0000000000000000000000000000000000000000000000000000000009f7a5bb", 0x20, 0x205fe0}, {0x0}, {0x0}, {&(0x7f0000013000)="0000000000000000000001000000", 0xe, 0xa00000}], 0x0, &(0x7f0000014b00)) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='pids.events\x00', 0x275a, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x4, 0x2d, 0x9, 0x1, 0x0, 0x7fff, 0x88, 0x4, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x7, 0x0, @perf_bp={&(0x7f00000000c0), 0x1}, 0x9, 0x1, 0x4, 0x9, 0x0, 0xffff, 0x400, 0x0, 0x2, 0x0, 0x1000}, 0x0, 0xe, r1, 0xa) 13:22:35 executing program 1: clone(0x13102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) poll(0x0, 0x0, 0x8000000000000200) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f00000025c0)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00'}) ioctl$TUNSETLINK(r0, 0x40087602, 0x30a) r2 = openat$selinux_attr(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) mmap(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x6, 0x1010, r2, 0xdc5f7000) close(r0) r3 = socket$inet_tcp(0x2, 0x1, 0x0) preadv(r3, 0x0, 0x0, 0x7fffffff, 0x1) 13:22:35 executing program 3: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0xaaaac14, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef0100010000002bc4645f000000000000000001000000000000000b0000000001000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e373836333438323637", 0xa2, 0x400}, {&(0x7f0000010100)="0000000000000000000000002f527b43270a4164871303f1137e5908010040000c000000000000002bc4645f", 0x2c, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000500000000000000000000000000000000000000040100004d", 0x39, 0x540}, {&(0x7f0000000040)="00000000000000000000000000000000000000000000000000000000787371fe", 0x20, 0x7e0}, {&(0x7f0000000380)="0200000012000000220000002d000f00030004000000000031645cf20f0062e6000000000020000000000000000000000000000000000000d4189ee9fd6b9b85fd8ba16ba9ccdab2d2b85125f6f967a3cff23bbb2374a0093d6896aeb310f83ebb92c5b104e7de996d2ac2ab7f48b33a866a102cc6a4b8507f830437fa488ed6789a5800a5bc5ce8d070b5c8ba12b79deb4d80dd572435ed6bb3bc95b0b12ae075ae00b2c70c000000000000556be78e8100d272ae8dc650d9abdb61ae5dcbd6996a2aab0f1cd09920fcb9734a30bc1377fc6ebc1e8af6b5000000e9", 0xdc, 0x1000}, {&(0x7f0000012f00)="ed410000001000002bc4645f2bc4645f2bc4645f00000000000004000800000000000800050000000af3010004000000000000000000000001000000030000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002f49000020004f3f54a9d2a254a9d2a2000000002bc4645f", 0x94, 0x4}], 0x0, &(0x7f0000000300)=ANY=[]) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) statx(r0, &(0x7f0000000340)='./file1\x00', 0x0, 0x0, 0x0) ptrace$setregs(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000080)) 13:22:35 executing program 4: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000002, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x31) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) waitid$P_PIDFD(0x3, r0, &(0x7f0000000500), 0x9, &(0x7f0000000580)) ptrace$cont(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='pids.events\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x12, r1, 0x0) ftruncate(r1, 0x1000673) ioctl$KDSKBENT(r1, 0x4b47, &(0x7f00000002c0)={0x2, 0x81, 0x5}) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x88400, 0x1a8) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0xd0265000) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) exit_group(0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x31, 0xffffffffffffffff, 0x0) time(&(0x7f0000000180)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14002600, 0x9, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c190000ce1900000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800)) 13:22:35 executing program 5 (fault-call:0 fault-nth:50): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000660000000f000000000000000100000001000000004000000040000020000000daf4655fdaf4655f0100ffff53ef010001000000d9f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010100)}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000100000000000000000000000000000000000000000000003000000000000000", 0x40, 0x540}, {&(0x7f0000010300)="02000000030000000400000066000f000300040000000000000000000f007f5c", 0x20, 0x800}, {&(0x7f0000011500)="ed41000000080000d9f4655fdaf4655fdaf4655f000000000000040004", 0x1d, 0x2200}, {0x0}, {&(0x7f0000011900)="ed8100001a040000daf4655fdaf4655fdaf4655f000000000000010004000000000000000100000014000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000039c34d38000000000000000000000000000000000000000000000000200000007412ab417412ab417412ab41daf4655f7412ab410000000000000000", 0xa0, 0x3800}], 0x0, &(0x7f0000012c00)) 13:22:35 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_mount_image$f2fs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0xe, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}, {&(0x7f0000010500)='\x00\x00\x00\x00', 0x4, 0xc80}, {&(0x7f0000010700)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e00000010000003000000010000000200000018b2e346f95e497f827e0a", 0x77, 0x1400}, {0x0}, {&(0x7f0000010e00)="d73cd47a0000000000100000000000000b000000000000000d0000001000000012000000170000001600000015000000ffffffffffffffffffffffffffffffffffffffff03000600000000000000000000000000140000000100000000000000ffffffffffffffffffffffffffffffffffffffff05000000000000000000000000000000c5010000060000000100000007000000070000000a0000004000000040000000fc0f00"/181, 0xb5, 0x200000}, {&(0x7f0000010f00)="0000000000000000000000000000000000000000000000000000000009f7a5bb", 0x20, 0x200fe0}, {&(0x7f0000011000)="00000000000000000000000000000000000000000000000000000006", 0x1c, 0x2011e0}, {0x0, 0x0, 0x2012e0}, {&(0x7f0000011400)="000000000000000000000000000000000000000000160000000510ec", 0x1c, 0x201320}, {&(0x7f0000011500)="00000017000000020c60", 0xa, 0x201380}, {&(0x7f0000011600)}, {&(0x7f0000011800)}, {&(0x7f0000011c00)="0000000000000000000000000000000000000000000000000000000009f7a5bb", 0x20, 0x205fe0}, {0x0, 0x0, 0x401320}], 0x0, &(0x7f0000014b00)) [ 235.847054][T10269] F2FS-fs (loop2): invalid crc_offset: 0 [ 235.858965][T10276] F2FS-fs (loop0): invalid crc_offset: 0 [ 235.859411][T10273] FAULT_INJECTION: forcing a failure. [ 235.859411][T10273] name failslab, interval 1, probability 0, space 0, times 0 [ 235.864954][T10276] F2FS-fs (loop0): invalid crc_offset: 0 [ 235.877311][T10273] CPU: 0 PID: 10273 Comm: syz-executor.5 Not tainted 5.4.125-syzkaller-00016-gae94e015273b #0 [ 235.887174][T10276] F2FS-fs (loop0): Failed to get valid F2FS checkpoint [ 235.893234][T10273] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 235.893238][T10273] Call Trace: [ 235.893255][T10273] dump_stack+0x1d8/0x24e [ 235.893264][T10273] ? devkmsg_release+0x11c/0x11c [ 235.893278][T10273] ? show_regs_print_info+0x12/0x12 [ 235.928057][T10273] ? pcpu_alloc_area+0x753/0x8b0 [ 235.932968][T10273] should_fail+0x6f6/0x860 [ 235.937359][T10273] ? setup_fault_attr+0x3d0/0x3d0 [ 235.942367][T10273] ? find_next_bit+0xc6/0x110 [ 235.947015][T10273] ? cpumask_next+0xc/0x20 [ 235.951404][T10273] ? pcpu_alloc+0xc8a/0x1180 [ 235.955981][T10273] ? prealloc_shrinker+0x50/0x210 [ 235.960974][T10273] should_failslab+0x5/0x20 [ 235.965449][T10273] kmem_cache_alloc_trace+0x39/0x2b0 [ 235.970721][T10273] prealloc_shrinker+0x50/0x210 [ 235.975546][T10273] alloc_super+0x5e5/0x750 [ 235.979936][T10273] ? mount_bdev+0x340/0x340 [ 235.984498][T10273] sget+0x20e/0x4e0 [ 235.988368][T10273] ? test_bdev_super+0x40/0x40 [ 235.993104][T10273] mount_bdev+0xe3/0x340 [ 235.997318][T10273] ? ext4_mount+0x40/0x40 [ 236.001618][T10273] legacy_get_tree+0xde/0x170 [ 236.006268][T10273] ? ext4_lazyinit_thread+0xd40/0xd40 [ 236.011611][T10273] vfs_get_tree+0x83/0x260 [ 236.015996][T10273] do_mount+0x19d0/0x2670 [ 236.020298][T10273] ? copy_mount_string+0x30/0x30 [ 236.025206][T10273] ? copy_mount_options+0x59/0x300 [ 236.030288][T10273] ? copy_mount_options+0x59/0x300 [ 236.035368][T10273] ? kmem_cache_alloc_trace+0x139/0x2b0 [ 236.040894][T10273] ? copy_mount_options+0x273/0x300 [ 236.046071][T10273] ksys_mount+0xc2/0xf0 [ 236.050204][T10273] __x64_sys_mount+0xb1/0xc0 [ 236.054791][T10273] do_syscall_64+0xcb/0x1e0 [ 236.059279][T10273] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 236.065145][T10273] RIP: 0033:0x467b1a [ 236.069013][T10273] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 236.088767][T10273] RSP: 002b:00007f3059253fa8 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 236.097155][T10273] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 0000000000467b1a [ 236.105105][T10273] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007f3059254000 [ 236.113059][T10273] RBP: 00007f3059254040 R08: 00007f3059254040 R09: 0000000020000000 [ 236.121010][T10273] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000020000000 [ 236.128968][T10273] R13: 0000000020000100 R14: 00007f3059254000 R15: 0000000020012c00 [ 236.166894][T10275] [EXT4 FS bs=1024, gc=1, bpg=8192, ipg=32, mo=e802e01c, mo2=0006] [ 236.182030][T10269] F2FS-fs (loop2): f2fs_check_nid_range: out-of-range nid=1, run fsck to fix. [ 236.194250][T10275] System zones: 1-2, 19-19, 35-38, 46-46 [ 236.205707][T10275] EXT4-fs (loop4): mounting with "discard" option, but the device does not support discard 13:22:36 executing program 1: clone(0x13102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) poll(0x0, 0x0, 0x8000000000000200) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f00000025c0)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00'}) ioctl$TUNSETLINK(r0, 0x401054d5, 0x30a) r2 = openat$selinux_attr(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) mmap(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x6, 0x1010, r2, 0xdc5f7000) close(r0) r3 = socket$inet_tcp(0x2, 0x1, 0x0) preadv(r3, 0x0, 0x0, 0x7fffffff, 0x1) [ 236.216101][T10269] F2FS-fs (loop2): f2fs_check_nid_range: out-of-range nid=2, run fsck to fix. [ 236.233800][T10275] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue 13:22:36 executing program 4: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000002, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x31) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) waitid$P_PIDFD(0x3, r0, &(0x7f0000000500), 0x9, &(0x7f0000000580)) ptrace$cont(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='pids.events\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x12, r1, 0x0) ftruncate(r1, 0x1000673) ioctl$KDSKBENT(r1, 0x4b47, &(0x7f00000002c0)={0x2, 0x81, 0x5}) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x88400, 0x1a8) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0xd0265000) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) exit_group(0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x31, 0xffffffffffffffff, 0x0) time(&(0x7f0000000180)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14001500, 0x2, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c190000ce1900000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800)) [ 236.272614][T10275] ext4 filesystem being mounted at /root/syzkaller-testdir756229767/syzkaller.YUione/369/file0 supports timestamps until 2038 (0x7fffffff) [ 236.349512][T10269] F2FS-fs (loop2): Failed to read root inode 13:22:36 executing program 5 (fault-call:0 fault-nth:51): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000660000000f000000000000000100000001000000004000000040000020000000daf4655fdaf4655f0100ffff53ef010001000000d9f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010100)}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000100000000000000000000000000000000000000000000003000000000000000", 0x40, 0x540}, {&(0x7f0000010300)="02000000030000000400000066000f000300040000000000000000000f007f5c", 0x20, 0x800}, {&(0x7f0000011500)="ed41000000080000d9f4655fdaf4655fdaf4655f000000000000040004", 0x1d, 0x2200}, {0x0}, {&(0x7f0000011900)="ed8100001a040000daf4655fdaf4655fdaf4655f000000000000010004000000000000000100000014000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000039c34d38000000000000000000000000000000000000000000000000200000007412ab417412ab417412ab41daf4655f7412ab410000000000000000", 0xa0, 0x3800}], 0x0, &(0x7f0000012c00)) [ 236.414291][T10299] EXT4-fs error (device loop4): ext4_fill_super:4587: inode #2: comm syz-executor.4: iget: root inode unallocated [ 236.434184][T10299] EXT4-fs (loop4): get root inode failed [ 236.440878][T10299] EXT4-fs (loop4): mount failed 13:22:36 executing program 4: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000002, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x31) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) waitid$P_PIDFD(0x3, r0, &(0x7f0000000500), 0x9, &(0x7f0000000580)) ptrace$cont(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='pids.events\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x12, r1, 0x0) ftruncate(r1, 0x1000673) ioctl$KDSKBENT(r1, 0x4b47, &(0x7f00000002c0)={0x2, 0x81, 0x5}) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x88400, 0x1a8) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0xd0265000) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) exit_group(0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x31, 0xffffffffffffffff, 0x0) time(&(0x7f0000000180)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14001500, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c190000ce1900000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800)) 13:22:36 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_mount_image$f2fs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0xe, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}, {&(0x7f0000010500)='\x00\x00\x00\x00', 0x4, 0xc80}, {&(0x7f0000010700)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e00000010000003000000010000000200000018b2e346f95e497f827e0a", 0x77, 0x1400}, {0x0}, {&(0x7f0000010e00)="d73cd47a0000000000100000000000000b000000000000000d0000001000000012000000170000001600000015000000ffffffffffffffffffffffffffffffffffffffff03000600000000000000000000000000140000000100000000000000ffffffffffffffffffffffffffffffffffffffff05000000000000000000000000000000c5010000060000000100000007000000070000000a0000004000000040000000fc0f00"/181, 0xb5, 0x200000}, {&(0x7f0000010f00)="0000000000000000000000000000000000000000000000000000000009f7a5bb", 0x20, 0x200fe0}, {&(0x7f0000011000)="00000000000000000000000000000000000000000000000000000006", 0x1c, 0x2011e0}, {0x0, 0x0, 0x2012e0}, {&(0x7f0000011400)="000000000000000000000000000000000000000000160000000510ec", 0x1c, 0x201320}, {&(0x7f0000011500)="00000017000000020c60", 0xa, 0x201380}, {&(0x7f0000011600)}, {&(0x7f0000011800)}, {&(0x7f0000011c00)="0000000000000000000000000000000000000000000000000000000009f7a5bb", 0x20, 0x205fe0}, {0x0, 0x0, 0x401320}], 0x0, &(0x7f0000014b00)) [ 236.548458][T10306] FAULT_INJECTION: forcing a failure. [ 236.548458][T10306] name failslab, interval 1, probability 0, space 0, times 0 [ 236.581852][T10306] CPU: 0 PID: 10306 Comm: syz-executor.5 Not tainted 5.4.125-syzkaller-00016-gae94e015273b #0 [ 236.592198][T10306] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 236.602226][T10306] Call Trace: [ 236.605490][T10306] dump_stack+0x1d8/0x24e [ 236.609797][T10306] ? devkmsg_release+0x11c/0x11c [ 236.614704][T10306] ? show_regs_print_info+0x12/0x12 [ 236.619877][T10306] ? pcpu_alloc_area+0x753/0x8b0 [ 236.624787][T10306] should_fail+0x6f6/0x860 [ 236.629174][T10306] ? setup_fault_attr+0x3d0/0x3d0 [ 236.634255][T10306] ? find_next_bit+0xc6/0x110 [ 236.638910][T10306] ? cpumask_next+0xc/0x20 [ 236.643301][T10306] ? pcpu_alloc+0xc8a/0x1180 [ 236.647905][T10306] ? prealloc_shrinker+0x50/0x210 [ 236.652900][T10306] should_failslab+0x5/0x20 [ 236.657407][T10306] kmem_cache_alloc_trace+0x39/0x2b0 [ 236.662686][T10306] prealloc_shrinker+0x50/0x210 [ 236.667510][T10306] alloc_super+0x5e5/0x750 [ 236.671898][T10306] ? mount_bdev+0x340/0x340 [ 236.676372][T10306] sget+0x20e/0x4e0 [ 236.680198][T10306] ? test_bdev_super+0x40/0x40 [ 236.684942][T10306] mount_bdev+0xe3/0x340 [ 236.689159][T10306] ? ext4_mount+0x40/0x40 [ 236.693460][T10306] legacy_get_tree+0xde/0x170 [ 236.698211][T10306] ? ext4_lazyinit_thread+0xd40/0xd40 [ 236.703553][T10306] vfs_get_tree+0x83/0x260 [ 236.707938][T10306] do_mount+0x19d0/0x2670 [ 236.712251][T10306] ? copy_mount_string+0x30/0x30 [ 236.717163][T10306] ? copy_mount_options+0x59/0x300 [ 236.722248][T10306] ? copy_mount_options+0x59/0x300 [ 236.727337][T10306] ? kmem_cache_alloc_trace+0x139/0x2b0 [ 236.732856][T10306] ? copy_mount_options+0x273/0x300 [ 236.739333][T10306] ksys_mount+0xc2/0xf0 [ 236.743462][T10306] __x64_sys_mount+0xb1/0xc0 [ 236.748025][T10306] do_syscall_64+0xcb/0x1e0 [ 236.752681][T10306] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 236.758567][T10306] RIP: 0033:0x467b1a [ 236.762441][T10306] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 236.782102][T10306] RSP: 002b:00007f3059253fa8 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 236.790496][T10306] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 0000000000467b1a 13:22:36 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef0100010000002bc4645f000000000000000001000000000000000b0000000001000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e373836333438323637", 0xa2, 0x400}, {&(0x7f0000010100)="0000000000000000000000002f527b43270a4164871303f1137e5908010040000c000000000000002bc4645f", 0x2c, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000500000000000000000000000000000000000000040100004d", 0x39, 0x540}, {&(0x7f0000000040)="00000000000000000000000000000000000000000000000000000000787371fe", 0x20, 0x7e0}, {&(0x7f0000010400)="0200000012000000220000002d000f00030004000000000031245cf20f0062e6000000000000000000000000000000000000000000000000d4189ee9", 0x3c, 0x1000}, {&(0x7f0000012f00)="ed410000001000002bc4645f2bc4645f2bc4645f00000000000004000800000000000800050000000af3010004000000000000000000000001000000030000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002f49000020004f3f54a9d2a254a9d2a2000000002bc4645f", 0x94, 0x22100}], 0x0, &(0x7f0000000300)=ANY=[]) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000080)='./file1\x00', 0x81) ptrace$setregs(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000080)) [ 236.798445][T10306] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007f3059254000 [ 236.806405][T10306] RBP: 00007f3059254040 R08: 00007f3059254040 R09: 0000000020000000 [ 236.814348][T10306] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000020000000 [ 236.822292][T10306] R13: 0000000020000100 R14: 00007f3059254000 R15: 0000000020012c00 13:22:36 executing program 2: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffff, 0xffffffffffffffff, 0x0) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) read(r0, 0x0, 0x0) syz_mount_image$f2fs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x11, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}, {&(0x7f0000010500)='\x00\x00\x00\x00', 0x4, 0xc80}, {&(0x7f0000010700)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e00000010000003000000010000000200000018b2e346f95e497f827e0a", 0x77, 0x1400}, {0x0}, {&(0x7f0000010e00)="d73cd47a0000000000100000000000000b000000000000000d0000001000000012000000170000001600000015000000ffffffffffffffffffffffffffffffffffffffff03000600000000000000000000000000140000000100000000000000ffffffffffffffffffffffffffffffffffffffff05000000000000000000000000000000c5010000060000000100000007000000070000000a0000004000000040000000fc0f00"/181, 0xb5, 0x200000}, {&(0x7f0000010f00)="0000000000000000000000000000000000000000000000000000000009f7a5bb", 0x20, 0x200fe0}, {&(0x7f0000011000)="00000000000000000000000000000000000000000000000000000006", 0x1c, 0x2011e0}, {0x0, 0x0, 0x2012e0}, {&(0x7f0000011400)="000000000000000000000000000000000000000000160000000510ec", 0x1c, 0x201320}, {&(0x7f0000011500)="00000017000000020c60", 0xa, 0x201380}, {&(0x7f0000011600)}, {&(0x7f0000011800)}, {&(0x7f0000011b00)="0000000000000000000000000000000000000000000000000000000100000000d73cd47a0000000000100000000000000b000000000000000d0000001000000012000000170000001600000015000000ffffffffffffffffffffffffffffffffffffffff03000600000000000000000000000000140000000100000000000000ffffffffffffffffffffffffffffffffffffffff05000000000000000000000000000000c5010000060000000100000007000000070000000a0000004000000040000000fc0f", 0xc6, 0x204fe0}, {&(0x7f0000011c00)="0000000000000000000000000000000000000000000000000000000009f7a5bb", 0x20, 0x205fe0}, {0x0}, {0x0}, {&(0x7f0000013000)="0000000000000000000001000000", 0xe, 0xa00000}], 0x0, &(0x7f0000014b00)) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='pids.events\x00', 0x275a, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x4, 0x2d, 0x9, 0x1, 0x0, 0x7fff, 0x88, 0x4, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x7, 0x0, @perf_bp={&(0x7f00000000c0), 0x1}, 0x9, 0x1, 0x4, 0x9, 0x0, 0xffff, 0x400, 0x0, 0x2, 0x0, 0x1000}, 0x0, 0xe, r1, 0xa) [ 236.859805][T10314] EXT4-fs (loop4): mounting with "discard" option, but the device does not support discard [ 236.890790][T10314] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue 13:22:36 executing program 1: clone(0x13102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) poll(0x0, 0x0, 0x8000000000000200) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f00000025c0)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00'}) ioctl$TUNSETLINK(r0, 0x401054d6, 0x30a) r2 = openat$selinux_attr(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) mmap(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x6, 0x1010, r2, 0xdc5f7000) close(r0) r3 = socket$inet_tcp(0x2, 0x1, 0x0) preadv(r3, 0x0, 0x0, 0x7fffffff, 0x1) 13:22:36 executing program 3: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef0100010000002bc4645f000000000000000001000000000000000b0000000001000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e373836333438323637", 0xa2, 0x400}, {&(0x7f0000010100)="0000000000000000000000002f527b43270a4164871303f1137e5908010040000c000000000000002bc4645f", 0x2c, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000500000000000000000000000000000000000000040100004d", 0x39, 0x540}, {&(0x7f0000000040)="00000000000000000000000000000000000000000000000000000000787371fe", 0x20, 0x7e0}, {&(0x7f0000010400)="0200000012000000220000002d000f00030004000000000031245cf20f0062e6000000000000000000000000000000000000000000000000d4189ee9", 0x3c, 0x1000}, {&(0x7f0000012f00)="ed410000001000002bc4645f2bc4645f2bc4645f00000000000004000800000000000800050000000af3010004000000000000000000000001000000030000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002f49000020004f3f54a9d2a254a9d2a2000000002bc4645f", 0x94, 0x22100}], 0x0, &(0x7f0000000300)=ANY=[]) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) statx(r0, &(0x7f0000000340)='./file1\x00', 0x0, 0x0, 0x0) ptrace$setregs(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000080)) r1 = gettid() ptrace$setopts(0x4206, r1, 0x0, 0x5) tkill(r1, 0x34) ptrace$cont(0x18, r1, 0x0, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) write$P9_RGETLOCK(0xffffffffffffffff, &(0x7f0000000080)={0x23, 0x37, 0x2, {0x0, 0x0, 0x9, r1, 0x5, 'ext4\x00'}}, 0x23) [ 236.906097][T10325] F2FS-fs (loop0): invalid crc_offset: 0 [ 236.913568][T10314] ext4 filesystem being mounted at /root/syzkaller-testdir756229767/syzkaller.YUione/371/file0 supports timestamps until 2038 (0x7fffffff) [ 236.933785][T10325] F2FS-fs (loop0): invalid crc_offset: 0 [ 236.943005][T10325] F2FS-fs (loop0): Failed to get valid F2FS checkpoint 13:22:37 executing program 4: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000002, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x31) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) waitid$P_PIDFD(0x3, r0, &(0x7f0000000500), 0x9, &(0x7f0000000580)) ptrace$cont(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='pids.events\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x12, r1, 0x0) ftruncate(r1, 0x1000673) ioctl$KDSKBENT(r1, 0x4b47, &(0x7f00000002c0)={0x2, 0x81, 0x5}) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x88400, 0x1a8) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0xd0265000) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) exit_group(0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x31, 0xffffffffffffffff, 0x0) time(&(0x7f0000000180)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14001500, 0x4, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c190000ce1900000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800)) [ 236.971467][T10329] F2FS-fs (loop2): invalid crc_offset: 0 [ 236.993795][T10329] F2FS-fs (loop2): f2fs_check_nid_range: out-of-range nid=1, run fsck to fix. [ 237.002851][T10329] F2FS-fs (loop2): f2fs_check_nid_range: out-of-range nid=2, run fsck to fix. 13:22:37 executing program 3: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef0100010000002bc4645f000000000000000001000000000000000b0000000001000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e373836333438323637", 0xa2, 0x400}, {&(0x7f0000010100)="0000000000000000000000002f527b43270a4164871303f1137e5908010040000c000000000000002bc4645f", 0x2c, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000500000000000000000000000000000000000000040100004d", 0x39, 0x540}, {&(0x7f0000000040)="00000000000000000000000000000000000000000000000000000000787371fe", 0x20, 0x7e0}, {&(0x7f0000010400)="0200000012000000220000002d000f00030004000000000031245cf20f0062e6000000000000000000000000000000000000000000000000d4189ee9", 0x3c, 0x1000}, {&(0x7f0000012f00)="ed410000001000002bc4645f2bc4645f2bc4645f00000000000004000800000000000800050000000af3010004000000000000000000000001000000030000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002f49000020004f3f54a9d2a254a9d2a2000000002bc4645f", 0x94, 0x22100}], 0x0, &(0x7f0000000300)=ANY=[]) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000080)='./file0\x00', 0x2) statx(r0, &(0x7f0000000340)='./file1\x00', 0x0, 0x0, 0x0) ptrace$setregs(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000080)) [ 237.041924][T10329] F2FS-fs (loop2): Failed to read root inode 13:22:37 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_mount_image$f2fs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0xf, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}, {&(0x7f0000010500)='\x00\x00\x00\x00', 0x4, 0xc80}, {&(0x7f0000010700)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e00000010000003000000010000000200000018b2e346f95e497f827e0a", 0x77, 0x1400}, {0x0}, {&(0x7f0000010e00)="d73cd47a0000000000100000000000000b000000000000000d0000001000000012000000170000001600000015000000ffffffffffffffffffffffffffffffffffffffff03000600000000000000000000000000140000000100000000000000ffffffffffffffffffffffffffffffffffffffff05000000000000000000000000000000c5010000060000000100000007000000070000000a0000004000000040000000fc0f00"/181, 0xb5, 0x200000}, {&(0x7f0000010f00)="0000000000000000000000000000000000000000000000000000000009f7a5bb", 0x20, 0x200fe0}, {&(0x7f0000011000)="00000000000000000000000000000000000000000000000000000006", 0x1c, 0x2011e0}, {0x0, 0x0, 0x2012e0}, {&(0x7f0000011400)="000000000000000000000000000000000000000000160000000510ec", 0x1c, 0x201320}, {&(0x7f0000011500)="00000017000000020c60", 0xa, 0x201380}, {&(0x7f0000011600)}, {&(0x7f0000011800)}, {0x0, 0x0, 0x204fe0}, {&(0x7f0000011c00)="0000000000000000000000000000000000000000000000000000000009f7a5bb", 0x20, 0x205fe0}, {0x0, 0x0, 0x401320}], 0x0, &(0x7f0000014b00)) 13:22:37 executing program 5 (fault-call:0 fault-nth:52): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000660000000f000000000000000100000001000000004000000040000020000000daf4655fdaf4655f0100ffff53ef010001000000d9f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010100)}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000100000000000000000000000000000000000000000000003000000000000000", 0x40, 0x540}, {&(0x7f0000010300)="02000000030000000400000066000f000300040000000000000000000f007f5c", 0x20, 0x800}, {&(0x7f0000011500)="ed41000000080000d9f4655fdaf4655fdaf4655f000000000000040004", 0x1d, 0x2200}, {0x0}, {&(0x7f0000011900)="ed8100001a040000daf4655fdaf4655fdaf4655f000000000000010004000000000000000100000014000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000039c34d38000000000000000000000000000000000000000000000000200000007412ab417412ab417412ab41daf4655f7412ab410000000000000000", 0xa0, 0x3800}], 0x0, &(0x7f0000012c00)) [ 237.130705][T10354] F2FS-fs (loop0): invalid crc_offset: 0 [ 237.136690][T10354] F2FS-fs (loop0): invalid crc_offset: 0 [ 237.151140][T10354] F2FS-fs (loop0): Failed to get valid F2FS checkpoint [ 237.166820][T10357] [EXT4 FS bs=1024, gc=1, bpg=8192, ipg=32, mo=e802e018, mo2=0006] [ 237.174975][T10357] System zones: 1-2, 19-19, 35-38, 46-46 13:22:37 executing program 3: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef0100010000002bc4645f000000000000000001000000000000000b0000000001000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e373836333438323637", 0xa2, 0x400}, {&(0x7f0000010100)="0000000000000000000000002f527b43270a4164871303f1137e5908010040000c000000000000002bc4645f", 0x2c, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000500000000000000000000000000000000000000040100004d", 0x39, 0x540}, {&(0x7f0000000040)="00000000000000000000000000000000000000000000000000000000787371fe", 0x20, 0x7e0}, {&(0x7f0000010400)="0200000012000000220000002d000f00030004000000000031245cf20f0062e6000000000000000000000000000000000000000000000000d4189ee9", 0x3c, 0x1000}, {&(0x7f0000012f00)="ed410000001000002bc4645f2bc4645f2bc4645f00000000000004000800000000000800050000000af3010004000000000000000000000001000000030000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002f49000020004f3f54a9d2a254a9d2a2000000002bc4645f", 0x94, 0x22100}], 0x0, &(0x7f0000000300)=ANY=[]) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) statx(r0, &(0x7f0000000340)='./file1\x00', 0x0, 0x0, 0x0) r1 = gettid() ptrace$setopts(0x4206, r1, 0x0, 0x5) tkill(r1, 0x34) ptrace$cont(0x18, r1, 0x0, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) r2 = syz_open_dev$vcsu(&(0x7f00000001c0), 0x7fffffff, 0x8002) perf_event_open(&(0x7f0000000140)={0x3, 0x80, 0x0, 0xf5, 0x3f, 0x2, 0x0, 0x200, 0x2201, 0x8, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x5, 0x7}, 0x20000, 0x100000000, 0x3, 0x1, 0x2, 0x3, 0x7fff, 0x0, 0x5}, r1, 0x2, r2, 0x2) r3 = gettid() ptrace$setopts(0x4206, r3, 0x0, 0x5) tkill(r3, 0x34) ptrace$setregs(0xffffffffffffffff, r3, 0x0, &(0x7f00000002c0)="a1988b790b95e93aa3ef3e") r4 = gettid() ptrace$setopts(0x4206, r4, 0x0, 0x5) tkill(r4, 0x34) ptrace$cont(0x18, r4, 0x0, 0x0) ptrace$setregs(0xd, r4, 0x0, &(0x7f0000000080)) perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x81, 0x81, 0xff, 0x0, 0x0, 0x43, 0x10, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0xff, 0x1, @perf_config_ext={0x972, 0xc5}, 0x10090, 0xff, 0x101, 0x7, 0x7ff, 0x8f50, 0x40, 0x0, 0x3, 0x0, 0xf7}, r4, 0x7, 0xffffffffffffffff, 0x1) [ 237.183631][T10357] EXT4-fs (loop4): mounting with "discard" option, but the device does not support discard [ 237.193722][T10357] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue [ 237.202809][T10357] ext4 filesystem being mounted at /root/syzkaller-testdir756229767/syzkaller.YUione/372/file0 supports timestamps until 2038 (0x7fffffff) [ 237.241239][T10363] FAULT_INJECTION: forcing a failure. [ 237.241239][T10363] name failslab, interval 1, probability 0, space 0, times 0 [ 237.271328][T10363] CPU: 1 PID: 10363 Comm: syz-executor.5 Not tainted 5.4.125-syzkaller-00016-gae94e015273b #0 [ 237.281570][T10363] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 13:22:37 executing program 2: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffff, 0xffffffffffffffff, 0x0) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) read(r0, 0x0, 0x0) syz_mount_image$f2fs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x11, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}, {&(0x7f0000010500)='\x00\x00\x00\x00', 0x4, 0xc80}, {&(0x7f0000010700)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e00000010000003000000010000000200000018b2e346f95e497f827e0a", 0x77, 0x1400}, {0x0}, {&(0x7f0000010e00)="d73cd47a0000000000100000000000000b000000000000000d0000001000000012000000170000001600000015000000ffffffffffffffffffffffffffffffffffffffff03000600000000000000000000000000140000000100000000000000ffffffffffffffffffffffffffffffffffffffff05000000000000000000000000000000c5010000060000000100000007000000070000000a0000004000000040000000fc0f00"/181, 0xb5, 0x200000}, {&(0x7f0000010f00)="0000000000000000000000000000000000000000000000000000000009f7a5bb", 0x20, 0x200fe0}, {&(0x7f0000011000)="00000000000000000000000000000000000000000000000000000006", 0x1c, 0x2011e0}, {0x0, 0x0, 0x2012e0}, {&(0x7f0000011400)="000000000000000000000000000000000000000000160000000510ec", 0x1c, 0x201320}, {&(0x7f0000011500)="00000017000000020c60", 0xa, 0x201380}, {&(0x7f0000011600)}, {&(0x7f0000011800)}, {&(0x7f0000011b00)="0000000000000000000000000000000000000000000000000000000100000000d73cd47a0000000000100000000000000b000000000000000d0000001000000012000000170000001600000015000000ffffffffffffffffffffffffffffffffffffffff03000600000000000000000000000000140000000100000000000000ffffffffffffffffffffffffffffffffffffffff05000000000000000000000000000000c5010000060000000100000007000000070000000a0000004000000040000000fc0f", 0xc6, 0x204fe0}, {&(0x7f0000011c00)="0000000000000000000000000000000000000000000000000000000009f7a5bb", 0x20, 0x205fe0}, {0x0}, {0x0}, {&(0x7f0000013000)="000000000000000000000100000001", 0xf}], 0x0, &(0x7f0000014b00)) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='pids.events\x00', 0x275a, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x4, 0x2d, 0x9, 0x1, 0x0, 0x7fff, 0x88, 0x4, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x7, 0x0, @perf_bp={&(0x7f00000000c0), 0x1}, 0x9, 0x1, 0x4, 0x9, 0x0, 0xffff, 0x400, 0x0, 0x2, 0x0, 0x1000}, 0x0, 0xe, r1, 0xa) [ 237.291792][T10363] Call Trace: [ 237.295167][T10363] dump_stack+0x1d8/0x24e [ 237.299497][T10363] ? devkmsg_release+0x11c/0x11c [ 237.304434][T10363] ? show_regs_print_info+0x12/0x12 [ 237.309618][T10363] should_fail+0x6f6/0x860 [ 237.314022][T10363] ? setup_fault_attr+0x3d0/0x3d0 [ 237.319040][T10363] ? kvmalloc_node+0x7e/0xf0 [ 237.320612][T10370] F2FS-fs (loop2): invalid crc_offset: 0 [ 237.323619][T10363] should_failslab+0x5/0x20 [ 237.323630][T10363] __kmalloc+0x5f/0x2f0 13:22:37 executing program 4: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000002, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x31) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) waitid$P_PIDFD(0x3, r0, &(0x7f0000000500), 0x9, &(0x7f0000000580)) ptrace$cont(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='pids.events\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x12, r1, 0x0) ftruncate(r1, 0x1000673) ioctl$KDSKBENT(r1, 0x4b47, &(0x7f00000002c0)={0x2, 0x81, 0x5}) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x88400, 0x1a8) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0xd0265000) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) exit_group(0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x31, 0xffffffffffffffff, 0x0) time(&(0x7f0000000180)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14001500, 0x5, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c190000ce1900000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800)) [ 237.323639][T10363] ? __list_lru_init+0xa7/0x550 [ 237.323649][T10363] kvmalloc_node+0x7e/0xf0 [ 237.323665][T10363] __list_lru_init+0x1c6/0x550 [ 237.331162][T10370] attempt to access beyond end of device [ 237.331162][T10370] loop2: rw=12288, want=12296, limit=8287 [ 237.333876][T10363] ? prealloc_shrinker+0x1c0/0x210 [ 237.333887][T10363] alloc_super+0x611/0x750 [ 237.333896][T10363] ? mount_bdev+0x340/0x340 [ 237.333903][T10363] sget+0x20e/0x4e0 [ 237.333918][T10363] ? test_bdev_super+0x40/0x40 [ 237.338273][T10370] attempt to access beyond end of device [ 237.338273][T10370] loop2: rw=12288, want=12296, limit=8287 [ 237.342861][T10363] mount_bdev+0xe3/0x340 [ 237.342873][T10363] ? ext4_mount+0x40/0x40 [ 237.342882][T10363] legacy_get_tree+0xde/0x170 [ 237.342890][T10363] ? ext4_lazyinit_thread+0xd40/0xd40 [ 237.342905][T10363] vfs_get_tree+0x83/0x260 [ 237.347458][T10370] F2FS-fs (loop2): Failed to initialize F2FS segment manager (-5) [ 237.352016][T10363] do_mount+0x19d0/0x2670 [ 237.352027][T10363] ? copy_mount_string+0x30/0x30 [ 237.352037][T10363] ? retint_kernel+0x1b/0x1b [ 237.352052][T10363] ? copy_mount_options+0x1cc/0x300 [ 237.446509][T10363] ? copy_mount_options+0x273/0x300 [ 237.451683][T10363] ksys_mount+0xc2/0xf0 [ 237.455816][T10363] __x64_sys_mount+0xb1/0xc0 [ 237.460380][T10363] do_syscall_64+0xcb/0x1e0 [ 237.464861][T10363] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 237.470811][T10363] RIP: 0033:0x467b1a 13:22:37 executing program 3: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef0100010000002bc4645f000000000000000001000000000000000b0000000001000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e373836333438323637", 0xa2, 0x400}, {&(0x7f0000010100)="0000000000000000000000002f527b43270a4164871303f1137e5908010040000c000000000000002bc4645f", 0x2c, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000500000000000000000000000000000000000000040100004d", 0x39, 0x540}, {&(0x7f0000000040)="00000000000000000000000000000000000000000000000000000000787371fe", 0x20, 0x7e0}, {&(0x7f0000010400)="0200000012000000220000002d000f00030004000000000031245cf20f0062e6000000000000000000000000000000000000000000000000d4189ee9", 0x3c, 0x1000}, {&(0x7f0000012f00)="ed410000001000002bc4645f2bc4645f2bc4645f00000000000004000800000000000800050000000af3010004000000000000000000000001000000030000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002f49000020004f3f54a9d2a254a9d2a2000000002bc4645f", 0x94, 0x22100}], 0x0, &(0x7f0000000300)=ANY=[]) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat(r0, &(0x7f0000000180)='./file0\x00', 0x80001, 0x1) statx(r0, &(0x7f0000000340)='./file1\x00', 0x0, 0x0, 0x0) setxattr$trusted_overlay_origin(&(0x7f0000000080)='./file1\x00', &(0x7f00000000c0), &(0x7f0000000140), 0x2, 0x1) ptrace$setregs(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000080)) [ 237.474682][T10363] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 237.494276][T10363] RSP: 002b:00007f3059253fa8 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 237.502671][T10363] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 0000000000467b1a [ 237.510629][T10363] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007f3059254000 [ 237.518579][T10363] RBP: 00007f3059254040 R08: 00007f3059254040 R09: 0000000020000000 [ 237.526541][T10363] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000020000000 [ 237.534486][T10363] R13: 0000000020000100 R14: 00007f3059254000 R15: 0000000020012c00 13:22:37 executing program 1: clone(0x13102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) poll(0x0, 0x0, 0x8000000000000200) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f00000025c0)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00'}) ioctl$TUNSETLINK(r0, 0x4020940d, 0x30a) r2 = openat$selinux_attr(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) mmap(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x6, 0x1010, r2, 0xdc5f7000) close(r0) r3 = socket$inet_tcp(0x2, 0x1, 0x0) preadv(r3, 0x0, 0x0, 0x7fffffff, 0x1) 13:22:37 executing program 2: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffff, 0xffffffffffffffff, 0x0) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) read(r0, 0x0, 0x0) syz_mount_image$f2fs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x11, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}, {&(0x7f0000010500)='\x00\x00\x00\x00', 0x4, 0xc80}, {&(0x7f0000010700)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e00000010000003000000010000000200000018b2e346f95e497f827e0a", 0x77, 0x1400}, {0x0}, {&(0x7f0000010e00)="d73cd47a0000000000100000000000000b000000000000000d0000001000000012000000170000001600000015000000ffffffffffffffffffffffffffffffffffffffff03000600000000000000000000000000140000000100000000000000ffffffffffffffffffffffffffffffffffffffff05000000000000000000000000000000c5010000060000000100000007000000070000000a0000004000000040000000fc0f00"/181, 0xb5, 0x200000}, {&(0x7f0000010f00)="0000000000000000000000000000000000000000000000000000000009f7a5bb", 0x20, 0x200fe0}, {&(0x7f0000011000)="00000000000000000000000000000000000000000000000000000006", 0x1c, 0x2011e0}, {0x0, 0x0, 0x2012e0}, {&(0x7f0000011400)="000000000000000000000000000000000000000000160000000510ec", 0x1c, 0x201320}, {&(0x7f0000011500)="00000017000000020c60", 0xa, 0x201380}, {&(0x7f0000011600)}, {&(0x7f0000011800)}, {&(0x7f0000011b00)="0000000000000000000000000000000000000000000000000000000100000000d73cd47a0000000000100000000000000b000000000000000d0000001000000012000000170000001600000015000000ffffffffffffffffffffffffffffffffffffffff03000600000000000000000000000000140000000100000000000000ffffffffffffffffffffffffffffffffffffffff05000000000000000000000000000000c5010000060000000100000007000000070000000a0000004000000040000000fc0f", 0xc6, 0x204fe0}, {&(0x7f0000011c00)="0000000000000000000000000000000000000000000000000000000009f7a5bb", 0x20, 0x205fe0}, {0x0}, {0x0}, {&(0x7f0000013000)="000000000000000000000100000001", 0xf}], 0x0, &(0x7f0000014b00)) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='pids.events\x00', 0x275a, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x4, 0x2d, 0x9, 0x1, 0x0, 0x7fff, 0x88, 0x4, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x7, 0x0, @perf_bp={&(0x7f00000000c0), 0x1}, 0x9, 0x1, 0x4, 0x9, 0x0, 0xffff, 0x400, 0x0, 0x2, 0x0, 0x1000}, 0x0, 0xe, r1, 0xa) 13:22:37 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_mount_image$f2fs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0xf, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}, {&(0x7f0000010500)='\x00\x00\x00\x00', 0x4, 0xc80}, {&(0x7f0000010700)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e00000010000003000000010000000200000018b2e346f95e497f827e0a", 0x77, 0x1400}, {0x0}, {&(0x7f0000010e00)="d73cd47a0000000000100000000000000b000000000000000d0000001000000012000000170000001600000015000000ffffffffffffffffffffffffffffffffffffffff03000600000000000000000000000000140000000100000000000000ffffffffffffffffffffffffffffffffffffffff05000000000000000000000000000000c5010000060000000100000007000000070000000a0000004000000040000000fc0f00"/181, 0xb5, 0x200000}, {&(0x7f0000010f00)="0000000000000000000000000000000000000000000000000000000009f7a5bb", 0x20, 0x200fe0}, {&(0x7f0000011000)="00000000000000000000000000000000000000000000000000000006", 0x1c, 0x2011e0}, {0x0, 0x0, 0x2012e0}, {&(0x7f0000011400)="000000000000000000000000000000000000000000160000000510ec", 0x1c, 0x201320}, {&(0x7f0000011500)="00000017000000020c60", 0xa, 0x201380}, {&(0x7f0000011600)}, {&(0x7f0000011800)}, {0x0, 0x0, 0x204fe0}, {&(0x7f0000011c00)="0000000000000000000000000000000000000000000000000000000009f7a5bb", 0x20, 0x205fe0}, {0x0, 0x0, 0x401320}], 0x0, &(0x7f0000014b00)) 13:22:37 executing program 5 (fault-call:0 fault-nth:53): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000660000000f000000000000000100000001000000004000000040000020000000daf4655fdaf4655f0100ffff53ef010001000000d9f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010100)}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000100000000000000000000000000000000000000000000003000000000000000", 0x40, 0x540}, {&(0x7f0000010300)="02000000030000000400000066000f000300040000000000000000000f007f5c", 0x20, 0x800}, {&(0x7f0000011500)="ed41000000080000d9f4655fdaf4655fdaf4655f000000000000040004", 0x1d, 0x2200}, {0x0}, {&(0x7f0000011900)="ed8100001a040000daf4655fdaf4655fdaf4655f000000000000010004000000000000000100000014000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000039c34d38000000000000000000000000000000000000000000000000200000007412ab417412ab417412ab41daf4655f7412ab410000000000000000", 0xa0, 0x3800}], 0x0, &(0x7f0000012c00)) 13:22:37 executing program 3: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef0100010000002bc4645f000000000000000001000000000000000b0000000001000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e373836333438323637", 0xa2, 0x400}, {&(0x7f0000010100)="0000000000000000000000002f527b43270a4164871303f1137e5908010040000c000000000000002bc4645f", 0x2c, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000500000000000000000000000000000000000000040100004d", 0x39, 0x540}, {&(0x7f0000000040)="00000000000000000000000000000000000000000000000000000000787371fe", 0x20, 0x7e0}, {&(0x7f0000010400)="0200000012000000220000002d000f00030004000000000031245cf20f0062e6000000000000000000000000000000000000000000000000d4189ee9", 0x3c, 0x1000}, {&(0x7f0000012f00)="ed410000001000002bc4645f2bc4645f2bc4645f00000000000004000800000000000800050000000af3010004000000000000000000000001000000030000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002f49000020004f3f54a9d2a254a9d2a2000000002bc4645f", 0x94, 0x22100}], 0x0, &(0x7f0000000300)=ANY=[]) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) statx(r0, &(0x7f0000000340)='./file1\x00', 0x0, 0x0, 0x0) ptrace$setregs(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000080)) ptrace$setregs(0xd, 0x0, 0x5, &(0x7f0000000080)) [ 237.710453][T10399] F2FS-fs (loop0): invalid crc_offset: 0 [ 237.714673][T10393] F2FS-fs (loop2): invalid crc_offset: 0 [ 237.719492][T10399] F2FS-fs (loop0): invalid crc_offset: 0 [ 237.728825][T10387] [EXT4 FS bs=1024, gc=1, bpg=8192, ipg=32, mo=e802e018, mo2=0006] [ 237.737572][T10387] System zones: 1-2, 19-19, 35-38, 46-46 [ 237.743515][T10399] F2FS-fs (loop0): Failed to get valid F2FS checkpoint [ 237.743842][T10393] attempt to access beyond end of device [ 237.743842][T10393] loop2: rw=12288, want=12296, limit=8287 [ 237.752155][T10387] EXT4-fs (loop4): mounting with "discard" option, but the device does not support discard [ 237.763098][T10393] attempt to access beyond end of device [ 237.763098][T10393] loop2: rw=12288, want=12296, limit=8287 [ 237.783076][T10387] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue [ 237.792070][T10405] FAULT_INJECTION: forcing a failure. [ 237.792070][T10405] name failslab, interval 1, probability 0, space 0, times 0 [ 237.808072][T10387] ext4 filesystem being mounted at /root/syzkaller-testdir756229767/syzkaller.YUione/373/file0 supports timestamps until 2038 (0x7fffffff) [ 237.823052][T10405] CPU: 1 PID: 10405 Comm: syz-executor.5 Not tainted 5.4.125-syzkaller-00016-gae94e015273b #0 [ 237.833280][T10405] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 237.844030][T10405] Call Trace: [ 237.847317][T10405] dump_stack+0x1d8/0x24e [ 237.851735][T10405] ? devkmsg_release+0x11c/0x11c [ 237.856660][T10405] ? show_regs_print_info+0x12/0x12 [ 237.858665][T10393] F2FS-fs (loop2): Failed to initialize F2FS segment manager (-5) [ 237.861847][T10405] should_fail+0x6f6/0x860 [ 237.861859][T10405] ? setup_fault_attr+0x3d0/0x3d0 [ 237.861875][T10405] ? __down_read+0xf1/0x210 [ 237.883622][T10405] ? mutex_lock+0xa6/0x110 [ 237.888032][T10405] ? __list_lru_init+0xa7/0x550 [ 237.892874][T10405] should_failslab+0x5/0x20 [ 237.897638][T10405] kmem_cache_alloc_trace+0x39/0x2b0 [ 237.902913][T10405] __list_lru_init+0xa7/0x550 [ 237.907928][T10405] ? prealloc_shrinker+0x1c0/0x210 [ 237.913026][T10405] alloc_super+0x640/0x750 [ 237.917431][T10405] ? mount_bdev+0x340/0x340 [ 237.921922][T10405] sget+0x20e/0x4e0 [ 237.925751][T10405] ? test_bdev_super+0x40/0x40 [ 237.930938][T10405] mount_bdev+0xe3/0x340 [ 237.935171][T10405] ? ext4_mount+0x40/0x40 [ 237.939494][T10405] legacy_get_tree+0xde/0x170 [ 237.944422][T10405] ? ext4_lazyinit_thread+0xd40/0xd40 [ 237.949782][T10405] vfs_get_tree+0x83/0x260 [ 237.954186][T10405] do_mount+0x19d0/0x2670 [ 237.958513][T10405] ? copy_mount_string+0x30/0x30 [ 237.963443][T10405] ? copy_mount_options+0x59/0x300 [ 237.968544][T10405] ? copy_mount_options+0x59/0x300 [ 237.973732][T10405] ? kmem_cache_alloc_trace+0x139/0x2b0 [ 237.979448][T10405] ? copy_mount_options+0x273/0x300 [ 237.984641][T10405] ksys_mount+0xc2/0xf0 [ 237.988787][T10405] __x64_sys_mount+0xb1/0xc0 [ 237.993365][T10405] do_syscall_64+0xcb/0x1e0 [ 237.997859][T10405] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 238.003735][T10405] RIP: 0033:0x467b1a [ 238.007621][T10405] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 238.027211][T10405] RSP: 002b:00007f3059253fa8 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 238.035608][T10405] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 0000000000467b1a [ 238.043567][T10405] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007f3059254000 [ 238.051526][T10405] RBP: 00007f3059254040 R08: 00007f3059254040 R09: 0000000020000000 13:22:37 executing program 3: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef0100010000002bc4645f000000000000000001000000000000000b0000000001000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e373836333438323637", 0xa2, 0x400}, {&(0x7f0000010100)="0000000000000000000000002f527b43270a4164871303f1137e5908010040000c000000000000002bc4645f", 0x2c, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000500000000000000000000000000000000000000040100004d", 0x39, 0x540}, {&(0x7f0000000040)="00000000000000000000000000000000000000000000000000000000787371fe", 0x20, 0x7e0}, {&(0x7f0000010400)="0200000012000000220000002d000f00030004000000000031245cf20f0062e6000000000000000000000000000000000000000000000000d4189ee9", 0x3c, 0x1000}, {&(0x7f0000012f00)="ed410000001000002bc4645f2bc4645f2bc4645f00000000000004000800000000000800050000000af3010004000000000000000000000001000000030000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002f49000020004f3f54a9d2a254a9d2a2000000002bc4645f", 0x94, 0x22100}], 0x0, &(0x7f0000000300)=ANY=[]) perf_event_open(0x0, 0x0, 0x8d, 0xffffffffffffffff, 0x0) r1 = gettid() ptrace$setopts(0x4206, r1, 0x0, 0x5) tkill(r1, 0x34) ptrace$cont(0x18, r1, 0x0, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='pids.events\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x12, r2, 0x0) ftruncate(r2, 0x1000673) perf_event_open(&(0x7f0000000140)={0x5, 0x80, 0x70, 0xe1, 0x5, 0x1, 0x0, 0x3ff, 0x12c00, 0xa, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0xfffffff7, 0x1, @perf_bp={&(0x7f0000000080)}, 0x400, 0x0, 0x4, 0x1, 0x7, 0x7, 0x8001, 0x0, 0x6c2, 0x0, 0x200}, r1, 0xb, r2, 0x2) statx(r0, &(0x7f0000000340)='./file1\x00', 0x0, 0x0, 0x0) ptrace$setregs(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000080)) 13:22:37 executing program 3: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef0100010000002bc4645f000000000000000001000000000000000b0000000001000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e373836333438323637", 0xa2, 0x400}, {&(0x7f0000010100)="0000000000000000000000002f527b43270a4164871303f1137e5908010040000c000000000000002bc4645f", 0x2c, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000500000000000000000000000000000000000000040100004d", 0x39, 0x540}, {&(0x7f0000000040)="00000000000000000000000000000000000000000000000000000000787371fe", 0x20, 0x7e0}, {&(0x7f0000010400)="0200000012000000220000002d000f00030004000000000031245cf20f0062e6000000000000000000000000000000000000000000000000d4189ee9", 0x3c, 0x1000}, {&(0x7f0000012f00)="ed410000001000002bc4645f2bc4645f2bc4645f00000000000004000800000000000800050000000af3010004000000000000000000000001000000030000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002f49000020004f3f54a9d2a254a9d2a2000000002bc4645f", 0x94, 0x22100}], 0x0, &(0x7f0000000300)=ANY=[]) utime(&(0x7f0000000080)='./file1\x00', &(0x7f00000000c0)={0x4, 0x80}) r1 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) statx(r0, &(0x7f0000000340)='./file1\x00', 0x0, 0x0, 0x0) ptrace$setregs(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, 0x0, 0x80000000, 0x1) ioctl$PERF_EVENT_IOC_ID(r1, 0x80082407, &(0x7f0000000180)) openat$incfs(0xffffffffffffff9c, &(0x7f0000000140)='.pending_reads\x00', 0x20001, 0x3c) 13:22:38 executing program 3: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef0100010000002bc4645f000000000000000001000000000000000b0000000001000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e373836333438323637", 0xa2, 0x400}, {&(0x7f0000010100)="0000000000000000000000002f527b43270a4164871303f1137e5908010040000c000000000000002bc4645f", 0x2c, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000500000000000000000000000000000000000000040100004d", 0x39, 0x540}, {&(0x7f0000000040)="00000000000000000000000000000000000000000000000000000000787371fe", 0x20, 0x7e0}, {&(0x7f0000010400)="0200000012000000220000002d000f00030004000000000031245cf20f0062e6000000000000000000000000000000000000000000000000d4189ee9", 0x3c, 0x1000}, {&(0x7f0000012f00)="ed410000001000002bc4645f2bc4645f2bc4645f00000000000004000800000000000800050000000af3010004000000000000000000000001000000030000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002f49000020004f3f54a9d2a254a9d2a2000000002bc4645f", 0x94, 0x22100}], 0x0, &(0x7f0000000300)=ANY=[]) r1 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) statx(r0, &(0x7f0000000340)='./file1\x00', 0x0, 0x0, 0x0) r2 = getpid() r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='pids.events\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x12, r3, 0x0) ftruncate(r3, 0x1000673) openat(r3, &(0x7f00000000c0)='./file0\x00', 0x400680, 0x6) perf_event_open(&(0x7f0000000140)={0x1, 0x80, 0x29, 0x9, 0x80, 0x59, 0x0, 0x3, 0x4080, 0x7, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x3, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x3f, 0x0, @perf_bp={&(0x7f0000000080), 0xc}, 0x2000, 0xffffffff, 0x4, 0x4, 0x59d3, 0xd7, 0xfb0b, 0x0, 0x6, 0x0, 0x1f}, r2, 0x9, r1, 0x3) ioctl$sock_SIOCGPGRP(r3, 0x8904, &(0x7f00000001c0)=0x0) ptrace$setregs(0xf, r4, 0x2, &(0x7f0000000380)="6c42ed913c13e817f859145625f6ca0408465235bc067b15cf3b38261832ec84d18f99bd0649cf728827053f895a7472bdcb93aff38c5b8ec2e122ccc6a5763fa135ab09b5d7493006364f138eaf434f364a81a399ea1bbda45a05510828ffe581a1951b372050bbb36fbfe4f48f06ea1f7cb4652c3cf66fa535fdd74076de99be76c9ddc2b3a81e2e808a300d532e95a2c89c967dc3cbce1b4e1ec8c94e25f435f360124de4623c230ae2a797a5fe77f6eb3dbdd81f28f5ccf59a3cf96e51cfe4df746d91a0bedb3ab4ae874509d80b5afde01164ea23ebb5b28a902efc58aa771cbe79d97443a69117f679aa9aaf218d3c779e") 13:22:38 executing program 3: getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x42, &(0x7f0000000080), &(0x7f00000000c0)=0x10) r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef0100010000002bc4645f000000000000000001000000000000000b0000000001000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e373836333438323637", 0xa2, 0x400}, {&(0x7f0000010100)="0000000000000000000000002f527b43270a4164871303f1137e5908010040000c000000000000002bc4645f", 0x2c, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000500000000000000000000000000000000000000040100004d", 0x39, 0x540}, {&(0x7f0000000040)="00000000000000000000000000000000000000000000000000000000787371fe", 0x20, 0x7e0}, {&(0x7f0000010400)="0200000012000000220000002d000f00030004000000000031245cf20f0062e6000000000000000000000000000000000000000000000000d4189ee9", 0x3c, 0x1000}, {&(0x7f0000012f00)="ed410000001000002bc4645f2bc4645f2bc4645f00000000000004000800000000000800050000000af3010004000000000000000000000001000000030000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002f49000020004f3f54a9d2a254a9d2a2000000002bc4645f", 0x94, 0x22100}], 0x0, &(0x7f0000000300)=ANY=[]) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) statx(r0, &(0x7f0000000340)='./file1\x00', 0x0, 0x0, 0x0) ptrace$setregs(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000140)="3c565756c7ad7caba0c98e9ab361aa20a5a03104022aaa86927efe15527be3cefd281de7c626047f078764d1c59fea439546e9b700000000000000000000000000a4e78b9a979f9939a132eaeccc") openat(0xffffffffffffffff, &(0x7f00000001c0)='./file1\x00', 0x0, 0x20) 13:22:38 executing program 3: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef0100010000002bc4645f000000000000000001000000000000000b0000000001000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e373836333438323637", 0xa2, 0x400}, {&(0x7f0000010100)="0000000000000000000000002f527b43270a4164871303f1137e5908010040000c000000000000002bc4645f", 0x2c, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000500000000000000000000000000000000000000040100004d", 0x39, 0x540}, {&(0x7f0000000040)="00000000000000000000000000000000000000000000000000000000787371fe", 0x20, 0x7e0}, {&(0x7f0000010400)="0200000012000000220000002d000f00030004000000000031245cf20f0062e6000000000000000000000000000000000000000000000000d4189ee9", 0x3c, 0x1000}, {&(0x7f0000012f00)="ed410000001000002bc4645f2bc4645f2bc4645f00000000000004000800000000000800050000000af3010004000000000000000000000001000000030000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002f49000020004f3f54a9d2a254a9d2a2000000002bc4645f", 0x94, 0x22100}], 0x0, &(0x7f0000000300)=ANY=[]) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) statx(r0, &(0x7f0000000340)='./file1\x00', 0x0, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='pids.events\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x12, r1, 0x0) ftruncate(r1, 0x1000673) perf_event_open(&(0x7f0000000140)={0x5, 0x80, 0x1, 0x1, 0x7, 0x20, 0x0, 0x6, 0x24000, 0x4, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0xffff, 0x1, @perf_bp={&(0x7f0000000080), 0xa}, 0xa028, 0x7529, 0x395e9ed6, 0x7, 0x8, 0x51a, 0x0, 0x0, 0x6, 0x0, 0x401}, 0x0, 0x10, r1, 0x2) ptrace$setregs(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000080)) 13:22:38 executing program 4: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000002, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x31) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) waitid$P_PIDFD(0x3, r0, &(0x7f0000000500), 0x9, &(0x7f0000000580)) ptrace$cont(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='pids.events\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x12, r1, 0x0) ftruncate(r1, 0x1000673) ioctl$KDSKBENT(r1, 0x4b47, &(0x7f00000002c0)={0x2, 0x81, 0x5}) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x88400, 0x1a8) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0xd0265000) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) exit_group(0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x31, 0xffffffffffffffff, 0x0) time(&(0x7f0000000180)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14001500, 0x6, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c190000ce1900000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800)) [ 238.059486][T10405] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000020000000 [ 238.067442][T10405] R13: 0000000020000100 R14: 00007f3059254000 R15: 0000000020012c00 13:22:38 executing program 5 (fault-call:0 fault-nth:54): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000660000000f000000000000000100000001000000004000000040000020000000daf4655fdaf4655f0100ffff53ef010001000000d9f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010100)}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000100000000000000000000000000000000000000000000003000000000000000", 0x40, 0x540}, {&(0x7f0000010300)="02000000030000000400000066000f000300040000000000000000000f007f5c", 0x20, 0x800}, {&(0x7f0000011500)="ed41000000080000d9f4655fdaf4655fdaf4655f000000000000040004", 0x1d, 0x2200}, {0x0}, {&(0x7f0000011900)="ed8100001a040000daf4655fdaf4655fdaf4655f000000000000010004000000000000000100000014000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000039c34d38000000000000000000000000000000000000000000000000200000007412ab417412ab417412ab41daf4655f7412ab410000000000000000", 0xa0, 0x3800}], 0x0, &(0x7f0000012c00)) 13:22:38 executing program 1: clone(0x13102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) poll(0x0, 0x0, 0x8000000000000200) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f00000025c0)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00'}) ioctl$TUNSETLINK(r0, 0x800454cf, 0x30a) r2 = openat$selinux_attr(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) mmap(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x6, 0x1010, r2, 0xdc5f7000) close(r0) r3 = socket$inet_tcp(0x2, 0x1, 0x0) preadv(r3, 0x0, 0x0, 0x7fffffff, 0x1) 13:22:38 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_mount_image$f2fs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0xf, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}, {&(0x7f0000010500)='\x00\x00\x00\x00', 0x4, 0xc80}, {&(0x7f0000010700)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e00000010000003000000010000000200000018b2e346f95e497f827e0a", 0x77, 0x1400}, {0x0}, {&(0x7f0000010e00)="d73cd47a0000000000100000000000000b000000000000000d0000001000000012000000170000001600000015000000ffffffffffffffffffffffffffffffffffffffff03000600000000000000000000000000140000000100000000000000ffffffffffffffffffffffffffffffffffffffff05000000000000000000000000000000c5010000060000000100000007000000070000000a0000004000000040000000fc0f00"/181, 0xb5, 0x200000}, {&(0x7f0000010f00)="0000000000000000000000000000000000000000000000000000000009f7a5bb", 0x20, 0x200fe0}, {&(0x7f0000011000)="00000000000000000000000000000000000000000000000000000006", 0x1c, 0x2011e0}, {0x0, 0x0, 0x2012e0}, {&(0x7f0000011400)="000000000000000000000000000000000000000000160000000510ec", 0x1c, 0x201320}, {&(0x7f0000011500)="00000017000000020c60", 0xa, 0x201380}, {&(0x7f0000011600)}, {&(0x7f0000011800)}, {0x0, 0x0, 0x204fe0}, {&(0x7f0000011c00)="0000000000000000000000000000000000000000000000000000000009f7a5bb", 0x20, 0x205fe0}, {0x0, 0x0, 0x401320}], 0x0, &(0x7f0000014b00)) 13:22:38 executing program 2: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffff, 0xffffffffffffffff, 0x0) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) read(r0, 0x0, 0x0) syz_mount_image$f2fs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x11, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}, {&(0x7f0000010500)='\x00\x00\x00\x00', 0x4, 0xc80}, {&(0x7f0000010700)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e00000010000003000000010000000200000018b2e346f95e497f827e0a", 0x77, 0x1400}, {0x0}, {&(0x7f0000010e00)="d73cd47a0000000000100000000000000b000000000000000d0000001000000012000000170000001600000015000000ffffffffffffffffffffffffffffffffffffffff03000600000000000000000000000000140000000100000000000000ffffffffffffffffffffffffffffffffffffffff05000000000000000000000000000000c5010000060000000100000007000000070000000a0000004000000040000000fc0f00"/181, 0xb5, 0x200000}, {&(0x7f0000010f00)="0000000000000000000000000000000000000000000000000000000009f7a5bb", 0x20, 0x200fe0}, {&(0x7f0000011000)="00000000000000000000000000000000000000000000000000000006", 0x1c, 0x2011e0}, {0x0, 0x0, 0x2012e0}, {&(0x7f0000011400)="000000000000000000000000000000000000000000160000000510ec", 0x1c, 0x201320}, {&(0x7f0000011500)="00000017000000020c60", 0xa, 0x201380}, {&(0x7f0000011600)}, {&(0x7f0000011800)}, {&(0x7f0000011b00)="0000000000000000000000000000000000000000000000000000000100000000d73cd47a0000000000100000000000000b000000000000000d0000001000000012000000170000001600000015000000ffffffffffffffffffffffffffffffffffffffff03000600000000000000000000000000140000000100000000000000ffffffffffffffffffffffffffffffffffffffff05000000000000000000000000000000c5010000060000000100000007000000070000000a0000004000000040000000fc0f", 0xc6, 0x204fe0}, {&(0x7f0000011c00)="0000000000000000000000000000000000000000000000000000000009f7a5bb", 0x20, 0x205fe0}, {0x0}, {0x0}, {&(0x7f0000013000)="000000000000000000000100000001", 0xf}], 0x0, &(0x7f0000014b00)) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='pids.events\x00', 0x275a, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x4, 0x2d, 0x9, 0x1, 0x0, 0x7fff, 0x88, 0x4, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x7, 0x0, @perf_bp={&(0x7f00000000c0), 0x1}, 0x9, 0x1, 0x4, 0x9, 0x0, 0xffff, 0x400, 0x0, 0x2, 0x0, 0x1000}, 0x0, 0xe, r1, 0xa) 13:22:38 executing program 3: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef0100010000002bc4645f000000000000000001000000000000000b0000000001000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e373836333438323637", 0xa2, 0x400}, {&(0x7f0000010100)="0000000000000000000000002f527b43270a4164871303f1137e5908010040000c000000000000002bc4645f", 0x2c, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000500000000000000000000000000000000000000040100004d", 0x39, 0x540}, {&(0x7f0000000040)="00000000000000000000000000000000000000000000000000000000787371fe", 0x20, 0x7e0}, {&(0x7f0000010400)="0200000012000000220000002d000f00030004000000000031245cf20f0062e6000000000000000000000000000000000000000000000000d4189ee9", 0x3c, 0x1000}, {&(0x7f0000012f00)="ed410000001000002bc4645f2bc4645f2bc4645f00000000000004000800000000000800050000000af3010004000000000000000000000001000000030000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002f49000020004f3f54a9d2a254a9d2a2000000002bc4645f", 0x94, 0x22100}], 0x0, &(0x7f0000000300)=ANY=[]) mount$overlay(0x0, &(0x7f00000002c0)='./file1\x00', &(0x7f0000000300), 0x2020, &(0x7f0000000380)={[{@nfs_export_off}, {@lowerdir={'lowerdir', 0x3d, './file1'}}, {@index_off}, {@index_on}, {@nfs_export_on}, {@redirect_dir={'redirect_dir', 0x3d, './file0'}}, {@metacopy_on}, {@xino_off}], [{@subj_user={'subj_user', 0x3d, 'subj_role'}}, {@obj_user={'obj_user', 0x3d, 'xino=on'}}, {@fsmagic={'fsmagic', 0x3d, 0x6}}]}) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount$overlay(0x0, &(0x7f00000000c0)='./file1\x00', &(0x7f0000000140), 0x800000, &(0x7f0000000180)={[{@xino_on}, {@xino_auto}, {@xino_auto}, {@default_permissions}], [{@hash}, {@subj_role={'subj_role', 0x3d, 'ext4\x00'}}]}) statx(r0, &(0x7f0000000340)='./file1\x00', 0x0, 0x0, 0x0) ptrace$setregs(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000080)) chdir(&(0x7f0000000080)='./file0\x00') [ 238.295055][T10438] FAULT_INJECTION: forcing a failure. [ 238.295055][T10438] name failslab, interval 1, probability 0, space 0, times 0 [ 238.308942][T10438] CPU: 0 PID: 10438 Comm: syz-executor.5 Not tainted 5.4.125-syzkaller-00016-gae94e015273b #0 [ 238.319182][T10438] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 238.329222][T10438] Call Trace: [ 238.332505][T10438] dump_stack+0x1d8/0x24e [ 238.336829][T10438] ? devkmsg_release+0x11c/0x11c [ 238.341761][T10438] ? show_regs_print_info+0x12/0x12 [ 238.346947][T10438] should_fail+0x6f6/0x860 [ 238.351352][T10438] ? setup_fault_attr+0x3d0/0x3d0 [ 238.356364][T10438] ? kvmalloc_node+0x7e/0xf0 [ 238.360943][T10438] should_failslab+0x5/0x20 [ 238.365435][T10438] __kmalloc+0x5f/0x2f0 [ 238.369578][T10438] ? __list_lru_init+0xa7/0x550 [ 238.374413][T10438] kvmalloc_node+0x7e/0xf0 [ 238.378817][T10438] __list_lru_init+0x1c6/0x550 [ 238.383567][T10438] ? prealloc_shrinker+0x1c0/0x210 [ 238.388663][T10438] alloc_super+0x611/0x750 [ 238.393068][T10438] ? mount_bdev+0x340/0x340 [ 238.397565][T10438] sget+0x20e/0x4e0 [ 238.402227][T10438] ? test_bdev_super+0x40/0x40 [ 238.406978][T10438] mount_bdev+0xe3/0x340 [ 238.411212][T10438] ? ext4_mount+0x40/0x40 [ 238.415550][T10438] legacy_get_tree+0xde/0x170 [ 238.420213][T10438] ? ext4_lazyinit_thread+0xd40/0xd40 [ 238.425586][T10438] vfs_get_tree+0x83/0x260 [ 238.429992][T10438] do_mount+0x19d0/0x2670 [ 238.434337][T10438] ? copy_mount_string+0x30/0x30 [ 238.439260][T10438] ? copy_mount_options+0x59/0x300 13:22:38 executing program 3: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x0, &(0x7f0000000300)=ANY=[]) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) statx(r0, &(0x7f0000000340)='./file1\x00', 0x0, 0x0, 0x0) ptrace$setregs(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000080)) pivot_root(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='./file0\x00') r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0x0, r2, 0xee00) quotactl(0xecd, &(0x7f0000000040)='./file1\x00', r2, &(0x7f0000000140)="2ed5e4bc2b0d9d5f31072184aafc777ac50ffe5ac6559247acac17b31e3b9674bdca01521330f3541bbf50e82aead3a4c85df79b7b67d56ccbfdd7f90ff93e273c9527181b7e6a821edfa12f7c72062696d304dc9479e903736e2175748076196ed9d99b7e2e9b9315e77e27460ae575144fc255d85163c67c1f47de063da0e9") 13:22:38 executing program 2: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffff, 0xffffffffffffffff, 0x0) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) read(r0, 0x0, 0x0) syz_mount_image$f2fs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x10, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}, {&(0x7f0000010500)='\x00\x00\x00\x00', 0x4, 0xc80}, {&(0x7f0000010700)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e00000010000003000000010000000200000018b2e346f95e497f827e0a", 0x77, 0x1400}, {0x0}, {&(0x7f0000010e00)="d73cd47a0000000000100000000000000b000000000000000d0000001000000012000000170000001600000015000000ffffffffffffffffffffffffffffffffffffffff03000600000000000000000000000000140000000100000000000000ffffffffffffffffffffffffffffffffffffffff05000000000000000000000000000000c5010000060000000100000007000000070000000a0000004000000040000000fc0f00"/181, 0xb5, 0x200000}, {&(0x7f0000010f00)="0000000000000000000000000000000000000000000000000000000009f7a5bb", 0x20, 0x200fe0}, {&(0x7f0000011000)="00000000000000000000000000000000000000000000000000000006", 0x1c, 0x2011e0}, {0x0, 0x0, 0x2012e0}, {&(0x7f0000011400)="000000000000000000000000000000000000000000160000000510ec", 0x1c, 0x201320}, {&(0x7f0000011500)="00000017000000020c60", 0xa, 0x201380}, {&(0x7f0000011600)}, {&(0x7f0000011800)}, {&(0x7f0000011b00)="0000000000000000000000000000000000000000000000000000000100000000d73cd47a0000000000100000000000000b000000000000000d0000001000000012000000170000001600000015000000ffffffffffffffffffffffffffffffffffffffff03000600000000000000000000000000140000000100000000000000ffffffffffffffffffffffffffffffffffffffff05000000000000000000000000000000c5010000060000000100000007000000070000000a0000004000000040000000fc0f", 0xc6, 0x204fe0}, {&(0x7f0000011c00)="0000000000000000000000000000000000000000000000000000000009f7a5bb", 0x20, 0x205fe0}, {0x0}, {&(0x7f0000013000)="000000000000000000000100000001", 0xf, 0xa00000}], 0x0, &(0x7f0000014b00)) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='pids.events\x00', 0x275a, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x4, 0x2d, 0x9, 0x1, 0x0, 0x7fff, 0x88, 0x4, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x7, 0x0, @perf_bp={&(0x7f00000000c0), 0x1}, 0x9, 0x1, 0x4, 0x9, 0x0, 0xffff, 0x400, 0x0, 0x2, 0x0, 0x1000}, 0x0, 0xe, r1, 0xa) 13:22:38 executing program 3: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef0100010000002bc4645f000000000000000001000000000000000b0000000001000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e373836333438323637", 0xa2, 0x400}, {&(0x7f0000010100)="0000000000000000000000002f527b43270a4164871303f1137e5908010040000c000000000000002bc4645f", 0x2c, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000500000000000000000000000000000000000000040100004d", 0x39, 0x540}, {&(0x7f0000000040)="00000000000000000000000000000000000000000000000000000000787371fe", 0x20, 0x7e0}, {&(0x7f0000010400)="0200000012000000220000002d000f00030004000000000031245cf20f0062e6000000000000000000000000000000000000000000000000d4189ee9", 0x3c, 0x1000}, {&(0x7f0000012f00)="ed410000001000002bc4645f2bc4645f2bc4645f00000000000004000800000000000800050000000af3010004000000000000000000000001000000030000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002f49000020004f3f54a9d2a254a9d2a2000000002bc4645f", 0x94, 0x22100}], 0x0, &(0x7f0000000300)=ANY=[]) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000140), 0x40240, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0x0, r3, 0xee00) r4 = socket$inet6(0xa, 0x3, 0x40) getsockopt$inet6_tcp_buf(r4, 0x6, 0x27, &(0x7f0000000180), &(0x7f00000001c0)) mount$fuse(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0), 0x40000, &(0x7f0000000380)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r1, @ANYBLOB=',rootmode=00000000000000000010000,user_id=', @ANYRESDEC=r3, @ANYBLOB=',group_id=', @ANYRESDEC, @ANYBLOB="2c64656661753f0084db54863d6291b2645190c53cd5a8860000000000007373696f6e732c6d61785f726561643d3078303030303030303030313030303030302c62e387d85e83627548b179b6ddf7297a0e9b61703078303030303030303030303030303630302c626c6b73697a653d3078303030303030303030303030313430302c616c6c6f775f6f746865722c736d61636b"]) statx(r0, &(0x7f0000000340)='./file1\x00', 0x0, 0x0, 0x0) r5 = gettid() r6 = gettid() ptrace$setopts(0x4206, r6, 0x0, 0x5) tkill(r6, 0x34) ptrace$cont(0x18, r6, 0x0, 0x0) ptrace$setopts(0x4206, r6, 0x0, 0x5) tkill(r5, 0x34) ptrace$cont(0x18, r5, 0x0, 0x0) ptrace$setregs(0xd, r5, 0x0, &(0x7f0000000080)) ptrace$setregs(0xf, r5, 0x405, &(0x7f00000002c0)="c6cffffb96f538e055b9403d2395085bd2bfc1565c7e714ebc1e3300c807a20c5449684f7622c9d0f64434020eee80a1ab78eae43d47cd1462a6b7d736ab1eb05c0b5bb360720c1d3800"/88) 13:22:38 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_mount_image$f2fs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0xf, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}, {&(0x7f0000010500)='\x00\x00\x00\x00', 0x4, 0xc80}, {&(0x7f0000010700)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e00000010000003000000010000000200000018b2e346f95e497f827e0a", 0x77, 0x1400}, {0x0}, {&(0x7f0000010e00)="d73cd47a0000000000100000000000000b000000000000000d0000001000000012000000170000001600000015000000ffffffffffffffffffffffffffffffffffffffff03000600000000000000000000000000140000000100000000000000ffffffffffffffffffffffffffffffffffffffff05000000000000000000000000000000c5010000060000000100000007000000070000000a0000004000000040000000fc0f00"/181, 0xb5, 0x200000}, {&(0x7f0000010f00)="0000000000000000000000000000000000000000000000000000000009f7a5bb", 0x20, 0x200fe0}, {&(0x7f0000011000)="00000000000000000000000000000000000000000000000000000006", 0x1c, 0x2011e0}, {0x0, 0x0, 0x2012e0}, {&(0x7f0000011400)="000000000000000000000000000000000000000000160000000510ec", 0x1c, 0x201320}, {&(0x7f0000011500)="00000017000000020c60", 0xa, 0x201380}, {&(0x7f0000011600)}, {&(0x7f0000011800)}, {&(0x7f0000011b00), 0x0, 0x204fe0}, {&(0x7f0000011c00)="0000000000000000000000000000000000000000000000000000000009f7a5bb", 0x20, 0x205fe0}, {0x0, 0x0, 0x401320}], 0x0, &(0x7f0000014b00)) [ 238.444358][T10438] ? kmem_cache_alloc_trace+0x139/0x2b0 [ 238.449889][T10438] ? copy_mount_options+0x273/0x300 [ 238.455070][T10438] ksys_mount+0xc2/0xf0 [ 238.459218][T10438] __x64_sys_mount+0xb1/0xc0 [ 238.463799][T10438] do_syscall_64+0xcb/0x1e0 [ 238.468292][T10438] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 238.474173][T10438] RIP: 0033:0x467b1a [ 238.478059][T10438] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 238.489326][T10461] F2FS-fs (loop2): invalid crc_offset: 0 [ 238.497650][T10438] RSP: 002b:00007f3059253fa8 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 238.497659][T10438] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 0000000000467b1a [ 238.497664][T10438] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007f3059254000 [ 238.497670][T10438] RBP: 00007f3059254040 R08: 00007f3059254040 R09: 0000000020000000 [ 238.497675][T10438] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000020000000 13:22:38 executing program 4: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000002, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x31) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) waitid$P_PIDFD(0x3, r0, &(0x7f0000000500), 0x9, &(0x7f0000000580)) ptrace$cont(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='pids.events\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x12, r1, 0x0) ftruncate(r1, 0x1000673) ioctl$KDSKBENT(r1, 0x4b47, &(0x7f00000002c0)={0x2, 0x81, 0x5}) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x88400, 0x1a8) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0xd0265000) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) exit_group(0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x31, 0xffffffffffffffff, 0x0) time(&(0x7f0000000180)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14001500, 0x7, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c190000ce1900000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800)) 13:22:38 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef0100010000002bc4645f000000000000000001000000000000000b0000000001000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e373836333438323637", 0xa2, 0x400}, {&(0x7f0000010100)="0000000000000000000000002f527b43270a4164871303f1137e5908010040000c000000000000002bc4645f", 0x2c, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000500000000000000000000000000000000000000040100004d", 0x39, 0x540}, {&(0x7f0000000040)="00000000000000000000000000000000000000000000000000000000787371fe", 0x20, 0x7e0}, {&(0x7f0000010400)="0200000012000000220000002d000f00030004000000000031245cf20f0062e6000000000000000000000000000000000000000000000000d4189ee9", 0x3c, 0x1000}, {&(0x7f0000012f00)="ed410000001000002bc4645f2bc4645f2bc4645f00000000000004000800000000000800050000000af3010004000000000000000000000001000000030000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002f49000020004f3f54a9d2a254a9d2a2000000002bc4645f", 0x94, 0x22100}], 0x0, &(0x7f0000000300)=ANY=[]) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ptrace$setregs(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000080)) 13:22:38 executing program 5 (fault-call:0 fault-nth:55): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000660000000f000000000000000100000001000000004000000040000020000000daf4655fdaf4655f0100ffff53ef010001000000d9f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010100)}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000100000000000000000000000000000000000000000000003000000000000000", 0x40, 0x540}, {&(0x7f0000010300)="02000000030000000400000066000f000300040000000000000000000f007f5c", 0x20, 0x800}, {&(0x7f0000011500)="ed41000000080000d9f4655fdaf4655fdaf4655f000000000000040004", 0x1d, 0x2200}, {0x0}, {&(0x7f0000011900)="ed8100001a040000daf4655fdaf4655fdaf4655f000000000000010004000000000000000100000014000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000039c34d38000000000000000000000000000000000000000000000000200000007412ab417412ab417412ab41daf4655f7412ab410000000000000000", 0xa0, 0x3800}], 0x0, &(0x7f0000012c00)) [ 238.497680][T10438] R13: 0000000020000100 R14: 00007f3059254000 R15: 0000000020012c00 [ 238.554963][T10467] F2FS-fs (loop0): invalid crc_offset: 0 [ 238.561174][T10467] F2FS-fs (loop0): invalid crc_offset: 0 [ 238.567140][T10467] F2FS-fs (loop0): Failed to get valid F2FS checkpoint [ 238.570924][T10461] F2FS-fs (loop2): f2fs_check_nid_range: out-of-range nid=2, run fsck to fix. 13:22:38 executing program 3: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef0100010000002bc4645f000000000000000001000000000000000b0000000001000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e373836333438323637", 0xa2, 0x400}, {&(0x7f0000010100)="0000000000000000000000002f527b43270a4164871303f1137e5908010040000c000000000000002bc4645f", 0x2c, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000500000000000000000000000000000000000000040100004d", 0x39, 0x540}, {&(0x7f0000000040)="00000000000000000000000000000000000000000000000000000000787371fe", 0x20, 0x7e0}, {&(0x7f0000010400)="0200000012000000220000002d000f00030004000000000031245cf20f0062e6000000000000000000000000000000000000000000000000d4189ee9", 0x3c, 0x1000}, {&(0x7f0000012f00)="ed410000001000002bc4645f2bc4645f2bc4645f00000000000004000800000000000800050000000af3010004000000000000000000000001000000030000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002f49000020004f3f54a9d2a254a9d2a2000000002bc4645f", 0x94, 0x22100}], 0x0, &(0x7f0000000300)=ANY=[]) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000000c0)={&(0x7f0000000080)='./file1\x00'}, 0x10) r1 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) umount2(&(0x7f0000000180)='./file1\x00', 0x1) statx(r0, &(0x7f0000000340)='./file1\x00', 0x0, 0x4, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='pids.events\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x12, r2, 0x0) ftruncate(r2, 0x1000673) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r2) ptrace$setregs(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000080)) r3 = syz_open_dev$vcsn(&(0x7f0000000300), 0x27d, 0x602800) io_uring_enter(r3, 0x25e1, 0xc53b, 0x3, &(0x7f0000000380)={[0xfe1]}, 0x8) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f00000001c0)={&(0x7f00000003c0)=ANY=[@ANYBLOB="2000008b766aac21ea0f00", @ANYRES16=0x0, @ANYBLOB="000127bd7000fcdbdf25020000000c0006000100000000000000"], 0x20}}, 0x4000) [ 238.624370][T10469] EXT4-fs (loop4): mounting with "discard" option, but the device does not support discard [ 238.636119][T10469] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue [ 238.651577][T10469] ext4 filesystem being mounted at /root/syzkaller-testdir756229767/syzkaller.YUione/375/file0 supports timestamps until 2038 (0x7fffffff) [ 238.673309][T10461] F2FS-fs (loop2): Failed to read root inode [ 238.684441][T10484] FAULT_INJECTION: forcing a failure. [ 238.684441][T10484] name failslab, interval 1, probability 0, space 0, times 0 [ 238.726518][T10484] CPU: 1 PID: 10484 Comm: syz-executor.5 Not tainted 5.4.125-syzkaller-00016-gae94e015273b #0 [ 238.737023][T10484] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 238.747060][T10484] Call Trace: [ 238.750336][T10484] dump_stack+0x1d8/0x24e [ 238.754650][T10484] ? devkmsg_release+0x11c/0x11c [ 238.759565][T10484] ? show_regs_print_info+0x12/0x12 [ 238.764738][T10484] ? stack_trace_save+0x120/0x1f0 [ 238.769733][T10484] ? stack_trace_snprint+0x150/0x150 [ 238.774989][T10484] ? stack_trace_save+0x120/0x1f0 [ 238.779986][T10484] should_fail+0x6f6/0x860 [ 238.784375][T10484] ? setup_fault_attr+0x3d0/0x3d0 [ 238.789374][T10484] ? __kasan_kmalloc+0x1a3/0x1e0 [ 238.794284][T10484] ? ext4_fill_super+0xd4/0xeb30 [ 238.799196][T10484] should_failslab+0x5/0x20 [ 238.803675][T10484] __kmalloc_track_caller+0x5d/0x2e0 [ 238.808933][T10484] ? mount_bdev+0xe3/0x340 [ 238.813322][T10484] ? legacy_get_tree+0xde/0x170 [ 238.818150][T10484] ? vfs_get_tree+0x83/0x260 [ 238.822888][T10484] ? string+0x280/0x2c0 [ 238.827037][T10484] kstrdup+0x31/0x70 [ 238.830909][T10484] ext4_fill_super+0xd4/0xeb30 [ 238.835652][T10484] ? pointer+0x222/0xb10 [ 238.839871][T10484] ? string+0x2c0/0x2c0 [ 238.843999][T10484] ? vsnprintf+0x1d60/0x1d60 [ 238.848564][T10484] ? vsnprintf+0x1cb4/0x1d60 [ 238.853125][T10484] ? delete_node+0x733/0x790 [ 238.857691][T10484] ? ext4_mount+0x40/0x40 [ 238.861990][T10484] ? idr_replace+0x1c4/0x230 [ 238.866551][T10484] ? snprintf+0xd6/0x120 [ 238.870768][T10484] ? vscnprintf+0x80/0x80 [ 238.875072][T10484] ? set_blocksize+0x1a5/0x3a0 [ 238.879809][T10484] mount_bdev+0x22d/0x340 [ 238.884113][T10484] ? ext4_mount+0x40/0x40 [ 238.888417][T10484] legacy_get_tree+0xde/0x170 [ 238.893075][T10484] ? ext4_lazyinit_thread+0xd40/0xd40 [ 238.898419][T10484] vfs_get_tree+0x83/0x260 [ 238.902810][T10484] do_mount+0x19d0/0x2670 [ 238.907121][T10484] ? copy_mount_string+0x30/0x30 [ 238.912031][T10484] ? copy_mount_options+0x59/0x300 [ 238.917112][T10484] ? copy_mount_options+0x59/0x300 [ 238.922197][T10484] ? kmem_cache_alloc_trace+0x139/0x2b0 [ 238.927719][T10484] ? copy_mount_options+0x273/0x300 [ 238.932891][T10484] ksys_mount+0xc2/0xf0 [ 238.937021][T10484] __x64_sys_mount+0xb1/0xc0 [ 238.941584][T10484] do_syscall_64+0xcb/0x1e0 [ 238.946063][T10484] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 238.951925][T10484] RIP: 0033:0x467b1a [ 238.955793][T10484] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 238.975370][T10484] RSP: 002b:00007f3059253fa8 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 238.983753][T10484] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 0000000000467b1a [ 238.991699][T10484] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007f3059254000 [ 238.999662][T10484] RBP: 00007f3059254040 R08: 00007f3059254040 R09: 0000000020000000 [ 239.007610][T10484] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000020000000 [ 239.015560][T10484] R13: 0000000020000100 R14: 00007f3059254000 R15: 0000000020012c00 13:22:39 executing program 1: clone(0x13102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) poll(0x0, 0x0, 0x8000000000000200) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f00000025c0)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00'}) ioctl$TUNSETLINK(r0, 0x800454d2, 0x30a) r2 = openat$selinux_attr(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) mmap(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x6, 0x1010, r2, 0xdc5f7000) close(r0) r3 = socket$inet_tcp(0x2, 0x1, 0x0) preadv(r3, 0x0, 0x0, 0x7fffffff, 0x1) 13:22:39 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_mount_image$f2fs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0xf, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}, {&(0x7f0000010500)='\x00\x00\x00\x00', 0x4, 0xc80}, {&(0x7f0000010700)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e00000010000003000000010000000200000018b2e346f95e497f827e0a", 0x77, 0x1400}, {0x0}, {&(0x7f0000010e00)="d73cd47a0000000000100000000000000b000000000000000d0000001000000012000000170000001600000015000000ffffffffffffffffffffffffffffffffffffffff03000600000000000000000000000000140000000100000000000000ffffffffffffffffffffffffffffffffffffffff05000000000000000000000000000000c5010000060000000100000007000000070000000a0000004000000040000000fc0f00"/181, 0xb5, 0x200000}, {&(0x7f0000010f00)="0000000000000000000000000000000000000000000000000000000009f7a5bb", 0x20, 0x200fe0}, {&(0x7f0000011000)="00000000000000000000000000000000000000000000000000000006", 0x1c, 0x2011e0}, {0x0, 0x0, 0x2012e0}, {&(0x7f0000011400)="000000000000000000000000000000000000000000160000000510ec", 0x1c, 0x201320}, {&(0x7f0000011500)="00000017000000020c60", 0xa, 0x201380}, {&(0x7f0000011600)}, {&(0x7f0000011800)}, {&(0x7f0000011b00), 0x0, 0x204fe0}, {&(0x7f0000011c00)="0000000000000000000000000000000000000000000000000000000009f7a5bb", 0x20, 0x205fe0}, {0x0, 0x0, 0x401320}], 0x0, &(0x7f0000014b00)) 13:22:39 executing program 4: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000002, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x31) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) waitid$P_PIDFD(0x3, r0, &(0x7f0000000500), 0x9, &(0x7f0000000580)) ptrace$cont(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='pids.events\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x12, r1, 0x0) ftruncate(r1, 0x1000673) ioctl$KDSKBENT(r1, 0x4b47, &(0x7f00000002c0)={0x2, 0x81, 0x5}) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x88400, 0x1a8) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0xd0265000) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) exit_group(0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x31, 0xffffffffffffffff, 0x0) time(&(0x7f0000000180)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14001500, 0x8, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c190000ce1900000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800)) 13:22:39 executing program 3: setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(0xffffffffffffffff, 0x10e, 0x8, &(0x7f0000000080)=0x6, 0x4) r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef0100010000002bc4645f000000000000000001000000000000000b0000000001000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e373836333438323637", 0xa2, 0x400}, {&(0x7f0000010100)="0000000000000000000000002f527b43270a4164871303f1137e5908010040000c000000000000002bc4645f", 0x2c, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000500000000000000000000000000000000000000040100004d", 0x39, 0x540}, {&(0x7f0000000040)="00000000000000000000000000000000000000000000000000000000787371fe", 0x20, 0x7e0}, {&(0x7f0000010400)="0200000012000000220000002d000f00030004000000000031245cf20f0062e6000000000000000000000000000000000000000000000000d4189ee9", 0x3c, 0x1000}, {&(0x7f0000012f00)="ed410000001000002bc4645f2bc4645f2bc4645f00000000000004000800000000000800050000000af3010004000000000000000000000001000000030000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002f49000020004f3f54a9d2a254a9d2a2000000002bc4645f", 0x94, 0x22100}], 0x0, &(0x7f0000000300)=ANY=[]) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) statx(r0, &(0x7f0000000340)='./file1\x00', 0x0, 0x0, 0x0) ptrace$setregs(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000080)) 13:22:39 executing program 5 (fault-call:0 fault-nth:56): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000660000000f000000000000000100000001000000004000000040000020000000daf4655fdaf4655f0100ffff53ef010001000000d9f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010100)}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000100000000000000000000000000000000000000000000003000000000000000", 0x40, 0x540}, {&(0x7f0000010300)="02000000030000000400000066000f000300040000000000000000000f007f5c", 0x20, 0x800}, {&(0x7f0000011500)="ed41000000080000d9f4655fdaf4655fdaf4655f000000000000040004", 0x1d, 0x2200}, {0x0}, {&(0x7f0000011900)="ed8100001a040000daf4655fdaf4655fdaf4655f000000000000010004000000000000000100000014000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000039c34d38000000000000000000000000000000000000000000000000200000007412ab417412ab417412ab41daf4655f7412ab410000000000000000", 0xa0, 0x3800}], 0x0, &(0x7f0000012c00)) 13:22:39 executing program 2: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffff, 0xffffffffffffffff, 0x0) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) read(r0, 0x0, 0x0) syz_mount_image$f2fs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x10, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}, {&(0x7f0000010500)='\x00\x00\x00\x00', 0x4, 0xc80}, {&(0x7f0000010700)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e00000010000003000000010000000200000018b2e346f95e497f827e0a", 0x77, 0x1400}, {0x0}, {&(0x7f0000010e00)="d73cd47a0000000000100000000000000b000000000000000d0000001000000012000000170000001600000015000000ffffffffffffffffffffffffffffffffffffffff03000600000000000000000000000000140000000100000000000000ffffffffffffffffffffffffffffffffffffffff05000000000000000000000000000000c5010000060000000100000007000000070000000a0000004000000040000000fc0f00"/181, 0xb5, 0x200000}, {&(0x7f0000010f00)="0000000000000000000000000000000000000000000000000000000009f7a5bb", 0x20, 0x200fe0}, {&(0x7f0000011000)="00000000000000000000000000000000000000000000000000000006", 0x1c, 0x2011e0}, {0x0, 0x0, 0x2012e0}, {&(0x7f0000011400)="000000000000000000000000000000000000000000160000000510ec", 0x1c, 0x201320}, {&(0x7f0000011500)="00000017000000020c60", 0xa, 0x201380}, {&(0x7f0000011600)}, {&(0x7f0000011800)}, {&(0x7f0000011b00)="0000000000000000000000000000000000000000000000000000000100000000d73cd47a0000000000100000000000000b000000000000000d0000001000000012000000170000001600000015000000ffffffffffffffffffffffffffffffffffffffff03000600000000000000000000000000140000000100000000000000ffffffffffffffffffffffffffffffffffffffff05000000000000000000000000000000c5010000060000000100000007000000070000000a0000004000000040000000fc0f", 0xc6, 0x204fe0}, {&(0x7f0000011c00)="0000000000000000000000000000000000000000000000000000000009f7a5bb", 0x20, 0x205fe0}, {0x0}, {&(0x7f0000013000)="000000000000000000000100000001", 0xf, 0xa00000}], 0x0, &(0x7f0000014b00)) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='pids.events\x00', 0x275a, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x4, 0x2d, 0x9, 0x1, 0x0, 0x7fff, 0x88, 0x4, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x7, 0x0, @perf_bp={&(0x7f00000000c0), 0x1}, 0x9, 0x1, 0x4, 0x9, 0x0, 0xffff, 0x400, 0x0, 0x2, 0x0, 0x1000}, 0x0, 0xe, r1, 0xa) 13:22:39 executing program 4: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000002, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x31) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) waitid$P_PIDFD(0x3, r0, &(0x7f0000000500), 0x9, &(0x7f0000000580)) ptrace$cont(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='pids.events\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x12, r1, 0x0) ftruncate(r1, 0x1000673) ioctl$KDSKBENT(r1, 0x4b47, &(0x7f00000002c0)={0x2, 0x81, 0x5}) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x88400, 0x1a8) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0xd0265000) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) exit_group(0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x31, 0xffffffffffffffff, 0x0) time(&(0x7f0000000180)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14001500, 0xa, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c190000ce1900000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800)) [ 239.130035][T10499] F2FS-fs (loop0): invalid crc_offset: 0 [ 239.143357][T10499] F2FS-fs (loop0): invalid crc_offset: 0 [ 239.149629][T10499] F2FS-fs (loop0): Failed to get valid F2FS checkpoint [ 239.153823][T10498] FAULT_INJECTION: forcing a failure. [ 239.153823][T10498] name failslab, interval 1, probability 0, space 0, times 0 [ 239.180883][T10511] [EXT4 FS bs=1024, gc=1, bpg=8192, ipg=32, mo=e802e01c, mo2=0006] [ 239.192465][T10511] System zones: 1-2, 19-19, 35-38, 46-46 [ 239.196874][T10498] CPU: 1 PID: 10498 Comm: syz-executor.5 Not tainted 5.4.125-syzkaller-00016-gae94e015273b #0 [ 239.206181][T10511] EXT4-fs (loop4): mounting with "discard" option, but the device does not support discard [ 239.208332][T10498] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 239.208336][T10498] Call Trace: [ 239.208352][T10498] dump_stack+0x1d8/0x24e [ 239.208362][T10498] ? devkmsg_release+0x11c/0x11c [ 239.208377][T10498] ? show_regs_print_info+0x12/0x12 [ 239.218410][T10511] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue [ 239.228360][T10498] should_fail+0x6f6/0x860 [ 239.228370][T10498] ? setup_fault_attr+0x3d0/0x3d0 [ 239.228382][T10498] ? ext4_fill_super+0x113/0xeb30 [ 239.228396][T10498] should_failslab+0x5/0x20 [ 239.233925][T10511] ext4 filesystem being mounted at /root/syzkaller-testdir756229767/syzkaller.YUione/377/file0 supports timestamps until 2038 (0x7fffffff) [ 239.235981][T10498] kmem_cache_alloc_trace+0x39/0x2b0 [ 239.235990][T10498] ? memcpy+0x38/0x50 [ 239.236001][T10498] ext4_fill_super+0x113/0xeb30 [ 239.236018][T10498] ? pointer+0x222/0xb10 [ 239.264019][T10517] F2FS-fs (loop2): invalid crc_offset: 0 [ 239.264283][T10498] ? string+0x2c0/0x2c0 [ 239.264299][T10498] ? vsnprintf+0x1d60/0x1d60 [ 239.320451][T10498] ? vsnprintf+0x1cb4/0x1d60 [ 239.325030][T10498] ? delete_node+0x733/0x790 [ 239.329614][T10498] ? ext4_mount+0x40/0x40 [ 239.333926][T10498] ? idr_replace+0x1c4/0x230 [ 239.336261][T10517] F2FS-fs (loop2): f2fs_check_nid_range: out-of-range nid=2, run fsck to fix. [ 239.338502][T10498] ? snprintf+0xd6/0x120 [ 239.338513][T10498] ? vscnprintf+0x80/0x80 [ 239.338524][T10498] ? set_blocksize+0x1a5/0x3a0 [ 239.338541][T10498] mount_bdev+0x22d/0x340 [ 239.364914][T10498] ? ext4_mount+0x40/0x40 [ 239.369224][T10498] legacy_get_tree+0xde/0x170 [ 239.373879][T10498] ? ext4_lazyinit_thread+0xd40/0xd40 [ 239.379227][T10498] vfs_get_tree+0x83/0x260 [ 239.383622][T10498] do_mount+0x19d0/0x2670 [ 239.387405][T10517] F2FS-fs (loop2): Failed to read root inode [ 239.387933][T10498] ? copy_mount_string+0x30/0x30 [ 239.387945][T10498] ? copy_mount_options+0x59/0x300 [ 239.403891][T10498] ? copy_mount_options+0x59/0x300 [ 239.408983][T10498] ? kmem_cache_alloc_trace+0x139/0x2b0 [ 239.414518][T10498] ? copy_mount_options+0x273/0x300 [ 239.419699][T10498] ksys_mount+0xc2/0xf0 [ 239.423834][T10498] __x64_sys_mount+0xb1/0xc0 [ 239.428408][T10498] do_syscall_64+0xcb/0x1e0 [ 239.432891][T10498] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 239.438768][T10498] RIP: 0033:0x467b1a [ 239.442649][T10498] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 239.462238][T10498] RSP: 002b:00007f3059253fa8 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 239.470637][T10498] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 0000000000467b1a 13:22:39 executing program 3: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef0100010000002bc4645f000000000000000001000000000000000b0000000001000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e373836333438323637", 0xa2, 0x400}, {&(0x7f0000010100)="0000000000000000000000002f527b43270a4164871303f1137e5908010040000c000000000000002bc4645f", 0x2c, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000500000000000000000000000000000000000000040100004d", 0x39, 0x540}, {&(0x7f0000000040)="00000000000000000000000000000000000000000000000000000000787371fe", 0x20, 0x7e0}, {&(0x7f0000010400)="0200000012000000220000002d000f00030004000000000031245cf20f0062e6000000000000000000000000000000000000000000000000d4189ee9", 0x3c, 0x1000}, {&(0x7f0000012f00)="ed410000001000002bc4645f2bc4645f2bc4645f00000000000004000800000000000800050000000af3010004000000000000000000000001000000030000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002f49000020004f3f54a9d2a254a9d2a2000000002bc4645f", 0x94, 0x22100}], 0x0, &(0x7f0000000300)=ANY=[]) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='pids.events\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x12, r1, 0x0) ftruncate(r1, 0x1000673) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) r3 = socket$nl_audit(0x10, 0x3, 0x9) ioctl$sock_inet_SIOCSIFPFLAGS(r3, 0x8934, &(0x7f0000001f00)={'veth0_to_bond\x00'}) sendmmsg(r1, &(0x7f0000006540)=[{{&(0x7f0000000080)=@pppol2tpv3={0x18, 0x1, {0x0, r2, {0x2, 0x4e24, @multicast2}, 0x1, 0x0, 0x0, 0x3}}, 0x80, &(0x7f00000002c0)=[{&(0x7f0000000140)="2dcff2542fd67122d06ac728c5f14efe7804db0fbe27346082852095d8bab9adb9b04d1f06afc8a1c560e2d77b0401afca4a93a10344d865efce6280808b8bce7019819e00c1049d5d56af7808e96cc81d4d15e49abc0a", 0x57}, {&(0x7f00000001c0)="02d2dac1af04b7c8d34344aeee592bb1cb15c178f6f8dd38db45c891d7ad6a", 0x1f}, {&(0x7f0000000380)="f60ea73f04902b97f54a6cbd7cad9760e56765ffed7b9c826be2da5605873ebb1d1c9386247fa645fd7151b559cf9df3a8f8164a6a3718e9fd6c09c00d2654fd479ed1964fcb30b894c1b33c1d2dc366d6ebf0a30987873dba65f4a793e3d3e8f00c93cabdac3a3072a2fc5690828cb2406907819f872665ca84d3f635890581999d4d43972b", 0x86}, {&(0x7f0000000440)="d797018be2fb4a0e6b76dc5a07af77e6e0aeb2881826f320eff665752f63a32426ef8e3b14dfaa19eeecabf0b2fa46a7d12d9dbd2cf555b7994f4f8e46023ec09183a4488799e3f209cc220fc70478c6f2cbe9b08d82df2c4793132929a44444b4fa82076b2f575059fdbcf5b3e20ace531e1a6bd74625cce4ce61bd8ed1c5819a8f4674fdf04ae6cc9bfe", 0x8b}, {&(0x7f0000000500)="eb3d661892797c89b6feb7f45de4897dd7aad6aa676de673fe19433788554b6d6db1401bcbe4a37e6601cf830895cbbd47bd9a61201c18fcc2f195272c9e9c220dbecb826b507e29c3b8b7c1d8d2ded7ac562ae0399abcb314dac7a46991777730eb5e96106729c9aad6b2a980f7f298fcbd76abb63dc71109017d4849f0040cdb26ad50a8a11cfc7187eec24ba93a57a8fee3d6008f1357a20581f60177eb0d4e01292f25d4da183ae385494633701cc46f1d3d0451ec289b708c76c3e6421f3a79c0b6891262ad4598", 0xca}, {&(0x7f0000000600)="f2021c334f37149c5478b547d17b450c180439636c78157d07280107110a06b76d43d3e9b997f5e37b4dafc12acd9398ac512fd50959ff7f15d67e70d6729a0c1878b1cbac420476e928f492a06a8011aaf96e1894b5db538770b84ebfc848ef51288eb11ca09a477cb0b93fdff8c86041711185d99548ccf07f9ef3d198d42cbdca3418582a89ff19e8df0f2b1eb7af546e60438e3181e6c1d877d1316e4ec9e838bc74a23c13efdf041c72a2ecfc14b810dc9669c637b9dd92c558a7d214981520bda19ddae96ed56582d25c7791cbd23178120df38b6ae462fb48af984cb4adb11b7ff1fe80c0a8608d59a3ea07e9ce59d6e7494214728e", 0xf9}, {&(0x7f0000000700)="38bed00eef592bab1110c1416b0eadbcb10f59bb00a27a0213fdea9db57b6bd637c7e0bb3b7ca85e895c075191e6d31af6feb5f76a678a7abae735b20f70a3675b791c22deae8ff0678cfe4706aeb9707aa295aad31cf177bd772cb4046b0821da337eaa3a4f3eb2cd8e37e3bfb7c709a7bd853ea333325d053abb051ec2d58524ad5986ee1336921f68dcbcc9e0ca85c06c97cc3f87b5727f70bc027ba39edec7207b9c39d1460b1a3899efcc35d7901469f7a31455a66eb5bd07f8935e6b1d41", 0xc1}, {&(0x7f0000000800)="e075579a31cae754d1d954b6eecfffb335372d7b6c1f453aedff283a8a1e5063aaaaddcf3cee2c25269877d6105401de2b24e206dd880ee8e9720a630c4d6bffdb6656935ef4f9513a9f606f3f8107c012fc35515862b8635d677f34aa735a03f6584a79e6eafe79b00c1e71582dc957a648cbaa88b982db2caa21b6a03f45e967862cf998f8ec869f380b13f3d23d0365fe", 0x92}], 0x8}}, {{&(0x7f00000008c0)=@in={0x2, 0x4e23, @empty}, 0x80, &(0x7f0000000a40)=[{&(0x7f0000000940)="14802db9b3d99c203f97af74b2ab2ae20c3e0cc1bed914ae74f282761decf4fa1e3653cd840052b84505d71de940ec1ee8f1924751a0f75a78af44f15261b483e7a62b6f353e4948312695a7e9dac0f68c205f858396595d5848cba307c30e500484a94c9d4b160a853604f1fb302f7996d7d470cd254fc2fbbc7d695085a5f61e5f22cd0f535941cda4d20bed6c00bed4eefe9e69a8445e1eea16e7998443f177eeed06e4ac4f09622310b8fdbf5a95add6e4fff8084154191ce1cf9dd22b41d08ec8df39dcab3c3e2c346f6a586c7254e2", 0xd2}], 0x1, &(0x7f0000000a80)=[{0x50, 0xff, 0xfffffff9, "b903c5a0a82913423e6d753cac6b7ade0dfa44d2c4e02c5d90a9fa19725e801f5770a56147969c2927f3643e996fc9fc9990eaa17ddb7a1458d23b"}, {0x20, 0x104, 0xd2d2, "f1d8d32aad2ea7f634e0796f"}], 0x70}}, {{&(0x7f0000000b00)=@nfc_llcp={0x27, 0x1, 0x1, 0x3, 0x7, 0x20, "d45ab669f7d94cd7278f2b53de9bfb7cfe000cfec95623477fd1c2f86f90734a3a841a990c3560b89ef68d92e68e3a4433dbcff662f89902c0abd773d5dd07", 0x1b}, 0x80, &(0x7f0000001f40)=[{&(0x7f0000000b80)="023240bc564f424bea0b4c582426d2449b429868522e8a41e97fb038b6e6d741074e540e4b0af1717cbe8ef01ac3fafca0e9d6123ea74699987a7a", 0x3b}, {&(0x7f0000000bc0)="220c820d9becc8a644b7f0639d461c0f130ca7057a99d1cb6936fea51a3e7c39c5d985f32992e1015dd2d5bce89e8b1b18bb4a8cf574a1da4e3c121fd61a0ae8186ad582c3df025af4890c5f4747957cf41db30e65860689d1bfb14c66b20a28b3b6723f22", 0x65}, {&(0x7f0000000c40)="6de2fc10a4949ea6a6df14b33c1c7618e3ed6165a5c50c2d30b15fa2e0287f85997536e60d9600a3d9c8d01d7299ebf4061c00a9f0cc7f247a3e756791337b703982fdc8a70a3fede80b96d32b97949053dd08230938fff41fa5fb73af60f4d7fd31ba0d26a66c88db6a84ced64780649f47cf9457eaa33a30577b9f33939982a72019bdef7e5e06a9d2fd85b8a494f10010d19e8b9e447405c8a073f4c37e3f651b879718e3fbc6c440f698f535700b98bca5dd6a81f36b18752fb8bd77", 0xbe}, {&(0x7f0000000d00)="170de2a51347be8edff566c3c6640d432d619d9c217a375757e77ffc60cc0d4ca21eefcb2be9148cfae0df448c9baa626eb448194b0c36251d30f64cd2fc43353c3a8f5a60f6dcec93e3cfd0cc988a31cc631b67153a00ed3d7c3edb2f80b4b252", 0x61}, {&(0x7f0000000d80)="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", 0xfe}, {&(0x7f0000000e80)="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", 0x1000}, {&(0x7f0000001e80)="e78656b3dcc7ee7cd7f77540752bc9475ff44b22951718a0d747f0088fe927ab8057c4f92f4776a3331deb1a7dbea2e10a56d4c96f0608e0515865d46c52411f64279f070585b8c807bc45f2573a39b249b4e0a75f8d5cd2b328f272617f1eade76f7e08f7e4a7bb48465d", 0x6b}, {&(0x7f0000001f00)}], 0x8}}, {{&(0x7f0000001fc0)=@ieee802154={0x24, @none={0x0, 0x1}}, 0x80, &(0x7f00000020c0)=[{&(0x7f0000002040)="291663f944d54b7407cfd40ca48b4ec83067188ec05eed12d150835addead2ba40877c182a438147011cd0d88130eb054eadd46482a1d9594dfdd708ccada005a1edc1cb338bb94771e7f3b5d149c96fb62d34f139534268aef36e7f24bc20d2365d2cb37480798acc741c5e26fe93a4c71e8fda5b1145", 0x77}], 0x1, &(0x7f0000002100)=[{0x100, 0x6, 0x17d, "843b14076f1961bca1ac4c7ab2ec45fd2727a332144f9916aab05f14bf3215cf107f79b6130437529fc0ca9583767d7040c86bf50b5386aec8eb0f2edb8c04a7b3f3979a9d97301928d6a64c293a02c8e9c261b47dfc0b753f381d04e5741b67cbaaa695bc12b3db0f5dffc4b30f1a9c314d543229a0c5ed526f911c2d6a4ec9b47b38768d9bcf5b54885e993569f659916f2fd8a0a15d1379d4f0c9d76ae7c80de85e8966d14d26d76bcc360376af8436dda0be5152ab9911316143343a6eedb60838431fd0823800096fb02ddad7b17a8e4bf3a2a9c162f99864ebf90ebcc470430ee719c5f6222f95cd8810ff"}], 0x100}}, {{0x0, 0x0, &(0x7f0000002480)=[{&(0x7f0000002200)="1c5a125bdb10cbf2f8567a99d08695912b661cf0daf27ab89d2fad110a61ac99f5895b9c0b862b7c0189ca6d2d61959776040e09807fe9e180457b020900e8eab3af597526c1af4ca2297911d42f6aa771dd9e6b1bb8c683b56391971bd9d987b326931c85105dfd000501f145c1bad6f4f328d5bc9f2c69277b8c3307a2f1979e4bfcdb8790b5c4bee3579140656a404ca65f67cf5dc565e59c7057aa06d39d4af9ee117bb8affea13beeae22992c75cbf8db96c6c389d17136f7439bc01051fcc7506bd3bfda4a3efb5b573f7f23fe1a0b6cf921a9c8ffc2d593a02029ec58f8172cf962166d68f403254bb9496357972df8899261b1f2ac", 0xf9}, {&(0x7f0000002300)="95c1c668c40397b062b612e6b353814456f4474e7b4d4618a988e52f75992fd4e7ce5d9e5dd8062291c7b445ec28e9f582f254616a3e53cb5239bb1cb555cc331c21d015bc3325e040ddac9c5600bf05cf7e1d4710b243fd3c455089a8b46f799d445ff0e056a64ac54b7602a0765116d330e148a115e234c9d18a10ea46032819e9f3cf268e09d2851cb3eb9b3d4a9cb38159059bd59e9b9b5125383a3b54975aac5b7693d2552853de8ba1f1e943234a41a170347b1317e82205d838a303d771844ea971d76e1bcee4c86f458c9d", 0xcf}, {&(0x7f0000002400)="56cd64b0a35fc9d3838e5a59988da494b14d9fe0f8bf69b2c5f56a109e481b599f79f3c8728182c0b0a2d1ea5db7bbe92204f9f440715e832a885d932009b7f44b2d", 0x42}], 0x3, &(0x7f00000024c0)=[{0x38, 0x0, 0x10000, "f7b398a126e757490bcc196ae487e6dd20127d6edf10062b0177e11fc3da6484cd"}, {0xc8, 0x104, 0x5, "2b711a3c762a08e9dab25554760d66bc9c5255977c45783aa2230d1e0e073849e0234e3fff33d58a57fd46803d3f0413324e875c777fc9d7d1fcb1eebbf44e8c99b4b3308aae806ad334988a526efe3331173f549c9b6b0cb4f44ac55d4b9ec862b34d28c7c453cc54313e70e01961400483815ffd23c85597c8989827451f06de3a9449992b5b429d9aac2bbafb4df0ead2c0a465e0d9f419608c2bf07f974272b1ead8f30fd4fdf4fe48c71c2f18aa91db6848"}, {0xf0, 0x1, 0x2ba, "bf988050e85eeefdd58b0635e7549bbe54d7bccac84547f58b7efd2ef7782b11b8b9173745f5cea40e200901110b8eeefd84a80fc9780b949bd9731d98696be4440f93aee8257c2302b533ad15a9d00c2740affe3d93cded7263b70a89f319101d97ab8cc393f387e93bb7a6f337ade310f7360e5dd133625d1fd848f184f03c1b440a4fcbe1341525c80427761003e265e7cf515ac33c9df815d867fe0b5434f11c0fd3bae37bbef7f2860badd5467cd12ceb6d26b53323fa7b04bc561c02b656995590df6c696a7afc616ab256094ce163ad328cfa82d1a66d31476e"}], 0x1f0}}, {{&(0x7f00000026c0)=@in={0x2, 0x4e22, @multicast1}, 0x80, &(0x7f0000002bc0)=[{&(0x7f0000002740)="7dc64944844e8567d049279ba6a8d00994d5ffb289f0602b6586f9c2103f0af7f4e19709049e91d0c66cf05aebfd5799275c17c5ff2195aaf899eb48d0b186d384a9465dabe89295ae9dcd89bcc607759f8c46a001af436cd3071c5b33cd3a3a5641fbcb7cd0ec1f71647413b6d79e06642c31f8a4496acee017e180e5f79f507ce7d5b8a23f5c35196e4185c2720ca1916af6d45720da401373644ad9bfd3a4b41680c8d834c2eb60b6712dba4b2b3c75fca25efa5a439eeff24d8ce5cebba7a7898898544bf4859ecc15018e43f7b569", 0xd1}, {&(0x7f0000002840)="1e43b00d306a7ab943c06a4e513eb310d459b63e661c68b855b83eefbeff11ed5cb2f6ceb66930bfa045a118", 0x2c}, {&(0x7f0000002880)="0b0f90cb996a147d59731cde1a85cbef1109d71ad9980fba07b508e9d58d1635fcd65145f8f3fd1f20082f45e831892b303560e12f6a7297ab5538ed426ce8007ca6d916ae0a84c4dbc768f3f8846e81396c80e68694f665e9b9d471995007d59590f799b74eadf5568df21e18faefc24cb3dbbfeaf4fc6ba9fb0a735d5b3ce9fbc0e99160595e140f77", 0x8a}, {&(0x7f0000002940)="0935ff0dfd980e01433a784297ce01fb9f1612069ecf2b6edbece681e2432bb7e9c3aa2eb0feb1e6ee15e91f43641c3763b5aca09b8e27301052a95715d9e8cbc53e35145ce83f7b6eda83bbf4c6f1dac661011f89ef76136a4f42c2abc8b0a66a954802dcb68ecb632f20902e66bc2155a6cf63471fef93c7cc4298beac9ad60a1c7c5dc5f20c8a905d9b880748635bebb2b65d37bf0b3dd31413775ed20b9f2c266cc5db42bbb072f05e89d25e3991", 0xb0}, {&(0x7f0000002a00)="5dbd30e2b3d5d7a4df193d211b77da5b263b8b4ee06607ac42f17f3971bfceb30687f2e7b7d0bb920b9289de066f4fb95e85f023fe3d48", 0x37}, {&(0x7f0000002a40)="97e912fa92f9c6eb45ab8556e45656a752a49bb97202e81c569489f944a6e5c0fe31a6594f93abf6902ebc9e10c434099e44a088e5b713b5e13cff76f7481a4e1d7d82f9e58f27ff9d1d224a6228a0f7e16b816394ae50e9065c0748f1d38e4eb52964b39bf6d854b91d59eaaf5f462e01688244bc36584064308986cf9a1c827e6c65bcea5d20379fa1ee82d45cdbdc59a2311df7", 0x95}, {&(0x7f0000002b00)="8bbede85145927677954415f92b5d0a9b978aa56a55e2acbfefecd26fddfd4a0e8cc3ba74ece5738c8215cdedf37411f918021cddba8b442114ef791db829310b4ff991c05974525bb56218701e66ab70624b8f5e3601f5ecf9abf3cafdfbcdea2cb80c68bc347137b5f6b1da44c8fb0cbe817fc5d687935da801b9c25c32e26cd7416f8ee8fac8e95941083baeea8c132059f0dbe206e4db4f6b615db88ff2bdc16c2b303fa7d087b3895a85d7a470b4f998bad6b4dd50d6d367871bb", 0xbd}], 0x7, &(0x7f0000002c40)=[{0x1010, 0x29, 0x27e70ed1, "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"}, {0x58, 0x11, 0x6, "d7ef7e388e1d9aebe6f5e1ee90c20a489a2035df1b34d661b29657a200c12d4ee51fa7f1701806f813362b55514c0fe873cb275e15a4d12cdb6392f228bb5e0e6fd0a5093ff443"}, {0xe8, 0x116, 0x4, "12053e595db61cf1ca8532614a6f37327e391cb11d66c4f5a1d5b664e3bd362d90c998362c71ea6c655047aa765c67240af137827462f23ad79d397f58aae78aea31884ae209bc4489253888c20913b1459c49fed25870fc7903ee0f7ffa0bca10e6e9fc0029fe6903b05f31886c6b13335c9fdaa42f8122a610b0331459ff12076b87090a8794aa1503a859c208b16dad34524bc0f5eadeef2aed3af9934d97a71d8b1130ffc57ad5ef4bdcd27c9c3c3e5114341175b71ec099aa71272ac65e8c1cbd1eeaf8059e99a1b6874e719e98c53c"}, {0xd0, 0x1, 0x2e, "1d00b5b77c0408da95fa4fa2516272989f052ed303411f208276b0d866f3c1fa1305790a98ecb1a0358b5a2e7499b0df840b4c39d7c55ab525c8c08d4785e9a4ca1a986b8647bc75e6b820510c362d843c718f863f75f753062c336230ee578980d1e7a411805f138d495913cf8978a95d1c74520255d892004354d3e70a632ef6310369e4cda22b9a7e42af2b740562a62c21c1f2577355ced356678e26d01155da92635d85891fa4a7ccb37105eb51e5e4e5ea4f66ed5e906752e291c7e235"}], 0x1220}}, {{&(0x7f0000003e80)=@nfc={0x27, 0x1, 0x2, 0x3}, 0x80, &(0x7f0000006040)=[{&(0x7f0000003f00)="ae26076975c63c2757", 0x9}, {&(0x7f0000003f40)="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", 0x1000}, {&(0x7f0000004f40)="9a268f7439ec3529a4f85be0d85ac8091269821b312d0b2e7497111f03c009d7e891eb2de7b86dc20da187c66e1c13ddcbd15f945b9b4a9c185b7ab3622da4048033e65b13deb3999261ec70d3fb8549119fb2062e622437ca7e71b34cfb0e85", 0x60}, {&(0x7f0000004fc0)="efe51fd79668999f446f3f340fb107eb1ca5b5b3d782e3d062b7f4999028479f1011392acbf5d2679351d5a9fd722c0cea054b014bf9d0b64ca0ded047c7bd365b1a3ed45c937f681270e9417230b1c295e820ae73329fadb115dc423e7d737934fad3bda2ee2b5399d7b29da93bd35f78995a97ba6828280859de2f742652646252f02becc036a7cccfdc2b82c4546a9ad8a8f7855d5115498a6243031676a47b744c215de997b505a16e5b739639fa231f2816b81b88068904952a96ddec3f7bbaff2362e408004aab10d5a81b3b5d3f1b73eef22c4bc4e0303b0d0c80a8d7772463e727690aebc26cc9da041eba758a93c7f61639425564bc199e8888760d0424b12c38f009726bb937fe3a77ca2d248c1e915b2bb6f79f369857897f7923194971e8fcfd9dbf326e0ac9d88f3ace6c2f2a2972d3a7da034e2a5a170a094fe8d7e2a0aa8f88cc3121855673a121dd016c98ae6b9cd127740ce7333ce96f377150c9a3e25c205408002d28ac6853ca3b6235064c9d54d4ed10b8dd6fa93d3dbda13648121e0833b0a0c3f59e1e30076e71e3705d9f0c029e6ac59b5b60591c4cdf779e1a6b4244843ceb534fc8c703b761151d2a674847665c4995213a1833053c0f1812ead07e7563b2f2c392e42e8b28493fa358acae93dbc19745792b2fe5019ce81c55dd4f7d3f2a2260a48bf325a28d1d96825cb8acd92d29742aae2fae77c9f09a0e95232dbf8423b1f20a923e312fdfa0d00228752bc20fe7cc63f714dcfae09efdb27c65bb4a75225bde0e7eb5940e00577751225f120f490c7696e14ae2c3bbd4bf17aefed4746cb7bc0f7d4afb1a6b29013c182c300a43276310c221432f16043b1696b341f7e443d58bdd2603a025c62c820bfc99bd51f30863db758d00fb1f05e826c3b9b64f9cb5284309a28241e2d454d38f710bbc5c558c21ac454003dd081f7387ab38cb0d22ee046d8debd1b919f359617f29d1c341fcfd8a1eb70c56bae21f18f9f3d1f49a90cd5fd3c9803b12d8d75493261916f746807c533500d9ff787e6f07435b99e4c5078ef821466d6a27d9e0822e39d649066771c3eb062d3761591a34a1c0ae25d14fd78d810c23151f27c2ea1b009d31864d3d5592c4a9d04cd386006b2b2329a31388caed0deac193aca0c956f6ca325632e19cbb770b4339bdec3a162d03820029a941f8fdfd2924d3c89d5dfce3c4c1332e77340b749b6cf5502b6b820d55879de1b39e5accfcda4c2f0acb765e67efd54f0fff9ec3865ef116c5724d8bc27492059e00d3a2fa0936511ed1c058eb9eff25a94d12caaf057559e6e4acde3956f8ba5ab1dcd5047c2c5abbe8223a45943fce107047f10e21f486892b92248d7d5e32916a55602ba8f2d8f5699c0f32573104a7e5e7896ec3799b4931454a1d65b864edb1d50ddc9ee2430a63a4b5b631a57f2c138d88b1ef63c534d2f601d900677d8fee524f759ebda3b056dcd8e12a0d5eefa06cdca18b83d9b5adaee5cbbdae967df8ea70576328941d45e556520fa4af71e642ea393fd3d7c329fb81be57f9bfff333ed3c4f013eb16ae41db323177f299db07932057e458eb4e4f077602f3630d18040d9c1098b85f1237e6056a6397c1519c0d48619697a52d26556ce5a46a5d0f571514a9be04250e7fc421a3bf75c959d593baa8070bc58a887c6868e9fb4014761306c732a664290b0feffb783be970b618eb9b2f6d519f2cf7c622bb426f363773741a1d8e44db1f9a8769f2ec338d8a5b48516bac8e450551377660d486e9c8bbdd4253eaa6068d9ad63f11fea4f08edd2c4f268e7cd670c7a3bb9e326afdcda67c0a50e2ef059538fdd68b85359b440d3194b7b796814b7669ae8ae02770db7fb579df1700cfc3a52b4c3a02cc7dd1eae8d6d230d879dfca1b5a9d9dd1b753ad1213205505fd00448825c9bdaa056176351d0b488cd75c66ac82080574a6ff1db24819ce73eceb818ec34048f5d2c1d45a6f9799248a36618a18f22e84ce3c5ea0f50260ee9bf858ab9ec74026d41a9b4fd295f81a531201c44b4c006ec757feb88e70a569c26e4d3e9b96602f4b881280fc185d11e63661978ddc2bda443db2f338ca3a39c7fe93e69c71ca420df9bdd26630e3009266e10f1a6f90ec072f84647fa2897d4e9ef0ef379b0a2298b477c1539b39ce53e5c6f0cefa6baf80c6925959aae1779e11b55ce289afa3b1efdbc77191da0e812923b55b091df08afc6fb5246cad2032907ece9bb232c50ff949422e1429494519e10be4b027b4a18aae88cb19dd937d2e95fbc0d9c9b05e40059d76d85428fcfed945efa359abfd55d615f2c0bb9e68af3d91bae0f8a5e182a0a83622cf7b21d1b73e3c5abd40e04219388203b4df09e088712ec76315c7b9759d73cdc68aea1db6b0a55ec77465a8de8b62bdaca65c2e45323c3ee6dc755a77569ce65bf3b8c9e44f31ffa4783358252318b4777049cd3bcbfa259e7d765285138ad070675f1d6a798a06ced99a220d67906a56f17f568884ce9039eac19bea2c6b8b681406cb0658d932dc1f99abba3ff3f9ff63da63d4c2690ae4dc6699b22e89c7fb81a396d7d81725f8e5da2564f5e5ffd5b52d1cb08ca7483daa7be545c121d0faf22584c8f42f6f381c8ecbd78c9518bb2fd6dff0201de25418427eb7fdae5a96b30344d2509af343c77e04bd0fee59c759bd34fbb0d175d8f4ef0a876accaa573de9df19ec1b9b08688060371a884d229e3fc7fd03793f263b12ca2bef0ab3dc2ebfd3fce20ecc991b6975cb88bec9d2c38a2fa5dc7a6209ccd5dcddfc96aa498303c2dbc73b41b28cdb930cc06f6a5a47df3a57a89079f4763908b294bab2d801a6aa5753bd29a96cb9d5f27b16ebbe0c60b8c80841cb2da3f43671dffd8984a904811ad4d1cefe0041c053789d11f42a825309a1ee396227a8ab2bb657500be6993bfa619f95e42819188deaf8c300c37f367d744ae16805df98f7ca26c8ff671c0f2bcbfc383445daff4ac463ab4e49901573ff903992d0d0058c2b27cfe70e159dd0be1a8991d5ded5d810a790d134c5b9a0b4da4996f5b65acc2ea0c8674982e0e957baef6662f15ebfabd779ca89ce67adb49f4d611862caa3662fb19668b820d3e1b4a0f3c7c6c053f709e846595d54cfbdbcd87df75b6e12426112f1cec26474957fd30d0622abf1d0bd5248b233415495a833e6930f7c3b43e23fe67c19967994024eb9d5b9534035986f91e2e22e1b861b213f71252f736648dc75a82916696e67083f924cd3c1d39ca92fe1d749b35712b8aa745ab916ef5ef904adf467a33aa093b1967fcdce446bcec054b3d506f5863e125b7a9f2c17bb692b5fe0e9b0087a18bb0328ecff87347cba7fbea594f95b3523f6e0c42cb64fccbf5414966e4c326c592b7b8a447f242732c272e96039c9fe65f76f910361d7a31174cb9d92b8d9d22f711a1b4fb22d767e9566326d919ff899e148361fe17cd26bf00d965bdc24d769efe33956397feae16d47a841f0c308b836457dbe01519f9c4a9e2fa569b0009ffbfc187e009b296baf03be15460a57c8fd11a916bd7a148f32914c2d6f31b09b67f34796c49005dd2543169af2d42889cb9fe4434be8749d50b6de112a52b43ca8e6f1b731301b9fffd7cff2e3d070d5156e2ad0587ee62c33a4b311ef98c4448507677a865ab841e4e74b0f33b39509eb9e326189f644d066ff0b29c41f30aacc306d1b420279758b18a9f2f1d3a7bcb0399accfc10b925be00d87965c7593564b7333ccac744f742a81d385d86949301d7a7419bd02f0eccfd6c4b00cfad277f10fc7bfc25d76790ab4811dc9a42d80e0912e5767a2dde9ba591fe69cad43d73e192fb838ccb1bfc068196eb16b6a839f470647e0866f9f60b18665c7a55de970b1e8e669223d461043ee37fb347f55655c9461fc90372ed90ed16d03571bab95bd155ee37459e5d993f01ccbd92c8fe3196adc576266d954617f74e92c8f04f8cf2db4c332fcefaa5859ccd02cfac9717f933194322ea62644c6472b7de77f7c15ffa8daac6996074f849b9227e58530143aa5dc540345a7a60e011816d6ac23fdf68faf88726b3951b9144e55ea2d0fba3d4631e78229ea281175af913390984fb6d69a6409afd08b42f8c1d71cd8f1ece239bc3ccf1eba94b57d9f0382b13cea6ebad699184c2a10462d23ee209a21e3d1437655137487a5b508cf5554501fb09991af234ac9c41398a599eedcb1d380e484b504c202f9374cec8586fe224c438f089a63b286be06b522f5be04d4e280f7f6609a398a0fe96f6bd52e2b81071a57b74964898d920fd7eb6c8cf5203f07bb2d2c0a336abf4f51c25a42681ac3788cf2db05793b53d8807bb574bfe36cd4af42decd07a6c2a4aee4ccda1cba8b096f9ce42aed2ed2179936fc97fdb88a1d71d75a239f82baca2687a69bee64c9b98073a62a36678711552b43a0b390aa7822b516f96d8dd91a645e4f9210789c2b3d5047fbe78fa6e9564e8cace29a8335553eb4fd3743fb019a3c85062f7d5f698557e5405b0d837b87e0b6ffa23ca46302fe1f13af783cdcbc88103e9ae3a10397f17b0dadc4ff16c4c2433b2067e9bc705aad317f3ad75bb9e52b2d452835174d8108f478fc84ccbd2545deb71b9cb06d4c0b9b40726d82c6c21dd835f5d4aa40ba53e713343e8107390ff2bf1c222571bf5a174e33e6a1e67498a05423395ebff3f9ddc9f3c2d8ae132dc4c60751c9c07d893a94e9fcda4e5821035e20a545cb18651c1317eab0dcaa194c3f82071f7b5c2d2b59c62da3749c9e084393759f6c654ba4097926aae6f250c32bc18e2485d7d61d038ad8f6863e57d2a5bc5fd83cf5f813d917e632e7447b4a5b81f82f6cc18276921dc47d2071bc741c6ea072de3feb2e933e937f9d3c547a9b6f918a0f51abe89602b3917ca0079dabd63a9ae2b286918ed8d9e5f0faddfa5baaadde49d9e8fd3797fd009c646376dbb8b7a0930aceb6e15fc62a547bcc48063705175109cdc80323814a4a5c28c88ff4060b6b33e513d76a92a3afeab03e6257e9a5fdb71f675b9ad9f389c68e6452cedcbbc710d2a4d112577f578063656237b42de364f8bbd0c33b1fb5339a2be7125ae0c26ad13bc152f0b20d440625d840b19d4c2bb2ae9613015a2cb1d844dd469c6ed6b4b0b6b8ebd6059ed1198328729b20bc987f7f0ec8b8786d3144b8ddef4a0b2760ed5f48676369724ba307b602810f1b1bb2ffbaabbc9517a42e97f4e69b57cc50fc7f9564255db41d19ba2ca67c225a28538ab14e08b9f733d842df5519120da58be2501d1408bcc040bb2e465e5d4009abf42f57f34e34309cee72e7c5eb3e91c5d07cee71435f291156015eee0cef5807f60adc516056d981fbc555a09a7f364a18c5869f192b015bdb05245709098a47849c14374f2bc0295b22035b81a768c4cd3c4aa1aec5dcf1bedc3c7b5d16744251efb87e016482ada89d974ef1aeec6961a8658ff8350b02513783c2b83cde0611be3ed5b7741b2c4c1bbceb02579002c5d2d49418833ca48760ff7c0e1e30cc0eea9f8dbc8a27817db661d15b14a6763972d191669b9af60ac03fb90a78b09b72494541a1b1934f01386b485c178027c617955c993f30f06e2a0c0606a3e97c4645b31799fa42155d4d9235e88795dc6cf3d7f8efbc47f6f4045d89aef9e3b29f6d3913aa371492e6678e2e8b53381d850c058ada82bf7af8706b1722bcb10867ee316ba1b51b9d3db4b1d1bc3cca769b249e5bee9cbb441", 0x1000}, {&(0x7f0000005fc0)="faffc2b2ed01b79181bb9329ef7a14fcf49cb802bc66d65fa284a09ca74f5dfe1a56b90660c65295b4e132953dd6793ed0e67d53b33a1a5d2c28d30cab3efa2be9ffb6ca46c8539afda446dd392454d8f3dec11e1dd7c40e2859234499e940562e8b967076e50bcd82ddf1190f74", 0x6e}], 0x5, &(0x7f00000060c0)=[{0xe0, 0x10d, 0x8, "d9ce3a57a8fb4c01d6246fcadf156aa25c6dd1d1b108b7559fc6cc539f74ef5c7b91741f9f88477da2ecde928ff794b1785cda4c66adcbb64a025221bc8a66b13d54dcfe8c2f280f714eb25bc506620f100c4e34e68a10fd7430b06d09285e5ea1c58f8f89d39970637c830c89aa28eb1577fdf0bb2d373a930addc139f1fbedec5c9d430d43be4904527e93d48431264fe23627478fd55880d7efd3f81d4dc09edbd4dff9d0f5377844b2e50b43e68d6e83d6ccbcb10373170d2fad67caa67348f653c4590cc566fcb360003063"}, {0x78, 0x114, 0x6, "58579f32442dadb9048e8b6ac5688c833a67de1b3900e45bb8f7b91ff870a418e3443b9026b9dfad0c07d33c19ab1b76152c5558f436367ea962a8af46c3ea1297f0abc8c963661bc870e60efd35d597b6baaabaae16b5a1203d4c43cfc50248a9001a28"}], 0x158}}, {{0x0, 0x0, &(0x7f0000006340)=[{&(0x7f0000006240)="6bd10c4890d87638ab4bfd842ddfc819bbf9133e7a8f72097bcc722ebf116fbc104ac58d161ab598c404882442924fb54b43144b4c9cedc4f6d8d51d9e37f1f717bd50266ccffef7660e3ad8961d42c135c1a295bd1b0fd38ffd21d049b19690270ec1372d118277aa800d9b8e96ef0554b6c8ae047610c8040b93b36ede3df589883fe77d14f996f14568821c6046234171e01dd86dd0affc45be192e4f02c77e709303958f515a0f30b300c0d7a87ea2885e61218e40a03e3ebebda180030854b8394e2aaa78a997d04408ec74ebe280110cff296e295046b3851d09422ae85dd4994679b558604345c66eaa4454", 0xef}], 0x1, &(0x7f0000006380)=[{0xa0, 0x4, 0x8a1, "0ce7aab009446e6e5346853e379e33484ccb39515306ad037064f5603f50b4e1d45be2dcd01c7f418ec2527ce3b5e182ec63787780bd24c3d4eacc5cc8ef88cc5685d069ce1793cb437e6b1cdcb6d151182299a18ad4711fbfc2f0caa42e6ac22f550483df5abee4c40d99d235a14232e4b3a96bfa305c7e94dd8a611f67f393d58eb6bb9e84563be645b5772110"}, {0x60, 0x102, 0x7fff, "b49e66dcbf4e42d1caf0407e3139efc6ff685c1566402d074e01c15fb37d5e9c59539899d2f3864981a54b0f03dad4106a3dc141b8a757fe9beb7b346a3ea7da1ed26625218a50761620ddfb0b2b"}, {0x88, 0x118, 0x20, "27aed2e05689278e5f305b94aab8b9c664f2f2f42a761316733fb8fa1f32a18a5d164c42aa6cf2a0b54dca88a141026fd0fd6956b3b727df73d6415faa9ebe49f7998c65508bf727139a6f8b3c9a7a2e19a1fb7107a3b0cfa471efa3f4299dfbc8c706ff9d50c6fbf453ef7c9c15a6c68152ee"}], 0x188}}], 0x8, 0x80) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) statx(r0, &(0x7f0000000340)='./file1\x00', 0x0, 0x0, 0x0) ptrace$setregs(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000080)) 13:22:39 executing program 4: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000002, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x31) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) waitid$P_PIDFD(0x3, r0, &(0x7f0000000500), 0x9, &(0x7f0000000580)) ptrace$cont(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='pids.events\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x12, r1, 0x0) ftruncate(r1, 0x1000673) ioctl$KDSKBENT(r1, 0x4b47, &(0x7f00000002c0)={0x2, 0x81, 0x5}) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x88400, 0x1a8) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0xd0265000) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) exit_group(0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x31, 0xffffffffffffffff, 0x0) time(&(0x7f0000000180)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14001500, 0xb, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c190000ce1900000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800)) 13:22:39 executing program 3: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef0100010000002bc4645f000000000000000001000000000000000b0000000001000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e373836333438323637", 0xa2, 0x400}, {&(0x7f0000010100)="0000000000000000000000002f527b43270a4164871303f1137e5908010040000c000000000000002bc4645f", 0x2c, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000500000000000000000000000000000000000000040100004d", 0x39, 0x540}, {&(0x7f0000000040)="00000000000000000000000000000000000000000000000000000000787371fe", 0x20, 0x7e0}, {&(0x7f0000010400)="0200000012000000220000002d000f00030004000000000031245cf20f0062e6000000000000000000000000000000000000000000000000d4189ee9", 0x3c, 0x1000}, {&(0x7f0000012f00)="ed410000001000002bc4645f2bc4645f2bc4645f00000000000004000800000000000800050000000af3010004000000000000000000000001000000030000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002f49000020004f3f54a9d2a254a9d2a2000000002bc4645f", 0x94, 0x22100}], 0x0, &(0x7f0000000300)=ANY=[]) r1 = getgid() lchown(&(0x7f00000000c0)='./file0\x00', 0x0, r1) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) statx(r0, &(0x7f0000000340)='./file1\x00', 0x0, 0x0, 0x0) ptrace$setregs(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000080)) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/zoneinfo\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r2, 0x40042409, 0x1) [ 239.478596][T10498] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007f3059254000 [ 239.486558][T10498] RBP: 00007f3059254040 R08: 00007f3059254040 R09: 0000000020000000 [ 239.494518][T10498] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000020000000 [ 239.502477][T10498] R13: 0000000020000100 R14: 00007f3059254000 R15: 0000000020012c00 13:22:39 executing program 4: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000002, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x31) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) waitid$P_PIDFD(0x3, r0, &(0x7f0000000500), 0x9, &(0x7f0000000580)) ptrace$cont(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='pids.events\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x12, r1, 0x0) ftruncate(r1, 0x1000673) ioctl$KDSKBENT(r1, 0x4b47, &(0x7f00000002c0)={0x2, 0x81, 0x5}) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x88400, 0x1a8) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0xd0265000) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) exit_group(0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x31, 0xffffffffffffffff, 0x0) time(&(0x7f0000000180)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14001500, 0xc, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c190000ce1900000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800)) 13:22:39 executing program 2: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffff, 0xffffffffffffffff, 0x0) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) read(r0, 0x0, 0x0) syz_mount_image$f2fs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x10, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}, {&(0x7f0000010500)='\x00\x00\x00\x00', 0x4, 0xc80}, {&(0x7f0000010700)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e00000010000003000000010000000200000018b2e346f95e497f827e0a", 0x77, 0x1400}, {0x0}, {&(0x7f0000010e00)="d73cd47a0000000000100000000000000b000000000000000d0000001000000012000000170000001600000015000000ffffffffffffffffffffffffffffffffffffffff03000600000000000000000000000000140000000100000000000000ffffffffffffffffffffffffffffffffffffffff05000000000000000000000000000000c5010000060000000100000007000000070000000a0000004000000040000000fc0f00"/181, 0xb5, 0x200000}, {&(0x7f0000010f00)="0000000000000000000000000000000000000000000000000000000009f7a5bb", 0x20, 0x200fe0}, {&(0x7f0000011000)="00000000000000000000000000000000000000000000000000000006", 0x1c, 0x2011e0}, {0x0, 0x0, 0x2012e0}, {&(0x7f0000011400)="000000000000000000000000000000000000000000160000000510ec", 0x1c, 0x201320}, {&(0x7f0000011500)="00000017000000020c60", 0xa, 0x201380}, {&(0x7f0000011600)}, {&(0x7f0000011800)}, {&(0x7f0000011b00)="0000000000000000000000000000000000000000000000000000000100000000d73cd47a0000000000100000000000000b000000000000000d0000001000000012000000170000001600000015000000ffffffffffffffffffffffffffffffffffffffff03000600000000000000000000000000140000000100000000000000ffffffffffffffffffffffffffffffffffffffff05000000000000000000000000000000c5010000060000000100000007000000070000000a0000004000000040000000fc0f", 0xc6, 0x204fe0}, {&(0x7f0000011c00)="0000000000000000000000000000000000000000000000000000000009f7a5bb", 0x20, 0x205fe0}, {0x0}, {&(0x7f0000013000)="000000000000000000000100000001", 0xf, 0xa00000}], 0x0, &(0x7f0000014b00)) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='pids.events\x00', 0x275a, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x4, 0x2d, 0x9, 0x1, 0x0, 0x7fff, 0x88, 0x4, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x7, 0x0, @perf_bp={&(0x7f00000000c0), 0x1}, 0x9, 0x1, 0x4, 0x9, 0x0, 0xffff, 0x400, 0x0, 0x2, 0x0, 0x1000}, 0x0, 0xe, r1, 0xa) 13:22:39 executing program 1: clone(0x13102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) poll(0x0, 0x0, 0x8000000000000200) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f00000025c0)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00'}) ioctl$TUNSETLINK(r0, 0x800454d3, 0x30a) r2 = openat$selinux_attr(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) mmap(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x6, 0x1010, r2, 0xdc5f7000) close(r0) r3 = socket$inet_tcp(0x2, 0x1, 0x0) preadv(r3, 0x0, 0x0, 0x7fffffff, 0x1) 13:22:39 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_mount_image$f2fs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0xf, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}, {&(0x7f0000010500)='\x00\x00\x00\x00', 0x4, 0xc80}, {&(0x7f0000010700)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e00000010000003000000010000000200000018b2e346f95e497f827e0a", 0x77, 0x1400}, {0x0}, {&(0x7f0000010e00)="d73cd47a0000000000100000000000000b000000000000000d0000001000000012000000170000001600000015000000ffffffffffffffffffffffffffffffffffffffff03000600000000000000000000000000140000000100000000000000ffffffffffffffffffffffffffffffffffffffff05000000000000000000000000000000c5010000060000000100000007000000070000000a0000004000000040000000fc0f00"/181, 0xb5, 0x200000}, {&(0x7f0000010f00)="0000000000000000000000000000000000000000000000000000000009f7a5bb", 0x20, 0x200fe0}, {&(0x7f0000011000)="00000000000000000000000000000000000000000000000000000006", 0x1c, 0x2011e0}, {0x0, 0x0, 0x2012e0}, {&(0x7f0000011400)="000000000000000000000000000000000000000000160000000510ec", 0x1c, 0x201320}, {&(0x7f0000011500)="00000017000000020c60", 0xa, 0x201380}, {&(0x7f0000011600)}, {&(0x7f0000011800)}, {&(0x7f0000011b00), 0x0, 0x204fe0}, {&(0x7f0000011c00)="0000000000000000000000000000000000000000000000000000000009f7a5bb", 0x20, 0x205fe0}, {0x0, 0x0, 0x401320}], 0x0, &(0x7f0000014b00)) 13:22:39 executing program 5 (fault-call:0 fault-nth:57): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000660000000f000000000000000100000001000000004000000040000020000000daf4655fdaf4655f0100ffff53ef010001000000d9f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010100)}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000100000000000000000000000000000000000000000000003000000000000000", 0x40, 0x540}, {&(0x7f0000010300)="02000000030000000400000066000f000300040000000000000000000f007f5c", 0x20, 0x800}, {&(0x7f0000011500)="ed41000000080000d9f4655fdaf4655fdaf4655f000000000000040004", 0x1d, 0x2200}, {0x0}, {&(0x7f0000011900)="ed8100001a040000daf4655fdaf4655fdaf4655f000000000000010004000000000000000100000014000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000039c34d38000000000000000000000000000000000000000000000000200000007412ab417412ab417412ab41daf4655f7412ab410000000000000000", 0xa0, 0x3800}], 0x0, &(0x7f0000012c00)) 13:22:39 executing program 3: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef0100010000002bc4645f000000000000000001000000000000000b0000000001000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e373836333438323637", 0xa2, 0x400}, {&(0x7f0000010100)="0000000000000000000000002f527b43270a4164871303f1137e5908010040000c000000000000002bc4645f", 0x2c, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000500000000000000000000000000000000000000040100004d", 0x39, 0x540}, {&(0x7f0000000040)="00000000000000000000000000000000000000000000000000000000787371fe", 0x20, 0x7e0}, {&(0x7f0000010400)="0200000012000000220000002d000f00030004000000000031245cf20f0062e6000000000000000000000000000000000000000000000000d4189ee9", 0x3c, 0x1000}, {&(0x7f0000012f00)="ed410000001000002bc4645f2bc4645f2bc4645f00000000000004000800000000000800050000000af3010004000000000000000000000001000000030000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002f49000020004f3f54a9d2a254a9d2a2000000002bc4645f", 0x94, 0x22100}], 0x0, &(0x7f0000000300)=ANY=[]) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) statx(r0, &(0x7f0000000340)='./file1\x00', 0x0, 0x0, 0x0) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000080)='/sys/block/loop15', 0x400000, 0x2) ioctl$sock_SIOCETHTOOL(r1, 0x8946, &(0x7f00000000c0)={'netdevsim0\x00', &(0x7f0000000380)=@ethtool_gstrings={0x1b, 0x2, 0x1000, "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"}}) ptrace$setregs(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000080)) [ 239.704157][T10547] [EXT4 FS bs=1024, gc=1, bpg=8192, ipg=32, mo=e802e01c, mo2=0006] [ 239.711468][T10548] F2FS-fs (loop2): invalid crc_offset: 0 [ 239.714306][T10547] System zones: 1-2, 19-19, 35-38, 46-46 [ 239.736477][T10548] F2FS-fs (loop2): f2fs_check_nid_range: out-of-range nid=2, run fsck to fix. [ 239.760097][T10547] EXT4-fs (loop4): mounting with "discard" option, but the device does not support discard [ 239.770621][T10565] FAULT_INJECTION: forcing a failure. [ 239.770621][T10565] name failslab, interval 1, probability 0, space 0, times 0 [ 239.790200][T10547] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue [ 239.794972][T10566] F2FS-fs (loop0): invalid crc_offset: 0 [ 239.806513][T10566] F2FS-fs (loop0): invalid crc_offset: 0 [ 239.818766][T10565] CPU: 0 PID: 10565 Comm: syz-executor.5 Not tainted 5.4.125-syzkaller-00016-gae94e015273b #0 [ 239.829002][T10565] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 239.839153][T10565] Call Trace: [ 239.842435][T10565] dump_stack+0x1d8/0x24e [ 239.845672][T10547] ext4 filesystem being mounted at /root/syzkaller-testdir756229767/syzkaller.YUione/379/file0 supports timestamps until 2038 (0x7fffffff) [ 239.846749][T10565] ? devkmsg_release+0x11c/0x11c [ 239.846761][T10565] ? show_regs_print_info+0x12/0x12 [ 239.846774][T10565] should_fail+0x6f6/0x860 [ 239.846789][T10565] ? setup_fault_attr+0x3d0/0x3d0 [ 239.880407][T10565] ? ext4_fill_super+0x399/0xeb30 [ 239.885469][T10565] should_failslab+0x5/0x20 [ 239.890060][T10565] kmem_cache_alloc_trace+0x39/0x2b0 [ 239.895341][T10565] ? ext4_fill_super+0x113/0xeb30 [ 239.900442][T10565] ? memcpy+0x38/0x50 [ 239.904410][T10565] ext4_fill_super+0x399/0xeb30 [ 239.909252][T10565] ? string+0x2c0/0x2c0 [ 239.913396][T10565] ? vsnprintf+0x1d60/0x1d60 [ 239.918064][T10565] ? vsnprintf+0x1cb4/0x1d60 [ 239.922641][T10565] ? delete_node+0x733/0x790 [ 239.927221][T10565] ? ext4_mount+0x40/0x40 [ 239.927533][T10566] F2FS-fs (loop0): Failed to get valid F2FS checkpoint [ 239.931532][T10565] ? idr_replace+0x1c4/0x230 [ 239.931543][T10565] ? snprintf+0xd6/0x120 [ 239.931552][T10565] ? vscnprintf+0x80/0x80 [ 239.931567][T10565] ? set_blocksize+0x1a5/0x3a0 [ 239.956239][T10565] mount_bdev+0x22d/0x340 [ 239.960544][T10565] ? ext4_mount+0x40/0x40 [ 239.964846][T10565] legacy_get_tree+0xde/0x170 [ 239.969584][T10565] ? ext4_lazyinit_thread+0xd40/0xd40 [ 239.974932][T10565] vfs_get_tree+0x83/0x260 [ 239.979416][T10565] do_mount+0x19d0/0x2670 [ 239.983747][T10565] ? copy_mount_string+0x30/0x30 [ 239.988762][T10565] ? copy_mount_options+0x59/0x300 [ 239.993844][T10565] ? copy_mount_options+0x59/0x300 [ 239.998928][T10565] ? kmem_cache_alloc_trace+0x139/0x2b0 [ 240.004452][T10565] ? copy_mount_options+0x273/0x300 [ 240.009623][T10565] ksys_mount+0xc2/0xf0 [ 240.013753][T10565] __x64_sys_mount+0xb1/0xc0 [ 240.018322][T10565] do_syscall_64+0xcb/0x1e0 [ 240.022799][T10565] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 240.028661][T10565] RIP: 0033:0x467b1a [ 240.032529][T10565] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 240.052104][T10565] RSP: 002b:00007f3059253fa8 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 13:22:39 executing program 3: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef0100010000002bc4645f000000000000000001000000000000000b0000000001000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e373836333438323637", 0xa2, 0x400}, {&(0x7f0000010100)="0000000000000000000000002f527b43270a4164871303f1137e5908010040000c000000000000002bc4645f", 0x2c, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000500000000000000000000000000000000000000040100004d", 0x39, 0x540}, {&(0x7f0000000040)="00000000000000000000000000000000000000000000000000000000787371fe", 0x20, 0x7e0}, {&(0x7f0000010400)="0200000012000000220000002d000f00030004000000000031245cf20f0062e6000000000000000000000000000000000000000000000000d4189ee9", 0x3c, 0x1000}, {&(0x7f0000012f00)="ed410000001000002bc4645f2bc4645f2bc4645f00000000000004000800000000000800050000000af3010004000000000000000000000001000000030000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002f49000020004f3f54a9d2a254a9d2a2000000002bc4645f", 0x94, 0x22100}], 0x0, &(0x7f0000000300)=ANY=[]) r1 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) statx(r0, &(0x7f0000000340)='./file1\x00', 0x0, 0x0, 0x0) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) io_setup(0x7ff, &(0x7f0000000000)=0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) io_submit(r3, 0x2, &(0x7f0000000680)=[&(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, r4, 0x0}, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x8, 0x0, r2, &(0x7f0000000240)="0058df6faa00000013", 0x9, 0xffffffffffffffff}]) r5 = bpf$OBJ_GET_PROG(0x7, &(0x7f00000000c0)={&(0x7f0000000080)='./file1\x00', 0x0, 0x18}, 0x10) r6 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000002c0), 0x4000, 0x0) r7 = syz_open_dev$vcsn(&(0x7f0000000400), 0x1, 0x420400) io_submit(r3, 0x3, &(0x7f0000000480)=[&(0x7f00000001c0)={0x0, 0x0, 0x0, 0x6, 0x7, r5, &(0x7f0000000140)="f048c1c5144401dd261e25701e8447434ccd8abc8d0d88a5a02d39a2a6d493ef1720745cf17fecfd6775e489cbab8d5d8221b5e0d8997b01038eb382c365cc1496006869a076", 0x46, 0xc9a, 0x0, 0x1}, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x7, 0x20, r6, &(0x7f0000000300)="73578ced3dc0", 0x6, 0x4, 0x0, 0x3}, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x5, 0x401, r1, &(0x7f00000003c0)="fcb9af96127d723061154dfaf44a0ad754c4a01b8537f4b1dbaac84bdaed5e81de218eae31b66efa359e2f7610374b18228a1549dd3b32c4ef", 0x39, 0x200, 0x0, 0x3, r7}]) ptrace$setregs(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000080)) 13:22:39 executing program 3: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x2, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef0100010000002bc4645f000000000000000001000000000000000b0000000001000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e373836333438323637", 0xa2, 0x400}, {&(0x7f0000010100)="0000000000000000000000002f527b43270a4164871303f1137e5908010040000c000000000000002bc4645f", 0x2c, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000500000000000000000000000000000000000000040100004d", 0x39, 0x540}, {&(0x7f0000000040)="00000000000000000000000000000000000000000000000000000000787371fe", 0x20, 0x7e0}, {&(0x7f0000000080)="0200000012000000220000002d000f00030004000000000031245cf20f0062e6000000000000000000000000000000000000000000000000d4189ee9", 0x3c, 0x1000}, {&(0x7f0000012f00)="ed410000001000002bc4645f2bc4645f2bc4645f00000000000004000800000000000800050000000af3010004000000000000000000000001000000030000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002f49000020004f3f54a9d2a254a9d2a2000000002bc4645f", 0x94, 0x22100}], 0x0, &(0x7f0000000300)=ANY=[]) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) statx(r0, &(0x7f0000000340)='./file1\x00', 0x0, 0x0, 0x0) ptrace$setregs(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000080)) 13:22:40 executing program 3: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000000540)="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", 0x16d, 0x400}, {&(0x7f0000010100)="0000000000000000000000002f527b43270a4164871303f1137e5908010040000c000000000000002bc4645f", 0x2c, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000500000000000000000000000000000000000000040100004d", 0x39, 0x540}, {&(0x7f0000000040)="00000000000000000000000000000000000000000000000000000000787371fe", 0x20, 0x10000}, {&(0x7f0000010400)="0200000012000000220000002d000f00030004000000000031245cf20f050000000000000000000000000000000000000000000000000000d4189ee9", 0x3c, 0x1000}, {&(0x7f0000000380)="ed410000001000002bc4645f2bc4645f2bc4645f00000000000004000800000000000800050000000af3010004000000000000000000000001000000030000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002f49000020004f3f54a9d2a254a9d2a2000000002bc4645f", 0x94, 0x22100}], 0x0, &(0x7f0000000300)=ANY=[]) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) statx(r0, &(0x7f0000000340)='./file1\x00', 0x0, 0x0, 0x0) umount2(&(0x7f0000000300)='.\x00', 0x6) mkdir(&(0x7f00000002c0)='./file1/file0\x00', 0x7) listxattr(&(0x7f0000000080)='./file1\x00', &(0x7f0000000140)=""/180, 0xb4) ptrace$setregs(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000080)) creat(&(0x7f00000000c0)='./file1\x00', 0x127) 13:22:40 executing program 4: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000002, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x31) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) waitid$P_PIDFD(0x3, r0, &(0x7f0000000500), 0x9, &(0x7f0000000580)) ptrace$cont(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='pids.events\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x12, r1, 0x0) ftruncate(r1, 0x1000673) ioctl$KDSKBENT(r1, 0x4b47, &(0x7f00000002c0)={0x2, 0x81, 0x5}) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x88400, 0x1a8) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0xd0265000) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) exit_group(0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x31, 0xffffffffffffffff, 0x0) time(&(0x7f0000000180)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14001500, 0xd, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c190000ce1900000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800)) [ 240.060484][T10565] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 0000000000467b1a [ 240.068429][T10565] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007f3059254000 [ 240.076378][T10565] RBP: 00007f3059254040 R08: 00007f3059254040 R09: 0000000020000000 [ 240.084327][T10565] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000020000000 [ 240.092284][T10565] R13: 0000000020000100 R14: 00007f3059254000 R15: 0000000020012c00 13:22:40 executing program 5 (fault-call:0 fault-nth:58): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000660000000f000000000000000100000001000000004000000040000020000000daf4655fdaf4655f0100ffff53ef010001000000d9f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010100)}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000100000000000000000000000000000000000000000000003000000000000000", 0x40, 0x540}, {&(0x7f0000010300)="02000000030000000400000066000f000300040000000000000000000f007f5c", 0x20, 0x800}, {&(0x7f0000011500)="ed41000000080000d9f4655fdaf4655fdaf4655f000000000000040004", 0x1d, 0x2200}, {0x0}, {&(0x7f0000011900)="ed8100001a040000daf4655fdaf4655fdaf4655f000000000000010004000000000000000100000014000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000039c34d38000000000000000000000000000000000000000000000000200000007412ab417412ab417412ab41daf4655f7412ab410000000000000000", 0xa0, 0x3800}], 0x0, &(0x7f0000012c00)) [ 240.137811][T10548] F2FS-fs (loop2): Failed to read root inode 13:22:40 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_mount_image$f2fs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0xf, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}, {&(0x7f0000010500)='\x00\x00\x00\x00', 0x4, 0xc80}, {&(0x7f0000010700)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e00000010000003000000010000000200000018b2e346f95e497f827e0a", 0x77, 0x1400}, {0x0}, {&(0x7f0000010e00)="d73cd47a0000000000100000000000000b000000000000000d0000001000000012000000170000001600000015000000ffffffffffffffffffffffffffffffffffffffff03000600000000000000000000000000140000000100000000000000ffffffffffffffffffffffffffffffffffffffff05000000000000000000000000000000c5010000060000000100000007000000070000000a0000004000000040000000fc0f00"/181, 0xb5, 0x200000}, {&(0x7f0000010f00)="0000000000000000000000000000000000000000000000000000000009f7a5bb", 0x20, 0x200fe0}, {&(0x7f0000011000)="00000000000000000000000000000000000000000000000000000006", 0x1c, 0x2011e0}, {0x0, 0x0, 0x2012e0}, {&(0x7f0000011400)="000000000000000000000000000000000000000000160000000510ec", 0x1c, 0x201320}, {&(0x7f0000011500)="00000017000000020c60", 0xa, 0x201380}, {&(0x7f0000011600)}, {&(0x7f0000011800)}, {&(0x7f0000011b00)="0000000000000000000000000000000000000000000000000000000100000000d73cd47a0000000000100000000000000b000000000000000d0000001000000012000000170000001600000015000000ffffffffffffffffffffffffffffffffffffff", 0x63, 0x204fe0}, {&(0x7f0000011c00)="0000000000000000000000000000000000000000000000000000000009f7a5bb", 0x20, 0x205fe0}, {0x0, 0x0, 0x401320}], 0x0, &(0x7f0000014b00)) 13:22:40 executing program 3: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef0100010000002bc4645f000000000000000001000000000000000b0000000001000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e373836333438323637", 0xa2, 0x400}, {&(0x7f0000010100)="0000000000000000000000002f527b43270a4164871303f1137e5908010040000c000000000000002bc4645f", 0x2c, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000500000000000000000000000000000000000000040100004d", 0x39, 0x540}, {&(0x7f0000000040)="00000000000000000000000000000000000000000000000000000000787371fe", 0x20, 0x7e0}, {&(0x7f0000010400)="0200000012000000220000002d000f00030004000000000031245cf20f0062e6000000000000000000000000000000000000000000000000d4189ee9", 0x3c, 0x1000}, {&(0x7f0000012f00)="ed410000001000002bc4645f2bc4645f2bc4645f00000000000004000800000000000800050000000af3010004000000000000000000000001000000030000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002f49000020004f3f54a9d2a254a9d2a2000000002bc4645f", 0x94, 0x22100}], 0x0, &(0x7f0000000300)=ANY=[]) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000140), 0x6e, &(0x7f00000001c0)=[{&(0x7f0000000380)=""/182, 0xb6}, {&(0x7f0000000440)=""/166, 0xa6}], 0x2, &(0x7f00000002c0)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0x0}}}], 0x20}, 0x10000) syz_mount_image$fuse(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000500)={{}, 0x2c, {'rootmode', 0x3d, 0x1000}, 0x2c, {'user_id', 0x3d, 0xee00}, 0x2c, {}, 0x2c, {[{@default_permissions}, {@allow_other}], [{@euid_eq={'euid', 0x3d, r1}}]}}) statx(r0, &(0x7f0000000340)='./file1\x00', 0x0, 0x0, 0x0) mmap(&(0x7f0000ff9000/0x4000)=nil, 0x4000, 0x0, 0x810, r0, 0xb1808000) ptrace$setregs(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000080)) [ 240.244963][T10592] EXT4-fs: Warning: mounting with data=journal disables delayed allocation and O_DIRECT support! [ 240.257706][T10592] EXT4-fs (loop4): mounting with "discard" option, but the device does not support discard [ 240.268055][T10592] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue [ 240.277677][T10592] ext4 filesystem being mounted at /root/syzkaller-testdir756229767/syzkaller.YUione/380/file0 supports timestamps until 2038 (0x7fffffff) [ 240.297342][T10599] FAULT_INJECTION: forcing a failure. [ 240.297342][T10599] name failslab, interval 1, probability 0, space 0, times 0 [ 240.310097][T10599] CPU: 0 PID: 10599 Comm: syz-executor.5 Not tainted 5.4.125-syzkaller-00016-gae94e015273b #0 [ 240.320327][T10599] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 240.330406][T10599] Call Trace: [ 240.332186][T10605] fuse: Bad value for 'fd' [ 240.333687][T10599] dump_stack+0x1d8/0x24e [ 240.333702][T10599] ? devkmsg_release+0x11c/0x11c [ 240.339781][T10600] F2FS-fs (loop0): invalid crc_offset: 0 [ 240.342403][T10599] ? show_regs_print_info+0x12/0x12 [ 240.342420][T10599] ? mem_cgroup_charge_statistics+0x165/0x1c0 [ 240.364153][T10599] should_fail+0x6f6/0x860 [ 240.368578][T10599] ? setup_fault_attr+0x3d0/0x3d0 [ 240.371270][T10600] F2FS-fs (loop0): invalid crc_offset: 0 [ 240.373587][T10599] ? xas_load+0x493/0x4f0 [ 240.373597][T10599] ? alloc_page_buffers+0x109/0x3f0 [ 240.373612][T10599] ? mempool_alloc_slab+0x16/0x20 [ 240.385078][T10600] F2FS-fs (loop0): Failed to get valid F2FS checkpoint [ 240.388719][T10599] should_failslab+0x5/0x20 [ 240.388730][T10599] kmem_cache_alloc+0x36/0x290 [ 240.388739][T10599] ? check_preemption_disabled+0x9e/0x330 [ 240.388753][T10599] ? mempool_free+0x380/0x380 [ 240.416225][T10611] fuse: Bad value for 'fd' [ 240.420344][T10599] mempool_alloc_slab+0x16/0x20 [ 240.420354][T10599] mempool_alloc+0x113/0x680 [ 240.420369][T10599] ? mempool_resize+0x900/0x900 [ 240.438980][T10599] ? check_preemption_disabled+0x9e/0x330 [ 240.444672][T10599] ? __find_get_block+0xc5d/0x10c0 [ 240.449755][T10599] bio_alloc_bioset+0x1db/0x640 [ 240.454579][T10599] ? write_boundary_block+0x150/0x150 [ 240.459924][T10599] ? _raw_spin_lock+0xa3/0x1b0 [ 240.464673][T10599] ? bio_chain_endio+0x110/0x110 [ 240.469584][T10599] ? init_page_buffers+0x367/0x390 [ 240.474678][T10599] submit_bh_wbc+0x1ba/0x790 [ 240.479245][T10599] __bread_gfp+0x181/0x310 [ 240.483636][T10599] ext4_fill_super+0x866/0xeb30 [ 240.488477][T10599] ? string+0x2c0/0x2c0 [ 240.492606][T10599] ? vsnprintf+0x1d60/0x1d60 [ 240.497171][T10599] ? vsnprintf+0x1cb4/0x1d60 [ 240.501733][T10599] ? delete_node+0x733/0x790 [ 240.506298][T10599] ? ext4_mount+0x40/0x40 [ 240.510612][T10599] ? idr_replace+0x1c4/0x230 [ 240.515195][T10599] ? snprintf+0xd6/0x120 [ 240.519411][T10599] ? vscnprintf+0x80/0x80 [ 240.523726][T10599] ? set_blocksize+0x1a5/0x3a0 [ 240.529438][T10599] mount_bdev+0x22d/0x340 [ 240.533754][T10599] ? ext4_mount+0x40/0x40 [ 240.538056][T10599] legacy_get_tree+0xde/0x170 [ 240.542709][T10599] ? ext4_lazyinit_thread+0xd40/0xd40 [ 240.548051][T10599] vfs_get_tree+0x83/0x260 [ 240.552456][T10599] do_mount+0x19d0/0x2670 [ 240.556760][T10599] ? copy_mount_string+0x30/0x30 [ 240.561667][T10599] ? copy_mount_options+0x59/0x300 [ 240.566749][T10599] ? copy_mount_options+0x59/0x300 [ 240.571836][T10599] ? kmem_cache_alloc_trace+0x139/0x2b0 [ 240.577356][T10599] ? copy_mount_options+0x273/0x300 [ 240.582527][T10599] ksys_mount+0xc2/0xf0 [ 240.586657][T10599] __x64_sys_mount+0xb1/0xc0 [ 240.591235][T10599] do_syscall_64+0xcb/0x1e0 [ 240.595711][T10599] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 240.601575][T10599] RIP: 0033:0x467b1a [ 240.605445][T10599] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 240.625195][T10599] RSP: 002b:00007f3059253fa8 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 240.633574][T10599] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 0000000000467b1a 13:22:40 executing program 2: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffff, 0xffffffffffffffff, 0x0) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) read(r0, 0x0, 0x0) syz_mount_image$f2fs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x10, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}, {&(0x7f0000010500)='\x00\x00\x00\x00', 0x4, 0xc80}, {&(0x7f0000010700)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e00000010000003000000010000000200000018b2e346f95e497f827e0a", 0x77, 0x1400}, {0x0}, {&(0x7f0000010e00)="d73cd47a0000000000100000000000000b000000000000000d0000001000000012000000170000001600000015000000ffffffffffffffffffffffffffffffffffffffff03000600000000000000000000000000140000000100000000000000ffffffffffffffffffffffffffffffffffffffff05000000000000000000000000000000c5010000060000000100000007000000070000000a0000004000000040000000fc0f00"/181, 0xb5, 0x200000}, {&(0x7f0000010f00)="0000000000000000000000000000000000000000000000000000000009f7a5bb", 0x20, 0x200fe0}, {&(0x7f0000011000)="00000000000000000000000000000000000000000000000000000006", 0x1c, 0x2011e0}, {0x0, 0x0, 0x2012e0}, {&(0x7f0000011400)="000000000000000000000000000000000000000000160000000510ec", 0x1c, 0x201320}, {&(0x7f0000011500)="00000017000000020c60", 0xa, 0x201380}, {&(0x7f0000011600)}, {&(0x7f0000011800)}, {&(0x7f0000011b00)="0000000000000000000000000000000000000000000000000000000100000000d73cd47a0000000000100000000000000b000000000000000d0000001000000012000000170000001600000015000000ffffffffffffffffffffffffffffffffffffffff03000600000000000000000000000000140000000100000000000000ffffffffffffffffffffffffffffffffffffffff05000000000000000000000000000000c5010000060000000100000007000000070000000a0000004000000040000000fc0f", 0xc6, 0x204fe0}, {&(0x7f0000011c00)="0000000000000000000000000000000000000000000000000000000009f7a5bb", 0x20, 0x205fe0}, {0x0}, {&(0x7f0000013000)="000000000000000000000100000001", 0xf, 0xa00000}], 0x0, &(0x7f0000014b00)) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='pids.events\x00', 0x275a, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x4, 0x2d, 0x9, 0x1, 0x0, 0x7fff, 0x88, 0x4, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x7, 0x0, @perf_bp={&(0x7f00000000c0), 0x1}, 0x9, 0x1, 0x4, 0x9, 0x0, 0xffff, 0x400, 0x0, 0x2, 0x0, 0x1000}, 0x0, 0xe, r1, 0xa) 13:22:40 executing program 1: clone(0x13102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) poll(0x0, 0x0, 0x8000000000000200) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f00000025c0)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00'}) ioctl$TUNSETLINK(r0, 0x800454d7, 0x30a) r2 = openat$selinux_attr(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) mmap(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x6, 0x1010, r2, 0xdc5f7000) close(r0) r3 = socket$inet_tcp(0x2, 0x1, 0x0) preadv(r3, 0x0, 0x0, 0x7fffffff, 0x1) 13:22:40 executing program 4: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000002, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x31) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) waitid$P_PIDFD(0x3, r0, &(0x7f0000000500), 0x9, &(0x7f0000000580)) ptrace$cont(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='pids.events\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x12, r1, 0x0) ftruncate(r1, 0x1000673) ioctl$KDSKBENT(r1, 0x4b47, &(0x7f00000002c0)={0x2, 0x81, 0x5}) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x88400, 0x1a8) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0xd0265000) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) exit_group(0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x31, 0xffffffffffffffff, 0x0) time(&(0x7f0000000180)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14001500, 0xe, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c190000ce1900000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800)) [ 240.641518][T10599] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007f3059254000 [ 240.649461][T10599] RBP: 00007f3059254040 R08: 00007f3059254040 R09: 0000000020000000 [ 240.657407][T10599] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000020000000 [ 240.665351][T10599] R13: 0000000020000100 R14: 00007f3059254000 R15: 0000000020012c00 13:22:40 executing program 3: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xfffffffffffffffc, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef0100010000002bc4645f000000000000000001000000000000000b0000000001000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e373836333438323637", 0xa2, 0x400}, {&(0x7f0000010100)="0000000000000000000000002f527b43270a4164871303f1137e5908010040000c000000000000002bc4645f", 0x2c, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000500000000000000000000000000000000000000040100004d", 0x39, 0x540}, {&(0x7f0000000040)="00000000000000000000000000000000000000000000000000000000787371fe", 0x20, 0x7e0}, {&(0x7f0000000080)="02000000120000002200002d000f00030004000000000031245cf20f0062e60000000000000000000000000000000000008258000000000000d4189ee900", 0x3e, 0x1000}, {&(0x7f0000012f00)="ed410000001000002bc4645f2bc4645f2bc4645f00000000000004000800000000000800050000000af3010004000000000000000000000001000000030000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002f49000020004f3f54a9d2a254a9d2a2000000002bc4645f", 0x94, 0x22100}], 0x0, &(0x7f0000000300)=ANY=[]) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) statx(r0, &(0x7f0000000340)='./file1\x00', 0x0, 0x0, 0x0) ptrace$setregs(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000080)) [ 240.692218][T10615] F2FS-fs (loop2): invalid crc_offset: 0 [ 240.713068][T10615] F2FS-fs (loop2): f2fs_check_nid_range: out-of-range nid=2, run fsck to fix. 13:22:40 executing program 3: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x0, &(0x7f0000000300)=ANY=[]) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) statx(r0, &(0x7f0000000340)='./file1\x00', 0x0, 0x0, 0x0) ptrace$setregs(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000080)) r1 = open_tree(r0, &(0x7f00000000c0)='./file1\x00', 0x1) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x66, 0x2, 0x5, 0xf8, 0x0, 0x3, 0x84404, 0xf, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x3, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x4, 0x81}, 0x40081, 0x4, 0x1, 0x0, 0x4, 0x8000, 0x5, 0x0, 0xced, 0x0, 0x4}, 0x0, 0x0, r1, 0x2) [ 240.738535][T10599] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue [ 240.758641][T10615] F2FS-fs (loop2): Failed to read root inode 13:22:40 executing program 5 (fault-call:0 fault-nth:59): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000660000000f000000000000000100000001000000004000000040000020000000daf4655fdaf4655f0100ffff53ef010001000000d9f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010100)}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000100000000000000000000000000000000000000000000003000000000000000", 0x40, 0x540}, {&(0x7f0000010300)="02000000030000000400000066000f000300040000000000000000000f007f5c", 0x20, 0x800}, {&(0x7f0000011500)="ed41000000080000d9f4655fdaf4655fdaf4655f000000000000040004", 0x1d, 0x2200}, {0x0}, {&(0x7f0000011900)="ed8100001a040000daf4655fdaf4655fdaf4655f000000000000010004000000000000000100000014000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000039c34d38000000000000000000000000000000000000000000000000200000007412ab417412ab417412ab41daf4655f7412ab410000000000000000", 0xa0, 0x3800}], 0x0, &(0x7f0000012c00)) 13:22:40 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_mount_image$f2fs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0xf, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}, {&(0x7f0000010500)='\x00\x00\x00\x00', 0x4, 0xc80}, {&(0x7f0000010700)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e00000010000003000000010000000200000018b2e346f95e497f827e0a", 0x77, 0x1400}, {0x0}, {&(0x7f0000010e00)="d73cd47a0000000000100000000000000b000000000000000d0000001000000012000000170000001600000015000000ffffffffffffffffffffffffffffffffffffffff03000600000000000000000000000000140000000100000000000000ffffffffffffffffffffffffffffffffffffffff05000000000000000000000000000000c5010000060000000100000007000000070000000a0000004000000040000000fc0f00"/181, 0xb5, 0x200000}, {&(0x7f0000010f00)="0000000000000000000000000000000000000000000000000000000009f7a5bb", 0x20, 0x200fe0}, {&(0x7f0000011000)="00000000000000000000000000000000000000000000000000000006", 0x1c, 0x2011e0}, {0x0, 0x0, 0x2012e0}, {&(0x7f0000011400)="000000000000000000000000000000000000000000160000000510ec", 0x1c, 0x201320}, {&(0x7f0000011500)="00000017000000020c60", 0xa, 0x201380}, {&(0x7f0000011600)}, {&(0x7f0000011800)}, {&(0x7f0000011b00)="0000000000000000000000000000000000000000000000000000000100000000d73cd47a0000000000100000000000000b000000000000000d0000001000000012000000170000001600000015000000ffffffffffffffffffffffffffffffffffffff", 0x63, 0x204fe0}, {&(0x7f0000011c00)="0000000000000000000000000000000000000000000000000000000009f7a5bb", 0x20, 0x205fe0}, {0x0, 0x0, 0x401320}], 0x0, &(0x7f0000014b00)) 13:22:40 executing program 3: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef0100010000002bc4645f000000000000000001000000000000000b0000000001000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e373836333438323637", 0xa2, 0x100}, {&(0x7f0000010100)="0000000000000000000000002f527b43270a4164871303002bc4645f", 0x1c, 0x4e3}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000500000000000000000000000000000000000000040100004d", 0x39, 0x540}, {&(0x7f0000000040)="00000000000000000000000000000000000000000000000000000000787371fe", 0x20, 0x7e0}, {&(0x7f0000010400)="0200000012000000220000002d000f00030004000000000031245cf20f0062e6000000000000000000000000000000000000000000000000d4189ee9", 0x3c, 0x1000}, {&(0x7f0000012f00)="ed410000001000002bc4645f2bc4645f2bc4645f00000000000004000800000000000800050000000af3010004000000000000000000000001000000030000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002f49000020004f3f54a9d2a254a9d2a2000000002bc4645f", 0x94, 0x22180}], 0x0, &(0x7f0000000300)=ANY=[]) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) statx(r0, &(0x7f0000000340)='./file1\x00', 0x0, 0x0, 0x0) ptrace$setregs(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000080)) [ 240.859206][T10633] EXT4-fs (loop4): mounting with "discard" option, but the device does not support discard [ 240.871923][T10633] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue [ 240.882214][T10633] ext4 filesystem being mounted at /root/syzkaller-testdir756229767/syzkaller.YUione/381/file0 supports timestamps until 2038 (0x7fffffff) [ 240.900935][T10640] F2FS-fs (loop0): invalid crc_offset: 0 13:22:40 executing program 4: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000002, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x31) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) waitid$P_PIDFD(0x3, r0, &(0x7f0000000500), 0x9, &(0x7f0000000580)) ptrace$cont(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='pids.events\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x12, r1, 0x0) ftruncate(r1, 0x1000673) ioctl$KDSKBENT(r1, 0x4b47, &(0x7f00000002c0)={0x2, 0x81, 0x5}) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x88400, 0x1a8) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0xd0265000) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) exit_group(0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x31, 0xffffffffffffffff, 0x0) time(&(0x7f0000000180)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14001500, 0x10, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c190000ce1900000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800)) [ 240.907345][T10640] F2FS-fs (loop0): invalid crc_offset: 0 [ 240.913034][T10640] F2FS-fs (loop0): Failed to get valid F2FS checkpoint [ 240.930910][T10642] FAULT_INJECTION: forcing a failure. [ 240.930910][T10642] name failslab, interval 1, probability 0, space 0, times 0 [ 240.949365][T10642] CPU: 0 PID: 10642 Comm: syz-executor.5 Not tainted 5.4.125-syzkaller-00016-gae94e015273b #0 [ 240.959612][T10642] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 240.969668][T10642] Call Trace: [ 240.972943][T10642] dump_stack+0x1d8/0x24e [ 240.977248][T10642] ? devkmsg_release+0x11c/0x11c [ 240.982170][T10642] ? show_regs_print_info+0x12/0x12 [ 240.987362][T10642] ? __kasan_kmalloc+0x1a3/0x1e0 [ 240.992275][T10642] ? __kasan_kmalloc+0x137/0x1e0 [ 240.997184][T10642] should_fail+0x6f6/0x860 [ 241.001575][T10642] ? setup_fault_attr+0x3d0/0x3d0 [ 241.006572][T10642] ? entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 241.012619][T10642] ? create_task_io_context+0x28/0x3a0 [ 241.018063][T10642] should_failslab+0x5/0x20 [ 241.022538][T10642] kmem_cache_alloc+0x36/0x290 [ 241.027285][T10642] create_task_io_context+0x28/0x3a0 [ 241.032560][T10642] generic_make_request_checks+0xb3e/0xf90 [ 241.038364][T10642] ? generic_make_request+0xda0/0xda0 [ 241.043894][T10642] ? mempool_alloc_slab+0x16/0x20 [ 241.048920][T10642] ? kmem_cache_alloc+0x115/0x290 [ 241.053919][T10642] ? check_preemption_disabled+0x9e/0x330 [ 241.059613][T10642] ? mempool_alloc_slab+0x16/0x20 [ 241.064786][T10642] ? mempool_alloc+0x120/0x680 [ 241.069539][T10642] generic_make_request+0xc9/0xda0 [ 241.074624][T10642] ? mempool_resize+0x900/0x900 [ 241.079449][T10642] ? blk_attempt_plug_merge+0x310/0x310 [ 241.084972][T10642] ? memset+0x1f/0x40 [ 241.088929][T10642] ? fscrypt_set_bio_crypt_ctx+0x179/0x4e0 [ 241.094919][T10642] ? __bio_add_page+0x270/0x430 [ 241.099779][T10642] submit_bio+0x146/0x5d0 [ 241.104092][T10642] ? __rcu_read_lock+0x50/0x50 [ 241.108846][T10642] ? direct_make_request+0x440/0x440 [ 241.114110][T10642] ? submit_bh_wbc+0x631/0x790 [ 241.118941][T10642] __bread_gfp+0x181/0x310 [ 241.123340][T10642] ext4_fill_super+0x866/0xeb30 [ 241.128171][T10642] ? string+0x2c0/0x2c0 [ 241.132300][T10642] ? vsnprintf+0x1d60/0x1d60 [ 241.137137][T10642] ? vsnprintf+0x1cb4/0x1d60 [ 241.141697][T10642] ? delete_node+0x733/0x790 [ 241.146271][T10642] ? ext4_mount+0x40/0x40 [ 241.150572][T10642] ? idr_replace+0x1c4/0x230 [ 241.155137][T10642] ? snprintf+0xd6/0x120 [ 241.159356][T10642] ? vscnprintf+0x80/0x80 [ 241.163666][T10642] ? set_blocksize+0x1a5/0x3a0 [ 241.168406][T10642] mount_bdev+0x22d/0x340 [ 241.172711][T10642] ? ext4_mount+0x40/0x40 [ 241.177017][T10642] legacy_get_tree+0xde/0x170 [ 241.181666][T10642] ? ext4_lazyinit_thread+0xd40/0xd40 [ 241.187038][T10642] vfs_get_tree+0x83/0x260 [ 241.191439][T10642] do_mount+0x19d0/0x2670 [ 241.195744][T10642] ? copy_mount_string+0x30/0x30 [ 241.200652][T10642] ? copy_mount_options+0x59/0x300 [ 241.205736][T10642] ? kmem_cache_alloc_trace+0x139/0x2b0 [ 241.211343][T10642] ? copy_mount_options+0x273/0x300 [ 241.216517][T10642] ksys_mount+0xc2/0xf0 [ 241.220648][T10642] __x64_sys_mount+0xb1/0xc0 [ 241.225210][T10642] do_syscall_64+0xcb/0x1e0 [ 241.229686][T10642] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 241.235553][T10642] RIP: 0033:0x467b1a [ 241.239596][T10642] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 13:22:41 executing program 2: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffff, 0xffffffffffffffff, 0x0) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) read(r0, 0x0, 0x0) syz_mount_image$f2fs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0xf, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}, {&(0x7f0000010500)='\x00\x00\x00\x00', 0x4, 0xc80}, {&(0x7f0000010700)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e00000010000003000000010000000200000018b2e346f95e497f827e0a", 0x77, 0x1400}, {0x0}, {&(0x7f0000010e00)="d73cd47a0000000000100000000000000b000000000000000d0000001000000012000000170000001600000015000000ffffffffffffffffffffffffffffffffffffffff03000600000000000000000000000000140000000100000000000000ffffffffffffffffffffffffffffffffffffffff05000000000000000000000000000000c5010000060000000100000007000000070000000a0000004000000040000000fc0f00"/181, 0xb5, 0x200000}, {&(0x7f0000010f00)="0000000000000000000000000000000000000000000000000000000009f7a5bb", 0x20, 0x200fe0}, {&(0x7f0000011000)="00000000000000000000000000000000000000000000000000000006", 0x1c, 0x2011e0}, {0x0, 0x0, 0x2012e0}, {&(0x7f0000011400)="000000000000000000000000000000000000000000160000000510ec", 0x1c, 0x201320}, {&(0x7f0000011500)="00000017000000020c60", 0xa, 0x201380}, {&(0x7f0000011600)}, {&(0x7f0000011800)}, {&(0x7f0000011b00)="0000000000000000000000000000000000000000000000000000000100000000d73cd47a0000000000100000000000000b000000000000000d0000001000000012000000170000001600000015000000ffffffffffffffffffffffffffffffffffffffff03000600000000000000000000000000140000000100000000000000ffffffffffffffffffffffffffffffffffffffff05000000000000000000000000000000c5010000060000000100000007000000070000000a0000004000000040000000fc0f", 0xc6, 0x204fe0}, {0x0}, {&(0x7f0000013000)="000000000000000000000100000001", 0xf, 0xa00000}], 0x0, &(0x7f0000014b00)) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='pids.events\x00', 0x275a, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x4, 0x2d, 0x9, 0x1, 0x0, 0x7fff, 0x88, 0x4, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x7, 0x0, @perf_bp={&(0x7f00000000c0), 0x1}, 0x9, 0x1, 0x4, 0x9, 0x0, 0xffff, 0x400, 0x0, 0x2, 0x0, 0x1000}, 0x0, 0xe, r1, 0xa) [ 241.259187][T10642] RSP: 002b:00007f3059253fa8 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 241.267572][T10642] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 0000000000467b1a [ 241.275622][T10642] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007f3059254000 [ 241.283567][T10642] RBP: 00007f3059254040 R08: 00007f3059254040 R09: 0000000020000000 [ 241.291512][T10642] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000020000000 [ 241.299472][T10642] R13: 0000000020000100 R14: 00007f3059254000 R15: 0000000020012c00 13:22:41 executing program 3: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef0100010000002bc4645f000000000000000001000000000000000b0000000001000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e373836333438323637", 0xa2, 0x400}, {&(0x7f0000010100)="0000000000000000000000002f527b43270a4164871303f1137e5908010040000c000000000000002bc4645f", 0x2c, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000500000000000000000000000000000000000000040100004d", 0x39, 0x540}, {&(0x7f0000000040)="00000000000000000000000000000000000000000000000000000000787371fe", 0x20, 0x7e0}, {&(0x7f0000010400)="0200000012000000220000002d000f00030004000000000031245cf20f0062e6000000000000000000000000000000000000000000000000d4189ee9", 0x3c, 0x1000}, {&(0x7f0000012f00)="ed410000001000002bc4645f2bc4645f2bc4645f00000000000004000800000000000800050000000af3010004000000000000000000000001000000030000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002f49000020004f3f54a9d2a254a9d2a2000000002bc4645f", 0x94, 0x22100}], 0x0, &(0x7f0000000300)=ANY=[]) mkdir(&(0x7f0000000080)='./file1\x00', 0x40) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) statx(r0, &(0x7f0000000340)='./file1\x00', 0x0, 0x0, 0x0) getresgid(&(0x7f00000001c0)=0x0, &(0x7f00000002c0), &(0x7f0000000300)) mount$9p_unix(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file1\x00', &(0x7f0000000180), 0x2846048, &(0x7f0000000480)={'trans=unix,', {[{@access_client}, {@version_L}, {@dfltgid={'dfltgid', 0x3d, r1}}, {@debug}, {@cache_mmap}, {@posixacl}], [{@dont_appraise}]}}) ptrace$setregs(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000080)) 13:22:41 executing program 5 (fault-call:0 fault-nth:60): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000660000000f000000000000000100000001000000004000000040000020000000daf4655fdaf4655f0100ffff53ef010001000000d9f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010100)}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000100000000000000000000000000000000000000000000003000000000000000", 0x40, 0x540}, {&(0x7f0000010300)="02000000030000000400000066000f000300040000000000000000000f007f5c", 0x20, 0x800}, {&(0x7f0000011500)="ed41000000080000d9f4655fdaf4655fdaf4655f000000000000040004", 0x1d, 0x2200}, {0x0}, {&(0x7f0000011900)="ed8100001a040000daf4655fdaf4655fdaf4655f000000000000010004000000000000000100000014000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000039c34d38000000000000000000000000000000000000000000000000200000007412ab417412ab417412ab41daf4655f7412ab410000000000000000", 0xa0, 0x3800}], 0x0, &(0x7f0000012c00)) 13:22:41 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_mount_image$f2fs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0xf, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}, {&(0x7f0000010500)='\x00\x00\x00\x00', 0x4, 0xc80}, {&(0x7f0000010700)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e00000010000003000000010000000200000018b2e346f95e497f827e0a", 0x77, 0x1400}, {0x0}, {&(0x7f0000010e00)="d73cd47a0000000000100000000000000b000000000000000d0000001000000012000000170000001600000015000000ffffffffffffffffffffffffffffffffffffffff03000600000000000000000000000000140000000100000000000000ffffffffffffffffffffffffffffffffffffffff05000000000000000000000000000000c5010000060000000100000007000000070000000a0000004000000040000000fc0f00"/181, 0xb5, 0x200000}, {&(0x7f0000010f00)="0000000000000000000000000000000000000000000000000000000009f7a5bb", 0x20, 0x200fe0}, {&(0x7f0000011000)="00000000000000000000000000000000000000000000000000000006", 0x1c, 0x2011e0}, {0x0, 0x0, 0x2012e0}, {&(0x7f0000011400)="000000000000000000000000000000000000000000160000000510ec", 0x1c, 0x201320}, {&(0x7f0000011500)="00000017000000020c60", 0xa, 0x201380}, {&(0x7f0000011600)}, {&(0x7f0000011800)}, {&(0x7f0000011b00)="0000000000000000000000000000000000000000000000000000000100000000d73cd47a0000000000100000000000000b000000000000000d0000001000000012000000170000001600000015000000ffffffffffffffffffffffffffffffffffffff", 0x63, 0x204fe0}, {&(0x7f0000011c00)="0000000000000000000000000000000000000000000000000000000009f7a5bb", 0x20, 0x205fe0}, {0x0, 0x0, 0x401320}], 0x0, &(0x7f0000014b00)) 13:22:41 executing program 1: clone(0x13102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) poll(0x0, 0x0, 0x8000000000000200) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f00000025c0)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00'}) ioctl$TUNSETLINK(r0, 0x800454dd, 0x30a) r2 = openat$selinux_attr(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) mmap(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x6, 0x1010, r2, 0xdc5f7000) close(r0) r3 = socket$inet_tcp(0x2, 0x1, 0x0) preadv(r3, 0x0, 0x0, 0x7fffffff, 0x1) [ 241.329200][T10642] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue [ 241.418646][T10654] F2FS-fs (loop2): invalid crc value [ 241.424321][T10654] F2FS-fs (loop2): invalid crc_offset: 0 [ 241.430313][T10654] F2FS-fs (loop2): Failed to get valid F2FS checkpoint 13:22:41 executing program 3: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef0100010000002bc4645f000000000000000001000000000000000b0000000001000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e373836333438323637", 0xa2, 0x400}, {&(0x7f0000010100)="0000000000000000000000002f527b43270a4164871303f1137e5908010040000c000000000000002bc4645f", 0x2c, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000500000000000000000000000000000000000000040100004d", 0x39, 0x540}, {&(0x7f0000000040)="00000000000000000000000000000000000000000000000000000000787371fe", 0x20, 0x7e0}, {&(0x7f0000010400)="0200000012000000220000002d000f00030004000000000031245cf20f0062e6000000000000000000000000000000000000000000000000d4189ee9", 0x3c, 0x1000}, {&(0x7f0000012f00)="ed410000001000002bc4645f2bc4645f2bc4645f00000000000004000800000000000800050000000af3010004000000000000000000000001000000030000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002f49000020004f3f54a9d2a254a9d2a2000000002bc4645f", 0x94, 0x22100}], 0x0, &(0x7f0000000300)=ANY=[]) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) statx(r0, &(0x7f0000000340)='./file1\x00', 0x0, 0x0, 0x0) ptrace$setregs(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000080)) r1 = openat$vcsa(0xffffffffffffff9c, &(0x7f00000001c0), 0x311102, 0x0) ioctl$F2FS_IOC_RESERVE_COMPRESS_BLOCKS(r1, 0x8008f513, &(0x7f00000002c0)) [ 241.497582][T10666] F2FS-fs (loop0): invalid crc_offset: 0 [ 241.499346][T10674] FAULT_INJECTION: forcing a failure. [ 241.499346][T10674] name failslab, interval 1, probability 0, space 0, times 0 [ 241.508563][T10666] F2FS-fs (loop0): invalid crc_offset: 0 [ 241.519599][T10664] [EXT4 FS bs=1024, gc=1, bpg=8192, ipg=32, mo=e002c018, mo2=0006] [ 241.531358][T10666] F2FS-fs (loop0): Failed to get valid F2FS checkpoint [ 241.533814][T10664] System zones: 1-2, 19-19, 35-38, 46-46 [ 241.545896][T10664] EXT4-fs (loop4): mounting with "discard" option, but the device does not support discard [ 241.558534][T10674] CPU: 1 PID: 10674 Comm: syz-executor.5 Not tainted 5.4.125-syzkaller-00016-gae94e015273b #0 [ 241.568852][T10674] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 241.579068][T10674] Call Trace: [ 241.582351][T10674] dump_stack+0x1d8/0x24e [ 241.586672][T10674] ? devkmsg_release+0x11c/0x11c [ 241.591611][T10674] ? prepare_to_wait+0x223/0x280 [ 241.596526][T10674] ? show_regs_print_info+0x12/0x12 [ 241.601701][T10674] should_fail+0x6f6/0x860 [ 241.606093][T10674] ? setup_fault_attr+0x3d0/0x3d0 [ 241.611092][T10674] ? __up_read+0x6f/0x1b0 [ 241.615397][T10674] ? __down_read+0x210/0x210 [ 241.619961][T10674] ? kzalloc+0x16/0x20 [ 241.624001][T10674] should_failslab+0x5/0x20 [ 241.628477][T10674] __kmalloc+0x5f/0x2f0 [ 241.632606][T10674] kzalloc+0x16/0x20 [ 241.636474][T10674] crypto_create_tfm+0x6c/0x2e0 [ 241.641304][T10674] ? crypto_alg_mod_lookup+0x49c/0x7c0 [ 241.646733][T10674] crypto_alloc_tfm+0x16b/0x2e0 [ 241.651569][T10674] ext4_fill_super+0xb84/0xeb30 [ 241.656397][T10674] ? string+0x2c0/0x2c0 [ 241.660530][T10674] ? vsnprintf+0x1cb4/0x1d60 [ 241.665094][T10674] ? delete_node+0x733/0x790 [ 241.669657][T10674] ? ext4_mount+0x40/0x40 [ 241.673955][T10674] ? idr_replace+0x1c4/0x230 [ 241.678529][T10674] ? snprintf+0xd6/0x120 [ 241.682746][T10674] ? vscnprintf+0x80/0x80 [ 241.687047][T10674] ? set_blocksize+0x1a5/0x3a0 [ 241.691784][T10674] mount_bdev+0x22d/0x340 [ 241.696099][T10674] ? ext4_mount+0x40/0x40 [ 241.700400][T10674] legacy_get_tree+0xde/0x170 [ 241.705051][T10674] ? ext4_lazyinit_thread+0xd40/0xd40 [ 241.710406][T10674] vfs_get_tree+0x83/0x260 [ 241.714809][T10674] do_mount+0x19d0/0x2670 [ 241.719113][T10674] ? copy_mount_string+0x30/0x30 [ 241.724021][T10674] ? copy_mount_options+0x59/0x300 [ 241.729105][T10674] ? copy_mount_options+0x59/0x300 [ 241.734188][T10674] ? kmem_cache_alloc_trace+0x139/0x2b0 [ 241.739704][T10674] ? copy_mount_options+0x273/0x300 [ 241.744871][T10674] ksys_mount+0xc2/0xf0 [ 241.748999][T10674] __x64_sys_mount+0xb1/0xc0 [ 241.753563][T10674] do_syscall_64+0xcb/0x1e0 [ 241.758300][T10674] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 241.764171][T10674] RIP: 0033:0x467b1a [ 241.768038][T10674] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 241.787614][T10674] RSP: 002b:00007f3059253fa8 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 13:22:41 executing program 2: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffff, 0xffffffffffffffff, 0x0) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) read(r0, 0x0, 0x0) syz_mount_image$f2fs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0xf, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}, {&(0x7f0000010500)='\x00\x00\x00\x00', 0x4, 0xc80}, {&(0x7f0000010700)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e00000010000003000000010000000200000018b2e346f95e497f827e0a", 0x77, 0x1400}, {0x0}, {&(0x7f0000010e00)="d73cd47a0000000000100000000000000b000000000000000d0000001000000012000000170000001600000015000000ffffffffffffffffffffffffffffffffffffffff03000600000000000000000000000000140000000100000000000000ffffffffffffffffffffffffffffffffffffffff05000000000000000000000000000000c5010000060000000100000007000000070000000a0000004000000040000000fc0f00"/181, 0xb5, 0x200000}, {&(0x7f0000010f00)="0000000000000000000000000000000000000000000000000000000009f7a5bb", 0x20, 0x200fe0}, {&(0x7f0000011000)="00000000000000000000000000000000000000000000000000000006", 0x1c, 0x2011e0}, {0x0, 0x0, 0x2012e0}, {&(0x7f0000011400)="000000000000000000000000000000000000000000160000000510ec", 0x1c, 0x201320}, {&(0x7f0000011500)="00000017000000020c60", 0xa, 0x201380}, {&(0x7f0000011600)}, {&(0x7f0000011800)}, {&(0x7f0000011b00)="0000000000000000000000000000000000000000000000000000000100000000d73cd47a0000000000100000000000000b000000000000000d0000001000000012000000170000001600000015000000ffffffffffffffffffffffffffffffffffffffff03000600000000000000000000000000140000000100000000000000ffffffffffffffffffffffffffffffffffffffff05000000000000000000000000000000c5010000060000000100000007000000070000000a0000004000000040000000fc0f", 0xc6, 0x204fe0}, {0x0}, {&(0x7f0000013000)="000000000000000000000100000001", 0xf, 0xa00000}], 0x0, &(0x7f0000014b00)) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='pids.events\x00', 0x275a, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x4, 0x2d, 0x9, 0x1, 0x0, 0x7fff, 0x88, 0x4, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x7, 0x0, @perf_bp={&(0x7f00000000c0), 0x1}, 0x9, 0x1, 0x4, 0x9, 0x0, 0xffff, 0x400, 0x0, 0x2, 0x0, 0x1000}, 0x0, 0xe, r1, 0xa) [ 241.795992][T10674] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 0000000000467b1a [ 241.803934][T10674] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007f3059254000 [ 241.811875][T10674] RBP: 00007f3059254040 R08: 00007f3059254040 R09: 0000000020000000 [ 241.819818][T10674] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000020000000 [ 241.827759][T10674] R13: 0000000020000100 R14: 00007f3059254000 R15: 0000000020012c00 [ 241.837594][T10664] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue [ 241.856203][T10664] ext4 filesystem being mounted at /root/syzkaller-testdir756229767/syzkaller.YUione/382/file0 supports timestamps until 2038 (0x7fffffff) [ 241.870639][T10674] EXT4-fs (loop5): Cannot load crc32c driver. 13:22:41 executing program 4: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000002, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x31) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) waitid$P_PIDFD(0x3, r0, &(0x7f0000000500), 0x9, &(0x7f0000000580)) ptrace$cont(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='pids.events\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x12, r1, 0x0) ftruncate(r1, 0x1000673) ioctl$KDSKBENT(r1, 0x4b47, &(0x7f00000002c0)={0x2, 0x81, 0x5}) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x88400, 0x1a8) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0xd0265000) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) exit_group(0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x31, 0xffffffffffffffff, 0x0) time(&(0x7f0000000180)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14001500, 0x11, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c190000ce1900000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800)) 13:22:41 executing program 3: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef0100010000002bc4645f000000000000000001000000000000000b0000000001000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e373836333438323637", 0xa2, 0x400}, {&(0x7f0000010100)="0000000000000000000000002f527b43270a4164871303f1137e5908010040000c000000000000002bc4645f", 0x2c, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000500000000000000000000000000000000000000040100004d", 0x39, 0x540}, {&(0x7f0000000040)="00000000000000000000000000000000000000000000000000000000787371fe", 0x20, 0x7e0}, {&(0x7f0000010400)="0200000012000000220000002d000f00030004000000000031245cf20f0062e6000000000000000000000000000000000000000000000000d4189ee9", 0x3c, 0x1000}, {&(0x7f0000012f00)="ed410000001000002bc4645f2bc4645f2bc4645f00000000000004000800000000000800050000000af3010004000000000000000000000001000000030000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002f49000020004f3f54a9d2a254a9d2a2000000002bc4645f", 0x94, 0x22100}], 0x0, &(0x7f0000000300)=ANY=[]) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) statx(r0, &(0x7f0000000340)='./file1\x00', 0x0, 0x0, 0x0) ptrace$setregs(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000080)) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000002c0)={0x11, 0xc, &(0x7f0000000080)=@framed={{0x18, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x3ff}, [@func={0x85, 0x0, 0x1, 0x0, 0x7}, @map_val={0x18, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x7fff}, @generic={0x1, 0x7, 0x2, 0x1, 0x4}, @exit, @generic={0xbb, 0x7, 0x1, 0x5, 0x7}, @btf_id={0x18, 0x6, 0x3, 0x0, 0x3}, @ldst={0x3, 0x3, 0x3, 0x6, 0x0, 0xfffffffffffffff0, 0x10}]}, &(0x7f0000000140)='syzkaller\x00', 0x7, 0x1000, &(0x7f0000000380)=""/4096, 0x41100, 0x4, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000180)={0x2, 0x4}, 0x8, 0x10, &(0x7f00000001c0)={0x0, 0x0, 0x3, 0x10001}, 0x10}, 0x78) r2 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_opts(r2, 0x6, 0x1, 0x0, &(0x7f0000000000)) sendfile(r1, r2, &(0x7f0000001380)=0x63, 0x5) [ 241.975397][T10684] F2FS-fs (loop2): invalid crc value [ 241.981212][T10684] F2FS-fs (loop2): invalid crc_offset: 0 [ 241.988073][T10684] F2FS-fs (loop2): Failed to get valid F2FS checkpoint 13:22:42 executing program 2: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffff, 0xffffffffffffffff, 0x0) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) read(r0, 0x0, 0x0) syz_mount_image$f2fs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0xf, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}, {&(0x7f0000010500)='\x00\x00\x00\x00', 0x4, 0xc80}, {&(0x7f0000010700)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e00000010000003000000010000000200000018b2e346f95e497f827e0a", 0x77, 0x1400}, {0x0}, {&(0x7f0000010e00)="d73cd47a0000000000100000000000000b000000000000000d0000001000000012000000170000001600000015000000ffffffffffffffffffffffffffffffffffffffff03000600000000000000000000000000140000000100000000000000ffffffffffffffffffffffffffffffffffffffff05000000000000000000000000000000c5010000060000000100000007000000070000000a0000004000000040000000fc0f00"/181, 0xb5, 0x200000}, {&(0x7f0000010f00)="0000000000000000000000000000000000000000000000000000000009f7a5bb", 0x20, 0x200fe0}, {&(0x7f0000011000)="00000000000000000000000000000000000000000000000000000006", 0x1c, 0x2011e0}, {0x0, 0x0, 0x2012e0}, {&(0x7f0000011400)="000000000000000000000000000000000000000000160000000510ec", 0x1c, 0x201320}, {&(0x7f0000011500)="00000017000000020c60", 0xa, 0x201380}, {&(0x7f0000011600)}, {&(0x7f0000011800)}, {&(0x7f0000011b00)="0000000000000000000000000000000000000000000000000000000100000000d73cd47a0000000000100000000000000b000000000000000d0000001000000012000000170000001600000015000000ffffffffffffffffffffffffffffffffffffffff03000600000000000000000000000000140000000100000000000000ffffffffffffffffffffffffffffffffffffffff05000000000000000000000000000000c5010000060000000100000007000000070000000a0000004000000040000000fc0f", 0xc6, 0x204fe0}, {0x0}, {&(0x7f0000013000)="000000000000000000000100000001", 0xf, 0xa00000}], 0x0, &(0x7f0000014b00)) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='pids.events\x00', 0x275a, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x4, 0x2d, 0x9, 0x1, 0x0, 0x7fff, 0x88, 0x4, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x7, 0x0, @perf_bp={&(0x7f00000000c0), 0x1}, 0x9, 0x1, 0x4, 0x9, 0x0, 0xffff, 0x400, 0x0, 0x2, 0x0, 0x1000}, 0x0, 0xe, r1, 0xa) 13:22:42 executing program 1: clone(0x13102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) poll(0x0, 0x0, 0x8000000000000200) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f00000025c0)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00'}) ioctl$TUNSETLINK(r0, 0x800454df, 0x30a) r2 = openat$selinux_attr(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) mmap(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x6, 0x1010, r2, 0xdc5f7000) close(r0) r3 = socket$inet_tcp(0x2, 0x1, 0x0) preadv(r3, 0x0, 0x0, 0x7fffffff, 0x1) 13:22:42 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_mount_image$f2fs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0xf, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}, {&(0x7f0000010500)='\x00\x00\x00\x00', 0x4, 0xc80}, {&(0x7f0000010700)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e00000010000003000000010000000200000018b2e346f95e497f827e0a", 0x77, 0x1400}, {0x0}, {&(0x7f0000010e00)="d73cd47a0000000000100000000000000b000000000000000d0000001000000012000000170000001600000015000000ffffffffffffffffffffffffffffffffffffffff03000600000000000000000000000000140000000100000000000000ffffffffffffffffffffffffffffffffffffffff05000000000000000000000000000000c5010000060000000100000007000000070000000a0000004000000040000000fc0f00"/181, 0xb5, 0x200000}, {&(0x7f0000010f00)="0000000000000000000000000000000000000000000000000000000009f7a5bb", 0x20, 0x200fe0}, {&(0x7f0000011000)="00000000000000000000000000000000000000000000000000000006", 0x1c, 0x2011e0}, {0x0, 0x0, 0x2012e0}, {&(0x7f0000011400)="000000000000000000000000000000000000000000160000000510ec", 0x1c, 0x201320}, {&(0x7f0000011500)="00000017000000020c60", 0xa, 0x201380}, {&(0x7f0000011600)}, {&(0x7f0000011800)}, {&(0x7f0000011b00)="0000000000000000000000000000000000000000000000000000000100000000d73cd47a0000000000100000000000000b000000000000000d0000001000000012000000170000001600000015000000ffffffffffffffffffffffffffffffffffffffff03000600000000000000000000000000140000000100000000000000ffffffffffffffffffffffffffffffffffffffff05", 0x95, 0x204fe0}, {&(0x7f0000011c00)="0000000000000000000000000000000000000000000000000000000009f7a5bb", 0x20, 0x205fe0}, {0x0, 0x0, 0x401320}], 0x0, &(0x7f0000014b00)) 13:22:42 executing program 5 (fault-call:0 fault-nth:61): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000660000000f000000000000000100000001000000004000000040000020000000daf4655fdaf4655f0100ffff53ef010001000000d9f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010100)}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000100000000000000000000000000000000000000000000003000000000000000", 0x40, 0x540}, {&(0x7f0000010300)="02000000030000000400000066000f000300040000000000000000000f007f5c", 0x20, 0x800}, {&(0x7f0000011500)="ed41000000080000d9f4655fdaf4655fdaf4655f000000000000040004", 0x1d, 0x2200}, {0x0}, {&(0x7f0000011900)="ed8100001a040000daf4655fdaf4655fdaf4655f000000000000010004000000000000000100000014000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000039c34d38000000000000000000000000000000000000000000000000200000007412ab417412ab417412ab41daf4655f7412ab410000000000000000", 0xa0, 0x3800}], 0x0, &(0x7f0000012c00)) 13:22:42 executing program 4: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000002, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x31) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) waitid$P_PIDFD(0x3, r0, &(0x7f0000000500), 0x9, &(0x7f0000000580)) ptrace$cont(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='pids.events\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x12, r1, 0x0) ftruncate(r1, 0x1000673) ioctl$KDSKBENT(r1, 0x4b47, &(0x7f00000002c0)={0x2, 0x81, 0x5}) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x88400, 0x1a8) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0xd0265000) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) exit_group(0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x31, 0xffffffffffffffff, 0x0) time(&(0x7f0000000180)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14001500, 0x12, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c190000ce1900000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800)) 13:22:42 executing program 3: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef0100010000002bc4645f000000000000000001000000000000000b0000000001000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c7c651eaf851f64e4ae7354346572000000000000002f746d702f73797a2d696d616765", 0xa2}, {&(0x7f0000010100)="0000000000000000000000002f527b43270a4164871303f1137e5908010040000c000000000000002bc4645f", 0x2c, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000500000000000000000000000000000000000000040100004d", 0x39, 0x3}, {&(0x7f0000000040)="00000000000000000000000000000000000000000000000000000000787371fe", 0x20, 0x7e0}, {&(0x7f0000010400)="0200000012000000220000002d000f00030004000000000031245cf20f0062e6000000000000000000000000000000000000000000000000d4189ee9", 0xfffffcee, 0x1002}, {&(0x7f0000012f00)="ed410000001000002bc4645f2bc4645f2bc4645f00000000000004000800000000000800050000000af3010004000000000000000000000001000000030000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002f49000020004f3f54a9d2a254a9d2a2000000002bc4645f", 0x94, 0x22100}], 0x0, &(0x7f0000000300)=ANY=[]) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) statx(r0, &(0x7f0000000340)='./file1\x00', 0x0, 0x0, 0x0) removexattr(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)=@known='trusted.overlay.redirect\x00') ptrace$setregs(0xd, 0x0, 0x0, &(0x7f0000000140)="058d0647b681b769079c464c7e7993f459531a6b8e0271612920fd5fa4cceb5bfac8298ec07a2ba14f7f510a7fb40f5f7f36abc555f58c95e59dab60a865fad0267dd6658fbdda5332539ef5f84600bd01dd090cc709e67944f5da8b257632b1a2310e9904bb64533a5a4faba605aa203b73f2904250f6914a118d57c246b0344b74fab005c593ffc32fa0c5c748bcd67fe0e61b62dd90fe54f65d8aab6055e8da8dcc405ad6f7") r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='pids.events\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x12, r1, 0x0) ftruncate(r1, 0x1000673) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40042409, 0x1) [ 242.131742][T10701] F2FS-fs (loop0): invalid crc_offset: 0 [ 242.148801][T10701] F2FS-fs (loop0): invalid crc_offset: 0 [ 242.177957][T10701] F2FS-fs (loop0): Failed to get valid F2FS checkpoint [ 242.179558][T10708] F2FS-fs (loop2): invalid crc value [ 242.192537][T10708] F2FS-fs (loop2): invalid crc_offset: 0 [ 242.201701][T10713] FAULT_INJECTION: forcing a failure. [ 242.201701][T10713] name failslab, interval 1, probability 0, space 0, times 0 [ 242.218861][T10708] F2FS-fs (loop2): Failed to get valid F2FS checkpoint [ 242.227722][T10714] EXT4-fs (loop4): mounting with "discard" option, but the device does not support discard [ 242.237721][T10713] CPU: 1 PID: 10713 Comm: syz-executor.5 Not tainted 5.4.125-syzkaller-00016-gae94e015273b #0 [ 242.237726][T10713] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 242.237729][T10713] Call Trace: [ 242.237746][T10713] dump_stack+0x1d8/0x24e [ 242.237758][T10713] ? devkmsg_release+0x11c/0x11c [ 242.237768][T10713] ? show_regs_print_info+0x12/0x12 [ 242.237777][T10713] ? __kasan_kmalloc+0x1a3/0x1e0 [ 242.237785][T10713] ? __kasan_kmalloc+0x137/0x1e0 [ 242.237795][T10713] should_fail+0x6f6/0x860 [ 242.237805][T10713] ? setup_fault_attr+0x3d0/0x3d0 [ 242.237813][T10713] ? entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 242.237827][T10713] ? create_task_io_context+0x28/0x3a0 [ 242.262895][T10714] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue [ 242.265637][T10713] should_failslab+0x5/0x20 [ 242.265648][T10713] kmem_cache_alloc+0x36/0x290 13:22:42 executing program 4: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000002, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x31) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) waitid$P_PIDFD(0x3, r0, &(0x7f0000000500), 0x9, &(0x7f0000000580)) ptrace$cont(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='pids.events\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x12, r1, 0x0) ftruncate(r1, 0x1000673) ioctl$KDSKBENT(r1, 0x4b47, &(0x7f00000002c0)={0x2, 0x81, 0x5}) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x88400, 0x1a8) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0xd0265000) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) exit_group(0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x31, 0xffffffffffffffff, 0x0) time(&(0x7f0000000180)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14001500, 0x2e, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c190000ce1900000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800)) [ 242.265659][T10713] create_task_io_context+0x28/0x3a0 [ 242.265670][T10713] generic_make_request_checks+0xb3e/0xf90 [ 242.265681][T10713] ? generic_make_request+0xda0/0xda0 [ 242.265695][T10713] ? mempool_alloc_slab+0x16/0x20 [ 242.272431][T10714] ext4 filesystem being mounted at /root/syzkaller-testdir756229767/syzkaller.YUione/384/file0 supports timestamps until 2038 (0x7fffffff) [ 242.275774][T10713] ? kmem_cache_alloc+0x115/0x290 [ 242.275783][T10713] ? check_preemption_disabled+0x9e/0x330 [ 242.275793][T10713] ? mempool_alloc_slab+0x16/0x20 [ 242.275800][T10713] ? mempool_alloc+0x120/0x680 [ 242.275811][T10713] generic_make_request+0xc9/0xda0 [ 242.275825][T10713] ? mempool_resize+0x900/0x900 [ 242.390363][T10713] ? blk_attempt_plug_merge+0x310/0x310 [ 242.395896][T10713] ? memset+0x1f/0x40 [ 242.400557][T10713] ? fscrypt_set_bio_crypt_ctx+0x179/0x4e0 [ 242.406348][T10713] ? __bio_add_page+0x270/0x430 [ 242.411181][T10713] submit_bio+0x146/0x5d0 [ 242.415490][T10713] ? __rcu_read_lock+0x50/0x50 [ 242.420239][T10713] ? direct_make_request+0x440/0x440 13:22:42 executing program 3: sendto$inet(0xffffffffffffffff, &(0x7f0000000140)="41d73c976dbe7075c2fa4c09d87c3065044499e8bea04ce6e6dac40fb6073c863053665c27dc2e9da06104dee81a26a5c6491b0fe0dc9ed56c61979c46fa0d2584f84caebc47329e4d227347fde367cfc1e1e90f31259e2048ac5c5b4f9afef3a10d12f92b24ed71117003b08604770408fd63d8e884265307623c8faed59af49c", 0x81, 0x40000, 0x0, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef0100010000002bc4645f000000000000000001000000000000000b0000000001000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e373836333438323637", 0xa2, 0x400}, {&(0x7f0000010100)="0000000000000000000000002f527b43270a4164871303f1137e5908010040000c000000000000002bc4645f", 0x2c, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000500000000000000000000000000000000000000040100004d", 0x39, 0x540}, {&(0x7f0000000040)="00000000000000000000000000000000000000000000000000000000787371fe", 0x20, 0x7e0}, {&(0x7f0000010400)="0200000012000000220000002d000f00030004000000000031245cf20f0062e6000000000000000000000000000000000000000000000000d4189ee9", 0x3c, 0x1000}, {&(0x7f0000012f00)="ed410000001000002bc4645f2bc4645f2bc4645f00000000000004000800000000000800050000000af3010004000000000000000000000001000000030000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002f49000020004f3f54a9d2a254a9d2a2000000002bc4645f", 0x94, 0x22100}], 0x0, &(0x7f0000000300)=ANY=[]) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) statx(r0, &(0x7f0000000340)='./file1\x00', 0x0, 0x0, 0x0) ptrace$setregs(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000080)) [ 242.425510][T10713] ? submit_bh_wbc+0x631/0x790 [ 242.430262][T10713] __bread_gfp+0x181/0x310 [ 242.434671][T10713] ext4_fill_super+0x866/0xeb30 [ 242.439517][T10713] ? string+0x2c0/0x2c0 [ 242.443661][T10713] ? vsnprintf+0x1d60/0x1d60 [ 242.448231][T10713] ? vsnprintf+0x1cb4/0x1d60 [ 242.452796][T10713] ? delete_node+0x733/0x790 [ 242.457377][T10713] ? ext4_mount+0x40/0x40 [ 242.461685][T10713] ? idr_replace+0x1c4/0x230 [ 242.466256][T10713] ? snprintf+0xd6/0x120 [ 242.470480][T10713] ? vscnprintf+0x80/0x80 [ 242.474789][T10713] ? set_blocksize+0x1a5/0x3a0 [ 242.479542][T10713] mount_bdev+0x22d/0x340 [ 242.483859][T10713] ? ext4_mount+0x40/0x40 [ 242.488179][T10713] legacy_get_tree+0xde/0x170 [ 242.492854][T10713] ? ext4_lazyinit_thread+0xd40/0xd40 [ 242.498211][T10713] vfs_get_tree+0x83/0x260 [ 242.502621][T10713] do_mount+0x19d0/0x2670 [ 242.506939][T10713] ? copy_mount_string+0x30/0x30 [ 242.511861][T10713] ? copy_mount_options+0x59/0x300 [ 242.516957][T10713] ? kmem_cache_alloc_trace+0x139/0x2b0 [ 242.522483][T10713] ? copy_mount_options+0x273/0x300 [ 242.527667][T10713] ksys_mount+0xc2/0xf0 [ 242.531811][T10713] __x64_sys_mount+0xb1/0xc0 [ 242.536383][T10713] do_syscall_64+0xcb/0x1e0 [ 242.540889][T10713] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 242.546765][T10713] RIP: 0033:0x467b1a [ 242.550645][T10713] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 242.570231][T10713] RSP: 002b:00007f3059253fa8 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 13:22:42 executing program 3: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef0100010000002bc4645f000000000000000001000000000000000b0000000001000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e373836333438323637", 0xa2, 0x400}, {&(0x7f0000010100)="0000000000000000000000002f527b43270a4164871303f1137e5908010040000c000000000000002bc4645f", 0x2c, 0x4e0}, {&(0x7f0000001e00)="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", 0x137, 0x540}, {&(0x7f0000000040)="00000000000000000000000000000000000000000000000000000000787371fe", 0x20, 0x7e0}, {&(0x7f0000010400)="0200000012000000220000002d000f00030004000000000031245cf20f0062e6000000000000000000000000000000000000000000000000d4189ee9", 0x3c, 0x1000}, {&(0x7f0000012f00)="ed410000001000002bc4645f2bc4645f2bc4645f00000000000004000800000000000800050000000af3010004000000000000000000000001000000030000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002f49000020004f3f54a9d2a254a9d2a2000000002bc4645f", 0x94, 0x22100}], 0x0, &(0x7f0000000300)=ANY=[]) setxattr$incfs_size(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0), &(0x7f0000000140)=0x1, 0x8, 0x0) r1 = syz_mount_image$msdos(&(0x7f0000000180), &(0x7f00000001c0)='./file2\x00', 0x9e, 0x8, &(0x7f0000001800)=[{&(0x7f00000002c0)="f1d3fe39a116373484c6119248605ca9dd066c75c7ea5e747b6537bdaa5a0408319e2d37aa841daca6ac1eb437a7abe4872c1cf4e9e3d68b3af1c812c88994d90aa93d00e627c2144c942b934fb880d759646cc1828ce602cb1e6bbdc536aef1c0b8968ef6f7f4c0a8dd7cd57f5928f29156c9b0", 0x74}, {&(0x7f0000000380)="0d5144c28f490a28147a1670064cb20ef758f39173f89461701dcec6ce05fd6df68d49e23eabbfc87c4bf6edc49ffd9c99be529cfbe107b2f496c82f413f6bb9849d93eaf89891dc9f6f83716160e1ed792bafa6d4332b9c8519c770a27d260a1ef4969aa41bfce4323abb9347e8be2fdd2cdd4da18da1ce5b361acfafa19d3ff155f9c2a148619d679586d552aa0a963c30b6704150865cfa655b12618b623843fa2a58a0", 0xa5, 0xeea}, {&(0x7f0000000440)="cdba77a096265912fc991401af1abf25b1ef50825a5bb0997de8c7f31bca50989f639937d81b39b7e91fc22d9b8a222062741675306db529c9e658dcf3b60bac327e69", 0x43, 0x20}, {&(0x7f00000004c0)="a1c4539df5c0745e128ea7f4c080bb47e46f3a0888c57135f236e47d1aabbf02bd5e492ce58ff023ad0d6d3915a2475966348d76732ff1d952bbbadb25cdc0e4deab64ebe48273826152031d8ee347fc25571e6d085ae5a272d213bf37a3e98a92513dfeb659dac34bedce4150217d65752ce9b0c4574167dd978882cba51424cac46c86de788988399d3c8c9470684813fad48e0e506158aa49a5bf66a565f95ebdd6d05d9e9e6c451e16ea7bf84aeff08951902671d31dcfed150194ef5aa569962661a0716aa85506d860eb39bfc88b76c0a760071ce59151f54c8e475d882459ca0ef845", 0xe6, 0x7f}, {&(0x7f00000005c0)="fa61205034b2abd5721f0e74219e90d0b7516e1b436addd86dab17ae9ecbb8702892487171522d6720439abac3e9aa6492d31f60031a504e060efcdf217e01d382160af274bf344770fb0671d9fb982f2d5c3252f8333866a0cb127351691cc5b5a58789e1c063dc9c75f3a9cccd0f4a52187d5ac47a5a9ea831bbdc3bd3b1b95990de044cf50f4c6c36438130b16ef043347b2a57a651a024a6895750ff169b01e869c108209dcb26841aa5ee802a38988a53668d12ace44b5143da825ed528d65abf9ec349894d4541784ab37094c0bb926eaf5cae1b076dc2eae9f934cfaaeded5254563fcd4fb74ae3a8a7bc21538e782c13ff99b501df87d9b292b423ce33dacf63614a28fb9a08fc504b3156e6475cec828977acd52d129d0c62863436303734b2e9fee17d6e940429ab37dfba2042526d2361a2afc17cf33338acb19d7f5d23b70067b388272147b4c840402e6e0c392a54e9d6aa78deb0303abf547522e367df85769ddb4cb13ca6813d75026679f9257ea135c1ee2a1ce76a4d89562ec15385e38aec8f90de1539f7e693b377b7da0ae9dce633f979a37d96d2f9c75778c1f19d86982bf3df60647d1ec0fb7aad4d55a68b94202c78883733d1c8275df0a9c06ee7f84e571e64021225475fbb2898bd551d234d993210b99bd5edfa36e77b1e74b4f083e5054a6db49f49f375b25ad833cec8568855876f3d17256a67894cbb2250fa0eab282c991938191d2df1b19fc100e99440b91ee7cb447b46d6d1ae7ca9fa4acaa51a289ea052e1daa0c65d96535b688ad3756c6515e4f7a8459603face2a7e8740137140c1800a39c1d92731af45917a34f1107ea552763b908f5d6ddd00be48c98653d2cecb900cc690ffab49624f0a87635fdb713aad9d95aeea6b77ac09560488e5e0d114b11c294d22579f33d9f39e8dbd36b7f9ba16ca82a94eca1d24572effea7d792e01262389cab925d6ed39f60553b2ce9ae375a102362e16096730951f225505431c1a40db4a6d3bc986a08013fa9fd6c3dea1f0992de4b3656a9084dcb3406b09c5312eb111d3c5c65514296e5d9a6dcb3b4bdbdf7462f9d099eedba2fa75f0684fbef4baefdacece35465fef03aff8ee60ef77ec9074e94b4e2ed6b904d257600436d844810a2bc501b88c900322d36ffdcfc7f21bb4d520aa20d5b61d13223737862072aa0393832c5d0e1ac603f4e54e3d13913d897cd7412c8230425cb0fc39be977c11e7e489d5eb5b6793b6590302c043fb42e9a92be0be9e8c8d0a1351f4cde0e71c0ecc195bcbd2f8bc1d8c82b131794d0523be52bb0015e6418577f827292303adfe37a0c89c36df30253dcea3230a8b695030c2b239ea33acd5ef439c49ee9a27b5d04cca555bb1078ca28e994adc94612df82858177f954cf2866a775659caa416c199986309275a4a1264d11da9f0a2af595df148f38ad3dbb82dc7b6f829341aee8df0c66763d92d47b990adae9d7b5ec2c61d8c64c4f215d43f4e1c1810a9e5920d98e761e6739fa7445a3a1e5463f5be1b48e7bed6fdb8c11c62738122cb4e829e7732765c265b2a47a19f106d2dcd538d92d7853bb4df3b0d027b2ec430ff89666c81e5a1170ea12c430f8f45f9bbe12f547b06830633093bdda287a192954412b5b3330bf1a3ee0bfa3a64e3e1ea394ba19cde44387e9d96bb730ba07fb56950cdf0f12665e7d8ed33b8b880708afef6e9922389b2fef0ceda6ab40a37b2b380cc399d4a0e1e109de132f8d9059e61daa2cfde4091d9a054abc398feec0161d11bf7a43ccc03eb408041d803196f34e5f1c763f3a5d378148bf5a774a9c7864697e84e473ca2759ba268b82e584b2355be85e689b9df7063d3d188f80bb62748679e9f5f64c8d9b3e13fb545f55d4bfc9d1cc41426dea86d7588ec302728bc142f72551c716b84fd673e52f684c41f1c8c52d470d116c37a0596590047fc9b88d4f2c788ebaccd9cfd7a68bf39194ad794423bea736f6ea6621c5410502480e3e8e00b09a5d9a3060aa594a35568b6ee338a69511e13da26911aac0ee7746e65a8b0b6a4482d63ecd4cf044829fb8daa7d4f20338215e311abcb34c9675514d4e144f9b6400c02f28e1d65f6f3e0de933e6bc52a542170046ac21914e8d2b7bca575c79b5e1e5b518524119e22ab541dd131dee6c244fc1369a34485015010fc8227a79319e3a21c37968010c4da8a3880811bfa1c2be512e59103dfe42897eeab1a37ee155b6d0aaeb065ea2603df805fe633eb52ea33510a3a095a5cb6f6e360a6441e5f39437a8a1e788fe08186ad5c23fd29f829984bb360678710725210e3f4b6ae9e19d05327b334d55e09c2b91539b6b99ec0ec1cb8168a12a5cc27e3bef628ae891ab3c8e18171b7060f40c9caa7b609c267f605798cc760f2d8062d20a9e68fac495b7bc5a287dadc3a02003d2eec6b84843b666703943547b361f92c62f03841244127213b112e844984684fe7c8ffe94947e09416bff78c38f393477176b7ce432c6a3fcfa6fbff211d595983b90019fcb517c591c590538bfb210dc35743cd9b322fcb2124b50f0047f98fa5b1599209b17c86eca0b8c3775a56721dcb2a182cc8c744dd6b097d450239bd8a5bc8c7b6b019ce46af51eb88d4fb78042200ef3d2bb392e23d23c9909be8abc49aeaf2d74dcf6f3192225766c81d96aa6a39cb6ec53bb46b8ec0d234c81195c97d6f8d0e7ca424b0ac3f8c86522957b4991a827873cd5b6e5b7f6ff0c8c4ff820b4f8d32872951cdb199e0c2236f3b20c4277446645e44cc834c2411f59380f51ab8a670c461111fa2cfd677c3d7f304b7d717522039e0d0c2ce4f928af63c674c63a7b0caa443764b6153042d6d485af16ed98d4f528629b9155f4326271db0c395cba86abe85ebde8d706d86c6091028022d7de88ae7c9d9ef8ce03678702ef7d959b1adddfb00eb8c0a24d5283e885bf16595fb409aece29499a10b98c23748204c883133895ef153db3502a7af8525b9e72308363de0e5d1fd3fa6a62c56eae544eb519557d7683f74d98d1e0f5258b3cd94f48565f04157fde19f499fb1a48665b180abcdb74b72e86922732bccb793cbfb192a548a9ad3436b06b2108ba0eb05b5c97e0765c9b73566d3296b44a16a88d1ac1248ca5c911a66707f92384abc510c9217beac5393bf7721d88737a4b8d177c4ec1445f500d99931d810a9bd5597036ed94f6be2679a767549ec6416d67e5b78ab26b42e517193cef815ff64b4d5cf93c9df4d8aabed667047d1044070df262430600dc6bac8736ec3f4f57bad8669e3508d7bfe21a2edda62db616739fe9bd9cf190c2e70d68f8c24100688453bad75905659e46fcc8c34520a39ee166479f270033059f074f98f5b2b69853eb59c3bcdc70270385df860b369839ab880771b1cb77c8d783fbbd31cc3c1abeabd7e117a7106a805cf583711666adcbcb32e79c58838c1c8b8eba3e0fd86957f497b14e87103dc855b18667eb6328c8f2931695c6045889248d14e7eed052e9342d5a01b43dbedb4f8e383062afd72152b174846834d6c25c78789b7a105a731c64d1be89cc18581872bc3898daac440cd0bd0ca48abeb5157633a75cbf7b3a4080685ca79d74d0e1394020918d926d8fa392dd795629aafbde2f9f13debbce7e0a487365003dc9d328b4a61c7abcd92ffa7a2c420504a4db32de416ca28c50fe9c83f1c45646e817503fdd57f027562d38b00fbba106e44b2f3b45203cecfb9bece37785ce1bdca5efabf986b546bb3bb9e262296a1f1fc199371d0e2615df36a2e55161ca209979c14e311a51fb31180b8beab66549a41a6daf1fa48af8b2844e46203237a8c9dfeba93526522407da351b251c856d5d9c401be93d5a018d17b7bc6c134c884fc6cd6ef5ed145b9fb28365b060c8532eb95972d22b8ce83d8c7acc315fecec0558feafbb4845998732de0786f733794c9ed8dddd3152d96caf59789d82f116321b72b8ca5b96d623c75b518cd95d669687483149542629678e58c51ec84e9f65926debb8129e1a38d5ea4909c7b4504b53664645b0b850164956e80f13002b7e4c32876d17be1ff436a627466d173b5df1443fb12d4e3b64a316654df4944bc5caa233b8556433eaee0e2ff9885239c853dcdbdb48ee602f11c9fefb49e95c294eaf3f54d31499a5b8e43fd6e234b13df272839f4182e65eebff54915054bc367ceda2dfb3337c5efa1375565337d6b00968d16bfbbeb61f61ade1e7954388f32d225b528176f59994896977d3dc141c3b73ff3b31f7c30767a39b0cd0cb48a0243cda8938d948b360740714b4ebf97784032caf83b19d9e2ef41c8e9734fbdf0e1530c9306a1bdc0fb5ff3ea1db8a4abf205aa79abe800a41216d15ca8828a624cf8893e92b578c1902dd3d539f00fbde1af955c86d0136adb7a8d2c5d01c78be1f9edf206d0c5cf706638c89d1b540f47fe9d42c82f850849f02ded3d1e82c974174d14ebfbbcb1845f3eea42e3f3793fa4157870122b1e5268184f9c62c0ce11882e855f5b790198be640f04e8e276c1ce09c076f6588324ce6043d292cc88e324fdb8f78d90387abff00425748f765a822d30c902f184bed9afb147f147cafb56268114269e1d944001b51a4635a8c543f597897562c4c79dadb4204759ddd89b5198d2d38eb02f38e51721a7f530dc34c7f14218bcd01a694394c6da5c9533d484301b7b977c33a1939040482982f1a0e7e1341e72383bc22027b3a1b51081e2637bbf64e328da6d1cdde2db6d1ff9791b410d168d3f6d5343d2a3f9459ea8dc6419b61f43404a54ea0164f2cab419bfcd02209c9abb66fa3e68da003c0b3bd3a457af2b6bfbbd62bdc2c4a787f64d88ad90778173a13ed64cc2d3383d1a58fa253e5a13a08ac3e3049494a018f63276e4390a60c00f7018b09412bccda69e379f85a1753ac3e6983431b68871e1ccdf37d29cadd8c29fcf9e3a49e1d139999607837408b1d167bd7234d4e3778597b90ab4681617babc84f5a04bddda1f9cbb9127e023d1f107c40bd0ff33268106119069c638c24da5784dea62e50ec40b0a30fb2908085e0870cf761132dbf3234993401b7d72b15b521ae8c9cf7afba7a7c9fe518eb8bbcfd3405ee9f4656d50749683f8efda5d628b3b29926cddb1eca20da8d6984c9480de9f91913a7186d172d5a0338f013282133e5d5021e2ac082652d3a4dd5c961a5ae45c217eab2f11e64d4f3fb0cf7d118fbe66444f0ad4eed6c64045f04303cf11ab85b2e2f51fcaed57ac0f6d7e7c04511062965c2bf9f02069ea09d02f3075a8e14daf67cc14a53c7a68b4277d83b3138672503951e6f819f422cd585e5d21ddb9e01d3d5b10ddae0e7796a026043a800c0e9795b2880dc53e6a0fe117af792193f9892e539beea67c071e39a7f5c06708de62ccbc09a504ca87f757713c0c967d735ff15b6946383bfafe1a8dc638b721166759fcd74949cba766b99a07f25c08352efe78403f9d3f5273b4527f587c8760a542d23e09a10d695687a0099647a25cd0889dbae5b49450c1936967fec373656beed0a55a55a3f01bca0c35d416a37ea67aa3d44cef0787f2171698583b8297fed68e2d1274620cb322d9a9eb2e6ca041b26e044d0918d456d32fb05612e34e7ef8819dfb2e070ecc52adc9d0ee527454611044b8bd238987a48b962ab411bc4deb7208e8499429931f223ae671d54b1ad72f9e6ea6a96ba440fa9d336d9f8d185b57b30b03ed698b372aeae73e15a1afaf", 0x1000, 0x3ff0000}, {&(0x7f00000015c0)="29b5a6b656d4f2d38e2b1d7c59fc8e8ef599be66d4ad88e9ddd66635cf19100babd0c655302bf5004ebcaf02afecf483abecf6fadede939054fe34bd7d74578be7fd5312091e15fcd0c41f7645a55944644d8794ccc3d84f9a0bd4a118d44582e3320542df4ca9c416afbd59c9f171d7cd3a859747e1f4eeed96be6d8e7c6788eefe6c4e21754b7b15ee5915aad2e66b989a6b8c6344dea2a8f85afb8e803b342657fe0d1f635ba65ab2ef6da368af8ff5a47589f07e5210d1ce3b9ecd8530dc0f4ba396370d186a", 0xc8, 0x101}, {&(0x7f00000016c0)="11323af91b83ee3598d3d9639d33c9", 0xf, 0x20000000000000}, {&(0x7f0000001700)="5be744caaedef352700e7b21a162affcd60ab32e3bf7a1acfddaa97c0568dc0919fa006630aa77640d836b7a2e4ef6df45faddb0a11468e9f8b8baa6a1ddffa4bf942d3aedc58cee03b04108a40ec5524f29b426758fb9838bac67ec59cfbe0e16d52ded781ee1868265a50cbb78d8e3591e3a66c14c42b05351d669dd1a21022b1255e1dc005692f79e4992e2ff10add7e68f2a29f9e4a2de941e2b3dba95fc7808956ec490232d6bc761b4e8ba68620d682a2b63f2f940ae5ea24d80b0114ee29b981683d7832787abd949103bab7382d60b6673025b10635995d8a8b3c1ea06aa0359467f8ef21d390b5a0772", 0xee, 0xf9d}], 0x1000000, &(0x7f00000018c0)={[{@fat=@nocase}, {@nodots}, {@nodots}, {@dots}, {@dots}, {@nodots}, {@dots}, {@nodots}, {@nodots}], [{@defcontext={'defcontext', 0x3d, 'user_u'}}]}) openat(r1, &(0x7f0000001940)='./file0/file0\x00', 0xc000, 0x3) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = syz_mount_image$f2fs(&(0x7f0000001980), &(0x7f00000019c0)='./file0/file0\x00', 0x1, 0x5, &(0x7f0000001c80)=[{&(0x7f0000001a00)="97dd5657789ae695543c56acc85b5b0ba88501dabf46b38157d24423608dadc6acc2229349e09eaf135dc4db12d516f0df81bd28ae803cee537aed5f2055c1e4363689dc5d85acdadfa7b2c26f8fb07a8e0c7236f1e78b84b267b7e11afab5ddc507d3549d5fc0f8043d7448e234ad88f357454d84c63e722f7882128b4845ecdc1392858770f5cba92eb064e72b7cdd32734da7c9d5f1ab3ddb77ee41afb93552383065d054db7d76df2a3b27918108b663c945bd481fe40f49d4b4af936831022c1b268a", 0xc5, 0x81}, {&(0x7f0000001b00)="2b74a0bd6b0479885c9651ee9c9bfe67fa91faa76d46cd5e323aa48b2984df3f9cdfc4b3c57d05afbc8d4e5c3da84f9306372f43dc9496d0bb63", 0x3a, 0xffffffffffffff7f}, {&(0x7f0000001b40)="48d186c791c6db4e19074eddc344036140a77c9c465840ebff7f", 0x1a, 0x920}, {&(0x7f0000001b80)="a6f0ff3c11ea51a28f997c8be9aa827d3e4a0428a8dbd83f3748669bdb9598d55d9034fee11883bcd160cddfe2dc140c098db0c5bc98be1a5148d4645066369d706dd0eacc9e71dc1950668775718b3e5b3beb380df0d61b", 0x58, 0x36c}, {&(0x7f0000001c00)="d81158dcc7da24bc8c90159b2879e6408dd8738d711933e1bcfd1279750bff4e004cea91af29ed916c10f9a2ed710909eab94c2efb2f215b4f3c38752dfd014fcdd7c37b2cf3e13b7d69e499fdc9c9a88c04fa25fd35ac14", 0x58, 0x2}], 0x0, &(0x7f0000001d00)={[{@whint_mode_user}, {@noinline_data}, {@whint_mode_fs}, {@noquota}, {@noquota}, {@alloc_mode_reuse}, {@noquota}, {@usrquota}], [{@subj_role={'subj_role', 0x3d, 'nocase'}}, {@fowner_lt={'fowner<', 0xee00}}, {@rootcontext={'rootcontext', 0x3d, 'sysadm_u'}}]}) mkdirat(r2, &(0x7f0000001dc0)='./file2\x00', 0x1) statx(r0, &(0x7f0000000340)='./file1\x00', 0x1000, 0x0, 0x0) ptrace$setregs(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000080)) r3 = socket$bt_rfcomm(0x1f, 0x1, 0x3) mmap(&(0x7f0000fe9000/0x14000)=nil, 0x14000, 0x2000000, 0x13, r3, 0xf4d50000) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='pids.events\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x12, r4, 0x0) ftruncate(r4, 0x1000673) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='pids.events\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x12, r5, 0x0) ftruncate(r5, 0x1000673) dup2(r4, r5) 13:22:42 executing program 3: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef0100010000002bc4645f000000000000000001000000000000000b0000000001000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e373836333438323637", 0xa2, 0x400}, {&(0x7f0000010100)="0000000000000000000000002f527b43270a4164871303f1137e5908010040000c000000000000002bc4645f", 0x2c, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000500000000000000000000000000000000000000040100004d", 0x39, 0x540}, {&(0x7f0000000040)="00000000000000000000000000000000000000000000000000000000787371fe", 0x20, 0x7e0}, {&(0x7f0000010400)="0200000012000000220000002d000f00030004000000000031245cf20f0062e6000000000000000000000000000000000000000000000000d4189ee9", 0x3c, 0x1000}, {&(0x7f0000012f00)="ed410000001000002bc4645f2bc4645f2bc4645f00000000000004000800000000000800050000000af3010004000000000000000000000001000000030000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002f49000020004f3f54a9d2a254a9d2a2000000002bc4645f", 0x94, 0x22100}], 0x0, &(0x7f0000000300)=ANY=[]) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = fork() r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='pids.events\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x12, r2, 0x0) ftruncate(r2, 0x1000673) perf_event_open(&(0x7f0000000080)={0x5, 0x80, 0x4, 0xab, 0x4, 0x20, 0x0, 0xff, 0xa10, 0x9, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x651, 0x4, @perf_config_ext={0x7, 0x5144}, 0x18, 0x7fff, 0x800, 0x9, 0x4, 0x400, 0x9, 0x0, 0x10001, 0x0, 0x1}, r1, 0x2, r2, 0x3) statx(r0, &(0x7f0000000340)='./file1\x00', 0x0, 0x0, 0x0) ptrace$setregs(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000080)) [ 242.578631][T10713] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 0000000000467b1a [ 242.586587][T10713] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007f3059254000 [ 242.594541][T10713] RBP: 00007f3059254040 R08: 00007f3059254040 R09: 0000000020000000 [ 242.602497][T10713] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000020000000 [ 242.610449][T10713] R13: 0000000020000100 R14: 00007f3059254000 R15: 0000000020012c00 13:22:42 executing program 3: r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) statx(0xffffffffffffffff, &(0x7f0000000340)='./file1\x00', 0x0, 0x0, 0x0) ptrace$setregs(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000080)) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x9, 0x63, 0x9, 0x42, 0x0, 0x80000001, 0x21800, 0x4bf096847141d0ad, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, @perf_config_ext={0x81, 0x9}, 0x0, 0x1, 0x800, 0x7, 0x7, 0x2, 0x3a, 0x0, 0x8, 0x0, 0xb8b}, 0x0, 0x8, r0, 0x9) [ 242.639418][T10713] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue 13:22:42 executing program 5 (fault-call:0 fault-nth:62): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000660000000f000000000000000100000001000000004000000040000020000000daf4655fdaf4655f0100ffff53ef010001000000d9f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010100)}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000100000000000000000000000000000000000000000000003000000000000000", 0x40, 0x540}, {&(0x7f0000010300)="02000000030000000400000066000f000300040000000000000000000f007f5c", 0x20, 0x800}, {&(0x7f0000011500)="ed41000000080000d9f4655fdaf4655fdaf4655f000000000000040004", 0x1d, 0x2200}, {0x0}, {&(0x7f0000011900)="ed8100001a040000daf4655fdaf4655fdaf4655f000000000000010004000000000000000100000014000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000039c34d38000000000000000000000000000000000000000000000000200000007412ab417412ab417412ab41daf4655f7412ab410000000000000000", 0xa0, 0x3800}], 0x0, &(0x7f0000012c00)) 13:22:42 executing program 2: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffff, 0xffffffffffffffff, 0x0) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) read(r0, 0x0, 0x0) syz_mount_image$f2fs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x10, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}, {&(0x7f0000010500)='\x00\x00\x00\x00', 0x4, 0xc80}, {&(0x7f0000010700)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e00000010000003000000010000000200000018b2e346f95e497f827e0a", 0x77, 0x1400}, {0x0}, {&(0x7f0000010e00)="d73cd47a0000000000100000000000000b000000000000000d0000001000000012000000170000001600000015000000ffffffffffffffffffffffffffffffffffffffff03000600000000000000000000000000140000000100000000000000ffffffffffffffffffffffffffffffffffffffff05000000000000000000000000000000c5010000060000000100000007000000070000000a0000004000000040000000fc0f00"/181, 0xb5, 0x200000}, {&(0x7f0000010f00)="0000000000000000000000000000000000000000000000000000000009f7a5bb", 0x20, 0x200fe0}, {&(0x7f0000011000)="00000000000000000000000000000000000000000000000000000006", 0x1c, 0x2011e0}, {0x0, 0x0, 0x2012e0}, {&(0x7f0000011400)="000000000000000000000000000000000000000000160000000510ec", 0x1c, 0x201320}, {&(0x7f0000011500)="00000017000000020c60", 0xa, 0x201380}, {&(0x7f0000011600)}, {&(0x7f0000011800)}, {&(0x7f0000011b00)="0000000000000000000000000000000000000000000000000000000100000000d73cd47a0000000000100000000000000b000000000000000d0000001000000012000000170000001600000015000000ffffffffffffffffffffffffffffffffffffffff03000600000000000000000000000000140000000100000000000000ffffffffffffffffffffffffffffffffffffffff05000000000000000000000000000000c5010000060000000100000007000000070000000a0000004000000040000000fc0f", 0xc6, 0x204fe0}, {0x0, 0x0, 0x205fe0}, {0x0}, {&(0x7f0000013000)="000000000000000000000100000001", 0xf, 0xa00000}], 0x0, &(0x7f0000014b00)) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='pids.events\x00', 0x275a, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x4, 0x2d, 0x9, 0x1, 0x0, 0x7fff, 0x88, 0x4, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x7, 0x0, @perf_bp={&(0x7f00000000c0), 0x1}, 0x9, 0x1, 0x4, 0x9, 0x0, 0xffff, 0x400, 0x0, 0x2, 0x0, 0x1000}, 0x0, 0xe, r1, 0xa) 13:22:42 executing program 3: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef0100010000002bc4645f000000000000000001000000000000000b0000000001000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e373836333438323637", 0xa2, 0x400}, {&(0x7f0000010100)="0000000000000000000000002f527b43270a4164871303f1137e5908010040000c000000000000002bc4645f", 0x2c, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000500000000000000000000000000000000000000040100004d", 0x39, 0x540}, {&(0x7f0000000040)="00000000000000000000000000000000000000000000000000000000787371fe", 0x20, 0x7e0}, {&(0x7f0000010400)="0200000012000000220000002d000f00030004000000000031245cf20f0062e6000000000000000000000000000000000000000000000000d4189ee9", 0x3c, 0x1000}, {&(0x7f0000000140)="ed410000001000002bc4645f2bc4645f2bc4645f00000000000004000800000000000800050000000af3010004000000000000000000000001000000030000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002f49000020004f3f54a9d2a254a9d2a2000000002bc4645f", 0x94, 0x22100}], 0x0, &(0x7f0000000300)=ANY=[]) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) statx(r0, &(0x7f0000000340)='./file1\x00', 0x0, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='pids.events\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x12, r1, 0x0) ftruncate(r1, 0x1000673) openat(r1, &(0x7f00000000c0)='.\x00', 0x4002, 0x82) ptrace$setregs(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000080)) openat(r0, &(0x7f0000000080)='./file0\x00', 0x10f401, 0x0) 13:22:42 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_mount_image$f2fs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0xf, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}, {&(0x7f0000010500)='\x00\x00\x00\x00', 0x4, 0xc80}, {&(0x7f0000010700)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e00000010000003000000010000000200000018b2e346f95e497f827e0a", 0x77, 0x1400}, {0x0}, {&(0x7f0000010e00)="d73cd47a0000000000100000000000000b000000000000000d0000001000000012000000170000001600000015000000ffffffffffffffffffffffffffffffffffffffff03000600000000000000000000000000140000000100000000000000ffffffffffffffffffffffffffffffffffffffff05000000000000000000000000000000c5010000060000000100000007000000070000000a0000004000000040000000fc0f00"/181, 0xb5, 0x200000}, {&(0x7f0000010f00)="0000000000000000000000000000000000000000000000000000000009f7a5bb", 0x20, 0x200fe0}, {&(0x7f0000011000)="00000000000000000000000000000000000000000000000000000006", 0x1c, 0x2011e0}, {0x0, 0x0, 0x2012e0}, {&(0x7f0000011400)="000000000000000000000000000000000000000000160000000510ec", 0x1c, 0x201320}, {&(0x7f0000011500)="00000017000000020c60", 0xa, 0x201380}, {&(0x7f0000011600)}, {&(0x7f0000011800)}, {&(0x7f0000011b00)="0000000000000000000000000000000000000000000000000000000100000000d73cd47a0000000000100000000000000b000000000000000d0000001000000012000000170000001600000015000000ffffffffffffffffffffffffffffffffffffffff03000600000000000000000000000000140000000100000000000000ffffffffffffffffffffffffffffffffffffffff05", 0x95, 0x204fe0}, {&(0x7f0000011c00)="0000000000000000000000000000000000000000000000000000000009f7a5bb", 0x20, 0x205fe0}, {0x0, 0x0, 0x401320}], 0x0, &(0x7f0000014b00)) 13:22:42 executing program 1: clone(0x13102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) poll(0x0, 0x0, 0x8000000000000200) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f00000025c0)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00'}) ioctl$TUNSETLINK(r0, 0x800454e0, 0x30a) r2 = openat$selinux_attr(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) mmap(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x6, 0x1010, r2, 0xdc5f7000) close(r0) r3 = socket$inet_tcp(0x2, 0x1, 0x0) preadv(r3, 0x0, 0x0, 0x7fffffff, 0x1) [ 242.846150][T10746] EXT4-fs (loop4): mounting with "discard" option, but the device does not support discard [ 242.870276][T10760] FAULT_INJECTION: forcing a failure. [ 242.870276][T10760] name failslab, interval 1, probability 0, space 0, times 0 [ 242.872799][T10746] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue [ 242.883798][T10760] CPU: 1 PID: 10760 Comm: syz-executor.5 Not tainted 5.4.125-syzkaller-00016-gae94e015273b #0 [ 242.902105][T10760] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 242.903591][T10746] ext4 filesystem being mounted at /root/syzkaller-testdir756229767/syzkaller.YUione/385/file0 supports timestamps until 2038 (0x7fffffff) [ 242.912141][T10760] Call Trace: [ 242.912158][T10760] dump_stack+0x1d8/0x24e [ 242.912167][T10760] ? devkmsg_release+0x11c/0x11c [ 242.912177][T10760] ? show_regs_print_info+0x12/0x12 [ 242.912186][T10760] ? __wait_on_bit+0x171/0x190 [ 242.912196][T10760] should_fail+0x6f6/0x860 [ 242.912210][T10760] ? setup_fault_attr+0x3d0/0x3d0 [ 242.939635][T10762] F2FS-fs (loop0): invalid crc_offset: 0 [ 242.943974][T10760] ? bit_wait+0xa0/0xa0 [ 242.943990][T10760] ? __wait_on_bit+0x190/0x190 [ 242.952260][T10762] F2FS-fs (loop0): invalid crc_offset: 0 [ 242.953117][T10760] ? bit_waitqueue+0x30/0x30 [ 242.953134][T10760] ? kvmalloc_node+0x7e/0xf0 [ 242.959645][T10762] F2FS-fs (loop0): Failed to get valid F2FS checkpoint [ 242.963816][T10760] should_failslab+0x5/0x20 [ 242.963825][T10760] __kmalloc+0x5f/0x2f0 [ 242.963840][T10760] kvmalloc_node+0x7e/0xf0 [ 242.991014][T10767] F2FS-fs (loop2): invalid crc value [ 242.994321][T10760] ext4_fill_super+0x58cf/0xeb30 [ 242.994344][T10760] ? vsnprintf+0x1cb4/0x1d60 [ 243.022447][T10760] ? ext4_mount+0x40/0x40 [ 243.026754][T10760] ? idr_replace+0x1c4/0x230 [ 243.031321][T10760] ? snprintf+0xd6/0x120 [ 243.035544][T10760] ? vscnprintf+0x80/0x80 [ 243.039850][T10760] ? set_blocksize+0x1a5/0x3a0 [ 243.044588][T10760] mount_bdev+0x22d/0x340 [ 243.048892][T10760] ? ext4_mount+0x40/0x40 [ 243.053195][T10760] legacy_get_tree+0xde/0x170 [ 243.057848][T10760] ? ext4_lazyinit_thread+0xd40/0xd40 [ 243.063193][T10760] vfs_get_tree+0x83/0x260 [ 243.067581][T10760] do_mount+0x19d0/0x2670 [ 243.071889][T10760] ? copy_mount_string+0x30/0x30 [ 243.076796][T10760] ? retint_kernel+0x1b/0x1b [ 243.081473][T10760] ? copy_mount_options+0x1c6/0x300 [ 243.086648][T10760] ? copy_mount_options+0x273/0x300 [ 243.091927][T10760] ksys_mount+0xc2/0xf0 [ 243.096057][T10760] __x64_sys_mount+0xb1/0xc0 [ 243.100716][T10760] do_syscall_64+0xcb/0x1e0 [ 243.105287][T10760] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 243.111158][T10760] RIP: 0033:0x467b1a [ 243.115026][T10760] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 243.134622][T10760] RSP: 002b:00007f3059253fa8 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 243.143017][T10760] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 0000000000467b1a [ 243.150963][T10760] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007f3059254000 [ 243.158906][T10760] RBP: 00007f3059254040 R08: 00007f3059254040 R09: 0000000020000000 [ 243.166858][T10760] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000020000000 [ 243.174801][T10760] R13: 0000000020000100 R14: 00007f3059254000 R15: 0000000020012c00 [ 243.186091][T10760] EXT4-fs (loop5): not enough memory 13:22:43 executing program 4: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000002, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x31) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) waitid$P_PIDFD(0x3, r0, &(0x7f0000000500), 0x9, &(0x7f0000000580)) ptrace$cont(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='pids.events\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x12, r1, 0x0) ftruncate(r1, 0x1000673) ioctl$KDSKBENT(r1, 0x4b47, &(0x7f00000002c0)={0x2, 0x81, 0x5}) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x88400, 0x1a8) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0xd0265000) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) exit_group(0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x31, 0xffffffffffffffff, 0x0) time(&(0x7f0000000180)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14001500, 0x3ce, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c190000ce1900000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800)) 13:22:43 executing program 5 (fault-call:0 fault-nth:63): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000660000000f000000000000000100000001000000004000000040000020000000daf4655fdaf4655f0100ffff53ef010001000000d9f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010100)}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000100000000000000000000000000000000000000000000003000000000000000", 0x40, 0x540}, {&(0x7f0000010300)="02000000030000000400000066000f000300040000000000000000000f007f5c", 0x20, 0x800}, {&(0x7f0000011500)="ed41000000080000d9f4655fdaf4655fdaf4655f000000000000040004", 0x1d, 0x2200}, {0x0}, {&(0x7f0000011900)="ed8100001a040000daf4655fdaf4655fdaf4655f000000000000010004000000000000000100000014000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000039c34d38000000000000000000000000000000000000000000000000200000007412ab417412ab417412ab41daf4655f7412ab410000000000000000", 0xa0, 0x3800}], 0x0, &(0x7f0000012c00)) 13:22:43 executing program 3: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef0100010000002bc4645f000000000000000001000000000000000b0000000001000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e373836333438323637", 0xa2, 0x400}, {&(0x7f0000010100)="0000000000000000000000002f527b43270a4164871303f1137e5908010040000c000000000000002bc4645f", 0x2c, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000500000000000000000000000000000000000000040100004d", 0x39, 0x540}, {&(0x7f0000000040)="00000000000000000000000000000000000000000000000000000000787371fe", 0x20, 0x7e0}, {&(0x7f0000010400)="0200000012000000220000002d000f00030004000000000031245cf20f0062e6000000000000000000000000000000000000000000000000d4189ee9", 0x3c, 0x1000}, {&(0x7f0000012f00)="ed410000001000002bc4645f2bc4645f2bc4645f00000000000004000800000000000800050000000af3010004000000000000000000000001000000030000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002f49000020004f3f54a9d2a254a9d2a2000000002bc4645f", 0x94, 0x22100}], 0x0, &(0x7f0000000300)=ANY=[]) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_pts(0xffffffffffffffff, 0x121000) preadv(r1, &(0x7f0000003440)=[{&(0x7f0000003300)=""/153, 0x99}, {&(0x7f00000033c0)=""/72, 0x48}], 0x2, 0x0, 0xbda8) r2 = openat$null(0xffffffffffffff9c, &(0x7f0000003840), 0x40000, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0x0, r4, 0xee00) r5 = socket(0x10, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX_80211(r5, 0x8933, &(0x7f0000003a80)={'wlan1\x00'}) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) setregid(0x0, r6) mount$fuse(0x0, &(0x7f00000037c0)='./file1\x00', &(0x7f0000003800), 0x30840, &(0x7f0000003ec0)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00', @ANYRESHEX=r2, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=r4, @ANYBLOB=',grfup_id=', @ANYRESDEC=r6, @ANYBLOB=',max_read=0x0000000000000080,max_read=0x0000000000000e93,default_permissions,allow_other,default_permissions,max_read=0x0000000000000000,allow_other,blksize=0x0000000000000000,uid=', @ANYRESDEC=0xee01, @ANYBLOB=',func=FIRMWARE_CHECK,fsname=,smackfsroot=ext4\x00,smackfsfloor=,fsuuid=77c6ca5e-76b#-66d2-efb4-f5b32a51,obj_role=ext4\x00,fowner=', @ANYRESDEC, @ANYBLOB=',dont_hash,\x00']) statx(r0, &(0x7f0000000340)='./file1\x00', 0x0, 0x0, 0x0) clock_gettime(0x0, &(0x7f0000003280)={0x0, 0x0}) recvmmsg(0xffffffffffffffff, &(0x7f00000031c0)=[{{&(0x7f0000000080)=@ethernet={0x0, @dev}, 0x80, &(0x7f0000000180)=[{&(0x7f0000000140)=""/50, 0x32}], 0x1, &(0x7f0000000380)=""/171, 0xab}, 0x9}, {{&(0x7f00000002c0)=@generic, 0x80, &(0x7f0000003cc0)=[{&(0x7f00000001c0)=""/31, 0x1f}, {&(0x7f0000000440)=""/92, 0x5c}, {&(0x7f00000004c0)=""/90, 0x5a}, {&(0x7f0000000540)=""/223, 0xdf}, {&(0x7f0000000640)=""/37, 0x25}, {&(0x7f0000000680)=""/250, 0xfa}, {&(0x7f0000000780)=""/4096, 0x1000}, {&(0x7f0000001780)=""/63, 0x3f}, {&(0x7f0000003dc0)=""/221, 0xdd}, {&(0x7f00000018c0)=""/248, 0xf8}, {&(0x7f0000003ac0)=""/199, 0xc7}, {&(0x7f0000002ec0)=""/180, 0xb4}, {&(0x7f0000003c80)=""/39, 0x27}], 0xd, &(0x7f0000001a80)=""/184, 0xb8}, 0x4}, {{&(0x7f0000001b40)=@isdn, 0x80, &(0x7f0000003100)=[{&(0x7f0000001800)=""/108, 0x6c}, {&(0x7f0000003480)=""/248, 0xf8}, {&(0x7f0000001d40)=""/4096, 0x1000}, {&(0x7f00000017c0)=""/51, 0x33}, {&(0x7f0000002d80)=""/242, 0xf2}, {&(0x7f0000002e80)=""/16, 0x10}, {&(0x7f00000019c0)=""/130, 0x82}, {&(0x7f0000002f80)=""/133, 0x85}, {&(0x7f0000003040)=""/158, 0x9e}], 0x9}, 0x7}], 0x3, 0x101, &(0x7f00000032c0)={r7, r8+60000000}) ptrace$setregs(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000080)) clone3(&(0x7f0000003700)={0x80a2000, &(0x7f0000001c40), &(0x7f0000001c80)=0x0, &(0x7f0000001cc0), {0x41}, &(0x7f0000003580)=""/167, 0xa7, &(0x7f0000003640)=""/139, &(0x7f0000001d00)=[0x0, 0xffffffffffffffff, 0xffffffffffffffff], 0x3, {r1}}, 0x58) fallocate(0xffffffffffffffff, 0x51, 0x0, 0x7f) sched_setparam(r9, &(0x7f0000003780)) [ 243.201069][T10767] F2FS-fs (loop2): invalid crc_offset: 0 [ 243.207251][T10767] F2FS-fs (loop2): Failed to get valid F2FS checkpoint 13:22:43 executing program 3: r0 = gettid() ptrace$setopts(0x4206, r0, 0x0, 0x5) tkill(r0, 0x34) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() ptrace$setopts(0x4206, r1, 0x0, 0x5) tkill(r1, 0x34) ptrace$cont(0x18, r1, 0x0, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) r2 = syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef0100010000002bc4645f000000000000000001000000000000000b0000000001000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e373836333438323637", 0xa2, 0x3fc}, {&(0x7f0000010100)="0000ae45ccfffa7200de2e527b43270a5864871303f1137e5908010040000c000000000000172bc4645f", 0x2a, 0x4e0}, {&(0x7f0000010200)="000000000000000000000000000000000000000000000000000000002000200005000000000000000000000000b2d721126f80000000", 0x36, 0x540}, {&(0x7f0000000040)="00000000000000000000000000000000000000000000000000000000787371fe", 0x20, 0x7e0}, {&(0x7f0000010400)="0200000012000000220000002d000f00030004000000000031245cf20f0062e6000000000000000000000000000000000000000000000000d4189ee9", 0x3c, 0x1000}, {&(0x7f0000012f00)="ed410000001000002bc4645f2bc4645f2bc4645f00000000000004000800000000000800050000000af3010004000000000000000000000001000000030000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002f49000020004f3f54a9d2a254a9d2a2000000002bc4645f", 0x94, 0x22100}], 0x0, &(0x7f0000000080)=ANY=[@ANYRES32=r0, @ANYRES32=r0, @ANYRES64=r1]) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) statx(r2, &(0x7f0000000340)='./file1\x00', 0x0, 0x0, 0x0) ptrace$setregs(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000080)) 13:22:43 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_mount_image$f2fs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0xf, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}, {&(0x7f0000010500)='\x00\x00\x00\x00', 0x4, 0xc80}, {&(0x7f0000010700)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e00000010000003000000010000000200000018b2e346f95e497f827e0a", 0x77, 0x1400}, {0x0}, {&(0x7f0000010e00)="d73cd47a0000000000100000000000000b000000000000000d0000001000000012000000170000001600000015000000ffffffffffffffffffffffffffffffffffffffff03000600000000000000000000000000140000000100000000000000ffffffffffffffffffffffffffffffffffffffff05000000000000000000000000000000c5010000060000000100000007000000070000000a0000004000000040000000fc0f00"/181, 0xb5, 0x200000}, {&(0x7f0000010f00)="0000000000000000000000000000000000000000000000000000000009f7a5bb", 0x20, 0x200fe0}, {&(0x7f0000011000)="00000000000000000000000000000000000000000000000000000006", 0x1c, 0x2011e0}, {0x0, 0x0, 0x2012e0}, {&(0x7f0000011400)="000000000000000000000000000000000000000000160000000510ec", 0x1c, 0x201320}, {&(0x7f0000011500)="00000017000000020c60", 0xa, 0x201380}, {&(0x7f0000011600)}, {&(0x7f0000011800)}, {&(0x7f0000011b00)="0000000000000000000000000000000000000000000000000000000100000000d73cd47a0000000000100000000000000b000000000000000d0000001000000012000000170000001600000015000000ffffffffffffffffffffffffffffffffffffffff03000600000000000000000000000000140000000100000000000000ffffffffffffffffffffffffffffffffffffffff05", 0x95, 0x204fe0}, {&(0x7f0000011c00)="0000000000000000000000000000000000000000000000000000000009f7a5bb", 0x20, 0x205fe0}, {0x0, 0x0, 0x401320}], 0x0, &(0x7f0000014b00)) 13:22:43 executing program 2: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffff, 0xffffffffffffffff, 0x0) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) read(r0, 0x0, 0x0) syz_mount_image$f2fs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x10, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}, {&(0x7f0000010500)='\x00\x00\x00\x00', 0x4, 0xc80}, {&(0x7f0000010700)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e00000010000003000000010000000200000018b2e346f95e497f827e0a", 0x77, 0x1400}, {0x0}, {&(0x7f0000010e00)="d73cd47a0000000000100000000000000b000000000000000d0000001000000012000000170000001600000015000000ffffffffffffffffffffffffffffffffffffffff03000600000000000000000000000000140000000100000000000000ffffffffffffffffffffffffffffffffffffffff05000000000000000000000000000000c5010000060000000100000007000000070000000a0000004000000040000000fc0f00"/181, 0xb5, 0x200000}, {&(0x7f0000010f00)="0000000000000000000000000000000000000000000000000000000009f7a5bb", 0x20, 0x200fe0}, {&(0x7f0000011000)="00000000000000000000000000000000000000000000000000000006", 0x1c, 0x2011e0}, {0x0, 0x0, 0x2012e0}, {&(0x7f0000011400)="000000000000000000000000000000000000000000160000000510ec", 0x1c, 0x201320}, {&(0x7f0000011500)="00000017000000020c60", 0xa, 0x201380}, {&(0x7f0000011600)}, {&(0x7f0000011800)}, {&(0x7f0000011b00)="0000000000000000000000000000000000000000000000000000000100000000d73cd47a0000000000100000000000000b000000000000000d0000001000000012000000170000001600000015000000ffffffffffffffffffffffffffffffffffffffff03000600000000000000000000000000140000000100000000000000ffffffffffffffffffffffffffffffffffffffff05000000000000000000000000000000c5010000060000000100000007000000070000000a0000004000000040000000fc0f", 0xc6, 0x204fe0}, {0x0, 0x0, 0x205fe0}, {0x0}, {&(0x7f0000013000)="000000000000000000000100000001", 0xf, 0xa00000}], 0x0, &(0x7f0000014b00)) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='pids.events\x00', 0x275a, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x4, 0x2d, 0x9, 0x1, 0x0, 0x7fff, 0x88, 0x4, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x7, 0x0, @perf_bp={&(0x7f00000000c0), 0x1}, 0x9, 0x1, 0x4, 0x9, 0x0, 0xffff, 0x400, 0x0, 0x2, 0x0, 0x1000}, 0x0, 0xe, r1, 0xa) 13:22:43 executing program 4: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000002, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x31) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) waitid$P_PIDFD(0x3, r0, &(0x7f0000000500), 0x9, &(0x7f0000000580)) ptrace$cont(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='pids.events\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x12, r1, 0x0) ftruncate(r1, 0x1000673) ioctl$KDSKBENT(r1, 0x4b47, &(0x7f00000002c0)={0x2, 0x81, 0x5}) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x88400, 0x1a8) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0xd0265000) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) exit_group(0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x31, 0xffffffffffffffff, 0x0) time(&(0x7f0000000180)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14001500, 0x9, &(0x7f0000000300)=[{&(0x7f0000000080)="02000000000100000c190000ce1900000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800)) 13:22:43 executing program 3: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef0100010000002bc4645f000000000000000001000000000000000b0000000001000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e373836333438323637", 0xa2, 0x400}, {&(0x7f0000010100)="0000000000000000000000002f527b43270a4164871303f1137e5908010040000c000000000000002bc4645f", 0x2c, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000500000000000000000000000000000000000000040100004d", 0x39, 0x540}, {&(0x7f0000000040)="00000000000000000000000000000000000000000000000000000000787371fe", 0x20, 0x7e0}, {&(0x7f0000010400)="0200000012000000220000002d000f00030004000000000031245cf20f0062e6000000000000000000000000000000000000000000000000d4189ee9", 0x3c, 0x1000}, {&(0x7f0000012f00)="ed410000001000002bc4645f2bc4645f2bc4645f00000000000004000800000000000800050000000af3010004000000000000000000000001000000030000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002f49000020004f3f54a9d2a254a9d2a2000000002bc4645f", 0x94, 0x22100}], 0x0, &(0x7f0000000300)=ANY=[]) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) statx(r0, &(0x7f0000000340)='./file1\x00', 0x0, 0x0, 0x0) ptrace$setregs(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000080)) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='pids.events\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x12, r1, 0x0) ftruncate(r1, 0x1000673) r2 = syz_mount_image$vfat(&(0x7f00000000c0), &(0x7f0000000140)='./file1/file0\x00', 0x40, 0x3, &(0x7f00000002c0)=[{&(0x7f0000000380)="a122e826f0b987aa234dd16c255a72bbb6b64f064517331956218ac16ef027fa50eddadb6b68bd85e6c8eb9f5fe7288c6c5be3c38b22a375caeb2f810d22be59c44c48877ed78db3257c15f7cff4a13c45e5d683c0160d53edb8c8f01a3e38cf222803ce32e2155173b03fdbfeb4255d67c603daf8b9639f35edf8bc4df3be7eb3e037614038faf0325eec196082e676447ebb37a25bbe57abcab6250885fe7bd3f28c3051e5aa69e74b9f968efdb098f4f92ea582966a2a1c024ede9544b7a67092d88d0bca6fec77e85e57a9af031136fab0f872610eaa0c6b683fa9bd6eeafbbd3e327abeef10031003", 0xeb, 0x1000}, {&(0x7f0000000180)="ddf0471f17bc0091bf64820fe0aa68ef358bcb7b8e9d5dcb8722ac10141585f56720993835d9a23cfe26fdc0b41d0582a8fa1902e8beafb3ded3480573dd02b4a724d77261b924443a241dcd23a0eecccf9e9523b55d1a0d963ab22589695e5f8fd79fd4816250dde9fbaaaf6c702aab887d8224ed3b19cf74283d481e099cc7", 0x80, 0x7}, {&(0x7f0000000480)="44a4b2e8c8673ee881570b515466df8c4e4d0ab983e1e6bd71971d0f7aca415bbaa350e9617d0954c941bc92a11f4c34511382b5352272dab5404f9499d5b03701fbd045ed4df11a9891396bfd6ec616fa6b7fe6823418ed16d7198741b4cc49132ef6714fd22e1fc65a602be02c874a3fa6b52b5708dddbe3a2b96aee2dc1e4594f704b8a4eecc32f1d4a7c32ba9baffbb774ba45db37c0ee5bf2c2d625fc2c7c14654e974b87732518fc783699ffdbef52315fcf0cdafdbafe234046d5594f0fd1a150bec7f4b4c2081a0e570b4e513dd7df355033f8984dc36a917624c314cfd255265347728f4f191782c32253ce75385bb66166bb776fc2bc97d84677fc88bf9c228e36f8e5082fee358443e113dc2bcc3e55244b0274a3fa811b4095609a700b647dd02a6d3b4925d134f7e0382bae458c2e46548d14df4f107f5ae83c4f904b52d75e25400c9756a10749158c35b6212eacb350cc1251f4d9a1ea678363ee29fe99626b7a2d4fd109b99fa0e5a995146db6ce8e66c22219b7d7aae2ac52c5a531fe4a950d2cc94c22513acd587256000840837d9246c588749835097a443f6e1b2bd8b4c5cbb8cbdf3abf8453d52c18768491fb7fe68626a684a2023f84adc01c5b8d4a0d7879ee334356d9a2230bddc392e02a7592b24f3a25140ce011a25aef15fa9ce8cdd98ee52014818f9bf27e653a68cd68f76fb34fb89cc48fcd9c351c6a7e6c3e1f6adcbf7f97f52bdb5b08a2966b39ac8c2c0660973e67254e00499962f61218d112391e36785ba3f7d52231eee72f8afd13e8fa539647bd222658f4f89f70ff16926274feba73b7b177ce9470e1fbed71bd36d0977cc65930e79eea96eb9cd1231ea2493f8077b5d06da7ade0801fdd114b5e4cd4fbfb5a89f97e75eabf2257a77fb4bbd723df34c0d57adb5370244a4e7c5de6f70171ce54439ced56319e1524803185e35e4b03e6c426f14f43c5ca9ce4400d9307089781cc9d6749b3b1c2da46b207d30bed42e63ad8182539682eaf31e3dd61053a32f2945667127fa45a92dd2f82f5c1c30797855ca0ca4dba8a44c09b640b1d40fea3014016b1c2dcf280f3e8eae9b777b4e2fefc0528457c263d42aa2294d9e705fc7cabc6698b20fcb4a73b5e6be68fa5fd2d3699cd5b8e60db3ca4b042fa8d2a764cfc767960777ea41495ac1da665bdf67eddb95bb317e0c2d2293bba76b7fc774e9a5cca68c7031c5ff3ba14788fa284fc26f30ee1ed10751d9fbe89d5e11226dcd1247e0aee5a26371d9243b4342609ce85adbc3e4c3737f7903415bf602fc50b27523979b131e2a41e65300c8da784757249a1a7fdb1671859d2704be2aef110c2bf53bbbdf3196deefaac34ecb12d96395336d71973e5f3fe89b2b5b840078c6cd762ba4795f7fb5334182e5eac89f29d97eb8f12ea201b52c7b8fe3c084706a088787e1285430f9fd5249070162abc78c5a7ad41c279a79a6c8cebf7fc62a31b58927352f5a02b76ee786e7c0a10d9403da69400b3af04e2607378c6a047571c4b9369435c396921c5c5c489281cf5b237de46c86eee57644d49e236325a2c9b4838c7f1374b9e91a9d2b0a192577ff030c80315533023c08af97c9ddea3cd9689ea20f9be23af3bd537e479d8e7480dbf0cad94eb6d0f3270298b72574c61c37d4d2d3e62c9996b8eee897711a6939f9834356623ee1875b5e1f665bd8e225f08343d7921cf0a629952e800b31c98bda2407298cf3f78bac2f6a78f76abac0c2413582fc1f399aed5ad92ea78168267c0488705951254e14b3689fcb2f026e0f3c88aa5366a51a03626030222cc6df7f0cb3e49af69831c33dc2c28f2e3c823c17859701b092cae6d787a2dde373abb4091fba101268309d7f4b2a16e9f664152bd4aee9391de87d72236805e26a4f7e7994ef3871cd5ce2de205c22d2a5d0b64f9bb394862d6414d05c19619305632c48db5ee2e7af6c02682bab59e0f02465abce900c9fb6b822c7188219a0cd96663e47881d5fbc7607dcfc40ef025e3be8620832c380003bb4f178e4968d5291b1f31650d0034f2d42604a685ee5f41ef6a01fb388383e2d3892d7099eabab5166de9214eee3e6ec8eb6f34fa268fedbd3cad2ecdbf075c0bfe772ace9845315ac9625f9066b883cdc4940dc1af843ed5a139f9b9e83930b91257c4308127626f829ac63c0d4fc423118108b2f3328f2d4aab8931631d577ec968c9de55891c1b599992cc550f07b5602331ba356aa4121efad99198fd79b82105535f2a613cfd2de2cf350eaee3a53fd65e3fc764c72c6f66acd33697bcaaf2be531cece9a223b3113a7db3f0fc42ce38fdbef8bc4cafc537e0aa8e5af0e43894ffc4c5774f40ecefbc9cafcdddccf5a4382969f22825facc28d5ba3e1d8d254159ed2be5d81a9dcde8f11a90645104314ec0a395717154e6229c589ec59ca7d7a638dc6e5072b86e164f69a7436ccd05cb4f3db7503f008ee3e0729e7a44ffcfe90de26f9dadc9e942193bce3acd3489ea811afa09afa8f6a1c25a002411bc4d0b1f684323d60ad6a01da801afe59a08bd82bfa3876aa3c013e70b17b15e76fa82bbce8cf0326dbd445971dbd71a7471f740890295412fb2c953bfeebddd63f20da9d0b8d1645aa6006ea3eddfc5eeab02054f504230c6b888059f5f4f19cb42d8810c355bb7f8adaf5b3dbab3f0871fe645ffb40d649b0c815687df9e6abb4866dbf533778c40c0d8e2d01163c7d9ea356e642cb9a2fe37dd4f2e8d55b5ee2c24964f0ee910be49c0aff18f0d4a6f2b04871789f03c1458063154f0d2b157c6c867f1fac735ff09d451164e5eec1e618c4447dfb4ab2ea16edf4ad42a6fde5527665b171eb424790fb8db39fff714c4ded932c62e24cd4d167b1a3f8a89e5c3d35357441528e00d04a1f74cd44a1662d2fa7fa9338dd7050f24a08ad538130ba2a83c75baf554c50e02267ae09cceaaf4a84bbb4a2ce09b8b0360cde7d5929f3f9085bb5c5ea48e432f0b42bc817171b4bd2e0e8e729e535fe8a8d3a6f11db3dc832db2c0c4ca8df495546383619ad4f5ccb39c62a66382df137895387c5851fd3bce1cd067fd2dd9d6658e95ff8eec039c46994596871a5171e04aca85cd2c4a60cfa02ae785cd6cecfe1133948c4d6cebfa173b58766a1cf646ae3a0008c247f070b9aca44d4ed6ba215133a0ea5584c0243da98c6cdfb462ab073396801e2652bb9720a19aea3e1dad28a02013167f9158843c19804c4ecaf7f8c725396db10abe0be1cbf1b53f300b7e908fbb348476e8c8b66a0e03a95c3fbde97c21bc9baf68cf1cebfbed5478cbe4f7a23ede5adf5f8db4bb8338a680a1a0bfe06cb7b8d718e869141622b5c6d29a9b1b5f7c205a8a8f6a045545519d2f2f5479cf7d901c0051e598493f7007e958b940fada359b27b41d6384de7500ad06c2f95b1d90c359a4ced064a7db50ef50afadee5091873d645d0019c68098c5236bf8f29c96d45417fe9f3c8789f55ebf10b930cf3299b111d1f19f0dd30c4c4d2bffd765ce782156ce340626c65ab0fa9ec21fef0847a57e1e48b0cfa55d99c0bbeee951317af49bcaea4c45c285740fce0d81b68c8a7f753a1ed8783a6caa02dd8f4c38accfa04194fb6240fb405a054336503df4c894af47f524f8e79320dd30e855839b7671affeb573e355c0ab9da907ddae00e38f1d7b4a8c6acd9f4cf553d5f86644b6f67e41d83493f082baa098d3a44b91eb9d460d36612c9ecf055c2481df32d0789fa0b74b1159e648ea047a6adba2780fc633dfbc9e58631191be90cc4c9d827211e1a9712993e19c7b8ea290a350c6db7fa3d0af6cefab3c1ed626424c2de117429ac2018f5cf68cdb81a5dd69a759c4e3e38a9cf39b7031c804b12d6c0c525f4c71d69b7f93a32870cfaec6d3cc32821483fd31b6e6393fefe977f7131d2ad76376e51b7689a60bec2ec04adaeded7713393151049eb6a2d03e949c3acb165c2baa5dbfec4564397edd9769dcb924a7e6db9a0b667f3742ee94054cf9982e658241539544fab208e5547e1a3dd944bfb41a3c6b95284600c7df3429260301bc7aafbe1535cb877bc7ed1667eb77f79d3a3398c225825ee87b82c5d141555650f67e12ffeca05daa4e96ebe0b563a9b841550bc64fbbb62605d3809c267751e1dfe21fdbaaf3d02ff58861ceaba77de200c69c2da9cf13823c3a6f0f485b27dec3e8b7e7d122b57dd6baf286be6d886ca6ad9e1747e0f926bc30fa745bfac45a16c87bd3db64a35a8a8245ac08a2a8791469d55a7af494512e32c90ae3638f8b26e35461d99136298f9f966548a5a4683bc176fee2f7226b2f5827b2e671c1428f12d96dd88d941562e0f7c46b6c65c76efc9bfccdc051b186a9dc6ecfab3145feb40fa1322cdae73c8d56253b02e0d4e3a0890464e9584cc9a142686b6e53395b7e0489b057adba0f96edb5dfb28e8031b5ce978d7037327ea57c629f974697dfcf2ffb0320c3b8edbeb8160f361eebff3d7436f7d3347d887e7f406450da1a683f0a7fa9a47b61c3aedb5d4a275ae0fe5a2dab4577921c25495e5934f05d7461419fd1c19a52ce23d40d135bd946c525d11f181370f1bbd9fb3bd1b98fe5270d5ef9b0712d28e42a369bd616d40a8a8ef6841a2b3f7635181a4e92498b14b95bbedafeed5b910fdfd1c26c5aa93e0f2ef792c05085cd55ffb6e2e2932abde703fec3065bd983feedd43591593f35a42519afcd0949bf5c19130d64d1becbb13844981b9070e8c181356fb03a012d46c9fbe6c5876c6cc9d1b3856a4266d9444bc9bcff8d0af4447b89eb1d5559e667738dcf092767f97ef9a4322781f60eba2a8e74badcf2a9b60f150f591cc33f2c737adb957a3a63b14cf30bb2af3e9ba02c53d3b830aadc19d20698bc1aa9108e35a4aaa0a7efa44341f8d801614be3d590bd706277cdf25a093bb049d02c8d98a7fa04c4531f82cd50e9a64e69b2293d4437d00bb9701a4052c5dbf0356247277c1825486b27532db7abd2c14e68b5e96dadd12f0dfb6e6bbe79e9f939c66d1480f8eb84ce01decd494ee10ac8828702f7e5de64e20602a40ff23ca1501b966394a1160ae655ff402ee849918b1d9a4b6da1ed8a32aca349df5fc016067938e01b0d9e121024c117f44a405213ca8c542a1d5dc057be95fc696719cd0fe7cf1505c2c79ff7b076249ca23cd18e179b75794dfba896bb7c5b5ef1689e93e6bd7db6c68b417b2ea4305fec83de044e093de1831b0dc25522a03fa31846b590127f41b65837a188f7a5ba146f042b6de26c0c3a2d5bf755aab4d92eaeb7b4f0cc158a5f54fed3afff70ff869e50e117c46c67d7f507e517d8708c0900b684889d297ab86dc7deeeeea2bed1063f410f7db0668797ceece78917dc92091de9a849b4449b5917a6a01893b51cd31ee9963acf561fc9ad1e20d001a257623ce40f48acd316fef2d5d4c1dc9f4ac3f5303642a3c28e5287380e392a76c9bf606595a82841f2bc18caa8e2bc642df109a11b33939ef60c8c6ea133a1e8b7b79afb52d9ba4bbddead45241394b24b4aacf7ccced213c9c823787aae63f8d2339511c4bcc18f281a04f15518966f6c553a5c5f98f6c14fe11bb263f02565cf9cbddf3294d238c849a3792f1ff353c40e5bad8ed45e48fdb5e64296cd722fa532c45d11d555f9dc4355c2f1d3a3580c552fadc2aaf6a4ff1a31f17c650f850edfba14204437e6426d704148c8256397bcaff42028c97c4e709d72bb08c1a9578e20e8519eb254", 0x1000, 0xfffffffffffffc00}], 0x40000, &(0x7f0000001480)={[{@shortname_mixed}, {@iocharset={'iocharset', 0x3d, 'cp775'}}, {@uni_xlateno}], [{@smackfsfloor}, {@fowner_eq={'fowner', 0x3d, 0xee01}}, {@dont_appraise}]}) renameat2(r1, &(0x7f0000000080)='./file0\x00', r2, &(0x7f0000001500)='./file2\x00', 0x5) [ 243.378772][T10792] F2FS-fs (loop2): invalid crc value [ 243.379833][T10784] FAULT_INJECTION: forcing a failure. [ 243.379833][T10784] name failslab, interval 1, probability 0, space 0, times 0 [ 243.384612][T10792] F2FS-fs (loop2): invalid crc_offset: 0 [ 243.397272][T10784] CPU: 1 PID: 10784 Comm: syz-executor.5 Not tainted 5.4.125-syzkaller-00016-gae94e015273b #0 [ 243.412636][T10784] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 243.413540][T10792] F2FS-fs (loop2): Failed to get valid F2FS checkpoint [ 243.422667][T10784] Call Trace: [ 243.422684][T10784] dump_stack+0x1d8/0x24e [ 243.422694][T10784] ? devkmsg_release+0x11c/0x11c [ 243.422704][T10784] ? show_regs_print_info+0x12/0x12 [ 243.422714][T10784] ? __wait_on_bit+0x171/0x190 [ 243.422725][T10784] should_fail+0x6f6/0x860 [ 243.422734][T10784] ? setup_fault_attr+0x3d0/0x3d0 [ 243.422747][T10784] ? bit_wait+0xa0/0xa0 [ 243.454563][T10803] F2FS-fs (loop0): invalid crc_offset: 0 [ 243.456741][T10784] ? __wait_on_bit+0x190/0x190 [ 243.456751][T10784] ? bit_waitqueue+0x30/0x30 [ 243.456762][T10784] ? kvmalloc_node+0x7e/0xf0 [ 243.456771][T10784] should_failslab+0x5/0x20 [ 243.456780][T10784] __kmalloc+0x5f/0x2f0 [ 243.456791][T10784] kvmalloc_node+0x7e/0xf0 [ 243.456802][T10784] ext4_fill_super+0x58cf/0xeb30 [ 243.456816][T10784] ? vsnprintf+0x1cb4/0x1d60 [ 243.456825][T10784] ? ext4_mount+0x40/0x40 [ 243.456831][T10784] ? idr_replace+0x1c4/0x230 [ 243.456839][T10784] ? snprintf+0xd6/0x120 [ 243.456849][T10784] ? vscnprintf+0x80/0x80 [ 243.456859][T10784] ? set_blocksize+0x1a5/0x3a0 [ 243.456869][T10784] mount_bdev+0x22d/0x340 [ 243.456877][T10784] ? ext4_mount+0x40/0x40 [ 243.456885][T10784] legacy_get_tree+0xde/0x170 [ 243.456900][T10784] ? ext4_lazyinit_thread+0xd40/0xd40 [ 243.465100][T10803] F2FS-fs (loop0): invalid crc_offset: 0 [ 243.466034][T10784] vfs_get_tree+0x83/0x260 [ 243.466043][T10784] do_mount+0x19d0/0x2670 [ 243.466054][T10784] ? copy_mount_string+0x30/0x30 [ 243.466062][T10784] ? copy_mount_options+0x59/0x300 [ 243.466069][T10784] ? copy_mount_options+0x59/0x300 [ 243.466078][T10784] ? kmem_cache_alloc_trace+0x139/0x2b0 [ 243.466086][T10784] ? copy_mount_options+0x273/0x300 [ 243.466099][T10784] ksys_mount+0xc2/0xf0 [ 243.594308][T10784] __x64_sys_mount+0xb1/0xc0 [ 243.598872][T10784] do_syscall_64+0xcb/0x1e0 [ 243.603353][T10784] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 243.609220][T10784] RIP: 0033:0x467b1a [ 243.613091][T10784] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 243.632668][T10784] RSP: 002b:00007f3059253fa8 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 243.641498][T10784] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 0000000000467b1a [ 243.649453][T10784] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007f3059254000 [ 243.657400][T10784] RBP: 00007f3059254040 R08: 00007f3059254040 R09: 0000000020000000 [ 243.665345][T10784] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000020000000 13:22:43 executing program 4: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000002, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x31) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) waitid$P_PIDFD(0x3, r0, &(0x7f0000000500), 0x9, &(0x7f0000000580)) ptrace$cont(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='pids.events\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x12, r1, 0x0) ftruncate(r1, 0x1000673) ioctl$KDSKBENT(r1, 0x4b47, &(0x7f00000002c0)={0x2, 0x81, 0x5}) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x88400, 0x1a8) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0xd0265000) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) exit_group(0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x31, 0xffffffffffffffff, 0x0) time(&(0x7f0000000180)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14001500, 0x9, &(0x7f0000000300)=[{&(0x7f0000000080)="08000000000100000c190000ce1900000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800)) 13:22:43 executing program 1: clone(0x13102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) poll(0x0, 0x0, 0x8000000000000200) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f00000025c0)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00'}) ioctl$TUNSETLINK(r0, 0x800454e1, 0x30a) r2 = openat$selinux_attr(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) mmap(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x6, 0x1010, r2, 0xdc5f7000) close(r0) r3 = socket$inet_tcp(0x2, 0x1, 0x0) preadv(r3, 0x0, 0x0, 0x7fffffff, 0x1) 13:22:43 executing program 4: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000002, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x31) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) waitid$P_PIDFD(0x3, r0, &(0x7f0000000500), 0x9, &(0x7f0000000580)) ptrace$cont(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='pids.events\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x12, r1, 0x0) ftruncate(r1, 0x1000673) ioctl$KDSKBENT(r1, 0x4b47, &(0x7f00000002c0)={0x2, 0x81, 0x5}) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x88400, 0x1a8) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0xd0265000) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) exit_group(0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x31, 0xffffffffffffffff, 0x0) time(&(0x7f0000000180)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14001500, 0x9, &(0x7f0000000300)=[{&(0x7f0000000080)="0a000000000100000c190000ce1900000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800)) 13:22:43 executing program 2: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffff, 0xffffffffffffffff, 0x0) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) read(r0, 0x0, 0x0) syz_mount_image$f2fs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x10, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}, {&(0x7f0000010500)='\x00\x00\x00\x00', 0x4, 0xc80}, {&(0x7f0000010700)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e00000010000003000000010000000200000018b2e346f95e497f827e0a", 0x77, 0x1400}, {0x0}, {&(0x7f0000010e00)="d73cd47a0000000000100000000000000b000000000000000d0000001000000012000000170000001600000015000000ffffffffffffffffffffffffffffffffffffffff03000600000000000000000000000000140000000100000000000000ffffffffffffffffffffffffffffffffffffffff05000000000000000000000000000000c5010000060000000100000007000000070000000a0000004000000040000000fc0f00"/181, 0xb5, 0x200000}, {&(0x7f0000010f00)="0000000000000000000000000000000000000000000000000000000009f7a5bb", 0x20, 0x200fe0}, {&(0x7f0000011000)="00000000000000000000000000000000000000000000000000000006", 0x1c, 0x2011e0}, {0x0, 0x0, 0x2012e0}, {&(0x7f0000011400)="000000000000000000000000000000000000000000160000000510ec", 0x1c, 0x201320}, {&(0x7f0000011500)="00000017000000020c60", 0xa, 0x201380}, {&(0x7f0000011600)}, {&(0x7f0000011800)}, {&(0x7f0000011b00)="0000000000000000000000000000000000000000000000000000000100000000d73cd47a0000000000100000000000000b000000000000000d0000001000000012000000170000001600000015000000ffffffffffffffffffffffffffffffffffffffff03000600000000000000000000000000140000000100000000000000ffffffffffffffffffffffffffffffffffffffff05000000000000000000000000000000c5010000060000000100000007000000070000000a0000004000000040000000fc0f", 0xc6, 0x204fe0}, {0x0, 0x0, 0x205fe0}, {0x0}, {&(0x7f0000013000)="000000000000000000000100000001", 0xf, 0xa00000}], 0x0, &(0x7f0000014b00)) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='pids.events\x00', 0x275a, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x4, 0x2d, 0x9, 0x1, 0x0, 0x7fff, 0x88, 0x4, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x7, 0x0, @perf_bp={&(0x7f00000000c0), 0x1}, 0x9, 0x1, 0x4, 0x9, 0x0, 0xffff, 0x400, 0x0, 0x2, 0x0, 0x1000}, 0x0, 0xe, r1, 0xa) [ 243.673291][T10784] R13: 0000000020000100 R14: 00007f3059254000 R15: 0000000020012c00 [ 243.700070][T10803] F2FS-fs (loop0): Failed to get valid F2FS checkpoint [ 243.714227][T10784] EXT4-fs (loop5): not enough memory 13:22:43 executing program 5 (fault-call:0 fault-nth:64): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000660000000f000000000000000100000001000000004000000040000020000000daf4655fdaf4655f0100ffff53ef010001000000d9f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010100)}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000100000000000000000000000000000000000000000000003000000000000000", 0x40, 0x540}, {&(0x7f0000010300)="02000000030000000400000066000f000300040000000000000000000f007f5c", 0x20, 0x800}, {&(0x7f0000011500)="ed41000000080000d9f4655fdaf4655fdaf4655f000000000000040004", 0x1d, 0x2200}, {0x0}, {&(0x7f0000011900)="ed8100001a040000daf4655fdaf4655fdaf4655f000000000000010004000000000000000100000014000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000039c34d38000000000000000000000000000000000000000000000000200000007412ab417412ab417412ab41daf4655f7412ab410000000000000000", 0xa0, 0x3800}], 0x0, &(0x7f0000012c00)) 13:22:43 executing program 3: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40, 0x6, &(0x7f0000000200)=[{&(0x7f0000000140)="2000000040000000030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef0100010000002bc4645f000000000000000001000000000000000b0000000001000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e37383633343832363758775dbfbce7d6bdae8b3cf0d6", 0xaf, 0x400}, {&(0x7f0000010100)="0000000000000000000000002f527b43270a4164871303f1137e5908010040000c000000000000002bc4645f", 0x2c, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000500000000000000000000000000000000000000040100004d", 0x39, 0x540}, {&(0x7f0000000040)="00000000000000000000000000000000000000000000000000000000787371fe", 0x20, 0x7e0}, {&(0x7f0000010400)="0200000012000000220000002d000f00030004000000000031245cf20f0062e6000000000000000000000000000000000000000000000000d4189ee9", 0x3c, 0x1000}, {&(0x7f0000000440)="ed410000001000002bc4645f2bc4645f2bc4645f00000000000004000800000000000800050000000af3010004000000000000000000000001000000030000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002f49000020004f3f54a9d2a254a9d2a2000000002bc4645f", 0x94, 0x22100}], 0x0, &(0x7f0000000080)=ANY=[]) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000080)='./file0\x00', 0x80) setxattr(&(0x7f00000000c0)='./file1\x00', &(0x7f00000002c0)=@known='com.apple.FinderInfo\x00', &(0x7f0000000300)='ext4\x00', 0x5, 0x3) statx(r0, &(0x7f0000000340)='./file1\x00', 0x0, 0x0, 0x0) ptrace$setregs(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000080)) 13:22:43 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_mount_image$f2fs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0xf, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}, {&(0x7f0000010500)='\x00\x00\x00\x00', 0x4, 0xc80}, {&(0x7f0000010700)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e00000010000003000000010000000200000018b2e346f95e497f827e0a", 0x77, 0x1400}, {0x0}, {&(0x7f0000010e00)="d73cd47a0000000000100000000000000b000000000000000d0000001000000012000000170000001600000015000000ffffffffffffffffffffffffffffffffffffffff03000600000000000000000000000000140000000100000000000000ffffffffffffffffffffffffffffffffffffffff05000000000000000000000000000000c5010000060000000100000007000000070000000a0000004000000040000000fc0f00"/181, 0xb5, 0x200000}, {&(0x7f0000010f00)="0000000000000000000000000000000000000000000000000000000009f7a5bb", 0x20, 0x200fe0}, {&(0x7f0000011000)="00000000000000000000000000000000000000000000000000000006", 0x1c, 0x2011e0}, {0x0, 0x0, 0x2012e0}, {&(0x7f0000011400)="000000000000000000000000000000000000000000160000000510ec", 0x1c, 0x201320}, {&(0x7f0000011500)="00000017000000020c60", 0xa, 0x201380}, {&(0x7f0000011600)}, {&(0x7f0000011800)}, {&(0x7f0000011b00)="0000000000000000000000000000000000000000000000000000000100000000d73cd47a0000000000100000000000000b000000000000000d0000001000000012000000170000001600000015000000ffffffffffffffffffffffffffffffffffffffff03000600000000000000000000000000140000000100000000000000ffffffffffffffffffffffffffffffffffffffff05000000000000000000000000000000c5010000060000000100", 0xae, 0x204fe0}, {&(0x7f0000011c00)="0000000000000000000000000000000000000000000000000000000009f7a5bb", 0x20, 0x205fe0}, {0x0, 0x0, 0x401320}], 0x0, &(0x7f0000014b00)) [ 243.859213][T10825] FAULT_INJECTION: forcing a failure. [ 243.859213][T10825] name failslab, interval 1, probability 0, space 0, times 0 [ 243.866799][T10820] EXT4-fs (loop4): inodes count not valid: 10 vs 32 [ 243.891506][T10825] CPU: 1 PID: 10825 Comm: syz-executor.5 Not tainted 5.4.125-syzkaller-00016-gae94e015273b #0 [ 243.901840][T10825] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 243.911881][T10825] Call Trace: [ 243.915171][T10825] dump_stack+0x1d8/0x24e [ 243.919479][T10825] ? devkmsg_release+0x11c/0x11c [ 243.924393][T10825] ? show_regs_print_info+0x12/0x12 [ 243.929654][T10825] should_fail+0x6f6/0x860 [ 243.934049][T10825] ? setup_fault_attr+0x3d0/0x3d0 [ 243.939049][T10825] ? _raw_spin_lock_irqsave+0xf8/0x210 [ 243.944482][T10825] ? prealloc_shrinker+0x50/0x210 [ 243.949480][T10825] should_failslab+0x5/0x20 [ 243.953956][T10825] kmem_cache_alloc_trace+0x39/0x2b0 [ 243.959213][T10825] prealloc_shrinker+0x50/0x210 [ 243.964038][T10825] register_shrinker+0x1a/0x170 [ 243.968866][T10825] ext4_es_register_shrinker+0x204/0x2a0 [ 243.974484][T10825] ext4_fill_super+0x7b6c/0xeb30 [ 243.979399][T10825] ? ext4_mount+0x40/0x40 [ 243.983699][T10825] ? idr_replace+0x1c4/0x230 [ 243.988259][T10825] ? snprintf+0xd6/0x120 [ 243.992471][T10825] ? vscnprintf+0x80/0x80 [ 243.996863][T10825] ? set_blocksize+0x1a5/0x3a0 [ 244.001685][T10825] mount_bdev+0x22d/0x340 [ 244.005986][T10825] ? ext4_mount+0x40/0x40 [ 244.010288][T10825] legacy_get_tree+0xde/0x170 [ 244.014935][T10825] ? ext4_lazyinit_thread+0xd40/0xd40 [ 244.020277][T10825] vfs_get_tree+0x83/0x260 [ 244.024664][T10825] do_mount+0x19d0/0x2670 [ 244.028965][T10825] ? copy_mount_string+0x30/0x30 [ 244.033871][T10825] ? copy_mount_options+0x59/0x300 [ 244.038967][T10825] ? copy_mount_options+0x59/0x300 [ 244.044088][T10825] ? kmem_cache_alloc_trace+0x139/0x2b0 [ 244.049627][T10825] ? copy_mount_options+0x273/0x300 [ 244.054811][T10825] ksys_mount+0xc2/0xf0 [ 244.058946][T10825] __x64_sys_mount+0xb1/0xc0 [ 244.063535][T10825] do_syscall_64+0xcb/0x1e0 [ 244.068020][T10825] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 244.073902][T10825] RIP: 0033:0x467b1a [ 244.077780][T10825] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 244.097369][T10825] RSP: 002b:00007f3059253fa8 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 13:22:44 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0), 0x200, 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140), 0x2, 0x0) copy_file_range(r0, 0x0, r1, &(0x7f0000000180)=0xfffffffffffffffb, 0x2f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x6, &(0x7f00000003c0)=[{&(0x7f00000002c0)="2000000040000000030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef0100010000002bc4645f000000000000000001000000000000000b0000000001000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e373836333438323637", 0xa2, 0x400}, {&(0x7f0000010100)="0000000000000000000000002f527b43270a4164871303f1137e5908010040000c000000000000002bc4645f", 0x2c, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000500000000000000000000000000000000000000040100004d", 0x39, 0x540}, {&(0x7f00000001c0)="00000000000000000008040000000000000000000000000000000000787371fedccc79d61d08d0077e012d4730a8c8", 0x2f, 0x7e0}, {&(0x7f0000010400)="0200000012000000220000002d000f00030004000000000031245cf20f0062e6000000000000000000000000000000000000000000000000d4189ee9", 0x3c, 0x1000}, {&(0x7f0000012f00)="ed410000001000002bc4645f2bc4645f2bc4645f00000000000004000800000000000800050000000af3010004000000000000000000000001000000030000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002f49000020004f3f54a9d2a254a9d2a2000000002bc4645f", 0x94, 0x22100}], 0x14a0000, &(0x7f0000000380)=ANY=[@ANYRES32]) r2 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000200)={0xffffffffffffffff, 0x1000, 0x10}, 0xc) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000240)=r2, 0x4) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='pids.events\x00', 0x275a, 0x0) setsockopt$SO_VM_SOCKETS_BUFFER_MAX_SIZE(r3, 0x28, 0x2, &(0x7f0000000280)=0x2, 0x8) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x12, r3, 0x0) ftruncate(r3, 0x1000673) ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_opts(r4, 0x6, 0x1, 0x0, &(0x7f0000000000)) fstat(r4, &(0x7f0000000480)) statx(0xffffffffffffffff, &(0x7f0000000080)='.\x00', 0x800, 0x0, 0x0) ptrace$setregs(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000080)) 13:22:44 executing program 4: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000002, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x31) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) waitid$P_PIDFD(0x3, r0, &(0x7f0000000500), 0x9, &(0x7f0000000580)) ptrace$cont(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='pids.events\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x12, r1, 0x0) ftruncate(r1, 0x1000673) ioctl$KDSKBENT(r1, 0x4b47, &(0x7f00000002c0)={0x2, 0x81, 0x5}) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x88400, 0x1a8) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0xd0265000) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) exit_group(0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x31, 0xffffffffffffffff, 0x0) time(&(0x7f0000000180)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14001500, 0x9, &(0x7f0000000300)=[{&(0x7f0000000080)="23000000000100000c190000ce1900000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800)) [ 244.105751][T10825] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 0000000000467b1a [ 244.113693][T10825] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007f3059254000 [ 244.121636][T10825] RBP: 00007f3059254040 R08: 00007f3059254040 R09: 0000000020000000 [ 244.129591][T10825] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000020000000 [ 244.137880][T10825] R13: 0000000020000100 R14: 00007f3059254000 R15: 0000000020012c00 [ 244.168200][T10831] F2FS-fs (loop2): invalid crc value [ 244.173889][T10831] F2FS-fs (loop2): invalid crc_offset: 0 [ 244.180209][T10831] F2FS-fs (loop2): Failed to get valid F2FS checkpoint 13:22:44 executing program 5 (fault-call:0 fault-nth:65): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000660000000f000000000000000100000001000000004000000040000020000000daf4655fdaf4655f0100ffff53ef010001000000d9f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010100)}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000100000000000000000000000000000000000000000000003000000000000000", 0x40, 0x540}, {&(0x7f0000010300)="02000000030000000400000066000f000300040000000000000000000f007f5c", 0x20, 0x800}, {&(0x7f0000011500)="ed41000000080000d9f4655fdaf4655fdaf4655f000000000000040004", 0x1d, 0x2200}, {0x0}, {&(0x7f0000011900)="ed8100001a040000daf4655fdaf4655fdaf4655f000000000000010004000000000000000100000014000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000039c34d38000000000000000000000000000000000000000000000000200000007412ab417412ab417412ab41daf4655f7412ab410000000000000000", 0xa0, 0x3800}], 0x0, &(0x7f0000012c00)) 13:22:44 executing program 4: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000002, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x31) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) waitid$P_PIDFD(0x3, r0, &(0x7f0000000500), 0x9, &(0x7f0000000580)) ptrace$cont(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='pids.events\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x12, r1, 0x0) ftruncate(r1, 0x1000673) ioctl$KDSKBENT(r1, 0x4b47, &(0x7f00000002c0)={0x2, 0x81, 0x5}) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x88400, 0x1a8) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0xd0265000) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) exit_group(0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x31, 0xffffffffffffffff, 0x0) time(&(0x7f0000000180)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14001500, 0x9, &(0x7f0000000300)=[{&(0x7f0000000080)="25000000000100000c190000ce1900000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800)) [ 244.215642][T10845] EXT4-fs (loop4): inodes count not valid: 35 vs 32 [ 244.228116][T10839] F2FS-fs (loop0): invalid crc_offset: 0 [ 244.255720][T10839] F2FS-fs (loop0): invalid crc_offset: 0 13:22:44 executing program 3: ioctl$sock_ipv6_tunnel_SIOCADD6RD(0xffffffffffffffff, 0x89f9, &(0x7f0000001a80)={'syztnl0\x00', &(0x7f0000001a00)={'sit0\x00', 0x0, 0x2b, 0x1, 0x1, 0x40, 0x8, @ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x1, 0x0}}, @private1, 0x90, 0x1, 0xffff8000}}) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000001ac0)={@remote, 0x55, r0}) r1 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef0100010000002bc4645f000000000000000001000000000000000b0000000001000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e373836333438323637", 0xa2, 0x400}, {&(0x7f0000010100)="0000000000000000000000002f527b43270a4164871303f1137e5908010040000c000000000000002bc4645f", 0x2c, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000500000000000000000000000000000000000000040100004d", 0x39, 0x540}, {&(0x7f0000000040)="00000000000000000000000000000000000000000000000000000000787371fe", 0x20, 0x7e0}, {&(0x7f0000010400)="0200000012000000220000002d000f00030004000000000031245cf20f0062e6000000000000000000000000000000000000000000000000d4189ee9", 0x3c, 0x1000}, {&(0x7f0000012f00)="ed410000001000002bc4645f2bc4645f2bc4645f00000000000004000800000000000800050000000af3010004000000000000000000000001000000030000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002f49000020004f3f54a9d2a254a9d2a2000000002bc4645f", 0x94, 0x22100}], 0x0, &(0x7f0000000300)=ANY=[]) r2 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) statx(r1, &(0x7f0000000340)='./file1\x00', 0x0, 0x0, 0x0) ptrace$setregs(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000080)) r3 = fcntl$getown(r2, 0x9) perf_event_open(&(0x7f0000000080)={0x5, 0x80, 0x40, 0x0, 0xfb, 0x74, 0x0, 0x9, 0x104, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x101, 0x4, @perf_config_ext={0x2, 0x7}, 0x49821, 0x0, 0xe3d, 0x2, 0x1000, 0x4684, 0x5, 0x0, 0x81, 0x0, 0x1}, r3, 0x0, 0xffffffffffffffff, 0x2) [ 244.265209][T10856] FAULT_INJECTION: forcing a failure. [ 244.265209][T10856] name failslab, interval 1, probability 0, space 0, times 0 [ 244.278587][T10856] CPU: 0 PID: 10856 Comm: syz-executor.5 Not tainted 5.4.125-syzkaller-00016-gae94e015273b #0 [ 244.285302][T10839] F2FS-fs (loop0): Failed to get valid F2FS checkpoint [ 244.288815][T10856] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 244.288819][T10856] Call Trace: [ 244.288835][T10856] dump_stack+0x1d8/0x24e [ 244.288851][T10856] ? devkmsg_release+0x11c/0x11c [ 244.318254][T10856] ? show_regs_print_info+0x12/0x12 [ 244.323429][T10856] should_fail+0x6f6/0x860 [ 244.327820][T10856] ? setup_fault_attr+0x3d0/0x3d0 [ 244.332827][T10856] ? up_write+0xa6/0x270 [ 244.337043][T10856] ? down_write+0xd8/0x150 [ 244.341432][T10856] ? up_read+0x10/0x10 [ 244.345481][T10856] ? mb_cache_create+0x5e/0x500 [ 244.350317][T10856] should_failslab+0x5/0x20 [ 244.354793][T10856] kmem_cache_alloc_trace+0x39/0x2b0 [ 244.360050][T10856] mb_cache_create+0x5e/0x500 [ 244.364795][T10856] ext4_fill_super+0x94f2/0xeb30 [ 244.369714][T10856] ? ext4_mount+0x40/0x40 [ 244.374014][T10856] ? idr_replace+0x1c4/0x230 [ 244.378577][T10856] ? snprintf+0xd6/0x120 [ 244.382883][T10856] ? vscnprintf+0x80/0x80 [ 244.387186][T10856] ? set_blocksize+0x1a5/0x3a0 [ 244.391928][T10856] mount_bdev+0x22d/0x340 [ 244.396231][T10856] ? ext4_mount+0x40/0x40 [ 244.400534][T10856] legacy_get_tree+0xde/0x170 [ 244.405191][T10856] ? ext4_lazyinit_thread+0xd40/0xd40 [ 244.410549][T10856] vfs_get_tree+0x83/0x260 [ 244.414942][T10856] do_mount+0x19d0/0x2670 [ 244.419247][T10856] ? copy_mount_string+0x30/0x30 [ 244.424156][T10856] ? copy_mount_options+0x59/0x300 [ 244.429236][T10856] ? copy_mount_options+0x59/0x300 [ 244.434322][T10856] ? kmem_cache_alloc_trace+0x139/0x2b0 [ 244.439838][T10856] ? copy_mount_options+0x273/0x300 [ 244.445008][T10856] ksys_mount+0xc2/0xf0 [ 244.449137][T10856] __x64_sys_mount+0xb1/0xc0 [ 244.453701][T10856] do_syscall_64+0xcb/0x1e0 [ 244.458177][T10856] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 244.464049][T10856] RIP: 0033:0x467b1a [ 244.467932][T10856] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 244.487523][T10856] RSP: 002b:00007f3059253fa8 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 244.495909][T10856] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 0000000000467b1a [ 244.503855][T10856] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007f3059254000 13:22:44 executing program 4: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000002, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x31) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) waitid$P_PIDFD(0x3, r0, &(0x7f0000000500), 0x9, &(0x7f0000000580)) ptrace$cont(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='pids.events\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x12, r1, 0x0) ftruncate(r1, 0x1000673) ioctl$KDSKBENT(r1, 0x4b47, &(0x7f00000002c0)={0x2, 0x81, 0x5}) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x88400, 0x1a8) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0xd0265000) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) exit_group(0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x31, 0xffffffffffffffff, 0x0) time(&(0x7f0000000180)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14001500, 0x9, &(0x7f0000000300)=[{&(0x7f0000000080)="29000000000100000c190000ce1900000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800)) [ 244.511820][T10856] RBP: 00007f3059254040 R08: 00007f3059254040 R09: 0000000020000000 [ 244.519851][T10856] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000020000000 [ 244.527795][T10856] R13: 0000000020000100 R14: 00007f3059254000 R15: 0000000020012c00 [ 244.539165][T10856] EXT4-fs (loop5): Failed to create ea_block_cache 13:22:44 executing program 1: clone(0x13102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) poll(0x0, 0x0, 0x8000000000000200) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f00000025c0)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00'}) ioctl$TUNSETLINK(r0, 0x80086601, 0x30a) r2 = openat$selinux_attr(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) mmap(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x6, 0x1010, r2, 0xdc5f7000) close(r0) r3 = socket$inet_tcp(0x2, 0x1, 0x0) preadv(r3, 0x0, 0x0, 0x7fffffff, 0x1) 13:22:44 executing program 2: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffff, 0xffffffffffffffff, 0x0) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) read(r0, 0x0, 0x0) syz_mount_image$f2fs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x10, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}, {&(0x7f0000010500)='\x00\x00\x00\x00', 0x4, 0xc80}, {&(0x7f0000010700)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e00000010000003000000010000000200000018b2e346f95e497f827e0a", 0x77, 0x1400}, {0x0}, {&(0x7f0000010e00)="d73cd47a0000000000100000000000000b000000000000000d0000001000000012000000170000001600000015000000ffffffffffffffffffffffffffffffffffffffff03000600000000000000000000000000140000000100000000000000ffffffffffffffffffffffffffffffffffffffff05000000000000000000000000000000c5010000060000000100000007000000070000000a0000004000000040000000fc0f00"/181, 0xb5, 0x200000}, {&(0x7f0000010f00)="0000000000000000000000000000000000000000000000000000000009f7a5bb", 0x20, 0x200fe0}, {&(0x7f0000011000)="00000000000000000000000000000000000000000000000000000006", 0x1c, 0x2011e0}, {0x0, 0x0, 0x2012e0}, {&(0x7f0000011400)="000000000000000000000000000000000000000000160000000510ec", 0x1c, 0x201320}, {&(0x7f0000011500)="00000017000000020c60", 0xa, 0x201380}, {&(0x7f0000011600)}, {&(0x7f0000011800)}, {&(0x7f0000011b00)="0000000000000000000000000000000000000000000000000000000100000000d73cd47a0000000000100000000000000b000000000000000d0000001000000012000000170000001600000015000000ffffffffffffffffffffffffffffffffffffffff03000600000000000000000000000000140000000100000000000000ffffffffffffffffffffffffffffffffffffffff05000000000000000000000000000000c5010000060000000100000007000000070000000a0000004000000040000000fc0f", 0xc6, 0x204fe0}, {&(0x7f0000011c00), 0x0, 0x205fe0}, {0x0}, {&(0x7f0000013000)="000000000000000000000100000001", 0xf, 0xa00000}], 0x0, &(0x7f0000014b00)) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='pids.events\x00', 0x275a, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x4, 0x2d, 0x9, 0x1, 0x0, 0x7fff, 0x88, 0x4, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x7, 0x0, @perf_bp={&(0x7f00000000c0), 0x1}, 0x9, 0x1, 0x4, 0x9, 0x0, 0xffff, 0x400, 0x0, 0x2, 0x0, 0x1000}, 0x0, 0xe, r1, 0xa) 13:22:44 executing program 5 (fault-call:0 fault-nth:66): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000660000000f000000000000000100000001000000004000000040000020000000daf4655fdaf4655f0100ffff53ef010001000000d9f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010100)}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000100000000000000000000000000000000000000000000003000000000000000", 0x40, 0x540}, {&(0x7f0000010300)="02000000030000000400000066000f000300040000000000000000000f007f5c", 0x20, 0x800}, {&(0x7f0000011500)="ed41000000080000d9f4655fdaf4655fdaf4655f000000000000040004", 0x1d, 0x2200}, {0x0}, {&(0x7f0000011900)="ed8100001a040000daf4655fdaf4655fdaf4655f000000000000010004000000000000000100000014000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000039c34d38000000000000000000000000000000000000000000000000200000007412ab417412ab417412ab41daf4655f7412ab410000000000000000", 0xa0, 0x3800}], 0x0, &(0x7f0000012c00)) 13:22:44 executing program 3: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef0100010000002bc4645f000000000000000001000000000000000b0000000001000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e373836333438323637", 0xa2, 0x400}, {&(0x7f0000010100)="0000000000000000000000002f527b43270a4164871303f1137e5908010040000c000000000000002bc4645f", 0x2c, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000500000000000000000000000000000000000000040100004d", 0x39, 0x540}, {&(0x7f0000000040)="00000000000000000000000000000000000000000000000000000000787371fe", 0x20, 0x7e0}, {&(0x7f0000010400)="0200000012000000220000002d000f00030004000000000031245cf20f0062e6000000000000000000000000000000000000000000000000d4189ee9", 0x3c, 0x1000}, {&(0x7f0000012f00)="ed410000001000002bc4645f2bc4645f2bc4645f00000000000004000800000000000800050000000af3010004000000000000000000000001000000030000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002f49000020004f3f54a9d2a254a9d2a2000000002bc4645f", 0x94, 0x22100}], 0x0, &(0x7f0000000300)=ANY=[]) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) statx(r0, &(0x7f0000000340)='./file1\x00', 0x0, 0x0, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000140)=0x0) ptrace$setregs(0xf, r1, 0x0, &(0x7f0000000180)="915182c655b4858dca99e4b66f291d84709b01adbbe8066fae96e28c391c01326a0648f9b4f5b37900"/50) recvmsg$unix(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000008c0)=[{&(0x7f0000000380)=""/205, 0xcd}, {&(0x7f0000000480)=""/150, 0x96}, {&(0x7f00000002c0)=""/89, 0x59}, {&(0x7f0000000540)=""/130, 0x82}, {&(0x7f0000000600)=""/234, 0xea}, {&(0x7f0000000700)=""/143, 0x8f}, {&(0x7f00000007c0)=""/107, 0x6b}, {&(0x7f0000000840)=""/104, 0x68}], 0x8, &(0x7f0000000940)=[@cred={{0x1c}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}], 0xf0}, 0x1) r3 = syz_mount_image$ext4(&(0x7f0000000ac0)='ext4\x00', &(0x7f0000000b00)='./file0/../file0\x00', 0x1, 0x5, &(0x7f0000000e00)=[{&(0x7f0000000b40)="ddca9af7f3c88e8a18343bfbfc533185ea2da98c40d2531858bdbc783b51d6844b740ca631a3462928515c36c01a6f0697a7cfd816ba81073b2aa87e5735f29cdae858a693032b4092409710c29a80a1dfa66fc829d57c53855d3b72bdf175766336b6be50c28185adab3b58c4ca899841ae966a78c665c60dfb288343450f96e74731d6896eb4212d258b856cb35133b80885fb2ebea5363047e737676a03d42d0260c3cceea6354a37cc33d39ebf5307da213664486e7cf21b64f09e10b77134190497e752ace7e2f3ea5f5c3edc34bd487c966396ae59d0345e4a235593143665c455b6ca6bec3c481c7e8a9913", 0xef, 0xfffffffffffffff7}, {&(0x7f0000000c40)="4505c3b59db1dc07fc8d32d3aa0f49bb2fcf0a90baf363cefb84f56b51f6c53a60e0118ca20a86e91050", 0x2a, 0x6}, {&(0x7f0000000c80)="da6abf38b620cdab1c4bb0ca7932ee4e7ed1ec530f9808627705a36dc71eb379206c2ccaef9a5451632cda6db9dfd60baffd267cfc527518d0319bba9f2bfb23ddca41bead9d974a4f342edcf596d12ef66ccb69d847dcf9975266a524bb22136db05f8c959263d5ebca89fb621abf37e882da1013374d36ea2832a2809e59a7e4eb2feddd0a7d9233a6bbe696464328e8cd8b064f4c942fbbe39d54a16b906831e7cf494063183da66b0dfe0b2acf046f9111747913c392", 0xb8, 0x101}, {&(0x7f0000000d40)="7897d1ee7f0eadb3d77cb25fab5e5c2d4c7243e738ed282368f23a418cb73ad35f349f2066c6f2cdf6c223537a922097da1ab6a5b4fdd7d5da9a22c1b351986ef5e15c13eb46bd6e08b3742e48ebe947c30c4023d4c58709c4318829f809cf12356f79361f0f5dcdc5a96a4d", 0x6c, 0x3f400000}, {&(0x7f0000000dc0)="1cfe24cd35476aef40ebf923d02dd8604579bedb8df34454e19a437c0f8322e3be5cdb5f7f3bbff97f53a38c84484e74a166", 0x32, 0xffffffffffffff80}], 0x2400, &(0x7f0000000e80)={[{@dax}, {@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x10000}}, {@nobh}, {@barrier}, {@abort}], [{@permit_directio}, {@obj_type={'obj_type', 0x3d, '{\\^*))}\'+\\%'}}, {@euid_gt}, {@dont_hash}]}) fsconfig$FSCONFIG_SET_PATH(r2, 0x3, &(0x7f0000000a40)='])[:\xba%\x00', &(0x7f0000000a80)='./file0\x00', r3) fsconfig$FSCONFIG_SET_PATH(0xffffffffffffffff, 0x3, &(0x7f0000000080)='\x00', &(0x7f00000000c0)='./file1\x00', 0xffffffffffffffff) 13:22:44 executing program 4: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000002, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x31) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) waitid$P_PIDFD(0x3, r0, &(0x7f0000000500), 0x9, &(0x7f0000000580)) ptrace$cont(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='pids.events\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x12, r1, 0x0) ftruncate(r1, 0x1000673) ioctl$KDSKBENT(r1, 0x4b47, &(0x7f00000002c0)={0x2, 0x81, 0x5}) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x88400, 0x1a8) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0xd0265000) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) exit_group(0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x31, 0xffffffffffffffff, 0x0) time(&(0x7f0000000180)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14001500, 0x9, &(0x7f0000000300)=[{&(0x7f0000000080)="00200000000100000c190000ce1900000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800)) [ 244.761100][T10870] FAULT_INJECTION: forcing a failure. [ 244.761100][T10870] name failslab, interval 1, probability 0, space 0, times 0 [ 244.773785][T10870] CPU: 1 PID: 10870 Comm: syz-executor.5 Not tainted 5.4.125-syzkaller-00016-gae94e015273b #0 [ 244.784035][T10870] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 244.794078][T10870] Call Trace: [ 244.797370][T10870] dump_stack+0x1d8/0x24e [ 244.801698][T10870] ? devkmsg_release+0x11c/0x11c [ 244.806645][T10870] ? show_regs_print_info+0x12/0x12 [ 244.811835][T10870] should_fail+0x6f6/0x860 [ 244.816230][T10870] ? setup_fault_attr+0x3d0/0x3d0 [ 244.821228][T10870] ? mb_cache_create+0x11e/0x500 [ 244.826140][T10870] should_failslab+0x5/0x20 [ 244.830616][T10870] __kmalloc+0x5f/0x2f0 [ 244.834742][T10870] ? mb_cache_create+0x5e/0x500 [ 244.839651][T10870] mb_cache_create+0x11e/0x500 [ 244.844406][T10870] ext4_fill_super+0x94f2/0xeb30 [ 244.849338][T10870] ? ext4_mount+0x40/0x40 [ 244.853728][T10870] ? idr_replace+0x1c4/0x230 [ 244.858291][T10870] ? snprintf+0xd6/0x120 [ 244.862611][T10870] ? vscnprintf+0x80/0x80 [ 244.866912][T10870] ? set_blocksize+0x1a5/0x3a0 [ 244.871649][T10870] mount_bdev+0x22d/0x340 [ 244.875957][T10870] ? ext4_mount+0x40/0x40 [ 244.880258][T10870] legacy_get_tree+0xde/0x170 [ 244.884908][T10870] ? ext4_lazyinit_thread+0xd40/0xd40 [ 244.890254][T10870] vfs_get_tree+0x83/0x260 [ 244.894642][T10870] do_mount+0x19d0/0x2670 [ 244.898971][T10870] ? copy_mount_string+0x30/0x30 [ 244.903878][T10870] ? copy_mount_options+0x59/0x300 [ 244.908962][T10870] ? copy_mount_options+0x59/0x300 [ 244.914047][T10870] ? kmem_cache_alloc_trace+0x139/0x2b0 [ 244.919563][T10870] ? copy_mount_options+0x273/0x300 [ 244.924731][T10870] ksys_mount+0xc2/0xf0 [ 244.928861][T10870] __x64_sys_mount+0xb1/0xc0 [ 244.933426][T10870] do_syscall_64+0xcb/0x1e0 [ 244.937903][T10870] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 244.943766][T10870] RIP: 0033:0x467b1a [ 244.947649][T10870] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 244.967744][T10870] RSP: 002b:00007f3059253fa8 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 244.976128][T10870] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 0000000000467b1a [ 244.984075][T10870] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007f3059254000 [ 244.992018][T10870] RBP: 00007f3059254040 R08: 00007f3059254040 R09: 0000000020000000 [ 244.999972][T10870] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000020000000 13:22:45 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_mount_image$f2fs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0xf, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}, {&(0x7f0000010500)='\x00\x00\x00\x00', 0x4, 0xc80}, {&(0x7f0000010700)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e00000010000003000000010000000200000018b2e346f95e497f827e0a", 0x77, 0x1400}, {0x0}, {&(0x7f0000010e00)="d73cd47a0000000000100000000000000b000000000000000d0000001000000012000000170000001600000015000000ffffffffffffffffffffffffffffffffffffffff03000600000000000000000000000000140000000100000000000000ffffffffffffffffffffffffffffffffffffffff05000000000000000000000000000000c5010000060000000100000007000000070000000a0000004000000040000000fc0f00"/181, 0xb5, 0x200000}, {&(0x7f0000010f00)="0000000000000000000000000000000000000000000000000000000009f7a5bb", 0x20, 0x200fe0}, {&(0x7f0000011000)="00000000000000000000000000000000000000000000000000000006", 0x1c, 0x2011e0}, {0x0, 0x0, 0x2012e0}, {&(0x7f0000011400)="000000000000000000000000000000000000000000160000000510ec", 0x1c, 0x201320}, {&(0x7f0000011500)="00000017000000020c60", 0xa, 0x201380}, {&(0x7f0000011600)}, {&(0x7f0000011800)}, {&(0x7f0000011b00)="0000000000000000000000000000000000000000000000000000000100000000d73cd47a0000000000100000000000000b000000000000000d0000001000000012000000170000001600000015000000ffffffffffffffffffffffffffffffffffffffff03000600000000000000000000000000140000000100000000000000ffffffffffffffffffffffffffffffffffffffff05000000000000000000000000000000c5010000060000000100", 0xae, 0x204fe0}, {&(0x7f0000011c00)="0000000000000000000000000000000000000000000000000000000009f7a5bb", 0x20, 0x205fe0}, {0x0, 0x0, 0x401320}], 0x0, &(0x7f0000014b00)) 13:22:45 executing program 3: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef0100010000002bc4645f000000000000000001000000000000000b0000000001000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e373836333438323637", 0xa2, 0x80000001}, {&(0x7f0000010100)="0000000000000000000000002f527b43270a4164871303f1137e5908010040000c000000000000002bc4645f", 0x2c, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000500000000000000000000000000000000000000040100004d", 0x39, 0x540}, {&(0x7f0000000040)="00000000000000000000000000000000000000000000000000000000787371fe", 0x20, 0x7e0}, {&(0x7f0000010400)="0200000012000000220000002d000f00030004000000000031245cf20f0062e6000000000000000000000000000000000000000000000000d4189ee9", 0x3c, 0x1000}, {&(0x7f0000012f00)="ed410000001000002bc4645f2bc4645f2bc4645f00000000000004000800000000000800050000000af3010004000000000000000000000001000000030000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002f49000020004f3f54a9d2a254a9d2a2000000002bc4645f", 0x94, 0x22100}], 0x0, &(0x7f0000000300)=ANY=[]) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) statx(r0, &(0x7f0000000340)='./file1\x00', 0x0, 0x0, 0x0) ptrace$setregs(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000080)) [ 245.007943][T10870] R13: 0000000020000100 R14: 00007f3059254000 R15: 0000000020012c00 [ 245.021007][T10873] F2FS-fs (loop2): invalid crc value [ 245.047879][T10873] F2FS-fs (loop2): invalid crc_offset: 0 [ 245.054590][T10873] F2FS-fs (loop2): Failed to get valid F2FS checkpoint 13:22:45 executing program 3: sendmsg$NL80211_CMD_SET_MCAST_RATE(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)={0x38, 0x0, 0x400, 0x70bd28, 0x25dfdbfe, {{}, {@void, @val={0xc, 0x99, {0xfff, 0x35}}}}, [@NL80211_ATTR_MCAST_RATE={0x8, 0x6b, 0x168}, @NL80211_ATTR_MCAST_RATE={0x8, 0x6b, 0x6e}, @NL80211_ATTR_MCAST_RATE={0x8, 0x6b, 0x21c}]}, 0x38}, 0x1, 0x0, 0x0, 0x4}, 0x4080000) r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef0100010000002bc4645f000000000000000001000000000000000b0000000001000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e373836333438323637", 0xa2, 0x400}, {&(0x7f0000010100)="0000000000000000000000002f527b43270a4164871303f1137e5908010040000c000000000000002bc4645f", 0x2c, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000500000000000000000000000000000000000000040100004d", 0x39, 0x540}, {&(0x7f0000000040)="00000000000000000000000000000000000000000000000000000000787371fe", 0x20, 0x7e0}, {&(0x7f0000010400)="0200000012000000220000002d000f00030004000000000031245cf20f0062e6000000000000000000000000000000000000000000000000d4189ee9", 0x3c, 0x1000}, {&(0x7f0000012f00)="ed410000001000002bc4645f2bc4645f2bc4645f00000000000004000800000000000800050000000af3010004000000000000000000000001000000030000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002f49000020004f3f54a9d2a254a9d2a2000000002bc4645f", 0x94, 0x22100}], 0x0, &(0x7f0000000300)=ANY=[]) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$f2fs(&(0x7f00000001c0), &(0x7f00000002c0)='./file2\x00', 0x10000, 0x5, &(0x7f0000000640)=[{&(0x7f0000000380)="ba3e28da0fe586e9acab1ebea1d2f99ddc2f3e2e6f2755916e893eca6ca7b2248dabc57945d4f29b131fe2ca6ae11f5117d9936b97b129fdd699094f9dfc8fef21aca85e78148f887420cfa946de0b8b769dd115f7c75aa27a46c25d9f8efe97add27c2844f872d03d1a9e4fc2e600a6f325e4c90ed3a4b02cf7347f040b2ab4750232a4cdf1f3230a18274de4418d09b98587e16bfa318ee32ec9751f00cf9376d647d8a09940c11317", 0xaa, 0x10001}, {&(0x7f0000000440)="6618d099d44504d10625f6b289b815b23376463d0aeadd799a649e2f84c055b3549fe4be159df66174a4a72acfc75fbf0cb9b13e51608e106ec768f3871d31ea9352c4c33346297b9d25cc21d6cd3c21e8c2a911cee4081641e329a1eff178ac308e8313ced596f2e2cbe2f6ce6264380360f7504d9b3e9c7339e6ddd234ea", 0x7f, 0x2}, {&(0x7f00000004c0)="14a4a3f8d7786fda49f5918f65e67168c5d9f449c1cdbdc781f2221c53a183ccc9026aecc2ed8fad5a5b2ef15647956273c615012b1246e62174e353c15818929b58b57e79a888d531e329392cd3320b7f6eb412a1b6be8ca2df8c942a69f015e91d47abd120e08b9a4e724677a3485ad403ee9a6fd1a8784cb49926b5b448f2b27b93fd3811e12ec89a57a9af3d", 0x8e, 0x1}, {&(0x7f0000000580)="1f7dd135b000a6fbf7af4d4c91cd4a63da21d8fb05c7efe884c4f6458a5bf4eb8ad05abc6204ab0f34ee590ae448be9a19cb5f193cbc21fc3ac496bb3dfdd69bc1a4bf885c7459bf6282dc06d5e382e8db49ef6d9bdf8ff7c3ad02fcc8562462bc2e6a062baf0124a0a48aaad165475a3d1ceed27a19fbdc632a8a521eba1f1aa6ddbbe8717de0abf85619b4c6a6824c6b87fbef5b0207a23d4e2eeb88a33de65fca", 0xa2}, {&(0x7f0000000300)="a03e32bcb350a0f1ac9ab9b7455d6c387465c3969dcabf61689c7ada6329a9", 0x1f, 0x4}], 0x0, &(0x7f00000006c0)={[{@quota}, {@test_dummy_encryption}, {@norecovery}, {@noquota}, {@norecovery}, {@fastboot}, {@noheap}, {@noinline_dentry}, {@extent_cache}, {@noextent_cache}], [{@measure}, {@smackfsfloor={'smackfsfloor', 0x3d, 'ext4\x00'}}]}) statx(r0, &(0x7f0000000340)='./file1\x00', 0x0, 0x0, 0x0) 13:22:45 executing program 4: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000002, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x31) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) waitid$P_PIDFD(0x3, r0, &(0x7f0000000500), 0x9, &(0x7f0000000580)) ptrace$cont(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='pids.events\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x12, r1, 0x0) ftruncate(r1, 0x1000673) ioctl$KDSKBENT(r1, 0x4b47, &(0x7f00000002c0)={0x2, 0x81, 0x5}) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x88400, 0x1a8) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0xd0265000) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) exit_group(0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x31, 0xffffffffffffffff, 0x0) time(&(0x7f0000000180)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14001500, 0x9, &(0x7f0000000300)=[{&(0x7f0000000080)="00040200000100000c190000ce1900000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800)) 13:22:45 executing program 5 (fault-call:0 fault-nth:67): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000660000000f000000000000000100000001000000004000000040000020000000daf4655fdaf4655f0100ffff53ef010001000000d9f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010100)}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000100000000000000000000000000000000000000000000003000000000000000", 0x40, 0x540}, {&(0x7f0000010300)="02000000030000000400000066000f000300040000000000000000000f007f5c", 0x20, 0x800}, {&(0x7f0000011500)="ed41000000080000d9f4655fdaf4655fdaf4655f000000000000040004", 0x1d, 0x2200}, {0x0}, {&(0x7f0000011900)="ed8100001a040000daf4655fdaf4655fdaf4655f000000000000010004000000000000000100000014000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000039c34d38000000000000000000000000000000000000000000000000200000007412ab417412ab417412ab41daf4655f7412ab410000000000000000", 0xa0, 0x3800}], 0x0, &(0x7f0000012c00)) [ 245.080539][T10889] F2FS-fs (loop0): invalid crc_offset: 0 [ 245.093850][T10889] F2FS-fs (loop0): invalid crc_offset: 0 [ 245.103159][T10870] EXT4-fs (loop5): Failed to create ea_block_cache [ 245.103206][T10882] EXT4-fs (loop4): inodes count not valid: 8192 vs 32 [ 245.112110][T10889] F2FS-fs (loop0): Failed to get valid F2FS checkpoint 13:22:45 executing program 1: clone(0x13102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) poll(0x0, 0x0, 0x8000000000000200) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f00000025c0)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00'}) ioctl$TUNSETLINK(r0, 0x80087601, 0x30a) r2 = openat$selinux_attr(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) mmap(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x6, 0x1010, r2, 0xdc5f7000) close(r0) r3 = socket$inet_tcp(0x2, 0x1, 0x0) preadv(r3, 0x0, 0x0, 0x7fffffff, 0x1) 13:22:45 executing program 2: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffff, 0xffffffffffffffff, 0x0) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) read(r0, 0x0, 0x0) syz_mount_image$f2fs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x10, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}, {&(0x7f0000010500)='\x00\x00\x00\x00', 0x4, 0xc80}, {&(0x7f0000010700)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e00000010000003000000010000000200000018b2e346f95e497f827e0a", 0x77, 0x1400}, {0x0}, {&(0x7f0000010e00)="d73cd47a0000000000100000000000000b000000000000000d0000001000000012000000170000001600000015000000ffffffffffffffffffffffffffffffffffffffff03000600000000000000000000000000140000000100000000000000ffffffffffffffffffffffffffffffffffffffff05000000000000000000000000000000c5010000060000000100000007000000070000000a0000004000000040000000fc0f00"/181, 0xb5, 0x200000}, {&(0x7f0000010f00)="0000000000000000000000000000000000000000000000000000000009f7a5bb", 0x20, 0x200fe0}, {&(0x7f0000011000)="00000000000000000000000000000000000000000000000000000006", 0x1c, 0x2011e0}, {0x0, 0x0, 0x2012e0}, {&(0x7f0000011400)="000000000000000000000000000000000000000000160000000510ec", 0x1c, 0x201320}, {&(0x7f0000011500)="00000017000000020c60", 0xa, 0x201380}, {&(0x7f0000011600)}, {&(0x7f0000011800)}, {&(0x7f0000011b00)="0000000000000000000000000000000000000000000000000000000100000000d73cd47a0000000000100000000000000b000000000000000d0000001000000012000000170000001600000015000000ffffffffffffffffffffffffffffffffffffffff03000600000000000000000000000000140000000100000000000000ffffffffffffffffffffffffffffffffffffffff05000000000000000000000000000000c5010000060000000100000007000000070000000a0000004000000040000000fc0f", 0xc6, 0x204fe0}, {&(0x7f0000011c00), 0x0, 0x205fe0}, {0x0}, {&(0x7f0000013000)="000000000000000000000100000001", 0xf, 0xa00000}], 0x0, &(0x7f0000014b00)) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='pids.events\x00', 0x275a, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x4, 0x2d, 0x9, 0x1, 0x0, 0x7fff, 0x88, 0x4, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x7, 0x0, @perf_bp={&(0x7f00000000c0), 0x1}, 0x9, 0x1, 0x4, 0x9, 0x0, 0xffff, 0x400, 0x0, 0x2, 0x0, 0x1000}, 0x0, 0xe, r1, 0xa) 13:22:45 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_mount_image$f2fs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0xf, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}, {&(0x7f0000010500)='\x00\x00\x00\x00', 0x4, 0xc80}, {&(0x7f0000010700)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e00000010000003000000010000000200000018b2e346f95e497f827e0a", 0x77, 0x1400}, {0x0}, {&(0x7f0000010e00)="d73cd47a0000000000100000000000000b000000000000000d0000001000000012000000170000001600000015000000ffffffffffffffffffffffffffffffffffffffff03000600000000000000000000000000140000000100000000000000ffffffffffffffffffffffffffffffffffffffff05000000000000000000000000000000c5010000060000000100000007000000070000000a0000004000000040000000fc0f00"/181, 0xb5, 0x200000}, {&(0x7f0000010f00)="0000000000000000000000000000000000000000000000000000000009f7a5bb", 0x20, 0x200fe0}, {&(0x7f0000011000)="00000000000000000000000000000000000000000000000000000006", 0x1c, 0x2011e0}, {0x0, 0x0, 0x2012e0}, {&(0x7f0000011400)="000000000000000000000000000000000000000000160000000510ec", 0x1c, 0x201320}, {&(0x7f0000011500)="00000017000000020c60", 0xa, 0x201380}, {&(0x7f0000011600)}, {&(0x7f0000011800)}, {&(0x7f0000011b00)="0000000000000000000000000000000000000000000000000000000100000000d73cd47a0000000000100000000000000b000000000000000d0000001000000012000000170000001600000015000000ffffffffffffffffffffffffffffffffffffffff03000600000000000000000000000000140000000100000000000000ffffffffffffffffffffffffffffffffffffffff05000000000000000000000000000000c5010000060000000100", 0xae, 0x204fe0}, {&(0x7f0000011c00)="0000000000000000000000000000000000000000000000000000000009f7a5bb", 0x20, 0x205fe0}, {0x0, 0x0, 0x401320}], 0x0, &(0x7f0000014b00)) [ 245.277982][T10902] EXT4-fs (loop4): inodes count not valid: 132096 vs 32 13:22:45 executing program 4: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000002, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x31) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) waitid$P_PIDFD(0x3, r0, &(0x7f0000000500), 0x9, &(0x7f0000000580)) ptrace$cont(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='pids.events\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x12, r1, 0x0) ftruncate(r1, 0x1000673) ioctl$KDSKBENT(r1, 0x4b47, &(0x7f00000002c0)={0x2, 0x81, 0x5}) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x88400, 0x1a8) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0xd0265000) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) exit_group(0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x31, 0xffffffffffffffff, 0x0) time(&(0x7f0000000180)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14001500, 0x9, &(0x7f0000000300)=[{&(0x7f0000000080)="20020000000100000c190000ce1900000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800)) 13:22:45 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef0100010000002bc4645f000000000000000001000000000000000b0000000001000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e373836333438323637", 0xa2, 0x400}, {&(0x7f0000010100)="0000000000000000000000002f527b43270a4164871303f1137e5908010040000c000000000000002bc4645f", 0x2c, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000500000000000000000000000000000000000000040100004d", 0x39, 0x540}, {&(0x7f0000000040)="00000000000000000000000000000000000000000000000000000000787371fe", 0x20, 0x7e0}, {&(0x7f0000010400)="0200000012000000220000002d000f00030004000000000031245cf20f0062e6000000000000000000000000000000000000000000000000d4189ee9", 0x3c, 0x1000}, {&(0x7f0000012f00)="ed410000001000002bc4645f2bc4645f2bc4645f00000000000004000800000000000800050000000af3010004000000000000000000000001000000030000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002f49000020004f3f54a9d2a254a9d2a2000000002bc4645f", 0x94, 0x22100}], 0x0, &(0x7f0000000300)=ANY=[]) perf_event_open(0x0, 0x0, 0xa, 0xffffffffffffffff, 0x0) r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000680), 0x84000, 0x0) r1 = openat$cgroup_ro(r0, &(0x7f00000006c0)='freezer.state\x00', 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='pids.events\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x12, r2, 0x0) ftruncate(r2, 0x1000673) write$P9_RREADLINK(r2, &(0x7f00000002c0)=ANY=[@ANYBLOB="1000000017020007002e2f660700000041ca597ad706ec"], 0x10) r3 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_opts(r3, 0x6, 0x1, 0x0, &(0x7f0000000000)) sendmsg$sock(r3, &(0x7f0000000500)={&(0x7f0000000080)=@pptp={0x18, 0x2, {0x2, @local}}, 0x80, &(0x7f0000000600)=[{&(0x7f0000000140)="a293c50700000000000000bef241f5f8e80987b3000000000000", 0x1a}, {&(0x7f0000000380)="4d07d32682f708840c437421d69eb78676cc7dd8f29efe85cfea167d35cfafe2982ab2a10c0e75648e4a1be97d2c5aca6cd58681f24746259781f30ef901151b81de47a2fbb5d1a151623332d84b33c810bcd8bd94e014635f80376b7262349810a381e918cbb1c38f9c204df5a2ba8da3f7caa6e192af35207de0e05b5c658b79c1a2478e89b1581a0866f130708b6996b1785db650948982b851b8b6d0b95d3a74d5dee78d7a6b96fcf5555e3451a899ffedd39deb9b9c23f1ecb2a9a939aa0a290f4651a7", 0xc6}, {&(0x7f0000000180)="e6e01e4e5dc795d853fb2126a0026e51e31950b24df1972ee6efd3a750", 0x1d}, {&(0x7f00000001c0)="14704b45ee6ec95b7393415f3f65c6b39bdeb395db9468ee5f19e2ef", 0x1c}], 0x4, &(0x7f0000000480), 0x60}, 0x20000000) perf_event_open(&(0x7f00000007c0)={0x2, 0x80, 0x0, 0x40, 0x6, 0x2, 0x0, 0x9, 0x80800, 0xa, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x7, 0x4, @perf_bp={&(0x7f00000005c0), 0xf}, 0x1080, 0x9, 0x5, 0x9, 0x9, 0x7fffffff, 0x9, 0x0, 0x61e5, 0x0, 0x6}, 0xffffffffffffffff, 0x8, r1, 0x3) r4 = socket$inet(0x2, 0xa, 0x1000004) getsockopt$ARPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x61, &(0x7f0000000900)=ANY=[@ANYBLOB="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"], &(0x7f0000000780)=0x62) ioctl$sock_inet_SIOCSARP(r4, 0x8955, &(0x7f0000000540)={{0x2, 0x4e23, @empty}, {0x306}, 0x28, {0x2, 0x4e24, @multicast1}, 'macvlan1\x00'}) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='pids.events\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x12, r5, 0x0) ftruncate(r5, 0x1000673) statx(r5, &(0x7f0000000340)='./file1\x00', 0x0, 0x0, 0x0) ptrace$setregs(0xffffffffffffffff, 0x0, 0x2, &(0x7f0000000840)="39e24dc7eaa8380f70fe418675d2687a32c9914f96d0d39b0e1964d037abaccabd785c97a3a6eced1c6b8f72f90c919342a5ed182c40ef86852704869460350019648213543a1842f47546290727195df08896e3962e244637c14f42736e9603c293430700000000000000243646b526f4704f5deca22cd08527a11c52fe928b10d4fbe41dea2b73192ea9727eaf1d259e9aa3d52c631f97441993e6474ad749affe3ac54a9c04f7ced92ca76bb149d7") [ 245.342237][T10909] FAULT_INJECTION: forcing a failure. [ 245.342237][T10909] name failslab, interval 1, probability 0, space 0, times 0 [ 245.348773][T10913] F2FS-fs (loop2): invalid crc value [ 245.369716][T10913] F2FS-fs (loop2): invalid crc_offset: 0 [ 245.374174][T10909] CPU: 0 PID: 10909 Comm: syz-executor.5 Not tainted 5.4.125-syzkaller-00016-gae94e015273b #0 [ 245.385602][T10909] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 245.395645][T10909] Call Trace: [ 245.398935][T10909] dump_stack+0x1d8/0x24e [ 245.403261][T10909] ? devkmsg_release+0x11c/0x11c [ 245.408206][T10909] ? show_regs_print_info+0x12/0x12 [ 245.413403][T10909] should_fail+0x6f6/0x860 [ 245.417815][T10909] ? setup_fault_attr+0x3d0/0x3d0 [ 245.422839][T10909] ? mb_cache_create+0x11e/0x500 [ 245.425531][T10913] F2FS-fs (loop2): Failed to get valid F2FS checkpoint [ 245.427765][T10909] should_failslab+0x5/0x20 [ 245.427775][T10909] __kmalloc+0x5f/0x2f0 [ 245.427789][T10909] ? mb_cache_create+0x5e/0x500 [ 245.448046][T10909] mb_cache_create+0x11e/0x500 [ 245.452789][T10909] ext4_fill_super+0x94f2/0xeb30 [ 245.457709][T10909] ? ext4_mount+0x40/0x40 [ 245.462028][T10909] ? idr_replace+0x1c4/0x230 [ 245.466681][T10909] ? snprintf+0xd6/0x120 [ 245.470906][T10909] ? vscnprintf+0x80/0x80 [ 245.475211][T10909] ? set_blocksize+0x1a5/0x3a0 [ 245.479956][T10909] mount_bdev+0x22d/0x340 [ 245.484278][T10909] ? ext4_mount+0x40/0x40 [ 245.488585][T10909] legacy_get_tree+0xde/0x170 [ 245.493234][T10909] ? ext4_lazyinit_thread+0xd40/0xd40 [ 245.498579][T10909] vfs_get_tree+0x83/0x260 [ 245.502979][T10909] do_mount+0x19d0/0x2670 [ 245.507284][T10909] ? copy_mount_string+0x30/0x30 [ 245.512196][T10909] ? copy_mount_options+0x59/0x300 [ 245.517280][T10909] ? copy_mount_options+0x59/0x300 [ 245.522383][T10909] ? kmem_cache_alloc_trace+0x139/0x2b0 [ 245.527903][T10909] ? copy_mount_options+0x273/0x300 [ 245.533072][T10909] ksys_mount+0xc2/0xf0 [ 245.537292][T10909] __x64_sys_mount+0xb1/0xc0 [ 245.541856][T10909] do_syscall_64+0xcb/0x1e0 [ 245.546337][T10909] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 245.552201][T10909] RIP: 0033:0x467b1a [ 245.556071][T10909] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 245.575661][T10909] RSP: 002b:00007f3059253fa8 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 245.584045][T10909] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 0000000000467b1a [ 245.591997][T10909] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007f3059254000 [ 245.599943][T10909] RBP: 00007f3059254040 R08: 00007f3059254040 R09: 0000000020000000 [ 245.607902][T10909] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000020000000 [ 245.615851][T10909] R13: 0000000020000100 R14: 00007f3059254000 R15: 0000000020012c00 [ 245.628673][T10921] F2FS-fs (loop0): invalid crc_offset: 0 13:22:45 executing program 4: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000002, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x31) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) waitid$P_PIDFD(0x3, r0, &(0x7f0000000500), 0x9, &(0x7f0000000580)) ptrace$cont(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='pids.events\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x12, r1, 0x0) ftruncate(r1, 0x1000673) ioctl$KDSKBENT(r1, 0x4b47, &(0x7f00000002c0)={0x2, 0x81, 0x5}) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x88400, 0x1a8) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0xd0265000) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) exit_group(0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x31, 0xffffffffffffffff, 0x0) time(&(0x7f0000000180)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14001500, 0x9, &(0x7f0000000300)=[{&(0x7f0000000080)="20030000000100000c190000ce1900000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800)) 13:22:45 executing program 3: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef0100010000002bc4645f000000000000000001000000000000000b0000000001000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e373836333438323637", 0xa2, 0x400}, {&(0x7f0000010100)="0000000000000000000000002f527b43270a4164871303f1137e5908010040000c000000000000002bc4645f", 0x2c, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000500000000000000000000000000000000000000040100004d", 0x39, 0x540}, {&(0x7f0000000040)="00000000000000000000000000000000000000000000000000000000787371fe", 0x20, 0x7e0}, {&(0x7f0000010400)="0200000012000000220000002d000f00030004000000000031245cf20f0062e6000000000000000000000000000000000000000000000000d4189ee9", 0x3c, 0x1000}, {&(0x7f0000012f00)="ed410000001000002bc4645f2bc4645f2bc4645f00000000000004000800000000000800050000000af3010004000000000000000000000001000000030000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002f49000020004f3f54a9d2a254a9d2a2000000002bc4645f", 0x94, 0x22100}], 0x0, &(0x7f0000000300)=ANY=[]) mount$overlay(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0), 0x400, &(0x7f0000000140)={[{@metacopy_off}, {@index_off}], [{@subj_role={'subj_role', 0x3d, 'ext4\x00'}}, {@defcontext={'defcontext', 0x3d, 'user_u'}}, {@measure}, {@fowner_gt={'fowner>', 0xee01}}, {@fowner_gt}, {@subj_role}, {@permit_directio}]}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0x0, r2, 0xee00) mount$overlay(0x0, &(0x7f00000002c0)='./file1\x00', &(0x7f0000000300), 0x2804, &(0x7f0000000380)={[{@index_on}, {@metacopy_on}, {@xino_auto}, {@workdir={'workdir', 0x3d, './file2'}}, {@redirect_dir={'redirect_dir', 0x3d, './file1'}}, {@metacopy_off}, {@metacopy_on}, {@workdir={'workdir', 0x3d, './file1'}}], [{@euid_lt={'euid<', r2}}, {@seclabel}, {@smackfshat={'smackfshat', 0x3d, '('}}]}) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) statx(r0, &(0x7f0000000340)='./file1\x00', 0x0, 0x0, 0x0) ptrace$setregs(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000080)) chdir(&(0x7f0000000440)='./file2\x00') [ 245.643526][T10921] F2FS-fs (loop0): invalid crc_offset: 0 [ 245.654534][T10921] F2FS-fs (loop0): Failed to get valid F2FS checkpoint [ 245.671010][T10928] syz-executor.3 uses obsolete (PF_INET,SOCK_PACKET) [ 245.679675][T10909] EXT4-fs (loop5): Failed to create ea_block_cache 13:22:45 executing program 5 (fault-call:0 fault-nth:68): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000660000000f000000000000000100000001000000004000000040000020000000daf4655fdaf4655f0100ffff53ef010001000000d9f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010100)}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000100000000000000000000000000000000000000000000003000000000000000", 0x40, 0x540}, {&(0x7f0000010300)="02000000030000000400000066000f000300040000000000000000000f007f5c", 0x20, 0x800}, {&(0x7f0000011500)="ed41000000080000d9f4655fdaf4655fdaf4655f000000000000040004", 0x1d, 0x2200}, {0x0}, {&(0x7f0000011900)="ed8100001a040000daf4655fdaf4655fdaf4655f000000000000010004000000000000000100000014000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000039c34d38000000000000000000000000000000000000000000000000200000007412ab417412ab417412ab41daf4655f7412ab410000000000000000", 0xa0, 0x3800}], 0x0, &(0x7f0000012c00)) 13:22:45 executing program 2: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffff, 0xffffffffffffffff, 0x0) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) read(r0, 0x0, 0x0) syz_mount_image$f2fs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x10, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}, {&(0x7f0000010500)='\x00\x00\x00\x00', 0x4, 0xc80}, {&(0x7f0000010700)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e00000010000003000000010000000200000018b2e346f95e497f827e0a", 0x77, 0x1400}, {0x0}, {&(0x7f0000010e00)="d73cd47a0000000000100000000000000b000000000000000d0000001000000012000000170000001600000015000000ffffffffffffffffffffffffffffffffffffffff03000600000000000000000000000000140000000100000000000000ffffffffffffffffffffffffffffffffffffffff05000000000000000000000000000000c5010000060000000100000007000000070000000a0000004000000040000000fc0f00"/181, 0xb5, 0x200000}, {&(0x7f0000010f00)="0000000000000000000000000000000000000000000000000000000009f7a5bb", 0x20, 0x200fe0}, {&(0x7f0000011000)="00000000000000000000000000000000000000000000000000000006", 0x1c, 0x2011e0}, {0x0, 0x0, 0x2012e0}, {&(0x7f0000011400)="000000000000000000000000000000000000000000160000000510ec", 0x1c, 0x201320}, {&(0x7f0000011500)="00000017000000020c60", 0xa, 0x201380}, {&(0x7f0000011600)}, {&(0x7f0000011800)}, {&(0x7f0000011b00)="0000000000000000000000000000000000000000000000000000000100000000d73cd47a0000000000100000000000000b000000000000000d0000001000000012000000170000001600000015000000ffffffffffffffffffffffffffffffffffffffff03000600000000000000000000000000140000000100000000000000ffffffffffffffffffffffffffffffffffffffff05000000000000000000000000000000c5010000060000000100000007000000070000000a0000004000000040000000fc0f", 0xc6, 0x204fe0}, {&(0x7f0000011c00), 0x0, 0x205fe0}, {0x0}, {&(0x7f0000013000)="000000000000000000000100000001", 0xf, 0xa00000}], 0x0, &(0x7f0000014b00)) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='pids.events\x00', 0x275a, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x4, 0x2d, 0x9, 0x1, 0x0, 0x7fff, 0x88, 0x4, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x7, 0x0, @perf_bp={&(0x7f00000000c0), 0x1}, 0x9, 0x1, 0x4, 0x9, 0x0, 0xffff, 0x400, 0x0, 0x2, 0x0, 0x1000}, 0x0, 0xe, r1, 0xa) 13:22:45 executing program 4: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000002, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x31) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) waitid$P_PIDFD(0x3, r0, &(0x7f0000000500), 0x9, &(0x7f0000000580)) ptrace$cont(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='pids.events\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x12, r1, 0x0) ftruncate(r1, 0x1000673) ioctl$KDSKBENT(r1, 0x4b47, &(0x7f00000002c0)={0x2, 0x81, 0x5}) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x88400, 0x1a8) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0xd0265000) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) exit_group(0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x31, 0xffffffffffffffff, 0x0) time(&(0x7f0000000180)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14001500, 0x9, &(0x7f0000000300)=[{&(0x7f0000000080)="20040000000100000c190000ce1900000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800)) [ 245.743697][T10935] EXT4-fs (loop4): inodes count not valid: 800 vs 32 13:22:45 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_mount_image$f2fs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0xf, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}, {&(0x7f0000010500)='\x00\x00\x00\x00', 0x4, 0xc80}, {&(0x7f0000010700)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e00000010000003000000010000000200000018b2e346f95e497f827e0a", 0x77, 0x1400}, {0x0}, {&(0x7f0000010e00)="d73cd47a0000000000100000000000000b000000000000000d0000001000000012000000170000001600000015000000ffffffffffffffffffffffffffffffffffffffff03000600000000000000000000000000140000000100000000000000ffffffffffffffffffffffffffffffffffffffff05000000000000000000000000000000c5010000060000000100000007000000070000000a0000004000000040000000fc0f00"/181, 0xb5, 0x200000}, {&(0x7f0000010f00)="0000000000000000000000000000000000000000000000000000000009f7a5bb", 0x20, 0x200fe0}, {&(0x7f0000011000)="00000000000000000000000000000000000000000000000000000006", 0x1c, 0x2011e0}, {0x0, 0x0, 0x2012e0}, {&(0x7f0000011400)="000000000000000000000000000000000000000000160000000510ec", 0x1c, 0x201320}, {&(0x7f0000011500)="00000017000000020c60", 0xa, 0x201380}, {&(0x7f0000011600)}, {&(0x7f0000011800)}, {&(0x7f0000011b00)="0000000000000000000000000000000000000000000000000000000100000000d73cd47a0000000000100000000000000b000000000000000d0000001000000012000000170000001600000015000000ffffffffffffffffffffffffffffffffffffffff03000600000000000000000000000000140000000100000000000000ffffffffffffffffffffffffffffffffffffffff05000000000000000000000000000000c5010000060000000100000007000000070000000a00", 0xba, 0x204fe0}, {&(0x7f0000011c00)="0000000000000000000000000000000000000000000000000000000009f7a5bb", 0x20, 0x205fe0}, {0x0, 0x0, 0x401320}], 0x0, &(0x7f0000014b00)) 13:22:45 executing program 3: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000000140)="2000000040000000030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef0100010000002bc4645f000000000000000001000000000000000b0000000001000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e373836333438323637", 0xa2, 0x400}, {&(0x7f0000010100)="0000000000000000000000002f527b43270a4164871303f1137e5908010040000c000000000000002bc4645f", 0x2c, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000500000000000000000000000000000000000000040100004d", 0x39, 0x540}, {&(0x7f0000000040)="00000000000000000000000000000000000000000000000000000000787371fe", 0x20, 0x7e0}, {&(0x7f0000010400)="0200000012000000220000002d000f00030004000000000031245cf20f0062e6000000000000000000000000000000000000000000000000d4189ee9", 0x3c, 0x1000}, {&(0x7f0000012f00)="ed410000001000002bc4645f2bc4645f2bc4645f00000000000004000800000000000800050000000af3010004000000000000000000000001000000030000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002f49000020004f3f54a9d2a254a9d2a2000000002bc4645f", 0x94, 0x22100}], 0x0, &(0x7f0000000300)=ANY=[]) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) statx(r0, &(0x7f0000000340)='./file1\x00', 0x0, 0x0, 0x0) ptrace$setregs(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000080)) [ 245.865563][T10944] FAULT_INJECTION: forcing a failure. [ 245.865563][T10944] name failslab, interval 1, probability 0, space 0, times 0 [ 245.894711][T10944] CPU: 0 PID: 10944 Comm: syz-executor.5 Not tainted 5.4.125-syzkaller-00016-gae94e015273b #0 [ 245.905144][T10944] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 245.915202][T10944] Call Trace: [ 245.918470][T10944] dump_stack+0x1d8/0x24e [ 245.922769][T10944] ? devkmsg_release+0x11c/0x11c [ 245.927673][T10944] ? show_regs_print_info+0x12/0x12 [ 245.932841][T10944] should_fail+0x6f6/0x860 [ 245.937229][T10944] ? setup_fault_attr+0x3d0/0x3d0 [ 245.942225][T10944] ? prealloc_shrinker+0x50/0x210 [ 245.947219][T10944] should_failslab+0x5/0x20 [ 245.951712][T10944] kmem_cache_alloc_trace+0x39/0x2b0 [ 245.956969][T10944] prealloc_shrinker+0x50/0x210 [ 245.961792][T10944] register_shrinker+0x1a/0x170 [ 245.966613][T10944] mb_cache_create+0x39d/0x500 [ 245.971347][T10944] ext4_fill_super+0x94f2/0xeb30 [ 245.976258][T10944] ? ext4_mount+0x40/0x40 [ 245.980554][T10944] ? idr_replace+0x1c4/0x230 [ 245.985130][T10944] ? snprintf+0xd6/0x120 [ 245.989341][T10944] ? vscnprintf+0x80/0x80 [ 245.993639][T10944] ? set_blocksize+0x1a5/0x3a0 [ 245.998371][T10944] mount_bdev+0x22d/0x340 [ 246.002685][T10944] ? ext4_mount+0x40/0x40 [ 246.006999][T10944] legacy_get_tree+0xde/0x170 [ 246.011654][T10944] ? ext4_lazyinit_thread+0xd40/0xd40 [ 246.017000][T10944] vfs_get_tree+0x83/0x260 [ 246.021431][T10944] do_mount+0x19d0/0x2670 [ 246.025732][T10944] ? copy_mount_string+0x30/0x30 [ 246.030638][T10944] ? copy_mount_options+0x59/0x300 [ 246.035719][T10944] ? copy_mount_options+0x59/0x300 [ 246.040802][T10944] ? kmem_cache_alloc_trace+0x139/0x2b0 [ 246.046318][T10944] ? copy_mount_options+0x273/0x300 [ 246.051488][T10944] ksys_mount+0xc2/0xf0 [ 246.055616][T10944] __x64_sys_mount+0xb1/0xc0 [ 246.060177][T10944] do_syscall_64+0xcb/0x1e0 [ 246.064652][T10944] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 246.070511][T10944] RIP: 0033:0x467b1a [ 246.074374][T10944] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 246.094013][T10944] RSP: 002b:00007f3059253fa8 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 246.102398][T10944] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 0000000000467b1a 13:22:46 executing program 1: clone(0x13102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) poll(0x0, 0x0, 0x8000000000000200) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f00000025c0)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00'}) ioctl$TUNSETLINK(r0, 0x801054db, 0x30a) r2 = openat$selinux_attr(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) mmap(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x6, 0x1010, r2, 0xdc5f7000) close(r0) r3 = socket$inet_tcp(0x2, 0x1, 0x0) preadv(r3, 0x0, 0x0, 0x7fffffff, 0x1) 13:22:46 executing program 4: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000002, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x31) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) waitid$P_PIDFD(0x3, r0, &(0x7f0000000500), 0x9, &(0x7f0000000580)) ptrace$cont(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='pids.events\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x12, r1, 0x0) ftruncate(r1, 0x1000673) ioctl$KDSKBENT(r1, 0x4b47, &(0x7f00000002c0)={0x2, 0x81, 0x5}) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x88400, 0x1a8) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0xd0265000) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) exit_group(0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x31, 0xffffffffffffffff, 0x0) time(&(0x7f0000000180)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14001500, 0x9, &(0x7f0000000300)=[{&(0x7f0000000080)="20050000000100000c190000ce1900000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800)) [ 246.110340][T10944] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007f3059254000 [ 246.118281][T10944] RBP: 00007f3059254040 R08: 00007f3059254040 R09: 0000000020000000 [ 246.126223][T10944] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000020000000 [ 246.134165][T10944] R13: 0000000020000100 R14: 00007f3059254000 R15: 0000000020012c00 [ 246.149610][T10944] EXT4-fs (loop5): Failed to create ea_block_cache 13:22:46 executing program 5 (fault-call:0 fault-nth:69): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000660000000f000000000000000100000001000000004000000040000020000000daf4655fdaf4655f0100ffff53ef010001000000d9f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010100)}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000100000000000000000000000000000000000000000000003000000000000000", 0x40, 0x540}, {&(0x7f0000010300)="02000000030000000400000066000f000300040000000000000000000f007f5c", 0x20, 0x800}, {&(0x7f0000011500)="ed41000000080000d9f4655fdaf4655fdaf4655f000000000000040004", 0x1d, 0x2200}, {0x0}, {&(0x7f0000011900)="ed8100001a040000daf4655fdaf4655fdaf4655f000000000000010004000000000000000100000014000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000039c34d38000000000000000000000000000000000000000000000000200000007412ab417412ab417412ab41daf4655f7412ab410000000000000000", 0xa0, 0x3800}], 0x0, &(0x7f0000012c00)) [ 246.230813][T10958] F2FS-fs (loop0): invalid crc_offset: 0 [ 246.246597][T10958] F2FS-fs (loop0): invalid crc_offset: 0 [ 246.252503][T10959] F2FS-fs (loop2): invalid crc value [ 246.264571][T10959] F2FS-fs (loop2): invalid crc_offset: 0 [ 246.273811][T10958] F2FS-fs (loop0): Failed to get valid F2FS checkpoint 13:22:46 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_opts(r0, 0x6, 0x1, 0x0, &(0x7f0000000000)) ioctl$BTRFS_IOC_SNAP_DESTROY(r0, 0x5000940f, &(0x7f0000000380)={{}, "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"}) r1 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef0100010000002bc4645f000000000000000001000000000000000b0000000001000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e373836333438323637", 0xa2, 0x3fc}, {&(0x7f0000010100)="0000000000000000000000002f527b43270a4164871303f1137e5908010040000c000000000000002bc4645f", 0x2c, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000500000000000000000000000000000000000000040100004d", 0x39, 0x540}, {&(0x7f0000000040)="00000000000000000000000000000000000000000000000000000000787371fe", 0x20, 0x7e0}, {&(0x7f0000010400)="0200000012000000220000002d000f00030004000000000031245cf20f0062e6000000000000000000000000000000000000000000000000d4189ee9", 0x3c, 0x1000}, {&(0x7f0000000140)="ed410000001000002bc4645f2bc4645f2bc4645f00000000000004000800000000000800050000000af3010004000000000000000000000001000000030000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002f49000020004f3f54a9d2a254a9d2a2000000002bc4645f", 0x94, 0x22100}], 0x0, &(0x7f0000000300)=ANY=[]) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) statx(r1, &(0x7f0000000340)='./file1\x00', 0x0, 0x0, 0x0) ptrace$setregs(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000080)) ioctl$NS_GET_OWNER_UID(0xffffffffffffffff, 0xb704, &(0x7f00000002c0)=0x0) mount$overlay(0x0, &(0x7f0000000080)='./file1\x00', &(0x7f00000000c0), 0x300022, &(0x7f0000000300)={[{@xino_off}], [{@uid_eq={'uid', 0x3d, 0xee01}}, {@uid_eq={'uid', 0x3d, r2}}]}) 13:22:46 executing program 3: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef0100010000002bc4645f000000000000000001000000000000000b0000000001000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e373836333438323637", 0xa2, 0x400}, {&(0x7f0000010100)="0000000000000000000000002f527b43270a4164871303f1137e5908010040000c000000000000002bc4645f", 0x2c, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000500000000000000000000000000000000000000040100004d", 0x39, 0x540}, {&(0x7f0000000040)="00000000000000000000000000000000000000000000000000000000787371fe", 0x20, 0x7e0}, {&(0x7f0000010400)="0200000012000000220000002d000f00030004000000000031245cf20f0062e6000000000000000000000000000000000000000000000000d4189ee9", 0x3c, 0x1000}, {&(0x7f0000012f00)="ed410000001000002bc4645f2bc4645f2bc4645f00000000000004000800000000000800050000000af3010004000000000000000000000001000000030000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002f49000020004f3f54a9d2a254a9d2a2000000002bc4645f", 0x94, 0x22100}], 0x0, &(0x7f0000000300)=ANY=[]) perf_event_open(0x0, 0xffffffffffffffff, 0x3ffffe, 0xffffffffffffffff, 0x0) statx(r0, &(0x7f0000000340)='./file1\x00', 0x0, 0x0, 0x0) ptrace$setregs(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000080)) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) r2 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_opts(r2, 0x6, 0x1, 0x0, &(0x7f0000000000)) dup2(r1, r2) 13:22:46 executing program 4: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000002, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x31) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) waitid$P_PIDFD(0x3, r0, &(0x7f0000000500), 0x9, &(0x7f0000000580)) ptrace$cont(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='pids.events\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x12, r1, 0x0) ftruncate(r1, 0x1000673) ioctl$KDSKBENT(r1, 0x4b47, &(0x7f00000002c0)={0x2, 0x81, 0x5}) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x88400, 0x1a8) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0xd0265000) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) exit_group(0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x31, 0xffffffffffffffff, 0x0) time(&(0x7f0000000180)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14001500, 0x9, &(0x7f0000000300)=[{&(0x7f0000000080)="20060000000100000c190000ce1900000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800)) [ 246.285959][T10975] FAULT_INJECTION: forcing a failure. [ 246.285959][T10975] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 246.293678][T10959] F2FS-fs (loop2): Failed to get valid F2FS checkpoint [ 246.311739][T10971] EXT4-fs (loop4): inodes count not valid: 1312 vs 32 [ 246.344671][T10975] CPU: 1 PID: 10975 Comm: syz-executor.5 Not tainted 5.4.125-syzkaller-00016-gae94e015273b #0 [ 246.354932][T10975] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 246.365029][T10975] Call Trace: [ 246.368317][T10975] dump_stack+0x1d8/0x24e [ 246.372643][T10975] ? devkmsg_release+0x11c/0x11c [ 246.377585][T10975] ? show_regs_print_info+0x12/0x12 [ 246.382790][T10975] ? kmem_cache_alloc_trace+0x139/0x2b0 [ 246.388326][T10975] ? register_shrinker+0x1a/0x170 [ 246.393511][T10975] ? mb_cache_create+0x39d/0x500 [ 246.398438][T10975] ? ext4_fill_super+0x94f2/0xeb30 [ 246.403544][T10975] ? legacy_get_tree+0xde/0x170 [ 246.408391][T10975] ? vfs_get_tree+0x83/0x260 [ 246.412955][T10975] ? do_mount+0x19d0/0x2670 [ 246.417428][T10975] ? ksys_mount+0xc2/0xf0 [ 246.421746][T10975] should_fail+0x6f6/0x860 [ 246.426138][T10975] ? setup_fault_attr+0x3d0/0x3d0 [ 246.431137][T10975] __alloc_pages_nodemask+0x1c4/0x880 [ 246.436482][T10975] ? gfp_pfmemalloc_allowed+0x120/0x120 [ 246.442044][T10975] ? up_write+0xa6/0x270 [ 246.446257][T10975] ? down_write+0xd8/0x150 [ 246.450646][T10975] get_zeroed_page+0x15/0x40 [ 246.455226][T10975] ext4_calculate_overhead+0xc1/0x1000 [ 246.460658][T10975] ? register_shrinker+0x136/0x170 [ 246.465744][T10975] ext4_fill_super+0xab3a/0xeb30 [ 246.470750][T10975] ? ext4_mount+0x40/0x40 [ 246.475055][T10975] ? idr_replace+0x1c4/0x230 [ 246.479618][T10975] ? snprintf+0xd6/0x120 [ 246.483846][T10975] ? vscnprintf+0x80/0x80 [ 246.488156][T10975] ? set_blocksize+0x1a5/0x3a0 [ 246.492891][T10975] mount_bdev+0x22d/0x340 [ 246.497215][T10975] ? ext4_mount+0x40/0x40 [ 246.501545][T10975] legacy_get_tree+0xde/0x170 [ 246.506205][T10975] ? ext4_lazyinit_thread+0xd40/0xd40 [ 246.511547][T10975] vfs_get_tree+0x83/0x260 [ 246.515935][T10975] do_mount+0x19d0/0x2670 [ 246.520411][T10975] ? copy_mount_string+0x30/0x30 [ 246.525421][T10975] ? copy_mount_options+0x59/0x300 [ 246.530515][T10975] ? copy_mount_options+0x59/0x300 [ 246.535604][T10975] ? kmem_cache_alloc_trace+0x139/0x2b0 [ 246.541122][T10975] ? copy_mount_options+0x273/0x300 [ 246.546299][T10975] ksys_mount+0xc2/0xf0 [ 246.550435][T10975] __x64_sys_mount+0xb1/0xc0 [ 246.554997][T10975] do_syscall_64+0xcb/0x1e0 [ 246.559495][T10975] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 246.565361][T10975] RIP: 0033:0x467b1a [ 246.569229][T10975] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 13:22:46 executing program 3: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef0100010000002bc4645f000000000000000001000000000000000b0000000001000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e373836333438323637", 0xa2, 0x400}, {&(0x7f0000010100)="0000000000000000000000002f527b43270a4164871303f1137e5908010040000c000000000000002bc4645f", 0x2c, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000500000000000000000000000000000000000000040100004d", 0x39, 0x540}, {&(0x7f0000000040)="00000000000000000000000000000000000000000000000000000000787371fe", 0x20, 0x7e0}, {&(0x7f0000010400)="0200000012000000220000002d000f00030004000000000031245cf20f0062e6000000000000000000000000000000000000000000000000d4189ee9", 0x3c, 0x1000}, {&(0x7f0000012f00)="ed410000001000002bc4645f2bc4645f2bc4645f00000000000004000800000000000800050000000af3010004000000000000000000000001000000030000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002f49000020004f3f54a9d2a254a9d2a2000000002bc4645f", 0x94, 0x22100}], 0x0, &(0x7f0000000300)=ANY=[]) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='pids.events\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x12, r1, 0x0) ftruncate(r1, 0x1000673) openat(r1, &(0x7f00000001c0)='./file0\x00', 0x22000, 0x40) creat(&(0x7f0000000080)='./file1\x00', 0x50) newfstatat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140), 0x4800) statx(r0, &(0x7f0000000340)='./file1\x00', 0x0, 0x0, 0x0) ptrace$setregs(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000080)) 13:22:46 executing program 4: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000002, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x31) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) waitid$P_PIDFD(0x3, r0, &(0x7f0000000500), 0x9, &(0x7f0000000580)) ptrace$cont(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='pids.events\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x12, r1, 0x0) ftruncate(r1, 0x1000673) ioctl$KDSKBENT(r1, 0x4b47, &(0x7f00000002c0)={0x2, 0x81, 0x5}) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x88400, 0x1a8) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0xd0265000) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) exit_group(0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x31, 0xffffffffffffffff, 0x0) time(&(0x7f0000000180)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14001500, 0x9, &(0x7f0000000300)=[{&(0x7f0000000080)="20070000000100000c190000ce1900000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800)) [ 246.588815][T10975] RSP: 002b:00007f3059253fa8 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 246.597458][T10975] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 0000000000467b1a [ 246.605414][T10975] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007f3059254000 [ 246.613356][T10975] RBP: 00007f3059254040 R08: 00007f3059254040 R09: 0000000020000000 [ 246.621308][T10975] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000020000000 [ 246.629249][T10975] R13: 0000000020000100 R14: 00007f3059254000 R15: 0000000020012c00 13:22:46 executing program 2: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffff, 0xffffffffffffffff, 0x0) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) read(r0, 0x0, 0x0) syz_mount_image$f2fs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x10, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}, {&(0x7f0000010500)='\x00\x00\x00\x00', 0x4, 0xc80}, {&(0x7f0000010700)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e00000010000003000000010000000200000018b2e346f95e497f827e0a", 0x77, 0x1400}, {0x0}, {&(0x7f0000010e00)="d73cd47a0000000000100000000000000b000000000000000d0000001000000012000000170000001600000015000000ffffffffffffffffffffffffffffffffffffffff03000600000000000000000000000000140000000100000000000000ffffffffffffffffffffffffffffffffffffffff05000000000000000000000000000000c5010000060000000100000007000000070000000a0000004000000040000000fc0f00"/181, 0xb5, 0x200000}, {&(0x7f0000010f00)="0000000000000000000000000000000000000000000000000000000009f7a5bb", 0x20, 0x200fe0}, {&(0x7f0000011000)="00000000000000000000000000000000000000000000000000000006", 0x1c, 0x2011e0}, {0x0, 0x0, 0x2012e0}, {&(0x7f0000011400)="000000000000000000000000000000000000000000160000000510ec", 0x1c, 0x201320}, {&(0x7f0000011500)="00000017000000020c60", 0xa, 0x201380}, {&(0x7f0000011600)}, {&(0x7f0000011800)}, {&(0x7f0000011b00)="0000000000000000000000000000000000000000000000000000000100000000d73cd47a0000000000100000000000000b000000000000000d0000001000000012000000170000001600000015000000ffffffffffffffffffffffffffffffffffffffff03000600000000000000000000000000140000000100000000000000ffffffffffffffffffffffffffffffffffffffff05000000000000000000000000000000c5010000060000000100000007000000070000000a0000004000000040000000fc0f", 0xc6, 0x204fe0}, {&(0x7f0000011c00)='\x00'/16, 0x10, 0x205fe0}, {0x0}, {&(0x7f0000013000)="000000000000000000000100000001", 0xf, 0xa00000}], 0x0, &(0x7f0000014b00)) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='pids.events\x00', 0x275a, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x4, 0x2d, 0x9, 0x1, 0x0, 0x7fff, 0x88, 0x4, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x7, 0x0, @perf_bp={&(0x7f00000000c0), 0x1}, 0x9, 0x1, 0x4, 0x9, 0x0, 0xffff, 0x400, 0x0, 0x2, 0x0, 0x1000}, 0x0, 0xe, r1, 0xa) 13:22:46 executing program 5 (fault-call:0 fault-nth:70): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000660000000f000000000000000100000001000000004000000040000020000000daf4655fdaf4655f0100ffff53ef010001000000d9f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010100)}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000100000000000000000000000000000000000000000000003000000000000000", 0x40, 0x540}, {&(0x7f0000010300)="02000000030000000400000066000f000300040000000000000000000f007f5c", 0x20, 0x800}, {&(0x7f0000011500)="ed41000000080000d9f4655fdaf4655fdaf4655f000000000000040004", 0x1d, 0x2200}, {0x0}, {&(0x7f0000011900)="ed8100001a040000daf4655fdaf4655fdaf4655f000000000000010004000000000000000100000014000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000039c34d38000000000000000000000000000000000000000000000000200000007412ab417412ab417412ab41daf4655f7412ab410000000000000000", 0xa0, 0x3800}], 0x0, &(0x7f0000012c00)) 13:22:46 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_mount_image$f2fs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0xf, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}, {&(0x7f0000010500)='\x00\x00\x00\x00', 0x4, 0xc80}, {&(0x7f0000010700)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e00000010000003000000010000000200000018b2e346f95e497f827e0a", 0x77, 0x1400}, {0x0}, {&(0x7f0000010e00)="d73cd47a0000000000100000000000000b000000000000000d0000001000000012000000170000001600000015000000ffffffffffffffffffffffffffffffffffffffff03000600000000000000000000000000140000000100000000000000ffffffffffffffffffffffffffffffffffffffff05000000000000000000000000000000c5010000060000000100000007000000070000000a0000004000000040000000fc0f00"/181, 0xb5, 0x200000}, {&(0x7f0000010f00)="0000000000000000000000000000000000000000000000000000000009f7a5bb", 0x20, 0x200fe0}, {&(0x7f0000011000)="00000000000000000000000000000000000000000000000000000006", 0x1c, 0x2011e0}, {0x0, 0x0, 0x2012e0}, {&(0x7f0000011400)="000000000000000000000000000000000000000000160000000510ec", 0x1c, 0x201320}, {&(0x7f0000011500)="00000017000000020c60", 0xa, 0x201380}, {&(0x7f0000011600)}, {&(0x7f0000011800)}, {&(0x7f0000011b00)="0000000000000000000000000000000000000000000000000000000100000000d73cd47a0000000000100000000000000b000000000000000d0000001000000012000000170000001600000015000000ffffffffffffffffffffffffffffffffffffffff03000600000000000000000000000000140000000100000000000000ffffffffffffffffffffffffffffffffffffffff05000000000000000000000000000000c5010000060000000100000007000000070000000a00", 0xba, 0x204fe0}, {&(0x7f0000011c00)="0000000000000000000000000000000000000000000000000000000009f7a5bb", 0x20, 0x205fe0}, {0x0, 0x0, 0x401320}], 0x0, &(0x7f0000014b00)) 13:22:46 executing program 3: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffff, 0xffffffffffffffff, 0x0) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) read(r0, 0x0, 0x0) syz_mount_image$f2fs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x10, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}, {&(0x7f0000010500)='\x00\x00\x00\x00', 0x4, 0xc80}, {&(0x7f0000010700)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e00000010000003000000010000000200000018b2e346f95e497f827e0a", 0x77, 0x1400}, {0x0}, {&(0x7f0000010e00)="d73cd47a0000000000100000000000000b000000000000000d0000001000000012000000170000001600000015000000ffffffffffffffffffffffffffffffffffffffff03000600000000000000000000000000140000000100000000000000ffffffffffffffffffffffffffffffffffffffff05000000000000000000000000000000c5010000060000000100000007000000070000000a0000004000000040000000fc0f00"/181, 0xb5, 0x200000}, {&(0x7f0000010f00)="0000000000000000000000000000000000000000000000000000000009f7a5bb", 0x20, 0x200fe0}, {&(0x7f0000011000)="00000000000000000000000000000000000000000000000000000006", 0x1c, 0x2011e0}, {0x0, 0x0, 0x2012e0}, {&(0x7f0000011400)="000000000000000000000000000000000000000000160000000510ec", 0x1c, 0x201320}, {&(0x7f0000011500)="00000017000000020c60", 0xa, 0x201380}, {&(0x7f0000011600)}, {&(0x7f0000011800)}, {&(0x7f0000011b00)="0000000000000000000000000000000000000000000000000000000100000000d73cd47a0000000000100000000000000b000000000000000d0000001000000012000000170000001600000015000000ffffffffffffffffffffffffffffffffffffffff03000600000000000000000000000000140000000100000000000000ffffffffffffffffffffffffffffffffffffffff05000000000000000000000000000000c5010000060000000100000007000000070000000a0000004000000040000000fc0f", 0xc6, 0x204fe0}, {&(0x7f0000011c00), 0x0, 0x205fe0}, {0x0}, {&(0x7f0000013000)="000000000000000000000100000001", 0xf, 0xa00000}], 0x0, &(0x7f0000014b00)) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='pids.events\x00', 0x275a, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x4, 0x2d, 0x9, 0x1, 0x0, 0x7fff, 0x88, 0x4, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x7, 0x0, @perf_bp={&(0x7f00000000c0), 0x1}, 0x9, 0x1, 0x4, 0x9, 0x0, 0xffff, 0x400, 0x0, 0x2, 0x0, 0x1000}, 0x0, 0xe, r1, 0xa) 13:22:46 executing program 1: clone(0x13102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) poll(0x0, 0x0, 0x8000000000000200) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f00000025c0)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00'}) ioctl$TUNSETLINK(r0, 0xc0045878, 0x30a) r2 = openat$selinux_attr(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) mmap(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x6, 0x1010, r2, 0xdc5f7000) close(r0) r3 = socket$inet_tcp(0x2, 0x1, 0x0) preadv(r3, 0x0, 0x0, 0x7fffffff, 0x1) [ 246.885462][T11006] EXT4-fs (loop4): inodes count not valid: 1824 vs 32 [ 246.892921][T11009] FAULT_INJECTION: forcing a failure. [ 246.892921][T11009] name failslab, interval 1, probability 0, space 0, times 0 [ 246.900902][T11012] F2FS-fs (loop0): invalid crc_offset: 0 [ 246.908330][T11009] CPU: 1 PID: 11009 Comm: syz-executor.5 Not tainted 5.4.125-syzkaller-00016-gae94e015273b #0 [ 246.914666][T11012] F2FS-fs (loop0): invalid crc_offset: 0 [ 246.921436][T11009] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 246.921440][T11009] Call Trace: [ 246.921462][T11009] dump_stack+0x1d8/0x24e [ 246.921472][T11009] ? devkmsg_release+0x11c/0x11c [ 246.921481][T11009] ? show_regs_print_info+0x12/0x12 [ 246.921492][T11009] should_fail+0x6f6/0x860 [ 246.921503][T11009] ? setup_fault_attr+0x3d0/0x3d0 [ 246.921512][T11009] ? alloc_workqueue+0x1cb/0x11d0 [ 246.921523][T11009] should_failslab+0x5/0x20 [ 246.921533][T11009] kmem_cache_alloc_trace+0x39/0x2b0 [ 246.921541][T11009] ? alloc_workqueue+0x156/0x11d0 [ 246.921551][T11009] ? free_unref_page_commit+0x11e/0x3a0 [ 246.921560][T11009] alloc_workqueue+0x1cb/0x11d0 [ 246.921570][T11009] ? __free_pages_core+0x190/0x190 [ 246.921585][T11009] ? ext4_bg_has_super+0xbb/0x390 [ 246.932515][T11012] F2FS-fs (loop0): Failed to get valid F2FS checkpoint [ 246.937251][T11009] ? ext4_fill_super+0xab45/0xeb30 [ 246.937260][T11009] ? apply_workqueue_attrs_locked+0x6d0/0x6d0 [ 246.937278][T11009] ext4_fill_super+0xaa33/0xeb30 [ 247.027533][T11009] ? ext4_mount+0x40/0x40 [ 247.031885][T11009] ? idr_replace+0x1c4/0x230 [ 247.036461][T11009] ? snprintf+0xd6/0x120 [ 247.040688][T11009] ? vscnprintf+0x80/0x80 [ 247.045015][T11009] ? set_blocksize+0x1a5/0x3a0 [ 247.049769][T11009] mount_bdev+0x22d/0x340 [ 247.054079][T11009] ? ext4_mount+0x40/0x40 [ 247.058391][T11009] legacy_get_tree+0xde/0x170 [ 247.063059][T11009] ? ext4_lazyinit_thread+0xd40/0xd40 [ 247.068423][T11009] vfs_get_tree+0x83/0x260 [ 247.072822][T11009] do_mount+0x19d0/0x2670 [ 247.077139][T11009] ? copy_mount_string+0x30/0x30 [ 247.082055][T11009] ? copy_mount_options+0x59/0x300 [ 247.087149][T11009] ? copy_mount_options+0x59/0x300 [ 247.092245][T11009] ? kmem_cache_alloc_trace+0x139/0x2b0 [ 247.097850][T11009] ? copy_mount_options+0x273/0x300 [ 247.103024][T11009] ksys_mount+0xc2/0xf0 [ 247.107157][T11009] __x64_sys_mount+0xb1/0xc0 [ 247.111723][T11009] do_syscall_64+0xcb/0x1e0 [ 247.116227][T11009] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 247.122091][T11009] RIP: 0033:0x467b1a [ 247.125981][T11009] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 247.145566][T11009] RSP: 002b:00007f3059253fa8 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 247.153956][T11009] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 0000000000467b1a [ 247.161898][T11009] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007f3059254000 [ 247.169842][T11009] RBP: 00007f3059254040 R08: 00007f3059254040 R09: 0000000020000000 [ 247.177784][T11009] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000020000000 [ 247.185737][T11009] R13: 0000000020000100 R14: 00007f3059254000 R15: 0000000020012c00 [ 247.198052][T11009] EXT4-fs: failed to create workqueue [ 247.203464][T11009] EXT4-fs (loop5): mount failed 13:22:47 executing program 3: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffff, 0xffffffffffffffff, 0x0) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) read(r0, 0x0, 0x0) syz_mount_image$f2fs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x10, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}, {&(0x7f0000010500)='\x00\x00\x00\x00', 0x4, 0xc80}, {&(0x7f0000010700)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e00000010000003000000010000000200000018b2e346f95e497f827e0a", 0x77, 0x1400}, {0x0}, {&(0x7f0000010e00)="d73cd47a0000000000100000000000000b000000000000000d0000001000000012000000170000001600000015000000ffffffffffffffffffffffffffffffffffffffff03000600000000000000000000000000140000000100000000000000ffffffffffffffffffffffffffffffffffffffff05000000000000000000000000000000c5010000060000000100000007000000070000000a0000004000000040000000fc0f00"/181, 0xb5, 0x200000}, {&(0x7f0000010f00)="0000000000000000000000000000000000000000000000000000000009f7a5bb", 0x20, 0x200fe0}, {&(0x7f0000011000)="00000000000000000000000000000000000000000000000000000006", 0x1c, 0x2011e0}, {0x0, 0x0, 0x2012e0}, {&(0x7f0000011400)="000000000000000000000000000000000000000000160000000510ec", 0x1c, 0x201320}, {&(0x7f0000011500)="00000017000000020c60", 0xa, 0x201380}, {&(0x7f0000011600)}, {&(0x7f0000011800)}, {&(0x7f0000011b00)="0000000000000000000000000000000000000000000000000000000100000000d73cd47a0000000000100000000000000b000000000000000d0000001000000012000000170000001600000015000000ffffffffffffffffffffffffffffffffffffffff03000600000000000000000000000000140000000100000000000000ffffffffffffffffffffffffffffffffffffffff05000000000000000000000000000000c5010000060000000100000007000000070000000a0000004000000040000000fc0f", 0xc6, 0x204fe0}, {0x0, 0x0, 0x205fe0}, {0x0}, {&(0x7f0000013000)="000000000000000000000100000001", 0xf, 0xa00000}], 0x0, &(0x7f0000014b00)) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='pids.events\x00', 0x275a, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x4, 0x2d, 0x9, 0x1, 0x0, 0x7fff, 0x88, 0x4, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x7, 0x0, @perf_bp={&(0x7f00000000c0), 0x1}, 0x9, 0x1, 0x4, 0x9, 0x0, 0xffff, 0x400, 0x0, 0x2, 0x0, 0x1000}, 0x0, 0xe, r1, 0xa) 13:22:47 executing program 5 (fault-call:0 fault-nth:71): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000660000000f000000000000000100000001000000004000000040000020000000daf4655fdaf4655f0100ffff53ef010001000000d9f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010100)}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000100000000000000000000000000000000000000000000003000000000000000", 0x40, 0x540}, {&(0x7f0000010300)="02000000030000000400000066000f000300040000000000000000000f007f5c", 0x20, 0x800}, {&(0x7f0000011500)="ed41000000080000d9f4655fdaf4655fdaf4655f000000000000040004", 0x1d, 0x2200}, {0x0}, {&(0x7f0000011900)="ed8100001a040000daf4655fdaf4655fdaf4655f000000000000010004000000000000000100000014000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000039c34d38000000000000000000000000000000000000000000000000200000007412ab417412ab417412ab41daf4655f7412ab410000000000000000", 0xa0, 0x3800}], 0x0, &(0x7f0000012c00)) 13:22:47 executing program 4: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000002, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x31) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) waitid$P_PIDFD(0x3, r0, &(0x7f0000000500), 0x9, &(0x7f0000000580)) ptrace$cont(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='pids.events\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x12, r1, 0x0) ftruncate(r1, 0x1000673) ioctl$KDSKBENT(r1, 0x4b47, &(0x7f00000002c0)={0x2, 0x81, 0x5}) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x88400, 0x1a8) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0xd0265000) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) exit_group(0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x31, 0xffffffffffffffff, 0x0) time(&(0x7f0000000180)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14001500, 0x9, &(0x7f0000000300)=[{&(0x7f0000000080)="20080000000100000c190000ce1900000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800)) 13:22:47 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_mount_image$f2fs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0xf, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}, {&(0x7f0000010500)='\x00\x00\x00\x00', 0x4, 0xc80}, {&(0x7f0000010700)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e00000010000003000000010000000200000018b2e346f95e497f827e0a", 0x77, 0x1400}, {0x0}, {&(0x7f0000010e00)="d73cd47a0000000000100000000000000b000000000000000d0000001000000012000000170000001600000015000000ffffffffffffffffffffffffffffffffffffffff03000600000000000000000000000000140000000100000000000000ffffffffffffffffffffffffffffffffffffffff05000000000000000000000000000000c5010000060000000100000007000000070000000a0000004000000040000000fc0f00"/181, 0xb5, 0x200000}, {&(0x7f0000010f00)="0000000000000000000000000000000000000000000000000000000009f7a5bb", 0x20, 0x200fe0}, {&(0x7f0000011000)="00000000000000000000000000000000000000000000000000000006", 0x1c, 0x2011e0}, {0x0, 0x0, 0x2012e0}, {&(0x7f0000011400)="000000000000000000000000000000000000000000160000000510ec", 0x1c, 0x201320}, {&(0x7f0000011500)="00000017000000020c60", 0xa, 0x201380}, {&(0x7f0000011600)}, {&(0x7f0000011800)}, {&(0x7f0000011b00)="0000000000000000000000000000000000000000000000000000000100000000d73cd47a0000000000100000000000000b000000000000000d0000001000000012000000170000001600000015000000ffffffffffffffffffffffffffffffffffffffff03000600000000000000000000000000140000000100000000000000ffffffffffffffffffffffffffffffffffffffff05000000000000000000000000000000c5010000060000000100000007000000070000000a00", 0xba, 0x204fe0}, {&(0x7f0000011c00)="0000000000000000000000000000000000000000000000000000000009f7a5bb", 0x20, 0x205fe0}, {0x0, 0x0, 0x401320}], 0x0, &(0x7f0000014b00)) [ 247.262957][T11021] F2FS-fs (loop2): invalid crc value [ 247.269633][T11021] F2FS-fs (loop2): invalid crc_offset: 0 [ 247.279715][T11021] F2FS-fs (loop2): Failed to get valid F2FS checkpoint 13:22:47 executing program 3: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_mount_image$f2fs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0xf, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}, {&(0x7f0000010500)='\x00\x00\x00\x00', 0x4, 0xc80}, {&(0x7f0000010700)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e00000010000003000000010000000200000018b2e346f95e497f827e0a", 0x77, 0x1400}, {0x0}, {&(0x7f0000010e00)="d73cd47a0000000000100000000000000b000000000000000d0000001000000012000000170000001600000015000000ffffffffffffffffffffffffffffffffffffffff03000600000000000000000000000000140000000100000000000000ffffffffffffffffffffffffffffffffffffffff05000000000000000000000000000000c5010000060000000100000007000000070000000a0000004000000040000000fc0f00"/181, 0xb5, 0x200000}, {&(0x7f0000010f00)="0000000000000000000000000000000000000000000000000000000009f7a5bb", 0x20, 0x200fe0}, {&(0x7f0000011000)="00000000000000000000000000000000000000000000000000000006", 0x1c, 0x2011e0}, {0x0, 0x0, 0x2012e0}, {&(0x7f0000011400)="000000000000000000000000000000000000000000160000000510ec", 0x1c, 0x201320}, {&(0x7f0000011500)="00000017000000020c60", 0xa, 0x201380}, {&(0x7f0000011600)}, {&(0x7f0000011800)}, {&(0x7f0000011b00)="0000000000000000000000000000000000000000000000000000000100000000d73cd47a0000000000100000000000000b000000000000000d0000001000000012000000170000001600000015000000ffffffffffffffffffffffffffffffffffffffff03000600000000000000000000000000140000000100000000000000ffffffffffffffffffffffffffffffffffffffff05", 0x95, 0x204fe0}, {&(0x7f0000011c00)="0000000000000000000000000000000000000000000000000000000009f7a5bb", 0x20, 0x205fe0}, {0x0, 0x0, 0x401320}], 0x0, &(0x7f0000014b00)) [ 247.333328][T11038] EXT4-fs (loop4): inodes count not valid: 2080 vs 32 [ 247.340487][T11044] FAULT_INJECTION: forcing a failure. [ 247.340487][T11044] name failslab, interval 1, probability 0, space 0, times 0 [ 247.353970][T11044] CPU: 1 PID: 11044 Comm: syz-executor.5 Not tainted 5.4.125-syzkaller-00016-gae94e015273b #0 [ 247.364210][T11044] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 247.374236][T11044] Call Trace: [ 247.377504][T11044] dump_stack+0x1d8/0x24e [ 247.381808][T11044] ? devkmsg_release+0x11c/0x11c [ 247.386726][T11044] ? arch_stack_walk+0xf8/0x140 [ 247.391556][T11044] ? show_regs_print_info+0x12/0x12 [ 247.396725][T11044] should_fail+0x6f6/0x860 [ 247.401128][T11044] ? setup_fault_attr+0x3d0/0x3d0 [ 247.406126][T11044] ? stack_trace_save+0x1f0/0x1f0 [ 247.411123][T11044] ? __kernel_text_address+0x93/0x100 [ 247.416464][T11044] ? unwind_get_return_address+0x48/0x80 [ 247.422071][T11044] ? apply_wqattrs_prepare+0xcb/0x17e0 [ 247.427521][T11044] should_failslab+0x5/0x20 [ 247.432003][T11044] kmem_cache_alloc_trace+0x39/0x2b0 [ 247.437261][T11044] apply_wqattrs_prepare+0xcb/0x17e0 [ 247.442518][T11044] ? alloc_workqueue+0x1cb/0x11d0 [ 247.447518][T11044] ? ext4_fill_super+0xaa33/0xeb30 [ 247.452599][T11044] ? mount_bdev+0x22d/0x340 [ 247.457071][T11044] ? legacy_get_tree+0xde/0x170 [ 247.461892][T11044] ? vfs_get_tree+0x83/0x260 [ 247.466452][T11044] ? do_mount+0x19d0/0x2670 [ 247.470935][T11044] ? ksys_mount+0xc2/0xf0 [ 247.475235][T11044] ? __x64_sys_mount+0xb1/0xc0 [ 247.479980][T11044] ? do_syscall_64+0xcb/0x1e0 [ 247.484630][T11044] ? entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 247.490677][T11044] ? format_decode+0x441/0x1ab0 [ 247.495501][T11044] ? cwt_wakefn+0x70/0x70 [ 247.499802][T11044] ? vsnprintf+0x1d60/0x1d60 [ 247.504362][T11044] ? vsnprintf+0x1e4/0x1d60 [ 247.508835][T11044] apply_workqueue_attrs_locked+0x136/0x6d0 [ 247.514701][T11044] ? check_preemption_disabled+0x9e/0x330 [ 247.520409][T11044] ? apply_workqueue_attrs+0x40/0x40 [ 247.525692][T11044] ? mutex_lock+0xa6/0x110 [ 247.530080][T11044] ? mutex_trylock+0xb0/0xb0 [ 247.534642][T11044] ? kmem_cache_alloc_trace+0x139/0x2b0 [ 247.540186][T11044] ? free_unref_page_commit+0x11e/0x3a0 [ 247.545713][T11044] alloc_workqueue+0xcc4/0x11d0 [ 247.550636][T11044] ? ext4_fill_super+0xab45/0xeb30 [ 247.555803][T11044] ? apply_workqueue_attrs_locked+0x6d0/0x6d0 [ 247.561844][T11044] ext4_fill_super+0xaa33/0xeb30 [ 247.566760][T11044] ? ext4_mount+0x40/0x40 [ 247.571062][T11044] ? idr_replace+0x1c4/0x230 [ 247.575620][T11044] ? snprintf+0xd6/0x120 [ 247.579835][T11044] ? vscnprintf+0x80/0x80 [ 247.584134][T11044] ? set_blocksize+0x1a5/0x3a0 [ 247.588868][T11044] mount_bdev+0x22d/0x340 [ 247.593166][T11044] ? ext4_mount+0x40/0x40 [ 247.597467][T11044] legacy_get_tree+0xde/0x170 [ 247.602119][T11044] ? ext4_lazyinit_thread+0xd40/0xd40 [ 247.607460][T11044] vfs_get_tree+0x83/0x260 [ 247.611853][T11044] do_mount+0x19d0/0x2670 [ 247.616159][T11044] ? copy_mount_string+0x30/0x30 [ 247.621064][T11044] ? copy_mount_options+0x59/0x300 [ 247.626145][T11044] ? copy_mount_options+0x59/0x300 [ 247.631226][T11044] ? kmem_cache_alloc_trace+0x139/0x2b0 [ 247.636741][T11044] ? copy_mount_options+0x273/0x300 [ 247.641908][T11044] ksys_mount+0xc2/0xf0 [ 247.646034][T11044] __x64_sys_mount+0xb1/0xc0 [ 247.650596][T11044] do_syscall_64+0xcb/0x1e0 [ 247.655071][T11044] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 247.660934][T11044] RIP: 0033:0x467b1a [ 247.664798][T11044] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 247.684371][T11044] RSP: 002b:00007f3059253fa8 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 247.692760][T11044] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 0000000000467b1a [ 247.700703][T11044] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007f3059254000 [ 247.708648][T11044] RBP: 00007f3059254040 R08: 00007f3059254040 R09: 0000000020000000 [ 247.716591][T11044] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000020000000 [ 247.724532][T11044] R13: 0000000020000100 R14: 00007f3059254000 R15: 0000000020012c00 13:22:47 executing program 2: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffff, 0xffffffffffffffff, 0x0) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) read(r0, 0x0, 0x0) syz_mount_image$f2fs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x10, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}, {&(0x7f0000010500)='\x00\x00\x00\x00', 0x4, 0xc80}, {&(0x7f0000010700)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e00000010000003000000010000000200000018b2e346f95e497f827e0a", 0x77, 0x1400}, {0x0}, {&(0x7f0000010e00)="d73cd47a0000000000100000000000000b000000000000000d0000001000000012000000170000001600000015000000ffffffffffffffffffffffffffffffffffffffff03000600000000000000000000000000140000000100000000000000ffffffffffffffffffffffffffffffffffffffff05000000000000000000000000000000c5010000060000000100000007000000070000000a0000004000000040000000fc0f00"/181, 0xb5, 0x200000}, {&(0x7f0000010f00)="0000000000000000000000000000000000000000000000000000000009f7a5bb", 0x20, 0x200fe0}, {&(0x7f0000011000)="00000000000000000000000000000000000000000000000000000006", 0x1c, 0x2011e0}, {0x0, 0x0, 0x2012e0}, {&(0x7f0000011400)="000000000000000000000000000000000000000000160000000510ec", 0x1c, 0x201320}, {&(0x7f0000011500)="00000017000000020c60", 0xa, 0x201380}, {&(0x7f0000011600)}, {&(0x7f0000011800)}, {&(0x7f0000011b00)="0000000000000000000000000000000000000000000000000000000100000000d73cd47a0000000000100000000000000b000000000000000d0000001000000012000000170000001600000015000000ffffffffffffffffffffffffffffffffffffffff03000600000000000000000000000000140000000100000000000000ffffffffffffffffffffffffffffffffffffffff05000000000000000000000000000000c5010000060000000100000007000000070000000a0000004000000040000000fc0f", 0xc6, 0x204fe0}, {&(0x7f0000011c00)='\x00'/16, 0x10, 0x205fe0}, {0x0}, {&(0x7f0000013000)="000000000000000000000100000001", 0xf, 0xa00000}], 0x0, &(0x7f0000014b00)) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='pids.events\x00', 0x275a, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x4, 0x2d, 0x9, 0x1, 0x0, 0x7fff, 0x88, 0x4, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x7, 0x0, @perf_bp={&(0x7f00000000c0), 0x1}, 0x9, 0x1, 0x4, 0x9, 0x0, 0xffff, 0x400, 0x0, 0x2, 0x0, 0x1000}, 0x0, 0xe, r1, 0xa) [ 247.733520][T11044] EXT4-fs: failed to create workqueue [ 247.740340][T11044] EXT4-fs (loop5): mount failed 13:22:47 executing program 1: clone(0x13102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) poll(0x0, 0x0, 0x8000000000000200) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f00000025c0)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00'}) ioctl$TUNSETLINK(r0, 0xc0045878, 0x30a) r2 = openat$selinux_attr(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) mmap(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x6, 0x1010, r2, 0xdc5f7000) close(r0) r3 = socket$inet_tcp(0x2, 0x1, 0x0) preadv(r3, 0x0, 0x0, 0x7fffffff, 0x1) 13:22:47 executing program 3: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffff, 0xffffffffffffffff, 0x0) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) read(r0, 0x0, 0x0) syz_mount_image$f2fs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x10, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}, {&(0x7f0000010500)='\x00\x00\x00\x00', 0x4, 0xc80}, {&(0x7f0000010700)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e00000010000003000000010000000200000018b2e346f95e497f827e0a", 0x77, 0x1400}, {0x0}, {&(0x7f0000010e00)="d73cd47a0000000000100000000000000b000000000000000d0000001000000012000000170000001600000015000000ffffffffffffffffffffffffffffffffffffffff03000600000000000000000000000000140000000100000000000000ffffffffffffffffffffffffffffffffffffffff05000000000000000000000000000000c5010000060000000100000007000000070000000a0000004000000040000000fc0f00"/181, 0xb5, 0x200000}, {&(0x7f0000010f00)="0000000000000000000000000000000000000000000000000000000009f7a5bb", 0x20, 0x200fe0}, {&(0x7f0000011000)="00000000000000000000000000000000000000000000000000000006", 0x1c, 0x2011e0}, {0x0, 0x0, 0x2012e0}, {&(0x7f0000011400)="000000000000000000000000000000000000000000160000000510ec", 0x1c, 0x201320}, {&(0x7f0000011500)="00000017000000020c60", 0xa, 0x201380}, {&(0x7f0000011600)}, {&(0x7f0000011800)}, {&(0x7f0000011b00)="0000000000000000000000000000000000000000000000000000000100000000d73cd47a0000000000100000000000000b000000000000000d0000001000000012000000170000001600000015000000ffffffffffffffffffffffffffffffffffffffff03000600000000000000000000000000140000000100000000000000ffffffffffffffffffffffffffffffffffffffff05000000000000000000000000000000c5010000060000000100000007000000070000000a0000004000000040000000fc0f", 0xc6, 0x204fe0}, {&(0x7f0000011c00)='\x00'/16, 0x10, 0x205fe0}, {0x0}, {&(0x7f0000013000)="000000000000000000000100000001", 0xf, 0xa00000}], 0x0, &(0x7f0000014b00)) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='pids.events\x00', 0x275a, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x4, 0x2d, 0x9, 0x1, 0x0, 0x7fff, 0x88, 0x4, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x7, 0x0, @perf_bp={&(0x7f00000000c0), 0x1}, 0x9, 0x1, 0x4, 0x9, 0x0, 0xffff, 0x400, 0x0, 0x2, 0x0, 0x1000}, 0x0, 0xe, r1, 0xa) 13:22:47 executing program 5 (fault-call:0 fault-nth:72): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000660000000f000000000000000100000001000000004000000040000020000000daf4655fdaf4655f0100ffff53ef010001000000d9f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010100)}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000100000000000000000000000000000000000000000000003000000000000000", 0x40, 0x540}, {&(0x7f0000010300)="02000000030000000400000066000f000300040000000000000000000f007f5c", 0x20, 0x800}, {&(0x7f0000011500)="ed41000000080000d9f4655fdaf4655fdaf4655f000000000000040004", 0x1d, 0x2200}, {0x0}, {&(0x7f0000011900)="ed8100001a040000daf4655fdaf4655fdaf4655f000000000000010004000000000000000100000014000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000039c34d38000000000000000000000000000000000000000000000000200000007412ab417412ab417412ab41daf4655f7412ab410000000000000000", 0xa0, 0x3800}], 0x0, &(0x7f0000012c00)) 13:22:47 executing program 4: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000002, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x31) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) waitid$P_PIDFD(0x3, r0, &(0x7f0000000500), 0x9, &(0x7f0000000580)) ptrace$cont(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='pids.events\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x12, r1, 0x0) ftruncate(r1, 0x1000673) ioctl$KDSKBENT(r1, 0x4b47, &(0x7f00000002c0)={0x2, 0x81, 0x5}) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x88400, 0x1a8) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0xd0265000) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) exit_group(0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x31, 0xffffffffffffffff, 0x0) time(&(0x7f0000000180)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14001500, 0x9, &(0x7f0000000300)=[{&(0x7f0000000080)="20090000000100000c190000ce1900000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800)) [ 247.810322][T11047] F2FS-fs (loop0): invalid crc_offset: 0 [ 247.818072][T11047] F2FS-fs (loop0): invalid crc_offset: 0 [ 247.823783][T11047] F2FS-fs (loop0): Failed to get valid F2FS checkpoint 13:22:47 executing program 3: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffff, 0xffffffffffffffff, 0x0) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) read(r0, 0x0, 0x0) syz_mount_image$f2fs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x10, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}, {&(0x7f0000010500)='\x00\x00\x00\x00', 0x4, 0xc80}, {&(0x7f0000010700)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e00000010000003000000010000000200000018b2e346f95e497f827e0a", 0x77, 0x1400}, {0x0}, {&(0x7f0000010e00)="d73cd47a0000000000100000000000000b000000000000000d0000001000000012000000170000001600000015000000ffffffffffffffffffffffffffffffffffffffff03000600000000000000000000000000140000000100000000000000ffffffffffffffffffffffffffffffffffffffff05000000000000000000000000000000c5010000060000000100000007000000070000000a0000004000000040000000fc0f00"/181, 0xb5, 0x200000}, {&(0x7f0000010f00)="0000000000000000000000000000000000000000000000000000000009f7a5bb", 0x20, 0x200fe0}, {&(0x7f0000011000)="00000000000000000000000000000000000000000000000000000006", 0x1c, 0x2011e0}, {0x0, 0x0, 0x2012e0}, {&(0x7f0000011400)="000000000000000000000000000000000000000000160000000510ec", 0x1c, 0x201320}, {&(0x7f0000011500)="00000017000000020c60", 0xa, 0x201380}, {&(0x7f0000011600)}, {&(0x7f0000011800)}, {&(0x7f0000011b00)="0000000000000000000000000000000000000000000000000000000100000000d73cd47a0000000000100000000000000b000000000000000d0000001000000012000000170000001600000015000000ffffffffffffffffffffffffffffffffffffffff03000600000000000000000000000000140000000100000000000000ffffffffffffffffffffffffffffffffffffffff05000000000000000000000000000000c5010000060000000100000007000000070000000a0000004000000040000000fc0f", 0xc6, 0x204fe0}, {0x0, 0x0, 0x205fe0}, {0x0}, {&(0x7f0000013000)="000000000000000000000100000001", 0xf, 0xa00000}], 0x0, &(0x7f0000014b00)) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='pids.events\x00', 0x275a, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x4, 0x2d, 0x9, 0x1, 0x0, 0x7fff, 0x88, 0x4, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x7, 0x0, @perf_bp={&(0x7f00000000c0), 0x1}, 0x9, 0x1, 0x4, 0x9, 0x0, 0xffff, 0x400, 0x0, 0x2, 0x0, 0x1000}, 0x0, 0xe, r1, 0xa) [ 247.866276][T11061] F2FS-fs (loop2): invalid crc value [ 247.873017][T11071] FAULT_INJECTION: forcing a failure. [ 247.873017][T11071] name failslab, interval 1, probability 0, space 0, times 0 [ 247.886783][T11071] CPU: 0 PID: 11071 Comm: syz-executor.5 Not tainted 5.4.125-syzkaller-00016-gae94e015273b #0 [ 247.886790][T11061] F2FS-fs (loop2): invalid crc_offset: 0 [ 247.897007][T11071] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 247.897011][T11071] Call Trace: [ 247.897030][T11071] dump_stack+0x1d8/0x24e [ 247.897040][T11071] ? devkmsg_release+0x11c/0x11c [ 247.897049][T11071] ? arch_stack_walk+0xf8/0x140 [ 247.897057][T11071] ? show_regs_print_info+0x12/0x12 [ 247.897070][T11071] should_fail+0x6f6/0x860 [ 247.897085][T11071] ? setup_fault_attr+0x3d0/0x3d0 [ 247.915128][T11061] F2FS-fs (loop2): Failed to get valid F2FS checkpoint [ 247.916110][T11071] ? stack_trace_save+0x1f0/0x1f0 [ 247.916120][T11071] ? __kernel_text_address+0x93/0x100 13:22:47 executing program 3: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_mount_image$f2fs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0xf, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}, {&(0x7f0000010500)='\x00\x00\x00\x00', 0x4, 0xc80}, {&(0x7f0000010700)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e00000010000003000000010000000200000018b2e346f95e497f827e0a", 0x77, 0x1400}, {0x0}, {&(0x7f0000010e00)="d73cd47a0000000000100000000000000b000000000000000d0000001000000012000000170000001600000015000000ffffffffffffffffffffffffffffffffffffffff03000600000000000000000000000000140000000100000000000000ffffffffffffffffffffffffffffffffffffffff05000000000000000000000000000000c5010000060000000100000007000000070000000a0000004000000040000000fc0f00"/181, 0xb5, 0x200000}, {&(0x7f0000010f00)="0000000000000000000000000000000000000000000000000000000009f7a5bb", 0x20, 0x200fe0}, {&(0x7f0000011000)="00000000000000000000000000000000000000000000000000000006", 0x1c, 0x2011e0}, {0x0, 0x0, 0x2012e0}, {&(0x7f0000011400)="000000000000000000000000000000000000000000160000000510ec", 0x1c, 0x201320}, {&(0x7f0000011500)="00000017000000020c60", 0xa, 0x201380}, {&(0x7f0000011600)}, {&(0x7f0000011800)}, {&(0x7f0000011b00)="0000000000000000000000000000000000000000000000000000000100000000d73cd47a0000000000100000000000000b000000000000000d0000001000000012000000170000001600000015000000ffffffffffffffffffffffffffffffffffffffff03000600000000000000000000000000140000000100000000000000ffffffffffffffffffffffffffffffffffffffff05", 0x95, 0x204fe0}, {&(0x7f0000011c00)="0000000000000000000000000000000000000000000000000000000009f7a5bb", 0x20, 0x205fe0}, {0x0, 0x0, 0x401320}], 0x0, &(0x7f0000014b00)) [ 247.916129][T11071] ? unwind_get_return_address+0x48/0x80 [ 247.916137][T11071] ? apply_wqattrs_prepare+0xcb/0x17e0 [ 247.916151][T11071] should_failslab+0x5/0x20 [ 247.952585][T11070] EXT4-fs (loop4): inodes count not valid: 2336 vs 32 [ 247.957453][T11071] kmem_cache_alloc_trace+0x39/0x2b0 [ 247.957465][T11071] apply_wqattrs_prepare+0xcb/0x17e0 [ 247.957473][T11071] ? alloc_workqueue+0x1cb/0x11d0 [ 247.957483][T11071] ? ext4_fill_super+0xaa33/0xeb30 [ 247.957498][T11071] ? mount_bdev+0x22d/0x340 [ 248.010219][T11071] ? legacy_get_tree+0xde/0x170 [ 248.015053][T11071] ? vfs_get_tree+0x83/0x260 [ 248.019712][T11071] ? do_mount+0x19d0/0x2670 [ 248.024190][T11071] ? ksys_mount+0xc2/0xf0 [ 248.028498][T11071] ? __x64_sys_mount+0xb1/0xc0 [ 248.033236][T11071] ? do_syscall_64+0xcb/0x1e0 [ 248.037883][T11071] ? entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 248.043921][T11071] ? format_decode+0x441/0x1ab0 [ 248.048781][T11071] ? cwt_wakefn+0x70/0x70 [ 248.053077][T11071] ? vsnprintf+0x1d60/0x1d60 [ 248.057638][T11071] ? vsnprintf+0x1e4/0x1d60 [ 248.062156][T11071] apply_workqueue_attrs_locked+0x136/0x6d0 [ 248.068024][T11071] ? check_preemption_disabled+0x9e/0x330 [ 248.073830][T11071] ? apply_workqueue_attrs+0x40/0x40 [ 248.079100][T11071] ? mutex_lock+0xa6/0x110 [ 248.083491][T11071] ? mutex_trylock+0xb0/0xb0 [ 248.088073][T11071] ? kmem_cache_alloc_trace+0x139/0x2b0 [ 248.093596][T11071] alloc_workqueue+0xcc4/0x11d0 [ 248.098469][T11071] ? ext4_fill_super+0xab45/0xeb30 [ 248.103559][T11071] ? apply_workqueue_attrs_locked+0x6d0/0x6d0 [ 248.109602][T11071] ext4_fill_super+0xaa33/0xeb30 [ 248.114523][T11071] ? ext4_mount+0x40/0x40 [ 248.118820][T11071] ? idr_replace+0x1c4/0x230 [ 248.123380][T11071] ? snprintf+0xd6/0x120 [ 248.127591][T11071] ? vscnprintf+0x80/0x80 [ 248.131910][T11071] ? set_blocksize+0x1a5/0x3a0 [ 248.136652][T11071] mount_bdev+0x22d/0x340 [ 248.140988][T11071] ? ext4_mount+0x40/0x40 [ 248.145286][T11071] legacy_get_tree+0xde/0x170 [ 248.149940][T11071] ? ext4_lazyinit_thread+0xd40/0xd40 [ 248.155285][T11071] vfs_get_tree+0x83/0x260 [ 248.159675][T11071] do_mount+0x19d0/0x2670 [ 248.163979][T11071] ? copy_mount_string+0x30/0x30 [ 248.168884][T11071] ? copy_mount_options+0x1d8/0x300 [ 248.174054][T11071] ? __sanitizer_cov_trace_const_cmp4+0x23/0x90 [ 248.180265][T11071] ? copy_mount_options+0x273/0x300 [ 248.185437][T11071] ksys_mount+0xc2/0xf0 [ 248.189607][T11071] __x64_sys_mount+0xb1/0xc0 [ 248.194175][T11071] do_syscall_64+0xcb/0x1e0 [ 248.198737][T11071] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 248.204605][T11071] RIP: 0033:0x467b1a [ 248.208471][T11071] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 248.228048][T11071] RSP: 002b:00007f3059253fa8 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 248.236438][T11071] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 0000000000467b1a [ 248.244494][T11071] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007f3059254000 [ 248.252436][T11071] RBP: 00007f3059254040 R08: 00007f3059254040 R09: 0000000020000000 [ 248.260378][T11071] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000020000000 13:22:48 executing program 5 (fault-call:0 fault-nth:73): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000660000000f000000000000000100000001000000004000000040000020000000daf4655fdaf4655f0100ffff53ef010001000000d9f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010100)}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000100000000000000000000000000000000000000000000003000000000000000", 0x40, 0x540}, {&(0x7f0000010300)="02000000030000000400000066000f000300040000000000000000000f007f5c", 0x20, 0x800}, {&(0x7f0000011500)="ed41000000080000d9f4655fdaf4655fdaf4655f000000000000040004", 0x1d, 0x2200}, {0x0}, {&(0x7f0000011900)="ed8100001a040000daf4655fdaf4655fdaf4655f000000000000010004000000000000000100000014000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000039c34d38000000000000000000000000000000000000000000000000200000007412ab417412ab417412ab41daf4655f7412ab410000000000000000", 0xa0, 0x3800}], 0x0, &(0x7f0000012c00)) [ 248.268328][T11071] R13: 0000000020000100 R14: 00007f3059254000 R15: 0000000020012c00 [ 248.277309][T11071] EXT4-fs: failed to create workqueue [ 248.282733][T11071] EXT4-fs (loop5): mount failed 13:22:48 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_mount_image$f2fs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0xf, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}, {&(0x7f0000010500)='\x00\x00\x00\x00', 0x4, 0xc80}, {&(0x7f0000010700)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e00000010000003000000010000000200000018b2e346f95e497f827e0a", 0x77, 0x1400}, {0x0}, {&(0x7f0000010e00)="d73cd47a0000000000100000000000000b000000000000000d0000001000000012000000170000001600000015000000ffffffffffffffffffffffffffffffffffffffff03000600000000000000000000000000140000000100000000000000ffffffffffffffffffffffffffffffffffffffff05000000000000000000000000000000c5010000060000000100000007000000070000000a0000004000000040000000fc0f00"/181, 0xb5, 0x200000}, {&(0x7f0000010f00)="0000000000000000000000000000000000000000000000000000000009f7a5bb", 0x20, 0x200fe0}, {&(0x7f0000011000)="00000000000000000000000000000000000000000000000000000006", 0x1c, 0x2011e0}, {0x0, 0x0, 0x2012e0}, {&(0x7f0000011400)="000000000000000000000000000000000000000000160000000510ec", 0x1c, 0x201320}, {&(0x7f0000011500)="00000017000000020c60", 0xa, 0x201380}, {&(0x7f0000011600)}, {&(0x7f0000011800)}, {&(0x7f0000011b00)="0000000000000000000000000000000000000000000000000000000100000000d73cd47a0000000000100000000000000b000000000000000d0000001000000012000000170000001600000015000000ffffffffffffffffffffffffffffffffffffffff03000600000000000000000000000000140000000100000000000000ffffffffffffffffffffffffffffffffffffffff05000000000000000000000000000000c5010000060000000100000007000000070000000a00000040000000", 0xc0, 0x204fe0}, {&(0x7f0000011c00)="0000000000000000000000000000000000000000000000000000000009f7a5bb", 0x20, 0x205fe0}, {0x0, 0x0, 0x401320}], 0x0, &(0x7f0000014b00)) 13:22:48 executing program 4: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000002, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x31) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) waitid$P_PIDFD(0x3, r0, &(0x7f0000000500), 0x9, &(0x7f0000000580)) ptrace$cont(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='pids.events\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x12, r1, 0x0) ftruncate(r1, 0x1000673) ioctl$KDSKBENT(r1, 0x4b47, &(0x7f00000002c0)={0x2, 0x81, 0x5}) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x88400, 0x1a8) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0xd0265000) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) exit_group(0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x31, 0xffffffffffffffff, 0x0) time(&(0x7f0000000180)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14001500, 0x9, &(0x7f0000000300)=[{&(0x7f0000000080)="200a0000000100000c190000ce1900000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800)) 13:22:48 executing program 3: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffff, 0xffffffffffffffff, 0x0) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) read(r0, 0x0, 0x0) syz_mount_image$f2fs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0xf, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}, {&(0x7f0000010500)='\x00\x00\x00\x00', 0x4, 0xc80}, {&(0x7f0000010700)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e00000010000003000000010000000200000018b2e346f95e497f827e0a", 0x77, 0x1400}, {0x0}, {&(0x7f0000010e00)="d73cd47a0000000000100000000000000b000000000000000d0000001000000012000000170000001600000015000000ffffffffffffffffffffffffffffffffffffffff03000600000000000000000000000000140000000100000000000000ffffffffffffffffffffffffffffffffffffffff05000000000000000000000000000000c5010000060000000100000007000000070000000a0000004000000040000000fc0f00"/181, 0xb5, 0x200000}, {&(0x7f0000010f00)="0000000000000000000000000000000000000000000000000000000009f7a5bb", 0x20, 0x200fe0}, {&(0x7f0000011000)="00000000000000000000000000000000000000000000000000000006", 0x1c, 0x2011e0}, {0x0, 0x0, 0x2012e0}, {&(0x7f0000011400)="000000000000000000000000000000000000000000160000000510ec", 0x1c, 0x201320}, {&(0x7f0000011500)="00000017000000020c60", 0xa, 0x201380}, {&(0x7f0000011600)}, {&(0x7f0000011800)}, {&(0x7f0000011b00)="0000000000000000000000000000000000000000000000000000000100000000d73cd47a0000000000100000000000000b000000000000000d0000001000000012000000170000001600000015000000ffffffffffffffffffffffffffffffffffffffff03000600000000000000000000000000140000000100000000000000ffffffffffffffffffffffffffffffffffffffff05000000000000000000000000000000c5010000060000000100000007000000070000000a0000004000000040000000fc0f", 0xc6, 0x204fe0}, {0x0}, {&(0x7f0000013000)="000000000000000000000100000001", 0xf, 0xa00000}], 0x0, &(0x7f0000014b00)) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='pids.events\x00', 0x275a, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x4, 0x2d, 0x9, 0x1, 0x0, 0x7fff, 0x88, 0x4, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x7, 0x0, @perf_bp={&(0x7f00000000c0), 0x1}, 0x9, 0x1, 0x4, 0x9, 0x0, 0xffff, 0x400, 0x0, 0x2, 0x0, 0x1000}, 0x0, 0xe, r1, 0xa) 13:22:48 executing program 1: clone(0x13102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) poll(0x0, 0x0, 0x8000000000000200) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f00000025c0)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00'}) ioctl$TUNSETLINK(r0, 0xc0189436, 0x30a) r2 = openat$selinux_attr(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) mmap(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x6, 0x1010, r2, 0xdc5f7000) close(r0) r3 = socket$inet_tcp(0x2, 0x1, 0x0) preadv(r3, 0x0, 0x0, 0x7fffffff, 0x1) 13:22:48 executing program 2: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffff, 0xffffffffffffffff, 0x0) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) read(r0, 0x0, 0x0) syz_mount_image$f2fs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x10, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}, {&(0x7f0000010500)='\x00\x00\x00\x00', 0x4, 0xc80}, {&(0x7f0000010700)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e00000010000003000000010000000200000018b2e346f95e497f827e0a", 0x77, 0x1400}, {0x0}, {&(0x7f0000010e00)="d73cd47a0000000000100000000000000b000000000000000d0000001000000012000000170000001600000015000000ffffffffffffffffffffffffffffffffffffffff03000600000000000000000000000000140000000100000000000000ffffffffffffffffffffffffffffffffffffffff05000000000000000000000000000000c5010000060000000100000007000000070000000a0000004000000040000000fc0f00"/181, 0xb5, 0x200000}, {&(0x7f0000010f00)="0000000000000000000000000000000000000000000000000000000009f7a5bb", 0x20, 0x200fe0}, {&(0x7f0000011000)="00000000000000000000000000000000000000000000000000000006", 0x1c, 0x2011e0}, {0x0, 0x0, 0x2012e0}, {&(0x7f0000011400)="000000000000000000000000000000000000000000160000000510ec", 0x1c, 0x201320}, {&(0x7f0000011500)="00000017000000020c60", 0xa, 0x201380}, {&(0x7f0000011600)}, {&(0x7f0000011800)}, {&(0x7f0000011b00)="0000000000000000000000000000000000000000000000000000000100000000d73cd47a0000000000100000000000000b000000000000000d0000001000000012000000170000001600000015000000ffffffffffffffffffffffffffffffffffffffff03000600000000000000000000000000140000000100000000000000ffffffffffffffffffffffffffffffffffffffff05000000000000000000000000000000c5010000060000000100000007000000070000000a0000004000000040000000fc0f", 0xc6, 0x204fe0}, {&(0x7f0000011c00)='\x00'/16, 0x10, 0x205fe0}, {0x0}, {&(0x7f0000013000)="000000000000000000000100000001", 0xf, 0xa00000}], 0x0, &(0x7f0000014b00)) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='pids.events\x00', 0x275a, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x4, 0x2d, 0x9, 0x1, 0x0, 0x7fff, 0x88, 0x4, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x7, 0x0, @perf_bp={&(0x7f00000000c0), 0x1}, 0x9, 0x1, 0x4, 0x9, 0x0, 0xffff, 0x400, 0x0, 0x2, 0x0, 0x1000}, 0x0, 0xe, r1, 0xa) 13:22:48 executing program 3: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_mount_image$f2fs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0xf, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}, {&(0x7f0000010500)='\x00\x00\x00\x00', 0x4, 0xc80}, {&(0x7f0000010700)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e00000010000003000000010000000200000018b2e346f95e497f827e0a", 0x77, 0x1400}, {0x0}, {&(0x7f0000010e00)="d73cd47a0000000000100000000000000b000000000000000d0000001000000012000000170000001600000015000000ffffffffffffffffffffffffffffffffffffffff03000600000000000000000000000000140000000100000000000000ffffffffffffffffffffffffffffffffffffffff05000000000000000000000000000000c5010000060000000100000007000000070000000a0000004000000040000000fc0f00"/181, 0xb5, 0x200000}, {&(0x7f0000010f00)="0000000000000000000000000000000000000000000000000000000009f7a5bb", 0x20, 0x200fe0}, {&(0x7f0000011000)="00000000000000000000000000000000000000000000000000000006", 0x1c, 0x2011e0}, {0x0, 0x0, 0x2012e0}, {&(0x7f0000011400)="000000000000000000000000000000000000000000160000000510ec", 0x1c, 0x201320}, {&(0x7f0000011500)="00000017000000020c60", 0xa, 0x201380}, {&(0x7f0000011600)}, {&(0x7f0000011800)}, {&(0x7f0000011b00)="0000000000000000000000000000000000000000000000000000000100000000d73cd47a0000000000100000000000000b000000000000000d0000001000000012000000170000001600000015000000ffffffffffffffffffffffffffffffffffffff", 0x63, 0x204fe0}, {&(0x7f0000011c00)="0000000000000000000000000000000000000000000000000000000009f7a5bb", 0x20, 0x205fe0}, {0x0, 0x0, 0x401320}], 0x0, &(0x7f0000014b00)) [ 248.481933][T11092] EXT4-fs (loop4): inodes count not valid: 2592 vs 32 [ 248.493268][T11088] FAULT_INJECTION: forcing a failure. [ 248.493268][T11088] name failslab, interval 1, probability 0, space 0, times 0 [ 248.514573][T11088] CPU: 0 PID: 11088 Comm: syz-executor.5 Not tainted 5.4.125-syzkaller-00016-gae94e015273b #0 [ 248.524804][T11088] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 248.534855][T11088] Call Trace: [ 248.538134][T11088] dump_stack+0x1d8/0x24e [ 248.542452][T11088] ? devkmsg_release+0x11c/0x11c [ 248.547386][T11088] ? show_regs_print_info+0x12/0x12 [ 248.552560][T11088] should_fail+0x6f6/0x860 [ 248.556948][T11088] ? setup_fault_attr+0x3d0/0x3d0 [ 248.561952][T11088] ? unwind_get_return_address+0x48/0x80 [ 248.567570][T11088] ? apply_wqattrs_prepare+0x102/0x17e0 [ 248.573088][T11088] should_failslab+0x5/0x20 [ 248.577681][T11088] kmem_cache_alloc_trace+0x39/0x2b0 [ 248.582934][T11088] ? apply_wqattrs_prepare+0xcb/0x17e0 [ 248.588363][T11088] apply_wqattrs_prepare+0x102/0x17e0 [ 248.593718][T11088] ? alloc_workqueue+0x1cb/0x11d0 [ 248.598710][T11088] ? ext4_fill_super+0xaa33/0xeb30 [ 248.603799][T11088] ? mount_bdev+0x22d/0x340 [ 248.608273][T11088] ? legacy_get_tree+0xde/0x170 [ 248.613095][T11088] ? vfs_get_tree+0x83/0x260 [ 248.617654][T11088] ? do_mount+0x19d0/0x2670 [ 248.622124][T11088] ? ksys_mount+0xc2/0xf0 [ 248.626433][T11088] ? __x64_sys_mount+0xb1/0xc0 [ 248.631178][T11088] ? do_syscall_64+0xcb/0x1e0 [ 248.635842][T11088] ? entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 248.641889][T11088] ? format_decode+0x441/0x1ab0 [ 248.646712][T11088] ? cwt_wakefn+0x70/0x70 [ 248.651016][T11088] ? vsnprintf+0x1d60/0x1d60 [ 248.655577][T11088] ? vsnprintf+0x1e4/0x1d60 [ 248.660052][T11088] apply_workqueue_attrs_locked+0x136/0x6d0 [ 248.665916][T11088] ? check_preemption_disabled+0x9e/0x330 [ 248.671601][T11088] ? apply_workqueue_attrs+0x40/0x40 [ 248.676853][T11088] ? mutex_lock+0xa6/0x110 [ 248.681241][T11088] ? mutex_trylock+0xb0/0xb0 [ 248.685800][T11088] ? kmem_cache_alloc_trace+0x139/0x2b0 [ 248.691327][T11088] alloc_workqueue+0xcc4/0x11d0 [ 248.696152][T11088] ? ext4_fill_super+0xab45/0xeb30 [ 248.701243][T11088] ? apply_workqueue_attrs_locked+0x6d0/0x6d0 [ 248.707285][T11088] ext4_fill_super+0xaa33/0xeb30 [ 248.712203][T11088] ? ext4_mount+0x40/0x40 [ 248.717025][T11088] ? idr_replace+0x1c4/0x230 [ 248.721594][T11088] ? snprintf+0xd6/0x120 [ 248.725809][T11088] ? vscnprintf+0x80/0x80 [ 248.730219][T11088] ? set_blocksize+0x1a5/0x3a0 [ 248.735055][T11088] mount_bdev+0x22d/0x340 [ 248.739358][T11088] ? ext4_mount+0x40/0x40 [ 248.743671][T11088] legacy_get_tree+0xde/0x170 [ 248.748319][T11088] ? ext4_lazyinit_thread+0xd40/0xd40 [ 248.753671][T11088] vfs_get_tree+0x83/0x260 [ 248.758058][T11088] do_mount+0x19d0/0x2670 [ 248.762357][T11088] ? copy_mount_string+0x30/0x30 [ 248.767261][T11088] ? copy_mount_options+0x59/0x300 [ 248.772356][T11088] ? kmem_cache_alloc_trace+0x139/0x2b0 [ 248.777882][T11088] ? copy_mount_options+0x273/0x300 [ 248.783060][T11088] ksys_mount+0xc2/0xf0 [ 248.787196][T11088] __x64_sys_mount+0xb1/0xc0 [ 248.791759][T11088] do_syscall_64+0xcb/0x1e0 [ 248.796234][T11088] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 248.802095][T11088] RIP: 0033:0x467b1a [ 248.805963][T11088] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 248.825543][T11088] RSP: 002b:00007f3059253fa8 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 248.834021][T11088] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 0000000000467b1a [ 248.841965][T11088] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007f3059254000 [ 248.849920][T11088] RBP: 00007f3059254040 R08: 00007f3059254040 R09: 0000000020000000 [ 248.857889][T11088] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000020000000 [ 248.865845][T11088] R13: 0000000020000100 R14: 00007f3059254000 R15: 0000000020012c00 [ 248.876394][T11088] EXT4-fs: failed to create workqueue 13:22:48 executing program 4: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000002, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x31) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) waitid$P_PIDFD(0x3, r0, &(0x7f0000000500), 0x9, &(0x7f0000000580)) ptrace$cont(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='pids.events\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x12, r1, 0x0) ftruncate(r1, 0x1000673) ioctl$KDSKBENT(r1, 0x4b47, &(0x7f00000002c0)={0x2, 0x81, 0x5}) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x88400, 0x1a8) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0xd0265000) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) exit_group(0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x31, 0xffffffffffffffff, 0x0) time(&(0x7f0000000180)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14001500, 0x9, &(0x7f0000000300)=[{&(0x7f0000000080)="200b0000000100000c190000ce1900000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800)) 13:22:48 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_mount_image$f2fs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0xf, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}, {&(0x7f0000010500)='\x00\x00\x00\x00', 0x4, 0xc80}, {&(0x7f0000010700)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e00000010000003000000010000000200000018b2e346f95e497f827e0a", 0x77, 0x1400}, {0x0}, {&(0x7f0000010e00)="d73cd47a0000000000100000000000000b000000000000000d0000001000000012000000170000001600000015000000ffffffffffffffffffffffffffffffffffffffff03000600000000000000000000000000140000000100000000000000ffffffffffffffffffffffffffffffffffffffff05000000000000000000000000000000c5010000060000000100000007000000070000000a0000004000000040000000fc0f00"/181, 0xb5, 0x200000}, {&(0x7f0000010f00)="0000000000000000000000000000000000000000000000000000000009f7a5bb", 0x20, 0x200fe0}, {&(0x7f0000011000)="00000000000000000000000000000000000000000000000000000006", 0x1c, 0x2011e0}, {0x0, 0x0, 0x2012e0}, {&(0x7f0000011400)="000000000000000000000000000000000000000000160000000510ec", 0x1c, 0x201320}, {&(0x7f0000011500)="00000017000000020c60", 0xa, 0x201380}, {&(0x7f0000011600)}, {&(0x7f0000011800)}, {&(0x7f0000011b00)="0000000000000000000000000000000000000000000000000000000100000000d73cd47a0000000000100000000000000b000000000000000d0000001000000012000000170000001600000015000000ffffffffffffffffffffffffffffffffffffffff03000600000000000000000000000000140000000100000000000000ffffffffffffffffffffffffffffffffffffffff05000000000000000000000000000000c5010000060000000100000007000000070000000a00000040000000", 0xc0, 0x204fe0}, {&(0x7f0000011c00)="0000000000000000000000000000000000000000000000000000000009f7a5bb", 0x20, 0x205fe0}, {0x0, 0x0, 0x401320}], 0x0, &(0x7f0000014b00)) 13:22:48 executing program 5 (fault-call:0 fault-nth:74): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000660000000f000000000000000100000001000000004000000040000020000000daf4655fdaf4655f0100ffff53ef010001000000d9f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010100)}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000100000000000000000000000000000000000000000000003000000000000000", 0x40, 0x540}, {&(0x7f0000010300)="02000000030000000400000066000f000300040000000000000000000f007f5c", 0x20, 0x800}, {&(0x7f0000011500)="ed41000000080000d9f4655fdaf4655fdaf4655f000000000000040004", 0x1d, 0x2200}, {0x0}, {&(0x7f0000011900)="ed8100001a040000daf4655fdaf4655fdaf4655f000000000000010004000000000000000100000014000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000039c34d38000000000000000000000000000000000000000000000000200000007412ab417412ab417412ab41daf4655f7412ab410000000000000000", 0xa0, 0x3800}], 0x0, &(0x7f0000012c00)) 13:22:48 executing program 3: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_mount_image$f2fs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0xf, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}, {&(0x7f0000010500)='\x00\x00\x00\x00', 0x4, 0xc80}, {&(0x7f0000010700)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e00000010000003000000010000000200000018b2e346f95e497f827e0a", 0x77, 0x1400}, {0x0}, {&(0x7f0000010e00)="d73cd47a0000000000100000000000000b000000000000000d0000001000000012000000170000001600000015000000ffffffffffffffffffffffffffffffffffffffff03000600000000000000000000000000140000000100000000000000ffffffffffffffffffffffffffffffffffffffff05000000000000000000000000000000c5010000060000000100000007000000070000000a0000004000000040000000fc0f00"/181, 0xb5, 0x200000}, {&(0x7f0000010f00)="0000000000000000000000000000000000000000000000000000000009f7a5bb", 0x20, 0x200fe0}, {&(0x7f0000011000)="00000000000000000000000000000000000000000000000000000006", 0x1c, 0x2011e0}, {0x0, 0x0, 0x2012e0}, {&(0x7f0000011400)="000000000000000000000000000000000000000000160000000510ec", 0x1c, 0x201320}, {&(0x7f0000011500)="00000017000000020c60", 0xa, 0x201380}, {&(0x7f0000011600)}, {&(0x7f0000011800)}, {&(0x7f0000011b00)="0000000000000000000000000000000000000000000000000000000100000000d73cd47a0000000000100000000000000b000000000000000d0000001000000012000000170000001600000015000000ffffffffffffffffffffffffffffffffffffff", 0x63, 0x204fe0}, {&(0x7f0000011c00)="0000000000000000000000000000000000000000000000000000000009f7a5bb", 0x20, 0x205fe0}, {0x0, 0x0, 0x401320}], 0x0, &(0x7f0000014b00)) [ 248.881777][T11088] EXT4-fs (loop5): mount failed 13:22:49 executing program 3: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000002, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x31) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) waitid$P_PIDFD(0x3, r0, &(0x7f0000000500), 0x9, &(0x7f0000000580)) ptrace$cont(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='pids.events\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x12, r1, 0x0) ftruncate(r1, 0x1000673) ioctl$KDSKBENT(r1, 0x4b47, &(0x7f00000002c0)={0x2, 0x81, 0x5}) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x88400, 0x1a8) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0xd0265000) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) exit_group(0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x31, 0xffffffffffffffff, 0x0) time(&(0x7f0000000180)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14001500, 0xe, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c190000ce1900000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800)) [ 248.972026][T11108] F2FS-fs (loop2): invalid crc value [ 248.978011][T11115] EXT4-fs (loop4): inodes count not valid: 2848 vs 32 [ 248.978153][T11108] F2FS-fs (loop2): invalid crc_offset: 0 [ 249.001748][T11108] F2FS-fs (loop2): Failed to get valid F2FS checkpoint [ 249.011923][T11123] FAULT_INJECTION: forcing a failure. 13:22:49 executing program 1: clone(0x13102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) poll(0x0, 0x0, 0x8000000000000200) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f00000025c0)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00'}) ioctl$TUNSETLINK(r0, 0xc020660b, 0x30a) r2 = openat$selinux_attr(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) mmap(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x6, 0x1010, r2, 0xdc5f7000) close(r0) r3 = socket$inet_tcp(0x2, 0x1, 0x0) preadv(r3, 0x0, 0x0, 0x7fffffff, 0x1) [ 249.011923][T11123] name failslab, interval 1, probability 0, space 0, times 0 [ 249.037614][T11120] F2FS-fs (loop0): invalid crc_offset: 0 [ 249.063597][T11120] F2FS-fs (loop0): invalid crc_offset: 0 [ 249.074984][T11123] CPU: 0 PID: 11123 Comm: syz-executor.5 Not tainted 5.4.125-syzkaller-00016-gae94e015273b #0 [ 249.078511][T11120] F2FS-fs (loop0): Failed to get valid F2FS checkpoint [ 249.085759][T11123] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 249.085762][T11123] Call Trace: [ 249.085782][T11123] dump_stack+0x1d8/0x24e [ 249.085797][T11123] ? devkmsg_release+0x11c/0x11c [ 249.085806][T11123] ? show_regs_print_info+0x12/0x12 [ 249.085818][T11123] should_fail+0x6f6/0x860 [ 249.085829][T11123] ? setup_fault_attr+0x3d0/0x3d0 [ 249.085839][T11123] ? unwind_get_return_address+0x48/0x80 [ 249.085849][T11123] ? apply_wqattrs_prepare+0x102/0x17e0 [ 249.085859][T11123] should_failslab+0x5/0x20 [ 249.085868][T11123] kmem_cache_alloc_trace+0x39/0x2b0 [ 249.085876][T11123] ? apply_wqattrs_prepare+0xcb/0x17e0 [ 249.085886][T11123] apply_wqattrs_prepare+0x102/0x17e0 [ 249.085893][T11123] ? alloc_workqueue+0x1cb/0x11d0 [ 249.085909][T11123] ? ext4_fill_super+0xaa33/0xeb30 [ 249.171547][T11123] ? mount_bdev+0x22d/0x340 [ 249.176035][T11123] ? legacy_get_tree+0xde/0x170 [ 249.180862][T11123] ? vfs_get_tree+0x83/0x260 [ 249.185424][T11123] ? do_mount+0x19d0/0x2670 [ 249.189909][T11123] ? ksys_mount+0xc2/0xf0 [ 249.194208][T11123] ? __x64_sys_mount+0xb1/0xc0 [ 249.198941][T11123] ? do_syscall_64+0xcb/0x1e0 [ 249.204378][T11123] ? entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 249.210417][T11123] ? format_decode+0x441/0x1ab0 [ 249.215239][T11123] ? cwt_wakefn+0x70/0x70 [ 249.219535][T11123] ? vsnprintf+0x1d60/0x1d60 [ 249.224117][T11123] ? vsnprintf+0x1e4/0x1d60 [ 249.228596][T11123] apply_workqueue_attrs_locked+0x136/0x6d0 [ 249.234460][T11123] ? check_preemption_disabled+0x9e/0x330 [ 249.240152][T11123] ? apply_workqueue_attrs+0x40/0x40 [ 249.245407][T11123] ? mutex_lock+0xa6/0x110 [ 249.249789][T11123] ? mutex_trylock+0xb0/0xb0 [ 249.254352][T11123] ? kmem_cache_alloc_trace+0x139/0x2b0 [ 249.259882][T11123] ? free_unref_page_commit+0x11e/0x3a0 [ 249.265391][T11123] alloc_workqueue+0xcc4/0x11d0 [ 249.270215][T11123] ? ext4_fill_super+0xab45/0xeb30 [ 249.275291][T11123] ? apply_workqueue_attrs_locked+0x6d0/0x6d0 [ 249.281330][T11123] ext4_fill_super+0xaa33/0xeb30 [ 249.286239][T11123] ? ext4_mount+0x40/0x40 [ 249.290536][T11123] ? idr_replace+0x1c4/0x230 [ 249.295192][T11123] ? snprintf+0xd6/0x120 [ 249.299432][T11123] ? vscnprintf+0x80/0x80 [ 249.303739][T11123] ? set_blocksize+0x1a5/0x3a0 [ 249.308488][T11123] mount_bdev+0x22d/0x340 [ 249.312785][T11123] ? ext4_mount+0x40/0x40 [ 249.317090][T11123] legacy_get_tree+0xde/0x170 [ 249.321739][T11123] ? ext4_lazyinit_thread+0xd40/0xd40 [ 249.327150][T11123] vfs_get_tree+0x83/0x260 [ 249.331600][T11123] do_mount+0x19d0/0x2670 [ 249.335904][T11123] ? copy_mount_string+0x30/0x30 [ 249.340813][T11123] ? copy_mount_options+0x59/0x300 [ 249.345921][T11123] ? kmem_cache_alloc_trace+0x139/0x2b0 [ 249.351453][T11123] ? copy_mount_options+0x273/0x300 [ 249.356628][T11123] ksys_mount+0xc2/0xf0 [ 249.360850][T11123] __x64_sys_mount+0xb1/0xc0 [ 249.365413][T11123] do_syscall_64+0xcb/0x1e0 [ 249.369892][T11123] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 249.375772][T11123] RIP: 0033:0x467b1a [ 249.379728][T11123] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 249.399306][T11123] RSP: 002b:00007f3059253fa8 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 13:22:49 executing program 4: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000002, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x31) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) waitid$P_PIDFD(0x3, r0, &(0x7f0000000500), 0x9, &(0x7f0000000580)) ptrace$cont(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='pids.events\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x12, r1, 0x0) ftruncate(r1, 0x1000673) ioctl$KDSKBENT(r1, 0x4b47, &(0x7f00000002c0)={0x2, 0x81, 0x5}) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x88400, 0x1a8) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0xd0265000) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) exit_group(0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x31, 0xffffffffffffffff, 0x0) time(&(0x7f0000000180)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14001500, 0x9, &(0x7f0000000300)=[{&(0x7f0000000080)="200c0000000100000c190000ce1900000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800)) 13:22:49 executing program 3: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000002, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x31) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) waitid$P_PIDFD(0x3, r0, &(0x7f0000000500), 0x9, &(0x7f0000000580)) ptrace$cont(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='pids.events\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x12, r1, 0x0) ftruncate(r1, 0x1000673) ioctl$KDSKBENT(r1, 0x4b47, &(0x7f00000002c0)={0x2, 0x81, 0x5}) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x88400, 0x1a8) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0xd0265000) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) exit_group(0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x31, 0xffffffffffffffff, 0x0) time(&(0x7f0000000180)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14001500, 0xe, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c190000ce1900000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800)) [ 249.407702][T11123] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 0000000000467b1a [ 249.415647][T11123] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007f3059254000 [ 249.423591][T11123] RBP: 00007f3059254040 R08: 00007f3059254040 R09: 0000000020000000 [ 249.431556][T11123] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000020000000 [ 249.439516][T11123] R13: 0000000020000100 R14: 00007f3059254000 R15: 0000000020012c00 [ 249.459201][T11123] EXT4-fs: failed to create workqueue [ 249.469222][T11123] EXT4-fs (loop5): mount failed 13:22:49 executing program 5 (fault-call:0 fault-nth:75): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000660000000f000000000000000100000001000000004000000040000020000000daf4655fdaf4655f0100ffff53ef010001000000d9f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010100)}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000100000000000000000000000000000000000000000000003000000000000000", 0x40, 0x540}, {&(0x7f0000010300)="02000000030000000400000066000f000300040000000000000000000f007f5c", 0x20, 0x800}, {&(0x7f0000011500)="ed41000000080000d9f4655fdaf4655fdaf4655f000000000000040004", 0x1d, 0x2200}, {0x0}, {&(0x7f0000011900)="ed8100001a040000daf4655fdaf4655fdaf4655f000000000000010004000000000000000100000014000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000039c34d38000000000000000000000000000000000000000000000000200000007412ab417412ab417412ab41daf4655f7412ab410000000000000000", 0xa0, 0x3800}], 0x0, &(0x7f0000012c00)) 13:22:49 executing program 2: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffff, 0xffffffffffffffff, 0x0) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) read(r0, 0x0, 0x0) syz_mount_image$f2fs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x10, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}, {&(0x7f0000010500)='\x00\x00\x00\x00', 0x4, 0xc80}, {&(0x7f0000010700)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e00000010000003000000010000000200000018b2e346f95e497f827e0a", 0x77, 0x1400}, {0x0}, {&(0x7f0000010e00)="d73cd47a0000000000100000000000000b000000000000000d0000001000000012000000170000001600000015000000ffffffffffffffffffffffffffffffffffffffff03000600000000000000000000000000140000000100000000000000ffffffffffffffffffffffffffffffffffffffff05000000000000000000000000000000c5010000060000000100000007000000070000000a0000004000000040000000fc0f00"/181, 0xb5, 0x200000}, {&(0x7f0000010f00)="0000000000000000000000000000000000000000000000000000000009f7a5bb", 0x20, 0x200fe0}, {&(0x7f0000011000)="00000000000000000000000000000000000000000000000000000006", 0x1c, 0x2011e0}, {0x0, 0x0, 0x2012e0}, {&(0x7f0000011400)="000000000000000000000000000000000000000000160000000510ec", 0x1c, 0x201320}, {&(0x7f0000011500)="00000017000000020c60", 0xa, 0x201380}, {&(0x7f0000011600)}, {&(0x7f0000011800)}, {&(0x7f0000011b00)="0000000000000000000000000000000000000000000000000000000100000000d73cd47a0000000000100000000000000b000000000000000d0000001000000012000000170000001600000015000000ffffffffffffffffffffffffffffffffffffffff03000600000000000000000000000000140000000100000000000000ffffffffffffffffffffffffffffffffffffffff05000000000000000000000000000000c5010000060000000100000007000000070000000a0000004000000040000000fc0f", 0xc6, 0x204fe0}, {&(0x7f0000011c00)='\x00'/24, 0x18, 0x205fe0}, {0x0}, {&(0x7f0000013000)="000000000000000000000100000001", 0xf, 0xa00000}], 0x0, &(0x7f0000014b00)) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='pids.events\x00', 0x275a, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x4, 0x2d, 0x9, 0x1, 0x0, 0x7fff, 0x88, 0x4, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x7, 0x0, @perf_bp={&(0x7f00000000c0), 0x1}, 0x9, 0x1, 0x4, 0x9, 0x0, 0xffff, 0x400, 0x0, 0x2, 0x0, 0x1000}, 0x0, 0xe, r1, 0xa) 13:22:49 executing program 3: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000002, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x31) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) waitid$P_PIDFD(0x3, r0, &(0x7f0000000500), 0x9, &(0x7f0000000580)) ptrace$cont(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='pids.events\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x12, r1, 0x0) ftruncate(r1, 0x1000673) ioctl$KDSKBENT(r1, 0x4b47, &(0x7f00000002c0)={0x2, 0x81, 0x5}) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x88400, 0x1a8) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0xd0265000) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) exit_group(0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x31, 0xffffffffffffffff, 0x0) time(&(0x7f0000000180)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14001500, 0xe, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c190000ce1900000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800)) 13:22:49 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_mount_image$f2fs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0xf, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}, {&(0x7f0000010500)='\x00\x00\x00\x00', 0x4, 0xc80}, {&(0x7f0000010700)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e00000010000003000000010000000200000018b2e346f95e497f827e0a", 0x77, 0x1400}, {0x0}, {&(0x7f0000010e00)="d73cd47a0000000000100000000000000b000000000000000d0000001000000012000000170000001600000015000000ffffffffffffffffffffffffffffffffffffffff03000600000000000000000000000000140000000100000000000000ffffffffffffffffffffffffffffffffffffffff05000000000000000000000000000000c5010000060000000100000007000000070000000a0000004000000040000000fc0f00"/181, 0xb5, 0x200000}, {&(0x7f0000010f00)="0000000000000000000000000000000000000000000000000000000009f7a5bb", 0x20, 0x200fe0}, {&(0x7f0000011000)="00000000000000000000000000000000000000000000000000000006", 0x1c, 0x2011e0}, {0x0, 0x0, 0x2012e0}, {&(0x7f0000011400)="000000000000000000000000000000000000000000160000000510ec", 0x1c, 0x201320}, {&(0x7f0000011500)="00000017000000020c60", 0xa, 0x201380}, {&(0x7f0000011600)}, {&(0x7f0000011800)}, {&(0x7f0000011b00)="0000000000000000000000000000000000000000000000000000000100000000d73cd47a0000000000100000000000000b000000000000000d0000001000000012000000170000001600000015000000ffffffffffffffffffffffffffffffffffffffff03000600000000000000000000000000140000000100000000000000ffffffffffffffffffffffffffffffffffffffff05000000000000000000000000000000c5010000060000000100000007000000070000000a00000040000000", 0xc0, 0x204fe0}, {&(0x7f0000011c00)="0000000000000000000000000000000000000000000000000000000009f7a5bb", 0x20, 0x205fe0}, {0x0, 0x0, 0x401320}], 0x0, &(0x7f0000014b00)) 13:22:49 executing program 4: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000002, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x31) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) waitid$P_PIDFD(0x3, r0, &(0x7f0000000500), 0x9, &(0x7f0000000580)) ptrace$cont(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='pids.events\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x12, r1, 0x0) ftruncate(r1, 0x1000673) ioctl$KDSKBENT(r1, 0x4b47, &(0x7f00000002c0)={0x2, 0x81, 0x5}) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x88400, 0x1a8) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0xd0265000) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) exit_group(0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x31, 0xffffffffffffffff, 0x0) time(&(0x7f0000000180)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14001500, 0x9, &(0x7f0000000300)=[{&(0x7f0000000080)="200d0000000100000c190000ce1900000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800)) 13:22:49 executing program 1: clone(0x13102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) poll(0x0, 0x0, 0x8000000000000200) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f00000025c0)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00'}) ioctl$TUNSETLINK(r0, 0x400454cd, 0x6) r2 = openat$selinux_attr(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) mmap(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x6, 0x1010, r2, 0xdc5f7000) close(r0) r3 = socket$inet_tcp(0x2, 0x1, 0x0) preadv(r3, 0x0, 0x0, 0x7fffffff, 0x1) [ 249.624843][T11146] EXT4-fs (loop4): inodes count not valid: 3104 vs 32 13:22:49 executing program 3: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000002, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x31) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) waitid$P_PIDFD(0x3, r0, &(0x7f0000000500), 0x9, &(0x7f0000000580)) ptrace$cont(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='pids.events\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x12, r1, 0x0) ftruncate(r1, 0x1000673) ioctl$KDSKBENT(r1, 0x4b47, &(0x7f00000002c0)={0x2, 0x81, 0x5}) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x88400, 0x1a8) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0xd0265000) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) exit_group(0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x31, 0xffffffffffffffff, 0x0) time(&(0x7f0000000180)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14001500, 0xd, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c190000ce1900000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800)) [ 249.676647][T11161] F2FS-fs (loop0): invalid crc_offset: 0 [ 249.688985][T11161] F2FS-fs (loop0): invalid crc_offset: 0 [ 249.693502][T11153] F2FS-fs (loop2): invalid crc value [ 249.694831][T11161] F2FS-fs (loop0): Failed to get valid F2FS checkpoint [ 249.709912][T11157] FAULT_INJECTION: forcing a failure. [ 249.709912][T11157] name failslab, interval 1, probability 0, space 0, times 0 [ 249.730807][T11157] CPU: 1 PID: 11157 Comm: syz-executor.5 Not tainted 5.4.125-syzkaller-00016-gae94e015273b #0 [ 249.741136][T11157] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 249.751177][T11157] Call Trace: [ 249.754475][T11157] dump_stack+0x1d8/0x24e [ 249.758802][T11157] ? devkmsg_release+0x11c/0x11c [ 249.763734][T11157] ? show_regs_print_info+0x12/0x12 [ 249.768927][T11157] ? apply_workqueue_attrs_locked+0x333/0x6d0 [ 249.773451][T11153] F2FS-fs (loop2): invalid crc_offset: 0 [ 249.780745][T11157] ? kfree+0xe0/0x660 [ 249.784716][T11157] should_fail+0x6f6/0x860 [ 249.784728][T11157] ? setup_fault_attr+0x3d0/0x3d0 [ 249.784737][T11157] ? apply_workqueue_attrs_locked+0x333/0x6d0 [ 249.784745][T11157] ? check_preemption_disabled+0x9e/0x330 [ 249.784751][T11157] ? init_rescuer+0x89/0x290 [ 249.784767][T11157] should_failslab+0x5/0x20 [ 249.795927][T11153] F2FS-fs (loop2): Failed to get valid F2FS checkpoint [ 249.800202][T11157] kmem_cache_alloc_trace+0x39/0x2b0 [ 249.800213][T11157] ? mutex_trylock+0xb0/0xb0 [ 249.800229][T11157] init_rescuer+0x89/0x290 [ 249.836116][T11157] alloc_workqueue+0xdae/0x11d0 [ 249.840962][T11157] ? ext4_fill_super+0xab45/0xeb30 [ 249.846062][T11157] ? apply_workqueue_attrs_locked+0x6d0/0x6d0 [ 249.852154][T11157] ext4_fill_super+0xaa33/0xeb30 [ 249.857090][T11157] ? ext4_mount+0x40/0x40 [ 249.861401][T11157] ? idr_replace+0x1c4/0x230 [ 249.865970][T11157] ? snprintf+0xd6/0x120 [ 249.870202][T11157] ? vscnprintf+0x80/0x80 [ 249.874524][T11157] ? set_blocksize+0x1a5/0x3a0 [ 249.879267][T11157] mount_bdev+0x22d/0x340 [ 249.883572][T11157] ? ext4_mount+0x40/0x40 [ 249.888057][T11157] legacy_get_tree+0xde/0x170 [ 249.892709][T11157] ? ext4_lazyinit_thread+0xd40/0xd40 [ 249.898056][T11157] vfs_get_tree+0x83/0x260 [ 249.902450][T11157] do_mount+0x19d0/0x2670 [ 249.906749][T11157] ? copy_mount_string+0x30/0x30 [ 249.911661][T11157] ? copy_mount_options+0x59/0x300 [ 249.916748][T11157] ? copy_mount_options+0x59/0x300 [ 249.921852][T11157] ? kmem_cache_alloc_trace+0x139/0x2b0 [ 249.927391][T11157] ? copy_mount_options+0x273/0x300 [ 249.932563][T11157] ksys_mount+0xc2/0xf0 [ 249.936703][T11157] __x64_sys_mount+0xb1/0xc0 [ 249.941264][T11157] do_syscall_64+0xcb/0x1e0 [ 249.945749][T11157] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 249.951616][T11157] RIP: 0033:0x467b1a [ 249.955486][T11157] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 13:22:50 executing program 4: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000002, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x31) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) waitid$P_PIDFD(0x3, r0, &(0x7f0000000500), 0x9, &(0x7f0000000580)) ptrace$cont(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='pids.events\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x12, r1, 0x0) ftruncate(r1, 0x1000673) ioctl$KDSKBENT(r1, 0x4b47, &(0x7f00000002c0)={0x2, 0x81, 0x5}) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x88400, 0x1a8) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0xd0265000) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) exit_group(0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x31, 0xffffffffffffffff, 0x0) time(&(0x7f0000000180)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14001500, 0x9, &(0x7f0000000300)=[{&(0x7f0000000080)="200e0000000100000c190000ce1900000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800)) 13:22:50 executing program 3: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000002, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x31) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) waitid$P_PIDFD(0x3, r0, &(0x7f0000000500), 0x9, &(0x7f0000000580)) ptrace$cont(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='pids.events\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x12, r1, 0x0) ftruncate(r1, 0x1000673) ioctl$KDSKBENT(r1, 0x4b47, &(0x7f00000002c0)={0x2, 0x81, 0x5}) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x88400, 0x1a8) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0xd0265000) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) exit_group(0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x31, 0xffffffffffffffff, 0x0) time(&(0x7f0000000180)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14001500, 0xd, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c190000ce1900000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800)) [ 249.975069][T11157] RSP: 002b:00007f3059253fa8 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 249.983452][T11157] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 0000000000467b1a [ 249.991486][T11157] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007f3059254000 [ 249.999439][T11157] RBP: 00007f3059254040 R08: 00007f3059254040 R09: 0000000020000000 [ 250.007473][T11157] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000020000000 [ 250.015426][T11157] R13: 0000000020000100 R14: 00007f3059254000 R15: 0000000020012c00 13:22:50 executing program 3: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000002, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x31) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) waitid$P_PIDFD(0x3, r0, &(0x7f0000000500), 0x9, &(0x7f0000000580)) ptrace$cont(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='pids.events\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x12, r1, 0x0) ftruncate(r1, 0x1000673) ioctl$KDSKBENT(r1, 0x4b47, &(0x7f00000002c0)={0x2, 0x81, 0x5}) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x88400, 0x1a8) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0xd0265000) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) exit_group(0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x31, 0xffffffffffffffff, 0x0) time(&(0x7f0000000180)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14001500, 0xd, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c190000ce1900000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800)) 13:22:50 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_mount_image$f2fs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0xf, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}, {&(0x7f0000010500)='\x00\x00\x00\x00', 0x4, 0xc80}, {&(0x7f0000010700)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e00000010000003000000010000000200000018b2e346f95e497f827e0a", 0x77, 0x1400}, {0x0}, {&(0x7f0000010e00)="d73cd47a0000000000100000000000000b000000000000000d0000001000000012000000170000001600000015000000ffffffffffffffffffffffffffffffffffffffff03000600000000000000000000000000140000000100000000000000ffffffffffffffffffffffffffffffffffffffff05000000000000000000000000000000c5010000060000000100000007000000070000000a0000004000000040000000fc0f00"/181, 0xb5, 0x200000}, {&(0x7f0000010f00)="0000000000000000000000000000000000000000000000000000000009f7a5bb", 0x20, 0x200fe0}, {&(0x7f0000011000)="00000000000000000000000000000000000000000000000000000006", 0x1c, 0x2011e0}, {0x0, 0x0, 0x2012e0}, {&(0x7f0000011400)="000000000000000000000000000000000000000000160000000510ec", 0x1c, 0x201320}, {&(0x7f0000011500)="00000017000000020c60", 0xa, 0x201380}, {&(0x7f0000011600)}, {&(0x7f0000011800)}, {&(0x7f0000011b00)="0000000000000000000000000000000000000000000000000000000100000000d73cd47a0000000000100000000000000b000000000000000d0000001000000012000000170000001600000015000000ffffffffffffffffffffffffffffffffffffffff03000600000000000000000000000000140000000100000000000000ffffffffffffffffffffffffffffffffffffffff05000000000000000000000000000000c5010000060000000100000007000000070000000a00000040000000400000", 0xc3, 0x204fe0}, {&(0x7f0000011c00)="0000000000000000000000000000000000000000000000000000000009f7a5bb", 0x20, 0x205fe0}, {0x0, 0x0, 0x401320}], 0x0, &(0x7f0000014b00)) 13:22:50 executing program 4: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000002, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x31) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) waitid$P_PIDFD(0x3, r0, &(0x7f0000000500), 0x9, &(0x7f0000000580)) ptrace$cont(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='pids.events\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x12, r1, 0x0) ftruncate(r1, 0x1000673) ioctl$KDSKBENT(r1, 0x4b47, &(0x7f00000002c0)={0x2, 0x81, 0x5}) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x88400, 0x1a8) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0xd0265000) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) exit_group(0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x31, 0xffffffffffffffff, 0x0) time(&(0x7f0000000180)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14001500, 0x9, &(0x7f0000000300)=[{&(0x7f0000000080)="20100000000100000c190000ce1900000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800)) [ 250.047647][T11179] EXT4-fs (loop4): inodes count not valid: 3616 vs 32 [ 250.057167][T11157] EXT4-fs: failed to create workqueue [ 250.062688][T11157] EXT4-fs (loop5): mount failed 13:22:50 executing program 5 (fault-call:0 fault-nth:76): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000660000000f000000000000000100000001000000004000000040000020000000daf4655fdaf4655f0100ffff53ef010001000000d9f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010100)}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000100000000000000000000000000000000000000000000003000000000000000", 0x40, 0x540}, {&(0x7f0000010300)="02000000030000000400000066000f000300040000000000000000000f007f5c", 0x20, 0x800}, {&(0x7f0000011500)="ed41000000080000d9f4655fdaf4655fdaf4655f000000000000040004", 0x1d, 0x2200}, {0x0}, {&(0x7f0000011900)="ed8100001a040000daf4655fdaf4655fdaf4655f000000000000010004000000000000000100000014000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000039c34d38000000000000000000000000000000000000000000000000200000007412ab417412ab417412ab41daf4655f7412ab410000000000000000", 0xa0, 0x3800}], 0x0, &(0x7f0000012c00)) 13:22:50 executing program 2: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffff, 0xffffffffffffffff, 0x0) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) read(r0, 0x0, 0x0) syz_mount_image$f2fs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x10, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}, {&(0x7f0000010500)='\x00\x00\x00\x00', 0x4, 0xc80}, {&(0x7f0000010700)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e00000010000003000000010000000200000018b2e346f95e497f827e0a", 0x77, 0x1400}, {0x0}, {&(0x7f0000010e00)="d73cd47a0000000000100000000000000b000000000000000d0000001000000012000000170000001600000015000000ffffffffffffffffffffffffffffffffffffffff03000600000000000000000000000000140000000100000000000000ffffffffffffffffffffffffffffffffffffffff05000000000000000000000000000000c5010000060000000100000007000000070000000a0000004000000040000000fc0f00"/181, 0xb5, 0x200000}, {&(0x7f0000010f00)="0000000000000000000000000000000000000000000000000000000009f7a5bb", 0x20, 0x200fe0}, {&(0x7f0000011000)="00000000000000000000000000000000000000000000000000000006", 0x1c, 0x2011e0}, {0x0, 0x0, 0x2012e0}, {&(0x7f0000011400)="000000000000000000000000000000000000000000160000000510ec", 0x1c, 0x201320}, {&(0x7f0000011500)="00000017000000020c60", 0xa, 0x201380}, {&(0x7f0000011600)}, {&(0x7f0000011800)}, {&(0x7f0000011b00)="0000000000000000000000000000000000000000000000000000000100000000d73cd47a0000000000100000000000000b000000000000000d0000001000000012000000170000001600000015000000ffffffffffffffffffffffffffffffffffffffff03000600000000000000000000000000140000000100000000000000ffffffffffffffffffffffffffffffffffffffff05000000000000000000000000000000c5010000060000000100000007000000070000000a0000004000000040000000fc0f", 0xc6, 0x204fe0}, {&(0x7f0000011c00)='\x00'/24, 0x18, 0x205fe0}, {0x0}, {&(0x7f0000013000)="000000000000000000000100000001", 0xf, 0xa00000}], 0x0, &(0x7f0000014b00)) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='pids.events\x00', 0x275a, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x4, 0x2d, 0x9, 0x1, 0x0, 0x7fff, 0x88, 0x4, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x7, 0x0, @perf_bp={&(0x7f00000000c0), 0x1}, 0x9, 0x1, 0x4, 0x9, 0x0, 0xffff, 0x400, 0x0, 0x2, 0x0, 0x1000}, 0x0, 0xe, r1, 0xa) 13:22:50 executing program 3: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffff, 0xffffffffffffffff, 0x0) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) read(r0, 0x0, 0x0) syz_mount_image$f2fs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x10, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}, {&(0x7f0000010500)='\x00\x00\x00\x00', 0x4, 0xc80}, {&(0x7f0000010700)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e00000010000003000000010000000200000018b2e346f95e497f827e0a", 0x77, 0x1400}, {0x0}, {&(0x7f0000010e00)="d73cd47a0000000000100000000000000b000000000000000d0000001000000012000000170000001600000015000000ffffffffffffffffffffffffffffffffffffffff03000600000000000000000000000000140000000100000000000000ffffffffffffffffffffffffffffffffffffffff05000000000000000000000000000000c5010000060000000100000007000000070000000a0000004000000040000000fc0f00"/181, 0xb5, 0x200000}, {&(0x7f0000010f00)="0000000000000000000000000000000000000000000000000000000009f7a5bb", 0x20, 0x200fe0}, {&(0x7f0000011000)="00000000000000000000000000000000000000000000000000000006", 0x1c, 0x2011e0}, {0x0, 0x0, 0x2012e0}, {&(0x7f0000011400)="000000000000000000000000000000000000000000160000000510ec", 0x1c, 0x201320}, {&(0x7f0000011500)="00000017000000020c60", 0xa, 0x201380}, {&(0x7f0000011600)}, {&(0x7f0000011800)}, {&(0x7f0000011b00)="0000000000000000000000000000000000000000000000000000000100000000d73cd47a0000000000100000000000000b000000000000000d0000001000000012000000170000001600000015000000ffffffffffffffffffffffffffffffffffffffff03000600000000000000000000000000140000000100000000000000ffffffffffffffffffffffffffffffffffffffff05000000000000000000000000000000c5010000060000000100000007000000070000000a0000004000000040000000fc0f", 0xc6, 0x204fe0}, {&(0x7f0000011c00)="0000000000000000000000000000000000000000000000000000000009f7a5bb", 0x20, 0x205fe0}, {0x0}, {&(0x7f0000013000)="000000000000000000000100000001", 0xf, 0xa00000}], 0x0, &(0x7f0000014b00)) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='pids.events\x00', 0x275a, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x4, 0x2d, 0x9, 0x1, 0x0, 0x7fff, 0x88, 0x4, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x7, 0x0, @perf_bp={&(0x7f00000000c0), 0x1}, 0x9, 0x1, 0x4, 0x9, 0x0, 0xffff, 0x400, 0x0, 0x2, 0x0, 0x1000}, 0x0, 0xe, r1, 0xa) 13:22:50 executing program 4: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000002, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x31) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) waitid$P_PIDFD(0x3, r0, &(0x7f0000000500), 0x9, &(0x7f0000000580)) ptrace$cont(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='pids.events\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x12, r1, 0x0) ftruncate(r1, 0x1000673) ioctl$KDSKBENT(r1, 0x4b47, &(0x7f00000002c0)={0x2, 0x81, 0x5}) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x88400, 0x1a8) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0xd0265000) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) exit_group(0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x31, 0xffffffffffffffff, 0x0) time(&(0x7f0000000180)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14001500, 0x9, &(0x7f0000000300)=[{&(0x7f0000000080)="20110000000100000c190000ce1900000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800)) [ 250.201878][T11197] EXT4-fs (loop4): inodes count not valid: 4128 vs 32 [ 250.210521][T11199] F2FS-fs (loop0): invalid crc_offset: 0 [ 250.228134][T11199] F2FS-fs (loop0): invalid crc_offset: 0 [ 250.253931][T11199] F2FS-fs (loop0): Failed to get valid F2FS checkpoint [ 250.273613][T11211] FAULT_INJECTION: forcing a failure. [ 250.273613][T11211] name failslab, interval 1, probability 0, space 0, times 0 [ 250.276199][T11206] F2FS-fs (loop2): invalid crc value 13:22:50 executing program 3: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffff, 0xffffffffffffffff, 0x0) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) read(r0, 0x0, 0x0) syz_mount_image$f2fs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x11, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}, {&(0x7f0000010500)='\x00\x00\x00\x00', 0x4, 0xc80}, {&(0x7f0000010700)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e00000010000003000000010000000200000018b2e346f95e497f827e0a", 0x77, 0x1400}, {0x0}, {&(0x7f0000010e00)="d73cd47a0000000000100000000000000b000000000000000d0000001000000012000000170000001600000015000000ffffffffffffffffffffffffffffffffffffffff03000600000000000000000000000000140000000100000000000000ffffffffffffffffffffffffffffffffffffffff05000000000000000000000000000000c5010000060000000100000007000000070000000a0000004000000040000000fc0f00"/181, 0xb5, 0x200000}, {&(0x7f0000010f00)="0000000000000000000000000000000000000000000000000000000009f7a5bb", 0x20, 0x200fe0}, {&(0x7f0000011000)="00000000000000000000000000000000000000000000000000000006", 0x1c, 0x2011e0}, {0x0, 0x0, 0x2012e0}, {&(0x7f0000011400)="000000000000000000000000000000000000000000160000000510ec", 0x1c, 0x201320}, {&(0x7f0000011500)="00000017000000020c60", 0xa, 0x201380}, {&(0x7f0000011600)}, {&(0x7f0000011800)}, {&(0x7f0000011b00)="0000000000000000000000000000000000000000000000000000000100000000d73cd47a0000000000100000000000000b000000000000000d0000001000000012000000170000001600000015000000ffffffffffffffffffffffffffffffffffffffff03000600000000000000000000000000140000000100000000000000ffffffffffffffffffffffffffffffffffffffff05000000000000000000000000000000c5010000060000000100000007000000070000000a0000004000000040000000fc0f", 0xc6, 0x204fe0}, {&(0x7f0000011c00)="0000000000000000000000000000000000000000000000000000000009f7a5bb", 0x20, 0x205fe0}, {0x0}, {0x0}, {&(0x7f0000013000)="0000000000000000000001000000", 0xe, 0xa00000}], 0x0, &(0x7f0000014b00)) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='pids.events\x00', 0x275a, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x4, 0x2d, 0x9, 0x1, 0x0, 0x7fff, 0x88, 0x4, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x7, 0x0, @perf_bp={&(0x7f00000000c0), 0x1}, 0x9, 0x1, 0x4, 0x9, 0x0, 0xffff, 0x400, 0x0, 0x2, 0x0, 0x1000}, 0x0, 0xe, r1, 0xa) [ 250.299112][T11206] F2FS-fs (loop2): invalid crc_offset: 0 [ 250.306661][T11206] F2FS-fs (loop2): Failed to get valid F2FS checkpoint [ 250.323914][T11211] CPU: 1 PID: 11211 Comm: syz-executor.5 Not tainted 5.4.125-syzkaller-00016-gae94e015273b #0 [ 250.331570][T11219] EXT4-fs (loop4): inodes count not valid: 4384 vs 32 [ 250.334156][T11211] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 250.334159][T11211] Call Trace: [ 250.334177][T11211] dump_stack+0x1d8/0x24e [ 250.334187][T11211] ? devkmsg_release+0x11c/0x11c [ 250.334201][T11211] ? show_regs_print_info+0x12/0x12 [ 250.368993][T11211] ? stack_trace_save+0x120/0x1f0 [ 250.373992][T11211] ? __x64_sys_mount+0xb1/0xc0 [ 250.378729][T11211] ? do_syscall_64+0xcb/0x1e0 [ 250.383385][T11211] should_fail+0x6f6/0x860 [ 250.387905][T11211] ? setup_fault_attr+0x3d0/0x3d0 [ 250.392904][T11211] ? __kasan_kmalloc+0x1a3/0x1e0 [ 250.397901][T11211] ? __kthread_create_on_node+0x126/0x410 13:22:50 executing program 1: clone(0x13102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) poll(0x0, 0x0, 0x8000000000000200) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f00000025c0)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00'}) ioctl$TUNSETLINK(r0, 0x400454cd, 0x10e) r2 = openat$selinux_attr(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) mmap(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x6, 0x1010, r2, 0xdc5f7000) close(r0) r3 = socket$inet_tcp(0x2, 0x1, 0x0) preadv(r3, 0x0, 0x0, 0x7fffffff, 0x1) [ 250.403593][T11211] should_failslab+0x5/0x20 [ 250.408067][T11211] kmem_cache_alloc_trace+0x39/0x2b0 [ 250.413322][T11211] ? ext4_fill_super+0xaa33/0xeb30 [ 250.418456][T11211] ? mount_bdev+0x22d/0x340 [ 250.423118][T11211] ? rcu_free_pwq+0x20/0x20 [ 250.427607][T11211] ? rcu_free_pwq+0x20/0x20 [ 250.432093][T11211] __kthread_create_on_node+0x126/0x410 [ 250.437621][T11211] ? kthread_create_on_node+0x120/0x120 [ 250.443286][T11211] ? rcu_free_pwq+0x20/0x20 [ 250.447821][T11211] kthread_create_on_node+0xda/0x120 [ 250.453080][T11211] ? tsk_fork_get_node+0x10/0x10 [ 250.457993][T11211] ? init_rescuer+0x89/0x290 [ 250.462734][T11211] ? init_rescuer+0x89/0x290 [ 250.467296][T11211] ? mutex_trylock+0xb0/0xb0 [ 250.471858][T11211] init_rescuer+0x1a6/0x290 [ 250.476358][T11211] alloc_workqueue+0xdae/0x11d0 [ 250.481187][T11211] ? ext4_fill_super+0xab45/0xeb30 [ 250.486272][T11211] ? apply_workqueue_attrs_locked+0x6d0/0x6d0 [ 250.492497][T11211] ext4_fill_super+0xaa33/0xeb30 [ 250.497412][T11211] ? ext4_mount+0x40/0x40 [ 250.501720][T11211] ? idr_replace+0x1c4/0x230 [ 250.506282][T11211] ? snprintf+0xd6/0x120 [ 250.510512][T11211] ? vscnprintf+0x80/0x80 [ 250.514824][T11211] ? set_blocksize+0x1a5/0x3a0 [ 250.519558][T11211] mount_bdev+0x22d/0x340 [ 250.523857][T11211] ? ext4_mount+0x40/0x40 [ 250.528154][T11211] legacy_get_tree+0xde/0x170 [ 250.532804][T11211] ? ext4_lazyinit_thread+0xd40/0xd40 [ 250.538144][T11211] vfs_get_tree+0x83/0x260 [ 250.542546][T11211] do_mount+0x19d0/0x2670 [ 250.546847][T11211] ? copy_mount_string+0x30/0x30 [ 250.551753][T11211] ? copy_mount_options+0x59/0x300 [ 250.556832][T11211] ? copy_mount_options+0x59/0x300 [ 250.561915][T11211] ? kmem_cache_alloc_trace+0x139/0x2b0 [ 250.567429][T11211] ? copy_mount_options+0x273/0x300 [ 250.572595][T11211] ksys_mount+0xc2/0xf0 [ 250.576725][T11211] __x64_sys_mount+0xb1/0xc0 [ 250.581286][T11211] do_syscall_64+0xcb/0x1e0 [ 250.585761][T11211] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 250.591619][T11211] RIP: 0033:0x467b1a [ 250.595481][T11211] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 250.615053][T11211] RSP: 002b:00007f3059253fa8 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 250.623431][T11211] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 0000000000467b1a [ 250.631382][T11211] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007f3059254000 [ 250.639336][T11211] RBP: 00007f3059254040 R08: 00007f3059254040 R09: 0000000020000000 [ 250.647974][T11211] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000020000000 13:22:50 executing program 3: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000002, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x31) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) waitid$P_PIDFD(0x3, r0, &(0x7f0000000500), 0x9, &(0x7f0000000580)) ptrace$cont(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='pids.events\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x12, r1, 0x0) ftruncate(r1, 0x1000673) ioctl$KDSKBENT(r1, 0x4b47, &(0x7f00000002c0)={0x2, 0x81, 0x5}) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x88400, 0x1a8) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0xd0265000) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) exit_group(0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x31, 0xffffffffffffffff, 0x0) time(&(0x7f0000000180)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14002600, 0x9, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c190000ce1900000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800)) 13:22:50 executing program 4: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000002, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x31) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) waitid$P_PIDFD(0x3, r0, &(0x7f0000000500), 0x9, &(0x7f0000000580)) ptrace$cont(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='pids.events\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x12, r1, 0x0) ftruncate(r1, 0x1000673) ioctl$KDSKBENT(r1, 0x4b47, &(0x7f00000002c0)={0x2, 0x81, 0x5}) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x88400, 0x1a8) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0xd0265000) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) exit_group(0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x31, 0xffffffffffffffff, 0x0) time(&(0x7f0000000180)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14001500, 0x9, &(0x7f0000000300)=[{&(0x7f0000000080)="20120000000100000c190000ce1900000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800)) [ 250.655922][T11211] R13: 0000000020000100 R14: 00007f3059254000 R15: 0000000020012c00 [ 250.664854][T11211] EXT4-fs: failed to create workqueue [ 250.670352][T11211] EXT4-fs (loop5): mount failed 13:22:50 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_mount_image$f2fs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0xf, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}, {&(0x7f0000010500)='\x00\x00\x00\x00', 0x4, 0xc80}, {&(0x7f0000010700)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e00000010000003000000010000000200000018b2e346f95e497f827e0a", 0x77, 0x1400}, {0x0}, {&(0x7f0000010e00)="d73cd47a0000000000100000000000000b000000000000000d0000001000000012000000170000001600000015000000ffffffffffffffffffffffffffffffffffffffff03000600000000000000000000000000140000000100000000000000ffffffffffffffffffffffffffffffffffffffff05000000000000000000000000000000c5010000060000000100000007000000070000000a0000004000000040000000fc0f00"/181, 0xb5, 0x200000}, {&(0x7f0000010f00)="0000000000000000000000000000000000000000000000000000000009f7a5bb", 0x20, 0x200fe0}, {&(0x7f0000011000)="00000000000000000000000000000000000000000000000000000006", 0x1c, 0x2011e0}, {0x0, 0x0, 0x2012e0}, {&(0x7f0000011400)="000000000000000000000000000000000000000000160000000510ec", 0x1c, 0x201320}, {&(0x7f0000011500)="00000017000000020c60", 0xa, 0x201380}, {&(0x7f0000011600)}, {&(0x7f0000011800)}, {&(0x7f0000011b00)="0000000000000000000000000000000000000000000000000000000100000000d73cd47a0000000000100000000000000b000000000000000d0000001000000012000000170000001600000015000000ffffffffffffffffffffffffffffffffffffffff03000600000000000000000000000000140000000100000000000000ffffffffffffffffffffffffffffffffffffffff05000000000000000000000000000000c5010000060000000100000007000000070000000a00000040000000400000", 0xc3, 0x204fe0}, {&(0x7f0000011c00)="0000000000000000000000000000000000000000000000000000000009f7a5bb", 0x20, 0x205fe0}, {0x0, 0x0, 0x401320}], 0x0, &(0x7f0000014b00)) 13:22:50 executing program 5 (fault-call:0 fault-nth:77): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000660000000f000000000000000100000001000000004000000040000020000000daf4655fdaf4655f0100ffff53ef010001000000d9f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010100)}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000100000000000000000000000000000000000000000000003000000000000000", 0x40, 0x540}, {&(0x7f0000010300)="02000000030000000400000066000f000300040000000000000000000f007f5c", 0x20, 0x800}, {&(0x7f0000011500)="ed41000000080000d9f4655fdaf4655fdaf4655f000000000000040004", 0x1d, 0x2200}, {0x0}, {&(0x7f0000011900)="ed8100001a040000daf4655fdaf4655fdaf4655f000000000000010004000000000000000100000014000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000039c34d38000000000000000000000000000000000000000000000000200000007412ab417412ab417412ab41daf4655f7412ab410000000000000000", 0xa0, 0x3800}], 0x0, &(0x7f0000012c00)) 13:22:50 executing program 2: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffff, 0xffffffffffffffff, 0x0) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) read(r0, 0x0, 0x0) syz_mount_image$f2fs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x10, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}, {&(0x7f0000010500)='\x00\x00\x00\x00', 0x4, 0xc80}, {&(0x7f0000010700)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e00000010000003000000010000000200000018b2e346f95e497f827e0a", 0x77, 0x1400}, {0x0}, {&(0x7f0000010e00)="d73cd47a0000000000100000000000000b000000000000000d0000001000000012000000170000001600000015000000ffffffffffffffffffffffffffffffffffffffff03000600000000000000000000000000140000000100000000000000ffffffffffffffffffffffffffffffffffffffff05000000000000000000000000000000c5010000060000000100000007000000070000000a0000004000000040000000fc0f00"/181, 0xb5, 0x200000}, {&(0x7f0000010f00)="0000000000000000000000000000000000000000000000000000000009f7a5bb", 0x20, 0x200fe0}, {&(0x7f0000011000)="00000000000000000000000000000000000000000000000000000006", 0x1c, 0x2011e0}, {0x0, 0x0, 0x2012e0}, {&(0x7f0000011400)="000000000000000000000000000000000000000000160000000510ec", 0x1c, 0x201320}, {&(0x7f0000011500)="00000017000000020c60", 0xa, 0x201380}, {&(0x7f0000011600)}, {&(0x7f0000011800)}, {&(0x7f0000011b00)="0000000000000000000000000000000000000000000000000000000100000000d73cd47a0000000000100000000000000b000000000000000d0000001000000012000000170000001600000015000000ffffffffffffffffffffffffffffffffffffffff03000600000000000000000000000000140000000100000000000000ffffffffffffffffffffffffffffffffffffffff05000000000000000000000000000000c5010000060000000100000007000000070000000a0000004000000040000000fc0f", 0xc6, 0x204fe0}, {&(0x7f0000011c00)='\x00'/24, 0x18, 0x205fe0}, {0x0}, {&(0x7f0000013000)="000000000000000000000100000001", 0xf, 0xa00000}], 0x0, &(0x7f0000014b00)) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='pids.events\x00', 0x275a, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x4, 0x2d, 0x9, 0x1, 0x0, 0x7fff, 0x88, 0x4, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x7, 0x0, @perf_bp={&(0x7f00000000c0), 0x1}, 0x9, 0x1, 0x4, 0x9, 0x0, 0xffff, 0x400, 0x0, 0x2, 0x0, 0x1000}, 0x0, 0xe, r1, 0xa) 13:22:50 executing program 3: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000002, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x31) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) waitid$P_PIDFD(0x3, r0, &(0x7f0000000500), 0x9, &(0x7f0000000580)) ptrace$cont(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='pids.events\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x12, r1, 0x0) ftruncate(r1, 0x1000673) ioctl$KDSKBENT(r1, 0x4b47, &(0x7f00000002c0)={0x2, 0x81, 0x5}) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x88400, 0x1a8) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0xd0265000) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) exit_group(0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x31, 0xffffffffffffffff, 0x0) time(&(0x7f0000000180)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14002600, 0x9, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c190000ce1900000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800)) 13:22:50 executing program 3: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000002, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x31) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) waitid$P_PIDFD(0x3, r0, &(0x7f0000000500), 0x9, &(0x7f0000000580)) ptrace$cont(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='pids.events\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x12, r1, 0x0) ftruncate(r1, 0x1000673) ioctl$KDSKBENT(r1, 0x4b47, &(0x7f00000002c0)={0x2, 0x81, 0x5}) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x88400, 0x1a8) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0xd0265000) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) exit_group(0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x31, 0xffffffffffffffff, 0x0) time(&(0x7f0000000180)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14002600, 0x9, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c190000ce1900000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800)) [ 250.818846][T11238] EXT4-fs (loop4): inodes count not valid: 4640 vs 32 [ 250.904416][T11247] F2FS-fs (loop0): invalid crc_offset: 0 [ 250.914101][T11244] F2FS-fs (loop2): invalid crc value [ 250.919896][T11244] F2FS-fs (loop2): invalid crc_offset: 0 [ 250.926935][T11249] FAULT_INJECTION: forcing a failure. [ 250.926935][T11249] name failslab, interval 1, probability 0, space 0, times 0 [ 250.927387][T11247] F2FS-fs (loop0): invalid crc_offset: 0 [ 250.940034][T11244] F2FS-fs (loop2): Failed to get valid F2FS checkpoint 13:22:51 executing program 4: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000002, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x31) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) waitid$P_PIDFD(0x3, r0, &(0x7f0000000500), 0x9, &(0x7f0000000580)) ptrace$cont(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='pids.events\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x12, r1, 0x0) ftruncate(r1, 0x1000673) ioctl$KDSKBENT(r1, 0x4b47, &(0x7f00000002c0)={0x2, 0x81, 0x5}) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x88400, 0x1a8) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0xd0265000) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) exit_group(0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x31, 0xffffffffffffffff, 0x0) time(&(0x7f0000000180)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14001500, 0x9, &(0x7f0000000300)=[{&(0x7f0000000080)="20140000000100000c190000ce1900000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800)) [ 250.952630][T11249] CPU: 1 PID: 11249 Comm: syz-executor.5 Not tainted 5.4.125-syzkaller-00016-gae94e015273b #0 [ 250.962853][T11249] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 250.972887][T11249] Call Trace: [ 250.976164][T11249] dump_stack+0x1d8/0x24e [ 250.980471][T11249] ? devkmsg_release+0x11c/0x11c [ 250.985398][T11249] ? show_regs_print_info+0x12/0x12 [ 250.990569][T11249] ? enqueue_entity+0xa8c/0xd10 [ 250.995395][T11249] should_fail+0x6f6/0x860 [ 250.999793][T11249] ? setup_fault_attr+0x3d0/0x3d0 [ 251.004806][T11249] ? iget_locked+0x7b0/0x7b0 [ 251.009455][T11249] ? ext4_alloc_inode+0x1d/0x620 [ 251.014557][T11249] should_failslab+0x5/0x20 [ 251.019066][T11249] kmem_cache_alloc+0x36/0x290 [ 251.023828][T11249] ? set_qf_name+0x310/0x310 [ 251.028413][T11249] ext4_alloc_inode+0x1d/0x620 [ 251.033185][T11249] iget_locked+0x13e/0x7b0 [ 251.037580][T11249] __ext4_iget+0x321/0x4a50 [ 251.042061][T11249] ? mutex_unlock+0x19/0x40 [ 251.046543][T11249] ? ext4_get_projid+0x140/0x140 [ 251.051556][T11249] ? ext4_fill_super+0xab45/0xeb30 [ 251.056666][T11249] ext4_fill_super+0xaafa/0xeb30 [ 251.061589][T11249] ? ext4_mount+0x40/0x40 [ 251.065901][T11249] ? idr_replace+0x1c4/0x230 [ 251.070483][T11249] ? snprintf+0xd6/0x120 [ 251.074712][T11249] ? vscnprintf+0x80/0x80 [ 251.079019][T11249] ? set_blocksize+0x1a5/0x3a0 [ 251.083773][T11249] mount_bdev+0x22d/0x340 [ 251.088095][T11249] ? ext4_mount+0x40/0x40 [ 251.092410][T11249] legacy_get_tree+0xde/0x170 [ 251.097067][T11249] ? ext4_lazyinit_thread+0xd40/0xd40 [ 251.102455][T11249] vfs_get_tree+0x83/0x260 [ 251.106844][T11249] do_mount+0x19d0/0x2670 [ 251.111147][T11249] ? copy_mount_string+0x30/0x30 [ 251.116076][T11249] ? copy_mount_options+0x59/0x300 [ 251.121166][T11249] ? copy_mount_options+0x59/0x300 [ 251.126260][T11249] ? kmem_cache_alloc_trace+0x139/0x2b0 [ 251.131781][T11249] ? copy_mount_options+0x273/0x300 [ 251.136954][T11249] ksys_mount+0xc2/0xf0 [ 251.141176][T11249] __x64_sys_mount+0xb1/0xc0 [ 251.145746][T11249] do_syscall_64+0xcb/0x1e0 [ 251.150223][T11249] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 251.156091][T11249] RIP: 0033:0x467b1a [ 251.159966][T11249] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 251.179553][T11249] RSP: 002b:00007f3059253fa8 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 251.188197][T11249] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 0000000000467b1a [ 251.196142][T11249] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007f3059254000 13:22:51 executing program 5 (fault-call:0 fault-nth:78): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000660000000f000000000000000100000001000000004000000040000020000000daf4655fdaf4655f0100ffff53ef010001000000d9f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010100)}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000100000000000000000000000000000000000000000000003000000000000000", 0x40, 0x540}, {&(0x7f0000010300)="02000000030000000400000066000f000300040000000000000000000f007f5c", 0x20, 0x800}, {&(0x7f0000011500)="ed41000000080000d9f4655fdaf4655fdaf4655f000000000000040004", 0x1d, 0x2200}, {0x0}, {&(0x7f0000011900)="ed8100001a040000daf4655fdaf4655fdaf4655f000000000000010004000000000000000100000014000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000039c34d38000000000000000000000000000000000000000000000000200000007412ab417412ab417412ab41daf4655f7412ab410000000000000000", 0xa0, 0x3800}], 0x0, &(0x7f0000012c00)) [ 251.204089][T11249] RBP: 00007f3059254040 R08: 00007f3059254040 R09: 0000000020000000 [ 251.212050][T11249] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000020000000 [ 251.219995][T11249] R13: 0000000020000100 R14: 00007f3059254000 R15: 0000000020012c00 [ 251.231546][T11249] EXT4-fs (loop5): get root inode failed [ 251.237511][T11249] EXT4-fs (loop5): mount failed [ 251.242873][T11247] F2FS-fs (loop0): Failed to get valid F2FS checkpoint 13:22:51 executing program 2: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffff, 0xffffffffffffffff, 0x0) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) read(r0, 0x0, 0x0) syz_mount_image$f2fs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x10, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}, {&(0x7f0000010500)='\x00\x00\x00\x00', 0x4, 0xc80}, {&(0x7f0000010700)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e00000010000003000000010000000200000018b2e346f95e497f827e0a", 0x77, 0x1400}, {0x0}, {&(0x7f0000010e00)="d73cd47a0000000000100000000000000b000000000000000d0000001000000012000000170000001600000015000000ffffffffffffffffffffffffffffffffffffffff03000600000000000000000000000000140000000100000000000000ffffffffffffffffffffffffffffffffffffffff05000000000000000000000000000000c5010000060000000100000007000000070000000a0000004000000040000000fc0f00"/181, 0xb5, 0x200000}, {&(0x7f0000010f00)="0000000000000000000000000000000000000000000000000000000009f7a5bb", 0x20, 0x200fe0}, {&(0x7f0000011000)="00000000000000000000000000000000000000000000000000000006", 0x1c, 0x2011e0}, {0x0, 0x0, 0x2012e0}, {&(0x7f0000011400)="000000000000000000000000000000000000000000160000000510ec", 0x1c, 0x201320}, {&(0x7f0000011500)="00000017000000020c60", 0xa, 0x201380}, {&(0x7f0000011600)}, {&(0x7f0000011800)}, {&(0x7f0000011b00)="0000000000000000000000000000000000000000000000000000000100000000d73cd47a0000000000100000000000000b000000000000000d0000001000000012000000170000001600000015000000ffffffffffffffffffffffffffffffffffffffff03000600000000000000000000000000140000000100000000000000ffffffffffffffffffffffffffffffffffffffff05000000000000000000000000000000c5010000060000000100000007000000070000000a0000004000000040000000fc0f", 0xc6, 0x204fe0}, {&(0x7f0000011c00)='\x00'/28, 0x1c, 0x205fe0}, {0x0}, {&(0x7f0000013000)="000000000000000000000100000001", 0xf, 0xa00000}], 0x0, &(0x7f0000014b00)) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='pids.events\x00', 0x275a, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x4, 0x2d, 0x9, 0x1, 0x0, 0x7fff, 0x88, 0x4, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x7, 0x0, @perf_bp={&(0x7f00000000c0), 0x1}, 0x9, 0x1, 0x4, 0x9, 0x0, 0xffff, 0x400, 0x0, 0x2, 0x0, 0x1000}, 0x0, 0xe, r1, 0xa) 13:22:51 executing program 1: clone(0x13102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) poll(0x0, 0x0, 0x8000000000000200) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f00000025c0)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00'}) ioctl$TUNSETLINK(r0, 0x400454cd, 0x300) r2 = openat$selinux_attr(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) mmap(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x6, 0x1010, r2, 0xdc5f7000) close(r0) r3 = socket$inet_tcp(0x2, 0x1, 0x0) preadv(r3, 0x0, 0x0, 0x7fffffff, 0x1) [ 251.276171][T11266] EXT4-fs (loop4): inodes count not valid: 5152 vs 32 13:22:51 executing program 3: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffff, 0xffffffffffffffff, 0x0) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) read(r0, 0x0, 0x0) syz_mount_image$f2fs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x10, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}, {&(0x7f0000010500)='\x00\x00\x00\x00', 0x4, 0xc80}, {&(0x7f0000010700)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e00000010000003000000010000000200000018b2e346f95e497f827e0a", 0x77, 0x1400}, {0x0}, {&(0x7f0000010e00)="d73cd47a0000000000100000000000000b000000000000000d0000001000000012000000170000001600000015000000ffffffffffffffffffffffffffffffffffffffff03000600000000000000000000000000140000000100000000000000ffffffffffffffffffffffffffffffffffffffff05000000000000000000000000000000c5010000060000000100000007000000070000000a0000004000000040000000fc0f00"/181, 0xb5, 0x200000}, {&(0x7f0000010f00)="0000000000000000000000000000000000000000000000000000000009f7a5bb", 0x20, 0x200fe0}, {&(0x7f0000011000)="00000000000000000000000000000000000000000000000000000006", 0x1c, 0x2011e0}, {0x0, 0x0, 0x2012e0}, {&(0x7f0000011400)="000000000000000000000000000000000000000000160000000510ec", 0x1c, 0x201320}, {&(0x7f0000011500)="00000017000000020c60", 0xa, 0x201380}, {&(0x7f0000011600)}, {&(0x7f0000011800)}, {&(0x7f0000011b00)="0000000000000000000000000000000000000000000000000000000100000000d73cd47a0000000000100000000000000b000000000000000d0000001000000012000000170000001600000015000000ffffffffffffffffffffffffffffffffffffffff03000600000000000000000000000000140000000100000000000000ffffffffffffffffffffffffffffffffffffffff05000000000000000000000000000000c5010000060000000100000007000000070000000a0000004000000040000000fc0f", 0xc6, 0x204fe0}, {&(0x7f0000011c00)='\x00'/24, 0x18, 0x205fe0}, {0x0}, {&(0x7f0000013000)="000000000000000000000100000001", 0xf, 0xa00000}], 0x0, &(0x7f0000014b00)) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='pids.events\x00', 0x275a, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x4, 0x2d, 0x9, 0x1, 0x0, 0x7fff, 0x88, 0x4, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x7, 0x0, @perf_bp={&(0x7f00000000c0), 0x1}, 0x9, 0x1, 0x4, 0x9, 0x0, 0xffff, 0x400, 0x0, 0x2, 0x0, 0x1000}, 0x0, 0xe, r1, 0xa) 13:22:51 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_mount_image$f2fs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0xf, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}, {&(0x7f0000010500)='\x00\x00\x00\x00', 0x4, 0xc80}, {&(0x7f0000010700)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e00000010000003000000010000000200000018b2e346f95e497f827e0a", 0x77, 0x1400}, {0x0}, {&(0x7f0000010e00)="d73cd47a0000000000100000000000000b000000000000000d0000001000000012000000170000001600000015000000ffffffffffffffffffffffffffffffffffffffff03000600000000000000000000000000140000000100000000000000ffffffffffffffffffffffffffffffffffffffff05000000000000000000000000000000c5010000060000000100000007000000070000000a0000004000000040000000fc0f00"/181, 0xb5, 0x200000}, {&(0x7f0000010f00)="0000000000000000000000000000000000000000000000000000000009f7a5bb", 0x20, 0x200fe0}, {&(0x7f0000011000)="00000000000000000000000000000000000000000000000000000006", 0x1c, 0x2011e0}, {0x0, 0x0, 0x2012e0}, {&(0x7f0000011400)="000000000000000000000000000000000000000000160000000510ec", 0x1c, 0x201320}, {&(0x7f0000011500)="00000017000000020c60", 0xa, 0x201380}, {&(0x7f0000011600)}, {&(0x7f0000011800)}, {&(0x7f0000011b00)="0000000000000000000000000000000000000000000000000000000100000000d73cd47a0000000000100000000000000b000000000000000d0000001000000012000000170000001600000015000000ffffffffffffffffffffffffffffffffffffffff03000600000000000000000000000000140000000100000000000000ffffffffffffffffffffffffffffffffffffffff05000000000000000000000000000000c5010000060000000100000007000000070000000a00000040000000400000", 0xc3, 0x204fe0}, {&(0x7f0000011c00)="0000000000000000000000000000000000000000000000000000000009f7a5bb", 0x20, 0x205fe0}, {0x0, 0x0, 0x401320}], 0x0, &(0x7f0000014b00)) 13:22:51 executing program 4: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000002, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x31) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) waitid$P_PIDFD(0x3, r0, &(0x7f0000000500), 0x9, &(0x7f0000000580)) ptrace$cont(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='pids.events\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x12, r1, 0x0) ftruncate(r1, 0x1000673) ioctl$KDSKBENT(r1, 0x4b47, &(0x7f00000002c0)={0x2, 0x81, 0x5}) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x88400, 0x1a8) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0xd0265000) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) exit_group(0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x31, 0xffffffffffffffff, 0x0) time(&(0x7f0000000180)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14001500, 0x9, &(0x7f0000000300)=[{&(0x7f0000000080)="201a0000000100000c190000ce1900000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800)) [ 251.401156][T11273] F2FS-fs (loop2): invalid crc value [ 251.411950][T11271] FAULT_INJECTION: forcing a failure. [ 251.411950][T11271] name failslab, interval 1, probability 0, space 0, times 0 [ 251.412147][T11273] F2FS-fs (loop2): invalid crc_offset: 0 [ 251.453220][T11271] CPU: 1 PID: 11271 Comm: syz-executor.5 Not tainted 5.4.125-syzkaller-00016-gae94e015273b #0 [ 251.458579][T11273] F2FS-fs (loop2): Failed to get valid F2FS checkpoint [ 251.463474][T11271] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 251.463478][T11271] Call Trace: [ 251.463494][T11271] dump_stack+0x1d8/0x24e [ 251.463513][T11271] ? devkmsg_release+0x11c/0x11c [ 251.492823][T11271] ? show_regs_print_info+0x12/0x12 [ 251.497994][T11271] should_fail+0x6f6/0x860 [ 251.502387][T11271] ? setup_fault_attr+0x3d0/0x3d0 [ 251.507388][T11271] ? security_inode_alloc+0x32/0x1d0 [ 251.512662][T11271] should_failslab+0x5/0x20 [ 251.517139][T11271] kmem_cache_alloc+0x36/0x290 [ 251.521884][T11271] ? from_kuid_munged+0x3b0/0x3b0 [ 251.526880][T11271] security_inode_alloc+0x32/0x1d0 [ 251.531970][T11271] inode_init_always+0x387/0x810 [ 251.536880][T11271] ? set_qf_name+0x310/0x310 [ 251.541441][T11271] iget_locked+0x1d6/0x7b0 [ 251.545835][T11271] __ext4_iget+0x321/0x4a50 [ 251.550313][T11271] ? mutex_unlock+0x19/0x40 [ 251.554807][T11271] ? ext4_get_projid+0x140/0x140 [ 251.559718][T11271] ? ext4_fill_super+0xab45/0xeb30 [ 251.564808][T11271] ext4_fill_super+0xaafa/0xeb30 [ 251.569726][T11271] ? ext4_mount+0x40/0x40 [ 251.574028][T11271] ? idr_replace+0x1c4/0x230 [ 251.578592][T11271] ? snprintf+0xd6/0x120 [ 251.582808][T11271] ? vscnprintf+0x80/0x80 [ 251.587118][T11271] ? set_blocksize+0x1a5/0x3a0 [ 251.591858][T11271] mount_bdev+0x22d/0x340 [ 251.596176][T11271] ? ext4_mount+0x40/0x40 [ 251.600481][T11271] legacy_get_tree+0xde/0x170 [ 251.605133][T11271] ? ext4_lazyinit_thread+0xd40/0xd40 [ 251.610480][T11271] vfs_get_tree+0x83/0x260 [ 251.614871][T11271] do_mount+0x19d0/0x2670 [ 251.619176][T11271] ? copy_mount_string+0x30/0x30 [ 251.624085][T11271] ? copy_mount_options+0x59/0x300 [ 251.629167][T11271] ? copy_mount_options+0x59/0x300 [ 251.634256][T11271] ? kmem_cache_alloc_trace+0x139/0x2b0 [ 251.639775][T11271] ? copy_mount_options+0x273/0x300 [ 251.644947][T11271] ksys_mount+0xc2/0xf0 [ 251.649080][T11271] __x64_sys_mount+0xb1/0xc0 [ 251.653646][T11271] do_syscall_64+0xcb/0x1e0 [ 251.658129][T11271] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 251.663994][T11271] RIP: 0033:0x467b1a [ 251.667866][T11271] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 251.687442][T11271] RSP: 002b:00007f3059253fa8 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 251.695828][T11271] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 0000000000467b1a [ 251.703774][T11271] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007f3059254000 [ 251.711723][T11271] RBP: 00007f3059254040 R08: 00007f3059254040 R09: 0000000020000000 [ 251.719668][T11271] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000020000000 [ 251.727617][T11271] R13: 0000000020000100 R14: 00007f3059254000 R15: 0000000020012c00 [ 251.743028][T11271] EXT4-fs (loop5): get root inode failed 13:22:51 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_mount_image$f2fs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0xf, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}, {&(0x7f0000010500)='\x00\x00\x00\x00', 0x4, 0xc80}, {&(0x7f0000010700)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e00000010000003000000010000000200000018b2e346f95e497f827e0a", 0x77, 0x1400}, {0x0}, {&(0x7f0000010e00)="d73cd47a0000000000100000000000000b000000000000000d0000001000000012000000170000001600000015000000ffffffffffffffffffffffffffffffffffffffff03000600000000000000000000000000140000000100000000000000ffffffffffffffffffffffffffffffffffffffff05000000000000000000000000000000c5010000060000000100000007000000070000000a0000004000000040000000fc0f00"/181, 0xb5, 0x200000}, {&(0x7f0000010f00)="0000000000000000000000000000000000000000000000000000000009f7a5bb", 0x20, 0x200fe0}, {&(0x7f0000011000)="00000000000000000000000000000000000000000000000000000006", 0x1c, 0x2011e0}, {0x0, 0x0, 0x2012e0}, {&(0x7f0000011400)="000000000000000000000000000000000000000000160000000510ec", 0x1c, 0x201320}, {&(0x7f0000011500)="00000017000000020c60", 0xa, 0x201380}, {&(0x7f0000011600)}, {&(0x7f0000011800)}, {&(0x7f0000011b00)="0000000000000000000000000000000000000000000000000000000100000000d73cd47a0000000000100000000000000b000000000000000d0000001000000012000000170000001600000015000000ffffffffffffffffffffffffffffffffffffffff03000600000000000000000000000000140000000100000000000000ffffffffffffffffffffffffffffffffffffffff05000000000000000000000000000000c5010000060000000100000007000000070000000a0000004000000040000000fc", 0xc5, 0x204fe0}, {&(0x7f0000011c00)="0000000000000000000000000000000000000000000000000000000009f7a5bb", 0x20, 0x205fe0}, {0x0, 0x0, 0x401320}], 0x0, &(0x7f0000014b00)) 13:22:51 executing program 3: clone(0x13102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) poll(0x0, 0x0, 0x8000000000000200) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f00000025c0)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00'}) ioctl$TUNSETLINK(r0, 0x40087602, 0x30a) r2 = openat$selinux_attr(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) mmap(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x6, 0x1010, r2, 0xdc5f7000) close(r0) r3 = socket$inet_tcp(0x2, 0x1, 0x0) preadv(r3, 0x0, 0x0, 0x7fffffff, 0x1) 13:22:51 executing program 4: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000002, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x31) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) waitid$P_PIDFD(0x3, r0, &(0x7f0000000500), 0x9, &(0x7f0000000580)) ptrace$cont(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='pids.events\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x12, r1, 0x0) ftruncate(r1, 0x1000673) ioctl$KDSKBENT(r1, 0x4b47, &(0x7f00000002c0)={0x2, 0x81, 0x5}) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x88400, 0x1a8) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0xd0265000) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) exit_group(0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x31, 0xffffffffffffffff, 0x0) time(&(0x7f0000000180)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14001500, 0x9, &(0x7f0000000300)=[{&(0x7f0000000080)="20220000000100000c190000ce1900000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800)) 13:22:51 executing program 5 (fault-call:0 fault-nth:79): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000660000000f000000000000000100000001000000004000000040000020000000daf4655fdaf4655f0100ffff53ef010001000000d9f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010100)}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000100000000000000000000000000000000000000000000003000000000000000", 0x40, 0x540}, {&(0x7f0000010300)="02000000030000000400000066000f000300040000000000000000000f007f5c", 0x20, 0x800}, {&(0x7f0000011500)="ed41000000080000d9f4655fdaf4655fdaf4655f000000000000040004", 0x1d, 0x2200}, {0x0}, {&(0x7f0000011900)="ed8100001a040000daf4655fdaf4655fdaf4655f000000000000010004000000000000000100000014000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000039c34d38000000000000000000000000000000000000000000000000200000007412ab417412ab417412ab41daf4655f7412ab410000000000000000", 0xa0, 0x3800}], 0x0, &(0x7f0000012c00)) [ 251.746492][T11290] EXT4-fs (loop4): inodes count not valid: 6688 vs 32 [ 251.769611][T11271] EXT4-fs (loop5): mount failed 13:22:51 executing program 2: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffff, 0xffffffffffffffff, 0x0) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) read(r0, 0x0, 0x0) syz_mount_image$f2fs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x10, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}, {&(0x7f0000010500)='\x00\x00\x00\x00', 0x4, 0xc80}, {&(0x7f0000010700)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e00000010000003000000010000000200000018b2e346f95e497f827e0a", 0x77, 0x1400}, {0x0}, {&(0x7f0000010e00)="d73cd47a0000000000100000000000000b000000000000000d0000001000000012000000170000001600000015000000ffffffffffffffffffffffffffffffffffffffff03000600000000000000000000000000140000000100000000000000ffffffffffffffffffffffffffffffffffffffff05000000000000000000000000000000c5010000060000000100000007000000070000000a0000004000000040000000fc0f00"/181, 0xb5, 0x200000}, {&(0x7f0000010f00)="0000000000000000000000000000000000000000000000000000000009f7a5bb", 0x20, 0x200fe0}, {&(0x7f0000011000)="00000000000000000000000000000000000000000000000000000006", 0x1c, 0x2011e0}, {0x0, 0x0, 0x2012e0}, {&(0x7f0000011400)="000000000000000000000000000000000000000000160000000510ec", 0x1c, 0x201320}, {&(0x7f0000011500)="00000017000000020c60", 0xa, 0x201380}, {&(0x7f0000011600)}, {&(0x7f0000011800)}, {&(0x7f0000011b00)="0000000000000000000000000000000000000000000000000000000100000000d73cd47a0000000000100000000000000b000000000000000d0000001000000012000000170000001600000015000000ffffffffffffffffffffffffffffffffffffffff03000600000000000000000000000000140000000100000000000000ffffffffffffffffffffffffffffffffffffffff05000000000000000000000000000000c5010000060000000100000007000000070000000a0000004000000040000000fc0f", 0xc6, 0x204fe0}, {&(0x7f0000011c00)='\x00'/28, 0x1c, 0x205fe0}, {0x0}, {&(0x7f0000013000)="000000000000000000000100000001", 0xf, 0xa00000}], 0x0, &(0x7f0000014b00)) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='pids.events\x00', 0x275a, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x4, 0x2d, 0x9, 0x1, 0x0, 0x7fff, 0x88, 0x4, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x7, 0x0, @perf_bp={&(0x7f00000000c0), 0x1}, 0x9, 0x1, 0x4, 0x9, 0x0, 0xffff, 0x400, 0x0, 0x2, 0x0, 0x1000}, 0x0, 0xe, r1, 0xa) 13:22:51 executing program 1: clone(0x13102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) poll(0x0, 0x0, 0x8000000000000200) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f00000025c0)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00'}) ioctl$TUNSETLINK(r0, 0x400454cd, 0x301) r2 = openat$selinux_attr(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) mmap(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x6, 0x1010, r2, 0xdc5f7000) close(r0) r3 = socket$inet_tcp(0x2, 0x1, 0x0) preadv(r3, 0x0, 0x0, 0x7fffffff, 0x1) [ 251.891406][T11300] F2FS-fs (loop0): invalid crc value [ 251.897063][T11300] F2FS-fs (loop0): invalid crc_offset: 0 [ 251.902770][T11300] F2FS-fs (loop0): Failed to get valid F2FS checkpoint [ 251.924218][T11312] FAULT_INJECTION: forcing a failure. [ 251.924218][T11312] name failslab, interval 1, probability 0, space 0, times 0 [ 251.937790][T11315] F2FS-fs (loop2): invalid crc value [ 251.943417][T11307] EXT4-fs (loop4): inodes count not valid: 8736 vs 32 [ 251.948289][T11315] F2FS-fs (loop2): invalid crc_offset: 0 [ 251.956865][T11315] F2FS-fs (loop2): Failed to get valid F2FS checkpoint [ 251.965806][T11312] CPU: 1 PID: 11312 Comm: syz-executor.5 Not tainted 5.4.125-syzkaller-00016-gae94e015273b #0 [ 251.976038][T11312] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 251.986086][T11312] Call Trace: [ 251.989371][T11312] dump_stack+0x1d8/0x24e [ 251.993698][T11312] ? devkmsg_release+0x11c/0x11c [ 251.998605][T11312] ? stack_trace_save+0x1f0/0x1f0 [ 252.003598][T11312] ? show_regs_print_info+0x12/0x12 [ 252.008770][T11312] ? __kernel_text_address+0x93/0x100 [ 252.014113][T11312] ? unwind_get_return_address+0x48/0x80 [ 252.019726][T11312] ? arch_stack_walk+0xf8/0x140 [ 252.024555][T11312] should_fail+0x6f6/0x860 [ 252.028945][T11312] ? setup_fault_attr+0x3d0/0x3d0 [ 252.033939][T11312] ? stack_trace_save+0x120/0x1f0 [ 252.038945][T11312] ? mempool_alloc_slab+0x16/0x20 [ 252.043980][T11312] should_failslab+0x5/0x20 [ 252.048465][T11312] kmem_cache_alloc+0x36/0x290 [ 252.053208][T11312] ? mempool_free+0x380/0x380 [ 252.057855][T11312] mempool_alloc_slab+0x16/0x20 [ 252.062680][T11312] mempool_alloc+0x113/0x680 [ 252.067242][T11312] ? mempool_resize+0x900/0x900 [ 252.072063][T11312] ? debug_smp_processor_id+0x20/0x20 [ 252.077419][T11312] bio_alloc_bioset+0x1db/0x640 [ 252.082268][T11312] ? bio_chain_endio+0x110/0x110 [ 252.087176][T11312] ? write_boundary_block+0x150/0x150 [ 252.092516][T11312] ? check_preemption_disabled+0x9e/0x330 [ 252.098205][T11312] submit_bh_wbc+0x1ba/0x790 [ 252.102787][T11312] ? write_boundary_block+0x150/0x150 [ 252.108126][T11312] ll_rw_block+0x1cb/0x230 [ 252.112516][T11312] __breadahead_gfp+0xc9/0x190 [ 252.117251][T11312] ? __getblk_gfp+0x654/0x750 [ 252.121898][T11312] ? __breadahead+0x170/0x170 [ 252.126547][T11312] __ext4_get_inode_loc+0xbf6/0x1030 [ 252.131894][T11312] ? ext4_get_inode_loc+0x60/0x60 [ 252.136888][T11312] ? memset+0x1f/0x40 [ 252.140850][T11312] ? _raw_spin_unlock+0x49/0x60 [ 252.145846][T11312] ? iget_locked+0x6b3/0x7b0 [ 252.150412][T11312] __ext4_iget+0x3d1/0x4a50 [ 252.155668][T11312] ? mutex_unlock+0x19/0x40 [ 252.160149][T11312] ? ext4_get_projid+0x140/0x140 [ 252.165078][T11312] ? ext4_fill_super+0xab45/0xeb30 [ 252.170165][T11312] ext4_fill_super+0xaafa/0xeb30 [ 252.175122][T11312] ? ext4_mount+0x40/0x40 [ 252.179433][T11312] ? idr_replace+0x1c4/0x230 [ 252.183991][T11312] ? snprintf+0xd6/0x120 [ 252.188210][T11312] ? vscnprintf+0x80/0x80 [ 252.192684][T11312] ? set_blocksize+0x1a5/0x3a0 [ 252.197420][T11312] mount_bdev+0x22d/0x340 [ 252.201723][T11312] ? ext4_mount+0x40/0x40 [ 252.206107][T11312] legacy_get_tree+0xde/0x170 [ 252.210778][T11312] ? ext4_lazyinit_thread+0xd40/0xd40 [ 252.216118][T11312] vfs_get_tree+0x83/0x260 [ 252.220507][T11312] do_mount+0x19d0/0x2670 [ 252.224809][T11312] ? copy_mount_string+0x30/0x30 [ 252.229715][T11312] ? copy_mount_options+0x59/0x300 [ 252.234798][T11312] ? kmem_cache_alloc_trace+0x139/0x2b0 [ 252.240313][T11312] ? copy_mount_options+0x273/0x300 [ 252.245479][T11312] ksys_mount+0xc2/0xf0 [ 252.249609][T11312] __x64_sys_mount+0xb1/0xc0 [ 252.254261][T11312] do_syscall_64+0xcb/0x1e0 [ 252.258736][T11312] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 252.264622][T11312] RIP: 0033:0x467b1a [ 252.268488][T11312] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 13:22:52 executing program 4: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000002, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x31) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) waitid$P_PIDFD(0x3, r0, &(0x7f0000000500), 0x9, &(0x7f0000000580)) ptrace$cont(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='pids.events\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x12, r1, 0x0) ftruncate(r1, 0x1000673) ioctl$KDSKBENT(r1, 0x4b47, &(0x7f00000002c0)={0x2, 0x81, 0x5}) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x88400, 0x1a8) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0xd0265000) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) exit_group(0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x31, 0xffffffffffffffff, 0x0) time(&(0x7f0000000180)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14001500, 0x9, &(0x7f0000000300)=[{&(0x7f0000000080)="20250000000100000c190000ce1900000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800)) 13:22:52 executing program 3: clone(0x13102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) poll(0x0, 0x0, 0x8000000000000200) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f00000025c0)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00'}) ioctl$TUNSETLINK(r0, 0x40087602, 0x30a) r2 = openat$selinux_attr(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) mmap(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x6, 0x1010, r2, 0xdc5f7000) close(r0) r3 = socket$inet_tcp(0x2, 0x1, 0x0) preadv(r3, 0x0, 0x0, 0x7fffffff, 0x1) [ 252.288063][T11312] RSP: 002b:00007f3059253fa8 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 252.296446][T11312] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 0000000000467b1a [ 252.304388][T11312] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007f3059254000 [ 252.312421][T11312] RBP: 00007f3059254040 R08: 00007f3059254040 R09: 0000000020000000 [ 252.320366][T11312] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000020000000 [ 252.328502][T11312] R13: 0000000020000100 R14: 00007f3059254000 R15: 0000000020012c00 13:22:52 executing program 5 (fault-call:0 fault-nth:80): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000660000000f000000000000000100000001000000004000000040000020000000daf4655fdaf4655f0100ffff53ef010001000000d9f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010100)}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000100000000000000000000000000000000000000000000003000000000000000", 0x40, 0x540}, {&(0x7f0000010300)="02000000030000000400000066000f000300040000000000000000000f007f5c", 0x20, 0x800}, {&(0x7f0000011500)="ed41000000080000d9f4655fdaf4655fdaf4655f000000000000040004", 0x1d, 0x2200}, {0x0}, {&(0x7f0000011900)="ed8100001a040000daf4655fdaf4655fdaf4655f000000000000010004000000000000000100000014000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000039c34d38000000000000000000000000000000000000000000000000200000007412ab417412ab417412ab41daf4655f7412ab410000000000000000", 0xa0, 0x3800}], 0x0, &(0x7f0000012c00)) [ 252.350044][T11312] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue 13:22:52 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_mount_image$f2fs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0xf, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}, {&(0x7f0000010500)='\x00\x00\x00\x00', 0x4, 0xc80}, {&(0x7f0000010700)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e00000010000003000000010000000200000018b2e346f95e497f827e0a", 0x77, 0x1400}, {0x0}, {&(0x7f0000010e00)="d73cd47a0000000000100000000000000b000000000000000d0000001000000012000000170000001600000015000000ffffffffffffffffffffffffffffffffffffffff03000600000000000000000000000000140000000100000000000000ffffffffffffffffffffffffffffffffffffffff05000000000000000000000000000000c5010000060000000100000007000000070000000a0000004000000040000000fc0f00"/181, 0xb5, 0x200000}, {&(0x7f0000010f00)="0000000000000000000000000000000000000000000000000000000009f7a5bb", 0x20, 0x200fe0}, {&(0x7f0000011000)="00000000000000000000000000000000000000000000000000000006", 0x1c, 0x2011e0}, {0x0, 0x0, 0x2012e0}, {&(0x7f0000011400)="000000000000000000000000000000000000000000160000000510ec", 0x1c, 0x201320}, {&(0x7f0000011500)="00000017000000020c60", 0xa, 0x201380}, {&(0x7f0000011600)}, {&(0x7f0000011800)}, {&(0x7f0000011b00)="0000000000000000000000000000000000000000000000000000000100000000d73cd47a0000000000100000000000000b000000000000000d0000001000000012000000170000001600000015000000ffffffffffffffffffffffffffffffffffffffff03000600000000000000000000000000140000000100000000000000ffffffffffffffffffffffffffffffffffffffff05000000000000000000000000000000c5010000060000000100000007000000070000000a0000004000000040000000fc", 0xc5, 0x204fe0}, {&(0x7f0000011c00)="0000000000000000000000000000000000000000000000000000000009f7a5bb", 0x20, 0x205fe0}, {0x0, 0x0, 0x401320}], 0x0, &(0x7f0000014b00)) 13:22:52 executing program 4: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000002, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x31) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) waitid$P_PIDFD(0x3, r0, &(0x7f0000000500), 0x9, &(0x7f0000000580)) ptrace$cont(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='pids.events\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x12, r1, 0x0) ftruncate(r1, 0x1000673) ioctl$KDSKBENT(r1, 0x4b47, &(0x7f00000002c0)={0x2, 0x81, 0x5}) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x88400, 0x1a8) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0xd0265000) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) exit_group(0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x31, 0xffffffffffffffff, 0x0) time(&(0x7f0000000180)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14001500, 0x9, &(0x7f0000000300)=[{&(0x7f0000000080)="202e0000000100000c190000ce1900000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800)) [ 252.410854][T11334] EXT4-fs (loop4): inodes count not valid: 9504 vs 32 13:22:52 executing program 2: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffff, 0xffffffffffffffff, 0x0) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) read(r0, 0x0, 0x0) syz_mount_image$f2fs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x10, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}, {&(0x7f0000010500)='\x00\x00\x00\x00', 0x4, 0xc80}, {&(0x7f0000010700)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e00000010000003000000010000000200000018b2e346f95e497f827e0a", 0x77, 0x1400}, {0x0}, {&(0x7f0000010e00)="d73cd47a0000000000100000000000000b000000000000000d0000001000000012000000170000001600000015000000ffffffffffffffffffffffffffffffffffffffff03000600000000000000000000000000140000000100000000000000ffffffffffffffffffffffffffffffffffffffff05000000000000000000000000000000c5010000060000000100000007000000070000000a0000004000000040000000fc0f00"/181, 0xb5, 0x200000}, {&(0x7f0000010f00)="0000000000000000000000000000000000000000000000000000000009f7a5bb", 0x20, 0x200fe0}, {&(0x7f0000011000)="00000000000000000000000000000000000000000000000000000006", 0x1c, 0x2011e0}, {0x0, 0x0, 0x2012e0}, {&(0x7f0000011400)="000000000000000000000000000000000000000000160000000510ec", 0x1c, 0x201320}, {&(0x7f0000011500)="00000017000000020c60", 0xa, 0x201380}, {&(0x7f0000011600)}, {&(0x7f0000011800)}, {&(0x7f0000011b00)="0000000000000000000000000000000000000000000000000000000100000000d73cd47a0000000000100000000000000b000000000000000d0000001000000012000000170000001600000015000000ffffffffffffffffffffffffffffffffffffffff03000600000000000000000000000000140000000100000000000000ffffffffffffffffffffffffffffffffffffffff05000000000000000000000000000000c5010000060000000100000007000000070000000a0000004000000040000000fc0f", 0xc6, 0x204fe0}, {&(0x7f0000011c00)='\x00'/28, 0x1c, 0x205fe0}, {0x0}, {&(0x7f0000013000)="000000000000000000000100000001", 0xf, 0xa00000}], 0x0, &(0x7f0000014b00)) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='pids.events\x00', 0x275a, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x4, 0x2d, 0x9, 0x1, 0x0, 0x7fff, 0x88, 0x4, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x7, 0x0, @perf_bp={&(0x7f00000000c0), 0x1}, 0x9, 0x1, 0x4, 0x9, 0x0, 0xffff, 0x400, 0x0, 0x2, 0x0, 0x1000}, 0x0, 0xe, r1, 0xa) [ 252.495379][T11343] F2FS-fs (loop0): invalid crc value [ 252.496572][T11344] FAULT_INJECTION: forcing a failure. [ 252.496572][T11344] name failslab, interval 1, probability 0, space 0, times 0 [ 252.512870][T11343] F2FS-fs (loop0): invalid crc_offset: 0 [ 252.513473][T11344] CPU: 1 PID: 11344 Comm: syz-executor.5 Not tainted 5.4.125-syzkaller-00016-gae94e015273b #0 [ 252.519002][T11343] F2FS-fs (loop0): Failed to get valid F2FS checkpoint [ 252.529066][T11344] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 252.529069][T11344] Call Trace: [ 252.529087][T11344] dump_stack+0x1d8/0x24e [ 252.529097][T11344] ? devkmsg_release+0x11c/0x11c [ 252.529105][T11344] ? show_regs_print_info+0x12/0x12 [ 252.529117][T11344] should_fail+0x6f6/0x860 [ 252.529126][T11344] ? setup_fault_attr+0x3d0/0x3d0 [ 252.529136][T11344] ? security_inode_alloc+0x32/0x1d0 [ 252.529150][T11344] should_failslab+0x5/0x20 [ 252.582764][T11344] kmem_cache_alloc+0x36/0x290 [ 252.587502][T11344] ? from_kuid_munged+0x3b0/0x3b0 [ 252.592502][T11344] security_inode_alloc+0x32/0x1d0 [ 252.597586][T11344] inode_init_always+0x387/0x810 [ 252.602504][T11344] ? set_qf_name+0x310/0x310 [ 252.607064][T11344] iget_locked+0x1d6/0x7b0 [ 252.611466][T11344] __ext4_iget+0x321/0x4a50 [ 252.615942][T11344] ? mutex_unlock+0x19/0x40 [ 252.620417][T11344] ? ext4_get_projid+0x140/0x140 [ 252.625326][T11344] ? ext4_fill_super+0xab45/0xeb30 [ 252.630413][T11344] ext4_fill_super+0xaafa/0xeb30 [ 252.635589][T11344] ? ext4_mount+0x40/0x40 [ 252.639888][T11344] ? idr_replace+0x1c4/0x230 [ 252.644451][T11344] ? snprintf+0xd6/0x120 [ 252.648675][T11344] ? vscnprintf+0x80/0x80 [ 252.652977][T11344] ? set_blocksize+0x1a5/0x3a0 [ 252.657714][T11344] mount_bdev+0x22d/0x340 [ 252.662014][T11344] ? ext4_mount+0x40/0x40 [ 252.666312][T11344] legacy_get_tree+0xde/0x170 [ 252.670962][T11344] ? ext4_lazyinit_thread+0xd40/0xd40 [ 252.676306][T11344] vfs_get_tree+0x83/0x260 [ 252.680698][T11344] do_mount+0x19d0/0x2670 [ 252.685007][T11344] ? copy_mount_string+0x30/0x30 [ 252.689916][T11344] ? copy_mount_options+0x1d8/0x300 [ 252.695096][T11344] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x90 [ 252.701399][T11344] ? copy_mount_options+0x273/0x300 [ 252.706648][T11344] ksys_mount+0xc2/0xf0 [ 252.710865][T11344] __x64_sys_mount+0xb1/0xc0 [ 252.715429][T11344] do_syscall_64+0xcb/0x1e0 [ 252.719916][T11344] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 252.725778][T11344] RIP: 0033:0x467b1a [ 252.729657][T11344] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 252.749241][T11344] RSP: 002b:00007f3059253fa8 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 252.757706][T11344] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 0000000000467b1a [ 252.765660][T11344] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007f3059254000 [ 252.773612][T11344] RBP: 00007f3059254040 R08: 00007f3059254040 R09: 0000000020000000 [ 252.781553][T11344] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000020000000 13:22:52 executing program 1: clone(0x13102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) poll(0x0, 0x0, 0x8000000000000200) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f00000025c0)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00'}) ioctl$TUNSETLINK(r0, 0x400454cd, 0x305) r2 = openat$selinux_attr(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) mmap(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x6, 0x1010, r2, 0xdc5f7000) close(r0) r3 = socket$inet_tcp(0x2, 0x1, 0x0) preadv(r3, 0x0, 0x0, 0x7fffffff, 0x1) [ 252.789517][T11344] R13: 0000000020000100 R14: 00007f3059254000 R15: 0000000020012c00 [ 252.806558][T11344] EXT4-fs (loop5): get root inode failed [ 252.812365][T11344] EXT4-fs (loop5): mount failed 13:22:52 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_mount_image$f2fs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0xf, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}, {&(0x7f0000010500)='\x00\x00\x00\x00', 0x4, 0xc80}, {&(0x7f0000010700)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e00000010000003000000010000000200000018b2e346f95e497f827e0a", 0x77, 0x1400}, {0x0}, {&(0x7f0000010e00)="d73cd47a0000000000100000000000000b000000000000000d0000001000000012000000170000001600000015000000ffffffffffffffffffffffffffffffffffffffff03000600000000000000000000000000140000000100000000000000ffffffffffffffffffffffffffffffffffffffff05000000000000000000000000000000c5010000060000000100000007000000070000000a0000004000000040000000fc0f00"/181, 0xb5, 0x200000}, {&(0x7f0000010f00)="0000000000000000000000000000000000000000000000000000000009f7a5bb", 0x20, 0x200fe0}, {&(0x7f0000011000)="00000000000000000000000000000000000000000000000000000006", 0x1c, 0x2011e0}, {0x0, 0x0, 0x2012e0}, {&(0x7f0000011400)="000000000000000000000000000000000000000000160000000510ec", 0x1c, 0x201320}, {&(0x7f0000011500)="00000017000000020c60", 0xa, 0x201380}, {&(0x7f0000011600)}, {&(0x7f0000011800)}, {&(0x7f0000011b00)="0000000000000000000000000000000000000000000000000000000100000000d73cd47a0000000000100000000000000b000000000000000d0000001000000012000000170000001600000015000000ffffffffffffffffffffffffffffffffffffffff03000600000000000000000000000000140000000100000000000000ffffffffffffffffffffffffffffffffffffffff05000000000000000000000000000000c5010000060000000100000007000000070000000a0000004000000040000000fc", 0xc5, 0x204fe0}, {&(0x7f0000011c00)="0000000000000000000000000000000000000000000000000000000009f7a5bb", 0x20, 0x205fe0}, {0x0, 0x0, 0x401320}], 0x0, &(0x7f0000014b00)) 13:22:52 executing program 3: clone(0x13102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) poll(0x0, 0x0, 0x8000000000000200) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f00000025c0)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00'}) ioctl$TUNSETLINK(r0, 0x40087602, 0x30a) r2 = openat$selinux_attr(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) mmap(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x6, 0x1010, r2, 0xdc5f7000) close(r0) r3 = socket$inet_tcp(0x2, 0x1, 0x0) preadv(r3, 0x0, 0x0, 0x7fffffff, 0x1) [ 252.852730][T11352] EXT4-fs (loop4): inodes count not valid: 11808 vs 32 [ 252.887729][T11353] F2FS-fs (loop2): invalid crc value [ 252.896270][T11353] F2FS-fs (loop2): invalid crc_offset: 0 [ 252.902165][T11353] F2FS-fs (loop2): Failed to get valid F2FS checkpoint 13:22:53 executing program 5 (fault-call:0 fault-nth:81): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000660000000f000000000000000100000001000000004000000040000020000000daf4655fdaf4655f0100ffff53ef010001000000d9f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010100)}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000100000000000000000000000000000000000000000000003000000000000000", 0x40, 0x540}, {&(0x7f0000010300)="02000000030000000400000066000f000300040000000000000000000f007f5c", 0x20, 0x800}, {&(0x7f0000011500)="ed41000000080000d9f4655fdaf4655fdaf4655f000000000000040004", 0x1d, 0x2200}, {0x0}, {&(0x7f0000011900)="ed8100001a040000daf4655fdaf4655fdaf4655f000000000000010004000000000000000100000014000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000039c34d38000000000000000000000000000000000000000000000000200000007412ab417412ab417412ab41daf4655f7412ab410000000000000000", 0xa0, 0x3800}], 0x0, &(0x7f0000012c00)) 13:22:53 executing program 4: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000002, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x31) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) waitid$P_PIDFD(0x3, r0, &(0x7f0000000500), 0x9, &(0x7f0000000580)) ptrace$cont(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='pids.events\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x12, r1, 0x0) ftruncate(r1, 0x1000673) ioctl$KDSKBENT(r1, 0x4b47, &(0x7f00000002c0)={0x2, 0x81, 0x5}) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x88400, 0x1a8) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0xd0265000) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) exit_group(0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x31, 0xffffffffffffffff, 0x0) time(&(0x7f0000000180)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14001500, 0x9, &(0x7f0000000300)=[{&(0x7f0000000080)="20320000000100000c190000ce1900000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800)) [ 252.965069][T11368] F2FS-fs (loop0): invalid crc value [ 252.970691][T11368] F2FS-fs (loop0): invalid crc_offset: 0 [ 252.976535][T11368] F2FS-fs (loop0): Failed to get valid F2FS checkpoint 13:22:53 executing program 2: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffff, 0xffffffffffffffff, 0x0) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) read(r0, 0x0, 0x0) syz_mount_image$f2fs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x10, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}, {&(0x7f0000010500)='\x00\x00\x00\x00', 0x4, 0xc80}, {&(0x7f0000010700)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e00000010000003000000010000000200000018b2e346f95e497f827e0a", 0x77, 0x1400}, {0x0}, {&(0x7f0000010e00)="d73cd47a0000000000100000000000000b000000000000000d0000001000000012000000170000001600000015000000ffffffffffffffffffffffffffffffffffffffff03000600000000000000000000000000140000000100000000000000ffffffffffffffffffffffffffffffffffffffff05000000000000000000000000000000c5010000060000000100000007000000070000000a0000004000000040000000fc0f00"/181, 0xb5, 0x200000}, {&(0x7f0000010f00)="0000000000000000000000000000000000000000000000000000000009f7a5bb", 0x20, 0x200fe0}, {&(0x7f0000011000)="00000000000000000000000000000000000000000000000000000006", 0x1c, 0x2011e0}, {0x0, 0x0, 0x2012e0}, {&(0x7f0000011400)="000000000000000000000000000000000000000000160000000510ec", 0x1c, 0x201320}, {&(0x7f0000011500)="00000017000000020c60", 0xa, 0x201380}, {&(0x7f0000011600)}, {&(0x7f0000011800)}, {&(0x7f0000011b00)="0000000000000000000000000000000000000000000000000000000100000000d73cd47a0000000000100000000000000b000000000000000d0000001000000012000000170000001600000015000000ffffffffffffffffffffffffffffffffffffffff03000600000000000000000000000000140000000100000000000000ffffffffffffffffffffffffffffffffffffffff05000000000000000000000000000000c5010000060000000100000007000000070000000a0000004000000040000000fc0f", 0xc6, 0x204fe0}, {&(0x7f0000011c00)="0000000000000000000000000000000000000000000000000000000009f7", 0x1e, 0x205fe0}, {0x0}, {&(0x7f0000013000)="000000000000000000000100000001", 0xf, 0xa00000}], 0x0, &(0x7f0000014b00)) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='pids.events\x00', 0x275a, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x4, 0x2d, 0x9, 0x1, 0x0, 0x7fff, 0x88, 0x4, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x7, 0x0, @perf_bp={&(0x7f00000000c0), 0x1}, 0x9, 0x1, 0x4, 0x9, 0x0, 0xffff, 0x400, 0x0, 0x2, 0x0, 0x1000}, 0x0, 0xe, r1, 0xa) [ 253.044411][T11374] FAULT_INJECTION: forcing a failure. [ 253.044411][T11374] name failslab, interval 1, probability 0, space 0, times 0 [ 253.063157][T11374] CPU: 0 PID: 11374 Comm: syz-executor.5 Not tainted 5.4.125-syzkaller-00016-gae94e015273b #0 [ 253.073398][T11374] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 253.083442][T11374] Call Trace: [ 253.086731][T11374] dump_stack+0x1d8/0x24e [ 253.091056][T11374] ? devkmsg_release+0x11c/0x11c [ 253.095991][T11374] ? stack_trace_save+0x1f0/0x1f0 [ 253.101009][T11374] ? show_regs_print_info+0x12/0x12 [ 253.101895][T11381] EXT4-fs (loop4): inodes count not valid: 12832 vs 32 [ 253.106194][T11374] ? __kernel_text_address+0x93/0x100 [ 253.106204][T11374] ? unwind_get_return_address+0x48/0x80 [ 253.106212][T11374] ? arch_stack_walk+0xf8/0x140 [ 253.106221][T11374] should_fail+0x6f6/0x860 [ 253.106231][T11374] ? setup_fault_attr+0x3d0/0x3d0 [ 253.106246][T11374] ? stack_trace_save+0x120/0x1f0 [ 253.139514][T11383] F2FS-fs (loop2): invalid crc value [ 253.143251][T11374] ? mempool_alloc_slab+0x16/0x20 [ 253.143261][T11374] should_failslab+0x5/0x20 [ 253.143271][T11374] kmem_cache_alloc+0x36/0x290 [ 253.143285][T11374] ? mempool_free+0x380/0x380 [ 253.167419][T11374] mempool_alloc_slab+0x16/0x20 [ 253.172245][T11374] mempool_alloc+0x113/0x680 [ 253.176809][T11374] ? mempool_resize+0x900/0x900 [ 253.181632][T11374] ? debug_smp_processor_id+0x20/0x20 [ 253.186987][T11374] bio_alloc_bioset+0x1db/0x640 [ 253.191896][T11374] ? bio_chain_endio+0x110/0x110 [ 253.196804][T11374] ? write_boundary_block+0x150/0x150 [ 253.202143][T11374] ? check_preemption_disabled+0x9e/0x330 [ 253.207845][T11374] submit_bh_wbc+0x1ba/0x790 [ 253.212409][T11374] ? write_boundary_block+0x150/0x150 [ 253.217750][T11374] ll_rw_block+0x1cb/0x230 [ 253.222137][T11374] __breadahead_gfp+0xc9/0x190 [ 253.226872][T11374] ? __getblk_gfp+0x654/0x750 [ 253.231569][T11374] ? __breadahead+0x170/0x170 [ 253.236233][T11374] __ext4_get_inode_loc+0xbf6/0x1030 [ 253.241577][T11374] ? ext4_get_inode_loc+0x60/0x60 [ 253.246569][T11374] ? memset+0x1f/0x40 [ 253.250520][T11374] ? _raw_spin_unlock+0x49/0x60 [ 253.255340][T11374] ? iget_locked+0x6b3/0x7b0 [ 253.259898][T11374] __ext4_iget+0x3d1/0x4a50 [ 253.264372][T11374] ? mutex_unlock+0x19/0x40 [ 253.268848][T11374] ? ext4_get_projid+0x140/0x140 [ 253.273769][T11374] ? ext4_fill_super+0xab45/0xeb30 [ 253.278855][T11374] ext4_fill_super+0xaafa/0xeb30 [ 253.283772][T11374] ? ext4_mount+0x40/0x40 [ 253.288155][T11374] ? idr_replace+0x1c4/0x230 [ 253.292724][T11374] ? snprintf+0xd6/0x120 [ 253.296956][T11374] ? vscnprintf+0x80/0x80 [ 253.301273][T11374] ? set_blocksize+0x1a5/0x3a0 [ 253.306012][T11374] mount_bdev+0x22d/0x340 [ 253.310315][T11374] ? ext4_mount+0x40/0x40 [ 253.314614][T11374] legacy_get_tree+0xde/0x170 [ 253.319263][T11374] ? ext4_lazyinit_thread+0xd40/0xd40 [ 253.324614][T11374] vfs_get_tree+0x83/0x260 [ 253.329007][T11374] do_mount+0x19d0/0x2670 [ 253.333309][T11374] ? copy_mount_string+0x30/0x30 [ 253.338213][T11374] ? copy_mount_options+0x59/0x300 [ 253.343313][T11374] ? copy_mount_options+0x59/0x300 [ 253.348393][T11374] ? kmem_cache_alloc_trace+0x139/0x2b0 [ 253.353911][T11374] ? copy_mount_options+0x273/0x300 [ 253.359079][T11374] ksys_mount+0xc2/0xf0 [ 253.363207][T11374] __x64_sys_mount+0xb1/0xc0 [ 253.367768][T11374] do_syscall_64+0xcb/0x1e0 [ 253.372241][T11374] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 253.378107][T11374] RIP: 0033:0x467b1a [ 253.381974][T11374] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 253.401552][T11374] RSP: 002b:00007f3059253fa8 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 253.410023][T11374] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 0000000000467b1a [ 253.418073][T11374] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007f3059254000 [ 253.426015][T11374] RBP: 00007f3059254040 R08: 00007f3059254040 R09: 0000000020000000 [ 253.433958][T11374] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000020000000 13:22:53 executing program 4: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000002, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x31) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) waitid$P_PIDFD(0x3, r0, &(0x7f0000000500), 0x9, &(0x7f0000000580)) ptrace$cont(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='pids.events\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x12, r1, 0x0) ftruncate(r1, 0x1000673) ioctl$KDSKBENT(r1, 0x4b47, &(0x7f00000002c0)={0x2, 0x81, 0x5}) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x88400, 0x1a8) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0xd0265000) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) exit_group(0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x31, 0xffffffffffffffff, 0x0) time(&(0x7f0000000180)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14001500, 0x9, &(0x7f0000000300)=[{&(0x7f0000000080)="20380000000100000c190000ce1900000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800)) 13:22:53 executing program 3: clone(0x13102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) poll(0x0, 0x0, 0x8000000000000200) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f00000025c0)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00'}) ioctl$TUNSETLINK(r0, 0x40087602, 0x30a) r2 = openat$selinux_attr(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) mmap(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x6, 0x1010, r2, 0xdc5f7000) close(r0) socket$inet_tcp(0x2, 0x1, 0x0) 13:22:53 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_mount_image$f2fs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0xf, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}, {&(0x7f0000010500)='\x00\x00\x00\x00', 0x4, 0xc80}, {&(0x7f0000010700)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e00000010000003000000010000000200000018b2e346f95e497f827e0a", 0x77, 0x1400}, {0x0}, {&(0x7f0000010e00)="d73cd47a0000000000100000000000000b000000000000000d0000001000000012000000170000001600000015000000ffffffffffffffffffffffffffffffffffffffff03000600000000000000000000000000140000000100000000000000ffffffffffffffffffffffffffffffffffffffff05000000000000000000000000000000c5010000060000000100000007000000070000000a0000004000000040000000fc0f00"/181, 0xb5, 0x200000}, {&(0x7f0000010f00)="0000000000000000000000000000000000000000000000000000000009f7a5bb", 0x20, 0x200fe0}, {&(0x7f0000011000)="00000000000000000000000000000000000000000000000000000006", 0x1c, 0x2011e0}, {0x0, 0x0, 0x2012e0}, {&(0x7f0000011400)="000000000000000000000000000000000000000000160000000510ec", 0x1c, 0x201320}, {&(0x7f0000011500)="00000017000000020c60", 0xa, 0x201380}, {&(0x7f0000011600)}, {&(0x7f0000011800)}, {&(0x7f0000011b00)="0000000000000000000000000000000000000000000000000000000100000000d73cd47a0000000000100000000000000b000000000000000d0000001000000012000000170000001600000015000000ffffffffffffffffffffffffffffffffffffffff03000600000000000000000000000000140000000100000000000000ffffffffffffffffffffffffffffffffffffffff05000000000000000000000000000000c5010000060000000100000007000000070000000a0000004000000040000000fc0f", 0xc6}, {&(0x7f0000011c00)="0000000000000000000000000000000000000000000000000000000009f7a5bb", 0x20, 0x205fe0}, {0x0, 0x0, 0x401320}], 0x0, &(0x7f0000014b00)) 13:22:53 executing program 1: clone(0x13102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) poll(0x0, 0x0, 0x8000000000000200) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f00000025c0)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00'}) ioctl$TUNSETLINK(r0, 0x400454cd, 0x306) r2 = openat$selinux_attr(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) mmap(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x6, 0x1010, r2, 0xdc5f7000) close(r0) r3 = socket$inet_tcp(0x2, 0x1, 0x0) preadv(r3, 0x0, 0x0, 0x7fffffff, 0x1) 13:22:53 executing program 5 (fault-call:0 fault-nth:82): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000660000000f000000000000000100000001000000004000000040000020000000daf4655fdaf4655f0100ffff53ef010001000000d9f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010100)}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000100000000000000000000000000000000000000000000003000000000000000", 0x40, 0x540}, {&(0x7f0000010300)="02000000030000000400000066000f000300040000000000000000000f007f5c", 0x20, 0x800}, {&(0x7f0000011500)="ed41000000080000d9f4655fdaf4655fdaf4655f000000000000040004", 0x1d, 0x2200}, {0x0}, {&(0x7f0000011900)="ed8100001a040000daf4655fdaf4655fdaf4655f000000000000010004000000000000000100000014000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000039c34d38000000000000000000000000000000000000000000000000200000007412ab417412ab417412ab41daf4655f7412ab410000000000000000", 0xa0, 0x3800}], 0x0, &(0x7f0000012c00)) [ 253.441913][T11374] R13: 0000000020000100 R14: 00007f3059254000 R15: 0000000020012c00 [ 253.454630][T11383] F2FS-fs (loop2): invalid crc_offset: 0 [ 253.465482][T11383] F2FS-fs (loop2): Failed to get valid F2FS checkpoint [ 253.466446][T11374] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue 13:22:53 executing program 2: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffff, 0xffffffffffffffff, 0x0) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) read(r0, 0x0, 0x0) syz_mount_image$f2fs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x10, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}, {&(0x7f0000010500)='\x00\x00\x00\x00', 0x4, 0xc80}, {&(0x7f0000010700)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e00000010000003000000010000000200000018b2e346f95e497f827e0a", 0x77, 0x1400}, {0x0}, {&(0x7f0000010e00)="d73cd47a0000000000100000000000000b000000000000000d0000001000000012000000170000001600000015000000ffffffffffffffffffffffffffffffffffffffff03000600000000000000000000000000140000000100000000000000ffffffffffffffffffffffffffffffffffffffff05000000000000000000000000000000c5010000060000000100000007000000070000000a0000004000000040000000fc0f00"/181, 0xb5, 0x200000}, {&(0x7f0000010f00)="0000000000000000000000000000000000000000000000000000000009f7a5bb", 0x20, 0x200fe0}, {&(0x7f0000011000)="00000000000000000000000000000000000000000000000000000006", 0x1c, 0x2011e0}, {0x0, 0x0, 0x2012e0}, {&(0x7f0000011400)="000000000000000000000000000000000000000000160000000510ec", 0x1c, 0x201320}, {&(0x7f0000011500)="00000017000000020c60", 0xa, 0x201380}, {&(0x7f0000011600)}, {&(0x7f0000011800)}, {&(0x7f0000011b00)="0000000000000000000000000000000000000000000000000000000100000000d73cd47a0000000000100000000000000b000000000000000d0000001000000012000000170000001600000015000000ffffffffffffffffffffffffffffffffffffffff03000600000000000000000000000000140000000100000000000000ffffffffffffffffffffffffffffffffffffffff05000000000000000000000000000000c5010000060000000100000007000000070000000a0000004000000040000000fc0f", 0xc6, 0x204fe0}, {&(0x7f0000011c00)="0000000000000000000000000000000000000000000000000000000009f7", 0x1e, 0x205fe0}, {0x0}, {&(0x7f0000013000)="000000000000000000000100000001", 0xf, 0xa00000}], 0x0, &(0x7f0000014b00)) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='pids.events\x00', 0x275a, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x4, 0x2d, 0x9, 0x1, 0x0, 0x7fff, 0x88, 0x4, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x7, 0x0, @perf_bp={&(0x7f00000000c0), 0x1}, 0x9, 0x1, 0x4, 0x9, 0x0, 0xffff, 0x400, 0x0, 0x2, 0x0, 0x1000}, 0x0, 0xe, r1, 0xa) [ 253.636990][T11397] EXT4-fs (loop4): inodes count not valid: 14368 vs 32 [ 253.637109][T11402] F2FS-fs (loop0): invalid crc_offset: 0 [ 253.649258][T11407] F2FS-fs (loop2): invalid crc value [ 253.649726][T11402] F2FS-fs (loop0): invalid crc_offset: 0 [ 253.655796][T11411] FAULT_INJECTION: forcing a failure. [ 253.655796][T11411] name failslab, interval 1, probability 0, space 0, times 0 [ 253.661613][T11402] F2FS-fs (loop0): Failed to get valid F2FS checkpoint [ 253.680343][T11407] F2FS-fs (loop2): invalid crc_offset: 0 [ 253.686124][T11411] CPU: 0 PID: 11411 Comm: syz-executor.5 Not tainted 5.4.125-syzkaller-00016-gae94e015273b #0 [ 253.696349][T11411] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 253.706655][T11411] Call Trace: [ 253.709942][T11411] dump_stack+0x1d8/0x24e [ 253.714267][T11411] ? devkmsg_release+0x11c/0x11c [ 253.719193][T11411] ? show_regs_print_info+0x12/0x12 [ 253.722865][T11407] F2FS-fs (loop2): Failed to get valid F2FS checkpoint [ 253.724465][T11411] ? update_io_ticks+0x1c5/0x1e0 [ 253.724475][T11411] ? blk_account_io_start+0x436/0x4f0 [ 253.724485][T11411] should_fail+0x6f6/0x860 [ 253.724495][T11411] ? setup_fault_attr+0x3d0/0x3d0 [ 253.724505][T11411] ? mempool_alloc_slab+0x16/0x20 [ 253.724522][T11411] should_failslab+0x5/0x20 [ 253.760486][T11411] kmem_cache_alloc+0x36/0x290 [ 253.765241][T11411] ? mempool_free+0x380/0x380 [ 253.769906][T11411] mempool_alloc_slab+0x16/0x20 [ 253.774747][T11411] mempool_alloc+0x113/0x680 [ 253.779405][T11411] ? blk_mq_requeue_work+0x9c0/0x9c0 [ 253.784660][T11411] ? mempool_resize+0x900/0x900 [ 253.789483][T11411] ? debug_smp_processor_id+0x20/0x20 [ 253.794822][T11411] ? blk_attempt_plug_merge+0x310/0x310 [ 253.800429][T11411] ? fscrypt_set_bio_crypt_ctx+0x179/0x4e0 [ 253.806288][T11411] bio_alloc_bioset+0x1db/0x640 [ 253.811112][T11411] ? bio_chain_endio+0x110/0x110 [ 253.816039][T11411] ? write_boundary_block+0x150/0x150 [ 253.821384][T11411] submit_bh_wbc+0x1ba/0x790 [ 253.825951][T11411] ll_rw_block+0x1cb/0x230 [ 253.830349][T11411] __breadahead_gfp+0xc9/0x190 [ 253.835091][T11411] ? __getblk_gfp+0x654/0x750 [ 253.839740][T11411] ? __breadahead+0x170/0x170 [ 253.844399][T11411] __ext4_get_inode_loc+0xbf6/0x1030 [ 253.849945][T11411] ? ext4_get_inode_loc+0x60/0x60 [ 253.854949][T11411] ? memset+0x1f/0x40 [ 253.858911][T11411] ? _raw_spin_unlock+0x49/0x60 [ 253.863736][T11411] ? iget_locked+0x6b3/0x7b0 [ 253.868298][T11411] __ext4_iget+0x3d1/0x4a50 [ 253.872902][T11411] ? mutex_unlock+0x19/0x40 [ 253.877384][T11411] ? ext4_get_projid+0x140/0x140 [ 253.882293][T11411] ? ext4_fill_super+0xab45/0xeb30 [ 253.887376][T11411] ext4_fill_super+0xaafa/0xeb30 [ 253.892289][T11411] ? ext4_mount+0x40/0x40 [ 253.896591][T11411] ? idr_replace+0x1c4/0x230 [ 253.901155][T11411] ? snprintf+0xd6/0x120 [ 253.905367][T11411] ? vscnprintf+0x80/0x80 [ 253.909671][T11411] ? set_blocksize+0x1a5/0x3a0 [ 253.914410][T11411] mount_bdev+0x22d/0x340 [ 253.918887][T11411] ? ext4_mount+0x40/0x40 [ 253.923189][T11411] legacy_get_tree+0xde/0x170 [ 253.927859][T11411] ? ext4_lazyinit_thread+0xd40/0xd40 [ 253.933198][T11411] vfs_get_tree+0x83/0x260 [ 253.937582][T11411] do_mount+0x19d0/0x2670 [ 253.941877][T11411] ? copy_mount_string+0x30/0x30 [ 253.946779][T11411] ? copy_mount_options+0x59/0x300 [ 253.951855][T11411] ? copy_mount_options+0x59/0x300 [ 253.956934][T11411] ? kmem_cache_alloc_trace+0x139/0x2b0 [ 253.962449][T11411] ? copy_mount_options+0x273/0x300 [ 253.967618][T11411] ksys_mount+0xc2/0xf0 [ 253.971743][T11411] __x64_sys_mount+0xb1/0xc0 [ 253.976403][T11411] do_syscall_64+0xcb/0x1e0 [ 253.980967][T11411] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 253.986887][T11411] RIP: 0033:0x467b1a [ 253.990754][T11411] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 254.010332][T11411] RSP: 002b:00007f3059253fa8 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 254.018817][T11411] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 0000000000467b1a [ 254.027033][T11411] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007f3059254000 13:22:54 executing program 4: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000002, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x31) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) waitid$P_PIDFD(0x3, r0, &(0x7f0000000500), 0x9, &(0x7f0000000580)) ptrace$cont(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='pids.events\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x12, r1, 0x0) ftruncate(r1, 0x1000673) ioctl$KDSKBENT(r1, 0x4b47, &(0x7f00000002c0)={0x2, 0x81, 0x5}) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x88400, 0x1a8) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0xd0265000) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) exit_group(0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x31, 0xffffffffffffffff, 0x0) time(&(0x7f0000000180)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14001500, 0x9, &(0x7f0000000300)=[{&(0x7f0000000080)="20480000000100000c190000ce1900000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800)) [ 254.034987][T11411] RBP: 00007f3059254040 R08: 00007f3059254040 R09: 0000000020000000 [ 254.042934][T11411] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000020000000 [ 254.050884][T11411] R13: 0000000020000100 R14: 00007f3059254000 R15: 0000000020012c00 [ 254.072396][T11411] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue 13:22:54 executing program 5 (fault-call:0 fault-nth:83): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000660000000f000000000000000100000001000000004000000040000020000000daf4655fdaf4655f0100ffff53ef010001000000d9f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010100)}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000100000000000000000000000000000000000000000000003000000000000000", 0x40, 0x540}, {&(0x7f0000010300)="02000000030000000400000066000f000300040000000000000000000f007f5c", 0x20, 0x800}, {&(0x7f0000011500)="ed41000000080000d9f4655fdaf4655fdaf4655f000000000000040004", 0x1d, 0x2200}, {0x0}, {&(0x7f0000011900)="ed8100001a040000daf4655fdaf4655fdaf4655f000000000000010004000000000000000100000014000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000039c34d38000000000000000000000000000000000000000000000000200000007412ab417412ab417412ab41daf4655f7412ab410000000000000000", 0xa0, 0x3800}], 0x0, &(0x7f0000012c00)) 13:22:54 executing program 4: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000002, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x31) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) waitid$P_PIDFD(0x3, r0, &(0x7f0000000500), 0x9, &(0x7f0000000580)) ptrace$cont(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='pids.events\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x12, r1, 0x0) ftruncate(r1, 0x1000673) ioctl$KDSKBENT(r1, 0x4b47, &(0x7f00000002c0)={0x2, 0x81, 0x5}) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x88400, 0x1a8) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0xd0265000) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) exit_group(0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x31, 0xffffffffffffffff, 0x0) time(&(0x7f0000000180)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14001500, 0x9, &(0x7f0000000300)=[{&(0x7f0000000080)="204c0000000100000c190000ce1900000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800)) 13:22:54 executing program 1: clone(0x13102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) poll(0x0, 0x0, 0x8000000000000200) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f00000025c0)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00'}) ioctl$TUNSETLINK(r0, 0x400454cd, 0x308) r2 = openat$selinux_attr(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) mmap(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x6, 0x1010, r2, 0xdc5f7000) close(r0) r3 = socket$inet_tcp(0x2, 0x1, 0x0) preadv(r3, 0x0, 0x0, 0x7fffffff, 0x1) [ 254.089865][T11423] EXT4-fs (loop4): inodes count not valid: 18464 vs 32 13:22:54 executing program 3: clone(0x13102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) poll(0x0, 0x0, 0x8000000000000200) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f00000025c0)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00'}) ioctl$TUNSETLINK(r0, 0x40087602, 0x30a) r2 = openat$selinux_attr(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) mmap(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x6, 0x1010, r2, 0xdc5f7000) close(r0) 13:22:54 executing program 4: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000002, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x31) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) waitid$P_PIDFD(0x3, r0, &(0x7f0000000500), 0x9, &(0x7f0000000580)) ptrace$cont(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='pids.events\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x12, r1, 0x0) ftruncate(r1, 0x1000673) ioctl$KDSKBENT(r1, 0x4b47, &(0x7f00000002c0)={0x2, 0x81, 0x5}) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x88400, 0x1a8) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0xd0265000) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) exit_group(0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x31, 0xffffffffffffffff, 0x0) time(&(0x7f0000000180)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14001500, 0x9, &(0x7f0000000300)=[{&(0x7f0000000080)="20600000000100000c190000ce1900000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800)) 13:22:54 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_mount_image$f2fs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0xf, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}, {&(0x7f0000010500)='\x00\x00\x00\x00', 0x4, 0xc80}, {&(0x7f0000010700)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e00000010000003000000010000000200000018b2e346f95e497f827e0a", 0x77, 0x1400}, {0x0}, {&(0x7f0000010e00)="d73cd47a0000000000100000000000000b000000000000000d0000001000000012000000170000001600000015000000ffffffffffffffffffffffffffffffffffffffff03000600000000000000000000000000140000000100000000000000ffffffffffffffffffffffffffffffffffffffff05000000000000000000000000000000c5010000060000000100000007000000070000000a0000004000000040000000fc0f00"/181, 0xb5, 0x200000}, {&(0x7f0000010f00)="0000000000000000000000000000000000000000000000000000000009f7a5bb", 0x20, 0x200fe0}, {&(0x7f0000011000)="00000000000000000000000000000000000000000000000000000006", 0x1c, 0x2011e0}, {0x0, 0x0, 0x2012e0}, {&(0x7f0000011400)="000000000000000000000000000000000000000000160000000510ec", 0x1c, 0x201320}, {&(0x7f0000011500)="00000017000000020c60", 0xa, 0x201380}, {&(0x7f0000011600)}, {&(0x7f0000011800)}, {&(0x7f0000011b00)="0000000000000000000000000000000000000000000000000000000100000000d73cd47a0000000000100000000000000b000000000000000d0000001000000012000000170000001600000015000000ffffffffffffffffffffffffffffffffffffffff03000600000000000000000000000000140000000100000000000000ffffffffffffffffffffffffffffffffffffffff05000000000000000000000000000000c5010000060000000100000007000000070000000a0000004000000040000000fc0f", 0xc6}, {&(0x7f0000011c00)="0000000000000000000000000000000000000000000000000000000009f7a5bb", 0x20, 0x205fe0}, {0x0, 0x0, 0x401320}], 0x0, &(0x7f0000014b00)) 13:22:54 executing program 2: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffff, 0xffffffffffffffff, 0x0) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) read(r0, 0x0, 0x0) syz_mount_image$f2fs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x10, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}, {&(0x7f0000010500)='\x00\x00\x00\x00', 0x4, 0xc80}, {&(0x7f0000010700)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e00000010000003000000010000000200000018b2e346f95e497f827e0a", 0x77, 0x1400}, {0x0}, {&(0x7f0000010e00)="d73cd47a0000000000100000000000000b000000000000000d0000001000000012000000170000001600000015000000ffffffffffffffffffffffffffffffffffffffff03000600000000000000000000000000140000000100000000000000ffffffffffffffffffffffffffffffffffffffff05000000000000000000000000000000c5010000060000000100000007000000070000000a0000004000000040000000fc0f00"/181, 0xb5, 0x200000}, {&(0x7f0000010f00)="0000000000000000000000000000000000000000000000000000000009f7a5bb", 0x20, 0x200fe0}, {&(0x7f0000011000)="00000000000000000000000000000000000000000000000000000006", 0x1c, 0x2011e0}, {0x0, 0x0, 0x2012e0}, {&(0x7f0000011400)="000000000000000000000000000000000000000000160000000510ec", 0x1c, 0x201320}, {&(0x7f0000011500)="00000017000000020c60", 0xa, 0x201380}, {&(0x7f0000011600)}, {&(0x7f0000011800)}, {&(0x7f0000011b00)="0000000000000000000000000000000000000000000000000000000100000000d73cd47a0000000000100000000000000b000000000000000d0000001000000012000000170000001600000015000000ffffffffffffffffffffffffffffffffffffffff03000600000000000000000000000000140000000100000000000000ffffffffffffffffffffffffffffffffffffffff05000000000000000000000000000000c5010000060000000100000007000000070000000a0000004000000040000000fc0f", 0xc6, 0x204fe0}, {&(0x7f0000011c00)="0000000000000000000000000000000000000000000000000000000009f7", 0x1e, 0x205fe0}, {0x0}, {&(0x7f0000013000)="000000000000000000000100000001", 0xf, 0xa00000}], 0x0, &(0x7f0000014b00)) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='pids.events\x00', 0x275a, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x4, 0x2d, 0x9, 0x1, 0x0, 0x7fff, 0x88, 0x4, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x7, 0x0, @perf_bp={&(0x7f00000000c0), 0x1}, 0x9, 0x1, 0x4, 0x9, 0x0, 0xffff, 0x400, 0x0, 0x2, 0x0, 0x1000}, 0x0, 0xe, r1, 0xa) [ 254.271009][T11450] EXT4-fs (loop4): inodes count not valid: 24608 vs 32 [ 254.278429][T11436] FAULT_INJECTION: forcing a failure. [ 254.278429][T11436] name failslab, interval 1, probability 0, space 0, times 0 [ 254.291786][T11436] CPU: 0 PID: 11436 Comm: syz-executor.5 Not tainted 5.4.125-syzkaller-00016-gae94e015273b #0 [ 254.302011][T11436] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 254.312036][T11436] Call Trace: [ 254.315300][T11436] dump_stack+0x1d8/0x24e [ 254.319597][T11436] ? devkmsg_release+0x11c/0x11c [ 254.324503][T11436] ? show_regs_print_info+0x12/0x12 [ 254.329672][T11436] ? update_io_ticks+0x1c5/0x1e0 [ 254.334576][T11436] ? blk_account_io_start+0x436/0x4f0 [ 254.339919][T11436] should_fail+0x6f6/0x860 [ 254.344305][T11436] ? setup_fault_attr+0x3d0/0x3d0 [ 254.349312][T11436] ? mempool_alloc_slab+0x16/0x20 [ 254.354514][T11436] should_failslab+0x5/0x20 [ 254.358985][T11436] kmem_cache_alloc+0x36/0x290 [ 254.363717][T11436] ? mempool_free+0x380/0x380 [ 254.368363][T11436] mempool_alloc_slab+0x16/0x20 [ 254.374142][T11436] mempool_alloc+0x113/0x680 [ 254.378708][T11436] ? blk_mq_requeue_work+0x9c0/0x9c0 [ 254.383969][T11436] ? mempool_resize+0x900/0x900 [ 254.388790][T11436] ? debug_smp_processor_id+0x20/0x20 [ 254.394140][T11436] ? blk_attempt_plug_merge+0x310/0x310 [ 254.399665][T11436] ? fscrypt_set_bio_crypt_ctx+0x179/0x4e0 [ 254.405447][T11436] bio_alloc_bioset+0x1db/0x640 [ 254.410269][T11436] ? bio_chain_endio+0x110/0x110 [ 254.415175][T11436] ? write_boundary_block+0x150/0x150 [ 254.420521][T11436] submit_bh_wbc+0x1ba/0x790 [ 254.425080][T11436] ll_rw_block+0x1cb/0x230 [ 254.429464][T11436] __breadahead_gfp+0xc9/0x190 [ 254.434194][T11436] ? __getblk_gfp+0x654/0x750 [ 254.438837][T11436] ? __breadahead+0x170/0x170 [ 254.443483][T11436] __ext4_get_inode_loc+0xbf6/0x1030 [ 254.448737][T11436] ? ext4_get_inode_loc+0x60/0x60 [ 254.453730][T11436] ? memset+0x1f/0x40 [ 254.457682][T11436] ? _raw_spin_unlock+0x49/0x60 [ 254.462499][T11436] ? iget_locked+0x6b3/0x7b0 [ 254.467055][T11436] __ext4_iget+0x3d1/0x4a50 [ 254.471530][T11436] ? mutex_unlock+0x19/0x40 [ 254.476005][T11436] ? ext4_get_projid+0x140/0x140 [ 254.481091][T11436] ? ext4_fill_super+0xab45/0xeb30 [ 254.486182][T11436] ext4_fill_super+0xaafa/0xeb30 [ 254.491097][T11436] ? ext4_mount+0x40/0x40 [ 254.495395][T11436] ? idr_replace+0x1c4/0x230 [ 254.499958][T11436] ? snprintf+0xd6/0x120 [ 254.504269][T11436] ? vscnprintf+0x80/0x80 [ 254.508569][T11436] ? set_blocksize+0x1a5/0x3a0 [ 254.513411][T11436] mount_bdev+0x22d/0x340 [ 254.517720][T11436] ? ext4_mount+0x40/0x40 [ 254.522020][T11436] legacy_get_tree+0xde/0x170 [ 254.526668][T11436] ? ext4_lazyinit_thread+0xd40/0xd40 [ 254.532036][T11436] vfs_get_tree+0x83/0x260 [ 254.536428][T11436] do_mount+0x19d0/0x2670 [ 254.540741][T11436] ? copy_mount_string+0x30/0x30 [ 254.545651][T11436] ? copy_mount_options+0x59/0x300 [ 254.550733][T11436] ? copy_mount_options+0x59/0x300 [ 254.555811][T11436] ? kmem_cache_alloc_trace+0x139/0x2b0 [ 254.561325][T11436] ? copy_mount_options+0x273/0x300 [ 254.566493][T11436] ksys_mount+0xc2/0xf0 [ 254.570622][T11436] __x64_sys_mount+0xb1/0xc0 [ 254.575193][T11436] do_syscall_64+0xcb/0x1e0 [ 254.579671][T11436] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 254.585528][T11436] RIP: 0033:0x467b1a [ 254.589389][T11436] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 254.608958][T11436] RSP: 002b:00007f3059253fa8 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 254.617339][T11436] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 0000000000467b1a [ 254.625293][T11436] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007f3059254000 [ 254.633247][T11436] RBP: 00007f3059254040 R08: 00007f3059254040 R09: 0000000020000000 [ 254.641187][T11436] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000020000000 [ 254.649214][T11436] R13: 0000000020000100 R14: 00007f3059254000 R15: 0000000020012c00 13:22:54 executing program 4: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000002, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x31) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) waitid$P_PIDFD(0x3, r0, &(0x7f0000000500), 0x9, &(0x7f0000000580)) ptrace$cont(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='pids.events\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x12, r1, 0x0) ftruncate(r1, 0x1000673) ioctl$KDSKBENT(r1, 0x4b47, &(0x7f00000002c0)={0x2, 0x81, 0x5}) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x88400, 0x1a8) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0xd0265000) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) exit_group(0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x31, 0xffffffffffffffff, 0x0) time(&(0x7f0000000180)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14001500, 0x9, &(0x7f0000000300)=[{&(0x7f0000000080)="20620000000100000c190000ce1900000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800)) [ 254.664826][T11436] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue [ 254.688442][T11456] F2FS-fs (loop0): invalid crc_offset: 0 [ 254.703706][T11459] F2FS-fs (loop2): invalid crc value 13:22:54 executing program 5 (fault-call:0 fault-nth:84): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000660000000f000000000000000100000001000000004000000040000020000000daf4655fdaf4655f0100ffff53ef010001000000d9f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010100)}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000100000000000000000000000000000000000000000000003000000000000000", 0x40, 0x540}, {&(0x7f0000010300)="02000000030000000400000066000f000300040000000000000000000f007f5c", 0x20, 0x800}, {&(0x7f0000011500)="ed41000000080000d9f4655fdaf4655fdaf4655f000000000000040004", 0x1d, 0x2200}, {0x0}, {&(0x7f0000011900)="ed8100001a040000daf4655fdaf4655fdaf4655f000000000000010004000000000000000100000014000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000039c34d38000000000000000000000000000000000000000000000000200000007412ab417412ab417412ab41daf4655f7412ab410000000000000000", 0xa0, 0x3800}], 0x0, &(0x7f0000012c00)) 13:22:54 executing program 3: clone(0x13102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) poll(0x0, 0x0, 0x8000000000000200) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f00000025c0)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00'}) ioctl$TUNSETLINK(r0, 0x40087602, 0x30a) r2 = openat$selinux_attr(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) mmap(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x6, 0x1010, r2, 0xdc5f7000) 13:22:54 executing program 1: clone(0x13102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) poll(0x0, 0x0, 0x8000000000000200) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f00000025c0)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00'}) ioctl$TUNSETLINK(r0, 0x400454cd, 0x30c) r2 = openat$selinux_attr(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) mmap(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x6, 0x1010, r2, 0xdc5f7000) close(r0) r3 = socket$inet_tcp(0x2, 0x1, 0x0) preadv(r3, 0x0, 0x0, 0x7fffffff, 0x1) [ 254.718087][T11456] F2FS-fs (loop0): invalid crc_offset: 0 [ 254.726863][T11459] F2FS-fs (loop2): invalid crc_offset: 0 [ 254.732995][T11456] F2FS-fs (loop0): Failed to get valid F2FS checkpoint [ 254.742000][T11459] F2FS-fs (loop2): Failed to get valid F2FS checkpoint [ 254.755203][T11470] EXT4-fs (loop4): inodes count not valid: 25120 vs 32 [ 254.859023][T11478] FAULT_INJECTION: forcing a failure. [ 254.859023][T11478] name failslab, interval 1, probability 0, space 0, times 0 [ 254.873386][T11478] CPU: 1 PID: 11478 Comm: syz-executor.5 Not tainted 5.4.125-syzkaller-00016-gae94e015273b #0 [ 254.883639][T11478] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 254.893670][T11478] Call Trace: [ 254.897062][T11478] dump_stack+0x1d8/0x24e [ 254.901364][T11478] ? devkmsg_release+0x11c/0x11c [ 254.906374][T11478] ? show_regs_print_info+0x12/0x12 [ 254.911542][T11478] ? update_io_ticks+0x1c5/0x1e0 [ 254.916465][T11478] ? blk_account_io_start+0x436/0x4f0 [ 254.921893][T11478] should_fail+0x6f6/0x860 [ 254.926280][T11478] ? setup_fault_attr+0x3d0/0x3d0 [ 254.931274][T11478] ? mempool_alloc_slab+0x16/0x20 [ 254.936267][T11478] should_failslab+0x5/0x20 [ 254.940741][T11478] kmem_cache_alloc+0x36/0x290 [ 254.945485][T11478] ? mempool_free+0x380/0x380 [ 254.950130][T11478] mempool_alloc_slab+0x16/0x20 [ 254.954966][T11478] mempool_alloc+0x113/0x680 [ 254.959529][T11478] ? blk_mq_requeue_work+0x9c0/0x9c0 [ 254.964794][T11478] ? mempool_resize+0x900/0x900 [ 254.969625][T11478] ? debug_smp_processor_id+0x20/0x20 [ 254.974967][T11478] ? blk_attempt_plug_merge+0x310/0x310 [ 254.980488][T11478] ? fscrypt_set_bio_crypt_ctx+0x179/0x4e0 [ 254.986264][T11478] bio_alloc_bioset+0x1db/0x640 [ 254.991087][T11478] ? bio_chain_endio+0x110/0x110 [ 254.995993][T11478] ? write_boundary_block+0x150/0x150 [ 255.001332][T11478] submit_bh_wbc+0x1ba/0x790 [ 255.005892][T11478] ll_rw_block+0x1cb/0x230 [ 255.010278][T11478] __breadahead_gfp+0xc9/0x190 [ 255.015009][T11478] ? __getblk_gfp+0x654/0x750 [ 255.019739][T11478] ? __breadahead+0x170/0x170 [ 255.024389][T11478] __ext4_get_inode_loc+0xbf6/0x1030 [ 255.029647][T11478] ? ext4_get_inode_loc+0x60/0x60 [ 255.034643][T11478] ? memset+0x1f/0x40 [ 255.038606][T11478] ? _raw_spin_unlock+0x49/0x60 [ 255.043427][T11478] ? iget_locked+0x6b3/0x7b0 [ 255.048086][T11478] __ext4_iget+0x3d1/0x4a50 [ 255.052573][T11478] ? mutex_unlock+0x19/0x40 [ 255.057073][T11478] ? ext4_get_projid+0x140/0x140 [ 255.062002][T11478] ? ext4_fill_super+0xab45/0xeb30 [ 255.067199][T11478] ext4_fill_super+0xaafa/0xeb30 [ 255.072125][T11478] ? ext4_mount+0x40/0x40 [ 255.076434][T11478] ? idr_replace+0x1c4/0x230 [ 255.081003][T11478] ? snprintf+0xd6/0x120 [ 255.085222][T11478] ? vscnprintf+0x80/0x80 [ 255.089542][T11478] ? set_blocksize+0x1a5/0x3a0 [ 255.094284][T11478] mount_bdev+0x22d/0x340 [ 255.098589][T11478] ? ext4_mount+0x40/0x40 [ 255.102890][T11478] legacy_get_tree+0xde/0x170 [ 255.107539][T11478] ? ext4_lazyinit_thread+0xd40/0xd40 [ 255.112884][T11478] vfs_get_tree+0x83/0x260 [ 255.117272][T11478] do_mount+0x19d0/0x2670 [ 255.121573][T11478] ? copy_mount_string+0x30/0x30 [ 255.126478][T11478] ? copy_mount_options+0x59/0x300 [ 255.131557][T11478] ? kmem_cache_alloc_trace+0x139/0x2b0 [ 255.137079][T11478] ? copy_mount_options+0x273/0x300 [ 255.142250][T11478] ksys_mount+0xc2/0xf0 [ 255.146376][T11478] __x64_sys_mount+0xb1/0xc0 [ 255.150935][T11478] do_syscall_64+0xcb/0x1e0 [ 255.155413][T11478] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 255.161294][T11478] RIP: 0033:0x467b1a [ 255.165159][T11478] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 255.184752][T11478] RSP: 002b:00007f3059253fa8 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 255.193140][T11478] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 0000000000467b1a [ 255.201087][T11478] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007f3059254000 13:22:55 executing program 4: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000002, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x31) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) waitid$P_PIDFD(0x3, r0, &(0x7f0000000500), 0x9, &(0x7f0000000580)) ptrace$cont(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='pids.events\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x12, r1, 0x0) ftruncate(r1, 0x1000673) ioctl$KDSKBENT(r1, 0x4b47, &(0x7f00000002c0)={0x2, 0x81, 0x5}) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x88400, 0x1a8) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0xd0265000) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) exit_group(0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x31, 0xffffffffffffffff, 0x0) time(&(0x7f0000000180)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14001500, 0x9, &(0x7f0000000300)=[{&(0x7f0000000080)="20630000000100000c190000ce1900000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800)) 13:22:55 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_mount_image$f2fs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0xf, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}, {&(0x7f0000010500)='\x00\x00\x00\x00', 0x4, 0xc80}, {&(0x7f0000010700)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e00000010000003000000010000000200000018b2e346f95e497f827e0a", 0x77, 0x1400}, {0x0}, {&(0x7f0000010e00)="d73cd47a0000000000100000000000000b000000000000000d0000001000000012000000170000001600000015000000ffffffffffffffffffffffffffffffffffffffff03000600000000000000000000000000140000000100000000000000ffffffffffffffffffffffffffffffffffffffff05000000000000000000000000000000c5010000060000000100000007000000070000000a0000004000000040000000fc0f00"/181, 0xb5, 0x200000}, {&(0x7f0000010f00)="0000000000000000000000000000000000000000000000000000000009f7a5bb", 0x20, 0x200fe0}, {&(0x7f0000011000)="00000000000000000000000000000000000000000000000000000006", 0x1c, 0x2011e0}, {0x0, 0x0, 0x2012e0}, {&(0x7f0000011400)="000000000000000000000000000000000000000000160000000510ec", 0x1c, 0x201320}, {&(0x7f0000011500)="00000017000000020c60", 0xa, 0x201380}, {&(0x7f0000011600)}, {&(0x7f0000011800)}, {&(0x7f0000011b00)="0000000000000000000000000000000000000000000000000000000100000000d73cd47a0000000000100000000000000b000000000000000d0000001000000012000000170000001600000015000000ffffffffffffffffffffffffffffffffffffffff03000600000000000000000000000000140000000100000000000000ffffffffffffffffffffffffffffffffffffffff05000000000000000000000000000000c5010000060000000100000007000000070000000a0000004000000040000000fc0f", 0xc6}, {&(0x7f0000011c00)="0000000000000000000000000000000000000000000000000000000009f7a5bb", 0x20, 0x205fe0}, {0x0, 0x0, 0x401320}], 0x0, &(0x7f0000014b00)) 13:22:55 executing program 5 (fault-call:0 fault-nth:85): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000660000000f000000000000000100000001000000004000000040000020000000daf4655fdaf4655f0100ffff53ef010001000000d9f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010100)}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000100000000000000000000000000000000000000000000003000000000000000", 0x40, 0x540}, {&(0x7f0000010300)="02000000030000000400000066000f000300040000000000000000000f007f5c", 0x20, 0x800}, {&(0x7f0000011500)="ed41000000080000d9f4655fdaf4655fdaf4655f000000000000040004", 0x1d, 0x2200}, {0x0}, {&(0x7f0000011900)="ed8100001a040000daf4655fdaf4655fdaf4655f000000000000010004000000000000000100000014000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000039c34d38000000000000000000000000000000000000000000000000200000007412ab417412ab417412ab41daf4655f7412ab410000000000000000", 0xa0, 0x3800}], 0x0, &(0x7f0000012c00)) [ 255.209052][T11478] RBP: 00007f3059254040 R08: 00007f3059254040 R09: 0000000020000000 [ 255.216996][T11478] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000020000000 [ 255.225231][T11478] R13: 0000000020000100 R14: 00007f3059254000 R15: 0000000020012c00 [ 255.237531][T11478] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue 13:22:55 executing program 2: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffff, 0xffffffffffffffff, 0x0) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) read(r0, 0x0, 0x0) syz_mount_image$f2fs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x10, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}, {&(0x7f0000010500)='\x00\x00\x00\x00', 0x4, 0xc80}, {&(0x7f0000010700)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e00000010000003000000010000000200000018b2e346f95e497f827e0a", 0x77, 0x1400}, {0x0}, {&(0x7f0000010e00)="d73cd47a0000000000100000000000000b000000000000000d0000001000000012000000170000001600000015000000ffffffffffffffffffffffffffffffffffffffff03000600000000000000000000000000140000000100000000000000ffffffffffffffffffffffffffffffffffffffff05000000000000000000000000000000c5010000060000000100000007000000070000000a0000004000000040000000fc0f00"/181, 0xb5, 0x200000}, {&(0x7f0000010f00)="0000000000000000000000000000000000000000000000000000000009f7a5bb", 0x20, 0x200fe0}, {&(0x7f0000011000)="00000000000000000000000000000000000000000000000000000006", 0x1c, 0x2011e0}, {0x0, 0x0, 0x2012e0}, {&(0x7f0000011400)="000000000000000000000000000000000000000000160000000510ec", 0x1c, 0x201320}, {&(0x7f0000011500)="00000017000000020c60", 0xa, 0x201380}, {&(0x7f0000011600)}, {&(0x7f0000011800)}, {&(0x7f0000011b00)="0000000000000000000000000000000000000000000000000000000100000000d73cd47a0000000000100000000000000b000000000000000d0000001000000012000000170000001600000015000000ffffffffffffffffffffffffffffffffffffffff03000600000000000000000000000000140000000100000000000000ffffffffffffffffffffffffffffffffffffffff05000000000000000000000000000000c5010000060000000100000007000000070000000a0000004000000040000000fc0f", 0xc6, 0x204fe0}, {&(0x7f0000011c00)="0000000000000000000000000000000000000000000000000000000009f7a5", 0x1f, 0x205fe0}, {0x0}, {&(0x7f0000013000)="000000000000000000000100000001", 0xf, 0xa00000}], 0x0, &(0x7f0000014b00)) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='pids.events\x00', 0x275a, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x4, 0x2d, 0x9, 0x1, 0x0, 0x7fff, 0x88, 0x4, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x7, 0x0, @perf_bp={&(0x7f00000000c0), 0x1}, 0x9, 0x1, 0x4, 0x9, 0x0, 0xffff, 0x400, 0x0, 0x2, 0x0, 0x1000}, 0x0, 0xe, r1, 0xa) 13:22:55 executing program 1: clone(0x13102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) poll(0x0, 0x0, 0x8000000000000200) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f00000025c0)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00'}) ioctl$TUNSETLINK(r0, 0x400454cd, 0x324) r2 = openat$selinux_attr(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) mmap(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x6, 0x1010, r2, 0xdc5f7000) close(r0) r3 = socket$inet_tcp(0x2, 0x1, 0x0) preadv(r3, 0x0, 0x0, 0x7fffffff, 0x1) 13:22:55 executing program 3: clone(0x13102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) poll(0x0, 0x0, 0x8000000000000200) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f00000025c0)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00'}) ioctl$TUNSETLINK(r0, 0x40087602, 0x30a) openat$selinux_attr(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) [ 255.466268][T11494] EXT4-fs (loop4): inodes count not valid: 25376 vs 32 [ 255.499670][T11499] F2FS-fs (loop0): invalid crc_offset: 0 [ 255.505629][T11499] F2FS-fs (loop0): invalid crc_offset: 0 13:22:55 executing program 4: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000002, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x31) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) waitid$P_PIDFD(0x3, r0, &(0x7f0000000500), 0x9, &(0x7f0000000580)) ptrace$cont(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='pids.events\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x12, r1, 0x0) ftruncate(r1, 0x1000673) ioctl$KDSKBENT(r1, 0x4b47, &(0x7f00000002c0)={0x2, 0x81, 0x5}) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x88400, 0x1a8) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0xd0265000) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) exit_group(0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x31, 0xffffffffffffffff, 0x0) time(&(0x7f0000000180)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14001500, 0x9, &(0x7f0000000300)=[{&(0x7f0000000080)="20680000000100000c190000ce1900000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800)) [ 255.517287][T11499] F2FS-fs (loop0): Failed to get valid F2FS checkpoint [ 255.528863][T11514] FAULT_INJECTION: forcing a failure. [ 255.528863][T11514] name failslab, interval 1, probability 0, space 0, times 0 [ 255.542057][T11514] CPU: 0 PID: 11514 Comm: syz-executor.5 Not tainted 5.4.125-syzkaller-00016-gae94e015273b #0 [ 255.552286][T11514] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 255.562333][T11514] Call Trace: [ 255.565621][T11514] dump_stack+0x1d8/0x24e [ 255.569946][T11514] ? devkmsg_release+0x11c/0x11c [ 255.574878][T11514] ? show_regs_print_info+0x12/0x12 [ 255.580066][T11514] ? stack_trace_save+0x120/0x1f0 [ 255.581832][T11524] EXT4-fs (loop4): inodes count not valid: 26656 vs 32 [ 255.585077][T11514] should_fail+0x6f6/0x860 [ 255.585088][T11514] ? setup_fault_attr+0x3d0/0x3d0 [ 255.585096][T11514] ? __kasan_kmalloc+0x1a3/0x1e0 [ 255.585106][T11514] ? mempool_alloc_slab+0x16/0x20 [ 255.585121][T11514] should_failslab+0x5/0x20 [ 255.615838][T11514] kmem_cache_alloc+0x36/0x290 [ 255.620587][T11514] ? mempool_free+0x380/0x380 [ 255.625233][T11514] mempool_alloc_slab+0x16/0x20 [ 255.630054][T11514] mempool_alloc+0x113/0x680 [ 255.634617][T11514] ? __rcu_read_lock+0x50/0x50 [ 255.639364][T11514] ? mempool_resize+0x900/0x900 [ 255.644186][T11514] ? debug_smp_processor_id+0x20/0x20 [ 255.649586][T11514] bio_alloc_bioset+0x1db/0x640 [ 255.654419][T11514] ? alloc_buffer_head+0x22/0xe0 [ 255.659329][T11514] ? bio_chain_endio+0x110/0x110 [ 255.664324][T11514] ? write_boundary_block+0x150/0x150 [ 255.669668][T11514] submit_bh_wbc+0x1ba/0x790 [ 255.674238][T11514] ll_rw_block+0x1cb/0x230 [ 255.678628][T11514] __breadahead_gfp+0xc9/0x190 [ 255.683377][T11514] ? __getblk_gfp+0x654/0x750 [ 255.688058][T11514] ? __breadahead+0x170/0x170 [ 255.692706][T11514] __ext4_get_inode_loc+0xbf6/0x1030 [ 255.697972][T11514] ? ext4_get_inode_loc+0x60/0x60 [ 255.702965][T11514] ? memset+0x1f/0x40 [ 255.706935][T11514] ? _raw_spin_unlock+0x49/0x60 [ 255.711763][T11514] ? iget_locked+0x6b3/0x7b0 [ 255.716326][T11514] __ext4_iget+0x3d1/0x4a50 [ 255.720802][T11514] ? mutex_unlock+0x19/0x40 [ 255.725278][T11514] ? ext4_get_projid+0x140/0x140 [ 255.730194][T11514] ? ext4_fill_super+0xab45/0xeb30 [ 255.735279][T11514] ext4_fill_super+0xaafa/0xeb30 [ 255.740196][T11514] ? ext4_mount+0x40/0x40 [ 255.744495][T11514] ? idr_replace+0x1c4/0x230 [ 255.749056][T11514] ? snprintf+0xd6/0x120 [ 255.753278][T11514] ? vscnprintf+0x80/0x80 [ 255.757580][T11514] ? set_blocksize+0x1a5/0x3a0 [ 255.762313][T11514] mount_bdev+0x22d/0x340 [ 255.766613][T11514] ? ext4_mount+0x40/0x40 [ 255.771012][T11514] legacy_get_tree+0xde/0x170 [ 255.775659][T11514] ? ext4_lazyinit_thread+0xd40/0xd40 [ 255.781088][T11514] vfs_get_tree+0x83/0x260 [ 255.785479][T11514] do_mount+0x19d0/0x2670 [ 255.789779][T11514] ? copy_mount_string+0x30/0x30 [ 255.794692][T11514] ? copy_mount_options+0x59/0x300 [ 255.799771][T11514] ? kmem_cache_alloc_trace+0x139/0x2b0 [ 255.805307][T11514] ? copy_mount_options+0x273/0x300 [ 255.810474][T11514] ksys_mount+0xc2/0xf0 [ 255.814600][T11514] __x64_sys_mount+0xb1/0xc0 [ 255.819254][T11514] do_syscall_64+0xcb/0x1e0 [ 255.823732][T11514] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 255.829598][T11514] RIP: 0033:0x467b1a [ 255.833476][T11514] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 255.853053][T11514] RSP: 002b:00007f3059253fa8 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 255.861434][T11514] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 0000000000467b1a [ 255.869381][T11514] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007f3059254000 [ 255.877429][T11514] RBP: 00007f3059254040 R08: 00007f3059254040 R09: 0000000020000000 [ 255.885382][T11514] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000020000000 [ 255.893338][T11514] R13: 0000000020000100 R14: 00007f3059254000 R15: 0000000020012c00 13:22:55 executing program 2: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffff, 0xffffffffffffffff, 0x0) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) read(r0, 0x0, 0x0) syz_mount_image$f2fs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x10, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}, {&(0x7f0000010500)='\x00\x00\x00\x00', 0x4, 0xc80}, {&(0x7f0000010700)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e00000010000003000000010000000200000018b2e346f95e497f827e0a", 0x77, 0x1400}, {0x0}, {&(0x7f0000010e00)="d73cd47a0000000000100000000000000b000000000000000d0000001000000012000000170000001600000015000000ffffffffffffffffffffffffffffffffffffffff03000600000000000000000000000000140000000100000000000000ffffffffffffffffffffffffffffffffffffffff05000000000000000000000000000000c5010000060000000100000007000000070000000a0000004000000040000000fc0f00"/181, 0xb5, 0x200000}, {&(0x7f0000010f00)="0000000000000000000000000000000000000000000000000000000009f7a5bb", 0x20, 0x200fe0}, {&(0x7f0000011000)="00000000000000000000000000000000000000000000000000000006", 0x1c, 0x2011e0}, {0x0, 0x0, 0x2012e0}, {&(0x7f0000011400)="000000000000000000000000000000000000000000160000000510ec", 0x1c, 0x201320}, {&(0x7f0000011500)="00000017000000020c60", 0xa, 0x201380}, {&(0x7f0000011600)}, {&(0x7f0000011800)}, {&(0x7f0000011b00)="0000000000000000000000000000000000000000000000000000000100000000d73cd47a0000000000100000000000000b000000000000000d0000001000000012000000170000001600000015000000ffffffffffffffffffffffffffffffffffffffff03000600000000000000000000000000140000000100000000000000ffffffffffffffffffffffffffffffffffffffff05000000000000000000000000000000c5010000060000000100000007000000070000000a0000004000000040000000fc0f", 0xc6, 0x204fe0}, {&(0x7f0000011c00)="0000000000000000000000000000000000000000000000000000000009f7a5", 0x1f, 0x205fe0}, {0x0}, {&(0x7f0000013000)="000000000000000000000100000001", 0xf, 0xa00000}], 0x0, &(0x7f0000014b00)) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='pids.events\x00', 0x275a, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x4, 0x2d, 0x9, 0x1, 0x0, 0x7fff, 0x88, 0x4, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x7, 0x0, @perf_bp={&(0x7f00000000c0), 0x1}, 0x9, 0x1, 0x4, 0x9, 0x0, 0xffff, 0x400, 0x0, 0x2, 0x0, 0x1000}, 0x0, 0xe, r1, 0xa) 13:22:55 executing program 4: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000002, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x31) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) waitid$P_PIDFD(0x3, r0, &(0x7f0000000500), 0x9, &(0x7f0000000580)) ptrace$cont(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='pids.events\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x12, r1, 0x0) ftruncate(r1, 0x1000673) ioctl$KDSKBENT(r1, 0x4b47, &(0x7f00000002c0)={0x2, 0x81, 0x5}) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x88400, 0x1a8) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0xd0265000) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) exit_group(0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x31, 0xffffffffffffffff, 0x0) time(&(0x7f0000000180)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14001500, 0x9, &(0x7f0000000300)=[{&(0x7f0000000080)="206a0000000100000c190000ce1900000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800)) 13:22:55 executing program 5 (fault-call:0 fault-nth:86): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000660000000f000000000000000100000001000000004000000040000020000000daf4655fdaf4655f0100ffff53ef010001000000d9f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010100)}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000100000000000000000000000000000000000000000000003000000000000000", 0x40, 0x540}, {&(0x7f0000010300)="02000000030000000400000066000f000300040000000000000000000f007f5c", 0x20, 0x800}, {&(0x7f0000011500)="ed41000000080000d9f4655fdaf4655fdaf4655f000000000000040004", 0x1d, 0x2200}, {0x0}, {&(0x7f0000011900)="ed8100001a040000daf4655fdaf4655fdaf4655f000000000000010004000000000000000100000014000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000039c34d38000000000000000000000000000000000000000000000000200000007412ab417412ab417412ab41daf4655f7412ab410000000000000000", 0xa0, 0x3800}], 0x0, &(0x7f0000012c00)) [ 255.918875][T11514] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue 13:22:56 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_mount_image$f2fs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0xe, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}, {&(0x7f0000010500)='\x00\x00\x00\x00', 0x4, 0xc80}, {&(0x7f0000010700)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e00000010000003000000010000000200000018b2e346f95e497f827e0a", 0x77, 0x1400}, {0x0}, {&(0x7f0000010e00)="d73cd47a0000000000100000000000000b000000000000000d0000001000000012000000170000001600000015000000ffffffffffffffffffffffffffffffffffffffff03000600000000000000000000000000140000000100000000000000ffffffffffffffffffffffffffffffffffffffff05000000000000000000000000000000c5010000060000000100000007000000070000000a0000004000000040000000fc0f00"/181, 0xb5, 0x200000}, {&(0x7f0000010f00)="0000000000000000000000000000000000000000000000000000000009f7a5bb", 0x20, 0x200fe0}, {&(0x7f0000011000)="00000000000000000000000000000000000000000000000000000006", 0x1c, 0x2011e0}, {0x0, 0x0, 0x2012e0}, {&(0x7f0000011400)="000000000000000000000000000000000000000000160000000510ec", 0x1c, 0x201320}, {&(0x7f0000011500)="00000017000000020c60", 0xa, 0x201380}, {&(0x7f0000011600)}, {&(0x7f0000011b00)="0000000000000000000000000000000000000000000000000000000100000000d73cd47a0000000000100000000000000b000000000000000d0000001000000012000000170000001600000015000000ffffffffffffffffffffffffffffffffffffffff03000600000000000000000000000000140000000100000000000000ffffffffffffffffffffffffffffffffffffffff05000000000000000000000000000000c5010000060000000100000007000000070000000a0000004000000040000000fc0f", 0xc6, 0x204fe0}, {&(0x7f0000011c00)="0000000000000000000000000000000000000000000000000000000009f7a5bb", 0x20, 0x205fe0}, {0x0, 0x0, 0x401320}], 0x0, &(0x7f0000014b00)) 13:22:56 executing program 3: clone(0x13102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) poll(0x0, 0x0, 0x8000000000000200) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f00000025c0)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00'}) ioctl$TUNSETLINK(r0, 0x40087602, 0x30a) [ 255.994703][T11535] F2FS-fs (loop2): invalid crc value [ 256.003515][T11535] F2FS-fs (loop2): invalid crc_offset: 0 [ 256.009498][T11535] F2FS-fs (loop2): Failed to get valid F2FS checkpoint [ 256.027471][T11538] EXT4-fs (loop4): inodes count not valid: 27168 vs 32 [ 256.028344][T11544] F2FS-fs (loop0): invalid crc_offset: 0 13:22:56 executing program 1: clone(0x13102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) poll(0x0, 0x0, 0x8000000000000200) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f00000025c0)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00'}) ioctl$TUNSETLINK(r0, 0x400454cd, 0x325) r2 = openat$selinux_attr(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) mmap(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x6, 0x1010, r2, 0xdc5f7000) close(r0) r3 = socket$inet_tcp(0x2, 0x1, 0x0) preadv(r3, 0x0, 0x0, 0x7fffffff, 0x1) [ 256.048069][T11544] attempt to access beyond end of device [ 256.048069][T11544] loop0: rw=12288, want=20488, limit=16403 [ 256.059893][T11544] attempt to access beyond end of device [ 256.059893][T11544] loop0: rw=12288, want=20496, limit=16403 [ 256.071862][T11544] attempt to access beyond end of device [ 256.071862][T11544] loop0: rw=12288, want=20504, limit=16403 13:22:56 executing program 2: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffff, 0xffffffffffffffff, 0x0) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) read(r0, 0x0, 0x0) syz_mount_image$f2fs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x10, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}, {&(0x7f0000010500)='\x00\x00\x00\x00', 0x4, 0xc80}, {&(0x7f0000010700)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e00000010000003000000010000000200000018b2e346f95e497f827e0a", 0x77, 0x1400}, {0x0}, {&(0x7f0000010e00)="d73cd47a0000000000100000000000000b000000000000000d0000001000000012000000170000001600000015000000ffffffffffffffffffffffffffffffffffffffff03000600000000000000000000000000140000000100000000000000ffffffffffffffffffffffffffffffffffffffff05000000000000000000000000000000c5010000060000000100000007000000070000000a0000004000000040000000fc0f00"/181, 0xb5, 0x200000}, {&(0x7f0000010f00)="0000000000000000000000000000000000000000000000000000000009f7a5bb", 0x20, 0x200fe0}, {&(0x7f0000011000)="00000000000000000000000000000000000000000000000000000006", 0x1c, 0x2011e0}, {0x0, 0x0, 0x2012e0}, {&(0x7f0000011400)="000000000000000000000000000000000000000000160000000510ec", 0x1c, 0x201320}, {&(0x7f0000011500)="00000017000000020c60", 0xa, 0x201380}, {&(0x7f0000011600)}, {&(0x7f0000011800)}, {&(0x7f0000011b00)="0000000000000000000000000000000000000000000000000000000100000000d73cd47a0000000000100000000000000b000000000000000d0000001000000012000000170000001600000015000000ffffffffffffffffffffffffffffffffffffffff03000600000000000000000000000000140000000100000000000000ffffffffffffffffffffffffffffffffffffffff05000000000000000000000000000000c5010000060000000100000007000000070000000a0000004000000040000000fc0f", 0xc6, 0x204fe0}, {&(0x7f0000011c00)="0000000000000000000000000000000000000000000000000000000009f7a5", 0x1f, 0x205fe0}, {0x0}, {&(0x7f0000013000)="000000000000000000000100000001", 0xf, 0xa00000}], 0x0, &(0x7f0000014b00)) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='pids.events\x00', 0x275a, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x4, 0x2d, 0x9, 0x1, 0x0, 0x7fff, 0x88, 0x4, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x7, 0x0, @perf_bp={&(0x7f00000000c0), 0x1}, 0x9, 0x1, 0x4, 0x9, 0x0, 0xffff, 0x400, 0x0, 0x2, 0x0, 0x1000}, 0x0, 0xe, r1, 0xa) [ 256.095798][T11544] attempt to access beyond end of device [ 256.095798][T11544] loop0: rw=12288, want=20512, limit=16403 [ 256.113067][T11544] attempt to access beyond end of device [ 256.113067][T11544] loop0: rw=12288, want=20520, limit=16403 [ 256.124972][T11544] attempt to access beyond end of device [ 256.124972][T11544] loop0: rw=12288, want=20528, limit=16403 [ 256.137147][T11544] attempt to access beyond end of device [ 256.137147][T11544] loop0: rw=12288, want=20536, limit=16403 13:22:56 executing program 4: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000002, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x31) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) waitid$P_PIDFD(0x3, r0, &(0x7f0000000500), 0x9, &(0x7f0000000580)) ptrace$cont(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='pids.events\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x12, r1, 0x0) ftruncate(r1, 0x1000673) ioctl$KDSKBENT(r1, 0x4b47, &(0x7f00000002c0)={0x2, 0x81, 0x5}) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x88400, 0x1a8) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0xd0265000) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) exit_group(0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x31, 0xffffffffffffffff, 0x0) time(&(0x7f0000000180)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14001500, 0x9, &(0x7f0000000300)=[{&(0x7f0000000080)="206b0000000100000c190000ce1900000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800)) [ 256.148893][T11544] attempt to access beyond end of device [ 256.148893][T11544] loop0: rw=12288, want=20544, limit=16403 [ 256.160813][T11544] attempt to access beyond end of device [ 256.160813][T11544] loop0: rw=12288, want=20488, limit=16403 [ 256.173786][T11544] attempt to access beyond end of device [ 256.173786][T11544] loop0: rw=12288, want=20488, limit=16403 [ 256.186897][T11544] F2FS-fs (loop0): NAT is corrupt, run fsck to fix it [ 256.198053][T11544] F2FS-fs (loop0): Failed to initialize F2FS node manager (-5) [ 256.202935][T11558] FAULT_INJECTION: forcing a failure. [ 256.202935][T11558] name failslab, interval 1, probability 0, space 0, times 0 [ 256.218763][T11558] CPU: 0 PID: 11558 Comm: syz-executor.5 Not tainted 5.4.125-syzkaller-00016-gae94e015273b #0 [ 256.228981][T11558] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 256.239015][T11558] Call Trace: [ 256.242297][T11558] dump_stack+0x1d8/0x24e [ 256.246619][T11558] ? devkmsg_release+0x11c/0x11c [ 256.251550][T11558] ? show_regs_print_info+0x12/0x12 [ 256.256736][T11558] ? update_io_ticks+0x1c5/0x1e0 [ 256.257942][T11565] F2FS-fs (loop2): invalid crc value [ 256.261662][T11558] ? blk_account_io_start+0x436/0x4f0 [ 256.261673][T11558] should_fail+0x6f6/0x860 [ 256.261684][T11558] ? setup_fault_attr+0x3d0/0x3d0 [ 256.261695][T11558] ? mempool_alloc_slab+0x16/0x20 [ 256.261703][T11558] should_failslab+0x5/0x20 [ 256.261718][T11558] kmem_cache_alloc+0x36/0x290 [ 256.267265][T11571] EXT4-fs (loop4): inodes count not valid: 27424 vs 32 [ 256.272336][T11558] ? mempool_free+0x380/0x380 [ 256.272345][T11558] mempool_alloc_slab+0x16/0x20 [ 256.272354][T11558] mempool_alloc+0x113/0x680 [ 256.272363][T11558] ? blk_mq_requeue_work+0x9c0/0x9c0 [ 256.272376][T11558] ? mempool_resize+0x900/0x900 [ 256.296120][T11565] F2FS-fs (loop2): invalid crc_offset: 0 [ 256.302793][T11558] ? debug_smp_processor_id+0x20/0x20 [ 256.302806][T11558] ? blk_attempt_plug_merge+0x310/0x310 [ 256.302816][T11558] ? fscrypt_set_bio_crypt_ctx+0x179/0x4e0 [ 256.302825][T11558] bio_alloc_bioset+0x1db/0x640 [ 256.302839][T11558] ? bio_chain_endio+0x110/0x110 [ 256.312811][T11565] F2FS-fs (loop2): Failed to get valid F2FS checkpoint [ 256.316878][T11558] ? write_boundary_block+0x150/0x150 [ 256.316889][T11558] submit_bh_wbc+0x1ba/0x790 [ 256.316900][T11558] ll_rw_block+0x1cb/0x230 [ 256.316910][T11558] __breadahead_gfp+0xc9/0x190 [ 256.316918][T11558] ? __getblk_gfp+0x654/0x750 [ 256.316926][T11558] ? __breadahead+0x170/0x170 [ 256.316938][T11558] __ext4_get_inode_loc+0xbf6/0x1030 [ 256.316952][T11558] ? ext4_get_inode_loc+0x60/0x60 [ 256.404375][T11558] ? memset+0x1f/0x40 [ 256.408368][T11558] ? _raw_spin_unlock+0x49/0x60 [ 256.413228][T11558] ? iget_locked+0x6b3/0x7b0 [ 256.417792][T11558] __ext4_iget+0x3d1/0x4a50 [ 256.422267][T11558] ? mutex_unlock+0x19/0x40 [ 256.426748][T11558] ? ext4_get_projid+0x140/0x140 [ 256.431666][T11558] ? ext4_fill_super+0xab45/0xeb30 [ 256.436750][T11558] ext4_fill_super+0xaafa/0xeb30 [ 256.441660][T11558] ? ext4_mount+0x40/0x40 [ 256.446141][T11558] ? idr_replace+0x1c4/0x230 [ 256.450710][T11558] ? snprintf+0xd6/0x120 [ 256.454923][T11558] ? vscnprintf+0x80/0x80 [ 256.459267][T11558] ? set_blocksize+0x1a5/0x3a0 [ 256.464007][T11558] mount_bdev+0x22d/0x340 [ 256.468320][T11558] ? ext4_mount+0x40/0x40 [ 256.472634][T11558] legacy_get_tree+0xde/0x170 [ 256.477292][T11558] ? ext4_lazyinit_thread+0xd40/0xd40 [ 256.482631][T11558] vfs_get_tree+0x83/0x260 [ 256.487025][T11558] do_mount+0x19d0/0x2670 [ 256.491326][T11558] ? copy_mount_string+0x30/0x30 [ 256.496230][T11558] ? copy_mount_options+0x59/0x300 [ 256.501304][T11558] ? copy_mount_options+0x59/0x300 [ 256.506449][T11558] ? kmem_cache_alloc_trace+0x139/0x2b0 [ 256.511966][T11558] ? copy_mount_options+0x273/0x300 [ 256.517245][T11558] ksys_mount+0xc2/0xf0 [ 256.521372][T11558] __x64_sys_mount+0xb1/0xc0 [ 256.526020][T11558] do_syscall_64+0xcb/0x1e0 [ 256.530511][T11558] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 256.536370][T11558] RIP: 0033:0x467b1a [ 256.540232][T11558] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 256.559806][T11558] RSP: 002b:00007f3059253fa8 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 256.568204][T11558] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 0000000000467b1a [ 256.576148][T11558] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007f3059254000 [ 256.584096][T11558] RBP: 00007f3059254040 R08: 00007f3059254040 R09: 0000000020000000 [ 256.592039][T11558] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000020000000 13:22:56 executing program 5 (fault-call:0 fault-nth:87): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000660000000f000000000000000100000001000000004000000040000020000000daf4655fdaf4655f0100ffff53ef010001000000d9f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010100)}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000100000000000000000000000000000000000000000000003000000000000000", 0x40, 0x540}, {&(0x7f0000010300)="02000000030000000400000066000f000300040000000000000000000f007f5c", 0x20, 0x800}, {&(0x7f0000011500)="ed41000000080000d9f4655fdaf4655fdaf4655f000000000000040004", 0x1d, 0x2200}, {0x0}, {&(0x7f0000011900)="ed8100001a040000daf4655fdaf4655fdaf4655f000000000000010004000000000000000100000014000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000039c34d38000000000000000000000000000000000000000000000000200000007412ab417412ab417412ab41daf4655f7412ab410000000000000000", 0xa0, 0x3800}], 0x0, &(0x7f0000012c00)) [ 256.599982][T11558] R13: 0000000020000100 R14: 00007f3059254000 R15: 0000000020012c00 [ 256.611679][T11558] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue 13:22:56 executing program 3: clone(0x13102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) poll(0x0, 0x0, 0x8000000000000200) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f00000025c0)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) ioctl$TUNSETLINK(r0, 0x40087602, 0x30a) 13:22:56 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_mount_image$f2fs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0xe, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}, {&(0x7f0000010500)='\x00\x00\x00\x00', 0x4, 0xc80}, {&(0x7f0000010700)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e00000010000003000000010000000200000018b2e346f95e497f827e0a", 0x77, 0x1400}, {0x0}, {&(0x7f0000010e00)="d73cd47a0000000000100000000000000b000000000000000d0000001000000012000000170000001600000015000000ffffffffffffffffffffffffffffffffffffffff03000600000000000000000000000000140000000100000000000000ffffffffffffffffffffffffffffffffffffffff05000000000000000000000000000000c5010000060000000100000007000000070000000a0000004000000040000000fc0f00"/181, 0xb5, 0x200000}, {&(0x7f0000010f00)="0000000000000000000000000000000000000000000000000000000009f7a5bb", 0x20, 0x200fe0}, {&(0x7f0000011000)="00000000000000000000000000000000000000000000000000000006", 0x1c, 0x2011e0}, {0x0, 0x0, 0x2012e0}, {&(0x7f0000011400)="000000000000000000000000000000000000000000160000000510ec", 0x1c, 0x201320}, {&(0x7f0000011500)="00000017000000020c60", 0xa, 0x201380}, {&(0x7f0000011600)}, {&(0x7f0000011b00)="0000000000000000000000000000000000000000000000000000000100000000d73cd47a0000000000100000000000000b000000000000000d0000001000000012000000170000001600000015000000ffffffffffffffffffffffffffffffffffffffff03000600000000000000000000000000140000000100000000000000ffffffffffffffffffffffffffffffffffffffff05000000000000000000000000000000c5010000060000000100000007000000070000000a0000004000000040000000fc0f", 0xc6, 0x204fe0}, {&(0x7f0000011c00)="0000000000000000000000000000000000000000000000000000000009f7a5bb", 0x20, 0x205fe0}, {0x0, 0x0, 0x401320}], 0x0, &(0x7f0000014b00)) 13:22:56 executing program 4: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000002, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x31) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) waitid$P_PIDFD(0x3, r0, &(0x7f0000000500), 0x9, &(0x7f0000000580)) ptrace$cont(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='pids.events\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x12, r1, 0x0) ftruncate(r1, 0x1000673) ioctl$KDSKBENT(r1, 0x4b47, &(0x7f00000002c0)={0x2, 0x81, 0x5}) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x88400, 0x1a8) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0xd0265000) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) exit_group(0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x31, 0xffffffffffffffff, 0x0) time(&(0x7f0000000180)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14001500, 0x9, &(0x7f0000000300)=[{&(0x7f0000000080)="206c0000000100000c190000ce1900000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800)) 13:22:56 executing program 1: clone(0x13102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) poll(0x0, 0x0, 0x8000000000000200) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f00000025c0)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00'}) ioctl$TUNSETLINK(r0, 0x400454cd, 0x335) r2 = openat$selinux_attr(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) mmap(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x6, 0x1010, r2, 0xdc5f7000) close(r0) r3 = socket$inet_tcp(0x2, 0x1, 0x0) preadv(r3, 0x0, 0x0, 0x7fffffff, 0x1) 13:22:56 executing program 2: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffff, 0xffffffffffffffff, 0x0) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) read(r0, 0x0, 0x0) syz_mount_image$f2fs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x10, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}, {&(0x7f0000010500)='\x00\x00\x00\x00', 0x4, 0xc80}, {&(0x7f0000010700)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e00000010000003000000010000000200000018b2e346f95e497f827e0a", 0x77, 0x1400}, {0x0}, {&(0x7f0000010e00)="d73cd47a0000000000100000000000000b000000000000000d0000001000000012000000170000001600000015000000ffffffffffffffffffffffffffffffffffffffff03000600000000000000000000000000140000000100000000000000ffffffffffffffffffffffffffffffffffffffff05000000000000000000000000000000c5010000060000000100000007000000070000000a0000004000000040000000fc0f00"/181, 0xb5, 0x200000}, {&(0x7f0000010f00)="0000000000000000000000000000000000000000000000000000000009f7a5bb", 0x20, 0x200fe0}, {&(0x7f0000011000)="00000000000000000000000000000000000000000000000000000006", 0x1c, 0x2011e0}, {0x0, 0x0, 0x2012e0}, {&(0x7f0000011400)="000000000000000000000000000000000000000000160000000510ec", 0x1c, 0x201320}, {&(0x7f0000011500)="00000017000000020c60", 0xa, 0x201380}, {&(0x7f0000011600)}, {&(0x7f0000011800)}, {&(0x7f0000011b00)="0000000000000000000000000000000000000000000000000000000100000000d73cd47a0000000000100000000000000b000000000000000d0000001000000012000000170000001600000015000000ffffffffffffffffffffffffffffffffffffffff03000600000000000000000000000000140000000100000000000000ffffffffffffffffffffffffffffffffffffffff05000000000000000000000000000000c5010000060000000100000007000000070000000a0000004000000040000000fc0f", 0xc6, 0x204fe0}, {&(0x7f0000011c00)="0000000000000000000000000000000000000000000000000000000009f7a5bb", 0x20}, {0x0}, {&(0x7f0000013000)="000000000000000000000100000001", 0xf, 0xa00000}], 0x0, &(0x7f0000014b00)) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='pids.events\x00', 0x275a, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x4, 0x2d, 0x9, 0x1, 0x0, 0x7fff, 0x88, 0x4, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x7, 0x0, @perf_bp={&(0x7f00000000c0), 0x1}, 0x9, 0x1, 0x4, 0x9, 0x0, 0xffff, 0x400, 0x0, 0x2, 0x0, 0x1000}, 0x0, 0xe, r1, 0xa) 13:22:56 executing program 4: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000002, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x31) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) waitid$P_PIDFD(0x3, r0, &(0x7f0000000500), 0x9, &(0x7f0000000580)) ptrace$cont(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='pids.events\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x12, r1, 0x0) ftruncate(r1, 0x1000673) ioctl$KDSKBENT(r1, 0x4b47, &(0x7f00000002c0)={0x2, 0x81, 0x5}) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x88400, 0x1a8) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0xd0265000) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) exit_group(0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x31, 0xffffffffffffffff, 0x0) time(&(0x7f0000000180)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14001500, 0x9, &(0x7f0000000300)=[{&(0x7f0000000080)="206f0000000100000c190000ce1900000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800)) [ 256.772162][T11594] F2FS-fs (loop0): invalid crc_offset: 0 [ 256.777985][T11588] EXT4-fs (loop4): inodes count not valid: 27680 vs 32 [ 256.808185][T11594] F2FS-fs (loop0): NAT is corrupt, run fsck to fix it [ 256.810166][T11590] F2FS-fs (loop2): invalid crc value [ 256.819806][T11596] FAULT_INJECTION: forcing a failure. [ 256.819806][T11596] name failslab, interval 1, probability 0, space 0, times 0 [ 256.837379][T11594] F2FS-fs (loop0): Failed to initialize F2FS node manager (-5) [ 256.839508][T11590] F2FS-fs (loop2): invalid crc_offset: 0 [ 256.845928][T11596] CPU: 1 PID: 11596 Comm: syz-executor.5 Not tainted 5.4.125-syzkaller-00016-gae94e015273b #0 [ 256.852570][T11590] F2FS-fs (loop2): Failed to get valid F2FS checkpoint [ 256.860824][T11596] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 256.860828][T11596] Call Trace: [ 256.860847][T11596] dump_stack+0x1d8/0x24e [ 256.860857][T11596] ? devkmsg_release+0x11c/0x11c [ 256.860866][T11596] ? show_regs_print_info+0x12/0x12 [ 256.860876][T11596] ? __ext4_iget+0x3086/0x4a50 [ 256.860887][T11596] should_fail+0x6f6/0x860 [ 256.860896][T11596] ? setup_fault_attr+0x3d0/0x3d0 [ 256.860907][T11596] ? __d_alloc+0x2a/0x6a0 [ 256.860916][T11596] should_failslab+0x5/0x20 [ 256.860925][T11596] kmem_cache_alloc+0x36/0x290 [ 256.860936][T11596] ? ext4_fill_super+0xab45/0xeb30 [ 256.860944][T11596] __d_alloc+0x2a/0x6a0 [ 256.860953][T11596] d_make_root+0x46/0xd0 [ 256.860963][T11596] ext4_fill_super+0xac1a/0xeb30 [ 256.860981][T11596] ? ext4_mount+0x40/0x40 [ 256.860987][T11596] ? idr_replace+0x1c4/0x230 [ 256.860997][T11596] ? snprintf+0xd6/0x120 [ 256.861007][T11596] ? vscnprintf+0x80/0x80 [ 256.861018][T11596] ? set_blocksize+0x1a5/0x3a0 [ 256.861028][T11596] mount_bdev+0x22d/0x340 [ 256.861037][T11596] ? ext4_mount+0x40/0x40 [ 256.861045][T11596] legacy_get_tree+0xde/0x170 [ 256.861054][T11596] ? ext4_lazyinit_thread+0xd40/0xd40 [ 256.861063][T11596] vfs_get_tree+0x83/0x260 [ 256.861072][T11596] do_mount+0x19d0/0x2670 [ 256.861089][T11596] ? copy_mount_string+0x30/0x30 [ 256.996560][T11596] ? copy_mount_options+0x59/0x300 [ 257.001654][T11596] ? kmem_cache_alloc_trace+0x139/0x2b0 [ 257.007198][T11596] ? copy_mount_options+0x273/0x300 [ 257.012386][T11596] ksys_mount+0xc2/0xf0 [ 257.016519][T11596] __x64_sys_mount+0xb1/0xc0 [ 257.021086][T11596] do_syscall_64+0xcb/0x1e0 [ 257.025567][T11596] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 257.031435][T11596] RIP: 0033:0x467b1a [ 257.035308][T11596] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 257.054886][T11596] RSP: 002b:00007f3059253fa8 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 257.063274][T11596] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 0000000000467b1a 13:22:57 executing program 4: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000002, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x31) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) waitid$P_PIDFD(0x3, r0, &(0x7f0000000500), 0x9, &(0x7f0000000580)) ptrace$cont(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='pids.events\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x12, r1, 0x0) ftruncate(r1, 0x1000673) ioctl$KDSKBENT(r1, 0x4b47, &(0x7f00000002c0)={0x2, 0x81, 0x5}) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x88400, 0x1a8) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0xd0265000) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) exit_group(0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x31, 0xffffffffffffffff, 0x0) time(&(0x7f0000000180)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14001500, 0x9, &(0x7f0000000300)=[{&(0x7f0000000080)="20740000000100000c190000ce1900000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800)) 13:22:57 executing program 5 (fault-call:0 fault-nth:88): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000660000000f000000000000000100000001000000004000000040000020000000daf4655fdaf4655f0100ffff53ef010001000000d9f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010100)}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000100000000000000000000000000000000000000000000003000000000000000", 0x40, 0x540}, {&(0x7f0000010300)="02000000030000000400000066000f000300040000000000000000000f007f5c", 0x20, 0x800}, {&(0x7f0000011500)="ed41000000080000d9f4655fdaf4655fdaf4655f000000000000040004", 0x1d, 0x2200}, {0x0}, {&(0x7f0000011900)="ed8100001a040000daf4655fdaf4655fdaf4655f000000000000010004000000000000000100000014000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000039c34d38000000000000000000000000000000000000000000000000200000007412ab417412ab417412ab41daf4655f7412ab410000000000000000", 0xa0, 0x3800}], 0x0, &(0x7f0000012c00)) [ 257.071220][T11596] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007f3059254000 [ 257.079168][T11596] RBP: 00007f3059254040 R08: 00007f3059254040 R09: 0000000020000000 [ 257.087116][T11596] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000020000000 [ 257.095159][T11596] R13: 0000000020000100 R14: 00007f3059254000 R15: 0000000020012c00 [ 257.104362][T11596] EXT4-fs (loop5): get root dentry failed [ 257.117884][T11596] EXT4-fs (loop5): mount failed 13:22:57 executing program 4: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000002, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x31) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) waitid$P_PIDFD(0x3, r0, &(0x7f0000000500), 0x9, &(0x7f0000000580)) ptrace$cont(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='pids.events\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x12, r1, 0x0) ftruncate(r1, 0x1000673) ioctl$KDSKBENT(r1, 0x4b47, &(0x7f00000002c0)={0x2, 0x81, 0x5}) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x88400, 0x1a8) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0xd0265000) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) exit_group(0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x31, 0xffffffffffffffff, 0x0) time(&(0x7f0000000180)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14001500, 0x9, &(0x7f0000000300)=[{&(0x7f0000000080)="207a0000000100000c190000ce1900000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800)) 13:22:57 executing program 4: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000002, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x31) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) waitid$P_PIDFD(0x3, r0, &(0x7f0000000500), 0x9, &(0x7f0000000580)) ptrace$cont(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='pids.events\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x12, r1, 0x0) ftruncate(r1, 0x1000673) ioctl$KDSKBENT(r1, 0x4b47, &(0x7f00000002c0)={0x2, 0x81, 0x5}) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x88400, 0x1a8) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0xd0265000) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) exit_group(0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x31, 0xffffffffffffffff, 0x0) time(&(0x7f0000000180)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14001500, 0x9, &(0x7f0000000300)=[{&(0x7f0000000080)="20da0000000100000c190000ce1900000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800)) [ 257.167347][T11622] EXT4-fs (loop4): inodes count not valid: 29728 vs 32 [ 257.192274][T11626] FAULT_INJECTION: forcing a failure. [ 257.192274][T11626] name failslab, interval 1, probability 0, space 0, times 0 [ 257.206076][T11626] CPU: 0 PID: 11626 Comm: syz-executor.5 Not tainted 5.4.125-syzkaller-00016-gae94e015273b #0 [ 257.216313][T11626] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 257.226342][T11626] Call Trace: [ 257.229697][T11626] dump_stack+0x1d8/0x24e [ 257.234004][T11626] ? devkmsg_release+0x11c/0x11c [ 257.238956][T11626] ? show_regs_print_info+0x12/0x12 [ 257.244127][T11626] ? check_preemption_disabled+0x9e/0x330 [ 257.249816][T11626] ? __rcu_read_lock+0x50/0x50 [ 257.254548][T11626] ? __unwind_start+0x72f/0x8e0 [ 257.259426][T11626] ? debug_smp_processor_id+0x20/0x20 [ 257.264810][T11626] should_fail+0x6f6/0x860 [ 257.269209][T11626] ? setup_fault_attr+0x3d0/0x3d0 [ 257.274217][T11626] ? stack_trace_save+0x1f0/0x1f0 [ 257.279330][T11626] ? __kernel_text_address+0x93/0x100 [ 257.284857][T11626] ? unwind_get_return_address+0x48/0x80 [ 257.290482][T11626] ? mempool_alloc_slab+0x16/0x20 [ 257.295478][T11626] should_failslab+0x5/0x20 [ 257.299966][T11626] kmem_cache_alloc+0x36/0x290 [ 257.304700][T11626] ? mempool_free+0x380/0x380 [ 257.309358][T11626] mempool_alloc_slab+0x16/0x20 [ 257.314183][T11626] mempool_alloc+0x113/0x680 [ 257.318757][T11626] ? mempool_resize+0x900/0x900 [ 257.323662][T11626] ? __kasan_kmalloc+0x1a3/0x1e0 [ 257.328577][T11626] ? kmem_cache_alloc+0x115/0x290 [ 257.333589][T11626] ? __d_alloc+0x2a/0x6a0 [ 257.337903][T11626] ? check_preemption_disabled+0x9e/0x330 [ 257.343602][T11626] bio_alloc_bioset+0x1db/0x640 [ 257.348421][T11626] ? debug_smp_processor_id+0x20/0x20 [ 257.353871][T11626] ? bio_chain_endio+0x110/0x110 [ 257.358778][T11626] ? __xa_set_mark+0x499/0x580 [ 257.363512][T11626] ? memset+0x1f/0x40 [ 257.367467][T11626] submit_bh_wbc+0x1ba/0x790 [ 257.372029][T11626] ? __wake_up_bit+0x180/0x180 [ 257.376761][T11626] ? _raw_spin_unlock+0x49/0x60 [ 257.381582][T11626] __sync_dirty_buffer+0x1d2/0x2d0 [ 257.386751][T11626] ext4_commit_super+0x860/0xa40 [ 257.391669][T11626] ext4_setup_super+0x544/0x950 [ 257.396529][T11626] ext4_fill_super+0xac84/0xeb30 [ 257.401546][T11626] ? ext4_mount+0x40/0x40 [ 257.406017][T11626] ? idr_replace+0x1c4/0x230 [ 257.410622][T11626] ? snprintf+0xd6/0x120 [ 257.414833][T11626] ? vscnprintf+0x80/0x80 [ 257.419265][T11626] ? set_blocksize+0x1a5/0x3a0 [ 257.423996][T11626] mount_bdev+0x22d/0x340 [ 257.428293][T11626] ? ext4_mount+0x40/0x40 [ 257.432588][T11626] legacy_get_tree+0xde/0x170 [ 257.437234][T11626] ? ext4_lazyinit_thread+0xd40/0xd40 [ 257.442625][T11626] vfs_get_tree+0x83/0x260 [ 257.447074][T11626] do_mount+0x19d0/0x2670 [ 257.451384][T11626] ? copy_mount_string+0x30/0x30 [ 257.456302][T11626] ? copy_mount_options+0x59/0x300 [ 257.461380][T11626] ? copy_mount_options+0x59/0x300 [ 257.466466][T11626] ? kmem_cache_alloc_trace+0x139/0x2b0 [ 257.471988][T11626] ? copy_mount_options+0x273/0x300 [ 257.477163][T11626] ksys_mount+0xc2/0xf0 [ 257.481294][T11626] __x64_sys_mount+0xb1/0xc0 [ 257.485858][T11626] do_syscall_64+0xcb/0x1e0 [ 257.490347][T11626] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 257.496212][T11626] RIP: 0033:0x467b1a [ 257.500105][T11626] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 257.519795][T11626] RSP: 002b:00007f3059253fa8 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 257.528213][T11626] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 0000000000467b1a [ 257.536849][T11626] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007f3059254000 [ 257.544790][T11626] RBP: 00007f3059254040 R08: 00007f3059254040 R09: 0000000020000000 [ 257.552730][T11626] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000020000000 [ 257.560677][T11626] R13: 0000000020000100 R14: 00007f3059254000 R15: 0000000020012c00 13:22:57 executing program 3: clone(0x13102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) poll(0x0, 0x0, 0x8000000000000200) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f00000025c0)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r1, 0x0) ioctl$TUNSETLINK(r0, 0x40087602, 0x30a) 13:22:57 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_mount_image$f2fs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0xe, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}, {&(0x7f0000010500)='\x00\x00\x00\x00', 0x4, 0xc80}, {&(0x7f0000010700)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e00000010000003000000010000000200000018b2e346f95e497f827e0a", 0x77, 0x1400}, {0x0}, {&(0x7f0000010e00)="d73cd47a0000000000100000000000000b000000000000000d0000001000000012000000170000001600000015000000ffffffffffffffffffffffffffffffffffffffff03000600000000000000000000000000140000000100000000000000ffffffffffffffffffffffffffffffffffffffff05000000000000000000000000000000c5010000060000000100000007000000070000000a0000004000000040000000fc0f00"/181, 0xb5, 0x200000}, {&(0x7f0000010f00)="0000000000000000000000000000000000000000000000000000000009f7a5bb", 0x20, 0x200fe0}, {&(0x7f0000011000)="00000000000000000000000000000000000000000000000000000006", 0x1c, 0x2011e0}, {0x0, 0x0, 0x2012e0}, {&(0x7f0000011400)="000000000000000000000000000000000000000000160000000510ec", 0x1c, 0x201320}, {&(0x7f0000011500)="00000017000000020c60", 0xa, 0x201380}, {&(0x7f0000011600)}, {0x0, 0x0, 0x204fe0}, {&(0x7f0000011c00)="0000000000000000000000000000000000000000000000000000000009f7a5bb", 0x20, 0x205fe0}, {0x0, 0x0, 0x401320}], 0x0, &(0x7f0000014b00)) [ 257.569508][T11626] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue 13:22:57 executing program 2: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffff, 0xffffffffffffffff, 0x0) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) read(r0, 0x0, 0x0) syz_mount_image$f2fs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x10, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}, {&(0x7f0000010500)='\x00\x00\x00\x00', 0x4, 0xc80}, {&(0x7f0000010700)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e00000010000003000000010000000200000018b2e346f95e497f827e0a", 0x77, 0x1400}, {0x0}, {&(0x7f0000010e00)="d73cd47a0000000000100000000000000b000000000000000d0000001000000012000000170000001600000015000000ffffffffffffffffffffffffffffffffffffffff03000600000000000000000000000000140000000100000000000000ffffffffffffffffffffffffffffffffffffffff05000000000000000000000000000000c5010000060000000100000007000000070000000a0000004000000040000000fc0f00"/181, 0xb5, 0x200000}, {&(0x7f0000010f00)="0000000000000000000000000000000000000000000000000000000009f7a5bb", 0x20, 0x200fe0}, {&(0x7f0000011000)="00000000000000000000000000000000000000000000000000000006", 0x1c, 0x2011e0}, {0x0, 0x0, 0x2012e0}, {&(0x7f0000011400)="000000000000000000000000000000000000000000160000000510ec", 0x1c, 0x201320}, {&(0x7f0000011500)="00000017000000020c60", 0xa, 0x201380}, {&(0x7f0000011600)}, {&(0x7f0000011800)}, {&(0x7f0000011b00)="0000000000000000000000000000000000000000000000000000000100000000d73cd47a0000000000100000000000000b000000000000000d0000001000000012000000170000001600000015000000ffffffffffffffffffffffffffffffffffffffff03000600000000000000000000000000140000000100000000000000ffffffffffffffffffffffffffffffffffffffff05000000000000000000000000000000c5010000060000000100000007000000070000000a0000004000000040000000fc0f", 0xc6, 0x204fe0}, {&(0x7f0000011c00)="0000000000000000000000000000000000000000000000000000000009f7a5bb", 0x20}, {0x0}, {&(0x7f0000013000)="000000000000000000000100000001", 0xf, 0xa00000}], 0x0, &(0x7f0000014b00)) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='pids.events\x00', 0x275a, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x4, 0x2d, 0x9, 0x1, 0x0, 0x7fff, 0x88, 0x4, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x7, 0x0, @perf_bp={&(0x7f00000000c0), 0x1}, 0x9, 0x1, 0x4, 0x9, 0x0, 0xffff, 0x400, 0x0, 0x2, 0x0, 0x1000}, 0x0, 0xe, r1, 0xa) 13:22:57 executing program 1: clone(0x13102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) poll(0x0, 0x0, 0x8000000000000200) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f00000025c0)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00'}) ioctl$TUNSETLINK(r0, 0x400454cd, 0x337) r2 = openat$selinux_attr(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) mmap(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x6, 0x1010, r2, 0xdc5f7000) close(r0) r3 = socket$inet_tcp(0x2, 0x1, 0x0) preadv(r3, 0x0, 0x0, 0x7fffffff, 0x1) 13:22:57 executing program 5 (fault-call:0 fault-nth:89): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000660000000f000000000000000100000001000000004000000040000020000000daf4655fdaf4655f0100ffff53ef010001000000d9f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010100)}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000100000000000000000000000000000000000000000000003000000000000000", 0x40, 0x540}, {&(0x7f0000010300)="02000000030000000400000066000f000300040000000000000000000f007f5c", 0x20, 0x800}, {&(0x7f0000011500)="ed41000000080000d9f4655fdaf4655fdaf4655f000000000000040004", 0x1d, 0x2200}, {0x0}, {&(0x7f0000011900)="ed8100001a040000daf4655fdaf4655fdaf4655f000000000000010004000000000000000100000014000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000039c34d38000000000000000000000000000000000000000000000000200000007412ab417412ab417412ab41daf4655f7412ab410000000000000000", 0xa0, 0x3800}], 0x0, &(0x7f0000012c00)) 13:22:57 executing program 4: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000002, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x31) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) waitid$P_PIDFD(0x3, r0, &(0x7f0000000500), 0x9, &(0x7f0000000580)) ptrace$cont(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='pids.events\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x12, r1, 0x0) ftruncate(r1, 0x1000673) ioctl$KDSKBENT(r1, 0x4b47, &(0x7f00000002c0)={0x2, 0x81, 0x5}) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x88400, 0x1a8) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0xd0265000) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) exit_group(0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x31, 0xffffffffffffffff, 0x0) time(&(0x7f0000000180)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14001500, 0x9, &(0x7f0000000300)=[{&(0x7f0000000080)="20fc0000000100000c190000ce1900000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800)) [ 257.739490][T11644] EXT4-fs (loop4): inodes count not valid: 55840 vs 32 [ 257.746656][T11652] F2FS-fs (loop2): invalid crc value [ 257.749360][T11651] F2FS-fs (loop0): invalid crc_offset: 0 [ 257.760274][T11651] F2FS-fs (loop0): invalid crc_offset: 0 [ 257.760655][T11652] F2FS-fs (loop2): invalid crc_offset: 0 [ 257.766514][T11651] F2FS-fs (loop0): Failed to get valid F2FS checkpoint [ 257.781760][T11652] F2FS-fs (loop2): Failed to get valid F2FS checkpoint [ 257.800718][T11665] FAULT_INJECTION: forcing a failure. [ 257.800718][T11665] name failslab, interval 1, probability 0, space 0, times 0 [ 257.813485][T11665] CPU: 0 PID: 11665 Comm: syz-executor.5 Not tainted 5.4.125-syzkaller-00016-gae94e015273b #0 [ 257.823701][T11665] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 257.833736][T11665] Call Trace: [ 257.837182][T11665] dump_stack+0x1d8/0x24e [ 257.841486][T11665] ? devkmsg_release+0x11c/0x11c [ 257.846395][T11665] ? show_regs_print_info+0x12/0x12 [ 257.851562][T11665] ? fscrypt_set_bio_crypt_ctx+0x179/0x4e0 [ 257.857954][T11665] should_fail+0x6f6/0x860 [ 257.862506][T11665] ? setup_fault_attr+0x3d0/0x3d0 [ 257.867537][T11665] ? submit_bio+0x146/0x5d0 [ 257.872030][T11665] ? bio_add_page+0x2e9/0x470 [ 257.876684][T11665] ? ext4_setup_system_zone+0x137/0xec0 [ 257.882224][T11665] should_failslab+0x5/0x20 [ 257.886702][T11665] kmem_cache_alloc_trace+0x39/0x2b0 [ 257.891962][T11665] ext4_setup_system_zone+0x137/0xec0 [ 257.897328][T11665] ? __sync_dirty_buffer+0x296/0x2d0 [ 257.902759][T11665] ? ext4_commit_super+0x8a4/0xa40 [ 257.907855][T11665] ? ext4_exit_system_zone+0x20/0x20 [ 257.913119][T11665] ? __cleancache_init_fs+0x66/0xb0 [ 257.918297][T11665] ? ext4_setup_super+0x597/0x950 [ 257.923302][T11665] ext4_fill_super+0xbd8c/0xeb30 [ 257.928224][T11665] ? ext4_mount+0x40/0x40 [ 257.932538][T11665] ? idr_replace+0x1c4/0x230 [ 257.937101][T11665] ? snprintf+0xd6/0x120 [ 257.941403][T11665] ? vscnprintf+0x80/0x80 [ 257.945706][T11665] ? set_blocksize+0x1a5/0x3a0 [ 257.950445][T11665] mount_bdev+0x22d/0x340 [ 257.954745][T11665] ? ext4_mount+0x40/0x40 [ 257.959046][T11665] legacy_get_tree+0xde/0x170 [ 257.963696][T11665] ? ext4_lazyinit_thread+0xd40/0xd40 [ 257.969042][T11665] vfs_get_tree+0x83/0x260 [ 257.973428][T11665] do_mount+0x19d0/0x2670 [ 257.977737][T11665] ? copy_mount_string+0x30/0x30 [ 257.982646][T11665] ? copy_mount_options+0x59/0x300 [ 257.987732][T11665] ? kmem_cache_alloc_trace+0x139/0x2b0 [ 257.993264][T11665] ? copy_mount_options+0x273/0x300 [ 257.998449][T11665] ksys_mount+0xc2/0xf0 [ 258.002593][T11665] __x64_sys_mount+0xb1/0xc0 [ 258.007177][T11665] do_syscall_64+0xcb/0x1e0 [ 258.011656][T11665] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 258.017520][T11665] RIP: 0033:0x467b1a [ 258.021403][T11665] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 258.040977][T11665] RSP: 002b:00007f3059253fa8 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 258.049359][T11665] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 0000000000467b1a [ 258.057314][T11665] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007f3059254000 [ 258.065267][T11665] RBP: 00007f3059254040 R08: 00007f3059254040 R09: 0000000020000000 [ 258.073215][T11665] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000020000000 [ 258.081163][T11665] R13: 0000000020000100 R14: 00007f3059254000 R15: 0000000020012c00 [ 258.093123][T11665] EXT4-fs (loop5): failed to initialize system zone (-12) 13:22:58 executing program 4: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000002, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x31) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) waitid$P_PIDFD(0x3, r0, &(0x7f0000000500), 0x9, &(0x7f0000000580)) ptrace$cont(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='pids.events\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x12, r1, 0x0) ftruncate(r1, 0x1000673) ioctl$KDSKBENT(r1, 0x4b47, &(0x7f00000002c0)={0x2, 0x81, 0x5}) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x88400, 0x1a8) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0xd0265000) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) exit_group(0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x31, 0xffffffffffffffff, 0x0) time(&(0x7f0000000180)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14001500, 0x9, &(0x7f0000000300)=[{&(0x7f0000000080)="20440100000100000c190000ce1900000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800)) [ 258.101354][T11665] EXT4-fs (loop5): mount failed 13:22:58 executing program 4: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000002, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x31) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) waitid$P_PIDFD(0x3, r0, &(0x7f0000000500), 0x9, &(0x7f0000000580)) ptrace$cont(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='pids.events\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x12, r1, 0x0) ftruncate(r1, 0x1000673) ioctl$KDSKBENT(r1, 0x4b47, &(0x7f00000002c0)={0x2, 0x81, 0x5}) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x88400, 0x1a8) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0xd0265000) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) exit_group(0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x31, 0xffffffffffffffff, 0x0) time(&(0x7f0000000180)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14001500, 0x9, &(0x7f0000000300)=[{&(0x7f0000000080)="20040200000100000c190000ce1900000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800)) 13:22:58 executing program 3: clone(0x13102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) poll(0x0, 0x0, 0x8000000000000200) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f00000025c0)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r1, 0x0) ioctl$TUNSETLINK(r0, 0x40087602, 0x30a) 13:22:58 executing program 5 (fault-call:0 fault-nth:90): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000660000000f000000000000000100000001000000004000000040000020000000daf4655fdaf4655f0100ffff53ef010001000000d9f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010100)}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000100000000000000000000000000000000000000000000003000000000000000", 0x40, 0x540}, {&(0x7f0000010300)="02000000030000000400000066000f000300040000000000000000000f007f5c", 0x20, 0x800}, {&(0x7f0000011500)="ed41000000080000d9f4655fdaf4655fdaf4655f000000000000040004", 0x1d, 0x2200}, {0x0}, {&(0x7f0000011900)="ed8100001a040000daf4655fdaf4655fdaf4655f000000000000010004000000000000000100000014000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000039c34d38000000000000000000000000000000000000000000000000200000007412ab417412ab417412ab41daf4655f7412ab410000000000000000", 0xa0, 0x3800}], 0x0, &(0x7f0000012c00)) 13:22:58 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_mount_image$f2fs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0xe, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}, {&(0x7f0000010500)='\x00\x00\x00\x00', 0x4, 0xc80}, {&(0x7f0000010700)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e00000010000003000000010000000200000018b2e346f95e497f827e0a", 0x77, 0x1400}, {0x0}, {&(0x7f0000010e00)="d73cd47a0000000000100000000000000b000000000000000d0000001000000012000000170000001600000015000000ffffffffffffffffffffffffffffffffffffffff03000600000000000000000000000000140000000100000000000000ffffffffffffffffffffffffffffffffffffffff05000000000000000000000000000000c5010000060000000100000007000000070000000a0000004000000040000000fc0f00"/181, 0xb5, 0x200000}, {&(0x7f0000010f00)="0000000000000000000000000000000000000000000000000000000009f7a5bb", 0x20, 0x200fe0}, {&(0x7f0000011000)="00000000000000000000000000000000000000000000000000000006", 0x1c, 0x2011e0}, {0x0, 0x0, 0x2012e0}, {&(0x7f0000011400)="000000000000000000000000000000000000000000160000000510ec", 0x1c, 0x201320}, {&(0x7f0000011500)="00000017000000020c60", 0xa, 0x201380}, {&(0x7f0000011600)}, {0x0, 0x0, 0x204fe0}, {&(0x7f0000011c00)="0000000000000000000000000000000000000000000000000000000009f7a5bb", 0x20, 0x205fe0}, {0x0, 0x0, 0x401320}], 0x0, &(0x7f0000014b00)) 13:22:58 executing program 2: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffff, 0xffffffffffffffff, 0x0) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) read(r0, 0x0, 0x0) syz_mount_image$f2fs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x10, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}, {&(0x7f0000010500)='\x00\x00\x00\x00', 0x4, 0xc80}, {&(0x7f0000010700)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e00000010000003000000010000000200000018b2e346f95e497f827e0a", 0x77, 0x1400}, {0x0}, {&(0x7f0000010e00)="d73cd47a0000000000100000000000000b000000000000000d0000001000000012000000170000001600000015000000ffffffffffffffffffffffffffffffffffffffff03000600000000000000000000000000140000000100000000000000ffffffffffffffffffffffffffffffffffffffff05000000000000000000000000000000c5010000060000000100000007000000070000000a0000004000000040000000fc0f00"/181, 0xb5, 0x200000}, {&(0x7f0000010f00)="0000000000000000000000000000000000000000000000000000000009f7a5bb", 0x20, 0x200fe0}, {&(0x7f0000011000)="00000000000000000000000000000000000000000000000000000006", 0x1c, 0x2011e0}, {0x0, 0x0, 0x2012e0}, {&(0x7f0000011400)="000000000000000000000000000000000000000000160000000510ec", 0x1c, 0x201320}, {&(0x7f0000011500)="00000017000000020c60", 0xa, 0x201380}, {&(0x7f0000011600)}, {&(0x7f0000011800)}, {&(0x7f0000011b00)="0000000000000000000000000000000000000000000000000000000100000000d73cd47a0000000000100000000000000b000000000000000d0000001000000012000000170000001600000015000000ffffffffffffffffffffffffffffffffffffffff03000600000000000000000000000000140000000100000000000000ffffffffffffffffffffffffffffffffffffffff05000000000000000000000000000000c5010000060000000100000007000000070000000a0000004000000040000000fc0f", 0xc6, 0x204fe0}, {&(0x7f0000011c00)="0000000000000000000000000000000000000000000000000000000009f7a5bb", 0x20}, {0x0}, {&(0x7f0000013000)="000000000000000000000100000001", 0xf, 0xa00000}], 0x0, &(0x7f0000014b00)) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='pids.events\x00', 0x275a, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x4, 0x2d, 0x9, 0x1, 0x0, 0x7fff, 0x88, 0x4, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x7, 0x0, @perf_bp={&(0x7f00000000c0), 0x1}, 0x9, 0x1, 0x4, 0x9, 0x0, 0xffff, 0x400, 0x0, 0x2, 0x0, 0x1000}, 0x0, 0xe, r1, 0xa) [ 258.249016][T11682] EXT4-fs (loop4): inodes count not valid: 132128 vs 32 [ 258.286332][T11688] FAULT_INJECTION: forcing a failure. [ 258.286332][T11688] name failslab, interval 1, probability 0, space 0, times 0 13:22:58 executing program 1: clone(0x13102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) poll(0x0, 0x0, 0x8000000000000200) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f00000025c0)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00'}) ioctl$TUNSETLINK(r0, 0x400454cd, 0x339) r2 = openat$selinux_attr(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) mmap(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x6, 0x1010, r2, 0xdc5f7000) close(r0) r3 = socket$inet_tcp(0x2, 0x1, 0x0) preadv(r3, 0x0, 0x0, 0x7fffffff, 0x1) [ 258.288937][T11694] F2FS-fs (loop2): invalid crc value [ 258.305090][T11694] F2FS-fs (loop2): invalid crc_offset: 0 [ 258.311140][T11694] F2FS-fs (loop2): Failed to get valid F2FS checkpoint [ 258.323127][T11688] CPU: 0 PID: 11688 Comm: syz-executor.5 Not tainted 5.4.125-syzkaller-00016-gae94e015273b #0 [ 258.326924][T11700] F2FS-fs (loop0): invalid crc_offset: 0 [ 258.333352][T11688] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 13:22:58 executing program 4: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000002, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x31) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) waitid$P_PIDFD(0x3, r0, &(0x7f0000000500), 0x9, &(0x7f0000000580)) ptrace$cont(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='pids.events\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x12, r1, 0x0) ftruncate(r1, 0x1000673) ioctl$KDSKBENT(r1, 0x4b47, &(0x7f00000002c0)={0x2, 0x81, 0x5}) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x88400, 0x1a8) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0xd0265000) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) exit_group(0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x31, 0xffffffffffffffff, 0x0) time(&(0x7f0000000180)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14001500, 0x9, &(0x7f0000000300)=[{&(0x7f0000000080)="20700200000100000c190000ce1900000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800)) [ 258.333357][T11688] Call Trace: [ 258.333373][T11688] dump_stack+0x1d8/0x24e [ 258.333388][T11688] ? devkmsg_release+0x11c/0x11c [ 258.340301][T11700] F2FS-fs (loop0): invalid crc_offset: 0 [ 258.349025][T11688] ? show_regs_print_info+0x12/0x12 [ 258.349034][T11688] ? update_io_ticks+0x1c5/0x1e0 [ 258.349044][T11688] ? blk_account_io_start+0x436/0x4f0 [ 258.349054][T11688] should_fail+0x6f6/0x860 [ 258.349068][T11688] ? setup_fault_attr+0x3d0/0x3d0 [ 258.354449][T11700] F2FS-fs (loop0): Failed to get valid F2FS checkpoint [ 258.356887][T11688] ? mempool_alloc_slab+0x16/0x20 [ 258.356902][T11688] should_failslab+0x5/0x20 [ 258.408507][T11688] kmem_cache_alloc+0x36/0x290 [ 258.413355][T11688] ? mempool_free+0x380/0x380 [ 258.418105][T11688] mempool_alloc_slab+0x16/0x20 [ 258.422964][T11688] mempool_alloc+0x113/0x680 [ 258.427524][T11688] ? blk_mq_requeue_work+0x9c0/0x9c0 [ 258.432779][T11688] ? mempool_resize+0x900/0x900 [ 258.437727][T11688] ? debug_smp_processor_id+0x20/0x20 [ 258.443080][T11688] ? blk_attempt_plug_merge+0x310/0x310 [ 258.448600][T11688] ? fscrypt_set_bio_crypt_ctx+0x179/0x4e0 [ 258.454406][T11688] bio_alloc_bioset+0x1db/0x640 [ 258.459360][T11688] ? bio_chain_endio+0x110/0x110 [ 258.464290][T11688] ? write_boundary_block+0x150/0x150 [ 258.469634][T11688] submit_bh_wbc+0x1ba/0x790 [ 258.474217][T11688] ll_rw_block+0x1cb/0x230 [ 258.478693][T11688] __breadahead_gfp+0xc9/0x190 [ 258.483424][T11688] ? __getblk_gfp+0x654/0x750 [ 258.488078][T11688] ? __breadahead+0x170/0x170 [ 258.492739][T11688] __ext4_get_inode_loc+0xbf6/0x1030 [ 258.497994][T11688] ? ext4_get_inode_loc+0x60/0x60 [ 258.502987][T11688] ? memset+0x1f/0x40 [ 258.506938][T11688] ? _raw_spin_unlock+0x49/0x60 [ 258.511757][T11688] ? iget_locked+0x6b3/0x7b0 [ 258.516333][T11688] __ext4_iget+0x3d1/0x4a50 [ 258.520807][T11688] ? mutex_unlock+0x19/0x40 [ 258.525279][T11688] ? ext4_get_projid+0x140/0x140 [ 258.530189][T11688] ? ext4_fill_super+0xab45/0xeb30 [ 258.535268][T11688] ext4_fill_super+0xaafa/0xeb30 [ 258.540179][T11688] ? ext4_mount+0x40/0x40 [ 258.544472][T11688] ? idr_replace+0x1c4/0x230 [ 258.549029][T11688] ? snprintf+0xd6/0x120 [ 258.553241][T11688] ? vscnprintf+0x80/0x80 [ 258.557542][T11688] ? set_blocksize+0x1a5/0x3a0 [ 258.562277][T11688] mount_bdev+0x22d/0x340 [ 258.566586][T11688] ? ext4_mount+0x40/0x40 [ 258.570974][T11688] legacy_get_tree+0xde/0x170 [ 258.575624][T11688] ? ext4_lazyinit_thread+0xd40/0xd40 [ 258.580975][T11688] vfs_get_tree+0x83/0x260 [ 258.585359][T11688] do_mount+0x19d0/0x2670 [ 258.589659][T11688] ? copy_mount_string+0x30/0x30 [ 258.594562][T11688] ? retint_kernel+0x1b/0x1b [ 258.599118][T11688] ? copy_mount_options+0x1cc/0x300 [ 258.604291][T11688] ? copy_mount_options+0x273/0x300 [ 258.609458][T11688] ksys_mount+0xc2/0xf0 [ 258.613612][T11688] __x64_sys_mount+0xb1/0xc0 [ 258.618193][T11688] do_syscall_64+0xcb/0x1e0 [ 258.622668][T11688] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 258.628545][T11688] RIP: 0033:0x467b1a [ 258.632407][T11688] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 258.652154][T11688] RSP: 002b:00007f3059253fa8 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 258.660536][T11688] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 0000000000467b1a [ 258.668474][T11688] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007f3059254000 [ 258.676415][T11688] RBP: 00007f3059254040 R08: 00007f3059254040 R09: 0000000020000000 [ 258.684356][T11688] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000020000000 [ 258.692293][T11688] R13: 0000000020000100 R14: 00007f3059254000 R15: 0000000020012c00 [ 258.702880][T11688] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue 13:22:58 executing program 5 (fault-call:0 fault-nth:91): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000660000000f000000000000000100000001000000004000000040000020000000daf4655fdaf4655f0100ffff53ef010001000000d9f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010100)}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000100000000000000000000000000000000000000000000003000000000000000", 0x40, 0x540}, {&(0x7f0000010300)="02000000030000000400000066000f000300040000000000000000000f007f5c", 0x20, 0x800}, {&(0x7f0000011500)="ed41000000080000d9f4655fdaf4655fdaf4655f000000000000040004", 0x1d, 0x2200}, {0x0}, {&(0x7f0000011900)="ed8100001a040000daf4655fdaf4655fdaf4655f000000000000010004000000000000000100000014000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000039c34d38000000000000000000000000000000000000000000000000200000007412ab417412ab417412ab41daf4655f7412ab410000000000000000", 0xa0, 0x3800}], 0x0, &(0x7f0000012c00)) 13:22:58 executing program 3: clone(0x13102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) poll(0x0, 0x0, 0x8000000000000200) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f00000025c0)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r1, 0x0) ioctl$TUNSETLINK(r0, 0x40087602, 0x30a) 13:22:58 executing program 2: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffff, 0xffffffffffffffff, 0x0) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) read(r0, 0x0, 0x0) syz_mount_image$f2fs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0xf, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}, {&(0x7f0000010500)='\x00\x00\x00\x00', 0x4, 0xc80}, {&(0x7f0000010700)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e00000010000003000000010000000200000018b2e346f95e497f827e0a", 0x77, 0x1400}, {0x0}, {&(0x7f0000010e00)="d73cd47a0000000000100000000000000b000000000000000d0000001000000012000000170000001600000015000000ffffffffffffffffffffffffffffffffffffffff03000600000000000000000000000000140000000100000000000000ffffffffffffffffffffffffffffffffffffffff05000000000000000000000000000000c5010000060000000100000007000000070000000a0000004000000040000000fc0f00"/181, 0xb5, 0x200000}, {&(0x7f0000010f00)="0000000000000000000000000000000000000000000000000000000009f7a5bb", 0x20, 0x200fe0}, {&(0x7f0000011000)="00000000000000000000000000000000000000000000000000000006", 0x1c, 0x2011e0}, {0x0, 0x0, 0x2012e0}, {&(0x7f0000011400)="000000000000000000000000000000000000000000160000000510ec", 0x1c, 0x201320}, {&(0x7f0000011500)="00000017000000020c60", 0xa, 0x201380}, {&(0x7f0000011600)}, {&(0x7f0000011800)}, {&(0x7f0000011c00)="0000000000000000000000000000000000000000000000000000000009f7a5bb", 0x20, 0x205fe0}, {0x0}, {&(0x7f0000013000)="000000000000000000000100000001", 0xf, 0xa00000}], 0x0, &(0x7f0000014b00)) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='pids.events\x00', 0x275a, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x4, 0x2d, 0x9, 0x1, 0x0, 0x7fff, 0x88, 0x4, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x7, 0x0, @perf_bp={&(0x7f00000000c0), 0x1}, 0x9, 0x1, 0x4, 0x9, 0x0, 0xffff, 0x400, 0x0, 0x2, 0x0, 0x1000}, 0x0, 0xe, r1, 0xa) [ 258.761479][T11711] EXT4-fs (loop4): inodes count not valid: 159776 vs 32 13:22:58 executing program 1: clone(0x13102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) poll(0x0, 0x0, 0x8000000000000200) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f00000025c0)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00'}) ioctl$TUNSETLINK(r0, 0x400454cd, 0xfffffffe) r2 = openat$selinux_attr(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) mmap(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x6, 0x1010, r2, 0xdc5f7000) close(r0) r3 = socket$inet_tcp(0x2, 0x1, 0x0) preadv(r3, 0x0, 0x0, 0x7fffffff, 0x1) 13:22:59 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_mount_image$f2fs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0xe, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}, {&(0x7f0000010500)='\x00\x00\x00\x00', 0x4, 0xc80}, {&(0x7f0000010700)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e00000010000003000000010000000200000018b2e346f95e497f827e0a", 0x77, 0x1400}, {0x0}, {&(0x7f0000010e00)="d73cd47a0000000000100000000000000b000000000000000d0000001000000012000000170000001600000015000000ffffffffffffffffffffffffffffffffffffffff03000600000000000000000000000000140000000100000000000000ffffffffffffffffffffffffffffffffffffffff05000000000000000000000000000000c5010000060000000100000007000000070000000a0000004000000040000000fc0f00"/181, 0xb5, 0x200000}, {&(0x7f0000010f00)="0000000000000000000000000000000000000000000000000000000009f7a5bb", 0x20, 0x200fe0}, {&(0x7f0000011000)="00000000000000000000000000000000000000000000000000000006", 0x1c, 0x2011e0}, {0x0, 0x0, 0x2012e0}, {&(0x7f0000011400)="000000000000000000000000000000000000000000160000000510ec", 0x1c, 0x201320}, {&(0x7f0000011500)="00000017000000020c60", 0xa, 0x201380}, {&(0x7f0000011600)}, {0x0, 0x0, 0x204fe0}, {&(0x7f0000011c00)="0000000000000000000000000000000000000000000000000000000009f7a5bb", 0x20, 0x205fe0}, {0x0, 0x0, 0x401320}], 0x0, &(0x7f0000014b00)) 13:22:59 executing program 4: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000002, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x31) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) waitid$P_PIDFD(0x3, r0, &(0x7f0000000500), 0x9, &(0x7f0000000580)) ptrace$cont(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='pids.events\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x12, r1, 0x0) ftruncate(r1, 0x1000673) ioctl$KDSKBENT(r1, 0x4b47, &(0x7f00000002c0)={0x2, 0x81, 0x5}) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x88400, 0x1a8) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0xd0265000) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) exit_group(0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x31, 0xffffffffffffffff, 0x0) time(&(0x7f0000000180)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14001500, 0x9, &(0x7f0000000300)=[{&(0x7f0000000080)="20bb0200000100000c190000ce1900000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800)) [ 259.029358][T11727] FAULT_INJECTION: forcing a failure. [ 259.029358][T11727] name failslab, interval 1, probability 0, space 0, times 0 [ 259.043084][T11727] CPU: 1 PID: 11727 Comm: syz-executor.5 Not tainted 5.4.125-syzkaller-00016-gae94e015273b #0 [ 259.053337][T11727] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 259.058561][T11728] F2FS-fs (loop2): invalid crc_offset: 0 [ 259.063385][T11727] Call Trace: [ 259.063403][T11727] dump_stack+0x1d8/0x24e [ 259.063421][T11727] ? devkmsg_release+0x11c/0x11c [ 259.069283][T11728] F2FS-fs (loop2): invalid crc_offset: 0 [ 259.072291][T11727] ? show_regs_print_info+0x12/0x12 [ 259.072301][T11727] ? __ext4_iget+0x3086/0x4a50 [ 259.072316][T11727] should_fail+0x6f6/0x860 [ 259.079369][T11728] F2FS-fs (loop2): Failed to get valid F2FS checkpoint [ 259.081532][T11727] ? setup_fault_attr+0x3d0/0x3d0 [ 259.081551][T11727] ? __d_alloc+0x2a/0x6a0 [ 259.117542][T11727] should_failslab+0x5/0x20 [ 259.122022][T11727] kmem_cache_alloc+0x36/0x290 [ 259.126766][T11727] ? ext4_fill_super+0xab45/0xeb30 [ 259.131850][T11727] __d_alloc+0x2a/0x6a0 [ 259.135978][T11727] d_make_root+0x46/0xd0 [ 259.140195][T11727] ext4_fill_super+0xac1a/0xeb30 [ 259.145113][T11727] ? ext4_mount+0x40/0x40 [ 259.149415][T11727] ? idr_replace+0x1c4/0x230 [ 259.153976][T11727] ? snprintf+0xd6/0x120 [ 259.158192][T11727] ? vscnprintf+0x80/0x80 [ 259.162495][T11727] ? set_blocksize+0x1a5/0x3a0 [ 259.167233][T11727] mount_bdev+0x22d/0x340 [ 259.171539][T11727] ? ext4_mount+0x40/0x40 [ 259.175841][T11727] legacy_get_tree+0xde/0x170 [ 259.180488][T11727] ? ext4_lazyinit_thread+0xd40/0xd40 [ 259.185834][T11727] vfs_get_tree+0x83/0x260 [ 259.190222][T11727] do_mount+0x19d0/0x2670 [ 259.194528][T11727] ? copy_mount_string+0x30/0x30 [ 259.199440][T11727] ? copy_mount_options+0x59/0x300 [ 259.204526][T11727] ? copy_mount_options+0x59/0x300 [ 259.209610][T11727] ? kmem_cache_alloc_trace+0x139/0x2b0 [ 259.215128][T11727] ? copy_mount_options+0x273/0x300 [ 259.220297][T11727] ksys_mount+0xc2/0xf0 [ 259.224429][T11727] __x64_sys_mount+0xb1/0xc0 [ 259.228994][T11727] do_syscall_64+0xcb/0x1e0 [ 259.233473][T11727] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 259.239339][T11727] RIP: 0033:0x467b1a [ 259.243207][T11727] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 259.262797][T11727] RSP: 002b:00007f3059253fa8 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 259.271192][T11727] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 0000000000467b1a [ 259.279153][T11727] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007f3059254000 [ 259.287109][T11727] RBP: 00007f3059254040 R08: 00007f3059254040 R09: 0000000020000000 [ 259.295054][T11727] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000020000000 [ 259.303017][T11727] R13: 0000000020000100 R14: 00007f3059254000 R15: 0000000020012c00 [ 259.315655][T11727] EXT4-fs (loop5): get root dentry failed [ 259.324295][T11727] EXT4-fs (loop5): mount failed 13:22:59 executing program 5 (fault-call:0 fault-nth:92): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000660000000f000000000000000100000001000000004000000040000020000000daf4655fdaf4655f0100ffff53ef010001000000d9f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010100)}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000100000000000000000000000000000000000000000000003000000000000000", 0x40, 0x540}, {&(0x7f0000010300)="02000000030000000400000066000f000300040000000000000000000f007f5c", 0x20, 0x800}, {&(0x7f0000011500)="ed41000000080000d9f4655fdaf4655fdaf4655f000000000000040004", 0x1d, 0x2200}, {0x0}, {&(0x7f0000011900)="ed8100001a040000daf4655fdaf4655fdaf4655f000000000000010004000000000000000100000014000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000039c34d38000000000000000000000000000000000000000000000000200000007412ab417412ab417412ab41daf4655f7412ab410000000000000000", 0xa0, 0x3800}], 0x0, &(0x7f0000012c00)) [ 259.327333][T11730] F2FS-fs (loop0): invalid crc_offset: 0 [ 259.342240][T11730] F2FS-fs (loop0): invalid crc_offset: 0 [ 259.348774][T11730] F2FS-fs (loop0): Failed to get valid F2FS checkpoint [ 259.361166][T11739] EXT4-fs (loop4): inodes count not valid: 178976 vs 32 13:22:59 executing program 4: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000002, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x31) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) waitid$P_PIDFD(0x3, r0, &(0x7f0000000500), 0x9, &(0x7f0000000580)) ptrace$cont(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='pids.events\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x12, r1, 0x0) ftruncate(r1, 0x1000673) ioctl$KDSKBENT(r1, 0x4b47, &(0x7f00000002c0)={0x2, 0x81, 0x5}) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x88400, 0x1a8) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0xd0265000) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) exit_group(0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x31, 0xffffffffffffffff, 0x0) time(&(0x7f0000000180)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14001500, 0x9, &(0x7f0000000300)=[{&(0x7f0000000080)="20c60200000100000c190000ce1900000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800)) 13:22:59 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_mount_image$f2fs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0xe, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}, {&(0x7f0000010500)='\x00\x00\x00\x00', 0x4, 0xc80}, {&(0x7f0000010700)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e00000010000003000000010000000200000018b2e346f95e497f827e0a", 0x77, 0x1400}, {0x0}, {&(0x7f0000010e00)="d73cd47a0000000000100000000000000b000000000000000d0000001000000012000000170000001600000015000000ffffffffffffffffffffffffffffffffffffffff03000600000000000000000000000000140000000100000000000000ffffffffffffffffffffffffffffffffffffffff05000000000000000000000000000000c5010000060000000100000007000000070000000a0000004000000040000000fc0f00"/181, 0xb5, 0x200000}, {&(0x7f0000010f00)="0000000000000000000000000000000000000000000000000000000009f7a5bb", 0x20, 0x200fe0}, {&(0x7f0000011000)="00000000000000000000000000000000000000000000000000000006", 0x1c, 0x2011e0}, {0x0, 0x0, 0x2012e0}, {&(0x7f0000011400)="000000000000000000000000000000000000000000160000000510ec", 0x1c, 0x201320}, {&(0x7f0000011500)="00000017000000020c60", 0xa, 0x201380}, {&(0x7f0000011600)}, {&(0x7f0000011b00), 0x0, 0x204fe0}, {&(0x7f0000011c00)="0000000000000000000000000000000000000000000000000000000009f7a5bb", 0x20, 0x205fe0}, {0x0, 0x0, 0x401320}], 0x0, &(0x7f0000014b00)) 13:22:59 executing program 2: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffff, 0xffffffffffffffff, 0x0) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) read(r0, 0x0, 0x0) syz_mount_image$f2fs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0xf, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}, {&(0x7f0000010500)='\x00\x00\x00\x00', 0x4, 0xc80}, {&(0x7f0000010700)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e00000010000003000000010000000200000018b2e346f95e497f827e0a", 0x77, 0x1400}, {0x0}, {&(0x7f0000010e00)="d73cd47a0000000000100000000000000b000000000000000d0000001000000012000000170000001600000015000000ffffffffffffffffffffffffffffffffffffffff03000600000000000000000000000000140000000100000000000000ffffffffffffffffffffffffffffffffffffffff05000000000000000000000000000000c5010000060000000100000007000000070000000a0000004000000040000000fc0f00"/181, 0xb5, 0x200000}, {&(0x7f0000010f00)="0000000000000000000000000000000000000000000000000000000009f7a5bb", 0x20, 0x200fe0}, {&(0x7f0000011000)="00000000000000000000000000000000000000000000000000000006", 0x1c, 0x2011e0}, {0x0, 0x0, 0x2012e0}, {&(0x7f0000011400)="000000000000000000000000000000000000000000160000000510ec", 0x1c, 0x201320}, {&(0x7f0000011500)="00000017000000020c60", 0xa, 0x201380}, {&(0x7f0000011600)}, {&(0x7f0000011800)}, {&(0x7f0000011c00)="0000000000000000000000000000000000000000000000000000000009f7a5bb", 0x20, 0x205fe0}, {0x0}, {&(0x7f0000013000)="000000000000000000000100000001", 0xf, 0xa00000}], 0x0, &(0x7f0000014b00)) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='pids.events\x00', 0x275a, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x4, 0x2d, 0x9, 0x1, 0x0, 0x7fff, 0x88, 0x4, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x7, 0x0, @perf_bp={&(0x7f00000000c0), 0x1}, 0x9, 0x1, 0x4, 0x9, 0x0, 0xffff, 0x400, 0x0, 0x2, 0x0, 0x1000}, 0x0, 0xe, r1, 0xa) 13:22:59 executing program 4: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000002, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x31) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) waitid$P_PIDFD(0x3, r0, &(0x7f0000000500), 0x9, &(0x7f0000000580)) ptrace$cont(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='pids.events\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x12, r1, 0x0) ftruncate(r1, 0x1000673) ioctl$KDSKBENT(r1, 0x4b47, &(0x7f00000002c0)={0x2, 0x81, 0x5}) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x88400, 0x1a8) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0xd0265000) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) exit_group(0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x31, 0xffffffffffffffff, 0x0) time(&(0x7f0000000180)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14001500, 0x9, &(0x7f0000000300)=[{&(0x7f0000000080)="20f40200000100000c190000ce1900000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800)) 13:22:59 executing program 3: clone(0x13102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) poll(0x0, 0x0, 0x8000000000000200) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f00000025c0)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) ioctl$TUNSETLINK(r0, 0x40087602, 0x30a) [ 259.502299][T11752] EXT4-fs (loop4): inodes count not valid: 181792 vs 32 [ 259.535246][T11758] F2FS-fs (loop0): invalid crc_offset: 0 [ 259.541073][T11758] F2FS-fs (loop0): invalid crc_offset: 0 [ 259.542067][T11747] FAULT_INJECTION: forcing a failure. [ 259.542067][T11747] name failslab, interval 1, probability 0, space 0, times 0 [ 259.548086][T11758] F2FS-fs (loop0): Failed to get valid F2FS checkpoint [ 259.577872][T11747] CPU: 1 PID: 11747 Comm: syz-executor.5 Not tainted 5.4.125-syzkaller-00016-gae94e015273b #0 [ 259.588199][T11747] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 259.598247][T11747] Call Trace: [ 259.601514][T11747] dump_stack+0x1d8/0x24e [ 259.605814][T11747] ? devkmsg_release+0x11c/0x11c [ 259.610724][T11747] ? show_regs_print_info+0x12/0x12 [ 259.615893][T11747] should_fail+0x6f6/0x860 [ 259.620278][T11747] ? setup_fault_attr+0x3d0/0x3d0 [ 259.625274][T11747] ? add_system_zone+0x128/0x4f0 [ 259.630181][T11747] should_failslab+0x5/0x20 [ 259.634658][T11747] kmem_cache_alloc+0x36/0x290 [ 259.639392][T11747] add_system_zone+0x128/0x4f0 [ 259.644129][T11747] ? ext4_bg_num_gdb+0xf1/0x200 [ 259.648951][T11747] ext4_setup_system_zone+0x2a9/0xec0 [ 259.654293][T11747] ? ext4_commit_super+0x8a4/0xa40 [ 259.659378][T11747] ? ext4_exit_system_zone+0x20/0x20 [ 259.664631][T11747] ? __cleancache_init_fs+0x66/0xb0 [ 259.669799][T11747] ? ext4_setup_super+0x597/0x950 [ 259.674798][T11747] ext4_fill_super+0xbd8c/0xeb30 [ 259.679713][T11747] ? ext4_mount+0x40/0x40 [ 259.684012][T11747] ? idr_replace+0x1c4/0x230 [ 259.688574][T11747] ? snprintf+0xd6/0x120 [ 259.692789][T11747] ? vscnprintf+0x80/0x80 [ 259.697091][T11747] ? set_blocksize+0x1a5/0x3a0 [ 259.701835][T11747] mount_bdev+0x22d/0x340 [ 259.706146][T11747] ? ext4_mount+0x40/0x40 [ 259.710445][T11747] legacy_get_tree+0xde/0x170 [ 259.715092][T11747] ? ext4_lazyinit_thread+0xd40/0xd40 [ 259.720432][T11747] vfs_get_tree+0x83/0x260 [ 259.724923][T11747] do_mount+0x19d0/0x2670 [ 259.729224][T11747] ? copy_mount_string+0x30/0x30 [ 259.734129][T11747] ? copy_mount_options+0x59/0x300 [ 259.739209][T11747] ? copy_mount_options+0x59/0x300 [ 259.744301][T11747] ? kmem_cache_alloc_trace+0x139/0x2b0 [ 259.749815][T11747] ? copy_mount_options+0x273/0x300 [ 259.755078][T11747] ksys_mount+0xc2/0xf0 [ 259.759205][T11747] __x64_sys_mount+0xb1/0xc0 [ 259.763871][T11747] do_syscall_64+0xcb/0x1e0 [ 259.768358][T11747] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 259.774219][T11747] RIP: 0033:0x467b1a [ 259.778094][T11747] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 13:22:59 executing program 4: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000002, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x31) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) waitid$P_PIDFD(0x3, r0, &(0x7f0000000500), 0x9, &(0x7f0000000580)) ptrace$cont(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='pids.events\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x12, r1, 0x0) ftruncate(r1, 0x1000673) ioctl$KDSKBENT(r1, 0x4b47, &(0x7f00000002c0)={0x2, 0x81, 0x5}) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x88400, 0x1a8) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0xd0265000) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) exit_group(0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x31, 0xffffffffffffffff, 0x0) time(&(0x7f0000000180)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14001500, 0x9, &(0x7f0000000300)=[{&(0x7f0000000080)="20000300000100000c190000ce1900000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800)) 13:22:59 executing program 1: clone(0x13102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) poll(0x0, 0x0, 0x8000000000000200) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x0, 0x3, &(0x7f0000000040)=@framed={{0x18, 0x0, 0x0, 0x0, 0x7ea0, 0x0, 0x0, 0x0, 0x4}}, &(0x7f0000000100)='GPL\x00', 0x5, 0xec, &(0x7f0000000140)=""/236, 0x82200, 0xc, '\x00', 0x0, 0x17, 0xffffffffffffffff, 0x8, &(0x7f0000000240)={0x6, 0x2}, 0x8, 0x10, &(0x7f0000000280)={0x0, 0x6, 0x9, 0x2}, 0x10, 0xffffffffffffffff}, 0x78) ioctl$F2FS_IOC_PRECACHE_EXTENTS(r1, 0xf50f, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f00000025c0)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00'}) ioctl$TUNSETLINK(r0, 0x400454cd, 0x30a) r3 = openat$selinux_attr(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) mmap(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x6, 0x1010, r3, 0xdc5f7000) close(r0) r4 = socket$inet_tcp(0x2, 0x1, 0x0) preadv(r4, 0x0, 0x0, 0x7fffffff, 0x1) [ 259.797665][T11747] RSP: 002b:00007f3059253fa8 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 259.806051][T11747] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 0000000000467b1a [ 259.813994][T11747] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007f3059254000 [ 259.821944][T11747] RBP: 00007f3059254040 R08: 00007f3059254040 R09: 0000000020000000 [ 259.829975][T11747] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000020000000 [ 259.837918][T11747] R13: 0000000020000100 R14: 00007f3059254000 R15: 0000000020012c00 13:22:59 executing program 5 (fault-call:0 fault-nth:93): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000660000000f000000000000000100000001000000004000000040000020000000daf4655fdaf4655f0100ffff53ef010001000000d9f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010100)}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000100000000000000000000000000000000000000000000003000000000000000", 0x40, 0x540}, {&(0x7f0000010300)="02000000030000000400000066000f000300040000000000000000000f007f5c", 0x20, 0x800}, {&(0x7f0000011500)="ed41000000080000d9f4655fdaf4655fdaf4655f000000000000040004", 0x1d, 0x2200}, {0x0}, {&(0x7f0000011900)="ed8100001a040000daf4655fdaf4655fdaf4655f000000000000010004000000000000000100000014000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000039c34d38000000000000000000000000000000000000000000000000200000007412ab417412ab417412ab41daf4655f7412ab410000000000000000", 0xa0, 0x3800}], 0x0, &(0x7f0000012c00)) [ 259.882458][T11773] F2FS-fs (loop2): invalid crc_offset: 0 [ 259.893463][T11747] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue [ 259.896885][T11773] F2FS-fs (loop2): invalid crc_offset: 0 [ 259.909053][T11773] F2FS-fs (loop2): Failed to get valid F2FS checkpoint 13:23:00 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_mount_image$f2fs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0xe, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}, {&(0x7f0000010500)='\x00\x00\x00\x00', 0x4, 0xc80}, {&(0x7f0000010700)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e00000010000003000000010000000200000018b2e346f95e497f827e0a", 0x77, 0x1400}, {0x0}, {&(0x7f0000010e00)="d73cd47a0000000000100000000000000b000000000000000d0000001000000012000000170000001600000015000000ffffffffffffffffffffffffffffffffffffffff03000600000000000000000000000000140000000100000000000000ffffffffffffffffffffffffffffffffffffffff05000000000000000000000000000000c5010000060000000100000007000000070000000a0000004000000040000000fc0f00"/181, 0xb5, 0x200000}, {&(0x7f0000010f00)="0000000000000000000000000000000000000000000000000000000009f7a5bb", 0x20, 0x200fe0}, {&(0x7f0000011000)="00000000000000000000000000000000000000000000000000000006", 0x1c, 0x2011e0}, {0x0, 0x0, 0x2012e0}, {&(0x7f0000011400)="000000000000000000000000000000000000000000160000000510ec", 0x1c, 0x201320}, {&(0x7f0000011500)="00000017000000020c60", 0xa, 0x201380}, {&(0x7f0000011600)}, {&(0x7f0000011b00), 0x0, 0x204fe0}, {&(0x7f0000011c00)="0000000000000000000000000000000000000000000000000000000009f7a5bb", 0x20, 0x205fe0}, {0x0, 0x0, 0x401320}], 0x0, &(0x7f0000014b00)) 13:23:00 executing program 2: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffff, 0xffffffffffffffff, 0x0) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) read(r0, 0x0, 0x0) syz_mount_image$f2fs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0xf, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}, {&(0x7f0000010500)='\x00\x00\x00\x00', 0x4, 0xc80}, {&(0x7f0000010700)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e00000010000003000000010000000200000018b2e346f95e497f827e0a", 0x77, 0x1400}, {0x0}, {&(0x7f0000010e00)="d73cd47a0000000000100000000000000b000000000000000d0000001000000012000000170000001600000015000000ffffffffffffffffffffffffffffffffffffffff03000600000000000000000000000000140000000100000000000000ffffffffffffffffffffffffffffffffffffffff05000000000000000000000000000000c5010000060000000100000007000000070000000a0000004000000040000000fc0f00"/181, 0xb5, 0x200000}, {&(0x7f0000010f00)="0000000000000000000000000000000000000000000000000000000009f7a5bb", 0x20, 0x200fe0}, {&(0x7f0000011000)="00000000000000000000000000000000000000000000000000000006", 0x1c, 0x2011e0}, {0x0, 0x0, 0x2012e0}, {&(0x7f0000011400)="000000000000000000000000000000000000000000160000000510ec", 0x1c, 0x201320}, {&(0x7f0000011500)="00000017000000020c60", 0xa, 0x201380}, {&(0x7f0000011600)}, {&(0x7f0000011800)}, {&(0x7f0000011c00)="0000000000000000000000000000000000000000000000000000000009f7a5bb", 0x20, 0x205fe0}, {0x0}, {&(0x7f0000013000)="000000000000000000000100000001", 0xf, 0xa00000}], 0x0, &(0x7f0000014b00)) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='pids.events\x00', 0x275a, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x4, 0x2d, 0x9, 0x1, 0x0, 0x7fff, 0x88, 0x4, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x7, 0x0, @perf_bp={&(0x7f00000000c0), 0x1}, 0x9, 0x1, 0x4, 0x9, 0x0, 0xffff, 0x400, 0x0, 0x2, 0x0, 0x1000}, 0x0, 0xe, r1, 0xa) 13:23:00 executing program 4: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000002, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x31) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) waitid$P_PIDFD(0x3, r0, &(0x7f0000000500), 0x9, &(0x7f0000000580)) ptrace$cont(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='pids.events\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x12, r1, 0x0) ftruncate(r1, 0x1000673) ioctl$KDSKBENT(r1, 0x4b47, &(0x7f00000002c0)={0x2, 0x81, 0x5}) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x88400, 0x1a8) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0xd0265000) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) exit_group(0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x31, 0xffffffffffffffff, 0x0) time(&(0x7f0000000180)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14001500, 0x9, &(0x7f0000000300)=[{&(0x7f0000000080)="20900300000100000c190000ce1900000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800)) [ 260.056227][T11785] F2FS-fs (loop0): invalid crc_offset: 0 [ 260.067493][T11782] EXT4-fs (loop4): inodes count not valid: 196640 vs 32 [ 260.077833][T11785] F2FS-fs (loop0): invalid crc_offset: 0 [ 260.085217][T11785] F2FS-fs (loop0): Failed to get valid F2FS checkpoint 13:23:00 executing program 3: clone(0x13102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) poll(0x0, 0x0, 0x8000000000000200) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f00000025c0)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) ioctl$TUNSETLINK(r0, 0x40087602, 0x30a) [ 260.106978][T11790] FAULT_INJECTION: forcing a failure. [ 260.106978][T11790] name failslab, interval 1, probability 0, space 0, times 0 [ 260.109352][T11792] F2FS-fs (loop2): invalid crc_offset: 0 [ 260.123869][T11790] CPU: 0 PID: 11790 Comm: syz-executor.5 Not tainted 5.4.125-syzkaller-00016-gae94e015273b #0 [ 260.132873][T11792] F2FS-fs (loop2): invalid crc_offset: 0 [ 260.135596][T11790] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 260.135599][T11790] Call Trace: [ 260.135615][T11790] dump_stack+0x1d8/0x24e [ 260.135626][T11790] ? devkmsg_release+0x11c/0x11c [ 260.135635][T11790] ? show_regs_print_info+0x12/0x12 [ 260.135647][T11790] should_fail+0x6f6/0x860 [ 260.135661][T11790] ? setup_fault_attr+0x3d0/0x3d0 [ 260.143354][T11792] F2FS-fs (loop2): Failed to get valid F2FS checkpoint [ 260.151557][T11790] ? kmem_cache_free+0xb8/0x5f0 [ 260.151567][T11790] ? add_system_zone+0x128/0x4f0 [ 260.151576][T11790] should_failslab+0x5/0x20 [ 260.151585][T11790] kmem_cache_alloc+0x36/0x290 [ 260.151594][T11790] add_system_zone+0x128/0x4f0 [ 260.151609][T11790] ext4_setup_system_zone+0x363/0xec0 [ 260.214732][T11790] ? ext4_commit_super+0x8a4/0xa40 [ 260.219815][T11790] ? ext4_exit_system_zone+0x20/0x20 [ 260.225066][T11790] ? __cleancache_init_fs+0x66/0xb0 [ 260.230471][T11790] ? ext4_setup_super+0x597/0x950 [ 260.235636][T11790] ext4_fill_super+0xbd8c/0xeb30 [ 260.240560][T11790] ? ext4_mount+0x40/0x40 [ 260.244917][T11790] ? idr_replace+0x1c4/0x230 [ 260.249474][T11790] ? snprintf+0xd6/0x120 [ 260.253683][T11790] ? vscnprintf+0x80/0x80 [ 260.258025][T11790] ? set_blocksize+0x1a5/0x3a0 [ 260.262759][T11790] mount_bdev+0x22d/0x340 [ 260.267057][T11790] ? ext4_mount+0x40/0x40 [ 260.271366][T11790] legacy_get_tree+0xde/0x170 [ 260.276039][T11790] ? ext4_lazyinit_thread+0xd40/0xd40 [ 260.281380][T11790] vfs_get_tree+0x83/0x260 [ 260.285773][T11790] do_mount+0x19d0/0x2670 [ 260.290072][T11790] ? copy_mount_string+0x30/0x30 [ 260.294985][T11790] ? copy_mount_options+0x59/0x300 [ 260.300063][T11790] ? copy_mount_options+0x59/0x300 [ 260.305141][T11790] ? kmem_cache_alloc_trace+0x139/0x2b0 [ 260.310655][T11790] ? copy_mount_options+0x273/0x300 [ 260.315819][T11790] ksys_mount+0xc2/0xf0 [ 260.319952][T11790] __x64_sys_mount+0xb1/0xc0 [ 260.324514][T11790] do_syscall_64+0xcb/0x1e0 [ 260.328985][T11790] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 260.334842][T11790] RIP: 0033:0x467b1a [ 260.338701][T11790] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 260.358293][T11790] RSP: 002b:00007f3059253fa8 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 260.366668][T11790] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 0000000000467b1a [ 260.374610][T11790] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007f3059254000 [ 260.382561][T11790] RBP: 00007f3059254040 R08: 00007f3059254040 R09: 0000000020000000 [ 260.390498][T11790] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000020000000 [ 260.398434][T11790] R13: 0000000020000100 R14: 00007f3059254000 R15: 0000000020012c00 13:23:00 executing program 1: clone(0x13102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) poll(0x0, 0x0, 0x8000000000000200) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f00000025c0)='/proc/self/exe\x00', 0x0, 0x0) r2 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x92, 0x92, 0x4, [@datasec={0xd, 0x4, 0x0, 0xf, 0x2, [{0x3, 0x1f, 0x301}, {0x3, 0x8}, {0x3, 0x2, 0x8}, {0x1, 0x81, 0xff}], "61bf"}, @typedef={0x4, 0x0, 0x0, 0x8, 0x2}, @array={0x0, 0x0, 0x0, 0x3, 0x0, {0x1, 0x3, 0xa994}}, @const={0x1, 0x0, 0x0, 0xa, 0x2}, @enum={0x10, 0x3, 0x0, 0x6, 0x4, [{0xe, 0x6}, {0x6, 0x5}, {0x0, 0xfffffffd}]}]}, {0x0, [0x61, 0x61]}}, &(0x7f0000000040)=""/13, 0xb0, 0xd, 0x1}, 0x20) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r2, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00'}) ioctl$TUNSETLINK(r0, 0x400454cd, 0x30a) r3 = openat$selinux_attr(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) mmap(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x6, 0x1010, r3, 0xdc5f7000) close(r0) r4 = socket$inet_tcp(0x2, 0x1, 0x0) preadv(r4, 0x0, 0x0, 0x7fffffff, 0x1) [ 260.407124][T11790] EXT4-fs (loop5): failed to initialize system zone (-12) [ 260.416416][T11790] EXT4-fs (loop5): mount failed 13:23:00 executing program 4: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000002, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x31) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) waitid$P_PIDFD(0x3, r0, &(0x7f0000000500), 0x9, &(0x7f0000000580)) ptrace$cont(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='pids.events\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x12, r1, 0x0) ftruncate(r1, 0x1000673) ioctl$KDSKBENT(r1, 0x4b47, &(0x7f00000002c0)={0x2, 0x81, 0x5}) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x88400, 0x1a8) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0xd0265000) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) exit_group(0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x31, 0xffffffffffffffff, 0x0) time(&(0x7f0000000180)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14001500, 0x9, &(0x7f0000000300)=[{&(0x7f0000000080)="20940300000100000c190000ce1900000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800)) 13:23:00 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_mount_image$f2fs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0xe, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}, {&(0x7f0000010500)='\x00\x00\x00\x00', 0x4, 0xc80}, {&(0x7f0000010700)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e00000010000003000000010000000200000018b2e346f95e497f827e0a", 0x77, 0x1400}, {0x0}, {&(0x7f0000010e00)="d73cd47a0000000000100000000000000b000000000000000d0000001000000012000000170000001600000015000000ffffffffffffffffffffffffffffffffffffffff03000600000000000000000000000000140000000100000000000000ffffffffffffffffffffffffffffffffffffffff05000000000000000000000000000000c5010000060000000100000007000000070000000a0000004000000040000000fc0f00"/181, 0xb5, 0x200000}, {&(0x7f0000010f00)="0000000000000000000000000000000000000000000000000000000009f7a5bb", 0x20, 0x200fe0}, {&(0x7f0000011000)="00000000000000000000000000000000000000000000000000000006", 0x1c, 0x2011e0}, {0x0, 0x0, 0x2012e0}, {&(0x7f0000011400)="000000000000000000000000000000000000000000160000000510ec", 0x1c, 0x201320}, {&(0x7f0000011500)="00000017000000020c60", 0xa, 0x201380}, {&(0x7f0000011600)}, {&(0x7f0000011b00), 0x0, 0x204fe0}, {&(0x7f0000011c00)="0000000000000000000000000000000000000000000000000000000009f7a5bb", 0x20, 0x205fe0}, {0x0, 0x0, 0x401320}], 0x0, &(0x7f0000014b00)) 13:23:00 executing program 5 (fault-call:0 fault-nth:94): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000660000000f000000000000000100000001000000004000000040000020000000daf4655fdaf4655f0100ffff53ef010001000000d9f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010100)}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000100000000000000000000000000000000000000000000003000000000000000", 0x40, 0x540}, {&(0x7f0000010300)="02000000030000000400000066000f000300040000000000000000000f007f5c", 0x20, 0x800}, {&(0x7f0000011500)="ed41000000080000d9f4655fdaf4655fdaf4655f000000000000040004", 0x1d, 0x2200}, {0x0}, {&(0x7f0000011900)="ed8100001a040000daf4655fdaf4655fdaf4655f000000000000010004000000000000000100000014000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000039c34d38000000000000000000000000000000000000000000000000200000007412ab417412ab417412ab41daf4655f7412ab410000000000000000", 0xa0, 0x3800}], 0x0, &(0x7f0000012c00)) 13:23:00 executing program 2: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffff, 0xffffffffffffffff, 0x0) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) read(r0, 0x0, 0x0) syz_mount_image$f2fs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x10, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}, {&(0x7f0000010500)='\x00\x00\x00\x00', 0x4, 0xc80}, {&(0x7f0000010700)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e00000010000003000000010000000200000018b2e346f95e497f827e0a", 0x77, 0x1400}, {0x0}, {&(0x7f0000010e00)="d73cd47a0000000000100000000000000b000000000000000d0000001000000012000000170000001600000015000000ffffffffffffffffffffffffffffffffffffffff03000600000000000000000000000000140000000100000000000000ffffffffffffffffffffffffffffffffffffffff05000000000000000000000000000000c5010000060000000100000007000000070000000a0000004000000040000000fc0f00"/181, 0xb5, 0x200000}, {&(0x7f0000010f00)="0000000000000000000000000000000000000000000000000000000009f7a5bb", 0x20, 0x200fe0}, {&(0x7f0000011000)="00000000000000000000000000000000000000000000000000000006", 0x1c, 0x2011e0}, {0x0, 0x0, 0x2012e0}, {&(0x7f0000011400)="000000000000000000000000000000000000000000160000000510ec", 0x1c, 0x201320}, {&(0x7f0000011500)="00000017000000020c60", 0xa, 0x201380}, {&(0x7f0000011600)}, {&(0x7f0000011800)}, {0x0, 0x0, 0x204fe0}, {&(0x7f0000011c00)="0000000000000000000000000000000000000000000000000000000009f7a5bb", 0x20, 0x205fe0}, {0x0}, {&(0x7f0000013000)="000000000000000000000100000001", 0xf, 0xa00000}], 0x0, &(0x7f0000014b00)) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='pids.events\x00', 0x275a, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x4, 0x2d, 0x9, 0x1, 0x0, 0x7fff, 0x88, 0x4, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x7, 0x0, @perf_bp={&(0x7f00000000c0), 0x1}, 0x9, 0x1, 0x4, 0x9, 0x0, 0xffff, 0x400, 0x0, 0x2, 0x0, 0x1000}, 0x0, 0xe, r1, 0xa) [ 260.581382][T11815] F2FS-fs (loop0): invalid crc_offset: 0 [ 260.591526][T11817] EXT4-fs (loop4): inodes count not valid: 234528 vs 32 [ 260.598914][T11815] F2FS-fs (loop0): invalid crc_offset: 0 [ 260.604990][T11815] F2FS-fs (loop0): Failed to get valid F2FS checkpoint [ 260.617002][T11825] F2FS-fs (loop2): invalid crc_offset: 0 [ 260.623166][T11825] F2FS-fs (loop2): invalid crc_offset: 0 13:23:00 executing program 4: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000002, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x31) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) waitid$P_PIDFD(0x3, r0, &(0x7f0000000500), 0x9, &(0x7f0000000580)) ptrace$cont(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='pids.events\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x12, r1, 0x0) ftruncate(r1, 0x1000673) ioctl$KDSKBENT(r1, 0x4b47, &(0x7f00000002c0)={0x2, 0x81, 0x5}) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x88400, 0x1a8) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0xd0265000) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) exit_group(0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x31, 0xffffffffffffffff, 0x0) time(&(0x7f0000000180)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14001500, 0x9, &(0x7f0000000300)=[{&(0x7f0000000080)="20950300000100000c190000ce1900000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800)) [ 260.629805][T11825] F2FS-fs (loop2): Failed to get valid F2FS checkpoint [ 260.641974][T11823] FAULT_INJECTION: forcing a failure. [ 260.641974][T11823] name failslab, interval 1, probability 0, space 0, times 0 [ 260.654655][T11823] CPU: 0 PID: 11823 Comm: syz-executor.5 Not tainted 5.4.125-syzkaller-00016-gae94e015273b #0 [ 260.664866][T11823] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 260.674892][T11823] Call Trace: [ 260.678335][T11823] dump_stack+0x1d8/0x24e [ 260.682640][T11823] ? devkmsg_release+0x11c/0x11c [ 260.687609][T11823] ? show_regs_print_info+0x12/0x12 [ 260.692784][T11823] should_fail+0x6f6/0x860 [ 260.697170][T11823] ? setup_fault_attr+0x3d0/0x3d0 [ 260.702166][T11823] ? add_system_zone+0x128/0x4f0 [ 260.707160][T11823] should_failslab+0x5/0x20 [ 260.711641][T11823] kmem_cache_alloc+0x36/0x290 [ 260.716381][T11823] add_system_zone+0x128/0x4f0 [ 260.721124][T11823] ? ext4_bg_num_gdb+0xf1/0x200 [ 260.725942][T11823] ext4_setup_system_zone+0x2a9/0xec0 [ 260.731308][T11823] ? ext4_commit_super+0x8a4/0xa40 [ 260.736391][T11823] ? ext4_exit_system_zone+0x20/0x20 [ 260.741653][T11823] ? __cleancache_init_fs+0x66/0xb0 [ 260.746814][T11823] ? ext4_setup_super+0x597/0x950 [ 260.751892][T11823] ext4_fill_super+0xbd8c/0xeb30 [ 260.756802][T11823] ? ext4_mount+0x40/0x40 [ 260.761115][T11823] ? idr_replace+0x1c4/0x230 [ 260.765674][T11823] ? snprintf+0xd6/0x120 [ 260.769887][T11823] ? vscnprintf+0x80/0x80 [ 260.774186][T11823] ? set_blocksize+0x1a5/0x3a0 [ 260.778916][T11823] mount_bdev+0x22d/0x340 [ 260.783226][T11823] ? ext4_mount+0x40/0x40 [ 260.787545][T11823] legacy_get_tree+0xde/0x170 [ 260.792189][T11823] ? ext4_lazyinit_thread+0xd40/0xd40 [ 260.797792][T11823] vfs_get_tree+0x83/0x260 [ 260.802188][T11823] do_mount+0x19d0/0x2670 [ 260.806505][T11823] ? copy_mount_string+0x30/0x30 [ 260.811428][T11823] ? copy_mount_options+0x59/0x300 [ 260.816528][T11823] ? kmem_cache_alloc_trace+0x139/0x2b0 [ 260.822041][T11823] ? copy_mount_options+0x273/0x300 [ 260.827208][T11823] ksys_mount+0xc2/0xf0 [ 260.831332][T11823] __x64_sys_mount+0xb1/0xc0 [ 260.835895][T11823] do_syscall_64+0xcb/0x1e0 [ 260.840368][T11823] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 260.846247][T11823] RIP: 0033:0x467b1a [ 260.850126][T11823] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 260.869699][T11823] RSP: 002b:00007f3059253fa8 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 13:23:00 executing program 5 (fault-call:0 fault-nth:95): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000660000000f000000000000000100000001000000004000000040000020000000daf4655fdaf4655f0100ffff53ef010001000000d9f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010100)}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000100000000000000000000000000000000000000000000003000000000000000", 0x40, 0x540}, {&(0x7f0000010300)="02000000030000000400000066000f000300040000000000000000000f007f5c", 0x20, 0x800}, {&(0x7f0000011500)="ed41000000080000d9f4655fdaf4655fdaf4655f000000000000040004", 0x1d, 0x2200}, {0x0}, {&(0x7f0000011900)="ed8100001a040000daf4655fdaf4655fdaf4655f000000000000010004000000000000000100000014000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000039c34d38000000000000000000000000000000000000000000000000200000007412ab417412ab417412ab41daf4655f7412ab410000000000000000", 0xa0, 0x3800}], 0x0, &(0x7f0000012c00)) 13:23:00 executing program 4: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000002, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x31) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) waitid$P_PIDFD(0x3, r0, &(0x7f0000000500), 0x9, &(0x7f0000000580)) ptrace$cont(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='pids.events\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x12, r1, 0x0) ftruncate(r1, 0x1000673) ioctl$KDSKBENT(r1, 0x4b47, &(0x7f00000002c0)={0x2, 0x81, 0x5}) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x88400, 0x1a8) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0xd0265000) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) exit_group(0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x31, 0xffffffffffffffff, 0x0) time(&(0x7f0000000180)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14001500, 0x9, &(0x7f0000000300)=[{&(0x7f0000000080)="209c0300000100000c190000ce1900000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800)) [ 260.878170][T11823] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 0000000000467b1a [ 260.886116][T11823] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007f3059254000 [ 260.894064][T11823] RBP: 00007f3059254040 R08: 00007f3059254040 R09: 0000000020000000 [ 260.902018][T11823] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000020000000 [ 260.909971][T11823] R13: 0000000020000100 R14: 00007f3059254000 R15: 0000000020012c00 [ 260.920095][T11823] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue 13:23:01 executing program 3: clone(0x13102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) poll(0x0, 0x0, 0x8000000000000200) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f00000025c0)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) ioctl$TUNSETLINK(r0, 0x40087602, 0x30a) 13:23:01 executing program 1: clone(0x2000000, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket(0x0, 0x0, 0x0) poll(0x0, 0x0, 0x8000000000000200) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f00000025c0)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00'}) ioctl$TUNSETLINK(r1, 0x400454cd, 0x30a) r3 = openat$selinux_attr(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) mmap(&(0x7f000032e000/0x4000)=nil, 0x4000, 0x12, 0x1010, r3, 0xa3024000) close(r1) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='pids.events\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x12, r4, 0x0) ftruncate(r3, 0xffffffffffffffff) sendfile(r0, r3, &(0x7f0000000040)=0x1c1a, 0x4) ftruncate(r3, 0x401) r5 = socket$inet_tcp(0x2, 0x1, 0x0) preadv(r5, 0x0, 0x0, 0x7fffffff, 0x4) 13:23:01 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_mount_image$f2fs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0xe, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}, {&(0x7f0000010500)='\x00\x00\x00\x00', 0x4, 0xc80}, {&(0x7f0000010700)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e00000010000003000000010000000200000018b2e346f95e497f827e0a", 0x77, 0x1400}, {0x0}, {&(0x7f0000010e00)="d73cd47a0000000000100000000000000b000000000000000d0000001000000012000000170000001600000015000000ffffffffffffffffffffffffffffffffffffffff03000600000000000000000000000000140000000100000000000000ffffffffffffffffffffffffffffffffffffffff05000000000000000000000000000000c5010000060000000100000007000000070000000a0000004000000040000000fc0f00"/181, 0xb5, 0x200000}, {&(0x7f0000010f00)="0000000000000000000000000000000000000000000000000000000009f7a5bb", 0x20, 0x200fe0}, {&(0x7f0000011000)="00000000000000000000000000000000000000000000000000000006", 0x1c, 0x2011e0}, {0x0, 0x0, 0x2012e0}, {&(0x7f0000011400)="000000000000000000000000000000000000000000160000000510ec", 0x1c, 0x201320}, {&(0x7f0000011500)="00000017000000020c60", 0xa, 0x201380}, {&(0x7f0000011600)}, {&(0x7f0000011b00)="0000000000000000000000000000000000000000000000000000000100000000d73cd47a0000000000100000000000000b000000000000000d0000001000000012000000170000001600000015000000ffffffffffffffffffffffffffffffffffffff", 0x63, 0x204fe0}, {&(0x7f0000011c00)="0000000000000000000000000000000000000000000000000000000009f7a5bb", 0x20, 0x205fe0}, {0x0, 0x0, 0x401320}], 0x0, &(0x7f0000014b00)) 13:23:01 executing program 2: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffff, 0xffffffffffffffff, 0x0) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) read(r0, 0x0, 0x0) syz_mount_image$f2fs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x10, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}, {&(0x7f0000010500)='\x00\x00\x00\x00', 0x4, 0xc80}, {&(0x7f0000010700)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e00000010000003000000010000000200000018b2e346f95e497f827e0a", 0x77, 0x1400}, {0x0}, {&(0x7f0000010e00)="d73cd47a0000000000100000000000000b000000000000000d0000001000000012000000170000001600000015000000ffffffffffffffffffffffffffffffffffffffff03000600000000000000000000000000140000000100000000000000ffffffffffffffffffffffffffffffffffffffff05000000000000000000000000000000c5010000060000000100000007000000070000000a0000004000000040000000fc0f00"/181, 0xb5, 0x200000}, {&(0x7f0000010f00)="0000000000000000000000000000000000000000000000000000000009f7a5bb", 0x20, 0x200fe0}, {&(0x7f0000011000)="00000000000000000000000000000000000000000000000000000006", 0x1c, 0x2011e0}, {0x0, 0x0, 0x2012e0}, {&(0x7f0000011400)="000000000000000000000000000000000000000000160000000510ec", 0x1c, 0x201320}, {&(0x7f0000011500)="00000017000000020c60", 0xa, 0x201380}, {&(0x7f0000011600)}, {&(0x7f0000011800)}, {0x0, 0x0, 0x204fe0}, {&(0x7f0000011c00)="0000000000000000000000000000000000000000000000000000000009f7a5bb", 0x20, 0x205fe0}, {0x0}, {&(0x7f0000013000)="000000000000000000000100000001", 0xf, 0xa00000}], 0x0, &(0x7f0000014b00)) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='pids.events\x00', 0x275a, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x4, 0x2d, 0x9, 0x1, 0x0, 0x7fff, 0x88, 0x4, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x7, 0x0, @perf_bp={&(0x7f00000000c0), 0x1}, 0x9, 0x1, 0x4, 0x9, 0x0, 0xffff, 0x400, 0x0, 0x2, 0x0, 0x1000}, 0x0, 0xe, r1, 0xa) [ 261.093036][T11839] EXT4-fs (loop4): inodes count not valid: 236576 vs 32 [ 261.126824][T11841] FAULT_INJECTION: forcing a failure. [ 261.126824][T11841] name failslab, interval 1, probability 0, space 0, times 0 [ 261.144388][T11841] CPU: 1 PID: 11841 Comm: syz-executor.5 Not tainted 5.4.125-syzkaller-00016-gae94e015273b #0 [ 261.154624][T11841] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 261.159286][T11856] F2FS-fs (loop2): invalid crc_offset: 0 [ 261.164659][T11841] Call Trace: [ 261.164678][T11841] dump_stack+0x1d8/0x24e [ 261.164689][T11841] ? devkmsg_release+0x11c/0x11c [ 261.164698][T11841] ? show_regs_print_info+0x12/0x12 [ 261.164718][T11841] should_fail+0x6f6/0x860 [ 261.176247][T11858] F2FS-fs (loop0): invalid crc_offset: 0 [ 261.177979][T11841] ? setup_fault_attr+0x3d0/0x3d0 [ 261.177991][T11841] ? add_system_zone+0x128/0x4f0 [ 261.178006][T11841] should_failslab+0x5/0x20 [ 261.183134][T11858] F2FS-fs (loop0): invalid crc_offset: 0 [ 261.188121][T11841] kmem_cache_alloc+0x36/0x290 [ 261.188133][T11841] add_system_zone+0x128/0x4f0 [ 261.188143][T11841] ? ext4_get_group_desc+0x253/0x2a0 [ 261.188153][T11841] ext4_setup_system_zone+0x2dc/0xec0 [ 261.188168][T11841] ? ext4_commit_super+0x8a4/0xa40 [ 261.199968][T11858] F2FS-fs (loop0): Failed to get valid F2FS checkpoint [ 261.203146][T11841] ? ext4_exit_system_zone+0x20/0x20 [ 261.203155][T11841] ? __cleancache_init_fs+0x66/0xb0 [ 261.203167][T11841] ? ext4_setup_super+0x597/0x950 [ 261.214954][T11856] F2FS-fs (loop2): invalid crc_offset: 0 [ 261.218162][T11841] ext4_fill_super+0xbd8c/0xeb30 [ 261.218184][T11841] ? ext4_mount+0x40/0x40 [ 261.232260][T11856] F2FS-fs (loop2): Failed to get valid F2FS checkpoint [ 261.232924][T11841] ? idr_replace+0x1c4/0x230 [ 261.232934][T11841] ? snprintf+0xd6/0x120 [ 261.232943][T11841] ? vscnprintf+0x80/0x80 [ 261.232961][T11841] ? set_blocksize+0x1a5/0x3a0 [ 261.305163][T11841] mount_bdev+0x22d/0x340 [ 261.309464][T11841] ? ext4_mount+0x40/0x40 [ 261.313767][T11841] legacy_get_tree+0xde/0x170 [ 261.318415][T11841] ? ext4_lazyinit_thread+0xd40/0xd40 [ 261.323844][T11841] vfs_get_tree+0x83/0x260 [ 261.328231][T11841] do_mount+0x19d0/0x2670 [ 261.332534][T11841] ? copy_mount_string+0x30/0x30 [ 261.337441][T11841] ? retint_kernel+0x1b/0x1b [ 261.342005][T11841] ? copy_mount_options+0x1d8/0x300 [ 261.347173][T11841] ? copy_mount_options+0x273/0x300 [ 261.352343][T11841] ksys_mount+0xc2/0xf0 [ 261.356469][T11841] __x64_sys_mount+0xb1/0xc0 [ 261.361030][T11841] do_syscall_64+0xcb/0x1e0 [ 261.365507][T11841] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 261.371371][T11841] RIP: 0033:0x467b1a [ 261.375240][T11841] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 261.394816][T11841] RSP: 002b:00007f3059253fa8 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 261.403196][T11841] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 0000000000467b1a [ 261.411136][T11841] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007f3059254000 [ 261.419084][T11841] RBP: 00007f3059254040 R08: 00007f3059254040 R09: 0000000020000000 [ 261.427025][T11841] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000020000000 [ 261.434985][T11841] R13: 0000000020000100 R14: 00007f3059254000 R15: 0000000020012c00 13:23:01 executing program 4: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000002, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x31) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) waitid$P_PIDFD(0x3, r0, &(0x7f0000000500), 0x9, &(0x7f0000000580)) ptrace$cont(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='pids.events\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x12, r1, 0x0) ftruncate(r1, 0x1000673) ioctl$KDSKBENT(r1, 0x4b47, &(0x7f00000002c0)={0x2, 0x81, 0x5}) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x88400, 0x1a8) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0xd0265000) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) exit_group(0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x31, 0xffffffffffffffff, 0x0) time(&(0x7f0000000180)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14001500, 0x9, &(0x7f0000000300)=[{&(0x7f0000000080)="209d0300000100000c190000ce1900000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800)) [ 261.451734][T11841] EXT4-fs (loop5): failed to initialize system zone (-12) [ 261.467457][T11841] EXT4-fs (loop5): mount failed 13:23:01 executing program 5 (fault-call:0 fault-nth:96): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000660000000f000000000000000100000001000000004000000040000020000000daf4655fdaf4655f0100ffff53ef010001000000d9f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010100)}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000100000000000000000000000000000000000000000000003000000000000000", 0x40, 0x540}, {&(0x7f0000010300)="02000000030000000400000066000f000300040000000000000000000f007f5c", 0x20, 0x800}, {&(0x7f0000011500)="ed41000000080000d9f4655fdaf4655fdaf4655f000000000000040004", 0x1d, 0x2200}, {0x0}, {&(0x7f0000011900)="ed8100001a040000daf4655fdaf4655fdaf4655f000000000000010004000000000000000100000014000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000039c34d38000000000000000000000000000000000000000000000000200000007412ab417412ab417412ab41daf4655f7412ab410000000000000000", 0xa0, 0x3800}], 0x0, &(0x7f0000012c00)) [ 261.519049][T11877] EXT4-fs (loop4): inodes count not valid: 236832 vs 32 [ 261.559036][T11882] FAULT_INJECTION: forcing a failure. [ 261.559036][T11882] name failslab, interval 1, probability 0, space 0, times 0 [ 261.572254][T11882] CPU: 0 PID: 11882 Comm: syz-executor.5 Not tainted 5.4.125-syzkaller-00016-gae94e015273b #0 [ 261.582481][T11882] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 261.592517][T11882] Call Trace: [ 261.595789][T11882] dump_stack+0x1d8/0x24e [ 261.600096][T11882] ? devkmsg_release+0x11c/0x11c [ 261.605019][T11882] ? show_regs_print_info+0x12/0x12 [ 261.610192][T11882] should_fail+0x6f6/0x860 [ 261.614584][T11882] ? setup_fault_attr+0x3d0/0x3d0 [ 261.619580][T11882] ? ext4_mb_init+0xe1/0x1330 [ 261.624232][T11882] should_failslab+0x5/0x20 [ 261.628709][T11882] __kmalloc+0x5f/0x2f0 [ 261.632837][T11882] ? ext4_mb_init+0x80/0x1330 [ 261.637492][T11882] ? ext4_commit_super+0x8a4/0xa40 [ 261.642576][T11882] ext4_mb_init+0xe1/0x1330 [ 261.647050][T11882] ? __cleancache_init_fs+0x66/0xb0 [ 261.652224][T11882] ext4_fill_super+0xbe97/0xeb30 [ 261.657228][T11882] ? ext4_mount+0x40/0x40 [ 261.661530][T11882] ? idr_replace+0x1c4/0x230 [ 261.666099][T11882] ? snprintf+0xd6/0x120 [ 261.670316][T11882] ? vscnprintf+0x80/0x80 [ 261.674621][T11882] ? set_blocksize+0x1a5/0x3a0 [ 261.679367][T11882] mount_bdev+0x22d/0x340 [ 261.683779][T11882] ? ext4_mount+0x40/0x40 [ 261.688102][T11882] legacy_get_tree+0xde/0x170 [ 261.692754][T11882] ? ext4_lazyinit_thread+0xd40/0xd40 [ 261.698098][T11882] vfs_get_tree+0x83/0x260 [ 261.702485][T11882] do_mount+0x19d0/0x2670 [ 261.706804][T11882] ? copy_mount_string+0x30/0x30 [ 261.711988][T11882] ? copy_mount_options+0x59/0x300 [ 261.717074][T11882] ? kmem_cache_alloc_trace+0x139/0x2b0 [ 261.722593][T11882] ? copy_mount_options+0x273/0x300 [ 261.727938][T11882] ksys_mount+0xc2/0xf0 [ 261.732070][T11882] __x64_sys_mount+0xb1/0xc0 [ 261.736640][T11882] do_syscall_64+0xcb/0x1e0 [ 261.741121][T11882] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 261.746989][T11882] RIP: 0033:0x467b1a [ 261.750862][T11882] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 261.770527][T11882] RSP: 002b:00007f3059253fa8 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 261.778914][T11882] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 0000000000467b1a [ 261.786858][T11882] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007f3059254000 [ 261.794806][T11882] RBP: 00007f3059254040 R08: 00007f3059254040 R09: 0000000020000000 [ 261.802753][T11882] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000020000000 [ 261.810701][T11882] R13: 0000000020000100 R14: 00007f3059254000 R15: 0000000020012c00 13:23:01 executing program 3: clone(0x13102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) poll(0x0, 0x0, 0x8000000000000200) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0xd9f, 0x0) ioctl$TUNSETLINK(r0, 0x40087602, 0x30a) 13:23:01 executing program 4: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000002, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x31) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) waitid$P_PIDFD(0x3, r0, &(0x7f0000000500), 0x9, &(0x7f0000000580)) ptrace$cont(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='pids.events\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x12, r1, 0x0) ftruncate(r1, 0x1000673) ioctl$KDSKBENT(r1, 0x4b47, &(0x7f00000002c0)={0x2, 0x81, 0x5}) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x88400, 0x1a8) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0xd0265000) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) exit_group(0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x31, 0xffffffffffffffff, 0x0) time(&(0x7f0000000180)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14001500, 0x9, &(0x7f0000000300)=[{&(0x7f0000000080)="20c70300000100000c190000ce1900000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800)) 13:23:01 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_mount_image$f2fs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0xe, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}, {&(0x7f0000010500)='\x00\x00\x00\x00', 0x4, 0xc80}, {&(0x7f0000010700)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e00000010000003000000010000000200000018b2e346f95e497f827e0a", 0x77, 0x1400}, {0x0}, {&(0x7f0000010e00)="d73cd47a0000000000100000000000000b000000000000000d0000001000000012000000170000001600000015000000ffffffffffffffffffffffffffffffffffffffff03000600000000000000000000000000140000000100000000000000ffffffffffffffffffffffffffffffffffffffff05000000000000000000000000000000c5010000060000000100000007000000070000000a0000004000000040000000fc0f00"/181, 0xb5, 0x200000}, {&(0x7f0000010f00)="0000000000000000000000000000000000000000000000000000000009f7a5bb", 0x20, 0x200fe0}, {&(0x7f0000011000)="00000000000000000000000000000000000000000000000000000006", 0x1c, 0x2011e0}, {0x0, 0x0, 0x2012e0}, {&(0x7f0000011400)="000000000000000000000000000000000000000000160000000510ec", 0x1c, 0x201320}, {&(0x7f0000011500)="00000017000000020c60", 0xa, 0x201380}, {&(0x7f0000011600)}, {&(0x7f0000011b00)="0000000000000000000000000000000000000000000000000000000100000000d73cd47a0000000000100000000000000b000000000000000d0000001000000012000000170000001600000015000000ffffffffffffffffffffffffffffffffffffff", 0x63, 0x204fe0}, {&(0x7f0000011c00)="0000000000000000000000000000000000000000000000000000000009f7a5bb", 0x20, 0x205fe0}, {0x0, 0x0, 0x401320}], 0x0, &(0x7f0000014b00)) 13:23:01 executing program 5 (fault-call:0 fault-nth:97): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000660000000f000000000000000100000001000000004000000040000020000000daf4655fdaf4655f0100ffff53ef010001000000d9f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010100)}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000100000000000000000000000000000000000000000000003000000000000000", 0x40, 0x540}, {&(0x7f0000010300)="02000000030000000400000066000f000300040000000000000000000f007f5c", 0x20, 0x800}, {&(0x7f0000011500)="ed41000000080000d9f4655fdaf4655fdaf4655f000000000000040004", 0x1d, 0x2200}, {0x0}, {&(0x7f0000011900)="ed8100001a040000daf4655fdaf4655fdaf4655f000000000000010004000000000000000100000014000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000039c34d38000000000000000000000000000000000000000000000000200000007412ab417412ab417412ab41daf4655f7412ab410000000000000000", 0xa0, 0x3800}], 0x0, &(0x7f0000012c00)) [ 261.819523][T11882] EXT4-fs (loop5): failed to initialize mballoc (-12) [ 261.826705][T11882] EXT4-fs (loop5): mount failed 13:23:01 executing program 1: clone(0x13102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) poll(0x0, 0x0, 0x8000000000000200) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x319180, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00'}) ioctl$TUNGETDEVNETNS(r0, 0x54e3, 0x0) ioctl$TUNSETLINK(r0, 0x400454cd, 0x30a) r2 = openat$selinux_attr(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) mmap(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x6, 0x1010, r2, 0xdc5f7000) close(r0) r3 = socket$inet_tcp(0x2, 0x1, 0x0) preadv(r3, 0x0, 0x0, 0x7fffffff, 0x1) 13:23:01 executing program 4: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000002, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x31) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) waitid$P_PIDFD(0x3, r0, &(0x7f0000000500), 0x9, &(0x7f0000000580)) ptrace$cont(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='pids.events\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x12, r1, 0x0) ftruncate(r1, 0x1000673) ioctl$KDSKBENT(r1, 0x4b47, &(0x7f00000002c0)={0x2, 0x81, 0x5}) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x88400, 0x1a8) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0xd0265000) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) exit_group(0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x31, 0xffffffffffffffff, 0x0) time(&(0x7f0000000180)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14001500, 0x9, &(0x7f0000000300)=[{&(0x7f0000000080)="20e40300000100000c190000ce1900000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800)) 13:23:01 executing program 2: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffff, 0xffffffffffffffff, 0x0) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) read(r0, 0x0, 0x0) syz_mount_image$f2fs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x10, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}, {&(0x7f0000010500)='\x00\x00\x00\x00', 0x4, 0xc80}, {&(0x7f0000010700)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e00000010000003000000010000000200000018b2e346f95e497f827e0a", 0x77, 0x1400}, {0x0}, {&(0x7f0000010e00)="d73cd47a0000000000100000000000000b000000000000000d0000001000000012000000170000001600000015000000ffffffffffffffffffffffffffffffffffffffff03000600000000000000000000000000140000000100000000000000ffffffffffffffffffffffffffffffffffffffff05000000000000000000000000000000c5010000060000000100000007000000070000000a0000004000000040000000fc0f00"/181, 0xb5, 0x200000}, {&(0x7f0000010f00)="0000000000000000000000000000000000000000000000000000000009f7a5bb", 0x20, 0x200fe0}, {&(0x7f0000011000)="00000000000000000000000000000000000000000000000000000006", 0x1c, 0x2011e0}, {0x0, 0x0, 0x2012e0}, {&(0x7f0000011400)="000000000000000000000000000000000000000000160000000510ec", 0x1c, 0x201320}, {&(0x7f0000011500)="00000017000000020c60", 0xa, 0x201380}, {&(0x7f0000011600)}, {&(0x7f0000011800)}, {0x0, 0x0, 0x204fe0}, {&(0x7f0000011c00)="0000000000000000000000000000000000000000000000000000000009f7a5bb", 0x20, 0x205fe0}, {0x0}, {&(0x7f0000013000)="000000000000000000000100000001", 0xf, 0xa00000}], 0x0, &(0x7f0000014b00)) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='pids.events\x00', 0x275a, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x4, 0x2d, 0x9, 0x1, 0x0, 0x7fff, 0x88, 0x4, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x7, 0x0, @perf_bp={&(0x7f00000000c0), 0x1}, 0x9, 0x1, 0x4, 0x9, 0x0, 0xffff, 0x400, 0x0, 0x2, 0x0, 0x1000}, 0x0, 0xe, r1, 0xa) [ 261.949414][T11904] F2FS-fs (loop0): invalid crc_offset: 0 [ 261.959125][T11914] F2FS-fs (loop2): invalid crc_offset: 0 [ 261.964255][T11904] F2FS-fs (loop0): invalid crc_offset: 0 [ 261.967307][T11914] F2FS-fs (loop2): invalid crc_offset: 0 [ 261.977479][T11903] FAULT_INJECTION: forcing a failure. [ 261.977479][T11903] name failslab, interval 1, probability 0, space 0, times 0 [ 261.988976][T11904] F2FS-fs (loop0): Failed to get valid F2FS checkpoint [ 261.990735][T11914] F2FS-fs (loop2): Failed to get valid F2FS checkpoint [ 262.004235][T11903] CPU: 0 PID: 11903 Comm: syz-executor.5 Not tainted 5.4.125-syzkaller-00016-gae94e015273b #0 [ 262.014551][T11903] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 262.024580][T11903] Call Trace: [ 262.027864][T11903] dump_stack+0x1d8/0x24e [ 262.032188][T11903] ? devkmsg_release+0x11c/0x11c [ 262.037117][T11903] ? show_regs_print_info+0x12/0x12 [ 262.042308][T11903] should_fail+0x6f6/0x860 [ 262.046727][T11903] ? setup_fault_attr+0x3d0/0x3d0 [ 262.051156][T11919] EXT4-fs (loop4): inodes count not valid: 255008 vs 32 [ 262.051741][T11903] ? ext4_mb_init+0xe1/0x1330 [ 262.063388][T11903] should_failslab+0x5/0x20 [ 262.067975][T11903] __kmalloc+0x5f/0x2f0 [ 262.072106][T11903] ? ext4_mb_init+0x80/0x1330 [ 262.076757][T11903] ? ext4_commit_super+0x8a4/0xa40 [ 262.081839][T11903] ext4_mb_init+0xe1/0x1330 [ 262.086368][T11903] ? __cleancache_init_fs+0x66/0xb0 [ 262.091541][T11903] ext4_fill_super+0xbe97/0xeb30 [ 262.096456][T11903] ? ext4_mount+0x40/0x40 [ 262.100842][T11903] ? idr_replace+0x1c4/0x230 [ 262.105402][T11903] ? snprintf+0xd6/0x120 [ 262.109615][T11903] ? vscnprintf+0x80/0x80 [ 262.113915][T11903] ? set_blocksize+0x1a5/0x3a0 [ 262.118702][T11903] mount_bdev+0x22d/0x340 [ 262.123042][T11903] ? ext4_mount+0x40/0x40 [ 262.127340][T11903] legacy_get_tree+0xde/0x170 [ 262.131988][T11903] ? ext4_lazyinit_thread+0xd40/0xd40 [ 262.137327][T11903] vfs_get_tree+0x83/0x260 [ 262.141751][T11903] do_mount+0x19d0/0x2670 [ 262.146050][T11903] ? copy_mount_string+0x30/0x30 [ 262.150953][T11903] ? copy_mount_options+0x59/0x300 [ 262.156030][T11903] ? copy_mount_options+0x59/0x300 [ 262.161111][T11903] ? kmem_cache_alloc_trace+0x139/0x2b0 [ 262.166638][T11903] ? copy_mount_options+0x273/0x300 [ 262.171806][T11903] ksys_mount+0xc2/0xf0 [ 262.175945][T11903] __x64_sys_mount+0xb1/0xc0 [ 262.180510][T11903] do_syscall_64+0xcb/0x1e0 [ 262.184985][T11903] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 262.190847][T11903] RIP: 0033:0x467b1a [ 262.194717][T11903] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 262.214289][T11903] RSP: 002b:00007f3059253fa8 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 262.222669][T11903] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 0000000000467b1a [ 262.230610][T11903] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007f3059254000 [ 262.238548][T11903] RBP: 00007f3059254040 R08: 00007f3059254040 R09: 0000000020000000 13:23:02 executing program 4: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000002, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x31) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) waitid$P_PIDFD(0x3, r0, &(0x7f0000000500), 0x9, &(0x7f0000000580)) ptrace$cont(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='pids.events\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x12, r1, 0x0) ftruncate(r1, 0x1000673) ioctl$KDSKBENT(r1, 0x4b47, &(0x7f00000002c0)={0x2, 0x81, 0x5}) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x88400, 0x1a8) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0xd0265000) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) exit_group(0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x31, 0xffffffffffffffff, 0x0) time(&(0x7f0000000180)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14001500, 0x9, &(0x7f0000000300)=[{&(0x7f0000000080)="20e50300000100000c190000ce1900000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800)) [ 262.246491][T11903] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000020000000 [ 262.254520][T11903] R13: 0000000020000100 R14: 00007f3059254000 R15: 0000000020012c00 [ 262.263751][T11903] EXT4-fs (loop5): failed to initialize mballoc (-12) [ 262.270647][T11903] EXT4-fs (loop5): mount failed 13:23:02 executing program 5 (fault-call:0 fault-nth:98): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000660000000f000000000000000100000001000000004000000040000020000000daf4655fdaf4655f0100ffff53ef010001000000d9f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010100)}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000100000000000000000000000000000000000000000000003000000000000000", 0x40, 0x540}, {&(0x7f0000010300)="02000000030000000400000066000f000300040000000000000000000f007f5c", 0x20, 0x800}, {&(0x7f0000011500)="ed41000000080000d9f4655fdaf4655fdaf4655f000000000000040004", 0x1d, 0x2200}, {0x0}, {&(0x7f0000011900)="ed8100001a040000daf4655fdaf4655fdaf4655f000000000000010004000000000000000100000014000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000039c34d38000000000000000000000000000000000000000000000000200000007412ab417412ab417412ab41daf4655f7412ab410000000000000000", 0xa0, 0x3800}], 0x0, &(0x7f0000012c00)) 13:23:02 executing program 4: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000002, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x31) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) waitid$P_PIDFD(0x3, r0, &(0x7f0000000500), 0x9, &(0x7f0000000580)) ptrace$cont(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='pids.events\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x12, r1, 0x0) ftruncate(r1, 0x1000673) ioctl$KDSKBENT(r1, 0x4b47, &(0x7f00000002c0)={0x2, 0x81, 0x5}) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x88400, 0x1a8) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0xd0265000) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) exit_group(0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x31, 0xffffffffffffffff, 0x0) time(&(0x7f0000000180)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14001500, 0x9, &(0x7f0000000300)=[{&(0x7f0000000080)="20f40300000100000c190000ce1900000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800)) [ 262.346629][T11932] FAULT_INJECTION: forcing a failure. [ 262.346629][T11932] name failslab, interval 1, probability 0, space 0, times 0 [ 262.359364][T11932] CPU: 1 PID: 11932 Comm: syz-executor.5 Not tainted 5.4.125-syzkaller-00016-gae94e015273b #0 [ 262.369584][T11932] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 262.379613][T11932] Call Trace: [ 262.382884][T11932] dump_stack+0x1d8/0x24e [ 262.387187][T11932] ? devkmsg_release+0x11c/0x11c [ 262.392095][T11932] ? show_regs_print_info+0x12/0x12 [ 262.397371][T11932] should_fail+0x6f6/0x860 [ 262.401762][T11932] ? setup_fault_attr+0x3d0/0x3d0 [ 262.406759][T11932] ? ext4_mb_init+0xe1/0x1330 [ 262.411405][T11932] should_failslab+0x5/0x20 [ 262.415879][T11932] __kmalloc+0x5f/0x2f0 [ 262.420007][T11932] ? ext4_mb_init+0x80/0x1330 [ 262.424656][T11932] ext4_mb_init+0xe1/0x1330 [ 262.429135][T11932] ? __cleancache_init_fs+0x66/0xb0 [ 262.434309][T11932] ext4_fill_super+0xbe97/0xeb30 [ 262.439228][T11932] ? ext4_mount+0x40/0x40 [ 262.443528][T11932] ? idr_replace+0x1c4/0x230 [ 262.448088][T11932] ? snprintf+0xd6/0x120 [ 262.452303][T11932] ? vscnprintf+0x80/0x80 [ 262.456609][T11932] ? set_blocksize+0x1a5/0x3a0 [ 262.461347][T11932] mount_bdev+0x22d/0x340 [ 262.465649][T11932] ? ext4_mount+0x40/0x40 [ 262.469949][T11932] legacy_get_tree+0xde/0x170 [ 262.474600][T11932] ? ext4_lazyinit_thread+0xd40/0xd40 [ 262.480044][T11932] vfs_get_tree+0x83/0x260 [ 262.484450][T11932] do_mount+0x19d0/0x2670 [ 262.488754][T11932] ? copy_mount_string+0x30/0x30 [ 262.493661][T11932] ? copy_mount_options+0x59/0x300 [ 262.498741][T11932] ? copy_mount_options+0x59/0x300 [ 262.503822][T11932] ? kmem_cache_alloc_trace+0x139/0x2b0 [ 262.509338][T11932] ? copy_mount_options+0x273/0x300 [ 262.514510][T11932] ksys_mount+0xc2/0xf0 [ 262.518635][T11932] __x64_sys_mount+0xb1/0xc0 [ 262.523201][T11932] do_syscall_64+0xcb/0x1e0 [ 262.527676][T11932] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 262.533550][T11932] RIP: 0033:0x467b1a [ 262.537419][T11932] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 262.556992][T11932] RSP: 002b:00007f3059253fa8 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 262.565369][T11932] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 0000000000467b1a [ 262.573311][T11932] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007f3059254000 [ 262.581256][T11932] RBP: 00007f3059254040 R08: 00007f3059254040 R09: 0000000020000000 [ 262.589196][T11932] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000020000000 13:23:02 executing program 3: clone(0x13102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) poll(0x0, 0x0, 0x8000000000000200) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0xd9f, 0x0) ioctl$TUNSETLINK(r0, 0x40087602, 0x30a) 13:23:02 executing program 2: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffff, 0xffffffffffffffff, 0x0) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) read(r0, 0x0, 0x0) syz_mount_image$f2fs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x10, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}, {&(0x7f0000010500)='\x00\x00\x00\x00', 0x4, 0xc80}, {&(0x7f0000010700)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e00000010000003000000010000000200000018b2e346f95e497f827e0a", 0x77, 0x1400}, {0x0}, {&(0x7f0000010e00)="d73cd47a0000000000100000000000000b000000000000000d0000001000000012000000170000001600000015000000ffffffffffffffffffffffffffffffffffffffff03000600000000000000000000000000140000000100000000000000ffffffffffffffffffffffffffffffffffffffff05000000000000000000000000000000c5010000060000000100000007000000070000000a0000004000000040000000fc0f00"/181, 0xb5, 0x200000}, {&(0x7f0000010f00)="0000000000000000000000000000000000000000000000000000000009f7a5bb", 0x20, 0x200fe0}, {&(0x7f0000011000)="00000000000000000000000000000000000000000000000000000006", 0x1c, 0x2011e0}, {0x0, 0x0, 0x2012e0}, {&(0x7f0000011400)="000000000000000000000000000000000000000000160000000510ec", 0x1c, 0x201320}, {&(0x7f0000011500)="00000017000000020c60", 0xa, 0x201380}, {&(0x7f0000011600)}, {&(0x7f0000011800)}, {&(0x7f0000011b00), 0x0, 0x204fe0}, {&(0x7f0000011c00)="0000000000000000000000000000000000000000000000000000000009f7a5bb", 0x20, 0x205fe0}, {0x0}, {&(0x7f0000013000)="000000000000000000000100000001", 0xf, 0xa00000}], 0x0, &(0x7f0000014b00)) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='pids.events\x00', 0x275a, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x4, 0x2d, 0x9, 0x1, 0x0, 0x7fff, 0x88, 0x4, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x7, 0x0, @perf_bp={&(0x7f00000000c0), 0x1}, 0x9, 0x1, 0x4, 0x9, 0x0, 0xffff, 0x400, 0x0, 0x2, 0x0, 0x1000}, 0x0, 0xe, r1, 0xa) 13:23:02 executing program 1: clone(0x13102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket(0x0, 0x0, 0x0) poll(0x0, 0x0, 0x8000000000000200) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f00000025c0)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00'}) tkill(0xffffffffffffffff, 0x30) ioctl$TUNSETLINK(r1, 0x400454cd, 0x30a) r3 = openat$selinux_attr(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) mmap(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x6, 0x1010, r3, 0xdc5f7000) close(r1) r4 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$BLKROGET(r2, 0x125e, &(0x7f0000000040)) getsockopt$inet_tcp_int(r0, 0x6, 0x12, &(0x7f0000000100), &(0x7f0000000140)=0x4) preadv(r4, 0x0, 0x0, 0x7fffffff, 0x1) [ 262.597138][T11932] R13: 0000000020000100 R14: 00007f3059254000 R15: 0000000020012c00 [ 262.621524][T11932] EXT4-fs (loop5): failed to initialize mballoc (-12) [ 262.631936][T11932] EXT4-fs (loop5): mount failed [ 262.639677][T11937] EXT4-fs (loop4): inodes count not valid: 259104 vs 32 13:23:02 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_mount_image$f2fs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0xe, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}, {&(0x7f0000010500)='\x00\x00\x00\x00', 0x4, 0xc80}, {&(0x7f0000010700)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e00000010000003000000010000000200000018b2e346f95e497f827e0a", 0x77, 0x1400}, {0x0}, {&(0x7f0000010e00)="d73cd47a0000000000100000000000000b000000000000000d0000001000000012000000170000001600000015000000ffffffffffffffffffffffffffffffffffffffff03000600000000000000000000000000140000000100000000000000ffffffffffffffffffffffffffffffffffffffff05000000000000000000000000000000c5010000060000000100000007000000070000000a0000004000000040000000fc0f00"/181, 0xb5, 0x200000}, {&(0x7f0000010f00)="0000000000000000000000000000000000000000000000000000000009f7a5bb", 0x20, 0x200fe0}, {&(0x7f0000011000)="00000000000000000000000000000000000000000000000000000006", 0x1c, 0x2011e0}, {0x0, 0x0, 0x2012e0}, {&(0x7f0000011400)="000000000000000000000000000000000000000000160000000510ec", 0x1c, 0x201320}, {&(0x7f0000011500)="00000017000000020c60", 0xa, 0x201380}, {&(0x7f0000011600)}, {&(0x7f0000011b00)="0000000000000000000000000000000000000000000000000000000100000000d73cd47a0000000000100000000000000b000000000000000d0000001000000012000000170000001600000015000000ffffffffffffffffffffffffffffffffffffff", 0x63, 0x204fe0}, {&(0x7f0000011c00)="0000000000000000000000000000000000000000000000000000000009f7a5bb", 0x20, 0x205fe0}, {0x0, 0x0, 0x401320}], 0x0, &(0x7f0000014b00)) 13:23:02 executing program 5 (fault-call:0 fault-nth:99): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000660000000f000000000000000100000001000000004000000040000020000000daf4655fdaf4655f0100ffff53ef010001000000d9f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010100)}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000100000000000000000000000000000000000000000000003000000000000000", 0x40, 0x540}, {&(0x7f0000010300)="02000000030000000400000066000f000300040000000000000000000f007f5c", 0x20, 0x800}, {&(0x7f0000011500)="ed41000000080000d9f4655fdaf4655fdaf4655f000000000000040004", 0x1d, 0x2200}, {0x0}, {&(0x7f0000011900)="ed8100001a040000daf4655fdaf4655fdaf4655f000000000000010004000000000000000100000014000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000039c34d38000000000000000000000000000000000000000000000000200000007412ab417412ab417412ab41daf4655f7412ab410000000000000000", 0xa0, 0x3800}], 0x0, &(0x7f0000012c00)) 13:23:02 executing program 4: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000002, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x31) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) waitid$P_PIDFD(0x3, r0, &(0x7f0000000500), 0x9, &(0x7f0000000580)) ptrace$cont(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='pids.events\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x12, r1, 0x0) ftruncate(r1, 0x1000673) ioctl$KDSKBENT(r1, 0x4b47, &(0x7f00000002c0)={0x2, 0x81, 0x5}) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x88400, 0x1a8) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0xd0265000) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) exit_group(0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x31, 0xffffffffffffffff, 0x0) time(&(0x7f0000000180)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14001500, 0x9, &(0x7f0000000300)=[{&(0x7f0000000080)="20020400000100000c190000ce1900000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800)) [ 262.790162][T11954] F2FS-fs (loop2): invalid crc_offset: 0 [ 262.796202][T11954] F2FS-fs (loop2): invalid crc_offset: 0 [ 262.808907][T11954] F2FS-fs (loop2): Failed to get valid F2FS checkpoint [ 262.831594][T11961] F2FS-fs (loop0): invalid crc_offset: 0 [ 262.839259][T11961] F2FS-fs (loop0): invalid crc_offset: 0 [ 262.845413][T11963] FAULT_INJECTION: forcing a failure. [ 262.845413][T11963] name failslab, interval 1, probability 0, space 0, times 0 [ 262.846332][T11961] F2FS-fs (loop0): Failed to get valid F2FS checkpoint [ 262.877019][T11970] EXT4-fs (loop4): inodes count not valid: 262688 vs 32 [ 262.884561][T11963] CPU: 0 PID: 11963 Comm: syz-executor.5 Not tainted 5.4.125-syzkaller-00016-gae94e015273b #0 [ 262.894784][T11963] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 262.904909][T11963] Call Trace: [ 262.908221][T11963] dump_stack+0x1d8/0x24e [ 262.912656][T11963] ? devkmsg_release+0x11c/0x11c [ 262.917580][T11963] ? show_regs_print_info+0x12/0x12 [ 262.922788][T11963] should_fail+0x6f6/0x860 [ 262.927186][T11963] ? setup_fault_attr+0x3d0/0x3d0 [ 262.932239][T11963] ? kvmalloc_node+0x7e/0xf0 [ 262.936897][T11963] should_failslab+0x5/0x20 [ 262.941374][T11963] __kmalloc+0x5f/0x2f0 [ 262.945500][T11963] kvmalloc_node+0x7e/0xf0 [ 262.949889][T11963] ext4_mb_alloc_groupinfo+0xf4/0x2d0 [ 262.955248][T11963] ext4_mb_init+0xb4e/0x1330 [ 262.959826][T11963] ext4_fill_super+0xbe97/0xeb30 [ 262.964747][T11963] ? ext4_mount+0x40/0x40 [ 262.969129][T11963] ? idr_replace+0x1c4/0x230 [ 262.973697][T11963] ? snprintf+0xd6/0x120 [ 262.977912][T11963] ? vscnprintf+0x80/0x80 [ 262.982309][T11963] ? set_blocksize+0x1a5/0x3a0 [ 262.987046][T11963] mount_bdev+0x22d/0x340 [ 262.991342][T11963] ? ext4_mount+0x40/0x40 [ 262.995641][T11963] legacy_get_tree+0xde/0x170 [ 263.000287][T11963] ? ext4_lazyinit_thread+0xd40/0xd40 [ 263.005625][T11963] vfs_get_tree+0x83/0x260 [ 263.010009][T11963] do_mount+0x19d0/0x2670 [ 263.014308][T11963] ? copy_mount_string+0x30/0x30 [ 263.019209][T11963] ? copy_mount_options+0x59/0x300 [ 263.024287][T11963] ? copy_mount_options+0x59/0x300 [ 263.029470][T11963] ? kmem_cache_alloc_trace+0x139/0x2b0 [ 263.034991][T11963] ? copy_mount_options+0x273/0x300 [ 263.040165][T11963] ksys_mount+0xc2/0xf0 [ 263.044301][T11963] __x64_sys_mount+0xb1/0xc0 [ 263.048933][T11963] do_syscall_64+0xcb/0x1e0 [ 263.053507][T11963] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 263.059385][T11963] RIP: 0033:0x467b1a [ 263.063257][T11963] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 263.082863][T11963] RSP: 002b:00007f3059253fa8 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 263.091258][T11963] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 0000000000467b1a [ 263.099198][T11963] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007f3059254000 [ 263.107138][T11963] RBP: 00007f3059254040 R08: 00007f3059254040 R09: 0000000020000000 [ 263.115078][T11963] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000020000000 [ 263.123018][T11963] R13: 0000000020000100 R14: 00007f3059254000 R15: 0000000020012c00 [ 263.132379][T11963] EXT4-fs (loop5): can't allocate buddy meta group 13:23:03 executing program 3: clone(0x13102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) poll(0x0, 0x0, 0x8000000000000200) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0xd9f, 0x0) ioctl$TUNSETLINK(r0, 0x40087602, 0x30a) 13:23:03 executing program 2: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffff, 0xffffffffffffffff, 0x0) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) read(r0, 0x0, 0x0) syz_mount_image$f2fs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x10, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}, {&(0x7f0000010500)='\x00\x00\x00\x00', 0x4, 0xc80}, {&(0x7f0000010700)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e00000010000003000000010000000200000018b2e346f95e497f827e0a", 0x77, 0x1400}, {0x0}, {&(0x7f0000010e00)="d73cd47a0000000000100000000000000b000000000000000d0000001000000012000000170000001600000015000000ffffffffffffffffffffffffffffffffffffffff03000600000000000000000000000000140000000100000000000000ffffffffffffffffffffffffffffffffffffffff05000000000000000000000000000000c5010000060000000100000007000000070000000a0000004000000040000000fc0f00"/181, 0xb5, 0x200000}, {&(0x7f0000010f00)="0000000000000000000000000000000000000000000000000000000009f7a5bb", 0x20, 0x200fe0}, {&(0x7f0000011000)="00000000000000000000000000000000000000000000000000000006", 0x1c, 0x2011e0}, {0x0, 0x0, 0x2012e0}, {&(0x7f0000011400)="000000000000000000000000000000000000000000160000000510ec", 0x1c, 0x201320}, {&(0x7f0000011500)="00000017000000020c60", 0xa, 0x201380}, {&(0x7f0000011600)}, {&(0x7f0000011800)}, {&(0x7f0000011b00), 0x0, 0x204fe0}, {&(0x7f0000011c00)="0000000000000000000000000000000000000000000000000000000009f7a5bb", 0x20, 0x205fe0}, {0x0}, {&(0x7f0000013000)="000000000000000000000100000001", 0xf, 0xa00000}], 0x0, &(0x7f0000014b00)) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='pids.events\x00', 0x275a, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x4, 0x2d, 0x9, 0x1, 0x0, 0x7fff, 0x88, 0x4, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x7, 0x0, @perf_bp={&(0x7f00000000c0), 0x1}, 0x9, 0x1, 0x4, 0x9, 0x0, 0xffff, 0x400, 0x0, 0x2, 0x0, 0x1000}, 0x0, 0xe, r1, 0xa) 13:23:03 executing program 4: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000002, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x31) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) waitid$P_PIDFD(0x3, r0, &(0x7f0000000500), 0x9, &(0x7f0000000580)) ptrace$cont(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='pids.events\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x12, r1, 0x0) ftruncate(r1, 0x1000673) ioctl$KDSKBENT(r1, 0x4b47, &(0x7f00000002c0)={0x2, 0x81, 0x5}) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x88400, 0x1a8) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0xd0265000) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) exit_group(0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x31, 0xffffffffffffffff, 0x0) time(&(0x7f0000000180)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14001500, 0x9, &(0x7f0000000300)=[{&(0x7f0000000080)="20060400000100000c190000ce1900000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800)) [ 263.139149][T11963] EXT4-fs (loop5): failed to initialize mballoc (-12) [ 263.146103][T11963] EXT4-fs (loop5): mount failed 13:23:03 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_mount_image$f2fs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0xe, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}, {&(0x7f0000010500)='\x00\x00\x00\x00', 0x4, 0xc80}, {&(0x7f0000010700)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e00000010000003000000010000000200000018b2e346f95e497f827e0a", 0x77, 0x1400}, {0x0}, {&(0x7f0000010e00)="d73cd47a0000000000100000000000000b000000000000000d0000001000000012000000170000001600000015000000ffffffffffffffffffffffffffffffffffffffff03000600000000000000000000000000140000000100000000000000ffffffffffffffffffffffffffffffffffffffff05000000000000000000000000000000c5010000060000000100000007000000070000000a0000004000000040000000fc0f00"/181, 0xb5, 0x200000}, {&(0x7f0000010f00)="0000000000000000000000000000000000000000000000000000000009f7a5bb", 0x20, 0x200fe0}, {&(0x7f0000011000)="00000000000000000000000000000000000000000000000000000006", 0x1c, 0x2011e0}, {0x0, 0x0, 0x2012e0}, {&(0x7f0000011400)="000000000000000000000000000000000000000000160000000510ec", 0x1c, 0x201320}, {&(0x7f0000011500)="00000017000000020c60", 0xa, 0x201380}, {&(0x7f0000011600)}, {&(0x7f0000011b00)="0000000000000000000000000000000000000000000000000000000100000000d73cd47a0000000000100000000000000b000000000000000d0000001000000012000000170000001600000015000000ffffffffffffffffffffffffffffffffffffffff03000600000000000000000000000000140000000100000000000000ffffffffffffffffffffffffffffffffffffffff05", 0x95, 0x204fe0}, {&(0x7f0000011c00)="0000000000000000000000000000000000000000000000000000000009f7a5bb", 0x20, 0x205fe0}, {0x0, 0x0, 0x401320}], 0x0, &(0x7f0000014b00)) 13:23:03 executing program 1: clone(0x13102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) poll(0x0, 0x0, 0x8000000000000200) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f00000025c0)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00'}) ioctl$TUNSETLINK(r0, 0x400454cd, 0x30a) openat$selinux_attr(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) r2 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000040), 0x921400, 0x0) mmap(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x6, 0x2010, r2, 0xdc5fb000) close(r0) r3 = socket$inet_tcp(0x2, 0x1, 0x0) preadv(r3, 0x0, 0x0, 0x7fffffff, 0x1) 13:23:03 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000660000000f000000000000000100000001000000004000000040000020000000daf4655fdaf4655f0100ffff53ef010001000000d9f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010100)}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000100000000000000000000000000000000000000000000003000000000000000", 0x40, 0x540}, {&(0x7f0000010300)="02000000030000000400000066000f000300040000000000000000000f007f5c", 0x20, 0x800}, {&(0x7f0000011500)="ed41000000080000d9f4655fdaf4655fdaf4655f000000000000040004", 0x1d, 0x2200}, {0x0}, {&(0x7f0000011900)="ed8100001a040000daf4655fdaf4655fdaf4655f000000000000010004000000000000000100000014000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000039c34d38000000000000000000000000000000000000000000000000200000007412ab417412ab417412ab41daf4655f7412ab410000000000000000", 0xa0, 0x3800}], 0x0, &(0x7f0000012c00)) [ 263.308997][T11989] EXT4-fs (loop4): inodes count not valid: 263712 vs 32 [ 263.316905][T11978] F2FS-fs (loop2): invalid crc_offset: 0 [ 263.326938][T11978] F2FS-fs (loop2): invalid crc_offset: 0 [ 263.333063][T11978] F2FS-fs (loop2): Failed to get valid F2FS checkpoint 13:23:03 executing program 4: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000002, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x31) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) waitid$P_PIDFD(0x3, r0, &(0x7f0000000500), 0x9, &(0x7f0000000580)) ptrace$cont(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='pids.events\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x12, r1, 0x0) ftruncate(r1, 0x1000673) ioctl$KDSKBENT(r1, 0x4b47, &(0x7f00000002c0)={0x2, 0x81, 0x5}) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x88400, 0x1a8) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0xd0265000) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) exit_group(0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x31, 0xffffffffffffffff, 0x0) time(&(0x7f0000000180)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14001500, 0x9, &(0x7f0000000300)=[{&(0x7f0000000080)="20100400000100000c190000ce1900000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800)) [ 263.375530][T11992] F2FS-fs (loop0): invalid crc_offset: 0 [ 263.382581][T11992] F2FS-fs (loop0): invalid crc_offset: 0 [ 263.391880][T11992] F2FS-fs (loop0): Failed to get valid F2FS checkpoint [ 263.405313][T12003] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue 13:23:03 executing program 2: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffff, 0xffffffffffffffff, 0x0) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) read(r0, 0x0, 0x0) syz_mount_image$f2fs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x10, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}, {&(0x7f0000010500)='\x00\x00\x00\x00', 0x4, 0xc80}, {&(0x7f0000010700)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e00000010000003000000010000000200000018b2e346f95e497f827e0a", 0x77, 0x1400}, {0x0}, {&(0x7f0000010e00)="d73cd47a0000000000100000000000000b000000000000000d0000001000000012000000170000001600000015000000ffffffffffffffffffffffffffffffffffffffff03000600000000000000000000000000140000000100000000000000ffffffffffffffffffffffffffffffffffffffff05000000000000000000000000000000c5010000060000000100000007000000070000000a0000004000000040000000fc0f00"/181, 0xb5, 0x200000}, {&(0x7f0000010f00)="0000000000000000000000000000000000000000000000000000000009f7a5bb", 0x20, 0x200fe0}, {&(0x7f0000011000)="00000000000000000000000000000000000000000000000000000006", 0x1c, 0x2011e0}, {0x0, 0x0, 0x2012e0}, {&(0x7f0000011400)="000000000000000000000000000000000000000000160000000510ec", 0x1c, 0x201320}, {&(0x7f0000011500)="00000017000000020c60", 0xa, 0x201380}, {&(0x7f0000011600)}, {&(0x7f0000011800)}, {&(0x7f0000011b00), 0x0, 0x204fe0}, {&(0x7f0000011c00)="0000000000000000000000000000000000000000000000000000000009f7a5bb", 0x20, 0x205fe0}, {0x0}, {&(0x7f0000013000)="000000000000000000000100000001", 0xf, 0xa00000}], 0x0, &(0x7f0000014b00)) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='pids.events\x00', 0x275a, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x4, 0x2d, 0x9, 0x1, 0x0, 0x7fff, 0x88, 0x4, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x7, 0x0, @perf_bp={&(0x7f00000000c0), 0x1}, 0x9, 0x1, 0x4, 0x9, 0x0, 0xffff, 0x400, 0x0, 0x2, 0x0, 0x1000}, 0x0, 0xe, r1, 0xa) 13:23:03 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xd144, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000660000000f000000000000000100000001000000004000000040000020000000daf4655fdaf4655f0100ffff53ef010001000000d9f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010100)}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000100000000000000000000000000000000000000000000003000000000000000", 0x40, 0x540}, {&(0x7f0000010300)="02000000030000000400000066000f000300040000000000000000000f007f5c", 0x20, 0x800}, {&(0x7f0000011500)="ed41000000080000d9f4655fdaf4655fdaf4655f000000000000040004", 0x1d, 0x2200}, {0x0}, {&(0x7f0000011900)="ed8100001a040000daf4655fdaf4655fdaf4655f000000000000010004000000000000000100000014000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000039c34d38000000000000000000000000000000000000000000000000200000007412ab417412ab417412ab41daf4655f7412ab410000000000000000", 0xa0, 0x3800}], 0x0, &(0x7f0000012c00)) 13:23:03 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_mount_image$f2fs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0xe, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}, {&(0x7f0000010500)='\x00\x00\x00\x00', 0x4, 0xc80}, {&(0x7f0000010700)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e00000010000003000000010000000200000018b2e346f95e497f827e0a", 0x77, 0x1400}, {0x0}, {&(0x7f0000010e00)="d73cd47a0000000000100000000000000b000000000000000d0000001000000012000000170000001600000015000000ffffffffffffffffffffffffffffffffffffffff03000600000000000000000000000000140000000100000000000000ffffffffffffffffffffffffffffffffffffffff05000000000000000000000000000000c5010000060000000100000007000000070000000a0000004000000040000000fc0f00"/181, 0xb5, 0x200000}, {&(0x7f0000010f00)="0000000000000000000000000000000000000000000000000000000009f7a5bb", 0x20, 0x200fe0}, {&(0x7f0000011000)="00000000000000000000000000000000000000000000000000000006", 0x1c, 0x2011e0}, {0x0, 0x0, 0x2012e0}, {&(0x7f0000011400)="000000000000000000000000000000000000000000160000000510ec", 0x1c, 0x201320}, {&(0x7f0000011500)="00000017000000020c60", 0xa, 0x201380}, {&(0x7f0000011600)}, {&(0x7f0000011b00)="0000000000000000000000000000000000000000000000000000000100000000d73cd47a0000000000100000000000000b000000000000000d0000001000000012000000170000001600000015000000ffffffffffffffffffffffffffffffffffffffff03000600000000000000000000000000140000000100000000000000ffffffffffffffffffffffffffffffffffffffff05", 0x95, 0x204fe0}, {&(0x7f0000011c00)="0000000000000000000000000000000000000000000000000000000009f7a5bb", 0x20, 0x205fe0}, {0x0, 0x0, 0x401320}], 0x0, &(0x7f0000014b00)) [ 263.466101][T12004] EXT4-fs (loop4): inodes count not valid: 266272 vs 32 13:23:03 executing program 4: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000002, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x31) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) waitid$P_PIDFD(0x3, r0, &(0x7f0000000500), 0x9, &(0x7f0000000580)) ptrace$cont(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='pids.events\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x12, r1, 0x0) ftruncate(r1, 0x1000673) ioctl$KDSKBENT(r1, 0x4b47, &(0x7f00000002c0)={0x2, 0x81, 0x5}) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x88400, 0x1a8) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0xd0265000) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) exit_group(0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x31, 0xffffffffffffffff, 0x0) time(&(0x7f0000000180)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14001500, 0x9, &(0x7f0000000300)=[{&(0x7f0000000080)="20000500000100000c190000ce1900000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800)) 13:23:03 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xd145, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000660000000f000000000000000100000001000000004000000040000020000000daf4655fdaf4655f0100ffff53ef010001000000d9f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010100)}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000100000000000000000000000000000000000000000000003000000000000000", 0x40, 0x540}, {&(0x7f0000010300)="02000000030000000400000066000f000300040000000000000000000f007f5c", 0x20, 0x800}, {&(0x7f0000011500)="ed41000000080000d9f4655fdaf4655fdaf4655f000000000000040004", 0x1d, 0x2200}, {0x0}, {&(0x7f0000011900)="ed8100001a040000daf4655fdaf4655fdaf4655f000000000000010004000000000000000100000014000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000039c34d38000000000000000000000000000000000000000000000000200000007412ab417412ab417412ab41daf4655f7412ab410000000000000000", 0xa0, 0x3800}], 0x0, &(0x7f0000012c00)) [ 263.572362][T12011] EXT4-fs (loop5): bad geometry: block count 128 exceeds size of device (26 blocks) [ 263.589064][T12019] F2FS-fs (loop0): invalid crc_offset: 0 [ 263.592740][T12014] F2FS-fs (loop2): invalid crc_offset: 0 [ 263.595706][T12019] F2FS-fs (loop0): invalid crc_offset: 0 [ 263.613813][T12014] F2FS-fs (loop2): invalid crc_offset: 0 [ 263.614969][T12019] F2FS-fs (loop0): Failed to get valid F2FS checkpoint [ 263.619743][T12014] F2FS-fs (loop2): Failed to get valid F2FS checkpoint [ 263.680352][T12024] EXT4-fs (loop4): inodes count not valid: 327712 vs 32 [ 263.690212][T12028] EXT4-fs (loop5): bad geometry: block count 128 exceeds size of device (26 blocks) 13:23:03 executing program 3: clone(0x13102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) poll(0x0, 0x0, 0x8000000000000200) r0 = openat(0xffffffffffffff9c, &(0x7f00000025c0)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) ioctl$TUNSETLINK(0xffffffffffffffff, 0x40087602, 0x30a) 13:23:03 executing program 4: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000002, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x31) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) waitid$P_PIDFD(0x3, r0, &(0x7f0000000500), 0x9, &(0x7f0000000580)) ptrace$cont(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='pids.events\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x12, r1, 0x0) ftruncate(r1, 0x1000673) ioctl$KDSKBENT(r1, 0x4b47, &(0x7f00000002c0)={0x2, 0x81, 0x5}) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x88400, 0x1a8) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0xd0265000) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) exit_group(0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x31, 0xffffffffffffffff, 0x0) time(&(0x7f0000000180)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14001500, 0x9, &(0x7f0000000300)=[{&(0x7f0000000080)="20000600000100000c190000ce1900000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800)) 13:23:03 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_mount_image$f2fs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0xe, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}, {&(0x7f0000010500)='\x00\x00\x00\x00', 0x4, 0xc80}, {&(0x7f0000010700)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e00000010000003000000010000000200000018b2e346f95e497f827e0a", 0x77, 0x1400}, {0x0}, {&(0x7f0000010e00)="d73cd47a0000000000100000000000000b000000000000000d0000001000000012000000170000001600000015000000ffffffffffffffffffffffffffffffffffffffff03000600000000000000000000000000140000000100000000000000ffffffffffffffffffffffffffffffffffffffff05000000000000000000000000000000c5010000060000000100000007000000070000000a0000004000000040000000fc0f00"/181, 0xb5, 0x200000}, {&(0x7f0000010f00)="0000000000000000000000000000000000000000000000000000000009f7a5bb", 0x20, 0x200fe0}, {&(0x7f0000011000)="00000000000000000000000000000000000000000000000000000006", 0x1c, 0x2011e0}, {0x0, 0x0, 0x2012e0}, {&(0x7f0000011400)="000000000000000000000000000000000000000000160000000510ec", 0x1c, 0x201320}, {&(0x7f0000011500)="00000017000000020c60", 0xa, 0x201380}, {&(0x7f0000011600)}, {&(0x7f0000011b00)="0000000000000000000000000000000000000000000000000000000100000000d73cd47a0000000000100000000000000b000000000000000d0000001000000012000000170000001600000015000000ffffffffffffffffffffffffffffffffffffffff03000600000000000000000000000000140000000100000000000000ffffffffffffffffffffffffffffffffffffffff05", 0x95, 0x204fe0}, {&(0x7f0000011c00)="0000000000000000000000000000000000000000000000000000000009f7a5bb", 0x20, 0x205fe0}, {0x0, 0x0, 0x401320}], 0x0, &(0x7f0000014b00)) 13:23:03 executing program 2: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffff, 0xffffffffffffffff, 0x0) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) read(r0, 0x0, 0x0) syz_mount_image$f2fs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x10, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}, {&(0x7f0000010500)='\x00\x00\x00\x00', 0x4, 0xc80}, {&(0x7f0000010700)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e00000010000003000000010000000200000018b2e346f95e497f827e0a", 0x77, 0x1400}, {0x0}, {&(0x7f0000010e00)="d73cd47a0000000000100000000000000b000000000000000d0000001000000012000000170000001600000015000000ffffffffffffffffffffffffffffffffffffffff03000600000000000000000000000000140000000100000000000000ffffffffffffffffffffffffffffffffffffffff05000000000000000000000000000000c5010000060000000100000007000000070000000a0000004000000040000000fc0f00"/181, 0xb5, 0x200000}, {&(0x7f0000010f00)="0000000000000000000000000000000000000000000000000000000009f7a5bb", 0x20, 0x200fe0}, {&(0x7f0000011000)="00000000000000000000000000000000000000000000000000000006", 0x1c, 0x2011e0}, {0x0, 0x0, 0x2012e0}, {&(0x7f0000011400)="000000000000000000000000000000000000000000160000000510ec", 0x1c, 0x201320}, {&(0x7f0000011500)="00000017000000020c60", 0xa, 0x201380}, {&(0x7f0000011600)}, {&(0x7f0000011800)}, {&(0x7f0000011b00)="0000000000000000000000000000000000000000000000000000000100000000d73cd47a0000000000100000000000000b000000000000000d0000001000000012000000170000001600000015000000ffffffffffffffffffffffffffffffffffffff", 0x63, 0x204fe0}, {&(0x7f0000011c00)="0000000000000000000000000000000000000000000000000000000009f7a5bb", 0x20, 0x205fe0}, {0x0}, {&(0x7f0000013000)="000000000000000000000100000001", 0xf, 0xa00000}], 0x0, &(0x7f0000014b00)) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='pids.events\x00', 0x275a, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x4, 0x2d, 0x9, 0x1, 0x0, 0x7fff, 0x88, 0x4, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x7, 0x0, @perf_bp={&(0x7f00000000c0), 0x1}, 0x9, 0x1, 0x4, 0x9, 0x0, 0xffff, 0x400, 0x0, 0x2, 0x0, 0x1000}, 0x0, 0xe, r1, 0xa) [ 263.843357][T12038] EXT4-fs (loop4): inodes count not valid: 393248 vs 32 [ 263.875338][T12028] EXT4-fs (loop5): bad geometry: block count 128 exceeds size of device (26 blocks) 13:23:03 executing program 4: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000002, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x31) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) waitid$P_PIDFD(0x3, r0, &(0x7f0000000500), 0x9, &(0x7f0000000580)) ptrace$cont(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='pids.events\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x12, r1, 0x0) ftruncate(r1, 0x1000673) ioctl$KDSKBENT(r1, 0x4b47, &(0x7f00000002c0)={0x2, 0x81, 0x5}) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x88400, 0x1a8) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0xd0265000) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) exit_group(0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x31, 0xffffffffffffffff, 0x0) time(&(0x7f0000000180)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14001500, 0x9, &(0x7f0000000300)=[{&(0x7f0000000080)="20040600000100000c190000ce1900000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800)) 13:23:03 executing program 1: clone(0x13102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) poll(0x0, 0x0, 0x8000000000000200) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f00000025c0)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00'}) ioctl$TUNSETLINK(r0, 0x400454cd, 0x30a) r2 = openat$selinux_attr(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) mmap(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x6, 0x1010, r2, 0xdc5f7000) close(r0) r3 = socket$inet_tcp(0x2, 0x1, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='pids.events\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x12, r4, 0x0) fallocate(r1, 0x14, 0x2, 0x3) ftruncate(r4, 0x1000673) ioctl$TIOCSWINSZ(r4, 0x5414, &(0x7f0000000040)={0x40, 0x6, 0xdf}) preadv(0xffffffffffffffff, &(0x7f00000004c0)=[{&(0x7f0000000100)=""/249, 0xf9}, {&(0x7f0000000200)=""/159, 0x9f}, {&(0x7f00000002c0)=""/129, 0x81}, {&(0x7f0000000380)=""/100, 0x64}, {&(0x7f0000000400)=""/175, 0xaf}], 0x5, 0x0, 0x7) preadv(r3, 0x0, 0x0, 0x7fffffff, 0x1) 13:23:03 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xd146, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000660000000f000000000000000100000001000000004000000040000020000000daf4655fdaf4655f0100ffff53ef010001000000d9f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010100)}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000100000000000000000000000000000000000000000000003000000000000000", 0x40, 0x540}, {&(0x7f0000010300)="02000000030000000400000066000f000300040000000000000000000f007f5c", 0x20, 0x800}, {&(0x7f0000011500)="ed41000000080000d9f4655fdaf4655fdaf4655f000000000000040004", 0x1d, 0x2200}, {0x0}, {&(0x7f0000011900)="ed8100001a040000daf4655fdaf4655fdaf4655f000000000000010004000000000000000100000014000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000039c34d38000000000000000000000000000000000000000000000000200000007412ab417412ab417412ab41daf4655f7412ab410000000000000000", 0xa0, 0x3800}], 0x0, &(0x7f0000012c00)) [ 263.889105][T12037] F2FS-fs (loop0): invalid crc_offset: 0 [ 263.897302][T12037] F2FS-fs (loop0): invalid crc_offset: 0 [ 263.903348][T12037] F2FS-fs (loop0): Failed to get valid F2FS checkpoint 13:23:04 executing program 4: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000002, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x31) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) waitid$P_PIDFD(0x3, r0, &(0x7f0000000500), 0x9, &(0x7f0000000580)) ptrace$cont(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='pids.events\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x12, r1, 0x0) ftruncate(r1, 0x1000673) ioctl$KDSKBENT(r1, 0x4b47, &(0x7f00000002c0)={0x2, 0x81, 0x5}) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x88400, 0x1a8) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0xd0265000) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) exit_group(0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x31, 0xffffffffffffffff, 0x0) time(&(0x7f0000000180)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14001500, 0x9, &(0x7f0000000300)=[{&(0x7f0000000080)="20000700000100000c190000ce1900000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800)) 13:23:04 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xd147, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000660000000f000000000000000100000001000000004000000040000020000000daf4655fdaf4655f0100ffff53ef010001000000d9f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010100)}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000100000000000000000000000000000000000000000000003000000000000000", 0x40, 0x540}, {&(0x7f0000010300)="02000000030000000400000066000f000300040000000000000000000f007f5c", 0x20, 0x800}, {&(0x7f0000011500)="ed41000000080000d9f4655fdaf4655fdaf4655f000000000000040004", 0x1d, 0x2200}, {0x0}, {&(0x7f0000011900)="ed8100001a040000daf4655fdaf4655fdaf4655f000000000000010004000000000000000100000014000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000039c34d38000000000000000000000000000000000000000000000000200000007412ab417412ab417412ab41daf4655f7412ab410000000000000000", 0xa0, 0x3800}], 0x0, &(0x7f0000012c00)) 13:23:04 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_mount_image$f2fs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0xe, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}, {&(0x7f0000010500)='\x00\x00\x00\x00', 0x4, 0xc80}, {&(0x7f0000010700)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e00000010000003000000010000000200000018b2e346f95e497f827e0a", 0x77, 0x1400}, {0x0}, {&(0x7f0000010e00)="d73cd47a0000000000100000000000000b000000000000000d0000001000000012000000170000001600000015000000ffffffffffffffffffffffffffffffffffffffff03000600000000000000000000000000140000000100000000000000ffffffffffffffffffffffffffffffffffffffff05000000000000000000000000000000c5010000060000000100000007000000070000000a0000004000000040000000fc0f00"/181, 0xb5, 0x200000}, {&(0x7f0000010f00)="0000000000000000000000000000000000000000000000000000000009f7a5bb", 0x20, 0x200fe0}, {&(0x7f0000011000)="00000000000000000000000000000000000000000000000000000006", 0x1c, 0x2011e0}, {0x0, 0x0, 0x2012e0}, {&(0x7f0000011400)="000000000000000000000000000000000000000000160000000510ec", 0x1c, 0x201320}, {&(0x7f0000011500)="00000017000000020c60", 0xa, 0x201380}, {&(0x7f0000011600)}, {&(0x7f0000011b00)="0000000000000000000000000000000000000000000000000000000100000000d73cd47a0000000000100000000000000b000000000000000d0000001000000012000000170000001600000015000000ffffffffffffffffffffffffffffffffffffffff03000600000000000000000000000000140000000100000000000000ffffffffffffffffffffffffffffffffffffffff05000000000000000000000000000000c5010000060000000100", 0xae, 0x204fe0}, {&(0x7f0000011c00)="0000000000000000000000000000000000000000000000000000000009f7a5bb", 0x20, 0x205fe0}, {0x0, 0x0, 0x401320}], 0x0, &(0x7f0000014b00)) [ 263.957948][T12055] EXT4-fs (loop4): inodes count not valid: 394272 vs 32 [ 263.968175][T12062] EXT4-fs (loop5): bad geometry: block count 128 exceeds size of device (26 blocks) [ 263.968667][T12050] F2FS-fs (loop2): invalid crc_offset: 0 [ 263.987371][T12050] F2FS-fs (loop2): invalid crc_offset: 0 [ 263.994502][T12050] F2FS-fs (loop2): Failed to get valid F2FS checkpoint [ 264.066225][T12069] EXT4-fs (loop4): inodes count not valid: 458784 vs 32 [ 264.075746][T12072] EXT4-fs (loop5): bad geometry: block count 128 exceeds size of device (26 blocks) 13:23:04 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xd180, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000660000000f000000000000000100000001000000004000000040000020000000daf4655fdaf4655f0100ffff53ef010001000000d9f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010100)}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000100000000000000000000000000000000000000000000003000000000000000", 0x40, 0x540}, {&(0x7f0000010300)="02000000030000000400000066000f000300040000000000000000000f007f5c", 0x20, 0x800}, {&(0x7f0000011500)="ed41000000080000d9f4655fdaf4655fdaf4655f000000000000040004", 0x1d, 0x2200}, {0x0}, {&(0x7f0000011900)="ed8100001a040000daf4655fdaf4655fdaf4655f000000000000010004000000000000000100000014000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000039c34d38000000000000000000000000000000000000000000000000200000007412ab417412ab417412ab41daf4655f7412ab410000000000000000", 0xa0, 0x3800}], 0x0, &(0x7f0000012c00)) 13:23:04 executing program 2: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffff, 0xffffffffffffffff, 0x0) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) read(r0, 0x0, 0x0) syz_mount_image$f2fs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x10, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}, {&(0x7f0000010500)='\x00\x00\x00\x00', 0x4, 0xc80}, {&(0x7f0000010700)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e00000010000003000000010000000200000018b2e346f95e497f827e0a", 0x77, 0x1400}, {0x0}, {&(0x7f0000010e00)="d73cd47a0000000000100000000000000b000000000000000d0000001000000012000000170000001600000015000000ffffffffffffffffffffffffffffffffffffffff03000600000000000000000000000000140000000100000000000000ffffffffffffffffffffffffffffffffffffffff05000000000000000000000000000000c5010000060000000100000007000000070000000a0000004000000040000000fc0f00"/181, 0xb5, 0x200000}, {&(0x7f0000010f00)="0000000000000000000000000000000000000000000000000000000009f7a5bb", 0x20, 0x200fe0}, {&(0x7f0000011000)="00000000000000000000000000000000000000000000000000000006", 0x1c, 0x2011e0}, {0x0, 0x0, 0x2012e0}, {&(0x7f0000011400)="000000000000000000000000000000000000000000160000000510ec", 0x1c, 0x201320}, {&(0x7f0000011500)="00000017000000020c60", 0xa, 0x201380}, {&(0x7f0000011600)}, {&(0x7f0000011800)}, {&(0x7f0000011b00)="0000000000000000000000000000000000000000000000000000000100000000d73cd47a0000000000100000000000000b000000000000000d0000001000000012000000170000001600000015000000ffffffffffffffffffffffffffffffffffffff", 0x63, 0x204fe0}, {&(0x7f0000011c00)="0000000000000000000000000000000000000000000000000000000009f7a5bb", 0x20, 0x205fe0}, {0x0}, {&(0x7f0000013000)="000000000000000000000100000001", 0xf, 0xa00000}], 0x0, &(0x7f0000014b00)) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='pids.events\x00', 0x275a, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x4, 0x2d, 0x9, 0x1, 0x0, 0x7fff, 0x88, 0x4, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x7, 0x0, @perf_bp={&(0x7f00000000c0), 0x1}, 0x9, 0x1, 0x4, 0x9, 0x0, 0xffff, 0x400, 0x0, 0x2, 0x0, 0x1000}, 0x0, 0xe, r1, 0xa) 13:23:04 executing program 3: clone(0x13102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) poll(0x0, 0x0, 0x8000000000000200) r0 = openat(0xffffffffffffff9c, &(0x7f00000025c0)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) ioctl$TUNSETLINK(0xffffffffffffffff, 0x40087602, 0x30a) 13:23:04 executing program 4: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000002, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x31) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) waitid$P_PIDFD(0x3, r0, &(0x7f0000000500), 0x9, &(0x7f0000000580)) ptrace$cont(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='pids.events\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x12, r1, 0x0) ftruncate(r1, 0x1000673) ioctl$KDSKBENT(r1, 0x4b47, &(0x7f00000002c0)={0x2, 0x81, 0x5}) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x88400, 0x1a8) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0xd0265000) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) exit_group(0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x31, 0xffffffffffffffff, 0x0) time(&(0x7f0000000180)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14001500, 0x9, &(0x7f0000000300)=[{&(0x7f0000000080)="20000900000100000c190000ce1900000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800)) [ 264.272189][T12074] F2FS-fs (loop0): invalid crc_offset: 0 [ 264.284653][T12082] F2FS-fs (loop2): invalid crc_offset: 0 [ 264.289679][T12074] F2FS-fs (loop0): invalid crc_offset: 0 [ 264.290548][T12082] F2FS-fs (loop2): invalid crc_offset: 0 [ 264.311168][T12082] F2FS-fs (loop2): Failed to get valid F2FS checkpoint 13:23:04 executing program 4: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000002, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x31) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) waitid$P_PIDFD(0x3, r0, &(0x7f0000000500), 0x9, &(0x7f0000000580)) ptrace$cont(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='pids.events\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x12, r1, 0x0) ftruncate(r1, 0x1000673) ioctl$KDSKBENT(r1, 0x4b47, &(0x7f00000002c0)={0x2, 0x81, 0x5}) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x88400, 0x1a8) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0xd0265000) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) exit_group(0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x31, 0xffffffffffffffff, 0x0) time(&(0x7f0000000180)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14001500, 0x9, &(0x7f0000000300)=[{&(0x7f0000000080)="20000a00000100000c190000ce1900000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800)) [ 264.328626][T12074] F2FS-fs (loop0): Failed to get valid F2FS checkpoint [ 264.341224][T12087] EXT4-fs (loop5): bad geometry: block count 128 exceeds size of device (26 blocks) [ 264.356212][T12090] EXT4-fs (loop4): inodes count not valid: 589856 vs 32 13:23:04 executing program 4: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000002, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x31) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) waitid$P_PIDFD(0x3, r0, &(0x7f0000000500), 0x9, &(0x7f0000000580)) ptrace$cont(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='pids.events\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x12, r1, 0x0) ftruncate(r1, 0x1000673) ioctl$KDSKBENT(r1, 0x4b47, &(0x7f00000002c0)={0x2, 0x81, 0x5}) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x88400, 0x1a8) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0xd0265000) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) exit_group(0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x31, 0xffffffffffffffff, 0x0) time(&(0x7f0000000180)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14001500, 0x9, &(0x7f0000000300)=[{&(0x7f0000000080)="20000b00000100000c190000ce1900000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800)) 13:23:04 executing program 2: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffff, 0xffffffffffffffff, 0x0) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) read(r0, 0x0, 0x0) syz_mount_image$f2fs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x10, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}, {&(0x7f0000010500)='\x00\x00\x00\x00', 0x4, 0xc80}, {&(0x7f0000010700)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e00000010000003000000010000000200000018b2e346f95e497f827e0a", 0x77, 0x1400}, {0x0}, {&(0x7f0000010e00)="d73cd47a0000000000100000000000000b000000000000000d0000001000000012000000170000001600000015000000ffffffffffffffffffffffffffffffffffffffff03000600000000000000000000000000140000000100000000000000ffffffffffffffffffffffffffffffffffffffff05000000000000000000000000000000c5010000060000000100000007000000070000000a0000004000000040000000fc0f00"/181, 0xb5, 0x200000}, {&(0x7f0000010f00)="0000000000000000000000000000000000000000000000000000000009f7a5bb", 0x20, 0x200fe0}, {&(0x7f0000011000)="00000000000000000000000000000000000000000000000000000006", 0x1c, 0x2011e0}, {0x0, 0x0, 0x2012e0}, {&(0x7f0000011400)="000000000000000000000000000000000000000000160000000510ec", 0x1c, 0x201320}, {&(0x7f0000011500)="00000017000000020c60", 0xa, 0x201380}, {&(0x7f0000011600)}, {&(0x7f0000011800)}, {&(0x7f0000011b00)="0000000000000000000000000000000000000000000000000000000100000000d73cd47a0000000000100000000000000b000000000000000d0000001000000012000000170000001600000015000000ffffffffffffffffffffffffffffffffffffff", 0x63, 0x204fe0}, {&(0x7f0000011c00)="0000000000000000000000000000000000000000000000000000000009f7a5bb", 0x20, 0x205fe0}, {0x0}, {&(0x7f0000013000)="000000000000000000000100000001", 0xf, 0xa00000}], 0x0, &(0x7f0000014b00)) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='pids.events\x00', 0x275a, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x4, 0x2d, 0x9, 0x1, 0x0, 0x7fff, 0x88, 0x4, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x7, 0x0, @perf_bp={&(0x7f00000000c0), 0x1}, 0x9, 0x1, 0x4, 0x9, 0x0, 0xffff, 0x400, 0x0, 0x2, 0x0, 0x1000}, 0x0, 0xe, r1, 0xa) [ 264.397291][T12087] EXT4-fs (loop5): bad geometry: block count 128 exceeds size of device (26 blocks) 13:23:04 executing program 1: clone(0x13102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket(0x21, 0x1, 0x80000001) poll(0x0, 0x0, 0x8000000000000200) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f00000025c0)='/proc/self/exe\x00', 0x0, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(r0, 0x8983, &(0x7f0000000280)={0x1, 'veth1_to_hsr\x00', {}, 0x5}) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00'}) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='pids.events\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x12, r3, 0x0) ftruncate(r3, 0x1000673) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000240)={'netdevsim0\x00'}) ioctl$TUNSETLINK(r1, 0x400454cd, 0x30a) r4 = openat$selinux_attr(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) mmap(&(0x7f0000664000/0x3000)=nil, 0x3000, 0x6, 0x12, r4, 0x47a88000) close(r1) r5 = socket$inet_tcp(0x2, 0x1, 0x0) preadv(r5, 0x0, 0x0, 0x7fffffff, 0x1) clone(0x800400, &(0x7f0000000100)="3bd4406fdf3a7ae66a6cfc764a446b595b3ce441b67391ef1f071f662d9b81805826f3167ecd695b376b298f6eba9199b6351cb50e0ae20a61e24155abd7fde64cf165419343019f46e98dc0f6aa87c4757b507f1707087fcfa160a9048ea5ede1ec5bb0dd96ba987ec73cc98ee4956d3e87bbb54f3d23d09fb83ced3c9e03", &(0x7f0000000040), &(0x7f0000000180), &(0x7f00000001c0)="b070c2dd67ee1f1602e7d8a01ab52a92eeda8dc7aeb2f5fa75e8707cfc6290420a9d8115b8a29af134213d747cc840787c11ada5371a814a7ee0d4090d21b308e6b9") 13:23:04 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xd1c0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000660000000f000000000000000100000001000000004000000040000020000000daf4655fdaf4655f0100ffff53ef010001000000d9f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010100)}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000100000000000000000000000000000000000000000000003000000000000000", 0x40, 0x540}, {&(0x7f0000010300)="02000000030000000400000066000f000300040000000000000000000f007f5c", 0x20, 0x800}, {&(0x7f0000011500)="ed41000000080000d9f4655fdaf4655fdaf4655f000000000000040004", 0x1d, 0x2200}, {0x0}, {&(0x7f0000011900)="ed8100001a040000daf4655fdaf4655fdaf4655f000000000000010004000000000000000100000014000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000039c34d38000000000000000000000000000000000000000000000000200000007412ab417412ab417412ab41daf4655f7412ab410000000000000000", 0xa0, 0x3800}], 0x0, &(0x7f0000012c00)) 13:23:04 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_mount_image$f2fs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0xe, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}, {&(0x7f0000010500)='\x00\x00\x00\x00', 0x4, 0xc80}, {&(0x7f0000010700)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e00000010000003000000010000000200000018b2e346f95e497f827e0a", 0x77, 0x1400}, {0x0}, {&(0x7f0000010e00)="d73cd47a0000000000100000000000000b000000000000000d0000001000000012000000170000001600000015000000ffffffffffffffffffffffffffffffffffffffff03000600000000000000000000000000140000000100000000000000ffffffffffffffffffffffffffffffffffffffff05000000000000000000000000000000c5010000060000000100000007000000070000000a0000004000000040000000fc0f00"/181, 0xb5, 0x200000}, {&(0x7f0000010f00)="0000000000000000000000000000000000000000000000000000000009f7a5bb", 0x20, 0x200fe0}, {&(0x7f0000011000)="00000000000000000000000000000000000000000000000000000006", 0x1c, 0x2011e0}, {0x0, 0x0, 0x2012e0}, {&(0x7f0000011400)="000000000000000000000000000000000000000000160000000510ec", 0x1c, 0x201320}, {&(0x7f0000011500)="00000017000000020c60", 0xa, 0x201380}, {&(0x7f0000011600)}, {&(0x7f0000011b00)="0000000000000000000000000000000000000000000000000000000100000000d73cd47a0000000000100000000000000b000000000000000d0000001000000012000000170000001600000015000000ffffffffffffffffffffffffffffffffffffffff03000600000000000000000000000000140000000100000000000000ffffffffffffffffffffffffffffffffffffffff05000000000000000000000000000000c5010000060000000100", 0xae, 0x204fe0}, {&(0x7f0000011c00)="0000000000000000000000000000000000000000000000000000000009f7a5bb", 0x20, 0x205fe0}, {0x0, 0x0, 0x401320}], 0x0, &(0x7f0000014b00)) [ 264.621265][T12110] F2FS-fs (loop2): invalid crc_offset: 0 [ 264.626503][T12113] F2FS-fs (loop0): invalid crc_offset: 0 [ 264.631759][T12110] F2FS-fs (loop2): invalid crc_offset: 0 [ 264.639729][T12108] EXT4-fs (loop4): inodes count not valid: 720928 vs 32 [ 264.647048][T12115] EXT4-fs (loop5): bad geometry: block count 128 exceeds size of device (26 blocks) [ 264.654044][T12110] F2FS-fs (loop2): Failed to get valid F2FS checkpoint [ 264.664316][T12113] F2FS-fs (loop0): invalid crc_offset: 0 13:23:04 executing program 4: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000002, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x31) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) waitid$P_PIDFD(0x3, r0, &(0x7f0000000500), 0x9, &(0x7f0000000580)) ptrace$cont(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='pids.events\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x12, r1, 0x0) ftruncate(r1, 0x1000673) ioctl$KDSKBENT(r1, 0x4b47, &(0x7f00000002c0)={0x2, 0x81, 0x5}) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x88400, 0x1a8) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0xd0265000) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) exit_group(0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x31, 0xffffffffffffffff, 0x0) time(&(0x7f0000000180)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14001500, 0x9, &(0x7f0000000300)=[{&(0x7f0000000080)="20000c00000100000c190000ce1900000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800)) 13:23:04 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xd200, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000660000000f000000000000000100000001000000004000000040000020000000daf4655fdaf4655f0100ffff53ef010001000000d9f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010100)}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000100000000000000000000000000000000000000000000003000000000000000", 0x40, 0x540}, {&(0x7f0000010300)="02000000030000000400000066000f000300040000000000000000000f007f5c", 0x20, 0x800}, {&(0x7f0000011500)="ed41000000080000d9f4655fdaf4655fdaf4655f000000000000040004", 0x1d, 0x2200}, {0x0}, {&(0x7f0000011900)="ed8100001a040000daf4655fdaf4655fdaf4655f000000000000010004000000000000000100000014000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000039c34d38000000000000000000000000000000000000000000000000200000007412ab417412ab417412ab41daf4655f7412ab410000000000000000", 0xa0, 0x3800}], 0x0, &(0x7f0000012c00)) 13:23:04 executing program 2: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffff, 0xffffffffffffffff, 0x0) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) read(r0, 0x0, 0x0) syz_mount_image$f2fs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x10, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}, {&(0x7f0000010500)='\x00\x00\x00\x00', 0x4, 0xc80}, {&(0x7f0000010700)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e00000010000003000000010000000200000018b2e346f95e497f827e0a", 0x77, 0x1400}, {0x0}, {&(0x7f0000010e00)="d73cd47a0000000000100000000000000b000000000000000d0000001000000012000000170000001600000015000000ffffffffffffffffffffffffffffffffffffffff03000600000000000000000000000000140000000100000000000000ffffffffffffffffffffffffffffffffffffffff05000000000000000000000000000000c5010000060000000100000007000000070000000a0000004000000040000000fc0f00"/181, 0xb5, 0x200000}, {&(0x7f0000010f00)="0000000000000000000000000000000000000000000000000000000009f7a5bb", 0x20, 0x200fe0}, {&(0x7f0000011000)="00000000000000000000000000000000000000000000000000000006", 0x1c, 0x2011e0}, {0x0, 0x0, 0x2012e0}, {&(0x7f0000011400)="000000000000000000000000000000000000000000160000000510ec", 0x1c, 0x201320}, {&(0x7f0000011500)="00000017000000020c60", 0xa, 0x201380}, {&(0x7f0000011600)}, {&(0x7f0000011800)}, {&(0x7f0000011b00)="0000000000000000000000000000000000000000000000000000000100000000d73cd47a0000000000100000000000000b000000000000000d0000001000000012000000170000001600000015000000ffffffffffffffffffffffffffffffffffffffff03000600000000000000000000000000140000000100000000000000ffffffffffffffffffffffffffffffffffffffff05", 0x95, 0x204fe0}, {&(0x7f0000011c00)="0000000000000000000000000000000000000000000000000000000009f7a5bb", 0x20, 0x205fe0}, {0x0}, {&(0x7f0000013000)="000000000000000000000100000001", 0xf, 0xa00000}], 0x0, &(0x7f0000014b00)) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='pids.events\x00', 0x275a, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x4, 0x2d, 0x9, 0x1, 0x0, 0x7fff, 0x88, 0x4, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x7, 0x0, @perf_bp={&(0x7f00000000c0), 0x1}, 0x9, 0x1, 0x4, 0x9, 0x0, 0xffff, 0x400, 0x0, 0x2, 0x0, 0x1000}, 0x0, 0xe, r1, 0xa) [ 264.672573][T12113] F2FS-fs (loop0): Failed to get valid F2FS checkpoint 13:23:04 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_mount_image$f2fs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0xe, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}, {&(0x7f0000010500)='\x00\x00\x00\x00', 0x4, 0xc80}, {&(0x7f0000010700)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e00000010000003000000010000000200000018b2e346f95e497f827e0a", 0x77, 0x1400}, {0x0}, {&(0x7f0000010e00)="d73cd47a0000000000100000000000000b000000000000000d0000001000000012000000170000001600000015000000ffffffffffffffffffffffffffffffffffffffff03000600000000000000000000000000140000000100000000000000ffffffffffffffffffffffffffffffffffffffff05000000000000000000000000000000c5010000060000000100000007000000070000000a0000004000000040000000fc0f00"/181, 0xb5, 0x200000}, {&(0x7f0000010f00)="0000000000000000000000000000000000000000000000000000000009f7a5bb", 0x20, 0x200fe0}, {&(0x7f0000011000)="00000000000000000000000000000000000000000000000000000006", 0x1c, 0x2011e0}, {0x0, 0x0, 0x2012e0}, {&(0x7f0000011400)="000000000000000000000000000000000000000000160000000510ec", 0x1c, 0x201320}, {&(0x7f0000011500)="00000017000000020c60", 0xa, 0x201380}, {&(0x7f0000011600)}, {&(0x7f0000011b00)="0000000000000000000000000000000000000000000000000000000100000000d73cd47a0000000000100000000000000b000000000000000d0000001000000012000000170000001600000015000000ffffffffffffffffffffffffffffffffffffffff03000600000000000000000000000000140000000100000000000000ffffffffffffffffffffffffffffffffffffffff05000000000000000000000000000000c5010000060000000100", 0xae, 0x204fe0}, {&(0x7f0000011c00)="0000000000000000000000000000000000000000000000000000000009f7a5bb", 0x20, 0x205fe0}, {0x0, 0x0, 0x401320}], 0x0, &(0x7f0000014b00)) 13:23:04 executing program 3: clone(0x13102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) poll(0x0, 0x0, 0x8000000000000200) r0 = openat(0xffffffffffffff9c, &(0x7f00000025c0)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) ioctl$TUNSETLINK(0xffffffffffffffff, 0x40087602, 0x30a) [ 264.849466][T12134] EXT4-fs (loop5): bad geometry: block count 128 exceeds size of device (26 blocks) [ 264.864926][T12130] EXT4-fs (loop4): inodes count not valid: 786464 vs 32 13:23:04 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xd240, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000660000000f000000000000000100000001000000004000000040000020000000daf4655fdaf4655f0100ffff53ef010001000000d9f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010100)}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000100000000000000000000000000000000000000000000003000000000000000", 0x40, 0x540}, {&(0x7f0000010300)="02000000030000000400000066000f000300040000000000000000000f007f5c", 0x20, 0x800}, {&(0x7f0000011500)="ed41000000080000d9f4655fdaf4655fdaf4655f000000000000040004", 0x1d, 0x2200}, {0x0}, {&(0x7f0000011900)="ed8100001a040000daf4655fdaf4655fdaf4655f000000000000010004000000000000000100000014000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000039c34d38000000000000000000000000000000000000000000000000200000007412ab417412ab417412ab41daf4655f7412ab410000000000000000", 0xa0, 0x3800}], 0x0, &(0x7f0000012c00)) 13:23:04 executing program 4: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000002, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x31) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) waitid$P_PIDFD(0x3, r0, &(0x7f0000000500), 0x9, &(0x7f0000000580)) ptrace$cont(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='pids.events\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x12, r1, 0x0) ftruncate(r1, 0x1000673) ioctl$KDSKBENT(r1, 0x4b47, &(0x7f00000002c0)={0x2, 0x81, 0x5}) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x88400, 0x1a8) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0xd0265000) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) exit_group(0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x31, 0xffffffffffffffff, 0x0) time(&(0x7f0000000180)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14001500, 0x9, &(0x7f0000000300)=[{&(0x7f0000000080)="20000d00000100000c190000ce1900000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800)) [ 264.947107][T12141] F2FS-fs (loop2): invalid crc_offset: 0 [ 264.954529][T12139] F2FS-fs (loop0): invalid crc_offset: 0 [ 264.967514][T12139] F2FS-fs (loop0): invalid crc_offset: 0 [ 264.969924][T12141] F2FS-fs (loop2): invalid crc_offset: 0 [ 264.974318][T12139] F2FS-fs (loop0): Failed to get valid F2FS checkpoint [ 264.978992][T12141] F2FS-fs (loop2): Failed to get valid F2FS checkpoint 13:23:05 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xd280, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000660000000f000000000000000100000001000000004000000040000020000000daf4655fdaf4655f0100ffff53ef010001000000d9f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010100)}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000100000000000000000000000000000000000000000000003000000000000000", 0x40, 0x540}, {&(0x7f0000010300)="02000000030000000400000066000f000300040000000000000000000f007f5c", 0x20, 0x800}, {&(0x7f0000011500)="ed41000000080000d9f4655fdaf4655fdaf4655f000000000000040004", 0x1d, 0x2200}, {0x0}, {&(0x7f0000011900)="ed8100001a040000daf4655fdaf4655fdaf4655f000000000000010004000000000000000100000014000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000039c34d38000000000000000000000000000000000000000000000000200000007412ab417412ab417412ab41daf4655f7412ab410000000000000000", 0xa0, 0x3800}], 0x0, &(0x7f0000012c00)) 13:23:05 executing program 4: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000002, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x31) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) waitid$P_PIDFD(0x3, r0, &(0x7f0000000500), 0x9, &(0x7f0000000580)) ptrace$cont(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='pids.events\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x12, r1, 0x0) ftruncate(r1, 0x1000673) ioctl$KDSKBENT(r1, 0x4b47, &(0x7f00000002c0)={0x2, 0x81, 0x5}) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x88400, 0x1a8) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0xd0265000) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) exit_group(0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x31, 0xffffffffffffffff, 0x0) time(&(0x7f0000000180)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14001500, 0x9, &(0x7f0000000300)=[{&(0x7f0000000080)="20000e00000100000c190000ce1900000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800)) [ 265.010768][T12152] EXT4-fs (loop5): bad geometry: block count 128 exceeds size of device (26 blocks) 13:23:05 executing program 2: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffff, 0xffffffffffffffff, 0x0) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) read(r0, 0x0, 0x0) syz_mount_image$f2fs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x10, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}, {&(0x7f0000010500)='\x00\x00\x00\x00', 0x4, 0xc80}, {&(0x7f0000010700)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e00000010000003000000010000000200000018b2e346f95e497f827e0a", 0x77, 0x1400}, {0x0}, {&(0x7f0000010e00)="d73cd47a0000000000100000000000000b000000000000000d0000001000000012000000170000001600000015000000ffffffffffffffffffffffffffffffffffffffff03000600000000000000000000000000140000000100000000000000ffffffffffffffffffffffffffffffffffffffff05000000000000000000000000000000c5010000060000000100000007000000070000000a0000004000000040000000fc0f00"/181, 0xb5, 0x200000}, {&(0x7f0000010f00)="0000000000000000000000000000000000000000000000000000000009f7a5bb", 0x20, 0x200fe0}, {&(0x7f0000011000)="00000000000000000000000000000000000000000000000000000006", 0x1c, 0x2011e0}, {0x0, 0x0, 0x2012e0}, {&(0x7f0000011400)="000000000000000000000000000000000000000000160000000510ec", 0x1c, 0x201320}, {&(0x7f0000011500)="00000017000000020c60", 0xa, 0x201380}, {&(0x7f0000011600)}, {&(0x7f0000011800)}, {&(0x7f0000011b00)="0000000000000000000000000000000000000000000000000000000100000000d73cd47a0000000000100000000000000b000000000000000d0000001000000012000000170000001600000015000000ffffffffffffffffffffffffffffffffffffffff03000600000000000000000000000000140000000100000000000000ffffffffffffffffffffffffffffffffffffffff05", 0x95, 0x204fe0}, {&(0x7f0000011c00)="0000000000000000000000000000000000000000000000000000000009f7a5bb", 0x20, 0x205fe0}, {0x0}, {&(0x7f0000013000)="000000000000000000000100000001", 0xf, 0xa00000}], 0x0, &(0x7f0000014b00)) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='pids.events\x00', 0x275a, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x4, 0x2d, 0x9, 0x1, 0x0, 0x7fff, 0x88, 0x4, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x7, 0x0, @perf_bp={&(0x7f00000000c0), 0x1}, 0x9, 0x1, 0x4, 0x9, 0x0, 0xffff, 0x400, 0x0, 0x2, 0x0, 0x1000}, 0x0, 0xe, r1, 0xa) 13:23:05 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_mount_image$f2fs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0xe, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}, {&(0x7f0000010500)='\x00\x00\x00\x00', 0x4, 0xc80}, {&(0x7f0000010700)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e00000010000003000000010000000200000018b2e346f95e497f827e0a", 0x77, 0x1400}, {0x0}, {&(0x7f0000010e00)="d73cd47a0000000000100000000000000b000000000000000d0000001000000012000000170000001600000015000000ffffffffffffffffffffffffffffffffffffffff03000600000000000000000000000000140000000100000000000000ffffffffffffffffffffffffffffffffffffffff05000000000000000000000000000000c5010000060000000100000007000000070000000a0000004000000040000000fc0f00"/181, 0xb5, 0x200000}, {&(0x7f0000010f00)="0000000000000000000000000000000000000000000000000000000009f7a5bb", 0x20, 0x200fe0}, {&(0x7f0000011000)="00000000000000000000000000000000000000000000000000000006", 0x1c, 0x2011e0}, {0x0, 0x0, 0x2012e0}, {&(0x7f0000011400)="000000000000000000000000000000000000000000160000000510ec", 0x1c, 0x201320}, {&(0x7f0000011500)="00000017000000020c60", 0xa, 0x201380}, {&(0x7f0000011600)}, {&(0x7f0000011b00)="0000000000000000000000000000000000000000000000000000000100000000d73cd47a0000000000100000000000000b000000000000000d0000001000000012000000170000001600000015000000ffffffffffffffffffffffffffffffffffffffff03000600000000000000000000000000140000000100000000000000ffffffffffffffffffffffffffffffffffffffff05000000000000000000000000000000c5010000060000000100000007000000070000000a00", 0xba, 0x204fe0}, {&(0x7f0000011c00)="0000000000000000000000000000000000000000000000000000000009f7a5bb", 0x20, 0x205fe0}, {0x0, 0x0, 0x401320}], 0x0, &(0x7f0000014b00)) 13:23:05 executing program 4: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000002, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x31) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) waitid$P_PIDFD(0x3, r0, &(0x7f0000000500), 0x9, &(0x7f0000000580)) ptrace$cont(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='pids.events\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x12, r1, 0x0) ftruncate(r1, 0x1000673) ioctl$KDSKBENT(r1, 0x4b47, &(0x7f00000002c0)={0x2, 0x81, 0x5}) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x88400, 0x1a8) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0xd0265000) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) exit_group(0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x31, 0xffffffffffffffff, 0x0) time(&(0x7f0000000180)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14001500, 0x9, &(0x7f0000000300)=[{&(0x7f0000000080)="20041000000100000c190000ce1900000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800)) [ 265.209894][T12161] EXT4-fs (loop4): inodes count not valid: 917536 vs 32 [ 265.219042][T12166] EXT4-fs (loop5): bad geometry: block count 128 exceeds size of device (26 blocks) [ 265.316724][T12166] EXT4-fs (loop5): bad geometry: block count 128 exceeds size of device (26 blocks) [ 265.327616][T12174] F2FS-fs (loop0): invalid crc_offset: 0 [ 265.337213][T12173] F2FS-fs (loop2): invalid crc_offset: 0 [ 265.349854][T12174] F2FS-fs (loop0): invalid crc_offset: 0 [ 265.356784][T12174] F2FS-fs (loop0): Failed to get valid F2FS checkpoint 13:23:05 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xd2c0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000660000000f000000000000000100000001000000004000000040000020000000daf4655fdaf4655f0100ffff53ef010001000000d9f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010100)}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000100000000000000000000000000000000000000000000003000000000000000", 0x40, 0x540}, {&(0x7f0000010300)="02000000030000000400000066000f000300040000000000000000000f007f5c", 0x20, 0x800}, {&(0x7f0000011500)="ed41000000080000d9f4655fdaf4655fdaf4655f000000000000040004", 0x1d, 0x2200}, {0x0}, {&(0x7f0000011900)="ed8100001a040000daf4655fdaf4655fdaf4655f000000000000010004000000000000000100000014000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000039c34d38000000000000000000000000000000000000000000000000200000007412ab417412ab417412ab41daf4655f7412ab410000000000000000", 0xa0, 0x3800}], 0x0, &(0x7f0000012c00)) 13:23:05 executing program 4: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000002, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x31) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) waitid$P_PIDFD(0x3, r0, &(0x7f0000000500), 0x9, &(0x7f0000000580)) ptrace$cont(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='pids.events\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x12, r1, 0x0) ftruncate(r1, 0x1000673) ioctl$KDSKBENT(r1, 0x4b47, &(0x7f00000002c0)={0x2, 0x81, 0x5}) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x88400, 0x1a8) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0xd0265000) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) exit_group(0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x31, 0xffffffffffffffff, 0x0) time(&(0x7f0000000180)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14001500, 0x9, &(0x7f0000000300)=[{&(0x7f0000000080)="20201000000100000c190000ce1900000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800)) [ 265.364064][T12173] F2FS-fs (loop2): invalid crc_offset: 0 [ 265.370167][T12173] F2FS-fs (loop2): Failed to get valid F2FS checkpoint [ 265.400816][T12181] EXT4-fs (loop4): inodes count not valid: 1049632 vs 32 13:23:05 executing program 3: clone(0x13102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f00000025c0)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) ioctl$TUNSETLINK(r0, 0x40087602, 0x30a) 13:23:05 executing program 3: clone(0x13102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f00000025c0)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) ioctl$TUNSETLINK(r0, 0x40087602, 0x30a) 13:23:05 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_mount_image$f2fs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0xe, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}, {&(0x7f0000010500)='\x00\x00\x00\x00', 0x4, 0xc80}, {&(0x7f0000010700)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e00000010000003000000010000000200000018b2e346f95e497f827e0a", 0x77, 0x1400}, {0x0}, {&(0x7f0000010e00)="d73cd47a0000000000100000000000000b000000000000000d0000001000000012000000170000001600000015000000ffffffffffffffffffffffffffffffffffffffff03000600000000000000000000000000140000000100000000000000ffffffffffffffffffffffffffffffffffffffff05000000000000000000000000000000c5010000060000000100000007000000070000000a0000004000000040000000fc0f00"/181, 0xb5, 0x200000}, {&(0x7f0000010f00)="0000000000000000000000000000000000000000000000000000000009f7a5bb", 0x20, 0x200fe0}, {&(0x7f0000011000)="00000000000000000000000000000000000000000000000000000006", 0x1c, 0x2011e0}, {0x0, 0x0, 0x2012e0}, {&(0x7f0000011400)="000000000000000000000000000000000000000000160000000510ec", 0x1c, 0x201320}, {&(0x7f0000011500)="00000017000000020c60", 0xa, 0x201380}, {&(0x7f0000011600)}, {&(0x7f0000011b00)="0000000000000000000000000000000000000000000000000000000100000000d73cd47a0000000000100000000000000b000000000000000d0000001000000012000000170000001600000015000000ffffffffffffffffffffffffffffffffffffffff03000600000000000000000000000000140000000100000000000000ffffffffffffffffffffffffffffffffffffffff05000000000000000000000000000000c5010000060000000100000007000000070000000a00", 0xba, 0x204fe0}, {&(0x7f0000011c00)="0000000000000000000000000000000000000000000000000000000009f7a5bb", 0x20, 0x205fe0}, {0x0, 0x0, 0x401320}], 0x0, &(0x7f0000014b00)) 13:23:05 executing program 2: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffff, 0xffffffffffffffff, 0x0) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) read(r0, 0x0, 0x0) syz_mount_image$f2fs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x10, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}, {&(0x7f0000010500)='\x00\x00\x00\x00', 0x4, 0xc80}, {&(0x7f0000010700)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e00000010000003000000010000000200000018b2e346f95e497f827e0a", 0x77, 0x1400}, {0x0}, {&(0x7f0000010e00)="d73cd47a0000000000100000000000000b000000000000000d0000001000000012000000170000001600000015000000ffffffffffffffffffffffffffffffffffffffff03000600000000000000000000000000140000000100000000000000ffffffffffffffffffffffffffffffffffffffff05000000000000000000000000000000c5010000060000000100000007000000070000000a0000004000000040000000fc0f00"/181, 0xb5, 0x200000}, {&(0x7f0000010f00)="0000000000000000000000000000000000000000000000000000000009f7a5bb", 0x20, 0x200fe0}, {&(0x7f0000011000)="00000000000000000000000000000000000000000000000000000006", 0x1c, 0x2011e0}, {0x0, 0x0, 0x2012e0}, {&(0x7f0000011400)="000000000000000000000000000000000000000000160000000510ec", 0x1c, 0x201320}, {&(0x7f0000011500)="00000017000000020c60", 0xa, 0x201380}, {&(0x7f0000011600)}, {&(0x7f0000011800)}, {&(0x7f0000011b00)="0000000000000000000000000000000000000000000000000000000100000000d73cd47a0000000000100000000000000b000000000000000d0000001000000012000000170000001600000015000000ffffffffffffffffffffffffffffffffffffffff03000600000000000000000000000000140000000100000000000000ffffffffffffffffffffffffffffffffffffffff05", 0x95, 0x204fe0}, {&(0x7f0000011c00)="0000000000000000000000000000000000000000000000000000000009f7a5bb", 0x20, 0x205fe0}, {0x0}, {&(0x7f0000013000)="000000000000000000000100000001", 0xf, 0xa00000}], 0x0, &(0x7f0000014b00)) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='pids.events\x00', 0x275a, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x4, 0x2d, 0x9, 0x1, 0x0, 0x7fff, 0x88, 0x4, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x7, 0x0, @perf_bp={&(0x7f00000000c0), 0x1}, 0x9, 0x1, 0x4, 0x9, 0x0, 0xffff, 0x400, 0x0, 0x2, 0x0, 0x1000}, 0x0, 0xe, r1, 0xa) 13:23:05 executing program 4: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000002, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x31) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) waitid$P_PIDFD(0x3, r0, &(0x7f0000000500), 0x9, &(0x7f0000000580)) ptrace$cont(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='pids.events\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x12, r1, 0x0) ftruncate(r1, 0x1000673) ioctl$KDSKBENT(r1, 0x4b47, &(0x7f00000002c0)={0x2, 0x81, 0x5}) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x88400, 0x1a8) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0xd0265000) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) exit_group(0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x31, 0xffffffffffffffff, 0x0) time(&(0x7f0000000180)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14001500, 0x9, &(0x7f0000000300)=[{&(0x7f0000000080)="20001100000100000c190000ce1900000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800)) 13:23:05 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f00000025c0)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) ioctl$TUNSETLINK(r0, 0x40087602, 0x30a) [ 265.570431][T12189] EXT4-fs (loop5): bad geometry: block count 128 exceeds size of device (26 blocks) [ 265.589887][T12195] EXT4-fs (loop4): inodes count not valid: 1056800 vs 32 13:23:05 executing program 3: r0 = openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f00000025c0)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) ioctl$TUNSETLINK(r0, 0x40087602, 0x30a) [ 265.699900][T12189] EXT4-fs (loop5): bad geometry: block count 128 exceeds size of device (26 blocks) [ 265.707584][T12201] F2FS-fs (loop2): invalid crc_offset: 0 [ 265.712050][T12202] F2FS-fs (loop0): invalid crc_offset: 0 [ 265.732260][T12201] F2FS-fs (loop2): invalid crc_offset: 0 [ 265.743287][T12202] F2FS-fs (loop0): invalid crc_offset: 0 13:23:05 executing program 3: r0 = openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f00000025c0)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) ioctl$TUNSETLINK(r0, 0x40087602, 0x30a) 13:23:05 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xd300, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000660000000f000000000000000100000001000000004000000040000020000000daf4655fdaf4655f0100ffff53ef010001000000d9f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010100)}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000100000000000000000000000000000000000000000000003000000000000000", 0x40, 0x540}, {&(0x7f0000010300)="02000000030000000400000066000f000300040000000000000000000f007f5c", 0x20, 0x800}, {&(0x7f0000011500)="ed41000000080000d9f4655fdaf4655fdaf4655f000000000000040004", 0x1d, 0x2200}, {0x0}, {&(0x7f0000011900)="ed8100001a040000daf4655fdaf4655fdaf4655f000000000000010004000000000000000100000014000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000039c34d38000000000000000000000000000000000000000000000000200000007412ab417412ab417412ab41daf4655f7412ab410000000000000000", 0xa0, 0x3800}], 0x0, &(0x7f0000012c00)) 13:23:05 executing program 4: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000002, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x31) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) waitid$P_PIDFD(0x3, r0, &(0x7f0000000500), 0x9, &(0x7f0000000580)) ptrace$cont(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='pids.events\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x12, r1, 0x0) ftruncate(r1, 0x1000673) ioctl$KDSKBENT(r1, 0x4b47, &(0x7f00000002c0)={0x2, 0x81, 0x5}) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x88400, 0x1a8) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0xd0265000) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) exit_group(0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x31, 0xffffffffffffffff, 0x0) time(&(0x7f0000000180)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14001500, 0x9, &(0x7f0000000300)=[{&(0x7f0000000080)="20001200000100000c190000ce1900000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800)) 13:23:05 executing program 3: r0 = openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f00000025c0)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) ioctl$TUNSETLINK(r0, 0x40087602, 0x30a) [ 265.769309][T12202] F2FS-fs (loop0): Failed to get valid F2FS checkpoint [ 265.785532][T12201] F2FS-fs (loop2): Failed to get valid F2FS checkpoint 13:23:05 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r1 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) ioctl$TUNSETLINK(r0, 0x40087602, 0x30a) 13:23:05 executing program 1: clone(0x13102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) poll(0x0, 0x0, 0x8000000000000200) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f00000025c0)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00'}) syz_extract_tcp_res(&(0x7f0000000040)={0x41424344}, 0x800, 0x6) syz_emit_ethernet(0x156, &(0x7f0000002780)=ANY=[@ANYBLOB="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", @ANYRES32=0x41424344, @ANYRES32=r2, @ANYBLOB="5cc2000090780000"], 0x0) syz_emit_ethernet(0x3f1, &(0x7f00000002c0)=ANY=[@ANYBLOB="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", @ANYRES32=r2, @ANYRES32=0x41424344, @ANYBLOB="2020b588907800001e127f404debead4642dd0c90ccc0eaf9259220340001ed6009c177b090b9d83420fc2f9f6068d9ce5a99ac38ecc6d61e5a068b723e1e06b8b59d79d0ce03f2257e51957bc9e0d471b85375cf2e0010ad8e8785048eee236a13231219464101f0996f039950328871d1ffe7b7fd6f8d8a2e6d4526c0bfb927fa8e56d567d88e6636f1f822fcbb34ebaedda2c58648fe13ed80978528a79484990f7e919d0076e"], &(0x7f0000000100)={0x0, 0x1, [0xc47, 0xd99, 0x263, 0xb98]}) syz_emit_ethernet(0x10d6, &(0x7f0000000380)={@dev={'\xaa\xaa\xaa\xaa\xaa', 0x1a}, @empty, @void, {@ipv4={0x800, @tcp={{0x2a, 0x4, 0x1, 0x3, 0x10c8, 0x65, 0x0, 0x4, 0x6, 0x0, @rand_addr=0x64010102, @remote, {[@ssrr={0x89, 0x17, 0x33, [@private=0xa010101, @private=0xa010100, @broadcast, @dev={0xac, 0x14, 0x14, 0x1a}, @initdev={0xac, 0x1e, 0x0, 0x0}]}, @lsrr={0x83, 0xf, 0x2a, [@loopback, @empty, @remote]}, @rr={0x7, 0x7, 0x71, [@dev={0xac, 0x14, 0x14, 0xc}]}, @generic={0x82, 0x6, "27f5040b"}, @cipso={0x86, 0x4d, 0xffffffffffffffff, [{0x5, 0x4, "bb09"}, {0x0, 0xb, "dd61e13a7366a00450"}, {0x7, 0x11, "3c8902feb4ec3ab705e3571e9bc949"}, {0x0, 0x10, "9405eefc6834ecec8ab1127f50a2"}, {0x7, 0x12, "0d17dea32c65d4f2320266aec70dd178"}, {0x2, 0x5, "c23a96"}]}, @lsrr={0x83, 0xf, 0x34, [@multicast2, @remote, @local]}, @ra={0x94, 0x4, 0x1}]}}, {{0x4e20, 0x4e20, r2, 0x41424344, 0x0, 0x0, 0x8, 0x20, 0xfe00, 0x0, 0x3ff, {[@exp_smc={0xfe, 0x6}, @eol, @sack_perm={0x4, 0x2}, @sack_perm={0x4, 0x2}]}}, {"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"}}}}}}, &(0x7f0000000300)={0x1, 0x1, [0x79d, 0x13a, 0x86b, 0xb9c]}) syz_emit_ethernet(0xc2, &(0x7f0000001480)={@random="33e9b38d969a", @local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "bc3e24", 0x8c, 0x6, 0xff, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', @local, {[@fragment={0x73, 0x0, 0x5, 0x1, 0x0, 0x8, 0x68}], {{0x0, 0x0, 0x41424344, r2, 0x0, 0x0, 0x5}, {"73d2a75161b6559c6566d0cd0da0dcf5b4dfcc11214d9cfad9224352149ec1163ba5efa8c9a9c36394b9d44f2804811af55251add79891c29a94ca94158a22787df8f863f0ec4ecdbd01e0712e66f058056061a8124807a5885ae3e99f47f90dc82bdc6e16a68fea748524c36eda713b"}}}}}}}, 0x0) ioctl$TUNSETLINK(r0, 0x400454cd, 0x30a) r3 = openat$selinux_attr(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) mmap(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x6, 0x1010, r3, 0xdc5f7000) close(r0) r4 = socket$inet_tcp(0x2, 0x1, 0x0) preadv(r4, 0x0, 0x0, 0x7fffffff, 0x1) 13:23:05 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_mount_image$f2fs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0xe, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}, {&(0x7f0000010500)='\x00\x00\x00\x00', 0x4, 0xc80}, {&(0x7f0000010700)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e00000010000003000000010000000200000018b2e346f95e497f827e0a", 0x77, 0x1400}, {0x0}, {&(0x7f0000010e00)="d73cd47a0000000000100000000000000b000000000000000d0000001000000012000000170000001600000015000000ffffffffffffffffffffffffffffffffffffffff03000600000000000000000000000000140000000100000000000000ffffffffffffffffffffffffffffffffffffffff05000000000000000000000000000000c5010000060000000100000007000000070000000a0000004000000040000000fc0f00"/181, 0xb5, 0x200000}, {&(0x7f0000010f00)="0000000000000000000000000000000000000000000000000000000009f7a5bb", 0x20, 0x200fe0}, {&(0x7f0000011000)="00000000000000000000000000000000000000000000000000000006", 0x1c, 0x2011e0}, {0x0, 0x0, 0x2012e0}, {&(0x7f0000011400)="000000000000000000000000000000000000000000160000000510ec", 0x1c, 0x201320}, {&(0x7f0000011500)="00000017000000020c60", 0xa, 0x201380}, {&(0x7f0000011600)}, {&(0x7f0000011b00)="0000000000000000000000000000000000000000000000000000000100000000d73cd47a0000000000100000000000000b000000000000000d0000001000000012000000170000001600000015000000ffffffffffffffffffffffffffffffffffffffff03000600000000000000000000000000140000000100000000000000ffffffffffffffffffffffffffffffffffffffff05000000000000000000000000000000c5010000060000000100000007000000070000000a00", 0xba, 0x204fe0}, {&(0x7f0000011c00)="0000000000000000000000000000000000000000000000000000000009f7a5bb", 0x20, 0x205fe0}, {0x0, 0x0, 0x401320}], 0x0, &(0x7f0000014b00)) 13:23:05 executing program 2: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffff, 0xffffffffffffffff, 0x0) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) read(r0, 0x0, 0x0) syz_mount_image$f2fs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x10, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}, {&(0x7f0000010500)='\x00\x00\x00\x00', 0x4, 0xc80}, {&(0x7f0000010700)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e00000010000003000000010000000200000018b2e346f95e497f827e0a", 0x77, 0x1400}, {0x0}, {&(0x7f0000010e00)="d73cd47a0000000000100000000000000b000000000000000d0000001000000012000000170000001600000015000000ffffffffffffffffffffffffffffffffffffffff03000600000000000000000000000000140000000100000000000000ffffffffffffffffffffffffffffffffffffffff05000000000000000000000000000000c5010000060000000100000007000000070000000a0000004000000040000000fc0f00"/181, 0xb5, 0x200000}, {&(0x7f0000010f00)="0000000000000000000000000000000000000000000000000000000009f7a5bb", 0x20, 0x200fe0}, {&(0x7f0000011000)="00000000000000000000000000000000000000000000000000000006", 0x1c, 0x2011e0}, {0x0, 0x0, 0x2012e0}, {&(0x7f0000011400)="000000000000000000000000000000000000000000160000000510ec", 0x1c, 0x201320}, {&(0x7f0000011500)="00000017000000020c60", 0xa, 0x201380}, {&(0x7f0000011600)}, {&(0x7f0000011800)}, {&(0x7f0000011b00)="0000000000000000000000000000000000000000000000000000000100000000d73cd47a0000000000100000000000000b000000000000000d0000001000000012000000170000001600000015000000ffffffffffffffffffffffffffffffffffffffff03000600000000000000000000000000140000000100000000000000ffffffffffffffffffffffffffffffffffffffff05000000000000000000000000000000c5010000060000000100", 0xae, 0x204fe0}, {&(0x7f0000011c00)="0000000000000000000000000000000000000000000000000000000009f7a5bb", 0x20, 0x205fe0}, {0x0}, {&(0x7f0000013000)="000000000000000000000100000001", 0xf, 0xa00000}], 0x0, &(0x7f0000014b00)) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='pids.events\x00', 0x275a, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x4, 0x2d, 0x9, 0x1, 0x0, 0x7fff, 0x88, 0x4, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x7, 0x0, @perf_bp={&(0x7f00000000c0), 0x1}, 0x9, 0x1, 0x4, 0x9, 0x0, 0xffff, 0x400, 0x0, 0x2, 0x0, 0x1000}, 0x0, 0xe, r1, 0xa) 13:23:06 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r1 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) ioctl$TUNSETLINK(r0, 0x40087602, 0x30a) [ 265.915427][T12226] EXT4-fs (loop4): inodes count not valid: 1179680 vs 32 [ 265.930142][T12231] EXT4-fs (loop5): bad geometry: block count 128 exceeds size of device (26 blocks) 13:23:06 executing program 4: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000002, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x31) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) waitid$P_PIDFD(0x3, r0, &(0x7f0000000500), 0x9, &(0x7f0000000580)) ptrace$cont(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='pids.events\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x12, r1, 0x0) ftruncate(r1, 0x1000673) ioctl$KDSKBENT(r1, 0x4b47, &(0x7f00000002c0)={0x2, 0x81, 0x5}) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x88400, 0x1a8) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0xd0265000) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) exit_group(0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x31, 0xffffffffffffffff, 0x0) time(&(0x7f0000000180)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14001500, 0x9, &(0x7f0000000300)=[{&(0x7f0000000080)="20001400000100000c190000ce1900000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800)) 13:23:06 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r1 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) ioctl$TUNSETLINK(r0, 0x40087602, 0x30a) 13:23:06 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xd340, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000660000000f000000000000000100000001000000004000000040000020000000daf4655fdaf4655f0100ffff53ef010001000000d9f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010100)}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000100000000000000000000000000000000000000000000003000000000000000", 0x40, 0x540}, {&(0x7f0000010300)="02000000030000000400000066000f000300040000000000000000000f007f5c", 0x20, 0x800}, {&(0x7f0000011500)="ed41000000080000d9f4655fdaf4655fdaf4655f000000000000040004", 0x1d, 0x2200}, {0x0}, {&(0x7f0000011900)="ed8100001a040000daf4655fdaf4655fdaf4655f000000000000010004000000000000000100000014000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000039c34d38000000000000000000000000000000000000000000000000200000007412ab417412ab417412ab41daf4655f7412ab410000000000000000", 0xa0, 0x3800}], 0x0, &(0x7f0000012c00)) [ 266.028698][T12245] F2FS-fs (loop0): invalid crc_offset: 0 [ 266.034597][T12231] EXT4-fs (loop5): bad geometry: block count 128 exceeds size of device (26 blocks) [ 266.045686][T12245] F2FS-fs (loop0): invalid crc_offset: 0 [ 266.048399][T12242] F2FS-fs (loop2): invalid crc_offset: 0 [ 266.052240][T12245] F2FS-fs (loop0): Failed to get valid F2FS checkpoint [ 266.063670][T12242] F2FS-fs (loop2): invalid crc_offset: 0 [ 266.071840][T12242] F2FS-fs (loop2): Failed to get valid F2FS checkpoint 13:23:06 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f00000025c0)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) ioctl$TUNSETLINK(r0, 0x40087602, 0x30a) [ 266.107397][T12259] EXT4-fs (loop4): inodes count not valid: 1310752 vs 32 13:23:06 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_mount_image$f2fs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0xe, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}, {&(0x7f0000010500)='\x00\x00\x00\x00', 0x4, 0xc80}, {&(0x7f0000010700)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e00000010000003000000010000000200000018b2e346f95e497f827e0a", 0x77, 0x1400}, {0x0}, {&(0x7f0000010e00)="d73cd47a0000000000100000000000000b000000000000000d0000001000000012000000170000001600000015000000ffffffffffffffffffffffffffffffffffffffff03000600000000000000000000000000140000000100000000000000ffffffffffffffffffffffffffffffffffffffff05000000000000000000000000000000c5010000060000000100000007000000070000000a0000004000000040000000fc0f00"/181, 0xb5, 0x200000}, {&(0x7f0000010f00)="0000000000000000000000000000000000000000000000000000000009f7a5bb", 0x20, 0x200fe0}, {&(0x7f0000011000)="00000000000000000000000000000000000000000000000000000006", 0x1c, 0x2011e0}, {0x0, 0x0, 0x2012e0}, {&(0x7f0000011400)="000000000000000000000000000000000000000000160000000510ec", 0x1c, 0x201320}, {&(0x7f0000011500)="00000017000000020c60", 0xa, 0x201380}, {&(0x7f0000011600)}, {&(0x7f0000011b00)="0000000000000000000000000000000000000000000000000000000100000000d73cd47a0000000000100000000000000b000000000000000d0000001000000012000000170000001600000015000000ffffffffffffffffffffffffffffffffffffffff03000600000000000000000000000000140000000100000000000000ffffffffffffffffffffffffffffffffffffffff05000000000000000000000000000000c5010000060000000100000007000000070000000a00000040000000", 0xc0, 0x204fe0}, {&(0x7f0000011c00)="0000000000000000000000000000000000000000000000000000000009f7a5bb", 0x20, 0x205fe0}, {0x0, 0x0, 0x401320}], 0x0, &(0x7f0000014b00)) 13:23:06 executing program 4: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000002, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x31) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) waitid$P_PIDFD(0x3, r0, &(0x7f0000000500), 0x9, &(0x7f0000000580)) ptrace$cont(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='pids.events\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x12, r1, 0x0) ftruncate(r1, 0x1000673) ioctl$KDSKBENT(r1, 0x4b47, &(0x7f00000002c0)={0x2, 0x81, 0x5}) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x88400, 0x1a8) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0xd0265000) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) exit_group(0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x31, 0xffffffffffffffff, 0x0) time(&(0x7f0000000180)) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x14001500, 0x9, &(0x7f0000000300)=[{&(0x7f0000000080)="20001a00000100000c190000ce1900000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800)) 13:23:06 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f00000025c0)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) ioctl$TUNSETLINK(r0, 0x40087602, 0x30a) [ 266.232027][T12265] EXT4-fs (loop5): bad geometry: block count 128 exceeds size of device (26 blocks) 13:23:06 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f00000025c0)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) ioctl$TUNSETLINK(r0, 0x40087602, 0x30a) [ 266.391039][T12275] EXT4-fs (loop4): inodes count not valid: 1703968 vs 32 [ 266.398434][T12265] EXT4-fs (loop5): bad geometry: block count 128 exceeds size of device (26 blocks) [ 266.456917][T12273] F2FS-fs (loop0): invalid crc_offset: 0 [ 266.465037][T12273] F2FS-fs (loop0): invalid crc_offset: 0 [ 266.480164][T12273] F2FS-fs (loop0): Failed to get valid F2FS checkpoint [ 267.413044][ T91] device bridge_slave_1 left promiscuous mode [ 267.419166][ T91] bridge0: port 2(bridge_slave_1) entered disabled state [ 267.426608][ T91] device bridge_slave_0 left promiscuous mode [ 267.432866][ T91] bridge0: port 1(bridge_slave_0) entered disabled state [ 267.988098][T12289] cgroup1: Unknown subsys name 'perf_event' [ 267.994390][T12289] cgroup1: Unknown subsys name 'net_cls' [ 268.031761][T12289] bridge0: port 1(bridge_slave_0) entered blocking state [ 268.038824][T12289] bridge0: port 1(bridge_slave_0) entered disabled state [ 268.046977][T12289] device bridge_slave_0 entered promiscuous mode [ 268.062264][T12289] bridge0: port 2(bridge_slave_1) entered blocking state [ 268.069390][T12289] bridge0: port 2(bridge_slave_1) entered disabled state [ 268.076838][T12289] device bridge_slave_1 entered promiscuous mode [ 268.127218][ T395] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 268.134658][ T395] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 268.154386][ T395] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 268.162630][ T395] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 268.171583][ T395] bridge0: port 1(bridge_slave_0) entered blocking state [ 268.178628][ T395] bridge0: port 1(bridge_slave_0) entered forwarding state [ 268.186419][ T395] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 268.194773][ T395] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 268.202998][ T395] bridge0: port 2(bridge_slave_1) entered blocking state [ 268.209992][ T395] bridge0: port 2(bridge_slave_1) entered forwarding state [ 268.217508][ T395] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 268.225502][ T395] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 268.234333][ T395] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 268.245715][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 268.264483][ T1768] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 268.272424][ T1768] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 268.291158][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 268.300100][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 268.982895][ T91] device bridge_slave_1 left promiscuous mode [ 268.989103][ T91] bridge0: port 2(bridge_slave_1) entered disabled state [ 269.012946][ T91] device bridge_slave_0 left promiscuous mode [ 269.019097][ T91] bridge0: port 1(bridge_slave_0) entered disabled state [ 270.163665][T12299] cgroup1: Unknown subsys name 'perf_event' [ 270.169814][T12299] cgroup1: Unknown subsys name 'net_cls' [ 270.207503][T12299] bridge0: port 1(bridge_slave_0) entered blocking state [ 270.214690][T12299] bridge0: port 1(bridge_slave_0) entered disabled state [ 270.221980][T12299] device bridge_slave_0 entered promiscuous mode [ 270.229330][T12299] bridge0: port 2(bridge_slave_1) entered blocking state [ 270.236662][T12299] bridge0: port 2(bridge_slave_1) entered disabled state [ 270.244395][T12299] device bridge_slave_1 entered promiscuous mode [ 270.282041][T12299] bridge0: port 2(bridge_slave_1) entered blocking state [ 270.289072][T12299] bridge0: port 2(bridge_slave_1) entered forwarding state [ 270.296337][T12299] bridge0: port 1(bridge_slave_0) entered blocking state [ 270.303470][T12299] bridge0: port 1(bridge_slave_0) entered forwarding state [ 270.323613][ T675] bridge0: port 1(bridge_slave_0) entered disabled state [ 270.330903][ T675] bridge0: port 2(bridge_slave_1) entered disabled state [ 270.339686][ T675] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 270.347468][ T675] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 270.363104][ T675] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 270.371209][ T675] bridge0: port 1(bridge_slave_0) entered blocking state [ 270.378239][ T675] bridge0: port 1(bridge_slave_0) entered forwarding state [ 270.385699][ T675] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 270.394029][ T675] bridge0: port 2(bridge_slave_1) entered blocking state [ 270.401130][ T675] bridge0: port 2(bridge_slave_1) entered forwarding state [ 270.409086][ T675] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 270.417296][ T675] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 270.432478][ T101] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 270.452947][ T395] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 270.461273][ T395] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 270.469904][ T395] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 270.477912][ T395] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 271.222760][ T91] device bridge_slave_1 left promiscuous mode [ 271.228928][ T91] bridge0: port 2(bridge_slave_1) entered disabled state [ 271.256546][ T91] device bridge_slave_0 left promiscuous mode [ 271.266540][ T91] bridge0: port 1(bridge_slave_0) entered disabled state [ 272.368905][T12309] cgroup1: Unknown subsys name 'perf_event' [ 272.375059][T12309] cgroup1: Unknown subsys name 'net_cls' [ 272.412464][T12309] bridge0: port 1(bridge_slave_0) entered blocking state [ 272.419534][T12309] bridge0: port 1(bridge_slave_0) entered disabled state [ 272.427381][T12309] device bridge_slave_0 entered promiscuous mode [ 272.434527][T12309] bridge0: port 2(bridge_slave_1) entered blocking state [ 272.441525][T12309] bridge0: port 2(bridge_slave_1) entered disabled state [ 272.449144][T12309] device bridge_slave_1 entered promiscuous mode [ 272.486512][T12309] bridge0: port 2(bridge_slave_1) entered blocking state [ 272.493552][T12309] bridge0: port 2(bridge_slave_1) entered forwarding state [ 272.500764][T12309] bridge0: port 1(bridge_slave_0) entered blocking state [ 272.507782][T12309] bridge0: port 1(bridge_slave_0) entered forwarding state [ 272.528289][ T395] bridge0: port 1(bridge_slave_0) entered disabled state [ 272.535451][ T395] bridge0: port 2(bridge_slave_1) entered disabled state [ 272.543635][ T395] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 272.550993][ T395] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 272.560664][ T1768] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 272.568797][ T1768] bridge0: port 1(bridge_slave_0) entered blocking state [ 272.575809][ T1768] bridge0: port 1(bridge_slave_0) entered forwarding state [ 272.592883][ T395] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 272.600980][ T395] bridge0: port 2(bridge_slave_1) entered blocking state [ 272.608008][ T395] bridge0: port 2(bridge_slave_1) entered forwarding state [ 272.615431][ T395] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 272.623430][ T395] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 272.642586][ T1768] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 272.650981][ T1768] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 272.659083][ T1768] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 272.670970][ T395] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 272.682817][ T1768] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 273.413289][ T91] device bridge_slave_1 left promiscuous mode [ 273.419406][ T91] bridge0: port 2(bridge_slave_1) entered disabled state [ 273.426854][ T91] device bridge_slave_0 left promiscuous mode [ 273.433047][ T91] bridge0: port 1(bridge_slave_0) entered disabled state [ 274.451389][T12319] cgroup1: Unknown subsys name 'perf_event' [ 274.457565][T12319] cgroup1: Unknown subsys name 'net_cls' [ 274.495499][T12319] bridge0: port 1(bridge_slave_0) entered blocking state [ 274.502770][T12319] bridge0: port 1(bridge_slave_0) entered disabled state [ 274.510048][T12319] device bridge_slave_0 entered promiscuous mode [ 274.517244][T12319] bridge0: port 2(bridge_slave_1) entered blocking state [ 274.524469][T12319] bridge0: port 2(bridge_slave_1) entered disabled state [ 274.531784][T12319] device bridge_slave_1 entered promiscuous mode [ 274.570238][T12319] bridge0: port 2(bridge_slave_1) entered blocking state [ 274.577394][T12319] bridge0: port 2(bridge_slave_1) entered forwarding state [ 274.584708][T12319] bridge0: port 1(bridge_slave_0) entered blocking state [ 274.591707][T12319] bridge0: port 1(bridge_slave_0) entered forwarding state [ 274.611893][ T101] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 274.619970][ T101] bridge0: port 1(bridge_slave_0) entered disabled state [ 274.628369][ T101] bridge0: port 2(bridge_slave_1) entered disabled state [ 274.637687][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 274.645841][ T17] bridge0: port 1(bridge_slave_0) entered blocking state [ 274.652861][ T17] bridge0: port 1(bridge_slave_0) entered forwarding state [ 274.662417][ T101] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 274.670510][ T101] bridge0: port 2(bridge_slave_1) entered blocking state [ 274.677625][ T101] bridge0: port 2(bridge_slave_1) entered forwarding state [ 274.692932][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 274.700798][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 274.722744][ T1768] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 274.731018][ T1768] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 274.740334][ T1768] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 274.750956][ T101] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 274.762714][ T1768] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 275.452278][ T695] device bridge_slave_1 left promiscuous mode [ 275.458443][ T695] bridge0: port 2(bridge_slave_1) entered disabled state [ 275.476063][ T695] device bridge_slave_0 left promiscuous mode [ 275.492174][ T695] bridge0: port 1(bridge_slave_0) entered disabled state [ 276.620488][T12329] cgroup1: Unknown subsys name 'perf_event' [ 276.626915][T12329] cgroup1: Unknown subsys name 'net_cls' [ 276.664622][T12329] bridge0: port 1(bridge_slave_0) entered blocking state [ 276.671752][T12329] bridge0: port 1(bridge_slave_0) entered disabled state [ 276.679663][T12329] device bridge_slave_0 entered promiscuous mode [ 276.686687][T12329] bridge0: port 2(bridge_slave_1) entered blocking state [ 276.693957][T12329] bridge0: port 2(bridge_slave_1) entered disabled state [ 276.701272][T12329] device bridge_slave_1 entered promiscuous mode [ 276.739020][T12329] bridge0: port 2(bridge_slave_1) entered blocking state [ 276.746169][T12329] bridge0: port 2(bridge_slave_1) entered forwarding state [ 276.753496][T12329] bridge0: port 1(bridge_slave_0) entered blocking state [ 276.760497][T12329] bridge0: port 1(bridge_slave_0) entered forwarding state [ 276.780728][ T145] bridge0: port 1(bridge_slave_0) entered disabled state [ 276.787914][ T145] bridge0: port 2(bridge_slave_1) entered disabled state [ 276.796816][ T145] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 276.804589][ T145] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 276.813936][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 276.822206][ T17] bridge0: port 1(bridge_slave_0) entered blocking state [ 276.829207][ T17] bridge0: port 1(bridge_slave_0) entered forwarding state [ 276.852887][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 276.861164][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 276.869650][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 276.878517][ T17] bridge0: port 2(bridge_slave_1) entered blocking state [ 276.885546][ T17] bridge0: port 2(bridge_slave_1) entered forwarding state [ 276.892889][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 276.900766][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 276.919476][ T145] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 276.928039][ T145] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 276.936534][ T145] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 277.722145][ T695] device bridge_slave_1 left promiscuous mode [ 277.728268][ T695] bridge0: port 2(bridge_slave_1) entered disabled state [ 277.736281][ T695] device bridge_slave_0 left promiscuous mode [ 277.742841][ T695] bridge0: port 1(bridge_slave_0) entered disabled state [ 278.740685][T12339] cgroup1: Unknown subsys name 'perf_event' [ 278.746918][T12339] cgroup1: Unknown subsys name 'net_cls' [ 278.784463][T12339] bridge0: port 1(bridge_slave_0) entered blocking state [ 278.791477][T12339] bridge0: port 1(bridge_slave_0) entered disabled state [ 278.799459][T12339] device bridge_slave_0 entered promiscuous mode [ 278.806640][T12339] bridge0: port 2(bridge_slave_1) entered blocking state [ 278.813678][T12339] bridge0: port 2(bridge_slave_1) entered disabled state [ 278.821004][T12339] device bridge_slave_1 entered promiscuous mode [ 278.858808][T12339] bridge0: port 2(bridge_slave_1) entered blocking state [ 278.865853][T12339] bridge0: port 2(bridge_slave_1) entered forwarding state [ 278.873133][T12339] bridge0: port 1(bridge_slave_0) entered blocking state [ 278.880131][T12339] bridge0: port 1(bridge_slave_0) entered forwarding state [ 278.888092][ T1768] bridge0: port 1(bridge_slave_0) entered disabled state [ 278.895647][ T1768] bridge0: port 2(bridge_slave_1) entered disabled state [ 278.915406][ T1768] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 278.922997][ T1768] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 278.942051][ T1768] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 278.950262][ T1768] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 278.959118][ T1768] bridge0: port 1(bridge_slave_0) entered blocking state [ 278.966258][ T1768] bridge0: port 1(bridge_slave_0) entered forwarding state [ 278.973692][ T1768] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 278.982130][ T1768] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 278.990239][ T1768] bridge0: port 2(bridge_slave_1) entered blocking state [ 278.997295][ T1768] bridge0: port 2(bridge_slave_1) entered forwarding state [ 279.004604][ T1768] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 279.012667][ T1768] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 279.020574][ T1768] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 279.028632][ T1768] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 279.040178][ T384] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 279.048654][ T384] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 279.070610][ T101] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 279.078703][ T101] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 279.086939][ T101] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 279.096611][ T101] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 279.104938][ T101] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 279.113344][ T101] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 279.121592][ T101] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 279.129960][ T101] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 279.871820][ T91] device bridge_slave_1 left promiscuous mode [ 279.881794][ T91] bridge0: port 2(bridge_slave_1) entered disabled state [ 279.901946][ T91] device bridge_slave_0 left promiscuous mode [ 279.908084][ T91] bridge0: port 1(bridge_slave_0) entered disabled state [ 281.002540][T12349] cgroup1: Unknown subsys name 'perf_event' [ 281.008633][T12349] cgroup1: Unknown subsys name 'net_cls' [ 281.046508][T12349] bridge0: port 1(bridge_slave_0) entered blocking state [ 281.053692][T12349] bridge0: port 1(bridge_slave_0) entered disabled state [ 281.060994][T12349] device bridge_slave_0 entered promiscuous mode [ 281.068375][T12349] bridge0: port 2(bridge_slave_1) entered blocking state [ 281.075661][T12349] bridge0: port 2(bridge_slave_1) entered disabled state [ 281.083294][T12349] device bridge_slave_1 entered promiscuous mode [ 281.134675][ T1768] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 281.142150][ T1768] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 281.151294][ T395] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 281.159755][ T395] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 281.168055][ T395] bridge0: port 1(bridge_slave_0) entered blocking state [ 281.175086][ T395] bridge0: port 1(bridge_slave_0) entered forwarding state [ 281.182869][ T395] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 281.192619][ T1768] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 281.200872][ T1768] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 281.209588][ T1768] bridge0: port 2(bridge_slave_1) entered blocking state [ 281.216630][ T1768] bridge0: port 2(bridge_slave_1) entered forwarding state [ 281.232119][ T395] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 281.240130][ T395] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 281.262450][ T384] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 281.271987][ T384] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 281.279844][ T384] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 281.292897][ T395] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 281.301116][ T395] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 282.081786][ T695] device bridge_slave_1 left promiscuous mode [ 282.088073][ T695] bridge0: port 2(bridge_slave_1) entered disabled state [ 282.095486][ T695] device bridge_slave_0 left promiscuous mode [ 282.101696][ T695] bridge0: port 1(bridge_slave_0) entered disabled state [ 283.107311][T12359] cgroup1: Unknown subsys name 'perf_event' [ 283.113472][T12359] cgroup1: Unknown subsys name 'net_cls' [ 283.151193][T12359] bridge0: port 1(bridge_slave_0) entered blocking state [ 283.158256][T12359] bridge0: port 1(bridge_slave_0) entered disabled state [ 283.166333][T12359] device bridge_slave_0 entered promiscuous mode [ 283.173456][T12359] bridge0: port 2(bridge_slave_1) entered blocking state [ 283.180451][T12359] bridge0: port 2(bridge_slave_1) entered disabled state [ 283.188146][T12359] device bridge_slave_1 entered promiscuous mode [ 283.238461][ T1768] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 283.246150][ T1768] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 283.256100][ T384] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 283.264366][ T384] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 283.272582][ T384] bridge0: port 1(bridge_slave_0) entered blocking state [ 283.279580][ T384] bridge0: port 1(bridge_slave_0) entered forwarding state [ 283.287160][ T384] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 283.301901][ T1768] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 283.310128][ T1768] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 283.318580][ T1768] bridge0: port 2(bridge_slave_1) entered blocking state [ 283.325609][ T1768] bridge0: port 2(bridge_slave_1) entered forwarding state [ 283.333897][ T1768] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 283.341917][ T1768] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 283.356607][ T384] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 283.371695][ T384] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 283.379531][ T384] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 283.392043][ T145] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 283.404693][ T145] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 284.212368][ T91] device bridge_slave_1 left promiscuous mode [ 284.218531][ T91] bridge0: port 2(bridge_slave_1) entered disabled state [ 284.226556][ T91] device bridge_slave_0 left promiscuous mode [ 284.233073][ T91] bridge0: port 1(bridge_slave_0) entered disabled state [ 285.153382][T12369] cgroup1: Unknown subsys name 'perf_event' [ 285.159479][T12369] cgroup1: Unknown subsys name 'net_cls' [ 285.198079][T12369] bridge0: port 1(bridge_slave_0) entered blocking state [ 285.205139][T12369] bridge0: port 1(bridge_slave_0) entered disabled state [ 285.212864][T12369] device bridge_slave_0 entered promiscuous mode [ 285.219728][T12369] bridge0: port 2(bridge_slave_1) entered blocking state [ 285.227004][T12369] bridge0: port 2(bridge_slave_1) entered disabled state [ 285.234427][T12369] device bridge_slave_1 entered promiscuous mode [ 285.285925][ T101] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 285.294179][ T101] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 285.311623][ T101] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 285.319897][ T101] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 285.328545][ T101] bridge0: port 1(bridge_slave_0) entered blocking state [ 285.335703][ T101] bridge0: port 1(bridge_slave_0) entered forwarding state [ 285.343347][ T101] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 285.351701][ T101] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 285.359829][ T101] bridge0: port 2(bridge_slave_1) entered blocking state [ 285.366858][ T101] bridge0: port 2(bridge_slave_1) entered forwarding state [ 285.374323][ T101] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 285.382441][ T101] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 285.401864][ T101] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 285.410198][ T101] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 285.418316][ T101] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 285.427124][ T101] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 285.442637][ T395] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 285.451218][ T395] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 285.459618][ T395] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 286.131463][ T695] device bridge_slave_1 left promiscuous mode [ 286.137623][ T695] bridge0: port 2(bridge_slave_1) entered disabled state [ 286.154572][ T695] device bridge_slave_0 left promiscuous mode [ 286.160726][ T695] bridge0: port 1(bridge_slave_0) entered disabled state [ 287.245298][T12379] cgroup1: Unknown subsys name 'perf_event' [ 287.251451][T12379] cgroup1: Unknown subsys name 'net_cls' [ 287.288981][T12379] bridge0: port 1(bridge_slave_0) entered blocking state [ 287.296047][T12379] bridge0: port 1(bridge_slave_0) entered disabled state [ 287.303980][T12379] device bridge_slave_0 entered promiscuous mode [ 287.311578][T12379] bridge0: port 2(bridge_slave_1) entered blocking state [ 287.318592][T12379] bridge0: port 2(bridge_slave_1) entered disabled state [ 287.326155][T12379] device bridge_slave_1 entered promiscuous mode [ 287.376683][ T101] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 287.384131][ T101] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 287.393649][ T67] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 287.402107][ T67] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 287.410261][ T67] bridge0: port 1(bridge_slave_0) entered blocking state [ 287.417292][ T67] bridge0: port 1(bridge_slave_0) entered forwarding state [ 287.431962][ T67] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 287.439486][ T67] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 287.447840][ T67] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 287.456491][ T67] bridge0: port 2(bridge_slave_1) entered blocking state [ 287.463622][ T67] bridge0: port 2(bridge_slave_1) entered forwarding state [ 287.471319][ T67] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 287.479221][ T67] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 287.501932][ T1768] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 287.510420][ T1768] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 287.519606][ T1768] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 287.531465][ T101] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 287.539755][ T101] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 288.341237][ T91] device bridge_slave_1 left promiscuous mode [ 288.347400][ T91] bridge0: port 2(bridge_slave_1) entered disabled state [ 288.371379][ T91] device bridge_slave_0 left promiscuous mode [ 288.377518][ T91] bridge0: port 1(bridge_slave_0) entered disabled state [ 289.495847][T12389] cgroup1: Unknown subsys name 'perf_event' [ 289.501991][T12389] cgroup1: Unknown subsys name 'net_cls' [ 289.539847][T12389] bridge0: port 1(bridge_slave_0) entered blocking state [ 289.546940][T12389] bridge0: port 1(bridge_slave_0) entered disabled state [ 289.554807][T12389] device bridge_slave_0 entered promiscuous mode [ 289.562040][T12389] bridge0: port 2(bridge_slave_1) entered blocking state [ 289.569043][T12389] bridge0: port 2(bridge_slave_1) entered disabled state [ 289.576812][T12389] device bridge_slave_1 entered promiscuous mode [ 289.614708][T12389] bridge0: port 2(bridge_slave_1) entered blocking state [ 289.621831][T12389] bridge0: port 2(bridge_slave_1) entered forwarding state [ 289.629053][T12389] bridge0: port 1(bridge_slave_0) entered blocking state [ 289.636217][T12389] bridge0: port 1(bridge_slave_0) entered forwarding state [ 289.656870][ T395] bridge0: port 1(bridge_slave_0) entered disabled state [ 289.664770][ T395] bridge0: port 2(bridge_slave_1) entered disabled state [ 289.672728][ T395] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 289.680452][ T395] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 289.690228][ T1768] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 289.698405][ T1768] bridge0: port 1(bridge_slave_0) entered blocking state [ 289.705432][ T1768] bridge0: port 1(bridge_slave_0) entered forwarding state [ 289.721620][ T395] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 289.729739][ T395] bridge0: port 2(bridge_slave_1) entered blocking state [ 289.736801][ T395] bridge0: port 2(bridge_slave_1) entered forwarding state [ 289.744239][ T395] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 289.752351][ T395] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 289.765980][ T1768] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 289.781221][ T1768] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 289.789074][ T1768] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 289.802253][ T395] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 289.815006][ T384] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready 2021/09/06 13:23:30 executor 1 failed 11 times: executor 1: exit status 67 SYZFAIL: tun read failed (errno 22: Invalid argument) SYZFAIL: child failed (errno 0: Success) loop exited with status 67 [ 291.071244][ T91] device bridge_slave_1 left promiscuous mode [ 291.077409][ T91] bridge0: port 2(bridge_slave_1) entered disabled state [ 291.085654][ T91] device bridge_slave_0 left promiscuous mode [ 291.092365][ T91] bridge0: port 1(bridge_slave_0) entered disabled state