0x72f/0x8e0 [ 1198.998816][T30662] ? debug_smp_processor_id+0x20/0x20 [ 1199.004164][T30662] ? is_bpf_text_address+0x280/0x2a0 [ 1199.009418][T30662] ? stack_trace_save+0x1f0/0x1f0 [ 1199.014461][T30662] ? __kernel_text_address+0x93/0x100 [ 1199.019801][T30662] ? unwind_get_return_address+0x48/0x80 [ 1199.025414][T30662] ? __rcu_read_lock+0x50/0x50 [ 1199.030186][T30662] ? arch_stack_walk+0xf8/0x140 [ 1199.035005][T30662] ? memset+0x1f/0x40 [ 1199.038960][T30662] ? unwind_next_frame+0x1f0a/0x27b0 [ 1199.044214][T30662] ? arch_stack_walk+0xde/0x140 [ 1199.049039][T30662] ? _raw_spin_trylock_bh+0x1a0/0x1a0 [ 1199.054379][T30662] ? blkdev_get+0x390/0x390 [ 1199.058853][T30662] ? __rcu_read_lock+0x50/0x50 [ 1199.063621][T30662] ? _raw_spin_unlock+0x49/0x60 [ 1199.068448][T30662] ? entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1199.074486][T30662] ? mntput_no_expire+0x114/0xbd0 [ 1199.079478][T30662] ? stack_trace_save+0x1f0/0x1f0 [ 1199.084472][T30662] ? check_preemption_disabled+0x9e/0x330 [ 1199.090162][T30662] ? __rcu_read_lock+0x50/0x50 [ 1199.094897][T30662] ? __unwind_start+0x72f/0x8e0 [ 1199.099714][T30662] ? debug_smp_processor_id+0x20/0x20 [ 1199.105074][T30662] ? lo_release+0x1e0/0x1e0 [ 1199.109548][T30662] blkdev_ioctl+0x8f7/0x2ce0 [ 1199.114119][T30662] ? __kernel_text_address+0x93/0x100 [ 1199.119458][T30662] ? unwind_get_return_address+0x48/0x80 [ 1199.125058][T30662] ? __blkdev_driver_ioctl+0xd0/0xd0 [ 1199.130320][T30662] ? arch_stack_walk+0xf8/0x140 [ 1199.135140][T30662] ? __rcu_read_lock+0x50/0x50 [ 1199.139890][T30662] ? check_preemption_disabled+0x154/0x330 [ 1199.145672][T30662] ? avc_has_extended_perms+0x72a/0x1140 [ 1199.151272][T30662] ? avc_has_extended_perms+0xb5e/0x1140 [ 1199.156870][T30662] ? avc_ss_reset+0x3a0/0x3a0 [ 1199.161527][T30662] ? do_sys_open+0x62e/0x7c0 [ 1199.166095][T30662] block_ioctl+0xa8/0xe0 [ 1199.170328][T30662] ? blkdev_iopoll+0xf0/0xf0 [ 1199.174888][T30662] do_vfs_ioctl+0x76a/0x1720 [ 1199.179447][T30662] ? selinux_file_ioctl+0x72f/0x990 [ 1199.184625][T30662] ? ioctl_preallocate+0x250/0x250 [ 1199.189719][T30662] ? __fget+0x37b/0x3c0 [ 1199.193854][T30662] ? fget_many+0x20/0x20 [ 1199.198066][T30662] ? debug_smp_processor_id+0x20/0x20 [ 1199.203415][T30662] ? __x64_sys_pwrite64+0x1d9/0x240 [ 1199.208582][T30662] ? security_file_ioctl+0x9d/0xb0 [ 1199.213666][T30662] __x64_sys_ioctl+0xd4/0x110 [ 1199.218324][T30662] do_syscall_64+0xcb/0x1e0 [ 1199.222796][T30662] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1199.228662][T30662] RIP: 0033:0x7f2bd50b04f7 [ 1199.233053][T30662] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 64 55 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1199.252825][T30662] RSP: 002b:00007f2bd2e27f48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1199.261306][T30662] RAX: ffffffffffffffda RBX: 00007f2bd50facc0 RCX: 00007f2bd50b04f7 [ 1199.269268][T30662] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 1199.277227][T30662] RBP: 0000000000000005 R08: 0000000000000000 R09: ffffffffffffffff [ 1199.285291][T30662] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 1199.293236][T30662] R13: 0000000000000004 R14: 0000000020000260 R15: 0000000000000004 [ 1199.313588][T30650] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.5'. [ 1199.325002][T30650] netlink: 36 bytes leftover after parsing attributes in process `syz-executor.5'. 15:40:51 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000cc0)=ANY=[@ANYBLOB="7800000010000507000000bc4b9ccfc900000000", @ANYRES32, @ANYBLOB="4518000000000600500012800b0001006272696467650000400002800500250000000000060006008bbc00000800010013000000060009000020000005002b000700000005002b00810000000c002200010000000000000008000a00"], 0x78}}, 0x0) 15:40:51 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4f203, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) 15:40:51 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4f203, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000001004c0c000000d90000000f0000000100000000000000000000000020000000200000200000002cc4645f2cc4645f0100ffff53ef0100010000002cc4645f000000000000000001000000000000000b0000008000000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e3338363633343038350000000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000000000000000000000000000000000000d9ca5cac99fd4329af4dde786c1a5d13010040000c000000000000002cc4645f", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024", 0x29, 0x7e0}], 0x0, &(0x7f0000013000)) 15:40:51 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0xffffff81, &(0x7f00000004c0)={&(0x7f0000000cc0)=ANY=[@ANYBLOB="7800000010000507000000bc4b9ccfc900000000", @ANYRES32, @ANYBLOB="4518000000000000500012800b0001006272696467650000400002800500250000000188060006008bbc00000800010013000000060009000020000005002b000700000005002b00810000000c002200010000000000000008000a00"], 0x78}}, 0x0) 15:40:51 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000cc0)=ANY=[@ANYBLOB="7800000010000507000000bc4b9ccfc900000000", @ANYRES32, @ANYBLOB="4518000000000258500012800b0001006272696467650000400002800500250000000000060006008bbc00000800"], 0x78}}, 0x0) 15:40:51 executing program 4 (fault-call:0 fault-nth:25): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4f203, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d90000000f0000000100000000000000000000000020000000200000200000002cc4645f2cc4645f0100ffff53ef0100010000002cc4645f000000000000000001000000000000000b0000008000000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e3338363633343038350000000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000000000000000000000000000000000000d9ca5cac99fd4329af4dde786c1a5d13010040000c000000000000002cc4645f", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) 15:40:51 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4f203, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) [ 1199.354314][T30662] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue [ 1199.364119][T30662] ext4 filesystem being mounted at /root/syzkaller-testdir028365481/syzkaller.u34vxW/1298/file0 supports timestamps until 2038 (0x7fffffff) 15:40:51 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0xffffff81, &(0x7f00000004c0)={&(0x7f0000000cc0)=ANY=[@ANYBLOB="7800000010000507000000bc4b9ccfc900000000", @ANYRES32, @ANYBLOB="4518000000000000500012800b000100627269646765000040000280050025000000028a060006008bbc00000800010013000000060009000020000005002b000700000005002b00810000000c002200010000000000000008000a00"], 0x78}}, 0x0) 15:40:51 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4f203, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) 15:40:51 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4f203, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d90000000f0000000100000000000000020000000020000000200000200000002cc4645f2cc4645f0100ffff53ef0100010000002cc4645f000000000000000001000000000000000b0000008000000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e3338363633343038350000000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000000000000000000000000000000000000d9ca5cac99fd4329af4dde786c1a5d13010040000c000000000000002cc4645f", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) 15:40:51 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4f203, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) [ 1199.423146][T30673] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.5'. [ 1199.425264][T30671] EXT4-fs (loop3): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? [ 1199.444185][T30673] netlink: 36 bytes leftover after parsing attributes in process `syz-executor.5'. 15:40:51 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4f203, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d90000000f0000000100000000000000030000000020000000200000200000002cc4645f2cc4645f0100ffff53ef0100010000002cc4645f000000000000000001000000000000000b0000008000000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e3338363633343038350000000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000000000000000000000000000000000000d9ca5cac99fd4329af4dde786c1a5d13010040000c000000000000002cc4645f", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) [ 1199.484661][T30684] FAULT_INJECTION: forcing a failure. [ 1199.484661][T30684] name failslab, interval 1, probability 0, space 0, times 0 [ 1199.505278][T30684] CPU: 0 PID: 30684 Comm: syz-executor.4 Tainted: G W 5.4.125-syzkaller-00005-gb8b657d4d5e9 #0 [ 1199.517006][T30684] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1199.527046][T30684] Call Trace: [ 1199.530317][T30684] dump_stack+0x1d8/0x24e [ 1199.534620][T30684] ? devkmsg_release+0x11c/0x11c [ 1199.539528][T30684] ? show_regs_print_info+0x12/0x12 [ 1199.544707][T30684] should_fail+0x6f6/0x860 [ 1199.549096][T30684] ? setup_fault_attr+0x3d0/0x3d0 [ 1199.554087][T30684] ? kzalloc+0x1d/0x30 [ 1199.558126][T30684] should_failslab+0x5/0x20 [ 1199.562599][T30684] __kmalloc+0x5f/0x2f0 [ 1199.566724][T30684] kzalloc+0x1d/0x30 [ 1199.570586][T30684] kobject_get_path+0xb3/0x190 [ 1199.575362][T30684] kobject_uevent_env+0x269/0x1000 [ 1199.580451][T30684] ? try_to_wake_up+0xa69/0x12a0 [ 1199.585354][T30684] ? up_read+0x10/0x10 [ 1199.589394][T30684] loop_configure+0xea1/0x1380 [ 1199.594136][T30684] lo_ioctl+0x820/0x23b0 [ 1199.598360][T30684] ? lo_release+0x1e0/0x1e0 [ 1199.602832][T30684] ? update_blocked_averages+0x780/0x780 [ 1199.608435][T30684] ? unwind_get_return_address+0x48/0x80 [ 1199.614046][T30684] ? kvm_sched_clock_read+0x15/0x40 [ 1199.619210][T30684] ? sched_clock+0x36/0x40 [ 1199.623652][T30684] ? sched_clock_cpu+0x18/0x390 [ 1199.628503][T30684] ? check_preemption_disabled+0x9e/0x330 [ 1199.634197][T30684] ? debug_smp_processor_id+0x20/0x20 [ 1199.639590][T30684] ? check_preemption_disabled+0x9e/0x330 [ 1199.645285][T30684] ? _raw_spin_trylock_bh+0x1a0/0x1a0 [ 1199.650631][T30684] ? debug_smp_processor_id+0x20/0x20 [ 1199.656012][T30684] ? check_preemption_disabled+0x9e/0x330 [ 1199.661698][T30684] ? debug_smp_processor_id+0x20/0x20 [ 1199.667052][T30684] ? check_preemption_disabled+0x9e/0x330 [ 1199.672741][T30684] ? debug_smp_processor_id+0x20/0x20 [ 1199.678081][T30684] ? check_preemption_disabled+0x9e/0x330 [ 1199.683861][T30684] ? debug_smp_processor_id+0x20/0x20 [ 1199.689205][T30684] ? __rcu_read_lock+0x50/0x50 [ 1199.693936][T30684] ? cpuacct_charge+0xe5/0x160 [ 1199.698716][T30684] ? enqueue_entity+0xa8c/0xd10 [ 1199.703538][T30684] ? check_preemption_disabled+0x9e/0x330 [ 1199.709230][T30684] ? debug_smp_processor_id+0x20/0x20 [ 1199.714590][T30684] ? tracing_record_taskinfo+0xe8/0x280 [ 1199.720111][T30684] ? tracing_stop_tgid_record+0x90/0x90 [ 1199.725631][T30684] ? ttwu_do_wakeup+0x442/0x470 [ 1199.730496][T30684] ? refcount_sub_and_test_checked+0x1b6/0x290 [ 1199.736617][T30684] ? memset+0x1f/0x40 [ 1199.740566][T30684] ? unwind_next_frame+0x1f0a/0x27b0 [ 1199.745822][T30684] ? arch_stack_walk+0xde/0x140 [ 1199.750644][T30684] ? blkdev_get+0x390/0x390 [ 1199.755118][T30684] ? __rcu_read_lock+0x50/0x50 [ 1199.759847][T30684] ? _raw_spin_unlock+0x49/0x60 [ 1199.764665][T30684] ? entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1199.770764][T30684] ? mntput_no_expire+0x114/0xbd0 [ 1199.775759][T30684] ? stack_trace_save+0x1f0/0x1f0 [ 1199.780784][T30684] ? check_preemption_disabled+0x9e/0x330 [ 1199.786571][T30684] ? __rcu_read_lock+0x50/0x50 [ 1199.791303][T30684] ? __unwind_start+0x72f/0x8e0 [ 1199.796121][T30684] ? debug_smp_processor_id+0x20/0x20 [ 1199.801464][T30684] ? lo_release+0x1e0/0x1e0 [ 1199.805945][T30684] blkdev_ioctl+0x8f7/0x2ce0 [ 1199.810510][T30684] ? __kernel_text_address+0x93/0x100 [ 1199.815936][T30684] ? unwind_get_return_address+0x48/0x80 [ 1199.821537][T30684] ? __blkdev_driver_ioctl+0xd0/0xd0 [ 1199.826792][T30684] ? arch_stack_walk+0xf8/0x140 [ 1199.831616][T30684] ? __rcu_read_lock+0x50/0x50 [ 1199.836351][T30684] ? check_preemption_disabled+0x154/0x330 [ 1199.842125][T30684] ? avc_has_extended_perms+0x72a/0x1140 [ 1199.847725][T30684] ? avc_has_extended_perms+0xb5e/0x1140 [ 1199.853426][T30684] ? avc_ss_reset+0x3a0/0x3a0 [ 1199.858071][T30684] ? do_sys_open+0x62e/0x7c0 [ 1199.862651][T30684] block_ioctl+0xa8/0xe0 [ 1199.866871][T30684] ? blkdev_iopoll+0xf0/0xf0 [ 1199.871429][T30684] do_vfs_ioctl+0x76a/0x1720 [ 1199.876002][T30684] ? selinux_file_ioctl+0x72f/0x990 [ 1199.881171][T30684] ? ioctl_preallocate+0x250/0x250 [ 1199.886251][T30684] ? __fget+0x37b/0x3c0 [ 1199.890376][T30684] ? debug_smp_processor_id+0x20/0x20 [ 1199.895715][T30684] ? fget_many+0x20/0x20 [ 1199.899934][T30684] ? __fpregs_load_activate+0x1d7/0x3c0 [ 1199.905446][T30684] ? security_file_ioctl+0x9d/0xb0 [ 1199.910537][T30684] __x64_sys_ioctl+0xd4/0x110 [ 1199.915186][T30684] do_syscall_64+0xcb/0x1e0 [ 1199.919659][T30684] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1199.925530][T30684] RIP: 0033:0x7f2bd50b04f7 [ 1199.929926][T30684] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 64 55 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1199.949509][T30684] RSP: 002b:00007f2bd2e27f48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1199.957918][T30684] RAX: ffffffffffffffda RBX: 00007f2bd50facc0 RCX: 00007f2bd50b04f7 [ 1199.965866][T30684] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 1199.973898][T30684] RBP: 0000000000000005 R08: 0000000000000000 R09: ffffffffffffffff [ 1199.981837][T30684] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 1199.989777][T30684] R13: 0000000000000004 R14: 0000000020000260 R15: 0000000000000004 [ 1200.016979][T30671] EXT4-fs (loop3): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? [ 1200.028303][T30684] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue [ 1200.038026][T30684] ext4 filesystem being mounted at /root/syzkaller-testdir028365481/syzkaller.u34vxW/1299/file0 supports timestamps until 2038 (0x7fffffff) 15:40:51 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000cc0)=ANY=[@ANYBLOB="7800000010000507000000bc4b9ccfc900000000", @ANYRES32, @ANYBLOB="4518000000000700500012800b0001006272696467650000400002800500250000000000060006008bbc00000800010013000000060009000020000005002b000700000005002b00810000000c002200010000000000000008000a00"], 0x78}}, 0x0) 15:40:51 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4f203, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) 15:40:51 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000cc0)=ANY=[@ANYBLOB="7800000010000507000000bc4b9ccfc900000000", @ANYRES32, @ANYBLOB="4518000000000060500012800b0001006272696467650000400002800500250000000000060006008bbc00000800"], 0x78}}, 0x0) 15:40:51 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4f203, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024", 0x29, 0x7e0}], 0x0, &(0x7f0000013000)) 15:40:51 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0xffffff81, &(0x7f00000004c0)={&(0x7f0000000cc0)=ANY=[@ANYBLOB="7800000010000507000000bc4b9ccfc900000000", @ANYRES32, @ANYBLOB="4518000000000000500012800b00010062726964676500004000028005002500ffffff9e060006008bbc00000800010013000000060009000020000005002b000700000005002b00810000000c002200010000000000000008000a00"], 0x78}}, 0x0) 15:40:51 executing program 4 (fault-call:0 fault-nth:26): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4f203, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) 15:40:51 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4f203, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d90000000f0000000100000000000000040000000020000000200000200000002cc4645f2cc4645f0100ffff53ef0100010000002cc4645f000000000000000001000000000000000b0000008000000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e3338363633343038350000000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000000000000000000000000000000000000d9ca5cac99fd4329af4dde786c1a5d13010040000c000000000000002cc4645f", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) 15:40:52 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4f203, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) 15:40:52 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000cc0)=ANY=[@ANYBLOB="7800000010000507000000bc4b9ccfc900000000", @ANYRES32, @ANYBLOB="4518000000000068500012800b0001006272696467650000400002800500250000000000060006008bbc00000800"], 0x78}}, 0x0) 15:40:52 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4f203, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d90000000f0000000100000000000000060000000020000000200000200000002cc4645f2cc4645f0100ffff53ef0100010000002cc4645f000000000000000001000000000000000b0000008000000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e3338363633343038350000000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000000000000000000000000000000000000d9ca5cac99fd4329af4dde786c1a5d13010040000c000000000000002cc4645f", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) 15:40:52 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4f203, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) [ 1200.171087][T30703] EXT4-fs (loop3): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? [ 1200.172529][T30710] FAULT_INJECTION: forcing a failure. [ 1200.172529][T30710] name failslab, interval 1, probability 0, space 0, times 0 [ 1200.194410][T30710] CPU: 0 PID: 30710 Comm: syz-executor.4 Tainted: G W 5.4.125-syzkaller-00005-gb8b657d4d5e9 #0 [ 1200.206029][T30710] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1200.216081][T30710] Call Trace: 15:40:52 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4f203, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) [ 1200.219370][T30710] dump_stack+0x1d8/0x24e [ 1200.223693][T30710] ? devkmsg_release+0x11c/0x11c [ 1200.228625][T30710] ? vsnprintf+0x1cb4/0x1d60 [ 1200.233332][T30710] ? show_regs_print_info+0x12/0x12 [ 1200.238533][T30710] should_fail+0x6f6/0x860 [ 1200.242938][T30710] ? setup_fault_attr+0x3d0/0x3d0 [ 1200.247983][T30710] ? add_uevent_var+0x1c2/0x360 [ 1200.252813][T30710] ? call_usermodehelper_setup+0x91/0x200 [ 1200.258558][T30710] should_failslab+0x5/0x20 [ 1200.263044][T30710] kmem_cache_alloc_trace+0x39/0x2b0 [ 1200.268304][T30710] ? kobject_uevent_env+0x1000/0x1000 [ 1200.273656][T30710] call_usermodehelper_setup+0x91/0x200 [ 1200.279174][T30710] ? add_uevent_var+0x360/0x360 [ 1200.284044][T30710] kobject_uevent_env+0xdd6/0x1000 [ 1200.289128][T30710] ? up_read+0x10/0x10 [ 1200.293184][T30710] loop_configure+0xea1/0x1380 [ 1200.297934][T30710] lo_ioctl+0x820/0x23b0 [ 1200.302148][T30710] ? check_preemption_disabled+0x9e/0x330 [ 1200.307835][T30710] ? __rcu_read_lock+0x50/0x50 [ 1200.312565][T30710] ? __unwind_start+0x72f/0x8e0 [ 1200.317394][T30710] ? debug_smp_processor_id+0x20/0x20 [ 1200.322735][T30710] ? lo_release+0x1e0/0x1e0 [ 1200.327210][T30710] ? is_bpf_text_address+0x280/0x2a0 [ 1200.332465][T30710] ? stack_trace_save+0x1f0/0x1f0 [ 1200.337459][T30710] ? __kernel_text_address+0x93/0x100 [ 1200.342801][T30710] ? unwind_get_return_address+0x48/0x80 [ 1200.348417][T30710] ? memset+0x1f/0x40 [ 1200.352381][T30710] ? unwind_next_frame+0x1f0a/0x27b0 [ 1200.357634][T30710] ? arch_stack_walk+0xde/0x140 [ 1200.362467][T30710] ? preempt_count_add+0x66/0x130 [ 1200.367463][T30710] ? unwind_next_frame+0x1f0a/0x27b0 [ 1200.372724][T30710] ? entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1200.378767][T30710] ? unwind_get_return_address_ptr+0xa0/0xa0 [ 1200.384720][T30710] ? stack_trace_save+0x120/0x1f0 [ 1200.389734][T30710] ? unwind_get_return_address_ptr+0xa0/0xa0 [ 1200.395700][T30710] ? entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1200.401748][T30710] ? stack_trace_save+0x1f0/0x1f0 [ 1200.406745][T30710] ? check_preemption_disabled+0x9e/0x330 [ 1200.412438][T30710] ? __rcu_read_lock+0x50/0x50 [ 1200.417188][T30710] ? __unwind_start+0x72f/0x8e0 [ 1200.422017][T30710] ? debug_smp_processor_id+0x20/0x20 [ 1200.427360][T30710] ? is_bpf_text_address+0x280/0x2a0 [ 1200.432622][T30710] ? stack_trace_save+0x1f0/0x1f0 [ 1200.437642][T30710] ? __kernel_text_address+0x93/0x100 [ 1200.442990][T30710] ? unwind_get_return_address+0x48/0x80 [ 1200.448615][T30710] ? __rcu_read_lock+0x50/0x50 [ 1200.453361][T30710] ? arch_stack_walk+0xf8/0x140 [ 1200.458191][T30710] ? memset+0x1f/0x40 [ 1200.462144][T30710] ? unwind_next_frame+0x1f0a/0x27b0 [ 1200.467405][T30710] ? arch_stack_walk+0xde/0x140 [ 1200.472241][T30710] ? blkdev_get+0x390/0x390 [ 1200.476725][T30710] ? __rcu_read_lock+0x50/0x50 [ 1200.481466][T30710] ? _raw_spin_unlock+0x49/0x60 [ 1200.486292][T30710] ? entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1200.492342][T30710] ? mntput_no_expire+0x114/0xbd0 [ 1200.497337][T30710] ? stack_trace_save+0x1f0/0x1f0 [ 1200.502330][T30710] ? check_preemption_disabled+0x9e/0x330 [ 1200.508037][T30710] ? __rcu_read_lock+0x50/0x50 [ 1200.512790][T30710] ? __unwind_start+0x72f/0x8e0 [ 1200.517614][T30710] ? debug_smp_processor_id+0x20/0x20 [ 1200.522959][T30710] ? lo_release+0x1e0/0x1e0 [ 1200.527447][T30710] blkdev_ioctl+0x8f7/0x2ce0 [ 1200.532008][T30710] ? __kernel_text_address+0x93/0x100 [ 1200.537349][T30710] ? unwind_get_return_address+0x48/0x80 [ 1200.542970][T30710] ? __blkdev_driver_ioctl+0xd0/0xd0 [ 1200.548221][T30710] ? arch_stack_walk+0xf8/0x140 [ 1200.553060][T30710] ? __rcu_read_lock+0x50/0x50 [ 1200.557801][T30710] ? check_preemption_disabled+0x154/0x330 [ 1200.563583][T30710] ? avc_has_extended_perms+0x72a/0x1140 [ 1200.569194][T30710] ? avc_has_extended_perms+0xb5e/0x1140 [ 1200.574803][T30710] ? avc_ss_reset+0x3a0/0x3a0 [ 1200.579446][T30710] ? do_sys_open+0x62e/0x7c0 [ 1200.584012][T30710] block_ioctl+0xa8/0xe0 [ 1200.588226][T30710] ? blkdev_iopoll+0xf0/0xf0 [ 1200.592790][T30710] do_vfs_ioctl+0x76a/0x1720 [ 1200.597356][T30710] ? selinux_file_ioctl+0x72f/0x990 [ 1200.602527][T30710] ? ioctl_preallocate+0x250/0x250 [ 1200.607608][T30710] ? __fget+0x37b/0x3c0 [ 1200.611737][T30710] ? fget_many+0x20/0x20 [ 1200.615948][T30710] ? debug_smp_processor_id+0x20/0x20 [ 1200.621286][T30710] ? __x64_sys_pwrite64+0x1d9/0x240 [ 1200.626458][T30710] ? security_file_ioctl+0x9d/0xb0 [ 1200.631542][T30710] __x64_sys_ioctl+0xd4/0x110 [ 1200.636243][T30710] do_syscall_64+0xcb/0x1e0 [ 1200.640737][T30710] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1200.646598][T30710] RIP: 0033:0x7f2bd50b04f7 [ 1200.650999][T30710] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 64 55 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1200.670584][T30710] RSP: 002b:00007f2bd2e27f48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1200.678970][T30710] RAX: ffffffffffffffda RBX: 00007f2bd50facc0 RCX: 00007f2bd50b04f7 [ 1200.686911][T30710] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 1200.694865][T30710] RBP: 0000000000000005 R08: 0000000000000000 R09: ffffffffffffffff [ 1200.702828][T30710] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 1200.710976][T30710] R13: 0000000000000004 R14: 0000000020000260 R15: 0000000000000004 [ 1200.745734][T30710] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue [ 1200.754934][T30710] ext4 filesystem being mounted at /root/syzkaller-testdir028365481/syzkaller.u34vxW/1300/file0 supports timestamps until 2038 (0x7fffffff) [ 1200.787177][T30703] EXT4-fs (loop3): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? 15:40:52 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0xffffff81, &(0x7f00000004c0)={&(0x7f0000000cc0)=ANY=[@ANYBLOB="7800000010000507000000bc4b9ccfc900000000", @ANYRES32, @ANYBLOB="4518000000000000500012800b00010062726964676500004000028005002500000002a2060006008bbc00000800010013000000060009000020000005002b000700000005002b00810000000c002200010000000000000008000a00"], 0x78}}, 0x0) 15:40:52 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4f203, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) 15:40:52 executing program 4 (fault-call:0 fault-nth:27): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4f203, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) 15:40:52 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4f203, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100680c000000d90000000f0000000100000000000000000000000020000000200000200000002cc4645f2cc4645f0100ffff53ef0100010000002cc4645f000000000000000001000000000000000b0000008000000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e3338363633343038350000000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000000000000000000000000000000000000d9ca5cac99fd4329af4dde786c1a5d13010040000c000000000000002cc4645f", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024", 0x29, 0x7e0}], 0x0, &(0x7f0000013000)) 15:40:52 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000cc0)=ANY=[@ANYBLOB="7800000010000507000000bc4b9ccfc900000000", @ANYRES32, @ANYBLOB="4518000000000800500012800b0001006272696467650000400002800500250000000000060006008bbc00000800010013000000060009000020000005002b000700000005002b00810000000c002200010000000000000008000a00"], 0x78}}, 0x0) 15:40:52 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000cc0)=ANY=[@ANYBLOB="7800000010000507000000bc4b9ccfc900000000", @ANYRES32, @ANYBLOB="451800000000006c500012800b0001006272696467650000400002800500250000000000060006008bbc00000800"], 0x78}}, 0x0) 15:40:52 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4f203, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) 15:40:52 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4f203, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) [ 1200.903735][T30730] FAULT_INJECTION: forcing a failure. [ 1200.903735][T30730] name failslab, interval 1, probability 0, space 0, times 0 [ 1200.916901][T30730] CPU: 0 PID: 30730 Comm: syz-executor.4 Tainted: G W 5.4.125-syzkaller-00005-gb8b657d4d5e9 #0 [ 1200.928632][T30730] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1200.938681][T30730] Call Trace: [ 1200.941963][T30730] dump_stack+0x1d8/0x24e [ 1200.946285][T30730] ? devkmsg_release+0x11c/0x11c 15:40:52 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4f203, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) 15:40:52 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4f203, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) 15:40:52 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4f203, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) [ 1200.951220][T30730] ? show_regs_print_info+0x12/0x12 [ 1200.956412][T30730] ? vsnprintf+0x1d60/0x1d60 [ 1200.961000][T30730] should_fail+0x6f6/0x860 [ 1200.965415][T30730] ? setup_fault_attr+0x3d0/0x3d0 [ 1200.970434][T30730] ? vsnprintf+0x1cb4/0x1d60 [ 1200.975016][T30730] ? refcount_inc_not_zero_checked+0x1a1/0x280 [ 1200.981166][T30730] ? skb_clone+0x1b2/0x360 [ 1200.985573][T30730] should_failslab+0x5/0x20 [ 1200.990062][T30730] kmem_cache_alloc+0x36/0x290 [ 1200.994812][T30730] skb_clone+0x1b2/0x360 15:40:52 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4f203, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) [ 1200.999026][T30730] netlink_broadcast_filtered+0x5d1/0x10a0 [ 1201.004805][T30730] netlink_broadcast+0x35/0x50 [ 1201.009546][T30730] kobject_uevent_env+0xb1f/0x1000 [ 1201.014677][T30730] ? up_read+0x10/0x10 [ 1201.018716][T30730] loop_configure+0xea1/0x1380 [ 1201.023461][T30730] lo_ioctl+0x820/0x23b0 [ 1201.027698][T30730] ? check_preemption_disabled+0x9e/0x330 [ 1201.033412][T30730] ? __rcu_read_lock+0x50/0x50 [ 1201.038169][T30730] ? __unwind_start+0x72f/0x8e0 [ 1201.043011][T30730] ? debug_smp_processor_id+0x20/0x20 [ 1201.048377][T30730] ? lo_release+0x1e0/0x1e0 [ 1201.052865][T30730] ? is_bpf_text_address+0x280/0x2a0 [ 1201.058123][T30730] ? stack_trace_save+0x1f0/0x1f0 [ 1201.063124][T30730] ? __kernel_text_address+0x93/0x100 [ 1201.068473][T30730] ? unwind_get_return_address+0x48/0x80 [ 1201.074132][T30730] ? memset+0x1f/0x40 [ 1201.078087][T30730] ? unwind_next_frame+0x1f0a/0x27b0 [ 1201.083346][T30730] ? arch_stack_walk+0xde/0x140 [ 1201.088165][T30730] ? preempt_count_add+0x66/0x130 [ 1201.093160][T30730] ? unwind_next_frame+0x1f0a/0x27b0 [ 1201.098427][T30730] ? entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1201.104486][T30730] ? unwind_get_return_address_ptr+0xa0/0xa0 [ 1201.110489][T30730] ? stack_trace_save+0x120/0x1f0 [ 1201.115492][T30730] ? unwind_get_return_address_ptr+0xa0/0xa0 [ 1201.121509][T30730] ? entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1201.127563][T30730] ? stack_trace_save+0x1f0/0x1f0 [ 1201.132557][T30730] ? check_preemption_disabled+0x9e/0x330 [ 1201.138251][T30730] ? __rcu_read_lock+0x50/0x50 [ 1201.142982][T30730] ? __unwind_start+0x72f/0x8e0 [ 1201.147803][T30730] ? debug_smp_processor_id+0x20/0x20 [ 1201.153161][T30730] ? is_bpf_text_address+0x280/0x2a0 [ 1201.158424][T30730] ? stack_trace_save+0x1f0/0x1f0 [ 1201.163440][T30730] ? __kernel_text_address+0x93/0x100 [ 1201.168793][T30730] ? unwind_get_return_address+0x48/0x80 [ 1201.174409][T30730] ? __rcu_read_lock+0x50/0x50 [ 1201.179142][T30730] ? arch_stack_walk+0xf8/0x140 [ 1201.183972][T30730] ? memset+0x1f/0x40 [ 1201.187933][T30730] ? unwind_next_frame+0x1f0a/0x27b0 [ 1201.193203][T30730] ? arch_stack_walk+0xde/0x140 [ 1201.198041][T30730] ? blkdev_get+0x390/0x390 [ 1201.202521][T30730] ? __rcu_read_lock+0x50/0x50 [ 1201.207267][T30730] ? _raw_spin_unlock+0x49/0x60 [ 1201.212092][T30730] ? entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1201.218185][T30730] ? mntput_no_expire+0x114/0xbd0 [ 1201.223184][T30730] ? stack_trace_save+0x1f0/0x1f0 [ 1201.228212][T30730] ? check_preemption_disabled+0x9e/0x330 [ 1201.233904][T30730] ? __rcu_read_lock+0x50/0x50 [ 1201.238639][T30730] ? __unwind_start+0x72f/0x8e0 [ 1201.243459][T30730] ? debug_smp_processor_id+0x20/0x20 [ 1201.248801][T30730] ? lo_release+0x1e0/0x1e0 [ 1201.253277][T30730] blkdev_ioctl+0x8f7/0x2ce0 [ 1201.257887][T30730] ? __kernel_text_address+0x93/0x100 [ 1201.263228][T30730] ? unwind_get_return_address+0x48/0x80 [ 1201.268827][T30730] ? __blkdev_driver_ioctl+0xd0/0xd0 [ 1201.274079][T30730] ? arch_stack_walk+0xf8/0x140 [ 1201.278909][T30730] ? __rcu_read_lock+0x50/0x50 [ 1201.283704][T30730] ? check_preemption_disabled+0x154/0x330 [ 1201.289489][T30730] ? avc_has_extended_perms+0x72a/0x1140 [ 1201.295134][T30730] ? avc_has_extended_perms+0xb5e/0x1140 [ 1201.300734][T30730] ? avc_ss_reset+0x3a0/0x3a0 [ 1201.305378][T30730] ? do_sys_open+0x62e/0x7c0 [ 1201.309945][T30730] block_ioctl+0xa8/0xe0 [ 1201.314158][T30730] ? blkdev_iopoll+0xf0/0xf0 [ 1201.318749][T30730] do_vfs_ioctl+0x76a/0x1720 [ 1201.323319][T30730] ? selinux_file_ioctl+0x72f/0x990 [ 1201.328485][T30730] ? ioctl_preallocate+0x250/0x250 [ 1201.333566][T30730] ? __fget+0x37b/0x3c0 [ 1201.337689][T30730] ? fget_many+0x20/0x20 [ 1201.341902][T30730] ? debug_smp_processor_id+0x20/0x20 [ 1201.347242][T30730] ? __x64_sys_pwrite64+0x1d9/0x240 [ 1201.352410][T30730] ? security_file_ioctl+0x9d/0xb0 [ 1201.357489][T30730] __x64_sys_ioctl+0xd4/0x110 [ 1201.362144][T30730] do_syscall_64+0xcb/0x1e0 [ 1201.366620][T30730] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1201.372489][T30730] RIP: 0033:0x7f2bd50b04f7 [ 1201.376873][T30730] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 64 55 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1201.396980][T30730] RSP: 002b:00007f2bd2e27f48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1201.405367][T30730] RAX: ffffffffffffffda RBX: 00007f2bd50facc0 RCX: 00007f2bd50b04f7 [ 1201.413372][T30730] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 1201.421420][T30730] RBP: 0000000000000005 R08: 0000000000000000 R09: ffffffffffffffff [ 1201.429366][T30730] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 1201.437313][T30730] R13: 0000000000000004 R14: 0000000020000260 R15: 0000000000000004 [ 1201.454236][T30733] EXT4-fs (loop3): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? [ 1201.476180][T30730] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue [ 1201.485204][T30730] ext4 filesystem being mounted at /root/syzkaller-testdir028365481/syzkaller.u34vxW/1301/file0 supports timestamps until 2038 (0x7fffffff) 15:40:53 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0xffffff81, &(0x7f00000004c0)={&(0x7f0000000cc0)=ANY=[@ANYBLOB="7800000010000507000000bc4b9ccfc900000000", @ANYRES32, @ANYBLOB="4518000000000000500012800b00010062726964676500004000028005002500000002ae060006008bbc00000800010013000000060009000020000005002b000700000005002b00810000000c002200010000000000000008000a00"], 0x78}}, 0x0) 15:40:53 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4f203, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) 15:40:53 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000cc0)=ANY=[@ANYBLOB="7800000010000507000000bc4b9ccfc900000000", @ANYRES32, @ANYBLOB="451800000000026c500012800b0001006272696467650000400002800500250000000000060006008bbc00000800"], 0x78}}, 0x0) [ 1201.527277][T30733] EXT4-fs (loop3): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? 15:40:53 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4f203, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024", 0x29, 0x7e0}], 0x0, &(0x7f0000013000)) [ 1201.659364][T30766] EXT4-fs (loop3): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? 15:40:53 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000cc0)=ANY=[@ANYBLOB="7800000010000507000000bc4b9ccfc900000000", @ANYRES32, @ANYBLOB="4518000000000900500012800b0001006272696467650000400002800500250000000000060006008bbc00000800010013000000060009000020000005002b000700000005002b00810000000c002200010000000000000008000a00"], 0x78}}, 0x0) 15:40:53 executing program 4 (fault-call:0 fault-nth:28): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4f203, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d90000000f0000000100000000000000000000000020000000200000200000002cc4645f2cc4645f0100ffff53ef0100010000002cc4645f000000000000000001000000000000000b0000008000000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e3338363633343038350000000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000000000000000000000000000000000000d9ca5cac99fd4329af4dde786c1a5d13010040000c000000000000002cc4645f", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) 15:40:53 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4f203, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d90000000f0000000100000000000000110000000020000000200000200000002cc4645f2cc4645f0100ffff53ef0100010000002cc4645f000000000000000001000000000000000b0000008000000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e3338363633343038350000000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000000000000000000000000000000000000d9ca5cac99fd4329af4dde786c1a5d13010040000c000000000000002cc4645f", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) 15:40:53 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0xffffff81, &(0x7f00000004c0)={&(0x7f0000000cc0)=ANY=[@ANYBLOB="7800000010000507000000bc4b9ccfc900000000", @ANYRES32, @ANYBLOB="4518000000000000500012800b00010062726964676500004000028005002500000000b5060006008bbc00000800010013000000060009000020000005002b000700000005002b00810000000c002200010000000000000008000a00"], 0x78}}, 0x0) 15:40:53 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000cc0)=ANY=[@ANYBLOB="7800000010000507000000bc4b9ccfc900000000", @ANYRES32, @ANYBLOB="4518000000000074500012800b0001006272696467650000400002800500250000000000060006008bbc00000800"], 0x78}}, 0x0) 15:40:53 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4f203, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d90000000f0000000100000000000000120000000020000000200000200000002cc4645f2cc4645f0100ffff53ef0100010000002cc4645f000000000000000001000000000000000b0000008000000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e3338363633343038350000000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000000000000000000000000000000000000d9ca5cac99fd4329af4dde786c1a5d13010040000c000000000000002cc4645f", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) 15:40:53 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4f203, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) 15:40:53 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0xffffff81, &(0x7f00000004c0)={&(0x7f0000000cc0)=ANY=[@ANYBLOB="7800000010000507000000bc4b9ccfc900000000", @ANYRES32, @ANYBLOB="4518000000000000500012800b00010062726964676500004000028005002500000003be060006008bbc00000800010013000000060009000020000005002b000700000005002b00810000000c002200010000000000000008000a00"], 0x78}}, 0x0) [ 1201.715324][T30766] EXT4-fs (loop3): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? 15:40:53 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4f203, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024", 0x29, 0x7e0}], 0x0, &(0x7f0000013000)) 15:40:53 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4f203, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) 15:40:53 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4f203, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) 15:40:53 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4f203, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) [ 1201.779672][T30775] FAULT_INJECTION: forcing a failure. [ 1201.779672][T30775] name failslab, interval 1, probability 0, space 0, times 0 [ 1201.793576][T30775] CPU: 1 PID: 30775 Comm: syz-executor.4 Tainted: G W 5.4.125-syzkaller-00005-gb8b657d4d5e9 #0 [ 1201.805383][T30775] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1201.815428][T30775] Call Trace: [ 1201.818714][T30775] dump_stack+0x1d8/0x24e [ 1201.823039][T30775] ? devkmsg_release+0x11c/0x11c [ 1201.827969][T30775] ? vsnprintf+0x1cb4/0x1d60 [ 1201.832558][T30775] ? show_regs_print_info+0x12/0x12 [ 1201.837756][T30775] should_fail+0x6f6/0x860 [ 1201.842163][T30775] ? setup_fault_attr+0x3d0/0x3d0 [ 1201.847161][T30775] ? add_uevent_var+0x1c2/0x360 [ 1201.851984][T30775] ? call_usermodehelper_setup+0x91/0x200 [ 1201.857728][T30775] should_failslab+0x5/0x20 [ 1201.862207][T30775] kmem_cache_alloc_trace+0x39/0x2b0 [ 1201.867640][T30775] ? kobject_uevent_env+0x1000/0x1000 [ 1201.873060][T30775] call_usermodehelper_setup+0x91/0x200 [ 1201.878577][T30775] ? add_uevent_var+0x360/0x360 [ 1201.883394][T30775] kobject_uevent_env+0xdd6/0x1000 [ 1201.888476][T30775] ? up_read+0x10/0x10 [ 1201.892527][T30775] loop_configure+0xea1/0x1380 [ 1201.897273][T30775] lo_ioctl+0x820/0x23b0 [ 1201.901485][T30775] ? lo_release+0x1e0/0x1e0 [ 1201.905963][T30775] ? update_blocked_averages+0x780/0x780 [ 1201.911676][T30775] ? unwind_get_return_address+0x48/0x80 [ 1201.917285][T30775] ? kvm_sched_clock_read+0x15/0x40 [ 1201.922453][T30775] ? sched_clock+0x36/0x40 [ 1201.926839][T30775] ? sched_clock_cpu+0x18/0x390 [ 1201.931658][T30775] ? check_preemption_disabled+0x9e/0x330 [ 1201.937351][T30775] ? debug_smp_processor_id+0x20/0x20 [ 1201.942698][T30775] ? check_preemption_disabled+0x9e/0x330 [ 1201.948398][T30775] ? _raw_spin_trylock_bh+0x1a0/0x1a0 [ 1201.953744][T30775] ? debug_smp_processor_id+0x20/0x20 [ 1201.959097][T30775] ? __perf_event_task_sched_out+0x1092/0x11b0 [ 1201.965397][T30775] ? __perf_event_task_sched_in+0x57c/0x5e0 [ 1201.971263][T30775] ? perf_pmu_sched_task+0x430/0x430 [ 1201.976531][T30775] ? check_preemption_disabled+0x9e/0x330 [ 1201.982360][T30775] ? debug_smp_processor_id+0x20/0x20 [ 1201.987704][T30775] ? debug_smp_processor_id+0x20/0x20 [ 1201.993042][T30775] ? dequeue_entity+0x892/0xdf0 [ 1201.997876][T30775] ? _raw_spin_unlock_irq+0x4a/0x60 [ 1202.003045][T30775] ? finish_task_switch+0x130/0x550 [ 1202.008215][T30775] ? prepare_task_switch+0x4ac/0x580 [ 1202.013469][T30775] ? __schedule+0x9b8/0x1170 [ 1202.018025][T30775] ? stack_trace_save+0x1f0/0x1f0 [ 1202.023017][T30775] ? _raw_spin_lock+0xa3/0x1b0 [ 1202.027760][T30775] ? _raw_spin_trylock_bh+0x1a0/0x1a0 [ 1202.033106][T30775] ? schedule+0x152/0x1d0 [ 1202.037409][T30775] ? __mutex_lock+0xaee/0x1080 [ 1202.042190][T30775] ? memset+0x1f/0x40 [ 1202.046143][T30775] ? unwind_next_frame+0x1f0a/0x27b0 [ 1202.051412][T30775] ? arch_stack_walk+0xde/0x140 [ 1202.056423][T30775] ? blkdev_get+0x390/0x390 [ 1202.060957][T30775] ? __rcu_read_lock+0x50/0x50 [ 1202.065703][T30775] ? _raw_spin_unlock+0x49/0x60 [ 1202.070535][T30775] ? entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1202.076620][T30775] ? mntput_no_expire+0x114/0xbd0 [ 1202.081685][T30775] ? stack_trace_save+0x1f0/0x1f0 [ 1202.086685][T30775] ? check_preemption_disabled+0x9e/0x330 [ 1202.092417][T30775] ? __rcu_read_lock+0x50/0x50 [ 1202.097164][T30775] ? __unwind_start+0x72f/0x8e0 [ 1202.101986][T30775] ? debug_smp_processor_id+0x20/0x20 [ 1202.107505][T30775] ? lo_release+0x1e0/0x1e0 [ 1202.112039][T30775] blkdev_ioctl+0x8f7/0x2ce0 [ 1202.116602][T30775] ? __kernel_text_address+0x93/0x100 [ 1202.122016][T30775] ? unwind_get_return_address+0x48/0x80 [ 1202.127679][T30775] ? __blkdev_driver_ioctl+0xd0/0xd0 [ 1202.132933][T30775] ? arch_stack_walk+0xf8/0x140 [ 1202.137800][T30775] ? __rcu_read_lock+0x50/0x50 [ 1202.142552][T30775] ? check_preemption_disabled+0x154/0x330 [ 1202.148328][T30775] ? avc_has_extended_perms+0x72a/0x1140 [ 1202.153930][T30775] ? avc_has_extended_perms+0xb5e/0x1140 [ 1202.159529][T30775] ? avc_ss_reset+0x3a0/0x3a0 [ 1202.164176][T30775] ? do_sys_open+0x62e/0x7c0 [ 1202.168760][T30775] block_ioctl+0xa8/0xe0 [ 1202.173061][T30775] ? blkdev_iopoll+0xf0/0xf0 [ 1202.177620][T30775] do_vfs_ioctl+0x76a/0x1720 [ 1202.182181][T30775] ? selinux_file_ioctl+0x72f/0x990 [ 1202.187381][T30775] ? ioctl_preallocate+0x250/0x250 [ 1202.192477][T30775] ? __fget+0x37b/0x3c0 [ 1202.196692][T30775] ? debug_smp_processor_id+0x20/0x20 [ 1202.202031][T30775] ? fget_many+0x20/0x20 [ 1202.206249][T30775] ? __fpregs_load_activate+0x1d7/0x3c0 [ 1202.211769][T30775] ? security_file_ioctl+0x9d/0xb0 [ 1202.216855][T30775] __x64_sys_ioctl+0xd4/0x110 [ 1202.221506][T30775] do_syscall_64+0xcb/0x1e0 [ 1202.225982][T30775] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1202.231844][T30775] RIP: 0033:0x7f2bd50b04f7 [ 1202.236235][T30775] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 64 55 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1202.256013][T30775] RSP: 002b:00007f2bd2e27f48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1202.264404][T30775] RAX: ffffffffffffffda RBX: 00007f2bd50facc0 RCX: 00007f2bd50b04f7 [ 1202.272400][T30775] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 1202.280343][T30775] RBP: 0000000000000005 R08: 0000000000000000 R09: ffffffffffffffff [ 1202.288290][T30775] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 1202.296239][T30775] R13: 0000000000000004 R14: 0000000020000260 R15: 0000000000000004 [ 1202.321049][T30775] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue [ 1202.338207][T30775] ext4 filesystem being mounted at /root/syzkaller-testdir028365481/syzkaller.u34vxW/1302/file0 supports timestamps until 2038 (0x7fffffff) [ 1202.354992][T30798] EXT4-fs (loop3): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? 15:40:54 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000cc0)=ANY=[@ANYBLOB="7800000010000507000000bc4b9ccfc900000000", @ANYRES32, @ANYBLOB="4518000000000a00500012800b0001006272696467650000400002800500250000000000060006008bbc00000800010013000000060009000020000005002b000700000005002b00810000000c002200010000000000000008000a00"], 0x78}}, 0x0) 15:40:54 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4f203, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) 15:40:54 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000cc0)=ANY=[@ANYBLOB="7800000010000507000000bc4b9ccfc900000000", @ANYRES32, @ANYBLOB="451800000000007a500012800b0001006272696467650000400002800500250000000000060006008bbc00000800"], 0x78}}, 0x0) 15:40:54 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0xffffff81, &(0x7f00000004c0)={&(0x7f0000000cc0)=ANY=[@ANYBLOB="7800000010000507000000bc4b9ccfc900000000", @ANYRES32, @ANYBLOB="4518000000000000500012800b00010062726964676500004000028005002500000001cf060006008bbc00000800010013000000060009000020000005002b000700000005002b00810000000c002200010000000000000008000a00"], 0x78}}, 0x0) 15:40:54 executing program 4 (fault-call:0 fault-nth:29): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4f203, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) 15:40:54 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4f203, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024", 0x29, 0x7e0}], 0x0, &(0x7f0000013000)) [ 1202.443531][T30798] EXT4-fs (loop3): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? 15:40:54 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4f203, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) [ 1202.490829][T30810] __nla_validate_parse: 12 callbacks suppressed [ 1202.490835][T30810] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.5'. [ 1202.490871][T30808] FAULT_INJECTION: forcing a failure. [ 1202.490871][T30808] name failslab, interval 1, probability 0, space 0, times 0 [ 1202.497202][T30810] netlink: 36 bytes leftover after parsing attributes in process `syz-executor.5'. [ 1202.511800][T30808] CPU: 1 PID: 30808 Comm: syz-executor.4 Tainted: G W 5.4.125-syzkaller-00005-gb8b657d4d5e9 #0 [ 1202.539889][T30808] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1202.549936][T30808] Call Trace: [ 1202.553211][T30808] dump_stack+0x1d8/0x24e [ 1202.557519][T30808] ? devkmsg_release+0x11c/0x11c [ 1202.562430][T30808] ? show_regs_print_info+0x12/0x12 [ 1202.567601][T30808] ? block_ioctl+0xa8/0xe0 [ 1202.571991][T30808] should_fail+0x6f6/0x860 [ 1202.576407][T30808] ? setup_fault_attr+0x3d0/0x3d0 [ 1202.581429][T30808] ? ioctl_preallocate+0x250/0x250 [ 1202.586516][T30808] ? getname_flags+0xba/0x640 [ 1202.591178][T30808] should_failslab+0x5/0x20 [ 1202.595667][T30808] kmem_cache_alloc+0x36/0x290 [ 1202.600503][T30808] ? check_preemption_disabled+0x154/0x330 [ 1202.606284][T30808] getname_flags+0xba/0x640 [ 1202.610762][T30808] do_mkdirat+0x9e/0x330 [ 1202.614979][T30808] ? vfs_mkdir+0x5f0/0x5f0 [ 1202.619371][T30808] do_syscall_64+0xcb/0x1e0 [ 1202.623855][T30808] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1202.629721][T30808] RIP: 0033:0x7f2bd50af847 [ 1202.634112][T30808] Code: 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1202.653691][T30808] RSP: 002b:00007f2bd2e27fa8 EFLAGS: 00000213 ORIG_RAX: 0000000000000053 [ 1202.662076][T30808] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007f2bd50af847 [ 1202.670023][T30808] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000100 [ 1202.677983][T30808] RBP: 00007f2bd2e28040 R08: 0000000000000000 R09: ffffffffffffffff 15:40:54 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000cc0)=ANY=[@ANYBLOB="7800000010000507000000bc4b9ccfc900000000", @ANYRES32, @ANYBLOB="4518000000000b00500012800b0001006272696467650000400002800500250000000000060006008bbc00000800010013000000060009000020000005002b000700000005002b00810000000c002200010000000000000008000a00"], 0x78}}, 0x0) 15:40:54 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0xffffff81, &(0x7f00000004c0)={&(0x7f0000000cc0)=ANY=[@ANYBLOB="7800000010000507000000bc4b9ccfc900000000", @ANYRES32, @ANYBLOB="4518000000000000500012800b00010062726964676500004000028005002500ffffffea060006008bbc00000800010013000000060009000020000005002b000700000005002b00810000000c002200010000000000000008000a00"], 0x78}}, 0x0) 15:40:54 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4f203, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) 15:40:54 executing program 4 (fault-call:0 fault-nth:30): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4f203, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) 15:40:54 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4f203, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d90000000f0000000100000000000004800000000020000000200000200000002cc4645f2cc4645f0100ffff53ef0100010000002cc4645f000000000000000001000000000000000b0000008000000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e3338363633343038350000000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000000000000000000000000000000000000d9ca5cac99fd4329af4dde786c1a5d13010040000c000000000000002cc4645f", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) 15:40:54 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000cc0)=ANY=[@ANYBLOB="7800000010000507000000bc4b9ccfc900000000", @ANYRES32, @ANYBLOB="4518000000000081500012800b0001006272696467650000400002800500250000000000060006008bbc00000800"], 0x78}}, 0x0) 15:40:54 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4f203, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) [ 1202.685936][T30808] R10: 0000000000000000 R11: 0000000000000213 R12: 0000000020000000 [ 1202.693881][T30808] R13: 0000000020000100 R14: 00007f2bd2e28000 R15: 0000000020013000 [ 1202.730987][T30813] EXT4-fs (loop3): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? 15:40:54 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4f203, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) 15:40:54 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4f203, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) [ 1202.798370][T30813] EXT4-fs (loop3): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? [ 1202.811392][T30837] FAULT_INJECTION: forcing a failure. [ 1202.811392][T30837] name failslab, interval 1, probability 0, space 0, times 0 [ 1202.824309][T30837] CPU: 1 PID: 30837 Comm: syz-executor.4 Tainted: G W 5.4.125-syzkaller-00005-gb8b657d4d5e9 #0 [ 1202.835926][T30837] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1202.845973][T30837] Call Trace: [ 1202.849358][T30837] dump_stack+0x1d8/0x24e [ 1202.853675][T30837] ? devkmsg_release+0x11c/0x11c [ 1202.858591][T30837] ? show_regs_print_info+0x12/0x12 [ 1202.863770][T30837] should_fail+0x6f6/0x860 [ 1202.868175][T30837] ? setup_fault_attr+0x3d0/0x3d0 [ 1202.873271][T30837] ? ext4_alloc_inode+0x1d/0x620 [ 1202.878193][T30837] should_failslab+0x5/0x20 [ 1202.882668][T30837] kmem_cache_alloc+0x36/0x290 [ 1202.887416][T30837] ? set_qf_name+0x310/0x310 [ 1202.891992][T30837] ext4_alloc_inode+0x1d/0x620 [ 1202.896730][T30837] ? set_qf_name+0x310/0x310 [ 1202.901293][T30837] new_inode_pseudo+0x61/0x220 [ 1202.906030][T30837] new_inode+0x25/0x1d0 [ 1202.910247][T30837] ? memset+0x1f/0x40 [ 1202.914215][T30837] __ext4_new_inode+0x303/0x6190 [ 1202.919129][T30837] ? avc_has_perm_noaudit+0x30c/0x400 [ 1202.924481][T30837] ? ext4_read_inode_bitmap+0x1950/0x1950 [ 1202.930177][T30837] ? memset+0x1f/0x40 [ 1202.934134][T30837] ? __dquot_initialize+0x25e/0xe20 [ 1202.939327][T30837] ? avc_has_perm+0xd2/0x270 [ 1202.943890][T30837] ? avc_has_perm+0x173/0x270 [ 1202.948544][T30837] ? security_transition_sid+0x78/0x90 [ 1202.953977][T30837] ext4_mkdir+0x3ff/0x1580 [ 1202.958385][T30837] ? ext4_symlink+0xf00/0xf00 [ 1202.963055][T30837] ? filename_create+0x4c7/0x770 [ 1202.967969][T30837] ? generic_permission+0x13a/0x490 [ 1202.973143][T30837] ? security_inode_mkdir+0xdd/0x120 [ 1202.978401][T30837] vfs_mkdir+0x416/0x5f0 [ 1202.982619][T30837] do_mkdirat+0x1f0/0x330 [ 1202.986922][T30837] ? vfs_mkdir+0x5f0/0x5f0 [ 1202.991317][T30837] do_syscall_64+0xcb/0x1e0 [ 1202.995794][T30837] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1203.001657][T30837] RIP: 0033:0x7f2bd50af847 [ 1203.006043][T30837] Code: 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1203.025711][T30837] RSP: 002b:00007f2bd2e27fa8 EFLAGS: 00000213 ORIG_RAX: 0000000000000053 [ 1203.034095][T30837] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007f2bd50af847 15:40:54 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4f203, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) [ 1203.042043][T30837] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000100 [ 1203.050000][T30837] RBP: 00007f2bd2e28040 R08: 0000000000000000 R09: ffffffffffffffff [ 1203.057946][T30837] R10: 0000000000000000 R11: 0000000000000213 R12: 0000000020000000 [ 1203.065893][T30837] R13: 0000000020000100 R14: 00007f2bd2e28000 R15: 0000000020013000 15:40:54 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4f203, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024", 0x29, 0x7e0}], 0x0, &(0x7f0000013000)) 15:40:54 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4f203, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) [ 1203.093716][T30836] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.5'. [ 1203.106607][T30836] netlink: 36 bytes leftover after parsing attributes in process `syz-executor.5'. 15:40:55 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000cc0)=ANY=[@ANYBLOB="7800000010000507000000bc4b9ccfc900000000", @ANYRES32, @ANYBLOB="4518000000000c00500012800b0001006272696467650000400002800500250000000000060006008bbc00000800010013000000060009000020000005002b000700000005002b00810000000c002200010000000000000008000a00"], 0x78}}, 0x0) 15:40:55 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0xffffff81, &(0x7f00000004c0)={&(0x7f0000000cc0)=ANY=[@ANYBLOB="7800000010000507000000bc4b9ccfc900000000", @ANYRES32, @ANYBLOB="4518000000000000500012800b00010062726964676500004000028005002500000003ec060006008bbc00000800010013000000060009000020000005002b000700000005002b00810000000c002200010000000000000008000a00"], 0x78}}, 0x0) 15:40:55 executing program 4 (fault-call:0 fault-nth:31): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4f203, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d90000000f0000000100000000000000000000000020000000200000200000002cc4645f2cc4645f0100ffff53ef0100010000002cc4645f000000000000000001000000000000000b0000008000000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e3338363633343038350000000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000000000000000000000000000000000000d9ca5cac99fd4329af4dde786c1a5d13010040000c000000000000002cc4645f", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) 15:40:55 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000cc0)=ANY=[@ANYBLOB="7800000010000507000000bc4b9ccfc900000000", @ANYRES32, @ANYBLOB="4518000000000284500012800b0001006272696467650000400002800500250000000000060006008bbc00000800"], 0x78}}, 0x0) 15:40:55 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4f203, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) [ 1203.153523][T30846] EXT4-fs (loop3): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? [ 1203.215696][T30851] FAULT_INJECTION: forcing a failure. [ 1203.215696][T30851] name failslab, interval 1, probability 0, space 0, times 0 [ 1203.228465][T30851] CPU: 1 PID: 30851 Comm: syz-executor.4 Tainted: G W 5.4.125-syzkaller-00005-gb8b657d4d5e9 #0 [ 1203.228471][T30846] EXT4-fs (loop3): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? [ 1203.238790][T30859] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.5'. [ 1203.240079][T30851] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1203.240083][T30851] Call Trace: [ 1203.240100][T30851] dump_stack+0x1d8/0x24e [ 1203.240117][T30851] ? devkmsg_release+0x11c/0x11c [ 1203.273460][T30859] netlink: 36 bytes leftover after parsing attributes in process `syz-executor.5'. [ 1203.277044][T30851] ? show_regs_print_info+0x12/0x12 [ 1203.277062][T30851] should_fail+0x6f6/0x860 [ 1203.300775][T30851] ? setup_fault_attr+0x3d0/0x3d0 [ 1203.305776][T30851] ? security_inode_alloc+0x32/0x1d0 [ 1203.311036][T30851] should_failslab+0x5/0x20 [ 1203.315511][T30851] kmem_cache_alloc+0x36/0x290 [ 1203.320246][T30851] ? from_kuid_munged+0x3b0/0x3b0 [ 1203.325243][T30851] security_inode_alloc+0x32/0x1d0 [ 1203.330330][T30851] inode_init_always+0x387/0x810 [ 1203.335240][T30851] ? set_qf_name+0x310/0x310 [ 1203.339804][T30851] new_inode_pseudo+0x90/0x220 [ 1203.344541][T30851] new_inode+0x25/0x1d0 [ 1203.348666][T30851] ? memset+0x1f/0x40 [ 1203.352620][T30851] __ext4_new_inode+0x303/0x6190 [ 1203.357534][T30851] ? avc_has_perm_noaudit+0x30c/0x400 [ 1203.362881][T30851] ? ext4_read_inode_bitmap+0x1950/0x1950 [ 1203.368569][T30851] ? memset+0x1f/0x40 [ 1203.372529][T30851] ? __dquot_initialize+0x25e/0xe20 [ 1203.377696][T30851] ? avc_has_perm+0xd2/0x270 [ 1203.382257][T30851] ? avc_has_perm+0x173/0x270 [ 1203.386908][T30851] ? security_transition_sid+0x78/0x90 [ 1203.392338][T30851] ext4_mkdir+0x3ff/0x1580 [ 1203.396735][T30851] ? ext4_symlink+0xf00/0xf00 [ 1203.401385][T30851] ? filename_create+0x4c7/0x770 [ 1203.406292][T30851] ? generic_permission+0x13a/0x490 [ 1203.411463][T30851] ? security_inode_mkdir+0xdd/0x120 [ 1203.416720][T30851] vfs_mkdir+0x416/0x5f0 [ 1203.420936][T30851] do_mkdirat+0x1f0/0x330 [ 1203.425239][T30851] ? vfs_mkdir+0x5f0/0x5f0 [ 1203.429632][T30851] do_syscall_64+0xcb/0x1e0 [ 1203.434111][T30851] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1203.439976][T30851] RIP: 0033:0x7f2bd50af847 [ 1203.444367][T30851] Code: 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 15:40:55 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4f203, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) 15:40:55 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4f203, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000001ffe00c000000d90000000f0000000100000000000000000000000020000000200000200000002cc4645f2cc4645f0100ffff53ef0100010000002cc4645f000000000000000001000000000000000b0000008000000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e3338363633343038350000000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000000000000000000000000000000000000d9ca5cac99fd4329af4dde786c1a5d13010040000c000000000000002cc4645f", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024", 0x29, 0x7e0}], 0x0, &(0x7f0000013000)) 15:40:55 executing program 4 (fault-call:0 fault-nth:32): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4f203, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d90000000f0000000100000000000000000000000020000000200000200000002cc4645f2cc4645f0100ffff53ef0100010000002cc4645f000000000000000001000000000000000b0000008000000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e3338363633343038350000000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000000000000000000000000000000000000d9ca5cac99fd4329af4dde786c1a5d13010040000c000000000000002cc4645f", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) 15:40:55 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4f203, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) [ 1203.463938][T30851] RSP: 002b:00007f2bd2e27fa8 EFLAGS: 00000213 ORIG_RAX: 0000000000000053 [ 1203.472321][T30851] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007f2bd50af847 [ 1203.480270][T30851] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000100 [ 1203.488232][T30851] RBP: 00007f2bd2e28040 R08: 0000000000000000 R09: ffffffffffffffff [ 1203.496175][T30851] R10: 0000000000000000 R11: 0000000000000213 R12: 0000000020000000 [ 1203.504124][T30851] R13: 0000000020000100 R14: 00007f2bd2e28000 R15: 0000000020013000 15:40:55 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000cc0)=ANY=[@ANYBLOB="7800000010000507000000bc4b9ccfc900000000", @ANYRES32, @ANYBLOB="451800000000028a500012800b0001006272696467650000400002800500250000000000060006008bbc00000800"], 0x78}}, 0x0) 15:40:55 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4f203, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) 15:40:55 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0xffffff81, &(0x7f00000004c0)={&(0x7f0000000cc0)=ANY=[@ANYBLOB="7800000010000507000000bc4b9ccfc900000000", @ANYRES32, @ANYBLOB="4518000000000000500012800b00010062726964676500004000028005002500ffffffef060006008bbc00000800010013000000060009000020000005002b000700000005002b00810000000c002200010000000000000008000a00"], 0x78}}, 0x0) [ 1203.562083][T30866] EXT4-fs (loop3): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? [ 1203.621380][T30872] FAULT_INJECTION: forcing a failure. [ 1203.621380][T30872] name failslab, interval 1, probability 0, space 0, times 0 [ 1203.634032][T30872] CPU: 1 PID: 30872 Comm: syz-executor.4 Tainted: G W 5.4.125-syzkaller-00005-gb8b657d4d5e9 #0 [ 1203.645640][T30872] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1203.655673][T30872] Call Trace: [ 1203.658946][T30872] dump_stack+0x1d8/0x24e [ 1203.663253][T30872] ? devkmsg_release+0x11c/0x11c [ 1203.668162][T30872] ? show_regs_print_info+0x12/0x12 [ 1203.673333][T30872] should_fail+0x6f6/0x860 [ 1203.677721][T30872] ? setup_fault_attr+0x3d0/0x3d0 [ 1203.682720][T30872] ? security_inode_alloc+0x32/0x1d0 [ 1203.687978][T30872] should_failslab+0x5/0x20 [ 1203.692454][T30872] kmem_cache_alloc+0x36/0x290 [ 1203.697217][T30872] ? from_kuid_munged+0x3b0/0x3b0 [ 1203.702216][T30872] security_inode_alloc+0x32/0x1d0 [ 1203.707301][T30872] inode_init_always+0x387/0x810 [ 1203.712207][T30872] ? set_qf_name+0x310/0x310 [ 1203.716769][T30872] new_inode_pseudo+0x90/0x220 [ 1203.721507][T30872] new_inode+0x25/0x1d0 [ 1203.725637][T30872] ? memset+0x1f/0x40 [ 1203.729592][T30872] __ext4_new_inode+0x303/0x6190 [ 1203.734502][T30872] ? avc_has_perm_noaudit+0x30c/0x400 [ 1203.739854][T30872] ? ext4_read_inode_bitmap+0x1950/0x1950 [ 1203.745542][T30872] ? memset+0x1f/0x40 [ 1203.749500][T30872] ? __dquot_initialize+0x25e/0xe20 [ 1203.754669][T30872] ? avc_has_perm+0xd2/0x270 [ 1203.759229][T30872] ? avc_has_perm+0x173/0x270 [ 1203.763882][T30872] ? security_transition_sid+0x78/0x90 [ 1203.769310][T30872] ext4_mkdir+0x3ff/0x1580 [ 1203.773721][T30872] ? ext4_symlink+0xf00/0xf00 [ 1203.778374][T30872] ? filename_create+0x4c7/0x770 [ 1203.783283][T30872] ? generic_permission+0x13a/0x490 [ 1203.788459][T30872] ? security_inode_mkdir+0xdd/0x120 [ 1203.793719][T30872] vfs_mkdir+0x416/0x5f0 [ 1203.797938][T30872] do_mkdirat+0x1f0/0x330 [ 1203.802257][T30872] ? vfs_mkdir+0x5f0/0x5f0 [ 1203.806662][T30872] do_syscall_64+0xcb/0x1e0 [ 1203.811141][T30872] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1203.817003][T30872] RIP: 0033:0x7f2bd50af847 [ 1203.821392][T30872] Code: 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1203.840974][T30872] RSP: 002b:00007f2bd2e27fa8 EFLAGS: 00000213 ORIG_RAX: 0000000000000053 [ 1203.849374][T30872] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007f2bd50af847 [ 1203.857319][T30872] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000100 [ 1203.865366][T30872] RBP: 00007f2bd2e28040 R08: 0000000000000000 R09: ffffffffffffffff [ 1203.873310][T30872] R10: 0000000000000000 R11: 0000000000000213 R12: 0000000020000000 [ 1203.881256][T30872] R13: 0000000020000100 R14: 00007f2bd2e28000 R15: 0000000020013000 [ 1203.889361][T30873] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.5'. [ 1203.899068][T30873] netlink: 36 bytes leftover after parsing attributes in process `syz-executor.5'. [ 1203.958532][T30866] EXT4-fs (loop3): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? 15:40:56 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000cc0)=ANY=[@ANYBLOB="7800000010000507000000bc4b9ccfc900000000", @ANYRES32, @ANYBLOB="4518000000000d00500012800b0001006272696467650000400002800500250000000000060006008bbc00000800010013000000060009000020000005002b000700000005002b00810000000c002200010000000000000008000a00"], 0x78}}, 0x0) 15:40:56 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4f203, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) 15:40:56 executing program 4 (fault-call:0 fault-nth:33): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4f203, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) 15:40:56 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000cc0)=ANY=[@ANYBLOB="7800000010000507000000bc4b9ccfc900000000", @ANYRES32, @ANYBLOB="4518000000000099500012800b0001006272696467650000400002800500250000000000060006008bbc00000800"], 0x78}}, 0x0) 15:40:56 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0xffffff81, &(0x7f00000004c0)={&(0x7f0000000cc0)=ANY=[@ANYBLOB="7800000010000507000000bc4b9ccfc900000000", @ANYRES32, @ANYBLOB="4518000000000000500012800b00010062726964676500004000028005002500fffffff0060006008bbc00000800010013000000060009000020000005002b000700000005002b00810000000c002200010000000000000008000a00"], 0x78}}, 0x0) 15:40:56 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4f203, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024", 0x29, 0x7e0}], 0x0, &(0x7f0000013000)) 15:40:56 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4f203, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) [ 1204.184547][T30888] FAULT_INJECTION: forcing a failure. [ 1204.184547][T30888] name failslab, interval 1, probability 0, space 0, times 0 [ 1204.202762][T30888] CPU: 0 PID: 30888 Comm: syz-executor.4 Tainted: G W 5.4.125-syzkaller-00005-gb8b657d4d5e9 #0 [ 1204.205366][T30891] EXT4-fs (loop3): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? [ 1204.214421][T30888] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 15:40:56 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4f203, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) 15:40:56 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4f203, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d90000000f0000000100090000000000000000000020000000200000200000002cc4645f2cc4645f0100ffff53ef0100010000002cc4645f000000000000000001000000000000000b0000008000000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e3338363633343038350000000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000000000000000000000000000000000000d9ca5cac99fd4329af4dde786c1a5d13010040000c000000000000002cc4645f", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) 15:40:56 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4f203, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) [ 1204.214425][T30888] Call Trace: [ 1204.214445][T30888] dump_stack+0x1d8/0x24e [ 1204.214455][T30888] ? devkmsg_release+0x11c/0x11c [ 1204.214464][T30888] ? show_regs_print_info+0x12/0x12 [ 1204.214475][T30888] should_fail+0x6f6/0x860 [ 1204.214485][T30888] ? setup_fault_attr+0x3d0/0x3d0 [ 1204.214496][T30888] ? security_inode_alloc+0x32/0x1d0 [ 1204.214507][T30888] should_failslab+0x5/0x20 [ 1204.214517][T30888] kmem_cache_alloc+0x36/0x290 [ 1204.214526][T30888] ? from_kuid_munged+0x3b0/0x3b0 15:40:56 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4f203, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) 15:40:56 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4f203, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) [ 1204.214536][T30888] security_inode_alloc+0x32/0x1d0 [ 1204.214546][T30888] inode_init_always+0x387/0x810 [ 1204.214552][T30888] ? set_qf_name+0x310/0x310 [ 1204.214567][T30888] new_inode_pseudo+0x90/0x220 [ 1204.300601][T30888] new_inode+0x25/0x1d0 [ 1204.304753][T30888] ? memset+0x1f/0x40 [ 1204.308726][T30888] __ext4_new_inode+0x303/0x6190 [ 1204.313670][T30888] ? avc_has_perm_noaudit+0x30c/0x400 [ 1204.319039][T30888] ? ext4_read_inode_bitmap+0x1950/0x1950 [ 1204.324754][T30888] ? memset+0x1f/0x40 [ 1204.328726][T30888] ? __dquot_initialize+0x25e/0xe20 [ 1204.333902][T30888] ? avc_has_perm+0xd2/0x270 [ 1204.338461][T30888] ? avc_has_perm+0x173/0x270 [ 1204.343223][T30888] ? security_transition_sid+0x78/0x90 [ 1204.348654][T30888] ext4_mkdir+0x3ff/0x1580 [ 1204.353082][T30888] ? ext4_symlink+0xf00/0xf00 [ 1204.357734][T30888] ? filename_create+0x4c7/0x770 [ 1204.362689][T30888] ? generic_permission+0x13a/0x490 [ 1204.367857][T30888] ? security_inode_mkdir+0xdd/0x120 [ 1204.373130][T30888] vfs_mkdir+0x416/0x5f0 [ 1204.377353][T30888] do_mkdirat+0x1f0/0x330 [ 1204.381666][T30888] ? vfs_mkdir+0x5f0/0x5f0 [ 1204.386070][T30888] do_syscall_64+0xcb/0x1e0 [ 1204.390553][T30888] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1204.396429][T30888] RIP: 0033:0x7f2bd50af847 [ 1204.400813][T30888] Code: 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1204.420566][T30888] RSP: 002b:00007f2bd2e27fa8 EFLAGS: 00000213 ORIG_RAX: 0000000000000053 [ 1204.428945][T30888] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007f2bd50af847 [ 1204.436889][T30888] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000100 [ 1204.444837][T30888] RBP: 00007f2bd2e28040 R08: 0000000000000000 R09: ffffffffffffffff [ 1204.452783][T30888] R10: 0000000000000000 R11: 0000000000000213 R12: 0000000020000000 [ 1204.460726][T30888] R13: 0000000020000100 R14: 00007f2bd2e28000 R15: 0000000020013000 [ 1204.472392][T30889] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.5'. [ 1204.481629][T30889] netlink: 36 bytes leftover after parsing attributes in process `syz-executor.5'. [ 1204.545347][T30891] EXT4-fs (loop3): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? 15:40:56 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000cc0)=ANY=[@ANYBLOB="7800000010000507000000bc4b9ccfc900000000", @ANYRES32, @ANYBLOB="4518000000000e00500012800b0001006272696467650000400002800500250000000000060006008bbc00000800010013000000060009000020000005002b000700000005002b00810000000c002200010000000000000008000a00"], 0x78}}, 0x0) 15:40:56 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4f203, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) 15:40:56 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0xffffff81, &(0x7f00000004c0)={&(0x7f0000000cc0)=ANY=[@ANYBLOB="7800000010000507000000bc4b9ccfc900000000", @ANYRES32, @ANYBLOB="4518000000000000500012800b00010062726964676500004000028005002500000003f6060006008bbc00000800010013000000060009000020000005002b000700000005002b00810000000c002200010000000000000008000a00"], 0x78}}, 0x0) 15:40:56 executing program 4 (fault-call:0 fault-nth:34): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4f203, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) 15:40:56 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000cc0)=ANY=[@ANYBLOB="7800000010000507000000bc4b9ccfc900000000", @ANYRES32, @ANYBLOB="4518000000000299500012800b0001006272696467650000400002800500250000000000060006008bbc00000800"], 0x78}}, 0x0) 15:40:56 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4f203, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000102fc0c000000d90000000f0000000100000000000000000000000020000000200000200000002cc4645f2cc4645f0100ffff53ef0100010000002cc4645f000000000000000001000000000000000b0000008000000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e3338363633343038350000000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000000000000000000000000000000000000d9ca5cac99fd4329af4dde786c1a5d13010040000c000000000000002cc4645f", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024", 0x29, 0x7e0}], 0x0, &(0x7f0000013000)) 15:40:56 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4f203, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) [ 1204.639233][T30917] FAULT_INJECTION: forcing a failure. [ 1204.639233][T30917] name failslab, interval 1, probability 0, space 0, times 0 [ 1204.651896][T30917] CPU: 0 PID: 30917 Comm: syz-executor.4 Tainted: G W 5.4.125-syzkaller-00005-gb8b657d4d5e9 #0 [ 1204.663505][T30917] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1204.673635][T30917] Call Trace: [ 1204.676922][T30917] dump_stack+0x1d8/0x24e [ 1204.681249][T30917] ? devkmsg_release+0x11c/0x11c [ 1204.686181][T30917] ? show_regs_print_info+0x12/0x12 [ 1204.691370][T30917] ? preempt_count_add+0x66/0x130 [ 1204.696468][T30917] should_fail+0x6f6/0x860 [ 1204.700866][T30917] ? setup_fault_attr+0x3d0/0x3d0 [ 1204.705882][T30917] ? entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1204.711925][T30917] ? ebitmap_cmp+0x1b8/0x220 [ 1204.716490][T30917] ? mls_compute_context_len+0x7dd/0x810 [ 1204.722101][T30917] ? context_struct_to_string+0x43b/0x8b0 [ 1204.727798][T30917] should_failslab+0x5/0x20 [ 1204.732275][T30917] __kmalloc+0x5f/0x2f0 [ 1204.736407][T30917] context_struct_to_string+0x43b/0x8b0 [ 1204.741929][T30917] ? security_bounded_transition+0x560/0x560 [ 1204.747882][T30917] ? symhash+0xe0/0xe0 [ 1204.751926][T30917] ? hashtab_search+0x1bf/0x200 [ 1204.756837][T30917] context_add_hash+0x13f/0x270 [ 1204.761666][T30917] ? security_sid_to_context_inval+0x40/0x40 [ 1204.767618][T30917] ? mls_context_isvalid+0x98/0x380 [ 1204.772795][T30917] ? policydb_context_isvalid+0x1b6/0x400 [ 1204.778498][T30917] security_compute_sid+0x1142/0x1d00 [ 1204.783844][T30917] ? __rcu_read_lock+0x50/0x50 [ 1204.788594][T30917] ? security_transition_sid+0x90/0x90 [ 1204.794027][T30917] ? page_cache_prev_miss+0x3f0/0x3f0 [ 1204.799411][T30917] ? xas_load+0x4a6/0x4f0 [ 1204.803725][T30917] ? chksum_update+0x41/0x90 [ 1204.808297][T30917] ? crypto_shash_update+0x1ed/0x2b0 [ 1204.813650][T30917] security_transition_sid+0x78/0x90 [ 1204.818919][T30917] selinux_inode_init_security+0x4b7/0xaf0 [ 1204.824703][T30917] ? selinux_inode_free_security+0x1d0/0x1d0 [ 1204.830659][T30917] ? get_cached_acl+0x10e/0x130 [ 1204.835486][T30917] security_inode_init_security+0x15f/0x3a0 [ 1204.841351][T30917] ? posix_acl_create+0x15f/0x400 [ 1204.846349][T30917] ? ext4_init_security+0x40/0x40 [ 1204.851348][T30917] ? security_dentry_create_files_as+0xd0/0xd0 [ 1204.857473][T30917] ? ext4_init_acl+0x31e/0x360 [ 1204.862215][T30917] ? prandom_u32+0x21a/0x240 [ 1204.866783][T30917] __ext4_new_inode+0x4c66/0x6190 [ 1204.871786][T30917] ? ext4_read_inode_bitmap+0x1950/0x1950 [ 1204.877482][T30917] ? avc_has_perm+0x173/0x270 [ 1204.882133][T30917] ? security_transition_sid+0x78/0x90 [ 1204.887566][T30917] ext4_mkdir+0x3ff/0x1580 [ 1204.891960][T30917] ? ext4_symlink+0xf00/0xf00 [ 1204.896614][T30917] ? filename_create+0x4c7/0x770 [ 1204.901614][T30917] ? generic_permission+0x13a/0x490 [ 1204.906789][T30917] ? security_inode_mkdir+0xdd/0x120 [ 1204.912137][T30917] vfs_mkdir+0x416/0x5f0 [ 1204.916358][T30917] do_mkdirat+0x1f0/0x330 [ 1204.920662][T30917] ? vfs_mkdir+0x5f0/0x5f0 [ 1204.925054][T30917] do_syscall_64+0xcb/0x1e0 [ 1204.929551][T30917] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1204.935419][T30917] RIP: 0033:0x7f2bd50af847 [ 1204.939808][T30917] Code: 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1204.959403][T30917] RSP: 002b:00007f2bd2e27fa8 EFLAGS: 00000213 ORIG_RAX: 0000000000000053 [ 1204.967874][T30917] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007f2bd50af847 [ 1204.975821][T30917] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000100 15:40:56 executing program 4 (fault-call:0 fault-nth:35): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4f203, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) 15:40:56 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4f203, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) 15:40:56 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4f203, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) 15:40:56 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4f203, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) 15:40:56 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4f203, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) [ 1204.983880][T30917] RBP: 00007f2bd2e28040 R08: 0000000000000000 R09: ffffffffffffffff [ 1204.992258][T30917] R10: 0000000000000000 R11: 0000000000000213 R12: 0000000020000000 [ 1205.000205][T30917] R13: 0000000020000100 R14: 00007f2bd2e28000 R15: 0000000020013000 [ 1205.026342][T30921] EXT4-fs (loop3): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? [ 1205.175376][T30938] FAULT_INJECTION: forcing a failure. [ 1205.175376][T30938] name failslab, interval 1, probability 0, space 0, times 0 [ 1205.176306][T30921] EXT4-fs (loop3): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? [ 1205.188123][T30938] CPU: 1 PID: 30938 Comm: syz-executor.4 Tainted: G W 5.4.125-syzkaller-00005-gb8b657d4d5e9 #0 [ 1205.209853][T30938] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1205.219897][T30938] Call Trace: [ 1205.223173][T30938] dump_stack+0x1d8/0x24e [ 1205.227485][T30938] ? devkmsg_release+0x11c/0x11c [ 1205.232402][T30938] ? memset+0x1f/0x40 [ 1205.236358][T30938] ? show_regs_print_info+0x12/0x12 [ 1205.241530][T30938] ? __es_remove_extent+0xbba/0x23c0 [ 1205.246796][T30938] should_fail+0x6f6/0x860 [ 1205.251367][T30938] ? setup_fault_attr+0x3d0/0x3d0 [ 1205.256471][T30938] ? __kmalloc+0x174/0x2f0 [ 1205.260865][T30938] ? kcalloc+0x2b/0x40 [ 1205.264906][T30938] ? ext4_find_extent+0x269/0xd50 [ 1205.269903][T30938] ? ext4_ext_map_blocks+0x257/0x45b0 [ 1205.275249][T30938] ? ext4_map_blocks+0x3bd/0x2030 [ 1205.280333][T30938] ? ext4_bread+0x89/0x3b0 [ 1205.284840][T30938] ? ext4_mkdir+0x7b6/0x1580 [ 1205.289407][T30938] ? vfs_mkdir+0x416/0x5f0 [ 1205.293795][T30938] ? __es_insert_extent+0x789/0x1720 [ 1205.299052][T30938] should_failslab+0x5/0x20 [ 1205.303528][T30938] kmem_cache_alloc+0x36/0x290 [ 1205.308448][T30938] __es_insert_extent+0x789/0x1720 [ 1205.313533][T30938] ? _raw_write_lock+0xa3/0x170 [ 1205.318368][T30938] ? _raw_write_trylock+0x1b0/0x1b0 [ 1205.323541][T30938] ext4_es_insert_extent+0x2db/0x2c20 [ 1205.328887][T30938] ? ext4_es_scan_clu+0x290/0x290 [ 1205.333897][T30938] ? memset+0x1f/0x40 [ 1205.337867][T30938] ? _raw_read_unlock+0x21/0x40 [ 1205.342692][T30938] ? ext4_es_find_extent_range+0x4f/0x300 [ 1205.348385][T30938] ext4_ext_map_blocks+0x13e9/0x45b0 [ 1205.353648][T30938] ? ext4_ext_release+0x10/0x10 [ 1205.358471][T30938] ? check_preemption_disabled+0x9e/0x330 [ 1205.364161][T30938] ? debug_smp_processor_id+0x20/0x20 [ 1205.369518][T30938] ? __down_read+0xf1/0x210 [ 1205.373995][T30938] ? _raw_read_unlock+0x21/0x40 [ 1205.378820][T30938] ? ext4_es_lookup_extent+0x535/0x980 [ 1205.384252][T30938] ext4_map_blocks+0x3bd/0x2030 [ 1205.389077][T30938] ? prandom_u32+0x21a/0x240 [ 1205.393660][T30938] ? ext4_issue_zeroout+0x160/0x160 [ 1205.398833][T30938] ext4_getblk+0x116/0x500 [ 1205.403222][T30938] ? ext4_get_block_trans+0x5a0/0x5a0 [ 1205.408571][T30938] ext4_bread+0x89/0x3b0 [ 1205.412786][T30938] ? ext4_getblk+0x500/0x500 [ 1205.417350][T30938] ext4_append+0x153/0x2d0 [ 1205.421741][T30938] ext4_mkdir+0x7b6/0x1580 [ 1205.426143][T30938] ? ext4_symlink+0xf00/0xf00 [ 1205.430793][T30938] ? filename_create+0x4c7/0x770 [ 1205.435704][T30938] ? security_inode_mkdir+0xdd/0x120 [ 1205.440960][T30938] vfs_mkdir+0x416/0x5f0 [ 1205.445274][T30938] do_mkdirat+0x1f0/0x330 [ 1205.449579][T30938] ? vfs_mkdir+0x5f0/0x5f0 [ 1205.453987][T30938] do_syscall_64+0xcb/0x1e0 [ 1205.458465][T30938] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1205.464333][T30938] RIP: 0033:0x7f2bd50af847 [ 1205.468723][T30938] Code: 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1205.488298][T30938] RSP: 002b:00007f2bd2e27fa8 EFLAGS: 00000213 ORIG_RAX: 0000000000000053 [ 1205.496684][T30938] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007f2bd50af847 [ 1205.504630][T30938] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000100 [ 1205.512575][T30938] RBP: 00007f2bd2e28040 R08: 0000000000000000 R09: ffffffffffffffff [ 1205.520517][T30938] R10: 0000000000000000 R11: 0000000000000213 R12: 0000000020000000 [ 1205.528461][T30938] R13: 0000000020000100 R14: 00007f2bd2e28000 R15: 0000000020013000 [ 1205.554558][T30938] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue 15:40:57 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000cc0)=ANY=[@ANYBLOB="7800000010000507000000bc4b9ccfc900000000", @ANYRES32, @ANYBLOB="4518000000001000500012800b0001006272696467650000400002800500250000000000060006008bbc00000800010013000000060009000020000005002b000700000005002b00810000000c002200010000000000000008000a00"], 0x78}}, 0x0) 15:40:57 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4f203, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) 15:40:57 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000cc0)=ANY=[@ANYBLOB="7800000010000507000000bc4b9ccfc900000000", @ANYRES32, @ANYBLOB="451800000000029e500012800b0001006272696467650000400002800500250000000000060006008bbc00000800"], 0x78}}, 0x0) 15:40:57 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0xffffff81, &(0x7f00000004c0)={&(0x7f0000000cc0)=ANY=[@ANYBLOB="7800000010000507000000bc4b9ccfc900000000", @ANYRES32, @ANYBLOB="4518000000000000500012800b000100627269646765000040000280050025000000fffe060006008bbc00000800010013000000060009000020000005002b000700000005002b00810000000c002200010000000000000008000a00"], 0x78}}, 0x0) 15:40:57 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4f203, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024", 0x29, 0x7e0}], 0x0, &(0x7f0000013000)) 15:40:57 executing program 4 (fault-call:0 fault-nth:36): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4f203, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) [ 1205.563960][T30938] ext4 filesystem being mounted at /root/syzkaller-testdir028365481/syzkaller.u34vxW/1309/file0 supports timestamps until 2038 (0x7fffffff) 15:40:57 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4f203, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) 15:40:57 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4f203, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) 15:40:57 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4f203, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) 15:40:57 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000cc0)=ANY=[@ANYBLOB="7800000010000507000000bc4b9ccfc900000000", @ANYRES32, @ANYBLOB="451800000000039e500012800b0001006272696467650000400002800500250000000000060006008bbc00000800"], 0x78}}, 0x0) 15:40:57 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4f203, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) 15:40:57 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0xffffff81, &(0x7f00000004c0)={&(0x7f0000000cc0)=ANY=[@ANYBLOB="7800000010000507000000bc4b9ccfc900000000", @ANYRES32, @ANYBLOB="4518000000000000500012800b00010062726964676500004000028005002500fffffffe060006008bbc00000800010013000000060009000020000005002b000700000005002b00810000000c002200010000000000000008000a00"], 0x78}}, 0x0) [ 1205.669261][T30951] EXT4-fs (loop3): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? [ 1205.691443][T30962] FAULT_INJECTION: forcing a failure. [ 1205.691443][T30962] name failslab, interval 1, probability 0, space 0, times 0 [ 1205.708392][T30962] CPU: 0 PID: 30962 Comm: syz-executor.4 Tainted: G W 5.4.125-syzkaller-00005-gb8b657d4d5e9 #0 [ 1205.720110][T30962] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1205.730158][T30962] Call Trace: [ 1205.733432][T30962] dump_stack+0x1d8/0x24e [ 1205.737738][T30962] ? devkmsg_release+0x11c/0x11c [ 1205.742665][T30962] ? show_regs_print_info+0x12/0x12 [ 1205.747841][T30962] should_fail+0x6f6/0x860 [ 1205.752236][T30962] ? setup_fault_attr+0x3d0/0x3d0 [ 1205.757243][T30962] ? kcalloc+0x2b/0x40 [ 1205.761411][T30962] should_failslab+0x5/0x20 [ 1205.765884][T30962] __kmalloc+0x5f/0x2f0 [ 1205.770018][T30962] kcalloc+0x2b/0x40 [ 1205.773991][T30962] ext4_find_extent+0x269/0xd50 [ 1205.778830][T30962] ext4_ext_map_blocks+0x257/0x45b0 [ 1205.784016][T30962] ? ext4_ext_release+0x10/0x10 [ 1205.788844][T30962] ? check_preemption_disabled+0x9e/0x330 [ 1205.794539][T30962] ? debug_smp_processor_id+0x20/0x20 [ 1205.799888][T30962] ? ext4_es_lookup_extent+0x535/0x980 [ 1205.805322][T30962] ext4_map_blocks+0xa99/0x2030 [ 1205.810149][T30962] ? prandom_u32+0x21a/0x240 [ 1205.814718][T30962] ? ext4_issue_zeroout+0x160/0x160 [ 1205.819888][T30962] ext4_getblk+0x116/0x500 [ 1205.824278][T30962] ? ext4_get_block_trans+0x5a0/0x5a0 [ 1205.829625][T30962] ext4_bread+0x89/0x3b0 [ 1205.833842][T30962] ? ext4_getblk+0x500/0x500 [ 1205.838407][T30962] ext4_append+0x153/0x2d0 [ 1205.842797][T30962] ext4_mkdir+0x7b6/0x1580 [ 1205.847194][T30962] ? ext4_symlink+0xf00/0xf00 [ 1205.851843][T30962] ? filename_create+0x4c7/0x770 [ 1205.856762][T30962] ? security_inode_mkdir+0xdd/0x120 [ 1205.862039][T30962] vfs_mkdir+0x416/0x5f0 [ 1205.866267][T30962] do_mkdirat+0x1f0/0x330 [ 1205.870571][T30962] ? vfs_mkdir+0x5f0/0x5f0 [ 1205.874960][T30962] do_syscall_64+0xcb/0x1e0 [ 1205.879438][T30962] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1205.885309][T30962] RIP: 0033:0x7f2bd50af847 [ 1205.889700][T30962] Code: 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1205.909285][T30962] RSP: 002b:00007f2bd2e27fa8 EFLAGS: 00000213 ORIG_RAX: 0000000000000053 15:40:57 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000cc0)=ANY=[@ANYBLOB="7800000010000507000000bc4b9ccfc900000000", @ANYRES32, @ANYBLOB="4518000000001100500012800b0001006272696467650000400002800500250000000000060006008bbc00000800010013000000060009000020000005002b000700000005002b00810000000c002200010000000000000008000a00"], 0x78}}, 0x0) 15:40:57 executing program 4 (fault-call:0 fault-nth:37): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4f203, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) 15:40:57 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4f203, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024", 0x29, 0x7e0}], 0x0, &(0x7f0000013000)) 15:40:57 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4f203, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) 15:40:57 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4f203, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d90000000f0000000100000500000000000000000020000000200000200000002cc4645f2cc4645f0100ffff53ef0100010000002cc4645f000000000000000001000000000000000b0000008000000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e3338363633343038350000000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000000000000000000000000000000000000d9ca5cac99fd4329af4dde786c1a5d13010040000c000000000000002cc4645f", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) [ 1205.917668][T30962] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007f2bd50af847 [ 1205.925625][T30962] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000100 [ 1205.933583][T30962] RBP: 00007f2bd2e28040 R08: 0000000000000000 R09: ffffffffffffffff [ 1205.941527][T30962] R10: 0000000000000000 R11: 0000000000000213 R12: 0000000020000000 [ 1205.949559][T30962] R13: 0000000020000100 R14: 00007f2bd2e28000 R15: 0000000020013000 15:40:57 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4f203, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) 15:40:57 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000cc0)=ANY=[@ANYBLOB="7800000010000507000000bc4b9ccfc900000000", @ANYRES32, @ANYBLOB="45180000000002a1500012800b0001006272696467650000400002800500250000000000060006008bbc00000800"], 0x78}}, 0x0) 15:40:57 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0xffffff81, &(0x7f00000004c0)={&(0x7f0000000cc0)=ANY=[@ANYBLOB="7800000010000507000000bc4b9ccfc900000000", @ANYRES32, @ANYBLOB="4518000000000000500012800b0001006272696467650000400002800500250000000fff060006008bbc00000800010013000000060009000020000005002b000700000005002b00810000000c002200010000000000000008000a00"], 0x78}}, 0x0) [ 1206.038571][T30983] FAULT_INJECTION: forcing a failure. [ 1206.038571][T30983] name failslab, interval 1, probability 0, space 0, times 0 [ 1206.051356][T30983] CPU: 0 PID: 30983 Comm: syz-executor.4 Tainted: G W 5.4.125-syzkaller-00005-gb8b657d4d5e9 #0 [ 1206.062968][T30983] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1206.073004][T30983] Call Trace: [ 1206.076281][T30983] dump_stack+0x1d8/0x24e [ 1206.080588][T30983] ? devkmsg_release+0x11c/0x11c [ 1206.085509][T30983] ? memset+0x1f/0x40 [ 1206.089478][T30983] ? show_regs_print_info+0x12/0x12 [ 1206.094657][T30983] ? __es_remove_extent+0xbba/0x23c0 [ 1206.099923][T30983] should_fail+0x6f6/0x860 [ 1206.104317][T30983] ? setup_fault_attr+0x3d0/0x3d0 [ 1206.109312][T30983] ? __kmalloc+0x174/0x2f0 [ 1206.113700][T30983] ? kcalloc+0x2b/0x40 [ 1206.117739][T30983] ? ext4_find_extent+0x269/0xd50 [ 1206.122743][T30983] ? ext4_ext_map_blocks+0x257/0x45b0 [ 1206.128102][T30983] ? ext4_map_blocks+0x3bd/0x2030 [ 1206.133115][T30983] ? ext4_bread+0x89/0x3b0 [ 1206.137509][T30983] ? ext4_mkdir+0x7b6/0x1580 [ 1206.142079][T30983] ? vfs_mkdir+0x416/0x5f0 [ 1206.146472][T30983] ? __es_insert_extent+0x789/0x1720 [ 1206.151730][T30983] should_failslab+0x5/0x20 [ 1206.156207][T30983] kmem_cache_alloc+0x36/0x290 [ 1206.160945][T30983] __es_insert_extent+0x789/0x1720 [ 1206.166028][T30983] ? _raw_write_lock+0xa3/0x170 [ 1206.170851][T30983] ? _raw_write_trylock+0x1b0/0x1b0 [ 1206.176022][T30983] ext4_es_insert_extent+0x2db/0x2c20 [ 1206.181379][T30983] ? ext4_es_scan_clu+0x290/0x290 [ 1206.186378][T30983] ? memset+0x1f/0x40 [ 1206.190335][T30983] ? _raw_read_unlock+0x21/0x40 [ 1206.195156][T30983] ? ext4_es_find_extent_range+0x4f/0x300 [ 1206.200936][T30983] ext4_ext_map_blocks+0x13e9/0x45b0 [ 1206.206208][T30983] ? ext4_ext_release+0x10/0x10 [ 1206.211047][T30983] ? check_preemption_disabled+0x9e/0x330 [ 1206.216751][T30983] ? debug_smp_processor_id+0x20/0x20 [ 1206.222102][T30983] ? __down_read+0xf1/0x210 [ 1206.226582][T30983] ? _raw_read_unlock+0x21/0x40 [ 1206.231407][T30983] ? ext4_es_lookup_extent+0x535/0x980 [ 1206.236870][T30983] ext4_map_blocks+0x3bd/0x2030 [ 1206.241714][T30983] ? prandom_u32+0x21a/0x240 [ 1206.246292][T30983] ? ext4_issue_zeroout+0x160/0x160 [ 1206.251475][T30983] ext4_getblk+0x116/0x500 [ 1206.255867][T30983] ? ext4_get_block_trans+0x5a0/0x5a0 [ 1206.261214][T30983] ext4_bread+0x89/0x3b0 [ 1206.265431][T30983] ? ext4_getblk+0x500/0x500 [ 1206.269997][T30983] ext4_append+0x153/0x2d0 [ 1206.274388][T30983] ext4_mkdir+0x7b6/0x1580 [ 1206.278780][T30983] ? ext4_symlink+0xf00/0xf00 [ 1206.283430][T30983] ? filename_create+0x4c7/0x770 [ 1206.288342][T30983] ? security_inode_mkdir+0xdd/0x120 [ 1206.293600][T30983] vfs_mkdir+0x416/0x5f0 [ 1206.297816][T30983] do_mkdirat+0x1f0/0x330 [ 1206.302121][T30983] ? vfs_mkdir+0x5f0/0x5f0 [ 1206.306514][T30983] do_syscall_64+0xcb/0x1e0 [ 1206.310992][T30983] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1206.316859][T30983] RIP: 0033:0x7f2bd50af847 15:40:58 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4f203, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d90000000f0000000100000600000000000000000020000000200000200000002cc4645f2cc4645f0100ffff53ef0100010000002cc4645f000000000000000001000000000000000b0000008000000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e3338363633343038350000000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000000000000000000000000000000000000d9ca5cac99fd4329af4dde786c1a5d13010040000c000000000000002cc4645f", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) [ 1206.321249][T30983] Code: 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1206.340825][T30983] RSP: 002b:00007f2bd2e27fa8 EFLAGS: 00000213 ORIG_RAX: 0000000000000053 [ 1206.349206][T30983] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007f2bd50af847 [ 1206.357151][T30983] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000100 [ 1206.365096][T30983] RBP: 00007f2bd2e28040 R08: 0000000000000000 R09: ffffffffffffffff [ 1206.373040][T30983] R10: 0000000000000000 R11: 0000000000000213 R12: 0000000020000000 [ 1206.380990][T30983] R13: 0000000020000100 R14: 00007f2bd2e28000 R15: 0000000020013000 15:40:58 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000cc0)=ANY=[@ANYBLOB="7800000010000507000000bc4b9ccfc900000000", @ANYRES32, @ANYBLOB="45180000000003b0500012800b0001006272696467650000400002800500250000000000060006008bbc00000800"], 0x78}}, 0x0) 15:40:58 executing program 4 (fault-call:0 fault-nth:38): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4f203, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) 15:40:58 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4f203, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) [ 1206.410628][T30983] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue [ 1206.421148][T30983] ext4 filesystem being mounted at /root/syzkaller-testdir028365481/syzkaller.u34vxW/1311/file0 supports timestamps until 2038 (0x7fffffff) [ 1206.426915][T30984] EXT4-fs (loop3): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? [ 1206.525397][T30984] EXT4-fs (loop3): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? [ 1206.534485][T31003] FAULT_INJECTION: forcing a failure. [ 1206.534485][T31003] name failslab, interval 1, probability 0, space 0, times 0 [ 1206.548212][T31003] CPU: 1 PID: 31003 Comm: syz-executor.4 Tainted: G W 5.4.125-syzkaller-00005-gb8b657d4d5e9 #0 [ 1206.559993][T31003] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1206.570054][T31003] Call Trace: [ 1206.573342][T31003] dump_stack+0x1d8/0x24e [ 1206.577646][T31003] ? devkmsg_release+0x11c/0x11c [ 1206.582555][T31003] ? memset+0x1f/0x40 [ 1206.586509][T31003] ? show_regs_print_info+0x12/0x12 [ 1206.591688][T31003] ? __es_remove_extent+0xdce/0x23c0 [ 1206.596948][T31003] should_fail+0x6f6/0x860 [ 1206.601337][T31003] ? setup_fault_attr+0x3d0/0x3d0 [ 1206.606335][T31003] ? __es_insert_extent+0x789/0x1720 [ 1206.611690][T31003] should_failslab+0x5/0x20 [ 1206.616341][T31003] kmem_cache_alloc+0x36/0x290 [ 1206.621079][T31003] __es_insert_extent+0x789/0x1720 [ 1206.626165][T31003] ? _raw_write_trylock+0x1b0/0x1b0 [ 1206.631336][T31003] ext4_es_insert_extent+0x2db/0x2c20 [ 1206.636691][T31003] ? ext4_es_scan_clu+0x290/0x290 [ 1206.641706][T31003] ? ext4_es_lookup_extent+0x535/0x980 [ 1206.647139][T31003] ext4_map_blocks+0xf38/0x2030 [ 1206.651962][T31003] ? prandom_u32+0x21a/0x240 [ 1206.656526][T31003] ? ext4_issue_zeroout+0x160/0x160 [ 1206.661700][T31003] ext4_getblk+0x116/0x500 [ 1206.666088][T31003] ? ext4_get_block_trans+0x5a0/0x5a0 [ 1206.671433][T31003] ext4_bread+0x89/0x3b0 [ 1206.675648][T31003] ? ext4_getblk+0x500/0x500 [ 1206.680211][T31003] ext4_append+0x153/0x2d0 [ 1206.684603][T31003] ext4_mkdir+0x7b6/0x1580 [ 1206.688996][T31003] ? ext4_symlink+0xf00/0xf00 [ 1206.693658][T31003] ? filename_create+0x4c7/0x770 [ 1206.698567][T31003] ? security_inode_mkdir+0xdd/0x120 [ 1206.703826][T31003] vfs_mkdir+0x416/0x5f0 [ 1206.708048][T31003] do_mkdirat+0x1f0/0x330 [ 1206.712352][T31003] ? vfs_mkdir+0x5f0/0x5f0 [ 1206.716742][T31003] do_syscall_64+0xcb/0x1e0 [ 1206.721222][T31003] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1206.727087][T31003] RIP: 0033:0x7f2bd50af847 [ 1206.731479][T31003] Code: 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1206.751052][T31003] RSP: 002b:00007f2bd2e27fa8 EFLAGS: 00000213 ORIG_RAX: 0000000000000053 [ 1206.759438][T31003] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007f2bd50af847 [ 1206.767384][T31003] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000100 [ 1206.775329][T31003] RBP: 00007f2bd2e28040 R08: 0000000000000000 R09: ffffffffffffffff [ 1206.783274][T31003] R10: 0000000000000000 R11: 0000000000000213 R12: 0000000020000000 [ 1206.791218][T31003] R13: 0000000020000100 R14: 00007f2bd2e28000 R15: 0000000020013000 15:40:58 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000cc0)=ANY=[@ANYBLOB="7800000010000507000000bc4b9ccfc900000000", @ANYRES32, @ANYBLOB="4518000000001200500012800b0001006272696467650000400002800500250000000000060006008bbc00000800010013000000060009000020000005002b000700000005002b00810000000c002200010000000000000008000a00"], 0x78}}, 0x0) 15:40:58 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4f203, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d90000000f0000000100000700000000000000000020000000200000200000002cc4645f2cc4645f0100ffff53ef0100010000002cc4645f000000000000000001000000000000000b0000008000000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e3338363633343038350000000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000000000000000000000000000000000000d9ca5cac99fd4329af4dde786c1a5d13010040000c000000000000002cc4645f", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) 15:40:58 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4f203, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000000010fff0c000000d90000000f0000000100000000000000000000000020000000200000200000002cc4645f2cc4645f0100ffff53ef0100010000002cc4645f000000000000000001000000000000000b0000008000000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e3338363633343038350000000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000000000000000000000000000000000000d9ca5cac99fd4329af4dde786c1a5d13010040000c000000000000002cc4645f", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024", 0x29, 0x7e0}], 0x0, &(0x7f0000013000)) 15:40:58 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000cc0)=ANY=[@ANYBLOB="7800000010000507000000bc4b9ccfc900000000", @ANYRES32, @ANYBLOB="45180000000003b8500012800b0001006272696467650000400002800500250000000000060006008bbc00000800"], 0x78}}, 0x0) 15:40:58 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0xffffff81, &(0x7f00000004c0)={&(0x7f0000000cc0)=ANY=[@ANYBLOB="7800000010000507000000bc4b9ccfc900000000", @ANYRES32, @ANYBLOB="4518000000000000500012800b0001006272696467650000400002800500250000007fff060006008bbc00000800010013000000060009000020000005002b000700000005002b00810000000c002200010000000000000008000a00"], 0x78}}, 0x0) 15:40:58 executing program 4 (fault-call:0 fault-nth:39): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4f203, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d90000000f0000000100000000000000000000000020000000200000200000002cc4645f2cc4645f0100ffff53ef0100010000002cc4645f000000000000000001000000000000000b0000008000000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e3338363633343038350000000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000000000000000000000000000000000000d9ca5cac99fd4329af4dde786c1a5d13010040000c000000000000002cc4645f", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) 15:40:58 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4f203, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) [ 1206.833787][T31003] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue [ 1206.842966][T31003] ext4 filesystem being mounted at /root/syzkaller-testdir028365481/syzkaller.u34vxW/1312/file0 supports timestamps until 2038 (0x7fffffff) 15:40:58 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4f203, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d90000000f0000000100000a00000000000000000020000000200000200000002cc4645f2cc4645f0100ffff53ef0100010000002cc4645f000000000000000001000000000000000b0000008000000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e3338363633343038350000000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000000000000000000000000000000000000d9ca5cac99fd4329af4dde786c1a5d13010040000c000000000000002cc4645f", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) 15:40:58 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4f203, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) 15:40:58 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4f203, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d90000000f0000000100000c00000000000000000020000000200000200000002cc4645f2cc4645f0100ffff53ef0100010000002cc4645f000000000000000001000000000000000b0000008000000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e3338363633343038350000000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000000000000000000000000000000000000d9ca5cac99fd4329af4dde786c1a5d13010040000c000000000000002cc4645f", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) 15:40:58 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000cc0)=ANY=[@ANYBLOB="7800000010000507000000bc4b9ccfc900000000", @ANYRES32, @ANYBLOB="45180000000001bd500012800b0001006272696467650000400002800500250000000000060006008bbc00000800"], 0x78}}, 0x0) 15:40:58 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4f203, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) [ 1206.930920][T31014] EXT4-fs (loop3): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? [ 1206.970841][T31026] FAULT_INJECTION: forcing a failure. [ 1206.970841][T31026] name failslab, interval 1, probability 0, space 0, times 0 [ 1206.989334][T31026] CPU: 0 PID: 31026 Comm: syz-executor.4 Tainted: G W 5.4.125-syzkaller-00005-gb8b657d4d5e9 #0 [ 1206.991316][T31014] EXT4-fs (loop3): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? [ 1207.000972][T31026] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1207.000976][T31026] Call Trace: [ 1207.000995][T31026] dump_stack+0x1d8/0x24e [ 1207.001011][T31026] ? devkmsg_release+0x11c/0x11c [ 1207.001020][T31026] ? _raw_spin_lock+0xa3/0x1b0 [ 1207.001028][T31026] ? show_regs_print_info+0x12/0x12 [ 1207.001040][T31026] should_fail+0x6f6/0x860 [ 1207.001050][T31026] ? setup_fault_attr+0x3d0/0x3d0 [ 1207.001058][T31026] ? vfs_submount+0xb0/0xb0 [ 1207.001066][T31026] ? retain_dentry+0x275/0x360 [ 1207.001075][T31026] ? ksys_mount+0x30/0xf0 [ 1207.001086][T31026] should_failslab+0x5/0x20 [ 1207.001096][T31026] __kmalloc_track_caller+0x5d/0x2e0 [ 1207.001104][T31026] ? strnlen_user+0x186/0x210 [ 1207.001121][T31026] strndup_user+0x73/0x150 [ 1207.085644][T31026] ksys_mount+0x30/0xf0 [ 1207.089778][T31026] __x64_sys_mount+0xb1/0xc0 [ 1207.094344][T31026] do_syscall_64+0xcb/0x1e0 [ 1207.098823][T31026] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1207.104689][T31026] RIP: 0033:0x7f2bd50b1c5a [ 1207.109186][T31026] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1207.128777][T31026] RSP: 002b:00007f2bd2e27fa8 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 1207.137169][T31026] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007f2bd50b1c5a [ 1207.145232][T31026] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007f2bd2e28000 [ 1207.153185][T31026] RBP: 00007f2bd2e28040 R08: 00007f2bd2e28040 R09: 0000000020000000 [ 1207.161138][T31026] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000020000000 [ 1207.169200][T31026] R13: 0000000020000100 R14: 00007f2bd2e28000 R15: 0000000020013000 15:40:59 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000cc0)=ANY=[@ANYBLOB="7800000010000507000000bc4b9ccfc900000000", @ANYRES32, @ANYBLOB="4518000000031a00500012800b0001006272696467650000400002800500250000000000060006008bbc00000800010013000000060009000020000005002b000700000005002b00810000000c002200010000000000000008000a00"], 0x78}}, 0x0) 15:40:59 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0xffffff81, &(0x7f00000004c0)={&(0x7f0000000cc0)=ANY=[@ANYBLOB="7800000010000507000000bc4b9ccfc900000000", @ANYRES32, @ANYBLOB="4518000000000000500012800b000100627269646765000040000280050025007fffffff060006008bbc00000800010013000000060009000020000005002b000700000005002b00810000000c002200010000000000000008000a00"], 0x78}}, 0x0) 15:40:59 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4f203, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024", 0x29, 0x7e0}], 0x0, &(0x7f0000013000)) 15:40:59 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4f203, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) 15:40:59 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000cc0)=ANY=[@ANYBLOB="7800000010000507000000bc4b9ccfc900000000", @ANYRES32, @ANYBLOB="45180000000001d4500012800b0001006272696467650000400002800500250000000000060006008bbc00000800"], 0x78}}, 0x0) 15:40:59 executing program 4 (fault-call:0 fault-nth:40): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4f203, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) 15:40:59 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4f203, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) 15:40:59 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0xffffff81, &(0x7f00000004c0)={&(0x7f0000000cc0)=ANY=[@ANYBLOB="7800000010000507000000bc4b9ccfc900000000", @ANYRES32, @ANYBLOB="4518000000000000500012800b0001006272696467650000400002800500250081ffffff060006008bbc00000800010013000000060009000020000005002b000700000005002b00810000000c002200010000000000000008000a00"], 0x78}}, 0x0) [ 1207.277756][T31041] EXT4-fs (loop3): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? 15:40:59 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4f203, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024", 0x29, 0x7e0}], 0x0, &(0x7f0000013000)) 15:40:59 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4f203, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d90000000f0000000100001200000000000000000020000000200000200000002cc4645f2cc4645f0100ffff53ef0100010000002cc4645f000000000000000001000000000000000b0000008000000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e3338363633343038350000000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000000000000000000000000000000000000d9ca5cac99fd4329af4dde786c1a5d13010040000c000000000000002cc4645f", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) [ 1207.324079][T31048] FAULT_INJECTION: forcing a failure. [ 1207.324079][T31048] name failslab, interval 1, probability 0, space 0, times 0 [ 1207.340033][T31048] CPU: 0 PID: 31048 Comm: syz-executor.4 Tainted: G W 5.4.125-syzkaller-00005-gb8b657d4d5e9 #0 [ 1207.351571][T31055] EXT4-fs (loop3): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? [ 1207.351675][T31048] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 15:40:59 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4f203, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) 15:40:59 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4f203, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) [ 1207.372147][T31048] Call Trace: [ 1207.375444][T31048] dump_stack+0x1d8/0x24e [ 1207.379930][T31048] ? devkmsg_release+0x11c/0x11c [ 1207.384868][T31048] ? show_regs_print_info+0x12/0x12 [ 1207.390068][T31048] should_fail+0x6f6/0x860 [ 1207.394893][T31048] ? setup_fault_attr+0x3d0/0x3d0 [ 1207.399922][T31048] ? ksys_mount+0x62/0xf0 [ 1207.404255][T31048] should_failslab+0x5/0x20 [ 1207.408752][T31048] __kmalloc_track_caller+0x5d/0x2e0 [ 1207.414015][T31048] ? strnlen_user+0x186/0x210 [ 1207.418888][T31048] strndup_user+0x73/0x150 [ 1207.423400][T31048] ksys_mount+0x62/0xf0 [ 1207.427533][T31048] __x64_sys_mount+0xb1/0xc0 [ 1207.432231][T31048] do_syscall_64+0xcb/0x1e0 [ 1207.436807][T31048] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1207.442688][T31048] RIP: 0033:0x7f2bd50b1c5a [ 1207.447080][T31048] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1207.466860][T31048] RSP: 002b:00007f2bd2e27fa8 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 1207.475247][T31048] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007f2bd50b1c5a [ 1207.483197][T31048] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007f2bd2e28000 [ 1207.491145][T31048] RBP: 00007f2bd2e28040 R08: 00007f2bd2e28040 R09: 0000000020000000 [ 1207.499214][T31048] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000020000000 [ 1207.507165][T31048] R13: 0000000020000100 R14: 00007f2bd2e28000 R15: 0000000020013000 15:40:59 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000cc0)=ANY=[@ANYBLOB="7800000010000507000000bc4b9ccfc900000000", @ANYRES32, @ANYBLOB="4518000000001f00500012800b0001006272696467650000400002800500250000000000060006008bbc00000800010013000000060009000020000005002b000700000005002b00810000000c002200010000000000000008000a00"], 0x78}}, 0x0) 15:40:59 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4f203, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) 15:40:59 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000cc0)=ANY=[@ANYBLOB="7800000010000507000000bc4b9ccfc900000000", @ANYRES32, @ANYBLOB="45180000000000d8500012800b0001006272696467650000400002800500250000000000060006008bbc00000800"], 0x78}}, 0x0) 15:40:59 executing program 4 (fault-call:0 fault-nth:41): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4f203, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) 15:40:59 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0xffffff81, &(0x7f00000004c0)={&(0x7f0000000cc0)=ANY=[@ANYBLOB="7800000010000507000000bc4b9ccfc900000000", @ANYRES32, @ANYBLOB="4518000000000000500012800b000100627269646765000040000280050025009effffff060006008bbc00000800010013000000060009000020000005002b000700000005002b00810000000c002200010000000000000008000a00"], 0x78}}, 0x0) 15:40:59 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4f203, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000fff0000d90000000f0000000100000000000000000000000020000000200000200000002cc4645f2cc4645f0100ffff53ef0100010000002cc4645f000000000000000001000000000000000b0000008000000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e3338363633343038350000000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000000000000000000000000000000000000d9ca5cac99fd4329af4dde786c1a5d13010040000c000000000000002cc4645f", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024", 0x29, 0x7e0}], 0x0, &(0x7f0000013000)) [ 1207.554271][T31055] EXT4-fs (loop3): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? 15:40:59 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4f203, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d90000000f0000000100002600000000000000000020000000200000200000002cc4645f2cc4645f0100ffff53ef0100010000002cc4645f000000000000000001000000000000000b0000008000000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e3338363633343038350000000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000000000000000000000000000000000000d9ca5cac99fd4329af4dde786c1a5d13010040000c000000000000002cc4645f", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) 15:40:59 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4f203, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) 15:40:59 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4f203, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d90000000f0000000100003f00000000000000000020000000200000200000002cc4645f2cc4645f0100ffff53ef0100010000002cc4645f000000000000000001000000000000000b0000008000000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e3338363633343038350000000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000000000000000000000000000000000000d9ca5cac99fd4329af4dde786c1a5d13010040000c000000000000002cc4645f", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) [ 1207.624055][T31072] EXT4-fs (loop3): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? [ 1207.632757][T31073] FAULT_INJECTION: forcing a failure. [ 1207.632757][T31073] name failslab, interval 1, probability 0, space 0, times 0 [ 1207.648044][T31073] CPU: 0 PID: 31073 Comm: syz-executor.4 Tainted: G W 5.4.125-syzkaller-00005-gb8b657d4d5e9 #0 [ 1207.659680][T31073] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1207.669731][T31073] Call Trace: 15:40:59 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4f203, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) 15:40:59 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4f203, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d90000000f0000000100048000000000000000000020000000200000200000002cc4645f2cc4645f0100ffff53ef0100010000002cc4645f000000000000000001000000000000000b0000008000000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e3338363633343038350000000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000000000000000000000000000000000000d9ca5cac99fd4329af4dde786c1a5d13010040000c000000000000002cc4645f", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) 15:40:59 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4f203, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) [ 1207.673027][T31073] dump_stack+0x1d8/0x24e [ 1207.677366][T31073] ? devkmsg_release+0x11c/0x11c [ 1207.682306][T31073] ? show_regs_print_info+0x12/0x12 [ 1207.687517][T31073] should_fail+0x6f6/0x860 [ 1207.691938][T31073] ? setup_fault_attr+0x3d0/0x3d0 [ 1207.697056][T31073] ? copy_mount_options+0x59/0x300 [ 1207.702258][T31073] should_failslab+0x5/0x20 [ 1207.706774][T31073] kmem_cache_alloc_trace+0x39/0x2b0 [ 1207.712283][T31073] ? __virt_addr_valid+0x1fd/0x290 [ 1207.717396][T31073] copy_mount_options+0x59/0x300 [ 1207.722338][T31073] ? ksys_mount+0x8f/0xf0 [ 1207.726670][T31073] ksys_mount+0x97/0xf0 [ 1207.730827][T31073] __x64_sys_mount+0xb1/0xc0 [ 1207.735407][T31073] do_syscall_64+0xcb/0x1e0 [ 1207.739893][T31073] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1207.745878][T31073] RIP: 0033:0x7f2bd50b1c5a [ 1207.750342][T31073] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1207.769922][T31073] RSP: 002b:00007f2bd2e27fa8 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 1207.778366][T31073] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007f2bd50b1c5a [ 1207.786363][T31073] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007f2bd2e28000 [ 1207.794315][T31073] RBP: 00007f2bd2e28040 R08: 00007f2bd2e28040 R09: 0000000020000000 [ 1207.802274][T31073] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000020000000 [ 1207.810229][T31073] R13: 0000000020000100 R14: 00007f2bd2e28000 R15: 0000000020013000 [ 1207.822264][T31071] __nla_validate_parse: 14 callbacks suppressed [ 1207.822268][T31071] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.5'. [ 1207.838224][T31071] netlink: 36 bytes leftover after parsing attributes in process `syz-executor.5'. 15:40:59 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000cc0)=ANY=[@ANYBLOB="7800000010000507000000bc4b9ccfc900000000", @ANYRES32, @ANYBLOB="4518000000002000500012800b0001006272696467650000400002800500250000000000060006008bbc00000800010013000000060009000020000005002b000700000005002b00810000000c002200010000000000000008000a00"], 0x78}}, 0x0) 15:40:59 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4f203, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d90000000f0000000100000008000000000000000020000000200000200000002cc4645f2cc4645f0100ffff53ef0100010000002cc4645f000000000000000001000000000000000b0000008000000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e3338363633343038350000000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000000000000000000000000000000000000d9ca5cac99fd4329af4dde786c1a5d13010040000c000000000000002cc4645f", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) 15:40:59 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0xffffff81, &(0x7f00000004c0)={&(0x7f0000000cc0)=ANY=[@ANYBLOB="7800000010000507000000bc4b9ccfc900000000", @ANYRES32, @ANYBLOB="4518000000000000500012800b00010062726964676500004000028005002500eaffffff060006008bbc00000800010013000000060009000020000005002b000700000005002b00810000000c002200010000000000000008000a00"], 0x78}}, 0x0) 15:40:59 executing program 4 (fault-call:0 fault-nth:42): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4f203, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) 15:40:59 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000cc0)=ANY=[@ANYBLOB="7800000010000507000000bc4b9ccfc900000000", @ANYRES32, @ANYBLOB="45180000000003dc500012800b0001006272696467650000400002800500250000000000060006008bbc00000800"], 0x78}}, 0x0) 15:40:59 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4f203, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024", 0x29, 0x7e0}], 0x0, &(0x7f0000013000)) [ 1207.938152][T31072] EXT4-fs (loop3): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? 15:40:59 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4f203, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) [ 1208.006887][T31097] FAULT_INJECTION: forcing a failure. [ 1208.006887][T31097] name failslab, interval 1, probability 0, space 0, times 0 [ 1208.015885][T31101] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.5'. [ 1208.024343][T31099] EXT4-fs (loop3): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? [ 1208.039080][T31097] CPU: 0 PID: 31097 Comm: syz-executor.4 Tainted: G W 5.4.125-syzkaller-00005-gb8b657d4d5e9 #0 [ 1208.050701][T31097] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1208.054494][T31101] netlink: 36 bytes leftover after parsing attributes in process `syz-executor.5'. [ 1208.060746][T31097] Call Trace: [ 1208.060765][T31097] dump_stack+0x1d8/0x24e [ 1208.060775][T31097] ? devkmsg_release+0x11c/0x11c [ 1208.060791][T31097] ? show_regs_print_info+0x12/0x12 [ 1208.087981][T31097] should_fail+0x6f6/0x860 [ 1208.092380][T31097] ? setup_fault_attr+0x3d0/0x3d0 [ 1208.097473][T31097] ? ksys_mount+0x62/0xf0 [ 1208.101781][T31097] should_failslab+0x5/0x20 [ 1208.106264][T31097] __kmalloc_track_caller+0x5d/0x2e0 [ 1208.111524][T31097] ? strnlen_user+0x186/0x210 [ 1208.116185][T31097] strndup_user+0x73/0x150 [ 1208.120579][T31097] ksys_mount+0x62/0xf0 [ 1208.124715][T31097] __x64_sys_mount+0xb1/0xc0 [ 1208.129285][T31097] do_syscall_64+0xcb/0x1e0 [ 1208.133768][T31097] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1208.139648][T31097] RIP: 0033:0x7f2bd50b1c5a [ 1208.144043][T31097] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1208.163713][T31097] RSP: 002b:00007f2bd2e27fa8 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 1208.172203][T31097] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007f2bd50b1c5a [ 1208.180153][T31097] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007f2bd2e28000 [ 1208.188102][T31097] RBP: 00007f2bd2e28040 R08: 00007f2bd2e28040 R09: 0000000020000000 [ 1208.196139][T31097] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000020000000 15:41:00 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4f203, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) 15:41:00 executing program 4 (fault-call:0 fault-nth:43): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4f203, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) 15:41:00 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4f203, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) 15:41:00 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4f203, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) [ 1208.204175][T31097] R13: 0000000020000100 R14: 00007f2bd2e28000 R15: 0000000020013000 15:41:00 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000cc0)=ANY=[@ANYBLOB="7800000010000507000000bc4b9ccfc900000000", @ANYRES32, @ANYBLOB="45180000000003e2500012800b0001006272696467650000400002800500250000000000060006008bbc00000800"], 0x78}}, 0x0) [ 1208.333325][T31118] FAULT_INJECTION: forcing a failure. [ 1208.333325][T31118] name failslab, interval 1, probability 0, space 0, times 0 [ 1208.346353][T31118] CPU: 1 PID: 31118 Comm: syz-executor.4 Tainted: G W 5.4.125-syzkaller-00005-gb8b657d4d5e9 #0 [ 1208.358124][T31118] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1208.368161][T31118] Call Trace: [ 1208.371486][T31118] dump_stack+0x1d8/0x24e [ 1208.375789][T31118] ? devkmsg_release+0x11c/0x11c [ 1208.380702][T31118] ? show_regs_print_info+0x12/0x12 [ 1208.385884][T31118] should_fail+0x6f6/0x860 [ 1208.390275][T31118] ? setup_fault_attr+0x3d0/0x3d0 [ 1208.395272][T31118] ? ksys_mount+0x97/0xf0 [ 1208.399573][T31118] ? __x64_sys_mount+0xb1/0xc0 [ 1208.404307][T31118] ? do_syscall_64+0xcb/0x1e0 [ 1208.408954][T31118] ? entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1208.414997][T31118] ? getname_flags+0xba/0x640 [ 1208.419654][T31118] should_failslab+0x5/0x20 [ 1208.424133][T31118] kmem_cache_alloc+0x36/0x290 [ 1208.428873][T31118] getname_flags+0xba/0x640 [ 1208.433351][T31118] user_path_at_empty+0x28/0x50 [ 1208.438175][T31118] do_mount+0x15c/0x2670 [ 1208.442393][T31118] ? copy_mount_string+0x30/0x30 [ 1208.447303][T31118] ? copy_mount_options+0x59/0x300 [ 1208.452384][T31118] ? copy_mount_options+0x59/0x300 [ 1208.457467][T31118] ? kmem_cache_alloc_trace+0x139/0x2b0 [ 1208.462986][T31118] ? copy_mount_options+0x273/0x300 [ 1208.468157][T31118] ksys_mount+0xc2/0xf0 [ 1208.472292][T31118] __x64_sys_mount+0xb1/0xc0 [ 1208.476866][T31118] do_syscall_64+0xcb/0x1e0 [ 1208.481341][T31118] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1208.487204][T31118] RIP: 0033:0x7f2bd50b1c5a [ 1208.491596][T31118] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1208.511176][T31118] RSP: 002b:00007f2bd2e27fa8 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 1208.519565][T31118] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007f2bd50b1c5a 15:41:00 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000cc0)=ANY=[@ANYBLOB="7800000010000507000000bc4b9ccfc900000000", @ANYRES32, @ANYBLOB="4518000000002500500012800b0001006272696467650000400002800500250000000000060006008bbc00000800010013000000060009000020000005002b000700000005002b00810000000c002200010000000000000008000a00"], 0x78}}, 0x0) 15:41:00 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4f203, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) 15:41:00 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4f203, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024", 0x29, 0x7e0}], 0x0, &(0x7f0000013000)) 15:41:00 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0xffffff81, &(0x7f00000004c0)={&(0x7f0000000cc0)=ANY=[@ANYBLOB="7800000010000507000000bc4b9ccfc900000000", @ANYRES32, @ANYBLOB="4518000000000000500012800b00010062726964676500004000028005002500efffffff060006008bbc00000800010013000000060009000020000005002b000700000005002b00810000000c002200010000000000000008000a00"], 0x78}}, 0x0) 15:41:00 executing program 4 (fault-call:0 fault-nth:44): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4f203, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) [ 1208.527508][T31118] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007f2bd2e28000 [ 1208.535453][T31118] RBP: 00007f2bd2e28040 R08: 00007f2bd2e28040 R09: 0000000020000000 [ 1208.543686][T31118] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000020000000 [ 1208.551662][T31118] R13: 0000000020000100 R14: 00007f2bd2e28000 R15: 0000000020013000 [ 1208.560392][T31120] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.5'. [ 1208.570631][T31120] netlink: 36 bytes leftover after parsing attributes in process `syz-executor.5'. 15:41:00 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000cc0)=ANY=[@ANYBLOB="7800000010000507000000bc4b9ccfc900000000", @ANYRES32, @ANYBLOB="45180000000003ea500012800b0001006272696467650000400002800500250000000000060006008bbc00000800"], 0x78}}, 0x0) 15:41:00 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4f203, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) 15:41:00 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4f203, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) 15:41:00 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4f203, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d90000000f0000000100000000040000000000000020000000200000200000002cc4645f2cc4645f0100ffff53ef0100010000002cc4645f000000000000000001000000000000000b0000008000000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e3338363633343038350000000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000000000000000000000000000000000000d9ca5cac99fd4329af4dde786c1a5d13010040000c000000000000002cc4645f", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) [ 1208.640945][T31128] EXT4-fs (loop3): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? [ 1208.650523][T31133] FAULT_INJECTION: forcing a failure. [ 1208.650523][T31133] name failslab, interval 1, probability 0, space 0, times 0 [ 1208.670974][T31133] CPU: 0 PID: 31133 Comm: syz-executor.4 Tainted: G W 5.4.125-syzkaller-00005-gb8b657d4d5e9 #0 15:41:00 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4f203, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) 15:41:00 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4f203, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d90000000f0000000100000000060000000000000020000000200000200000002cc4645f2cc4645f0100ffff53ef0100010000002cc4645f000000000000000001000000000000000b0000008000000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e3338363633343038350000000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000000000000000000000000000000000000d9ca5cac99fd4329af4dde786c1a5d13010040000c000000000000002cc4645f", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) 15:41:00 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4f203, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) [ 1208.682620][T31133] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1208.692671][T31133] Call Trace: [ 1208.695965][T31133] dump_stack+0x1d8/0x24e [ 1208.700296][T31133] ? devkmsg_release+0x11c/0x11c [ 1208.705234][T31133] ? show_regs_print_info+0x12/0x12 [ 1208.710529][T31133] should_fail+0x6f6/0x860 [ 1208.714945][T31133] ? setup_fault_attr+0x3d0/0x3d0 [ 1208.719981][T31133] ? refcount_inc_not_zero_checked+0x1a1/0x280 [ 1208.726132][T31133] ? legacy_init_fs_context+0x4d/0xb0 [ 1208.731499][T31133] should_failslab+0x5/0x20 [ 1208.736072][T31133] kmem_cache_alloc_trace+0x39/0x2b0 [ 1208.741360][T31133] legacy_init_fs_context+0x4d/0xb0 [ 1208.746557][T31133] alloc_fs_context+0x51e/0x610 [ 1208.751397][T31133] do_mount+0x141d/0x2670 [ 1208.755710][T31133] ? copy_mount_string+0x30/0x30 [ 1208.760626][T31133] ? copy_mount_options+0x59/0x300 [ 1208.765760][T31133] ? copy_mount_options+0x59/0x300 [ 1208.770851][T31133] ? kmem_cache_alloc_trace+0x139/0x2b0 [ 1208.776370][T31133] ? copy_mount_options+0x273/0x300 [ 1208.781545][T31133] ksys_mount+0xc2/0xf0 [ 1208.785677][T31133] __x64_sys_mount+0xb1/0xc0 [ 1208.790242][T31133] do_syscall_64+0xcb/0x1e0 [ 1208.794720][T31133] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1208.800701][T31133] RIP: 0033:0x7f2bd50b1c5a [ 1208.805094][T31133] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1208.825538][T31133] RSP: 002b:00007f2bd2e27fa8 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 1208.833923][T31133] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007f2bd50b1c5a [ 1208.841879][T31133] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007f2bd2e28000 [ 1208.849837][T31133] RBP: 00007f2bd2e28040 R08: 00007f2bd2e28040 R09: 0000000020000000 [ 1208.857786][T31133] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000020000000 [ 1208.865741][T31133] R13: 0000000020000100 R14: 00007f2bd2e28000 R15: 0000000020013000 [ 1208.902511][T31138] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.5'. [ 1208.911918][T31138] netlink: 36 bytes leftover after parsing attributes in process `syz-executor.5'. [ 1208.926172][T31128] EXT4-fs (loop3): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? 15:41:00 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000cc0)=ANY=[@ANYBLOB="7800000010000507000000bc4b9ccfc900000000", @ANYRES32, @ANYBLOB="4518000000012800500012800b0001006272696467650000400002800500250000000000060006008bbc00000800010013000000060009000020000005002b000700000005002b00810000000c002200010000000000000008000a00"], 0x78}}, 0x0) 15:41:00 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4f203, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) 15:41:00 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0xffffff81, &(0x7f00000004c0)={&(0x7f0000000cc0)=ANY=[@ANYBLOB="7800000010000507000000bc4b9ccfc900000000", @ANYRES32, @ANYBLOB="4518000000000000500012800b00010062726964676500004000028005002500f0ffffff060006008bbc00000800010013000000060009000020000005002b000700000005002b00810000000c002200010000000000000008000a00"], 0x78}}, 0x0) 15:41:00 executing program 4 (fault-call:0 fault-nth:45): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4f203, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) 15:41:00 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4f203, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100040c000000d90000000f0000000100000000000000000000000020000000200000200000002cc4645f2cc4645f0100ffff53ef0100010000002cc4645f000000000000000001000000000000000b0000008000000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e3338363633343038350000000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000000000000000000000000000000000000d9ca5cac99fd4329af4dde786c1a5d13010040000c000000000000002cc4645f", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024", 0x29, 0x7e0}], 0x0, &(0x7f0000013000)) 15:41:00 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000cc0)=ANY=[@ANYBLOB="7800000010000507000000bc4b9ccfc900000000", @ANYRES32, @ANYBLOB="45180000000003fe500012800b0001006272696467650000400002800500250000000000060006008bbc00000800"], 0x78}}, 0x0) [ 1209.029036][T31161] FAULT_INJECTION: forcing a failure. [ 1209.029036][T31161] name failslab, interval 1, probability 0, space 0, times 0 [ 1209.037343][T31164] EXT4-fs (loop3): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? [ 1209.047116][T31161] CPU: 1 PID: 31161 Comm: syz-executor.4 Tainted: G W 5.4.125-syzkaller-00005-gb8b657d4d5e9 #0 [ 1209.063414][T31161] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1209.073541][T31161] Call Trace: [ 1209.076818][T31161] dump_stack+0x1d8/0x24e [ 1209.081153][T31161] ? devkmsg_release+0x11c/0x11c [ 1209.086071][T31161] ? show_regs_print_info+0x12/0x12 [ 1209.091245][T31161] ? memset+0x1f/0x40 [ 1209.095206][T31161] ? wake_up_bit+0x97/0x1c0 [ 1209.099694][T31161] should_fail+0x6f6/0x860 [ 1209.104110][T31161] ? setup_fault_attr+0x3d0/0x3d0 [ 1209.109113][T31161] ? ksys_mount+0x97/0xf0 [ 1209.113429][T31161] ? __x64_sys_mount+0xb1/0xc0 [ 1209.118187][T31161] ? do_syscall_64+0xcb/0x1e0 [ 1209.122861][T31161] ? entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1209.128903][T31161] ? getname_flags+0xba/0x640 [ 1209.133559][T31161] should_failslab+0x5/0x20 [ 1209.138040][T31161] kmem_cache_alloc+0x36/0x290 [ 1209.142783][T31161] getname_flags+0xba/0x640 [ 1209.147265][T31161] user_path_at_empty+0x28/0x50 [ 1209.152094][T31161] do_mount+0x15c/0x2670 [ 1209.156319][T31161] ? copy_mount_string+0x30/0x30 [ 1209.161237][T31161] ? copy_mount_options+0x59/0x300 [ 1209.166329][T31161] ? copy_mount_options+0x59/0x300 [ 1209.171428][T31161] ? kmem_cache_alloc_trace+0x139/0x2b0 [ 1209.176955][T31161] ? copy_mount_options+0x273/0x300 [ 1209.182128][T31161] ksys_mount+0xc2/0xf0 [ 1209.186265][T31161] __x64_sys_mount+0xb1/0xc0 [ 1209.190834][T31161] do_syscall_64+0xcb/0x1e0 [ 1209.195326][T31161] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1209.201196][T31161] RIP: 0033:0x7f2bd50b1c5a [ 1209.205591][T31161] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 15:41:01 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4f203, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) [ 1209.225702][T31161] RSP: 002b:00007f2bd2e27fa8 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 1209.234104][T31161] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007f2bd50b1c5a [ 1209.242060][T31161] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007f2bd2e28000 [ 1209.250035][T31161] RBP: 00007f2bd2e28040 R08: 00007f2bd2e28040 R09: 0000000020000000 [ 1209.258005][T31161] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000020000000 [ 1209.265957][T31161] R13: 0000000020000100 R14: 00007f2bd2e28000 R15: 0000000020013000 15:41:01 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4f203, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) 15:41:01 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0xffffff81, &(0x7f00000004c0)={&(0x7f0000000cc0)=ANY=[@ANYBLOB="7800000010000507000000bc4b9ccfc900000000", @ANYRES32, @ANYBLOB="4518000000000000500012800b00010062726964676500004000028005002500feffffff060006008bbc00000800010013000000060009000020000005002b000700000005002b00810000000c002200010000000000000008000a00"], 0x78}}, 0x0) 15:41:01 executing program 4 (fault-call:0 fault-nth:46): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4f203, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) 15:41:01 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4f203, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) 15:41:01 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4f203, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) [ 1209.285371][T31165] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.5'. [ 1209.295261][T31165] netlink: 36 bytes leftover after parsing attributes in process `syz-executor.5'. [ 1209.346300][T31164] EXT4-fs (loop3): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? [ 1209.412463][T31183] FAULT_INJECTION: forcing a failure. [ 1209.412463][T31183] name failslab, interval 1, probability 0, space 0, times 0 [ 1209.428353][T31183] CPU: 1 PID: 31183 Comm: syz-executor.4 Tainted: G W 5.4.125-syzkaller-00005-gb8b657d4d5e9 #0 [ 1209.439993][T31183] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1209.450042][T31183] Call Trace: [ 1209.453331][T31183] dump_stack+0x1d8/0x24e [ 1209.457639][T31183] ? devkmsg_release+0x11c/0x11c [ 1209.462553][T31183] ? show_regs_print_info+0x12/0x12 [ 1209.467725][T31183] should_fail+0x6f6/0x860 [ 1209.472115][T31183] ? setup_fault_attr+0x3d0/0x3d0 [ 1209.477115][T31183] ? refcount_inc_not_zero_checked+0x1a1/0x280 [ 1209.483242][T31183] ? legacy_init_fs_context+0x4d/0xb0 [ 1209.488602][T31183] should_failslab+0x5/0x20 [ 1209.493082][T31183] kmem_cache_alloc_trace+0x39/0x2b0 [ 1209.498395][T31183] legacy_init_fs_context+0x4d/0xb0 [ 1209.503569][T31183] alloc_fs_context+0x51e/0x610 [ 1209.508395][T31183] do_mount+0x141d/0x2670 [ 1209.512699][T31183] ? copy_mount_string+0x30/0x30 [ 1209.517611][T31183] ? copy_mount_options+0x59/0x300 [ 1209.522695][T31183] ? copy_mount_options+0x59/0x300 [ 1209.527781][T31183] ? kmem_cache_alloc_trace+0x139/0x2b0 [ 1209.533300][T31183] ? copy_mount_options+0x273/0x300 [ 1209.538474][T31183] ksys_mount+0xc2/0xf0 [ 1209.542633][T31183] __x64_sys_mount+0xb1/0xc0 [ 1209.547199][T31183] do_syscall_64+0xcb/0x1e0 [ 1209.551678][T31183] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1209.557550][T31183] RIP: 0033:0x7f2bd50b1c5a [ 1209.561946][T31183] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1209.581525][T31183] RSP: 002b:00007f2bd2e27fa8 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 1209.589909][T31183] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007f2bd50b1c5a [ 1209.597857][T31183] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007f2bd2e28000 [ 1209.605805][T31183] RBP: 00007f2bd2e28040 R08: 00007f2bd2e28040 R09: 0000000020000000 [ 1209.613752][T31183] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000020000000 [ 1209.621702][T31183] R13: 0000000020000100 R14: 00007f2bd2e28000 R15: 0000000020013000 15:41:01 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000cc0)=ANY=[@ANYBLOB="7800000010000507000000bc4b9ccfc900000000", @ANYRES32, @ANYBLOB="4518000000012c00500012800b0001006272696467650000400002800500250000000000060006008bbc00000800010013000000060009000020000005002b000700000005002b00810000000c002200010000000000000008000a00"], 0x78}}, 0x0) 15:41:01 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4f203, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) 15:41:01 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000cc0)=ANY=[@ANYBLOB="7800000010000507000000bc4b9ccfc900000000", @ANYRES32, @ANYBLOB="451800000000fffe500012800b0001006272696467650000400002800500250000000000060006008bbc00000800"], 0x78}}, 0x0) 15:41:01 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4f203, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024", 0x29, 0x7e0}], 0x0, &(0x7f0000013000)) 15:41:01 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0xffffff81, &(0x7f00000004c0)={&(0x7f0000000cc0)=ANY=[@ANYBLOB="7800000010000507000000bc4b9ccfc900000000", @ANYRES32, @ANYBLOB="4518000000000000500012800b0001006272696467650000400002800500250000000004000006008bbc00000800010013000000060009000020000005002b000700000005002b00810000000c002200010000000000000008000a00"], 0x78}}, 0x0) 15:41:01 executing program 4 (fault-call:0 fault-nth:47): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4f203, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) [ 1209.711298][T31196] FAULT_INJECTION: forcing a failure. [ 1209.711298][T31196] name failslab, interval 1, probability 0, space 0, times 0 [ 1209.724659][T31196] CPU: 1 PID: 31196 Comm: syz-executor.4 Tainted: G W 5.4.125-syzkaller-00005-gb8b657d4d5e9 #0 [ 1209.727059][T31198] EXT4-fs (loop3): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? [ 1209.736376][T31196] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1209.736380][T31196] Call Trace: [ 1209.736400][T31196] dump_stack+0x1d8/0x24e [ 1209.736410][T31196] ? devkmsg_release+0x11c/0x11c [ 1209.736418][T31196] ? show_regs_print_info+0x12/0x12 [ 1209.736429][T31196] should_fail+0x6f6/0x860 [ 1209.736439][T31196] ? setup_fault_attr+0x3d0/0x3d0 [ 1209.736450][T31196] ? vfs_parse_fs_string+0x180/0x290 [ 1209.736460][T31196] should_failslab+0x5/0x20 [ 1209.736470][T31196] __kmalloc_track_caller+0x5d/0x2e0 [ 1209.736482][T31196] kmemdup_nul+0x27/0xa0 [ 1209.736489][T31196] vfs_parse_fs_string+0x180/0x290 [ 1209.736499][T31196] ? kmem_cache_alloc_trace+0x139/0x2b0 [ 1209.736508][T31196] ? logfc+0x6c0/0x6c0 [ 1209.736519][T31196] ? __module_put_and_exit+0x20/0x20 [ 1209.736526][T31196] ? alloc_fs_context+0x532/0x610 [ 1209.736542][T31196] do_mount+0x1678/0x2670 [ 1209.833496][T31196] ? copy_mount_string+0x30/0x30 [ 1209.838420][T31196] ? copy_mount_options+0x59/0x300 [ 1209.843514][T31196] ? copy_mount_options+0x59/0x300 [ 1209.848605][T31196] ? kmem_cache_alloc_trace+0x139/0x2b0 [ 1209.854186][T31196] ? copy_mount_options+0x273/0x300 [ 1209.859357][T31196] ksys_mount+0xc2/0xf0 [ 1209.863488][T31196] __x64_sys_mount+0xb1/0xc0 [ 1209.868053][T31196] do_syscall_64+0xcb/0x1e0 [ 1209.872534][T31196] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1209.878402][T31196] RIP: 0033:0x7f2bd50b1c5a [ 1209.882791][T31196] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1209.902429][T31196] RSP: 002b:00007f2bd2e27fa8 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 15:41:01 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4f203, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) 15:41:01 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000cc0)=ANY=[@ANYBLOB="7800000010000507000000bc4b9ccfc900000000", @ANYRES32, @ANYBLOB="4518000000000fff500012800b0001006272696467650000400002800500250000000000060006008bbc00000800"], 0x78}}, 0x0) 15:41:01 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4f203, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) 15:41:01 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4f203, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) [ 1209.910838][T31196] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007f2bd50b1c5a [ 1209.918809][T31196] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007f2bd2e28000 [ 1209.926774][T31196] RBP: 00007f2bd2e28040 R08: 00007f2bd2e28040 R09: 0000000020000000 [ 1209.934732][T31196] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000020000000 [ 1209.942730][T31196] R13: 0000000020000100 R14: 00007f2bd2e28000 R15: 0000000020013000 15:41:01 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4f203, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) 15:41:01 executing program 4 (fault-call:0 fault-nth:48): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4f203, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) [ 1210.009510][T31198] EXT4-fs (loop3): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? [ 1210.066160][T31216] FAULT_INJECTION: forcing a failure. [ 1210.066160][T31216] name failslab, interval 1, probability 0, space 0, times 0 [ 1210.079086][T31216] CPU: 0 PID: 31216 Comm: syz-executor.4 Tainted: G W 5.4.125-syzkaller-00005-gb8b657d4d5e9 #0 [ 1210.090709][T31216] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1210.100756][T31216] Call Trace: [ 1210.104032][T31216] dump_stack+0x1d8/0x24e [ 1210.108343][T31216] ? devkmsg_release+0x11c/0x11c [ 1210.113254][T31216] ? ksys_mount+0xc2/0xf0 [ 1210.117719][T31216] ? show_regs_print_info+0x12/0x12 [ 1210.122897][T31216] should_fail+0x6f6/0x860 [ 1210.127424][T31216] ? setup_fault_attr+0x3d0/0x3d0 [ 1210.132439][T31216] ? avc_has_perm_noaudit+0x30c/0x400 [ 1210.137841][T31216] ? getname_kernel+0x55/0x2d0 [ 1210.142591][T31216] should_failslab+0x5/0x20 [ 1210.147129][T31216] kmem_cache_alloc+0x36/0x290 [ 1210.151870][T31216] getname_kernel+0x55/0x2d0 [ 1210.156489][T31216] kern_path+0x19/0x40 [ 1210.160556][T31216] blkdev_get_by_path+0xc7/0x2e0 [ 1210.165474][T31216] ? __blkdev_get+0x1bb0/0x1bb0 [ 1210.170458][T31216] ? vfs_parse_fs_param+0x2cb/0x430 [ 1210.175632][T31216] ? vfs_parse_fs_string+0x1e9/0x290 [ 1210.180891][T31216] ? ext4_mount+0x40/0x40 [ 1210.185195][T31216] mount_bdev+0x49/0x340 [ 1210.189418][T31216] legacy_get_tree+0xde/0x170 [ 1210.194073][T31216] ? ext4_lazyinit_thread+0xd40/0xd40 [ 1210.199542][T31216] vfs_get_tree+0x83/0x260 [ 1210.203942][T31216] do_mount+0x19d0/0x2670 [ 1210.208257][T31216] ? copy_mount_string+0x30/0x30 [ 1210.213171][T31216] ? copy_mount_options+0x59/0x300 [ 1210.218265][T31216] ? copy_mount_options+0x59/0x300 [ 1210.223366][T31216] ? kmem_cache_alloc_trace+0x139/0x2b0 [ 1210.228983][T31216] ? copy_mount_options+0x273/0x300 [ 1210.234260][T31216] ksys_mount+0xc2/0xf0 [ 1210.238396][T31216] __x64_sys_mount+0xb1/0xc0 [ 1210.242964][T31216] do_syscall_64+0xcb/0x1e0 [ 1210.247559][T31216] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1210.253433][T31216] RIP: 0033:0x7f2bd50b1c5a [ 1210.257828][T31216] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1210.277407][T31216] RSP: 002b:00007f2bd2e27fa8 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 1210.285884][T31216] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007f2bd50b1c5a [ 1210.294011][T31216] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007f2bd2e28000 [ 1210.301967][T31216] RBP: 00007f2bd2e28040 R08: 00007f2bd2e28040 R09: 0000000020000000 15:41:02 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000cc0)=ANY=[@ANYBLOB="7800000010000507000000bc4b9ccfc900000000", @ANYRES32, @ANYBLOB="4518000000002f00500012800b0001006272696467650000400002800500250000000000060006008bbc00000800010013000000060009000020000005002b000700000005002b00810000000c002200010000000000000008000a00"], 0x78}}, 0x0) 15:41:02 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4f203, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) 15:41:02 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0xffffff81, &(0x7f00000004c0)={&(0x7f0000000cc0)=ANY=[@ANYBLOB="7800000010000507000000bc4b9ccfc900000000", @ANYRES32, @ANYBLOB="4518000000000000500012800b0001006272696467650000400002800500250000000000010006008bbc00000800010013000000060009000020000005002b000700000005002b00810000000c002200010000000000000008000a00"], 0x78}}, 0x0) 15:41:02 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4f203, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100060c000000d90000000f0000000100000000000000000000000020000000200000200000002cc4645f2cc4645f0100ffff53ef0100010000002cc4645f000000000000000001000000000000000b0000008000000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e3338363633343038350000000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000000000000000000000000000000000000d9ca5cac99fd4329af4dde786c1a5d13010040000c000000000000002cc4645f", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024", 0x29, 0x7e0}], 0x0, &(0x7f0000013000)) 15:41:02 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000cc0)=ANY=[@ANYBLOB="7800000010000507000000bc4b9ccfc900000000", @ANYRES32, @ANYBLOB="4518000000007fff500012800b0001006272696467650000400002800500250000000000060006008bbc00000800"], 0x78}}, 0x0) 15:41:02 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4f203, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) [ 1210.310024][T31216] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000020000000 [ 1210.317971][T31216] R13: 0000000020000100 R14: 00007f2bd2e28000 R15: 0000000020013000 15:41:02 executing program 4 (fault-call:0 fault-nth:49): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4f203, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) 15:41:02 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4f203, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) 15:41:02 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4f203, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) 15:41:02 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4f203, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) 15:41:02 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000cc0)=ANY=[@ANYBLOB="7800000010000507000000bc4b9ccfc900000000", @ANYRES32, @ANYBLOB="451800000000feff500012800b0001006272696467650000400002800500250000000000060006008bbc00000800"], 0x78}}, 0x0) [ 1210.376982][T31227] EXT4-fs (loop3): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? 15:41:02 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4f203, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d90000000f00000001000000003f0000000000000020000000200000200000002cc4645f2cc4645f0100ffff53ef0100010000002cc4645f000000000000000001000000000000000b0000008000000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e3338363633343038350000000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000000000000000000000000000000000000d9ca5cac99fd4329af4dde786c1a5d13010040000c000000000000002cc4645f", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) [ 1210.442545][T31234] FAULT_INJECTION: forcing a failure. [ 1210.442545][T31234] name failslab, interval 1, probability 0, space 0, times 0 [ 1210.455829][T31227] EXT4-fs (loop3): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? [ 1210.471001][T31234] CPU: 0 PID: 31234 Comm: syz-executor.4 Tainted: G W 5.4.125-syzkaller-00005-gb8b657d4d5e9 #0 [ 1210.482640][T31234] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1210.492687][T31234] Call Trace: [ 1210.495977][T31234] dump_stack+0x1d8/0x24e [ 1210.500304][T31234] ? devkmsg_release+0x11c/0x11c [ 1210.505221][T31234] ? show_regs_print_info+0x12/0x12 [ 1210.510395][T31234] ? _atomic_dec_and_lock+0x1e4/0x2c0 [ 1210.515747][T31234] should_fail+0x6f6/0x860 [ 1210.520143][T31234] ? setup_fault_attr+0x3d0/0x3d0 [ 1210.525188][T31234] ? iput+0x2f8/0x810 [ 1210.529231][T31234] ? alloc_super+0x56/0x750 [ 1210.533709][T31234] should_failslab+0x5/0x20 [ 1210.538186][T31234] kmem_cache_alloc_trace+0x39/0x2b0 [ 1210.543446][T31234] ? _raw_spin_trylock_bh+0x1a0/0x1a0 [ 1210.548792][T31234] ? mount_bdev+0x340/0x340 [ 1210.553355][T31234] alloc_super+0x56/0x750 [ 1210.557660][T31234] ? mount_bdev+0x340/0x340 [ 1210.562139][T31234] sget+0x20e/0x4e0 [ 1210.565920][T31234] ? test_bdev_super+0x40/0x40 [ 1210.570665][T31234] mount_bdev+0xe3/0x340 [ 1210.574883][T31234] ? ext4_mount+0x40/0x40 [ 1210.579187][T31234] legacy_get_tree+0xde/0x170 [ 1210.583835][T31234] ? ext4_lazyinit_thread+0xd40/0xd40 [ 1210.589181][T31234] vfs_get_tree+0x83/0x260 [ 1210.593597][T31234] do_mount+0x19d0/0x2670 [ 1210.597909][T31234] ? copy_mount_string+0x30/0x30 [ 1210.602846][T31234] ? copy_mount_options+0x59/0x300 [ 1210.607942][T31234] ? copy_mount_options+0x59/0x300 [ 1210.613040][T31234] ? kmem_cache_alloc_trace+0x139/0x2b0 [ 1210.618583][T31234] ? copy_mount_options+0x273/0x300 [ 1210.623762][T31234] ksys_mount+0xc2/0xf0 [ 1210.627894][T31234] __x64_sys_mount+0xb1/0xc0 [ 1210.632548][T31234] do_syscall_64+0xcb/0x1e0 [ 1210.637124][T31234] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1210.643152][T31234] RIP: 0033:0x7f2bd50b1c5a [ 1210.647563][T31234] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1210.667145][T31234] RSP: 002b:00007f2bd2e27fa8 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 1210.675623][T31234] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007f2bd50b1c5a [ 1210.683573][T31234] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007f2bd2e28000 [ 1210.691635][T31234] RBP: 00007f2bd2e28040 R08: 00007f2bd2e28040 R09: 0000000020000000 [ 1210.699587][T31234] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000020000000 [ 1210.707538][T31234] R13: 0000000020000100 R14: 00007f2bd2e28000 R15: 0000000020013000 15:41:02 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000cc0)=ANY=[@ANYBLOB="7800000010000507000000bc4b9ccfc900000000", @ANYRES32, @ANYBLOB="4518000000003a00500012800b0001006272696467650000400002800500250000000000060006008bbc00000800010013000000060009000020000005002b000700000005002b00810000000c002200010000000000000008000a00"], 0x78}}, 0x0) 15:41:02 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4f203, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) 15:41:02 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4f203, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100070c000000d90000000f0000000100000000000000000000000020000000200000200000002cc4645f2cc4645f0100ffff53ef0100010000002cc4645f000000000000000001000000000000000b0000008000000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e3338363633343038350000000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000000000000000000000000000000000000d9ca5cac99fd4329af4dde786c1a5d13010040000c000000000000002cc4645f", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024", 0x29, 0x7e0}], 0x0, &(0x7f0000013000)) 15:41:02 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0xffffff81, &(0x7f00000004c0)={&(0x7f0000000cc0)=ANY=[@ANYBLOB="7800000010000507000000bc4b9ccfc900000000", @ANYRES32, @ANYBLOB="4518000000000000500012800b0001006272696467650000400002800500250000000000020006008bbc00000800010013000000060009000020000005002b000700000005002b00810000000c002200010000000000000008000a00"], 0x78}}, 0x0) 15:41:02 executing program 4 (fault-call:0 fault-nth:50): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4f203, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) 15:41:02 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000cc0)=ANY=[@ANYBLOB="7800000010000507000000bc4b9ccfc900000000", @ANYRES32, @ANYBLOB="4518000000000002500012800b0001006272696467650000400002800500250000000000060006008bbc00000800"], 0x78}}, 0x0) 15:41:02 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4f203, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) [ 1210.841606][T31259] FAULT_INJECTION: forcing a failure. [ 1210.841606][T31259] name failslab, interval 1, probability 0, space 0, times 0 [ 1210.842165][T31254] EXT4-fs (loop3): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? [ 1210.858338][T31259] CPU: 1 PID: 31259 Comm: syz-executor.4 Tainted: G W 5.4.125-syzkaller-00005-gb8b657d4d5e9 #0 [ 1210.876181][T31259] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1210.886238][T31259] Call Trace: [ 1210.889539][T31259] dump_stack+0x1d8/0x24e [ 1210.893866][T31259] ? devkmsg_release+0x11c/0x11c [ 1210.898808][T31259] ? show_regs_print_info+0x12/0x12 [ 1210.904113][T31259] ? pcpu_alloc_area+0x753/0x8b0 [ 1210.909033][T31259] should_fail+0x6f6/0x860 [ 1210.913431][T31259] ? setup_fault_attr+0x3d0/0x3d0 [ 1210.918465][T31259] ? find_next_bit+0xc6/0x110 [ 1210.923122][T31259] ? cpumask_next+0xc/0x20 [ 1210.927602][T31259] ? pcpu_alloc+0xc8a/0x1180 [ 1210.932191][T31259] ? prealloc_shrinker+0x50/0x210 [ 1210.937193][T31259] should_failslab+0x5/0x20 [ 1210.941676][T31259] kmem_cache_alloc_trace+0x39/0x2b0 [ 1210.946957][T31259] prealloc_shrinker+0x50/0x210 [ 1210.951787][T31259] alloc_super+0x5e5/0x750 [ 1210.956182][T31259] ? mount_bdev+0x340/0x340 [ 1210.960662][T31259] sget+0x20e/0x4e0 [ 1210.964449][T31259] ? test_bdev_super+0x40/0x40 [ 1210.969192][T31259] mount_bdev+0xe3/0x340 [ 1210.973414][T31259] ? ext4_mount+0x40/0x40 [ 1210.977721][T31259] legacy_get_tree+0xde/0x170 [ 1210.982379][T31259] ? ext4_lazyinit_thread+0xd40/0xd40 [ 1210.987727][T31259] vfs_get_tree+0x83/0x260 [ 1210.992124][T31259] do_mount+0x19d0/0x2670 [ 1210.996449][T31259] ? copy_mount_string+0x30/0x30 [ 1211.001452][T31259] ? copy_mount_options+0x59/0x300 [ 1211.006629][T31259] ? copy_mount_options+0x59/0x300 [ 1211.011721][T31259] ? kmem_cache_alloc_trace+0x139/0x2b0 [ 1211.017245][T31259] ? copy_mount_options+0x273/0x300 [ 1211.022423][T31259] ksys_mount+0xc2/0xf0 [ 1211.026583][T31259] __x64_sys_mount+0xb1/0xc0 [ 1211.031152][T31259] do_syscall_64+0xcb/0x1e0 [ 1211.035639][T31259] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1211.041537][T31259] RIP: 0033:0x7f2bd50b1c5a [ 1211.045931][T31259] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1211.065517][T31259] RSP: 002b:00007f2bd2e27fa8 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 1211.073942][T31259] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007f2bd50b1c5a [ 1211.081896][T31259] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007f2bd2e28000 15:41:02 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0xffffff81, &(0x7f00000004c0)={&(0x7f0000000cc0)=ANY=[@ANYBLOB="7800000010000507000000bc4b9ccfc900000000", @ANYRES32, @ANYBLOB="4518000000000000500012800b0001006272696467650000400002800500250000000000030006008bbc00000800010013000000060009000020000005002b000700000005002b00810000000c002200010000000000000008000a00"], 0x78}}, 0x0) 15:41:02 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4f203, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) 15:41:02 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4f203, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100080c000000d90000000f0000000100000000000000000000000020000000200000200000002cc4645f2cc4645f0100ffff53ef0100010000002cc4645f000000000000000001000000000000000b0000008000000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e3338363633343038350000000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000000000000000000000000000000000000d9ca5cac99fd4329af4dde786c1a5d13010040000c000000000000002cc4645f", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024", 0x29, 0x7e0}], 0x0, &(0x7f0000013000)) 15:41:02 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000cc0)=ANY=[@ANYBLOB="7800000010000507000000bc4b9ccfc900000000", @ANYRES32, @ANYBLOB="4518000000000003500012800b0001006272696467650000400002800500250000000000060006008bbc00000800"], 0x78}}, 0x0) 15:41:02 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4f203, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) [ 1211.089906][T31259] RBP: 00007f2bd2e28040 R08: 00007f2bd2e28040 R09: 0000000020000000 [ 1211.097883][T31259] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000020000000 [ 1211.105872][T31259] R13: 0000000020000100 R14: 00007f2bd2e28000 R15: 0000000020013000 [ 1211.205253][T31280] EXT4-fs (loop3): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? 15:41:03 executing program 4 (fault-call:0 fault-nth:51): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4f203, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d90000000f0000000100000000000000000000000020000000200000200000002cc4645f2cc4645f0100ffff53ef0100010000002cc4645f000000000000000001000000000000000b0000008000000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e3338363633343038350000000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000000000000000000000000000000000000d9ca5cac99fd4329af4dde786c1a5d13010040000c000000000000002cc4645f", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) 15:41:03 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4f203, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) 15:41:03 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4f203, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024", 0x29, 0x7e0}], 0x0, &(0x7f0000013000)) 15:41:03 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000cc0)=ANY=[@ANYBLOB="7800000010000507000000bc4b9ccfc900000000", @ANYRES32, @ANYBLOB="4518000000003c00500012800b0001006272696467650000400002800500250000000000060006008bbc00000800010013000000060009000020000005002b000700000005002b00810000000c002200010000000000000008000a00"], 0x78}}, 0x0) 15:41:03 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0xffffff81, &(0x7f00000004c0)={&(0x7f0000000cc0)=ANY=[@ANYBLOB="7800000010000507000000bc4b9ccfc900000000", @ANYRES32, @ANYBLOB="4518000000000000500012800b0001006272696467650000400002800500250000000000040006008bbc00000800010013000000060009000020000005002b000700000005002b00810000000c002200010000000000000008000a00"], 0x78}}, 0x0) 15:41:03 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000cc0)=ANY=[@ANYBLOB="7800000010000507000000bc4b9ccfc900000000", @ANYRES32, @ANYBLOB="4518000000000004500012800b0001006272696467650000400002800500250000000000060006008bbc00000800"], 0x78}}, 0x0) 15:41:03 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4f203, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) [ 1211.346364][T31287] netlink: 'syz-executor.2': attribute type 6 has an invalid length. [ 1211.364024][T31289] FAULT_INJECTION: forcing a failure. [ 1211.364024][T31289] name failslab, interval 1, probability 0, space 0, times 0 [ 1211.372770][T31290] EXT4-fs (loop3): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? [ 1211.389839][T31289] CPU: 1 PID: 31289 Comm: syz-executor.4 Tainted: G W 5.4.125-syzkaller-00005-gb8b657d4d5e9 #0 [ 1211.401474][T31289] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1211.411522][T31289] Call Trace: [ 1211.414813][T31289] dump_stack+0x1d8/0x24e [ 1211.419145][T31289] ? devkmsg_release+0x11c/0x11c [ 1211.424084][T31289] ? show_regs_print_info+0x12/0x12 [ 1211.429281][T31289] should_fail+0x6f6/0x860 [ 1211.433721][T31289] ? setup_fault_attr+0x3d0/0x3d0 [ 1211.438749][T31289] ? kvmalloc_node+0x7e/0xf0 15:41:03 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4f203, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) 15:41:03 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4f203, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) 15:41:03 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4f203, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) 15:41:03 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4f203, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) 15:41:03 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4f203, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) [ 1211.443336][T31289] should_failslab+0x5/0x20 [ 1211.447844][T31289] __kmalloc+0x5f/0x2f0 [ 1211.452001][T31289] ? __list_lru_init+0xa7/0x550 [ 1211.456855][T31289] kvmalloc_node+0x7e/0xf0 [ 1211.461276][T31289] __list_lru_init+0x1c6/0x550 [ 1211.466045][T31289] ? prealloc_shrinker+0x1c0/0x210 [ 1211.471152][T31289] alloc_super+0x611/0x750 [ 1211.475563][T31289] ? mount_bdev+0x340/0x340 [ 1211.480064][T31289] sget+0x20e/0x4e0 [ 1211.483865][T31289] ? test_bdev_super+0x40/0x40 [ 1211.488619][T31289] mount_bdev+0xe3/0x340 [ 1211.492862][T31289] ? ext4_mount+0x40/0x40 [ 1211.497326][T31289] legacy_get_tree+0xde/0x170 [ 1211.501997][T31289] ? ext4_lazyinit_thread+0xd40/0xd40 [ 1211.507472][T31289] vfs_get_tree+0x83/0x260 [ 1211.513402][T31289] do_mount+0x19d0/0x2670 [ 1211.517713][T31289] ? copy_mount_string+0x30/0x30 [ 1211.522689][T31289] ? copy_mount_options+0x59/0x300 [ 1211.527785][T31289] ? copy_mount_options+0x59/0x300 [ 1211.532959][T31289] ? kmem_cache_alloc_trace+0x139/0x2b0 [ 1211.538502][T31289] ? copy_mount_options+0x273/0x300 [ 1211.543692][T31289] ksys_mount+0xc2/0xf0 [ 1211.547840][T31289] __x64_sys_mount+0xb1/0xc0 [ 1211.552407][T31289] do_syscall_64+0xcb/0x1e0 [ 1211.556975][T31289] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1211.562844][T31289] RIP: 0033:0x7f2bd50b1c5a [ 1211.567236][T31289] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1211.586848][T31289] RSP: 002b:00007f2bd2e27fa8 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 1211.595411][T31289] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007f2bd50b1c5a [ 1211.603361][T31289] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007f2bd2e28000 [ 1211.611316][T31289] RBP: 00007f2bd2e28040 R08: 00007f2bd2e28040 R09: 0000000020000000 [ 1211.619270][T31289] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000020000000 [ 1211.627224][T31289] R13: 0000000020000100 R14: 00007f2bd2e28000 R15: 0000000020013000 15:41:03 executing program 4 (fault-call:0 fault-nth:52): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4f203, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d90000000f0000000100000000000000000000000020000000200000200000002cc4645f2cc4645f0100ffff53ef0100010000002cc4645f000000000000000001000000000000000b0000008000000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e3338363633343038350000000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000000000000000000000000000000000000d9ca5cac99fd4329af4dde786c1a5d13010040000c000000000000002cc4645f", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) 15:41:03 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4f203, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d90000000f0000000100000000000000200000000020000000200000200000002cc4645f2cc4645f0100ffff53ef0100010000002cc4645f000000000000000001000000000000000b0000008000000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e3338363633343038350000000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000000000000000000000000000000000000d9ca5cac99fd4329af4dde786c1a5d13010040000c000000000000002cc4645f", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) 15:41:03 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0xffffff81, &(0x7f00000004c0)={&(0x7f0000000cc0)=ANY=[@ANYBLOB="7800000010000507000000bc4b9ccfc900000000", @ANYRES32, @ANYBLOB="4518000000000000500012800b0001006272696467650000400002800500250000000000050006008bbc00000800010013000000060009000020000005002b000700000005002b00810000000c002200010000000000000008000a00"], 0x78}}, 0x0) [ 1211.738112][T31318] FAULT_INJECTION: forcing a failure. [ 1211.738112][T31318] name failslab, interval 1, probability 0, space 0, times 0 [ 1211.750964][T31318] CPU: 0 PID: 31318 Comm: syz-executor.4 Tainted: G W 5.4.125-syzkaller-00005-gb8b657d4d5e9 #0 [ 1211.762574][T31318] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1211.772612][T31318] Call Trace: [ 1211.775885][T31318] dump_stack+0x1d8/0x24e [ 1211.780196][T31318] ? devkmsg_release+0x11c/0x11c [ 1211.785115][T31318] ? show_regs_print_info+0x12/0x12 [ 1211.790299][T31318] ? idr_get_free+0x740/0x900 [ 1211.794958][T31318] should_fail+0x6f6/0x860 [ 1211.799352][T31318] ? setup_fault_attr+0x3d0/0x3d0 [ 1211.804350][T31318] ? __down_read+0xf1/0x210 [ 1211.808861][T31318] ? __list_lru_init+0xa7/0x550 [ 1211.813688][T31318] should_failslab+0x5/0x20 [ 1211.818275][T31318] kmem_cache_alloc_trace+0x39/0x2b0 [ 1211.823533][T31318] ? up_read+0x10/0x10 [ 1211.827576][T31318] __list_lru_init+0xa7/0x550 [ 1211.832227][T31318] ? prealloc_shrinker+0x1c0/0x210 [ 1211.837313][T31318] alloc_super+0x611/0x750 [ 1211.841706][T31318] ? mount_bdev+0x340/0x340 [ 1211.846220][T31318] sget+0x20e/0x4e0 [ 1211.850445][T31318] ? test_bdev_super+0x40/0x40 [ 1211.855185][T31318] mount_bdev+0xe3/0x340 [ 1211.859410][T31318] ? ext4_mount+0x40/0x40 [ 1211.863715][T31318] legacy_get_tree+0xde/0x170 [ 1211.868369][T31318] ? ext4_lazyinit_thread+0xd40/0xd40 [ 1211.873730][T31318] vfs_get_tree+0x83/0x260 [ 1211.878142][T31318] do_mount+0x19d0/0x2670 [ 1211.882487][T31318] ? copy_mount_string+0x30/0x30 [ 1211.887409][T31318] ? copy_mount_options+0x59/0x300 [ 1211.892492][T31318] ? copy_mount_options+0x59/0x300 [ 1211.897579][T31318] ? kmem_cache_alloc_trace+0x139/0x2b0 [ 1211.903103][T31318] ? copy_mount_options+0x273/0x300 [ 1211.908279][T31318] ksys_mount+0xc2/0xf0 [ 1211.912420][T31318] __x64_sys_mount+0xb1/0xc0 [ 1211.916989][T31318] do_syscall_64+0xcb/0x1e0 [ 1211.921470][T31318] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1211.927340][T31318] RIP: 0033:0x7f2bd50b1c5a [ 1211.931731][T31318] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1211.951313][T31318] RSP: 002b:00007f2bd2e27fa8 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 1211.959697][T31318] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007f2bd50b1c5a [ 1211.967647][T31318] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007f2bd2e28000 [ 1211.975600][T31318] RBP: 00007f2bd2e28040 R08: 00007f2bd2e28040 R09: 0000000020000000 [ 1211.983554][T31318] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000020000000 [ 1211.991510][T31318] R13: 0000000020000100 R14: 00007f2bd2e28000 R15: 0000000020013000 15:41:03 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000cc0)=ANY=[@ANYBLOB="7800000010000507000000bc4b9ccfc900000000", @ANYRES32, @ANYBLOB="4518000000003f00500012800b0001006272696467650000400002800500250000000000060006008bbc00000800010013000000060009000020000005002b000700000005002b00810000000c002200010000000000000008000a00"], 0x78}}, 0x0) 15:41:03 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4f203, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024", 0x29, 0x7e0}], 0x0, &(0x7f0000013000)) 15:41:03 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4f203, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) 15:41:03 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000cc0)=ANY=[@ANYBLOB="7800000010000507000000bc4b9ccfc900000000", @ANYRES32, @ANYBLOB="4518000000000005500012800b0001006272696467650000400002800500250000000000060006008bbc00000800"], 0x78}}, 0x0) 15:41:03 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0xffffff81, &(0x7f00000004c0)={&(0x7f0000000cc0)=ANY=[@ANYBLOB="7800000010000507000000bc4b9ccfc900000000", @ANYRES32, @ANYBLOB="4518000000000000500012800b0001006272696467650000400002800500250000020000060006008bbc00000800010013000000060009000020000005002b000700000005002b00810000000c002200010000000000000008000a00"], 0x78}}, 0x0) 15:41:03 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4f203, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) 15:41:03 executing program 4 (fault-call:0 fault-nth:53): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4f203, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) [ 1212.041760][T31316] netlink: 'syz-executor.2': attribute type 6 has an invalid length. 15:41:03 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0xffffff81, &(0x7f00000004c0)={&(0x7f0000000cc0)=ANY=[@ANYBLOB="7800000010000507000000bc4b9ccfc900000000", @ANYRES32, @ANYBLOB="4518000000000000500012800b0001006272696467650000400002800500250000030000060006008bbc00000800010013000000060009000020000005002b000700000005002b00810000000c002200010000000000000008000a00"], 0x78}}, 0x0) 15:41:03 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4f203, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) [ 1212.097283][T31325] EXT4-fs (loop3): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? [ 1212.122601][T31337] FAULT_INJECTION: forcing a failure. [ 1212.122601][T31337] name failslab, interval 1, probability 0, space 0, times 0 [ 1212.135720][T31337] CPU: 1 PID: 31337 Comm: syz-executor.4 Tainted: G W 5.4.125-syzkaller-00005-gb8b657d4d5e9 #0 [ 1212.147344][T31337] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1212.157395][T31337] Call Trace: [ 1212.160689][T31337] dump_stack+0x1d8/0x24e [ 1212.165010][T31337] ? devkmsg_release+0x11c/0x11c [ 1212.170024][T31337] ? show_regs_print_info+0x12/0x12 [ 1212.175222][T31337] should_fail+0x6f6/0x860 [ 1212.179620][T31337] ? setup_fault_attr+0x3d0/0x3d0 [ 1212.184729][T31337] ? __down_read+0xf1/0x210 [ 1212.189233][T31337] ? mutex_lock+0xa6/0x110 [ 1212.193630][T31337] ? __list_lru_init+0xa7/0x550 [ 1212.198546][T31337] should_failslab+0x5/0x20 [ 1212.203029][T31337] kmem_cache_alloc_trace+0x39/0x2b0 [ 1212.208385][T31337] __list_lru_init+0xa7/0x550 [ 1212.213040][T31337] ? prealloc_shrinker+0x1c0/0x210 [ 1212.218128][T31337] alloc_super+0x640/0x750 [ 1212.222524][T31337] ? mount_bdev+0x340/0x340 [ 1212.227025][T31337] sget+0x20e/0x4e0 [ 1212.230812][T31337] ? test_bdev_super+0x40/0x40 [ 1212.235554][T31337] mount_bdev+0xe3/0x340 [ 1212.239774][T31337] ? ext4_mount+0x40/0x40 [ 1212.244082][T31337] legacy_get_tree+0xde/0x170 [ 1212.248744][T31337] ? ext4_lazyinit_thread+0xd40/0xd40 [ 1212.254200][T31337] vfs_get_tree+0x83/0x260 [ 1212.258594][T31337] do_mount+0x19d0/0x2670 [ 1212.262903][T31337] ? copy_mount_string+0x30/0x30 [ 1212.267838][T31337] ? copy_mount_options+0x1d8/0x300 [ 1212.273036][T31337] ? copy_mount_options+0x210/0x300 [ 1212.278239][T31337] ? __sanitizer_cov_trace_pc+0x36/0x50 [ 1212.283762][T31337] ? copy_mount_options+0x273/0x300 [ 1212.288939][T31337] ksys_mount+0xc2/0xf0 [ 1212.293078][T31337] __x64_sys_mount+0xb1/0xc0 [ 1212.297648][T31337] do_syscall_64+0xcb/0x1e0 [ 1212.302143][T31337] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1212.308020][T31337] RIP: 0033:0x7f2bd50b1c5a [ 1212.312440][T31337] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1212.332020][T31337] RSP: 002b:00007f2bd2e27fa8 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 1212.340409][T31337] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007f2bd50b1c5a 15:41:04 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4f203, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024", 0x29, 0x7e0}], 0x0, &(0x7f0000013000)) 15:41:04 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4f203, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d90000000f0000000100000000000000000300000020000000200000200000002cc4645f2cc4645f0100ffff53ef0100010000002cc4645f000000000000000001000000000000000b0000008000000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e3338363633343038350000000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000000000000000000000000000000000000d9ca5cac99fd4329af4dde786c1a5d13010040000c000000000000002cc4645f", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) 15:41:04 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000cc0)=ANY=[@ANYBLOB="7800000010000507000000bc4b9ccfc900000000", @ANYRES32, @ANYBLOB="4518000000000006500012800b0001006272696467650000400002800500250000000000060006008bbc00000800"], 0x78}}, 0x0) [ 1212.348362][T31337] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007f2bd2e28000 [ 1212.356314][T31337] RBP: 00007f2bd2e28040 R08: 00007f2bd2e28040 R09: 0000000020000000 [ 1212.364265][T31337] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000020000000 [ 1212.372214][T31337] R13: 0000000020000100 R14: 00007f2bd2e28000 R15: 0000000020013000 [ 1212.452698][T31347] EXT4-fs (loop3): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? 15:41:04 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000cc0)=ANY=[@ANYBLOB="7800000010000507000000bc4b9ccfc900000000", @ANYRES32, @ANYBLOB="4518000000004000500012800b0001006272696467650000400002800500250000000000060006008bbc00000800010013000000060009000020000005002b000700000005002b00810000000c002200010000000000000008000a00"], 0x78}}, 0x0) 15:41:04 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4f203, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) 15:41:04 executing program 4 (fault-call:0 fault-nth:54): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4f203, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) 15:41:04 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0xffffff81, &(0x7f00000004c0)={&(0x7f0000000cc0)=ANY=[@ANYBLOB="7800000010000507000000bc4b9ccfc900000000", @ANYRES32, @ANYBLOB="4518000000000000500012800b0001006272696467650000400002800500250000040000060006008bbc00000800010013000000060009000020000005002b000700000005002b00810000000c002200010000000000000008000a00"], 0x78}}, 0x0) 15:41:04 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4f203, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024", 0x29, 0x7e0}], 0x0, &(0x7f0000013000)) 15:41:04 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000cc0)=ANY=[@ANYBLOB="7800000010000507000000bc4b9ccfc900000000", @ANYRES32, @ANYBLOB="4518000000000007500012800b0001006272696467650000400002800500250000000000060006008bbc00000800"], 0x78}}, 0x0) 15:41:04 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4f203, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) 15:41:04 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4f203, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) 15:41:04 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000cc0)=ANY=[@ANYBLOB="7800000010000507000000bc4b9ccfc900000000", @ANYRES32, @ANYBLOB="4518000000000008500012800b0001006272696467650000400002800500250000000000060006008bbc00000800"], 0x78}}, 0x0) 15:41:04 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4f203, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) [ 1212.558138][T31360] EXT4-fs (loop3): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? [ 1212.569632][T31357] FAULT_INJECTION: forcing a failure. [ 1212.569632][T31357] name failslab, interval 1, probability 0, space 0, times 0 [ 1212.592219][T31357] CPU: 0 PID: 31357 Comm: syz-executor.4 Tainted: G W 5.4.125-syzkaller-00005-gb8b657d4d5e9 #0 15:41:04 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4f203, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) 15:41:04 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4f203, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d90000000f0000000100000000000000000700000020000000200000200000002cc4645f2cc4645f0100ffff53ef0100010000002cc4645f000000000000000001000000000000000b0000008000000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e3338363633343038350000000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000000000000000000000000000000000000d9ca5cac99fd4329af4dde786c1a5d13010040000c000000000000002cc4645f", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) [ 1212.603862][T31357] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1212.613913][T31357] Call Trace: [ 1212.617211][T31357] dump_stack+0x1d8/0x24e [ 1212.621544][T31357] ? devkmsg_release+0x11c/0x11c [ 1212.626493][T31357] ? show_regs_print_info+0x12/0x12 [ 1212.631692][T31357] ? stack_trace_save+0x120/0x1f0 [ 1212.636715][T31357] ? stack_trace_snprint+0x150/0x150 [ 1212.642191][T31357] ? stack_trace_save+0x120/0x1f0 [ 1212.647218][T31357] should_fail+0x6f6/0x860 [ 1212.651636][T31357] ? setup_fault_attr+0x3d0/0x3d0 [ 1212.656822][T31357] ? __kasan_kmalloc+0x1a3/0x1e0 [ 1212.661801][T31357] ? ext4_fill_super+0xd4/0xeb30 [ 1212.666723][T31357] should_failslab+0x5/0x20 [ 1212.671201][T31357] __kmalloc_track_caller+0x5d/0x2e0 [ 1212.676462][T31357] ? mount_bdev+0xe3/0x340 [ 1212.680950][T31357] ? legacy_get_tree+0xde/0x170 [ 1212.685779][T31357] ? vfs_get_tree+0x83/0x260 [ 1212.690355][T31357] ? string+0x280/0x2c0 [ 1212.694493][T31357] kstrdup+0x31/0x70 [ 1212.698372][T31357] ext4_fill_super+0xd4/0xeb30 [ 1212.703120][T31357] ? pointer+0x222/0xb10 [ 1212.707494][T31357] ? string+0x2c0/0x2c0 [ 1212.711669][T31357] ? vsnprintf+0x1d60/0x1d60 [ 1212.716250][T31357] ? vsnprintf+0x1cb4/0x1d60 [ 1212.720822][T31357] ? delete_node+0x733/0x790 [ 1212.725387][T31357] ? ext4_mount+0x40/0x40 [ 1212.729719][T31357] ? idr_replace+0x1c4/0x230 [ 1212.734284][T31357] ? snprintf+0xd6/0x120 [ 1212.738505][T31357] ? vscnprintf+0x80/0x80 [ 1212.742812][T31357] ? set_blocksize+0x1a5/0x3a0 [ 1212.747555][T31357] mount_bdev+0x22d/0x340 [ 1212.751871][T31357] ? ext4_mount+0x40/0x40 [ 1212.756177][T31357] legacy_get_tree+0xde/0x170 [ 1212.760843][T31357] ? ext4_lazyinit_thread+0xd40/0xd40 [ 1212.766201][T31357] vfs_get_tree+0x83/0x260 [ 1212.770600][T31357] do_mount+0x19d0/0x2670 [ 1212.774908][T31357] ? copy_mount_string+0x30/0x30 [ 1212.779845][T31357] ? copy_mount_options+0x59/0x300 [ 1212.784939][T31357] ? copy_mount_options+0x59/0x300 [ 1212.790051][T31357] ? kmem_cache_alloc_trace+0x139/0x2b0 [ 1212.795570][T31357] ? copy_mount_options+0x273/0x300 [ 1212.800747][T31357] ksys_mount+0xc2/0xf0 [ 1212.804880][T31357] __x64_sys_mount+0xb1/0xc0 [ 1212.809445][T31357] do_syscall_64+0xcb/0x1e0 [ 1212.814066][T31357] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1212.819946][T31357] RIP: 0033:0x7f2bd50b1c5a [ 1212.824406][T31357] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1212.843996][T31357] RSP: 002b:00007f2bd2e27fa8 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 1212.852394][T31357] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007f2bd50b1c5a [ 1212.860391][T31357] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007f2bd2e28000 [ 1212.868369][T31357] RBP: 00007f2bd2e28040 R08: 00007f2bd2e28040 R09: 0000000020000000 [ 1212.876340][T31357] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000020000000 [ 1212.884355][T31357] R13: 0000000020000100 R14: 00007f2bd2e28000 R15: 0000000020013000 [ 1212.966781][T31360] EXT4-fs (loop3): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? [ 1212.982199][T31376] __nla_validate_parse: 26 callbacks suppressed [ 1212.982204][T31376] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.5'. [ 1212.997846][T31376] netlink: 36 bytes leftover after parsing attributes in process `syz-executor.5'. 15:41:04 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000cc0)=ANY=[@ANYBLOB="7800000010000507000000bc4b9ccfc900000000", @ANYRES32, @ANYBLOB="4518000000004800500012800b0001006272696467650000400002800500250000000000060006008bbc00000800010013000000060009000020000005002b000700000005002b00810000000c002200010000000000000008000a00"], 0x78}}, 0x0) 15:41:04 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000cc0)=ANY=[@ANYBLOB="7800000010000507000000bc4b9ccfc900000000", @ANYRES32, @ANYBLOB="4518000000000009500012800b0001006272696467650000400002800500250000000000060006008bbc00000800"], 0x78}}, 0x0) 15:41:04 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4f203, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) 15:41:04 executing program 4 (fault-call:0 fault-nth:55): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4f203, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) 15:41:04 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0xffffff81, &(0x7f00000004c0)={&(0x7f0000000cc0)=ANY=[@ANYBLOB="7800000010000507000000bc4b9ccfc900000000", @ANYRES32, @ANYBLOB="4518000000000000500012800b0001006272696467650000400002800500250000050000060006008bbc00000800010013000000060009000020000005002b000700000005002b00810000000c002200010000000000000008000a00"], 0x78}}, 0x0) 15:41:04 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4f203, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024", 0x29, 0x7e0}], 0x0, &(0x7f0000013000)) 15:41:04 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4f203, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) [ 1213.122216][T31389] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.5'. [ 1213.137626][T31391] FAULT_INJECTION: forcing a failure. [ 1213.137626][T31391] name failslab, interval 1, probability 0, space 0, times 0 [ 1213.143364][T31389] netlink: 36 bytes leftover after parsing attributes in process `syz-executor.5'. [ 1213.150645][T31391] CPU: 1 PID: 31391 Comm: syz-executor.4 Tainted: G W 5.4.125-syzkaller-00005-gb8b657d4d5e9 #0 15:41:05 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4f203, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d90000000f0000000100000000000000000a00000020000000200000200000002cc4645f2cc4645f0100ffff53ef0100010000002cc4645f000000000000000001000000000000000b0000008000000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e3338363633343038350000000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000000000000000000000000000000000000d9ca5cac99fd4329af4dde786c1a5d13010040000c000000000000002cc4645f", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) [ 1213.159760][T31390] EXT4-fs (loop3): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? [ 1213.171190][T31391] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1213.171194][T31391] Call Trace: [ 1213.171214][T31391] dump_stack+0x1d8/0x24e [ 1213.171224][T31391] ? devkmsg_release+0x11c/0x11c [ 1213.171232][T31391] ? show_regs_print_info+0x12/0x12 [ 1213.171239][T31391] ? stack_trace_save+0x120/0x1f0 [ 1213.171246][T31391] ? stack_trace_snprint+0x150/0x150 15:41:05 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4f203, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) 15:41:05 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4f203, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) 15:41:05 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4f203, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) [ 1213.171252][T31391] ? stack_trace_save+0x120/0x1f0 [ 1213.171261][T31391] should_fail+0x6f6/0x860 [ 1213.171270][T31391] ? setup_fault_attr+0x3d0/0x3d0 [ 1213.171278][T31391] ? __kasan_kmalloc+0x1a3/0x1e0 [ 1213.171289][T31391] ? ext4_fill_super+0xd4/0xeb30 [ 1213.171298][T31391] should_failslab+0x5/0x20 [ 1213.171308][T31391] __kmalloc_track_caller+0x5d/0x2e0 [ 1213.171317][T31391] ? mount_bdev+0xe3/0x340 [ 1213.171325][T31391] ? legacy_get_tree+0xde/0x170 [ 1213.171332][T31391] ? vfs_get_tree+0x83/0x260 [ 1213.171339][T31391] ? string+0x280/0x2c0 15:41:05 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4f203, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) [ 1213.171351][T31391] kstrdup+0x31/0x70 [ 1213.171359][T31391] ext4_fill_super+0xd4/0xeb30 [ 1213.171367][T31391] ? pointer+0x222/0xb10 [ 1213.171375][T31391] ? string+0x2c0/0x2c0 [ 1213.171383][T31391] ? vsnprintf+0x1d60/0x1d60 [ 1213.171395][T31391] ? vsnprintf+0x1cb4/0x1d60 [ 1213.171403][T31391] ? delete_node+0x733/0x790 [ 1213.171414][T31391] ? ext4_mount+0x40/0x40 [ 1213.171421][T31391] ? idr_replace+0x1c4/0x230 [ 1213.171429][T31391] ? snprintf+0xd6/0x120 [ 1213.171437][T31391] ? vscnprintf+0x80/0x80 [ 1213.171448][T31391] ? set_blocksize+0x1a5/0x3a0 [ 1213.171457][T31391] mount_bdev+0x22d/0x340 [ 1213.171465][T31391] ? ext4_mount+0x40/0x40 [ 1213.171474][T31391] legacy_get_tree+0xde/0x170 [ 1213.171484][T31391] ? ext4_lazyinit_thread+0xd40/0xd40 [ 1213.171493][T31391] vfs_get_tree+0x83/0x260 [ 1213.171502][T31391] do_mount+0x19d0/0x2670 [ 1213.171512][T31391] ? copy_mount_string+0x30/0x30 [ 1213.171521][T31391] ? copy_mount_options+0x59/0x300 [ 1213.171529][T31391] ? kmem_cache_alloc_trace+0x139/0x2b0 [ 1213.171537][T31391] ? copy_mount_options+0x273/0x300 [ 1213.171544][T31391] ksys_mount+0xc2/0xf0 [ 1213.171552][T31391] __x64_sys_mount+0xb1/0xc0 [ 1213.171562][T31391] do_syscall_64+0xcb/0x1e0 [ 1213.171571][T31391] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1213.171580][T31391] RIP: 0033:0x7f2bd50b1c5a [ 1213.171590][T31391] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1213.171595][T31391] RSP: 002b:00007f2bd2e27fa8 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 1213.171604][T31391] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007f2bd50b1c5a [ 1213.171610][T31391] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007f2bd2e28000 [ 1213.171615][T31391] RBP: 00007f2bd2e28040 R08: 00007f2bd2e28040 R09: 0000000020000000 [ 1213.171620][T31391] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000020000000 [ 1213.171625][T31391] R13: 0000000020000100 R14: 00007f2bd2e28000 R15: 0000000020013000 [ 1213.508583][T31390] EXT4-fs (loop3): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? [ 1213.641486][T31389] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.5'. [ 1213.656548][T31389] netlink: 36 bytes leftover after parsing attributes in process `syz-executor.5'. 15:41:05 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000cc0)=ANY=[@ANYBLOB="7800000010000507000000bc4b9ccfc900000000", @ANYRES32, @ANYBLOB="4518000000004a00500012800b0001006272696467650000400002800500250000000000060006008bbc00000800010013000000060009000020000005002b000700000005002b00810000000c002200010000000000000008000a00"], 0x78}}, 0x0) 15:41:05 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4f203, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) 15:41:05 executing program 4 (fault-call:0 fault-nth:56): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4f203, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) 15:41:05 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4f203, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024", 0x29, 0x7e0}], 0x0, &(0x7f0000013000)) 15:41:05 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0xffffff81, &(0x7f00000004c0)={&(0x7f0000000cc0)=ANY=[@ANYBLOB="7800000010000507000000bc4b9ccfc900000000", @ANYRES32, @ANYBLOB="4518000000000000500012800b0001006272696467650000400002800500250000060000060006008bbc00000800010013000000060009000020000005002b000700000005002b00810000000c002200010000000000000008000a00"], 0x78}}, 0x0) 15:41:05 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000cc0)=ANY=[@ANYBLOB="7800000010000507000000bc4b9ccfc900000000", @ANYRES32, @ANYBLOB="451800000000000a500012800b0001006272696467650000400002800500250000000000060006008bbc00000800"], 0x78}}, 0x0) 15:41:05 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4f203, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) [ 1213.748472][T31418] EXT4-fs (loop3): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? [ 1213.759672][T31423] FAULT_INJECTION: forcing a failure. [ 1213.759672][T31423] name failslab, interval 1, probability 0, space 0, times 0 [ 1213.777532][T31423] CPU: 0 PID: 31423 Comm: syz-executor.4 Tainted: G W 5.4.125-syzkaller-00005-gb8b657d4d5e9 #0 15:41:05 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4f203, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) 15:41:05 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4f203, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) 15:41:05 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4f203, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) [ 1213.789165][T31423] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1213.799218][T31423] Call Trace: [ 1213.802516][T31423] dump_stack+0x1d8/0x24e [ 1213.806847][T31423] ? devkmsg_release+0x11c/0x11c [ 1213.811794][T31423] ? show_regs_print_info+0x12/0x12 [ 1213.817004][T31423] should_fail+0x6f6/0x860 [ 1213.821429][T31423] ? setup_fault_attr+0x3d0/0x3d0 [ 1213.826546][T31423] ? ext4_fill_super+0x113/0xeb30 [ 1213.831572][T31423] ? ext4_fill_super+0x399/0xeb30 [ 1213.836597][T31423] should_failslab+0x5/0x20 [ 1213.841107][T31423] kmem_cache_alloc_trace+0x39/0x2b0 15:41:05 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4f203, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) 15:41:05 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4f203, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) [ 1213.846398][T31423] ? ext4_fill_super+0x113/0xeb30 [ 1213.851514][T31423] ext4_fill_super+0x399/0xeb30 [ 1213.856369][T31423] ? string+0x2c0/0x2c0 [ 1213.860529][T31423] ? vsnprintf+0x1d60/0x1d60 [ 1213.865122][T31423] ? vsnprintf+0x1cb4/0x1d60 [ 1213.869700][T31423] ? delete_node+0x733/0x790 [ 1213.874285][T31423] ? ext4_mount+0x40/0x40 [ 1213.878613][T31423] ? idr_replace+0x1c4/0x230 [ 1213.883293][T31423] ? snprintf+0xd6/0x120 [ 1213.887574][T31423] ? vscnprintf+0x80/0x80 [ 1213.891928][T31423] ? set_blocksize+0x1a5/0x3a0 [ 1213.896682][T31423] mount_bdev+0x22d/0x340 [ 1213.901016][T31423] ? ext4_mount+0x40/0x40 [ 1213.905328][T31423] legacy_get_tree+0xde/0x170 [ 1213.910165][T31423] ? ext4_lazyinit_thread+0xd40/0xd40 [ 1213.915515][T31423] vfs_get_tree+0x83/0x260 [ 1213.919910][T31423] do_mount+0x19d0/0x2670 [ 1213.924219][T31423] ? copy_mount_string+0x30/0x30 [ 1213.929285][T31423] ? copy_mount_options+0x59/0x300 [ 1213.934399][T31423] ? kmem_cache_alloc_trace+0x139/0x2b0 [ 1213.939924][T31423] ? copy_mount_options+0x273/0x300 [ 1213.945098][T31423] ksys_mount+0xc2/0xf0 [ 1213.949258][T31423] __x64_sys_mount+0xb1/0xc0 [ 1213.953830][T31423] do_syscall_64+0xcb/0x1e0 [ 1213.958433][T31423] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1213.964301][T31423] RIP: 0033:0x7f2bd50b1c5a [ 1213.968694][T31423] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1213.988411][T31423] RSP: 002b:00007f2bd2e27fa8 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 1213.996825][T31423] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007f2bd50b1c5a [ 1214.004776][T31423] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007f2bd2e28000 [ 1214.012815][T31423] RBP: 00007f2bd2e28040 R08: 00007f2bd2e28040 R09: 0000000020000000 [ 1214.020778][T31423] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000020000000 [ 1214.028747][T31423] R13: 0000000020000100 R14: 00007f2bd2e28000 R15: 0000000020013000 [ 1214.041309][T31425] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.5'. [ 1214.050799][T31425] netlink: 36 bytes leftover after parsing attributes in process `syz-executor.5'. 15:41:06 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000cc0)=ANY=[@ANYBLOB="7800000010000507000000bc4b9ccfc900000000", @ANYRES32, @ANYBLOB="4518000000004c00500012800b0001006272696467650000400002800500250000000000060006008bbc00000800010013000000060009000020000005002b000700000005002b00810000000c002200010000000000000008000a00"], 0x78}}, 0x0) 15:41:06 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4f203, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d90000000f0000000100000000000000003f00000020000000200000200000002cc4645f2cc4645f0100ffff53ef0100010000002cc4645f000000000000000001000000000000000b0000008000000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e3338363633343038350000000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000000000000000000000000000000000000d9ca5cac99fd4329af4dde786c1a5d13010040000c000000000000002cc4645f", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) 15:41:06 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0xffffff81, &(0x7f00000004c0)={&(0x7f0000000cc0)=ANY=[@ANYBLOB="7800000010000507000000bc4b9ccfc900000000", @ANYRES32, @ANYBLOB="4518000000000000500012800b0001006272696467650000400002800500250000070000060006008bbc00000800010013000000060009000020000005002b000700000005002b00810000000c002200010000000000000008000a00"], 0x78}}, 0x0) 15:41:06 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4f203, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024", 0x29, 0x7e0}], 0x0, &(0x7f0000013000)) 15:41:06 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000cc0)=ANY=[@ANYBLOB="7800000010000507000000bc4b9ccfc900000000", @ANYRES32, @ANYBLOB="451800000000000b500012800b0001006272696467650000400002800500250000000000060006008bbc00000800"], 0x78}}, 0x0) 15:41:06 executing program 4 (fault-call:0 fault-nth:57): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4f203, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) 15:41:06 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4f203, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) 15:41:06 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4f203, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024", 0x29, 0x7e0}], 0x0, &(0x7f0000013000)) [ 1214.172163][T31450] EXT4-fs (loop3): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? [ 1214.206320][T31456] FAULT_INJECTION: forcing a failure. [ 1214.206320][T31456] name failslab, interval 1, probability 0, space 0, times 0 [ 1214.221492][T31454] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.5'. [ 1214.230886][T31456] CPU: 1 PID: 31456 Comm: syz-executor.4 Tainted: G W 5.4.125-syzkaller-00005-gb8b657d4d5e9 #0 [ 1214.242513][T31456] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1214.243900][T31454] netlink: 36 bytes leftover after parsing attributes in process `syz-executor.5'. [ 1214.252559][T31456] Call Trace: [ 1214.252579][T31456] dump_stack+0x1d8/0x24e [ 1214.252588][T31456] ? devkmsg_release+0x11c/0x11c [ 1214.252596][T31456] ? show_regs_print_info+0x12/0x12 [ 1214.252607][T31456] ? mem_cgroup_charge_statistics+0x165/0x1c0 [ 1214.252618][T31456] should_fail+0x6f6/0x860 [ 1214.252627][T31456] ? setup_fault_attr+0x3d0/0x3d0 [ 1214.252643][T31456] ? xas_load+0x493/0x4f0 [ 1214.300476][T31456] ? alloc_page_buffers+0x109/0x3f0 [ 1214.305654][T31456] ? mempool_alloc_slab+0x16/0x20 [ 1214.310762][T31456] should_failslab+0x5/0x20 [ 1214.315271][T31456] kmem_cache_alloc+0x36/0x290 [ 1214.320012][T31456] ? check_preemption_disabled+0x9e/0x330 [ 1214.325709][T31456] ? mempool_free+0x380/0x380 [ 1214.330382][T31456] mempool_alloc_slab+0x16/0x20 [ 1214.335215][T31456] mempool_alloc+0x113/0x680 [ 1214.339795][T31456] ? mempool_resize+0x900/0x900 [ 1214.344621][T31456] ? check_preemption_disabled+0x9e/0x330 [ 1214.350317][T31456] ? __find_get_block+0xed7/0x10c0 [ 1214.355426][T31456] bio_alloc_bioset+0x1db/0x640 [ 1214.360273][T31456] ? write_boundary_block+0x150/0x150 [ 1214.365622][T31456] ? _raw_spin_lock+0xa3/0x1b0 [ 1214.370365][T31456] ? bio_chain_endio+0x110/0x110 [ 1214.375281][T31456] ? init_page_buffers+0x367/0x390 [ 1214.380391][T31456] submit_bh_wbc+0x1ba/0x790 [ 1214.384964][T31456] __bread_gfp+0x181/0x310 [ 1214.389378][T31456] ext4_fill_super+0x866/0xeb30 [ 1214.394225][T31456] ? string+0x2c0/0x2c0 [ 1214.398358][T31456] ? vsnprintf+0x1d60/0x1d60 [ 1214.402929][T31456] ? vsnprintf+0x1cb4/0x1d60 [ 1214.407496][T31456] ? delete_node+0x733/0x790 [ 1214.412108][T31456] ? ext4_mount+0x40/0x40 [ 1214.416427][T31456] ? idr_replace+0x1c4/0x230 [ 1214.420995][T31456] ? snprintf+0xd6/0x120 [ 1214.425214][T31456] ? vscnprintf+0x80/0x80 [ 1214.429528][T31456] ? set_blocksize+0x1a5/0x3a0 [ 1214.434271][T31456] mount_bdev+0x22d/0x340 [ 1214.438605][T31456] ? ext4_mount+0x40/0x40 [ 1214.442912][T31456] legacy_get_tree+0xde/0x170 [ 1214.447569][T31456] ? ext4_lazyinit_thread+0xd40/0xd40 [ 1214.452919][T31456] vfs_get_tree+0x83/0x260 [ 1214.457312][T31456] do_mount+0x19d0/0x2670 [ 1214.461621][T31456] ? copy_mount_string+0x30/0x30 [ 1214.466558][T31456] ? copy_mount_options+0x59/0x300 [ 1214.471646][T31456] ? copy_mount_options+0x59/0x300 [ 1214.476734][T31456] ? kmem_cache_alloc_trace+0x139/0x2b0 [ 1214.482266][T31456] ? copy_mount_options+0x273/0x300 [ 1214.487442][T31456] ksys_mount+0xc2/0xf0 [ 1214.491577][T31456] __x64_sys_mount+0xb1/0xc0 [ 1214.496408][T31456] do_syscall_64+0xcb/0x1e0 [ 1214.500897][T31456] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1214.506768][T31456] RIP: 0033:0x7f2bd50b1c5a [ 1214.511161][T31456] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1214.530742][T31456] RSP: 002b:00007f2bd2e27fa8 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 1214.539131][T31456] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007f2bd50b1c5a [ 1214.547079][T31456] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007f2bd2e28000 [ 1214.555031][T31456] RBP: 00007f2bd2e28040 R08: 00007f2bd2e28040 R09: 0000000020000000 [ 1214.562981][T31456] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000020000000 15:41:06 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0xffffff81, &(0x7f00000004c0)={&(0x7f0000000cc0)=ANY=[@ANYBLOB="7800000010000507000000bc4b9ccfc900000000", @ANYRES32, @ANYBLOB="4518000000000000500012800b0001006272696467650000400002800500250000080000060006008bbc00000800010013000000060009000020000005002b000700000005002b00810000000c002200010000000000000008000a00"], 0x78}}, 0x0) 15:41:06 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4f203, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024", 0x29, 0x7e0}], 0x0, &(0x7f0000013000)) 15:41:06 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4f203, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) 15:41:06 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4f203, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) [ 1214.570956][T31456] R13: 0000000020000100 R14: 00007f2bd2e28000 R15: 0000000020013000 [ 1214.591186][T31456] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue [ 1214.602379][T31456] ext4 filesystem being mounted at /root/syzkaller-testdir028365481/syzkaller.u34vxW/1331/file0 supports timestamps until 2038 (0x7fffffff) [ 1214.631733][T31471] EXT4-fs (loop3): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? 15:41:06 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000cc0)=ANY=[@ANYBLOB="7800000010000507000000bc4b9ccfc900000000", @ANYRES32, @ANYBLOB="4518000000016400500012800b0001006272696467650000400002800500250000000000060006008bbc00000800010013000000060009000020000005002b000700000005002b00810000000c002200010000000000000008000a00"], 0x78}}, 0x0) 15:41:06 executing program 4 (fault-call:0 fault-nth:58): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4f203, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d90000000f0000000100000000000000000000000020000000200000200000002cc4645f2cc4645f0100ffff53ef0100010000002cc4645f000000000000000001000000000000000b0000008000000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e3338363633343038350000000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000000000000000000000000000000000000d9ca5cac99fd4329af4dde786c1a5d13010040000c000000000000002cc4645f", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) 15:41:06 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4f203, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) 15:41:06 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4f203, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024", 0x29, 0x7e0}], 0x0, &(0x7f0000013000)) 15:41:06 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0xffffff81, &(0x7f00000004c0)={&(0x7f0000000cc0)=ANY=[@ANYBLOB="7800000010000507000000bc4b9ccfc900000000", @ANYRES32, @ANYBLOB="4518000000000000500012800b0001006272696467650000400002800500250000090000060006008bbc00000800010013000000060009000020000005002b000700000005002b00810000000c002200010000000000000008000a00"], 0x78}}, 0x0) 15:41:06 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000cc0)=ANY=[@ANYBLOB="7800000010000507000000bc4b9ccfc900000000", @ANYRES32, @ANYBLOB="451800000000000c500012800b0001006272696467650000400002800500250000000000060006008bbc00000800"], 0x78}}, 0x0) 15:41:06 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4f203, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d90000000f000000010000000000fffffffe00000020000000200000200000002cc4645f2cc4645f0100ffff53ef0100010000002cc4645f000000000000000001000000000000000b0000008000000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e3338363633343038350000000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000000000000000000000000000000000000d9ca5cac99fd4329af4dde786c1a5d13010040000c000000000000002cc4645f", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) [ 1214.817380][T31482] EXT4-fs (loop3): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? [ 1214.828716][T31483] FAULT_INJECTION: forcing a failure. [ 1214.828716][T31483] name failslab, interval 1, probability 0, space 0, times 0 [ 1214.852500][T31483] CPU: 0 PID: 31483 Comm: syz-executor.4 Tainted: G W 5.4.125-syzkaller-00005-gb8b657d4d5e9 #0 [ 1214.864350][T31483] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1214.874390][T31483] Call Trace: [ 1214.877673][T31483] dump_stack+0x1d8/0x24e [ 1214.881993][T31483] ? devkmsg_release+0x11c/0x11c [ 1214.886924][T31483] ? show_regs_print_info+0x12/0x12 [ 1214.892098][T31483] ? __kasan_kmalloc+0x1a3/0x1e0 [ 1214.897054][T31483] ? __kasan_kmalloc+0x137/0x1e0 [ 1214.901969][T31483] should_fail+0x6f6/0x860 [ 1214.906424][T31483] ? setup_fault_attr+0x3d0/0x3d0 [ 1214.911475][T31483] ? entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1214.917607][T31483] ? create_task_io_context+0x28/0x3a0 [ 1214.923043][T31483] should_failslab+0x5/0x20 [ 1214.927579][T31483] kmem_cache_alloc+0x36/0x290 [ 1214.932332][T31483] create_task_io_context+0x28/0x3a0 [ 1214.937601][T31483] generic_make_request_checks+0xb3e/0xf90 [ 1214.943387][T31483] ? generic_make_request+0xda0/0xda0 [ 1214.948758][T31483] ? mempool_alloc_slab+0x16/0x20 [ 1214.953760][T31483] ? kmem_cache_alloc+0x115/0x290 [ 1214.958756][T31483] ? check_preemption_disabled+0x9e/0x330 [ 1214.964454][T31483] ? mempool_alloc_slab+0x16/0x20 [ 1214.969451][T31483] ? mempool_alloc+0x120/0x680 [ 1214.974193][T31483] generic_make_request+0xc9/0xda0 [ 1214.979307][T31483] ? mempool_resize+0x900/0x900 [ 1214.984223][T31483] ? blk_attempt_plug_merge+0x310/0x310 [ 1214.989738][T31483] ? memset+0x1f/0x40 [ 1214.993699][T31483] ? fscrypt_set_bio_crypt_ctx+0x179/0x4e0 [ 1214.999508][T31483] ? __bio_add_page+0x270/0x430 [ 1215.004343][T31483] submit_bio+0x146/0x5d0 [ 1215.008649][T31483] ? __rcu_read_lock+0x50/0x50 [ 1215.013478][T31483] ? direct_make_request+0x440/0x440 [ 1215.018742][T31483] ? submit_bh_wbc+0x631/0x790 [ 1215.023482][T31483] __bread_gfp+0x181/0x310 [ 1215.027876][T31483] ext4_fill_super+0x866/0xeb30 [ 1215.032725][T31483] ? string+0x2c0/0x2c0 [ 1215.036856][T31483] ? vsnprintf+0x1d60/0x1d60 [ 1215.041423][T31483] ? vsnprintf+0x1cb4/0x1d60 [ 1215.045988][T31483] ? delete_node+0x733/0x790 [ 1215.050555][T31483] ? ext4_mount+0x40/0x40 [ 1215.054860][T31483] ? idr_replace+0x1c4/0x230 [ 1215.059515][T31483] ? snprintf+0xd6/0x120 [ 1215.063732][T31483] ? vscnprintf+0x80/0x80 [ 1215.068037][T31483] ? set_blocksize+0x1a5/0x3a0 [ 1215.072808][T31483] mount_bdev+0x22d/0x340 [ 1215.077123][T31483] ? ext4_mount+0x40/0x40 [ 1215.081437][T31483] legacy_get_tree+0xde/0x170 [ 1215.086089][T31483] ? ext4_lazyinit_thread+0xd40/0xd40 [ 1215.091438][T31483] vfs_get_tree+0x83/0x260 [ 1215.095834][T31483] do_mount+0x19d0/0x2670 [ 1215.100137][T31483] ? copy_mount_string+0x30/0x30 [ 1215.105057][T31483] ? copy_mount_options+0x59/0x300 [ 1215.110147][T31483] ? copy_mount_options+0x59/0x300 [ 1215.115231][T31483] ? kmem_cache_alloc_trace+0x139/0x2b0 [ 1215.120773][T31483] ? copy_mount_options+0x273/0x300 [ 1215.125945][T31483] ksys_mount+0xc2/0xf0 [ 1215.130096][T31483] __x64_sys_mount+0xb1/0xc0 [ 1215.134664][T31483] do_syscall_64+0xcb/0x1e0 [ 1215.139191][T31483] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1215.145064][T31483] RIP: 0033:0x7f2bd50b1c5a 15:41:07 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4f203, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) [ 1215.149475][T31483] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1215.169315][T31483] RSP: 002b:00007f2bd2e27fa8 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 1215.177705][T31483] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007f2bd50b1c5a [ 1215.185653][T31483] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007f2bd2e28000 [ 1215.193627][T31483] RBP: 00007f2bd2e28040 R08: 00007f2bd2e28040 R09: 0000000020000000 [ 1215.201604][T31483] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000020000000 [ 1215.209574][T31483] R13: 0000000020000100 R14: 00007f2bd2e28000 R15: 0000000020013000 15:41:07 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4f203, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) 15:41:07 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4f203, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024", 0x29, 0x7e0}], 0x0, &(0x7f0000013000)) 15:41:07 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0xffffff81, &(0x7f00000004c0)={&(0x7f0000000cc0)=ANY=[@ANYBLOB="7800000010000507000000bc4b9ccfc900000000", @ANYRES32, @ANYBLOB="4518000000000000500012800b00010062726964676500004000028005002500000a0000060006008bbc00000800010013000000060009000020000005002b000700000005002b00810000000c002200010000000000000008000a00"], 0x78}}, 0x0) 15:41:07 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000cc0)=ANY=[@ANYBLOB="7800000010000507000000bc4b9ccfc900000000", @ANYRES32, @ANYBLOB="451800000000000d500012800b0001006272696467650000400002800500250000000000060006008bbc00000800"], 0x78}}, 0x0) [ 1215.232146][T31483] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue [ 1215.243488][T31483] ext4 filesystem being mounted at /root/syzkaller-testdir028365481/syzkaller.u34vxW/1332/file0 supports timestamps until 2038 (0x7fffffff) [ 1215.289669][T31499] EXT4-fs (loop3): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? [ 1215.369774][T31499] EXT4-fs (loop3): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? 15:41:07 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000cc0)=ANY=[@ANYBLOB="7800000010000507000000bc4b9ccfc900000000", @ANYRES32, @ANYBLOB="4518000000006800500012800b0001006272696467650000400002800500250000000000060006008bbc00000800010013000000060009000020000005002b000700000005002b00810000000c002200010000000000000008000a00"], 0x78}}, 0x0) 15:41:07 executing program 4 (fault-call:0 fault-nth:59): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4f203, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) 15:41:07 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4f203, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) 15:41:07 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0xffffff81, &(0x7f00000004c0)={&(0x7f0000000cc0)=ANY=[@ANYBLOB="7800000010000507000000bc4b9ccfc900000000", @ANYRES32, @ANYBLOB="4518000000000000500012800b00010062726964676500004000028005002500000b0000060006008bbc00000800010013000000060009000020000005002b000700000005002b00810000000c002200010000000000000008000a00"], 0x78}}, 0x0) 15:41:07 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4f203, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024", 0x29, 0x7e0}], 0x0, &(0x7f0000013000)) 15:41:07 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000cc0)=ANY=[@ANYBLOB="7800000010000507000000bc4b9ccfc900000000", @ANYRES32, @ANYBLOB="451800000000000e500012800b0001006272696467650000400002800500250000000000060006008bbc00000800"], 0x78}}, 0x0) 15:41:07 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4f203, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) [ 1215.449938][T31517] FAULT_INJECTION: forcing a failure. [ 1215.449938][T31517] name failslab, interval 1, probability 0, space 0, times 0 [ 1215.464030][T31517] CPU: 1 PID: 31517 Comm: syz-executor.4 Tainted: G W 5.4.125-syzkaller-00005-gb8b657d4d5e9 #0 [ 1215.475668][T31517] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1215.485723][T31517] Call Trace: [ 1215.489017][T31517] dump_stack+0x1d8/0x24e [ 1215.493349][T31517] ? devkmsg_release+0x11c/0x11c 15:41:07 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4f203, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) 15:41:07 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4f203, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) 15:41:07 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4f203, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) [ 1215.498291][T31517] ? show_regs_print_info+0x12/0x12 [ 1215.501565][T31518] EXT4-fs (loop3): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? [ 1215.503492][T31517] ? mem_cgroup_charge_statistics+0x165/0x1c0 [ 1215.503512][T31517] should_fail+0x6f6/0x860 [ 1215.524157][T31517] ? setup_fault_attr+0x3d0/0x3d0 [ 1215.529178][T31517] ? xas_load+0x493/0x4f0 [ 1215.533512][T31517] ? alloc_page_buffers+0x109/0x3f0 [ 1215.538769][T31517] ? mempool_alloc_slab+0x16/0x20 [ 1215.543800][T31517] should_failslab+0x5/0x20 15:41:07 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4f203, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) 15:41:07 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4f203, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) [ 1215.548304][T31517] kmem_cache_alloc+0x36/0x290 [ 1215.553070][T31517] ? check_preemption_disabled+0x9e/0x330 [ 1215.558791][T31517] ? mempool_free+0x380/0x380 [ 1215.563471][T31517] mempool_alloc_slab+0x16/0x20 [ 1215.568323][T31517] mempool_alloc+0x113/0x680 [ 1215.572920][T31517] ? mempool_resize+0x900/0x900 [ 1215.577768][T31517] ? check_preemption_disabled+0x9e/0x330 [ 1215.583635][T31517] ? __find_get_block+0xc5d/0x10c0 [ 1215.588725][T31517] bio_alloc_bioset+0x1db/0x640 [ 1215.593643][T31517] ? write_boundary_block+0x150/0x150 [ 1215.599254][T31517] ? _raw_spin_lock+0xa3/0x1b0 [ 1215.603997][T31517] ? bio_chain_endio+0x110/0x110 [ 1215.608970][T31517] ? init_page_buffers+0x367/0x390 [ 1215.614056][T31517] submit_bh_wbc+0x1ba/0x790 [ 1215.618623][T31517] __bread_gfp+0x181/0x310 [ 1215.623182][T31517] ext4_fill_super+0x866/0xeb30 [ 1215.628020][T31517] ? string+0x2c0/0x2c0 [ 1215.632162][T31517] ? vsnprintf+0x1d60/0x1d60 [ 1215.636726][T31517] ? vsnprintf+0x1cb4/0x1d60 [ 1215.641314][T31517] ? delete_node+0x733/0x790 [ 1215.645884][T31517] ? ext4_mount+0x40/0x40 [ 1215.650186][T31517] ? idr_replace+0x1c4/0x230 [ 1215.654781][T31517] ? snprintf+0xd6/0x120 [ 1215.658997][T31517] ? vscnprintf+0x80/0x80 [ 1215.663303][T31517] ? set_blocksize+0x1a5/0x3a0 [ 1215.668086][T31517] mount_bdev+0x22d/0x340 [ 1215.672393][T31517] ? ext4_mount+0x40/0x40 [ 1215.676699][T31517] legacy_get_tree+0xde/0x170 [ 1215.681352][T31517] ? ext4_lazyinit_thread+0xd40/0xd40 [ 1215.686699][T31517] vfs_get_tree+0x83/0x260 [ 1215.691090][T31517] do_mount+0x19d0/0x2670 [ 1215.695396][T31517] ? copy_mount_string+0x30/0x30 [ 1215.700307][T31517] ? copy_mount_options+0x59/0x300 [ 1215.705393][T31517] ? copy_mount_options+0x59/0x300 [ 1215.710564][T31517] ? kmem_cache_alloc_trace+0x139/0x2b0 [ 1215.716110][T31517] ? copy_mount_options+0x273/0x300 [ 1215.721286][T31517] ksys_mount+0xc2/0xf0 [ 1215.725440][T31517] __x64_sys_mount+0xb1/0xc0 [ 1215.730015][T31517] do_syscall_64+0xcb/0x1e0 [ 1215.734506][T31517] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1215.740409][T31517] RIP: 0033:0x7f2bd50b1c5a [ 1215.744828][T31517] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1215.764430][T31517] RSP: 002b:00007f2bd2e27fa8 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 1215.772844][T31517] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007f2bd50b1c5a [ 1215.780898][T31517] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007f2bd2e28000 [ 1215.788849][T31517] RBP: 00007f2bd2e28040 R08: 00007f2bd2e28040 R09: 0000000020000000 [ 1215.796801][T31517] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000020000000 [ 1215.805108][T31517] R13: 0000000020000100 R14: 00007f2bd2e28000 R15: 0000000020013000 [ 1215.816961][T31517] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue [ 1215.826816][T31517] ext4 filesystem being mounted at /root/syzkaller-testdir028365481/syzkaller.u34vxW/1333/file0 supports timestamps until 2038 (0x7fffffff) [ 1215.863801][T31518] EXT4-fs (loop3): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? 15:41:07 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000cc0)=ANY=[@ANYBLOB="7800000010000507000000bc4b9ccfc900000000", @ANYRES32, @ANYBLOB="4518000000006c00500012800b0001006272696467650000400002800500250000000000060006008bbc00000800010013000000060009000020000005002b000700000005002b00810000000c002200010000000000000008000a00"], 0x78}}, 0x0) 15:41:07 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4f203, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d90000000f0000000100000800000000000000000020000000200000200000002cc4645f2cc4645f0100ffff53ef0100010000002cc4645f000000000000000001000000000000000b0000008000000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e3338363633343038350000000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000000000000000000000000000000000000d9ca5cac99fd4329af4dde786c1a5d13010040000c000000000000002cc4645f", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) 15:41:07 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0xffffff81, &(0x7f00000004c0)={&(0x7f0000000cc0)=ANY=[@ANYBLOB="7800000010000507000000bc4b9ccfc900000000", @ANYRES32, @ANYBLOB="4518000000000000500012800b00010062726964676500004000028005002500000c0000060006008bbc00000800010013000000060009000020000005002b000700000005002b00810000000c002200010000000000000008000a00"], 0x78}}, 0x0) 15:41:07 executing program 4 (fault-call:0 fault-nth:60): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4f203, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) 15:41:07 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000cc0)=ANY=[@ANYBLOB="7800000010000507000000bc4b9ccfc900000000", @ANYRES32, @ANYBLOB="4518000000000010500012800b0001006272696467650000400002800500250000000000060006008bbc00000800"], 0x78}}, 0x0) 15:41:07 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4f203, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024", 0x29, 0x7e0}], 0x0, &(0x7f0000013000)) [ 1216.027246][T31550] EXT4-fs (loop3): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? [ 1216.037340][T31556] FAULT_INJECTION: forcing a failure. [ 1216.037340][T31556] name failslab, interval 1, probability 0, space 0, times 0 [ 1216.051180][T31556] CPU: 1 PID: 31556 Comm: syz-executor.4 Tainted: G W 5.4.125-syzkaller-00005-gb8b657d4d5e9 #0 [ 1216.062813][T31556] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1216.072984][T31556] Call Trace: [ 1216.076272][T31556] dump_stack+0x1d8/0x24e [ 1216.080585][T31556] ? devkmsg_release+0x11c/0x11c [ 1216.085501][T31556] ? prepare_to_wait+0x223/0x280 [ 1216.090421][T31556] ? show_regs_print_info+0x12/0x12 [ 1216.095634][T31556] should_fail+0x6f6/0x860 [ 1216.100031][T31556] ? setup_fault_attr+0x3d0/0x3d0 [ 1216.105056][T31556] ? __up_read+0x6f/0x1b0 [ 1216.109388][T31556] ? __down_read+0x210/0x210 [ 1216.113954][T31556] ? kzalloc+0x16/0x20 [ 1216.118000][T31556] should_failslab+0x5/0x20 [ 1216.122482][T31556] __kmalloc+0x5f/0x2f0 [ 1216.126638][T31556] kzalloc+0x16/0x20 [ 1216.130743][T31556] crypto_create_tfm+0x6c/0x2e0 [ 1216.136063][T31556] ? crypto_alg_mod_lookup+0x49c/0x7c0 [ 1216.141501][T31556] crypto_alloc_tfm+0x16b/0x2e0 [ 1216.146331][T31556] ext4_fill_super+0xb84/0xeb30 [ 1216.151184][T31556] ? string+0x2c0/0x2c0 [ 1216.155425][T31556] ? vsnprintf+0x1cb4/0x1d60 [ 1216.159992][T31556] ? delete_node+0x733/0x790 [ 1216.164563][T31556] ? ext4_mount+0x40/0x40 [ 1216.168868][T31556] ? idr_replace+0x1c4/0x230 [ 1216.173437][T31556] ? snprintf+0xd6/0x120 [ 1216.177869][T31556] ? vscnprintf+0x80/0x80 [ 1216.182179][T31556] ? set_blocksize+0x1a5/0x3a0 [ 1216.186920][T31556] mount_bdev+0x22d/0x340 [ 1216.191330][T31556] ? ext4_mount+0x40/0x40 [ 1216.195639][T31556] legacy_get_tree+0xde/0x170 [ 1216.200314][T31556] ? ext4_lazyinit_thread+0xd40/0xd40 [ 1216.205684][T31556] vfs_get_tree+0x83/0x260 [ 1216.210097][T31556] do_mount+0x19d0/0x2670 [ 1216.214427][T31556] ? copy_mount_string+0x30/0x30 [ 1216.219361][T31556] ? copy_mount_options+0x59/0x300 [ 1216.224459][T31556] ? copy_mount_options+0x59/0x300 [ 1216.229555][T31556] ? kmem_cache_alloc_trace+0x139/0x2b0 [ 1216.235078][T31556] ? copy_mount_options+0x273/0x300 [ 1216.240254][T31556] ksys_mount+0xc2/0xf0 [ 1216.244388][T31556] __x64_sys_mount+0xb1/0xc0 [ 1216.248957][T31556] do_syscall_64+0xcb/0x1e0 [ 1216.253529][T31556] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1216.259400][T31556] RIP: 0033:0x7f2bd50b1c5a [ 1216.263799][T31556] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1216.283380][T31556] RSP: 002b:00007f2bd2e27fa8 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 1216.291803][T31556] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007f2bd50b1c5a [ 1216.299838][T31556] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007f2bd2e28000 [ 1216.307788][T31556] RBP: 00007f2bd2e28040 R08: 00007f2bd2e28040 R09: 0000000020000000 [ 1216.315738][T31556] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000020000000 15:41:08 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4f203, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024", 0x29, 0x7e0}], 0x0, &(0x7f0000013000)) 15:41:08 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4f203, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) 15:41:08 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0xffffff81, &(0x7f00000004c0)={&(0x7f0000000cc0)=ANY=[@ANYBLOB="7800000010000507000000bc4b9ccfc900000000", @ANYRES32, @ANYBLOB="4518000000000000500012800b00010062726964676500004000028005002500000d0000060006008bbc00000800010013000000060009000020000005002b000700000005002b00810000000c002200010000000000000008000a00"], 0x78}}, 0x0) 15:41:08 executing program 4 (fault-call:0 fault-nth:61): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4f203, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) 15:41:08 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4f203, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) 15:41:08 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4f203, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) [ 1216.323687][T31556] R13: 0000000020000100 R14: 00007f2bd2e28000 R15: 0000000020013000 [ 1216.334440][T31556] EXT4-fs (loop4): Cannot load crc32c driver. [ 1216.403494][T31570] FAULT_INJECTION: forcing a failure. [ 1216.403494][T31570] name failslab, interval 1, probability 0, space 0, times 0 [ 1216.416596][T31567] EXT4-fs (loop3): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? [ 1216.420088][T31570] CPU: 1 PID: 31570 Comm: syz-executor.4 Tainted: G W 5.4.125-syzkaller-00005-gb8b657d4d5e9 #0 [ 1216.438714][T31570] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1216.448893][T31570] Call Trace: [ 1216.452171][T31570] dump_stack+0x1d8/0x24e [ 1216.456602][T31570] ? devkmsg_release+0x11c/0x11c [ 1216.461523][T31570] ? show_regs_print_info+0x12/0x12 [ 1216.466705][T31570] ? check_preemption_disabled+0x9e/0x330 [ 1216.472401][T31570] ? __rcu_read_lock+0x50/0x50 [ 1216.477141][T31570] ? __unwind_start+0x72f/0x8e0 [ 1216.481989][T31570] should_fail+0x6f6/0x860 [ 1216.486408][T31570] ? setup_fault_attr+0x3d0/0x3d0 [ 1216.491412][T31570] ? stack_trace_save+0x1f0/0x1f0 [ 1216.496431][T31570] ? __kernel_text_address+0x93/0x100 [ 1216.501781][T31570] ? mempool_alloc_slab+0x16/0x20 [ 1216.506778][T31570] should_failslab+0x5/0x20 [ 1216.511255][T31570] kmem_cache_alloc+0x36/0x290 [ 1216.516019][T31570] ? mempool_free+0x380/0x380 [ 1216.520671][T31570] mempool_alloc_slab+0x16/0x20 [ 1216.525501][T31570] mempool_alloc+0x113/0x680 [ 1216.530083][T31570] ? mempool_resize+0x900/0x900 [ 1216.534908][T31570] ? debug_smp_processor_id+0x20/0x20 [ 1216.540257][T31570] bio_alloc_bioset+0x1db/0x640 [ 1216.545095][T31570] ? bio_chain_endio+0x110/0x110 [ 1216.550013][T31570] ? write_boundary_block+0x150/0x150 [ 1216.555357][T31570] submit_bh_wbc+0x1ba/0x790 [ 1216.559924][T31570] ll_rw_block+0x1cb/0x230 [ 1216.564317][T31570] __breadahead_gfp+0xc9/0x190 [ 1216.569077][T31570] ? kvmalloc_node+0x7e/0xf0 [ 1216.573664][T31570] ? __breadahead+0x170/0x170 [ 1216.578329][T31570] ext4_fill_super+0x620d/0xeb30 [ 1216.583249][T31570] ? vsnprintf+0x1cb4/0x1d60 [ 1216.587814][T31570] ? ext4_mount+0x40/0x40 [ 1216.592119][T31570] ? idr_replace+0x1c4/0x230 [ 1216.596795][T31570] ? snprintf+0xd6/0x120 [ 1216.601012][T31570] ? vscnprintf+0x80/0x80 [ 1216.605320][T31570] ? set_blocksize+0x1a5/0x3a0 [ 1216.610062][T31570] mount_bdev+0x22d/0x340 [ 1216.614371][T31570] ? ext4_mount+0x40/0x40 [ 1216.618673][T31570] legacy_get_tree+0xde/0x170 [ 1216.623324][T31570] ? ext4_lazyinit_thread+0xd40/0xd40 [ 1216.628668][T31570] vfs_get_tree+0x83/0x260 [ 1216.633064][T31570] do_mount+0x19d0/0x2670 [ 1216.637370][T31570] ? copy_mount_string+0x30/0x30 [ 1216.642281][T31570] ? copy_mount_options+0x59/0x300 [ 1216.647366][T31570] ? copy_mount_options+0x59/0x300 [ 1216.652463][T31570] ? kmem_cache_alloc_trace+0x139/0x2b0 [ 1216.657981][T31570] ? copy_mount_options+0x273/0x300 [ 1216.663159][T31570] ksys_mount+0xc2/0xf0 [ 1216.667293][T31570] __x64_sys_mount+0xb1/0xc0 [ 1216.671862][T31570] do_syscall_64+0xcb/0x1e0 [ 1216.676360][T31570] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1216.682230][T31570] RIP: 0033:0x7f2bd50b1c5a [ 1216.686649][T31570] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1216.706425][T31570] RSP: 002b:00007f2bd2e27fa8 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 1216.715465][T31570] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007f2bd50b1c5a [ 1216.723687][T31570] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007f2bd2e28000 [ 1216.731713][T31570] RBP: 00007f2bd2e28040 R08: 00007f2bd2e28040 R09: 0000000020000000 [ 1216.739661][T31570] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000020000000 [ 1216.747619][T31570] R13: 0000000020000100 R14: 00007f2bd2e28000 R15: 0000000020013000 [ 1216.758925][T31570] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue [ 1216.768190][T31570] ext4 filesystem being mounted at /root/syzkaller-testdir028365481/syzkaller.u34vxW/1335/file0 supports timestamps until 2038 (0x7fffffff) 15:41:08 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000cc0)=ANY=[@ANYBLOB="7800000010000507000000bc4b9ccfc900000000", @ANYRES32, @ANYBLOB="4518000000000011500012800b0001006272696467650000400002800500250000000000060006008bbc00000800"], 0x78}}, 0x0) 15:41:08 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4f203, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) 15:41:08 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000cc0)=ANY=[@ANYBLOB="7800000010000507000000bc4b9ccfc900000000", @ANYRES32, @ANYBLOB="4518000000007400500012800b0001006272696467650000400002800500250000000000060006008bbc00000800010013000000060009000020000005002b000700000005002b00810000000c002200010000000000000008000a00"], 0x78}}, 0x0) 15:41:08 executing program 4 (fault-call:0 fault-nth:62): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4f203, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) 15:41:08 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0xffffff81, &(0x7f00000004c0)={&(0x7f0000000cc0)=ANY=[@ANYBLOB="7800000010000507000000bc4b9ccfc900000000", @ANYRES32, @ANYBLOB="4518000000000000500012800b00010062726964676500004000028005002500000e0000060006008bbc00000800010013000000060009000020000005002b000700000005002b00810000000c002200010000000000000008000a00"], 0x78}}, 0x0) 15:41:08 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4f203, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000001004c0c000000d90000000f0000000100000000000000000000000020000000200000200000002cc4645f2cc4645f0100ffff53ef0100010000002cc4645f000000000000000001000000000000000b0000008000000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e3338363633343038350000000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000000000000000000000000000000000000d9ca5cac99fd4329af4dde786c1a5d13010040000c000000000000002cc4645f", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024", 0x29, 0x7e0}], 0x0, &(0x7f0000013000)) 15:41:08 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4f203, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) [ 1216.849812][T31567] EXT4-fs (loop3): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? 15:41:08 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000cc0)=ANY=[@ANYBLOB="7800000010000507000000bc4b9ccfc900000000", @ANYRES32, @ANYBLOB="4518000000000012500012800b0001006272696467650000400002800500250000000000060006008bbc00000800"], 0x78}}, 0x0) [ 1216.940089][T31589] EXT4-fs (loop3): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? [ 1216.950422][T31586] FAULT_INJECTION: forcing a failure. [ 1216.950422][T31586] name failslab, interval 1, probability 0, space 0, times 0 [ 1216.963295][T31586] CPU: 0 PID: 31586 Comm: syz-executor.4 Tainted: G W 5.4.125-syzkaller-00005-gb8b657d4d5e9 #0 [ 1216.975173][T31586] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1216.985224][T31586] Call Trace: 15:41:08 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4f203, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d90000000f0000000100000e00000000000000000020000000200000200000002cc4645f2cc4645f0100ffff53ef0100010000002cc4645f000000000000000001000000000000000b0000008000000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e3338363633343038350000000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000000000000000000000000000000000000d9ca5cac99fd4329af4dde786c1a5d13010040000c000000000000002cc4645f", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) 15:41:08 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4f203, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) 15:41:08 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4f203, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) 15:41:08 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4f203, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) [ 1216.988667][T31586] dump_stack+0x1d8/0x24e [ 1216.993005][T31586] ? devkmsg_release+0x11c/0x11c [ 1216.997952][T31586] ? show_regs_print_info+0x12/0x12 [ 1217.003158][T31586] should_fail+0x6f6/0x860 [ 1217.007582][T31586] ? setup_fault_attr+0x3d0/0x3d0 [ 1217.012619][T31586] ? _raw_spin_lock_irqsave+0xf8/0x210 [ 1217.018085][T31586] ? prealloc_shrinker+0x50/0x210 [ 1217.023106][T31586] should_failslab+0x5/0x20 [ 1217.027817][T31586] kmem_cache_alloc_trace+0x39/0x2b0 [ 1217.033290][T31586] prealloc_shrinker+0x50/0x210 15:41:08 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4f203, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) 15:41:08 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4f203, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) [ 1217.038137][T31586] register_shrinker+0x1a/0x170 [ 1217.043163][T31586] ext4_es_register_shrinker+0x204/0x2a0 [ 1217.048955][T31586] ext4_fill_super+0x7b6c/0xeb30 [ 1217.053912][T31586] ? ext4_mount+0x40/0x40 [ 1217.058237][T31586] ? idr_replace+0x1c4/0x230 [ 1217.062824][T31586] ? snprintf+0xd6/0x120 [ 1217.067069][T31586] ? vscnprintf+0x80/0x80 [ 1217.071552][T31586] ? set_blocksize+0x1a5/0x3a0 [ 1217.076425][T31586] mount_bdev+0x22d/0x340 [ 1217.080749][T31586] ? ext4_mount+0x40/0x40 [ 1217.085070][T31586] legacy_get_tree+0xde/0x170 [ 1217.089737][T31586] ? ext4_lazyinit_thread+0xd40/0xd40 [ 1217.095092][T31586] vfs_get_tree+0x83/0x260 [ 1217.099665][T31586] do_mount+0x19d0/0x2670 [ 1217.104075][T31586] ? copy_mount_string+0x30/0x30 [ 1217.108989][T31586] ? copy_mount_options+0x59/0x300 [ 1217.114123][T31586] ? kmem_cache_alloc_trace+0x139/0x2b0 [ 1217.119649][T31586] ? copy_mount_options+0x273/0x300 [ 1217.124832][T31586] ksys_mount+0xc2/0xf0 [ 1217.129115][T31586] __x64_sys_mount+0xb1/0xc0 [ 1217.133688][T31586] do_syscall_64+0xcb/0x1e0 [ 1217.138172][T31586] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1217.144046][T31586] RIP: 0033:0x7f2bd50b1c5a [ 1217.148442][T31586] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1217.168021][T31586] RSP: 002b:00007f2bd2e27fa8 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 1217.176560][T31586] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007f2bd50b1c5a [ 1217.184524][T31586] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007f2bd2e28000 [ 1217.192636][T31586] RBP: 00007f2bd2e28040 R08: 00007f2bd2e28040 R09: 0000000020000000 [ 1217.200591][T31586] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000020000000 [ 1217.208669][T31586] R13: 0000000020000100 R14: 00007f2bd2e28000 R15: 0000000020013000 [ 1217.244687][T31589] EXT4-fs (loop3): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? 15:41:09 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000cc0)=ANY=[@ANYBLOB="7800000010000507000000bc4b9ccfc900000000", @ANYRES32, @ANYBLOB="4518000000007a00500012800b0001006272696467650000400002800500250000000000060006008bbc00000800010013000000060009000020000005002b000700000005002b00810000000c002200010000000000000008000a00"], 0x78}}, 0x0) 15:41:09 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4f203, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) 15:41:09 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0xffffff81, &(0x7f00000004c0)={&(0x7f0000000cc0)=ANY=[@ANYBLOB="7800000010000507000000bc4b9ccfc900000000", @ANYRES32, @ANYBLOB="4518000000000000500012800b0001006272696467650000400002800500250000100000060006008bbc00000800010013000000060009000020000005002b000700000005002b00810000000c002200010000000000000008000a00"], 0x78}}, 0x0) 15:41:09 executing program 4 (fault-call:0 fault-nth:63): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4f203, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) 15:41:09 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000cc0)=ANY=[@ANYBLOB="7800000010000507000000bc4b9ccfc900000000", @ANYRES32, @ANYBLOB="4518000000000024500012800b0001006272696467650000400002800500250000000000060006008bbc00000800"], 0x78}}, 0x0) 15:41:09 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4f203, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024", 0x29, 0x7e0}], 0x0, &(0x7f0000013000)) 15:41:09 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4f203, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) 15:41:09 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4f203, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) [ 1217.391762][T31616] FAULT_INJECTION: forcing a failure. [ 1217.391762][T31616] name failslab, interval 1, probability 0, space 0, times 0 [ 1217.398043][T31620] EXT4-fs (loop3): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? [ 1217.412760][T31616] CPU: 0 PID: 31616 Comm: syz-executor.4 Tainted: G W 5.4.125-syzkaller-00005-gb8b657d4d5e9 #0 [ 1217.426189][T31616] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1217.436234][T31616] Call Trace: [ 1217.439509][T31616] dump_stack+0x1d8/0x24e [ 1217.443819][T31616] ? devkmsg_release+0x11c/0x11c [ 1217.448733][T31616] ? show_regs_print_info+0x12/0x12 [ 1217.453923][T31616] ? check_preemption_disabled+0x9e/0x330 [ 1217.459641][T31616] ? __rcu_read_lock+0x50/0x50 [ 1217.464391][T31616] ? __unwind_start+0x72f/0x8e0 [ 1217.469221][T31616] should_fail+0x6f6/0x860 [ 1217.473617][T31616] ? setup_fault_attr+0x3d0/0x3d0 [ 1217.478617][T31616] ? stack_trace_save+0x1f0/0x1f0 [ 1217.483617][T31616] ? __kernel_text_address+0x93/0x100 [ 1217.488962][T31616] ? mempool_alloc_slab+0x16/0x20 [ 1217.493968][T31616] should_failslab+0x5/0x20 [ 1217.498445][T31616] kmem_cache_alloc+0x36/0x290 [ 1217.503189][T31616] ? mempool_free+0x380/0x380 [ 1217.507840][T31616] mempool_alloc_slab+0x16/0x20 [ 1217.512664][T31616] mempool_alloc+0x113/0x680 [ 1217.517230][T31616] ? mempool_resize+0x900/0x900 [ 1217.522054][T31616] ? debug_smp_processor_id+0x20/0x20 [ 1217.527399][T31616] bio_alloc_bioset+0x1db/0x640 [ 1217.532227][T31616] ? bio_chain_endio+0x110/0x110 [ 1217.537137][T31616] ? write_boundary_block+0x150/0x150 [ 1217.542482][T31616] submit_bh_wbc+0x1ba/0x790 [ 1217.547046][T31616] ll_rw_block+0x1cb/0x230 [ 1217.551436][T31616] __breadahead_gfp+0xc9/0x190 [ 1217.556175][T31616] ? kvmalloc_node+0x7e/0xf0 [ 1217.560740][T31616] ? __breadahead+0x170/0x170 [ 1217.565395][T31616] ext4_fill_super+0x620d/0xeb30 [ 1217.570327][T31616] ? vsnprintf+0x1cb4/0x1d60 [ 1217.574898][T31616] ? ext4_mount+0x40/0x40 [ 1217.579199][T31616] ? idr_replace+0x1c4/0x230 [ 1217.583763][T31616] ? snprintf+0xd6/0x120 [ 1217.587978][T31616] ? vscnprintf+0x80/0x80 [ 1217.592282][T31616] ? set_blocksize+0x1a5/0x3a0 [ 1217.597019][T31616] mount_bdev+0x22d/0x340 [ 1217.601330][T31616] ? ext4_mount+0x40/0x40 [ 1217.605634][T31616] legacy_get_tree+0xde/0x170 [ 1217.610287][T31616] ? ext4_lazyinit_thread+0xd40/0xd40 [ 1217.615633][T31616] vfs_get_tree+0x83/0x260 [ 1217.620025][T31616] do_mount+0x19d0/0x2670 [ 1217.624333][T31616] ? copy_mount_string+0x30/0x30 [ 1217.629244][T31616] ? copy_mount_options+0x59/0x300 [ 1217.634328][T31616] ? copy_mount_options+0x59/0x300 [ 1217.639413][T31616] ? kmem_cache_alloc_trace+0x139/0x2b0 [ 1217.644931][T31616] ? copy_mount_options+0x273/0x300 [ 1217.650099][T31616] ksys_mount+0xc2/0xf0 [ 1217.654227][T31616] __x64_sys_mount+0xb1/0xc0 [ 1217.658893][T31616] do_syscall_64+0xcb/0x1e0 [ 1217.663385][T31616] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1217.669254][T31616] RIP: 0033:0x7f2bd50b1c5a [ 1217.673679][T31616] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 15:41:09 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0xffffff81, &(0x7f00000004c0)={&(0x7f0000000cc0)=ANY=[@ANYBLOB="7800000010000507000000bc4b9ccfc900000000", @ANYRES32, @ANYBLOB="4518000000000000500012800b0001006272696467650000400002800500250000110000060006008bbc00000800010013000000060009000020000005002b000700000005002b00810000000c002200010000000000000008000a00"], 0x78}}, 0x0) [ 1217.693340][T31616] RSP: 002b:00007f2bd2e27fa8 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 1217.701726][T31616] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007f2bd50b1c5a [ 1217.709673][T31616] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007f2bd2e28000 [ 1217.717619][T31616] RBP: 00007f2bd2e28040 R08: 00007f2bd2e28040 R09: 0000000020000000 [ 1217.725563][T31616] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000020000000 [ 1217.733522][T31616] R13: 0000000020000100 R14: 00007f2bd2e28000 R15: 0000000020013000 15:41:09 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4f203, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) 15:41:09 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4f203, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d90000000f0000000100008004000000000000000020000000200000200000002cc4645f2cc4645f0100ffff53ef0100010000002cc4645f000000000000000001000000000000000b0000008000000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e3338363633343038350000000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000000000000000000000000000000000000d9ca5cac99fd4329af4dde786c1a5d13010040000c000000000000002cc4645f", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) 15:41:09 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000cc0)=ANY=[@ANYBLOB="7800000010000507000000bc4b9ccfc900000000", @ANYRES32, @ANYBLOB="4518000000000025500012800b0001006272696467650000400002800500250000000000060006008bbc00000800"], 0x78}}, 0x0) [ 1217.757876][T31616] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue [ 1217.767916][T31616] ext4 filesystem being mounted at /root/syzkaller-testdir028365481/syzkaller.u34vxW/1337/file0 supports timestamps until 2038 (0x7fffffff) [ 1217.798000][T31620] EXT4-fs (loop3): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? 15:41:09 executing program 4 (fault-call:0 fault-nth:64): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4f203, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) 15:41:09 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4f203, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d90000000f0000000100000005000000000000000020000000200000200000002cc4645f2cc4645f0100ffff53ef0100010000002cc4645f000000000000000001000000000000000b0000008000000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e3338363633343038350000000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000000000000000000000000000000000000d9ca5cac99fd4329af4dde786c1a5d13010040000c000000000000002cc4645f", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) 15:41:09 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4f203, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024", 0x29, 0x7e0}], 0x0, &(0x7f0000013000)) 15:41:09 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0xffffff81, &(0x7f00000004c0)={&(0x7f0000000cc0)=ANY=[@ANYBLOB="7800000010000507000000bc4b9ccfc900000000", @ANYRES32, @ANYBLOB="4518000000000000500012800b0001006272696467650000400002800500250000120000060006008bbc00000800010013000000060009000020000005002b000700000005002b00810000000c002200010000000000000008000a00"], 0x78}}, 0x0) 15:41:09 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000cc0)=ANY=[@ANYBLOB="7800000010000507000000bc4b9ccfc900000000", @ANYRES32, @ANYBLOB="451800e528777c00500012800b0001006272696467650000400002800500250000000000060006008bbc00000800010013000000060009000020000005002b000700000005002b00810000000c002200010000000000000008000a00"], 0x78}}, 0x0) 15:41:09 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000cc0)=ANY=[@ANYBLOB="7800000010000507000000bc4b9ccfc900000000", @ANYRES32, @ANYBLOB="451800000000002e500012800b0001006272696467650000400002800500250000000000060006008bbc00000800"], 0x78}}, 0x0) [ 1217.988311][T31645] FAULT_INJECTION: forcing a failure. [ 1217.988311][T31645] name failslab, interval 1, probability 0, space 0, times 0 [ 1218.004768][T31655] EXT4-fs (loop3): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? [ 1218.010529][T31645] CPU: 0 PID: 31645 Comm: syz-executor.4 Tainted: G W 5.4.125-syzkaller-00005-gb8b657d4d5e9 #0 [ 1218.026567][T31645] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1218.036607][T31645] Call Trace: [ 1218.039885][T31645] dump_stack+0x1d8/0x24e [ 1218.044192][T31645] ? devkmsg_release+0x11c/0x11c [ 1218.049102][T31645] ? show_regs_print_info+0x12/0x12 [ 1218.054274][T31645] should_fail+0x6f6/0x860 [ 1218.058663][T31645] ? setup_fault_attr+0x3d0/0x3d0 [ 1218.063671][T31645] ? _raw_spin_lock_irqsave+0xf8/0x210 [ 1218.069101][T31645] ? prealloc_shrinker+0x50/0x210 [ 1218.074205][T31645] should_failslab+0x5/0x20 [ 1218.078710][T31645] kmem_cache_alloc_trace+0x39/0x2b0 [ 1218.083968][T31645] prealloc_shrinker+0x50/0x210 [ 1218.088807][T31645] register_shrinker+0x1a/0x170 [ 1218.093630][T31645] ext4_es_register_shrinker+0x204/0x2a0 [ 1218.099252][T31645] ext4_fill_super+0x7b6c/0xeb30 [ 1218.104185][T31645] ? ext4_mount+0x40/0x40 [ 1218.108501][T31645] ? idr_replace+0x1c4/0x230 [ 1218.113129][T31645] ? snprintf+0xd6/0x120 [ 1218.117363][T31645] ? vscnprintf+0x80/0x80 [ 1218.121680][T31645] ? set_blocksize+0x1a5/0x3a0 [ 1218.126423][T31645] mount_bdev+0x22d/0x340 [ 1218.130761][T31645] ? ext4_mount+0x40/0x40 [ 1218.135068][T31645] legacy_get_tree+0xde/0x170 [ 1218.139719][T31645] ? ext4_lazyinit_thread+0xd40/0xd40 [ 1218.145063][T31645] vfs_get_tree+0x83/0x260 [ 1218.149456][T31645] do_mount+0x19d0/0x2670 [ 1218.153759][T31645] ? copy_mount_string+0x30/0x30 [ 1218.158673][T31645] ? copy_mount_options+0x59/0x300 [ 1218.163771][T31645] ? kmem_cache_alloc_trace+0x139/0x2b0 [ 1218.169288][T31645] ? copy_mount_options+0x273/0x300 [ 1218.174468][T31645] ksys_mount+0xc2/0xf0 [ 1218.178619][T31645] __x64_sys_mount+0xb1/0xc0 [ 1218.183186][T31645] do_syscall_64+0xcb/0x1e0 [ 1218.187668][T31645] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1218.193534][T31645] RIP: 0033:0x7f2bd50b1c5a [ 1218.197938][T31645] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1218.217512][T31645] RSP: 002b:00007f2bd2e27fa8 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 1218.225905][T31645] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007f2bd50b1c5a 15:41:10 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4f203, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d90000000f0000000100002d05000000000000000020000000200000200000002cc4645f2cc4645f0100ffff53ef0100010000002cc4645f000000000000000001000000000000000b0000008000000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e3338363633343038350000000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000000000000000000000000000000000000d9ca5cac99fd4329af4dde786c1a5d13010040000c000000000000002cc4645f", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) 15:41:10 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4f203, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) 15:41:10 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000cc0)=ANY=[@ANYBLOB="7800000010000507000000bc4b9ccfc900000000", @ANYRES32, @ANYBLOB="451800000000002f500012800b0001006272696467650000400002800500250000000000060006008bbc00000800"], 0x78}}, 0x0) 15:41:10 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4f203, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d90000000f0000000100000406000000000000000020000000200000200000002cc4645f2cc4645f0100ffff53ef0100010000002cc4645f000000000000000001000000000000000b0000008000000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e3338363633343038350000000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000000000000000000000000000000000000d9ca5cac99fd4329af4dde786c1a5d13010040000c000000000000002cc4645f", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) 15:41:10 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4f203, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) 15:41:10 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4f203, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024", 0x29, 0x7e0}], 0x0, &(0x7f0000013000)) [ 1218.233854][T31645] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007f2bd2e28000 [ 1218.241799][T31645] RBP: 00007f2bd2e28040 R08: 00007f2bd2e28040 R09: 0000000020000000 [ 1218.249759][T31645] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000020000000 [ 1218.257702][T31645] R13: 0000000020000100 R14: 00007f2bd2e28000 R15: 0000000020013000 15:41:10 executing program 4 (fault-call:0 fault-nth:65): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4f203, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) 15:41:10 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4f203, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d90000000f0000000100000009000000000000000020000000200000200000002cc4645f2cc4645f0100ffff53ef0100010000002cc4645f000000000000000001000000000000000b0000008000000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e3338363633343038350000000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000000000000000000000000000000000000d9ca5cac99fd4329af4dde786c1a5d13010040000c000000000000002cc4645f", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) 15:41:10 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0xffffff81, &(0x7f00000004c0)={&(0x7f0000000cc0)=ANY=[@ANYBLOB="7800000010000507000000bc4b9ccfc900000000", @ANYRES32, @ANYBLOB="4518000000000000500012800b00010062726964676500004000028005002500001e0000060006008bbc00000800010013000000060009000020000005002b000700000005002b00810000000c002200010000000000000008000a00"], 0x78}}, 0x0) [ 1218.362654][T31666] __nla_validate_parse: 20 callbacks suppressed [ 1218.362662][T31666] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.5'. [ 1218.366412][T31668] EXT4-fs (loop3): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? [ 1218.380865][T31666] netlink: 36 bytes leftover after parsing attributes in process `syz-executor.5'. 15:41:10 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4f203, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024", 0x29, 0x7e0}], 0x0, &(0x7f0000013000)) [ 1218.409923][T31668] EXT4-fs (loop3): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? [ 1218.410646][T31673] FAULT_INJECTION: forcing a failure. [ 1218.410646][T31673] name failslab, interval 1, probability 0, space 0, times 0 [ 1218.436554][T31673] CPU: 1 PID: 31673 Comm: syz-executor.4 Tainted: G W 5.4.125-syzkaller-00005-gb8b657d4d5e9 #0 [ 1218.448189][T31673] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1218.458232][T31673] Call Trace: [ 1218.461509][T31673] dump_stack+0x1d8/0x24e [ 1218.465856][T31673] ? devkmsg_release+0x11c/0x11c [ 1218.470775][T31673] ? show_regs_print_info+0x12/0x12 [ 1218.475961][T31673] should_fail+0x6f6/0x860 [ 1218.480352][T31673] ? setup_fault_attr+0x3d0/0x3d0 [ 1218.485351][T31673] ? up_write+0xa6/0x270 [ 1218.489672][T31673] ? down_write+0xd8/0x150 [ 1218.494059][T31673] ? up_read+0x10/0x10 [ 1218.498100][T31673] ? mb_cache_create+0x5e/0x500 [ 1218.502926][T31673] should_failslab+0x5/0x20 [ 1218.507406][T31673] kmem_cache_alloc_trace+0x39/0x2b0 [ 1218.512684][T31673] mb_cache_create+0x5e/0x500 [ 1218.517336][T31673] ext4_fill_super+0x94f2/0xeb30 [ 1218.522253][T31673] ? ext4_mount+0x40/0x40 [ 1218.526559][T31673] ? idr_replace+0x1c4/0x230 [ 1218.531128][T31673] ? snprintf+0xd6/0x120 [ 1218.535342][T31673] ? vscnprintf+0x80/0x80 [ 1218.539650][T31673] ? set_blocksize+0x1a5/0x3a0 [ 1218.544386][T31673] mount_bdev+0x22d/0x340 [ 1218.548705][T31673] ? ext4_mount+0x40/0x40 [ 1218.553009][T31673] legacy_get_tree+0xde/0x170 [ 1218.557660][T31673] ? ext4_lazyinit_thread+0xd40/0xd40 [ 1218.563004][T31673] vfs_get_tree+0x83/0x260 [ 1218.567394][T31673] do_mount+0x19d0/0x2670 [ 1218.571698][T31673] ? copy_mount_string+0x30/0x30 [ 1218.576607][T31673] ? copy_mount_options+0x59/0x300 [ 1218.581692][T31673] ? copy_mount_options+0x59/0x300 [ 1218.586778][T31673] ? kmem_cache_alloc_trace+0x139/0x2b0 [ 1218.592300][T31673] ? copy_mount_options+0x273/0x300 [ 1218.597470][T31673] ksys_mount+0xc2/0xf0 [ 1218.601600][T31673] __x64_sys_mount+0xb1/0xc0 [ 1218.606164][T31673] do_syscall_64+0xcb/0x1e0 [ 1218.610642][T31673] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1218.616529][T31673] RIP: 0033:0x7f2bd50b1c5a [ 1218.620917][T31673] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1218.640507][T31673] RSP: 002b:00007f2bd2e27fa8 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 1218.648891][T31673] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007f2bd50b1c5a 15:41:10 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000cc0)=ANY=[@ANYBLOB="7800000010000507000000bc4b9ccfc900000000", @ANYRES32, @ANYBLOB="4518000000008100500012800b0001006272696467650000400002800500250000000000060006008bbc00000800010013000000060009000020000005002b000700000005002b00810000000c002200010000000000000008000a00"], 0x78}}, 0x0) 15:41:10 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4f203, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) 15:41:10 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000cc0)=ANY=[@ANYBLOB="7800000010000507000000bc4b9ccfc900000000", @ANYRES32, @ANYBLOB="451800000000003a500012800b0001006272696467650000400002800500250000000000060006008bbc00000800"], 0x78}}, 0x0) 15:41:10 executing program 4 (fault-call:0 fault-nth:66): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4f203, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) 15:41:10 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0xffffff81, &(0x7f00000004c0)={&(0x7f0000000cc0)=ANY=[@ANYBLOB="7800000010000507000000bc4b9ccfc900000000", @ANYRES32, @ANYBLOB="4518000000000000500012800b0001006272696467650000400002800500250000250000060006008bbc00000800010013000000060009000020000005002b000700000005002b00810000000c002200010000000000000008000a00"], 0x78}}, 0x0) 15:41:10 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4f203, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d90000000f000000010000000b000000000000000020000000200000200000002cc4645f2cc4645f0100ffff53ef0100010000002cc4645f000000000000000001000000000000000b0000008000000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e3338363633343038350000000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000000000000000000000000000000000000d9ca5cac99fd4329af4dde786c1a5d13010040000c000000000000002cc4645f", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) [ 1218.656837][T31673] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007f2bd2e28000 [ 1218.664781][T31673] RBP: 00007f2bd2e28040 R08: 00007f2bd2e28040 R09: 0000000020000000 [ 1218.672984][T31673] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000020000000 [ 1218.680928][T31673] R13: 0000000020000100 R14: 00007f2bd2e28000 R15: 0000000020013000 [ 1218.689728][T31673] EXT4-fs (loop4): Failed to create ea_block_cache [ 1218.750380][T31688] FAULT_INJECTION: forcing a failure. [ 1218.750380][T31688] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1218.763805][T31688] CPU: 0 PID: 31688 Comm: syz-executor.4 Tainted: G W 5.4.125-syzkaller-00005-gb8b657d4d5e9 #0 [ 1218.775425][T31688] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1218.785557][T31688] Call Trace: [ 1218.786935][T31691] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.5'. [ 1218.788848][T31688] dump_stack+0x1d8/0x24e [ 1218.788860][T31688] ? devkmsg_release+0x11c/0x11c [ 1218.788874][T31688] ? show_regs_print_info+0x12/0x12 [ 1218.810689][T31691] netlink: 36 bytes leftover after parsing attributes in process `syz-executor.5'. [ 1218.812454][T31688] ? kmem_cache_alloc_trace+0x139/0x2b0 [ 1218.812464][T31688] ? register_shrinker+0x1a/0x170 [ 1218.812479][T31688] ? mb_cache_create+0x39d/0x500 [ 1218.837471][T31688] ? ext4_fill_super+0x94f2/0xeb30 [ 1218.842558][T31688] ? legacy_get_tree+0xde/0x170 [ 1218.847384][T31688] ? vfs_get_tree+0x83/0x260 [ 1218.851948][T31688] ? do_mount+0x19d0/0x2670 [ 1218.856424][T31688] ? ksys_mount+0xc2/0xf0 [ 1218.860731][T31688] should_fail+0x6f6/0x860 [ 1218.865125][T31688] ? setup_fault_attr+0x3d0/0x3d0 [ 1218.870125][T31688] __alloc_pages_nodemask+0x1c4/0x880 [ 1218.875472][T31688] ? gfp_pfmemalloc_allowed+0x120/0x120 [ 1218.880994][T31688] ? up_write+0xa6/0x270 [ 1218.885211][T31688] ? down_write+0xd8/0x150 [ 1218.889602][T31688] get_zeroed_page+0x15/0x40 [ 1218.894252][T31688] ext4_calculate_overhead+0xc1/0x1000 [ 1218.899686][T31688] ? register_shrinker+0x136/0x170 [ 1218.904774][T31688] ext4_fill_super+0xab3a/0xeb30 [ 1218.909692][T31688] ? ext4_mount+0x40/0x40 [ 1218.913994][T31688] ? idr_replace+0x1c4/0x230 [ 1218.918575][T31688] ? snprintf+0xd6/0x120 [ 1218.922798][T31688] ? vscnprintf+0x80/0x80 [ 1218.927120][T31688] ? set_blocksize+0x1a5/0x3a0 [ 1218.931876][T31688] mount_bdev+0x22d/0x340 [ 1218.936189][T31688] ? ext4_mount+0x40/0x40 [ 1218.940492][T31688] legacy_get_tree+0xde/0x170 [ 1218.945146][T31688] ? ext4_lazyinit_thread+0xd40/0xd40 [ 1218.950608][T31688] vfs_get_tree+0x83/0x260 [ 1218.955009][T31688] do_mount+0x19d0/0x2670 [ 1218.959321][T31688] ? copy_mount_string+0x30/0x30 [ 1218.964248][T31688] ? copy_mount_options+0x59/0x300 [ 1218.969354][T31688] ? copy_mount_options+0x59/0x300 [ 1218.974439][T31688] ? kmem_cache_alloc_trace+0x139/0x2b0 [ 1218.979956][T31688] ? copy_mount_options+0x273/0x300 [ 1218.985126][T31688] ksys_mount+0xc2/0xf0 [ 1218.989258][T31688] __x64_sys_mount+0xb1/0xc0 [ 1218.993824][T31688] do_syscall_64+0xcb/0x1e0 [ 1218.998319][T31688] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1219.004189][T31688] RIP: 0033:0x7f2bd50b1c5a [ 1219.008579][T31688] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1219.028342][T31688] RSP: 002b:00007f2bd2e27fa8 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 1219.036732][T31688] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007f2bd50b1c5a 15:41:10 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4f203, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d90000000f000000010000000c000000000000000020000000200000200000002cc4645f2cc4645f0100ffff53ef0100010000002cc4645f000000000000000001000000000000000b0000008000000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e3338363633343038350000000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000000000000000000000000000000000000d9ca5cac99fd4329af4dde786c1a5d13010040000c000000000000002cc4645f", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) 15:41:10 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0xffffff81, &(0x7f00000004c0)={&(0x7f0000000cc0)=ANY=[@ANYBLOB="7800000010000507000000bc4b9ccfc900000000", @ANYRES32, @ANYBLOB="4518000000000000500012800b00010062726964676500004000028005002500002f0000060006008bbc00000800010013000000060009000020000005002b000700000005002b00810000000c002200010000000000000008000a00"], 0x78}}, 0x0) 15:41:10 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4f203, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024", 0x29, 0x7e0}], 0x0, &(0x7f0000013000)) 15:41:10 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4f203, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) 15:41:10 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000cc0)=ANY=[@ANYBLOB="7800000010000507000000bc4b9ccfc900000000", @ANYRES32, @ANYBLOB="451800000000003c500012800b0001006272696467650000400002800500250000000000060006008bbc00000800"], 0x78}}, 0x0) 15:41:10 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4f203, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) [ 1219.044681][T31688] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007f2bd2e28000 [ 1219.052625][T31688] RBP: 00007f2bd2e28040 R08: 00007f2bd2e28040 R09: 0000000020000000 [ 1219.060587][T31688] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000020000000 [ 1219.068530][T31688] R13: 0000000020000100 R14: 00007f2bd2e28000 R15: 0000000020013000 [ 1219.077707][T31679] EXT4-fs (loop3): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? [ 1219.222591][T31709] EXT4-fs (loop3): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? [ 1219.251184][T31708] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.5'. [ 1219.260645][T31708] netlink: 36 bytes leftover after parsing attributes in process `syz-executor.5'. 15:41:11 executing program 4 (fault-call:0 fault-nth:67): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4f203, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) 15:41:11 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4f203, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d90000000f0000000100000011000000000000000020000000200000200000002cc4645f2cc4645f0100ffff53ef0100010000002cc4645f000000000000000001000000000000000b0000008000000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e3338363633343038350000000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000000000000000000000000000000000000d9ca5cac99fd4329af4dde786c1a5d13010040000c000000000000002cc4645f", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) 15:41:11 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4f203, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100e00c000000d90000000f0000000100000000000000000000000020000000200000200000002cc4645f2cc4645f0100ffff53ef0100010000002cc4645f000000000000000001000000000000000b0000008000000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e3338363633343038350000000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000000000000000000000000000000000000d9ca5cac99fd4329af4dde786c1a5d13010040000c000000000000002cc4645f", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024", 0x29, 0x7e0}], 0x0, &(0x7f0000013000)) 15:41:11 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0xffffff81, &(0x7f00000004c0)={&(0x7f0000000cc0)=ANY=[@ANYBLOB="7800000010000507000000bc4b9ccfc900000000", @ANYRES32, @ANYBLOB="4518000000000000500012800b00010062726964676500004000028005002500003a0000060006008bbc00000800010013000000060009000020000005002b000700000005002b00810000000c002200010000000000000008000a00"], 0x78}}, 0x0) 15:41:11 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000cc0)=ANY=[@ANYBLOB="7800000010000507000000bc4b9ccfc900000000", @ANYRES32, @ANYBLOB="451800ffffff8100500012800b0001006272696467650000400002800500250000000000060006008bbc00000800010013000000060009000020000005002b000700000005002b00810000000c002200010000000000000008000a00"], 0x78}}, 0x0) 15:41:11 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000cc0)=ANY=[@ANYBLOB="7800000010000507000000bc4b9ccfc900000000", @ANYRES32, @ANYBLOB="4518000000000048500012800b0001006272696467650000400002800500250000000000060006008bbc00000800"], 0x78}}, 0x0) 15:41:11 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4f203, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) 15:41:11 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4f203, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) 15:41:11 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0xffffff81, &(0x7f00000004c0)={&(0x7f0000000cc0)=ANY=[@ANYBLOB="7800000010000507000000bc4b9ccfc900000000", @ANYRES32, @ANYBLOB="4518000000000000500012800b00010062726964676500004000028005002500003c0000060006008bbc00000800010013000000060009000020000005002b000700000005002b00810000000c002200010000000000000008000a00"], 0x78}}, 0x0) [ 1219.364009][T31721] EXT4-fs (loop3): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? [ 1219.375419][T31722] FAULT_INJECTION: forcing a failure. [ 1219.375419][T31722] name failslab, interval 1, probability 0, space 0, times 0 [ 1219.389119][T31722] CPU: 1 PID: 31722 Comm: syz-executor.4 Tainted: G W 5.4.125-syzkaller-00005-gb8b657d4d5e9 #0 [ 1219.400744][T31722] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1219.410787][T31722] Call Trace: [ 1219.414073][T31722] dump_stack+0x1d8/0x24e [ 1219.418387][T31722] ? devkmsg_release+0x11c/0x11c [ 1219.423298][T31722] ? __reset_page_owner+0x1f/0x120 [ 1219.428387][T31722] ? show_regs_print_info+0x12/0x12 [ 1219.433567][T31722] ? save_stack+0x155/0x1e0 [ 1219.438058][T31722] ? prep_new_page+0x122/0x380 [ 1219.442795][T31722] ? __reset_page_owner+0x120/0x120 [ 1219.447983][T31722] ? free_pcp_prepare+0x1a9/0x270 [ 1219.452984][T31722] should_fail+0x6f6/0x860 [ 1219.457379][T31722] ? setup_fault_attr+0x3d0/0x3d0 [ 1219.462380][T31722] ? alloc_workqueue+0x156/0x11d0 [ 1219.467379][T31722] should_failslab+0x5/0x20 [ 1219.471855][T31722] __kmalloc+0x5f/0x2f0 [ 1219.475992][T31722] ? free_unref_page_commit+0x11e/0x3a0 [ 1219.481512][T31722] alloc_workqueue+0x156/0x11d0 [ 1219.486337][T31722] ? __free_pages_core+0x190/0x190 [ 1219.491436][T31722] ? ext4_bg_has_super+0xbb/0x390 [ 1219.496438][T31722] ? ext4_fill_super+0xab45/0xeb30 [ 1219.501533][T31722] ? apply_workqueue_attrs_locked+0x6d0/0x6d0 [ 1219.507575][T31722] ext4_fill_super+0xaa33/0xeb30 [ 1219.512493][T31722] ? ext4_mount+0x40/0x40 [ 1219.516795][T31722] ? idr_replace+0x1c4/0x230 [ 1219.521365][T31722] ? snprintf+0xd6/0x120 [ 1219.525582][T31722] ? vscnprintf+0x80/0x80 [ 1219.529899][T31722] ? set_blocksize+0x1a5/0x3a0 [ 1219.534635][T31722] mount_bdev+0x22d/0x340 [ 1219.538940][T31722] ? ext4_mount+0x40/0x40 [ 1219.543247][T31722] legacy_get_tree+0xde/0x170 [ 1219.547899][T31722] ? ext4_lazyinit_thread+0xd40/0xd40 [ 1219.553246][T31722] vfs_get_tree+0x83/0x260 [ 1219.557640][T31722] do_mount+0x19d0/0x2670 [ 1219.561946][T31722] ? copy_mount_string+0x30/0x30 [ 1219.566857][T31722] ? copy_mount_options+0x59/0x300 [ 1219.571943][T31722] ? copy_mount_options+0x59/0x300 [ 1219.577036][T31722] ? kmem_cache_alloc_trace+0x139/0x2b0 [ 1219.582570][T31722] ? copy_mount_options+0x273/0x300 [ 1219.587742][T31722] ksys_mount+0xc2/0xf0 [ 1219.591878][T31722] __x64_sys_mount+0xb1/0xc0 [ 1219.596442][T31722] do_syscall_64+0xcb/0x1e0 [ 1219.600919][T31722] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1219.606784][T31722] RIP: 0033:0x7f2bd50b1c5a [ 1219.611178][T31722] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1219.630753][T31722] RSP: 002b:00007f2bd2e27fa8 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 1219.639138][T31722] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007f2bd50b1c5a [ 1219.647087][T31722] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007f2bd2e28000 [ 1219.655031][T31722] RBP: 00007f2bd2e28040 R08: 00007f2bd2e28040 R09: 0000000020000000 15:41:11 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4f203, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) 15:41:11 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4f203, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d90000000f0000000100000020000000000000000020000000200000200000002cc4645f2cc4645f0100ffff53ef0100010000002cc4645f000000000000000001000000000000000b0000008000000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e3338363633343038350000000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000000000000000000000000000000000000d9ca5cac99fd4329af4dde786c1a5d13010040000c000000000000002cc4645f", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) [ 1219.662989][T31722] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000020000000 [ 1219.670934][T31722] R13: 0000000020000100 R14: 00007f2bd2e28000 R15: 0000000020013000 [ 1219.689147][T31722] EXT4-fs: failed to create workqueue [ 1219.694847][T31722] EXT4-fs (loop4): mount failed 15:41:11 executing program 4 (fault-call:0 fault-nth:68): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4f203, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) 15:41:11 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4f203, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) 15:41:11 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4f203, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) 15:41:11 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4f203, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024", 0x29, 0x7e0}], 0x0, &(0x7f0000013000)) 15:41:11 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4f203, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d90000000f000000010000003f000000000000000020000000200000200000002cc4645f2cc4645f0100ffff53ef0100010000002cc4645f000000000000000001000000000000000b0000008000000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e3338363633343038350000000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000000000000000000000000000000000000d9ca5cac99fd4329af4dde786c1a5d13010040000c000000000000002cc4645f", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) [ 1219.722135][T31720] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.5'. [ 1219.726049][T31721] EXT4-fs (loop3): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? [ 1219.733166][T31720] netlink: 36 bytes leftover after parsing attributes in process `syz-executor.5'. [ 1219.795813][T31746] FAULT_INJECTION: forcing a failure. [ 1219.795813][T31746] name failslab, interval 1, probability 0, space 0, times 0 [ 1219.810389][T31746] CPU: 0 PID: 31746 Comm: syz-executor.4 Tainted: G W 5.4.125-syzkaller-00005-gb8b657d4d5e9 #0 [ 1219.822026][T31746] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1219.823795][T31750] EXT4-fs (loop3): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? [ 1219.832070][T31746] Call Trace: [ 1219.832090][T31746] dump_stack+0x1d8/0x24e [ 1219.832100][T31746] ? devkmsg_release+0x11c/0x11c [ 1219.832110][T31746] ? show_regs_print_info+0x12/0x12 [ 1219.832121][T31746] should_fail+0x6f6/0x860 [ 1219.832137][T31746] ? setup_fault_attr+0x3d0/0x3d0 [ 1219.869371][T31746] ? alloc_workqueue+0x156/0x11d0 [ 1219.874380][T31746] ? alloc_workqueue+0x1cb/0x11d0 [ 1219.879373][T31746] should_failslab+0x5/0x20 [ 1219.883848][T31746] kmem_cache_alloc_trace+0x39/0x2b0 [ 1219.889104][T31746] ? alloc_workqueue+0x156/0x11d0 [ 1219.894101][T31746] alloc_workqueue+0x1cb/0x11d0 [ 1219.898927][T31746] ? __free_pages_core+0x190/0x190 [ 1219.904011][T31746] ? ext4_bg_has_super+0xbb/0x390 [ 1219.909015][T31746] ? ext4_fill_super+0xab45/0xeb30 [ 1219.914119][T31746] ? apply_workqueue_attrs_locked+0x6d0/0x6d0 [ 1219.920209][T31746] ext4_fill_super+0xaa33/0xeb30 [ 1219.925129][T31746] ? ext4_mount+0x40/0x40 [ 1219.929431][T31746] ? idr_replace+0x1c4/0x230 [ 1219.934036][T31746] ? snprintf+0xd6/0x120 [ 1219.938256][T31746] ? vscnprintf+0x80/0x80 [ 1219.942558][T31746] ? set_blocksize+0x1a5/0x3a0 [ 1219.947292][T31746] mount_bdev+0x22d/0x340 [ 1219.951595][T31746] ? ext4_mount+0x40/0x40 [ 1219.955895][T31746] legacy_get_tree+0xde/0x170 [ 1219.960545][T31746] ? ext4_lazyinit_thread+0xd40/0xd40 [ 1219.965884][T31746] vfs_get_tree+0x83/0x260 [ 1219.970302][T31746] do_mount+0x19d0/0x2670 [ 1219.974618][T31746] ? copy_mount_string+0x30/0x30 [ 1219.979534][T31746] ? copy_mount_options+0x59/0x300 [ 1219.984619][T31746] ? copy_mount_options+0x59/0x300 [ 1219.989712][T31746] ? kmem_cache_alloc_trace+0x139/0x2b0 [ 1219.995255][T31746] ? copy_mount_options+0x273/0x300 [ 1220.000472][T31746] ksys_mount+0xc2/0xf0 [ 1220.004607][T31746] __x64_sys_mount+0xb1/0xc0 [ 1220.009177][T31746] do_syscall_64+0xcb/0x1e0 [ 1220.013655][T31746] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1220.019617][T31746] RIP: 0033:0x7f2bd50b1c5a [ 1220.024005][T31746] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1220.043598][T31746] RSP: 002b:00007f2bd2e27fa8 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 1220.051983][T31746] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007f2bd50b1c5a [ 1220.059929][T31746] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007f2bd2e28000 [ 1220.067876][T31746] RBP: 00007f2bd2e28040 R08: 00007f2bd2e28040 R09: 0000000020000000 [ 1220.075823][T31746] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000020000000 [ 1220.083778][T31746] R13: 0000000020000100 R14: 00007f2bd2e28000 R15: 0000000020013000 [ 1220.091992][T31746] EXT4-fs: failed to create workqueue [ 1220.097499][T31746] EXT4-fs (loop4): mount failed 15:41:12 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000cc0)=ANY=[@ANYBLOB="7800000010000507000000bc4b9ccfc900000000", @ANYRES32, @ANYBLOB="4518000000038a00500012800b0001006272696467650000400002800500250000000000060006008bbc00000800010013000000060009000020000005002b000700000005002b00810000000c002200010000000000000008000a00"], 0x78}}, 0x0) 15:41:12 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000cc0)=ANY=[@ANYBLOB="7800000010000507000000bc4b9ccfc900000000", @ANYRES32, @ANYBLOB="451800000000004c500012800b0001006272696467650000400002800500250000000000060006008bbc00000800"], 0x78}}, 0x0) 15:41:12 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4f203, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) 15:41:12 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0xffffff81, &(0x7f00000004c0)={&(0x7f0000000cc0)=ANY=[@ANYBLOB="7800000010000507000000bc4b9ccfc900000000", @ANYRES32, @ANYBLOB="4518000000000000500012800b0001006272696467650000400002800500250000480000060006008bbc00000800010013000000060009000020000005002b000700000005002b00810000000c002200010000000000000008000a00"], 0x78}}, 0x0) 15:41:12 executing program 4 (fault-call:0 fault-nth:69): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4f203, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) 15:41:12 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4f203, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024", 0x29, 0x7e0}], 0x0, &(0x7f0000013000)) [ 1220.171148][T31720] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.5'. [ 1220.180545][T31720] netlink: 36 bytes leftover after parsing attributes in process `syz-executor.5'. [ 1220.197195][T31750] EXT4-fs (loop3): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? [ 1220.259550][T31762] FAULT_INJECTION: forcing a failure. [ 1220.259550][T31762] name failslab, interval 1, probability 0, space 0, times 0 [ 1220.275890][T31762] CPU: 1 PID: 31762 Comm: syz-executor.4 Tainted: G W 5.4.125-syzkaller-00005-gb8b657d4d5e9 #0 [ 1220.287555][T31762] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1220.297596][T31762] Call Trace: [ 1220.300888][T31762] dump_stack+0x1d8/0x24e [ 1220.305215][T31762] ? devkmsg_release+0x11c/0x11c [ 1220.310134][T31762] ? __reset_page_owner+0x1f/0x120 [ 1220.315222][T31762] ? show_regs_print_info+0x12/0x12 [ 1220.320406][T31762] ? save_stack+0x155/0x1e0 [ 1220.324882][T31762] ? prep_new_page+0x122/0x380 [ 1220.329641][T31762] ? __reset_page_owner+0x120/0x120 [ 1220.334826][T31762] ? free_pcp_prepare+0x1a9/0x270 [ 1220.339824][T31762] should_fail+0x6f6/0x860 [ 1220.344233][T31762] ? setup_fault_attr+0x3d0/0x3d0 [ 1220.349233][T31762] ? alloc_workqueue+0x156/0x11d0 [ 1220.354247][T31762] should_failslab+0x5/0x20 [ 1220.358723][T31762] __kmalloc+0x5f/0x2f0 [ 1220.362853][T31762] ? free_unref_page_commit+0x11e/0x3a0 [ 1220.368372][T31762] alloc_workqueue+0x156/0x11d0 [ 1220.373224][T31762] ? __free_pages_core+0x190/0x190 [ 1220.378323][T31762] ? ext4_bg_has_super+0xbb/0x390 [ 1220.383325][T31762] ? ext4_fill_super+0xab45/0xeb30 [ 1220.388412][T31762] ? apply_workqueue_attrs_locked+0x6d0/0x6d0 [ 1220.394470][T31762] ext4_fill_super+0xaa33/0xeb30 [ 1220.399387][T31762] ? ext4_mount+0x40/0x40 [ 1220.403719][T31762] ? check_memory_region+0x74/0x2e0 [ 1220.408891][T31762] ? snprintf+0xd6/0x120 [ 1220.413105][T31762] ? vscnprintf+0x80/0x80 [ 1220.417408][T31762] ? set_blocksize+0x1a5/0x3a0 [ 1220.422148][T31762] mount_bdev+0x22d/0x340 [ 1220.426459][T31762] ? ext4_mount+0x40/0x40 [ 1220.430770][T31762] legacy_get_tree+0xde/0x170 [ 1220.435435][T31762] ? ext4_lazyinit_thread+0xd40/0xd40 [ 1220.440781][T31762] vfs_get_tree+0x83/0x260 [ 1220.445172][T31762] do_mount+0x19d0/0x2670 [ 1220.449478][T31762] ? copy_mount_string+0x30/0x30 [ 1220.454392][T31762] ? copy_mount_options+0x59/0x300 [ 1220.459479][T31762] ? kmem_cache_alloc_trace+0x139/0x2b0 [ 1220.464998][T31762] ? copy_mount_options+0x273/0x300 [ 1220.470166][T31762] ksys_mount+0xc2/0xf0 [ 1220.474297][T31762] __x64_sys_mount+0xb1/0xc0 [ 1220.478861][T31762] do_syscall_64+0xcb/0x1e0 [ 1220.483347][T31762] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1220.489232][T31762] RIP: 0033:0x7f2bd50b1c5a [ 1220.493620][T31762] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1220.513196][T31762] RSP: 002b:00007f2bd2e27fa8 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 1220.521586][T31762] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007f2bd50b1c5a [ 1220.529707][T31762] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007f2bd2e28000 [ 1220.537671][T31762] RBP: 00007f2bd2e28040 R08: 00007f2bd2e28040 R09: 0000000020000000 [ 1220.545702][T31762] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000020000000 15:41:12 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4f203, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d90000000f0000000100000480000000000000000020000000200000200000002cc4645f2cc4645f0100ffff53ef0100010000002cc4645f000000000000000001000000000000000b0000008000000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e3338363633343038350000000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000000000000000000000000000000000000d9ca5cac99fd4329af4dde786c1a5d13010040000c000000000000002cc4645f", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) 15:41:12 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0xffffff81, &(0x7f00000004c0)={&(0x7f0000000cc0)=ANY=[@ANYBLOB="7800000010000507000000bc4b9ccfc900000000", @ANYRES32, @ANYBLOB="4518000000000000500012800b00010062726964676500004000028005002500004c0000060006008bbc00000800010013000000060009000020000005002b000700000005002b00810000000c002200010000000000000008000a00"], 0x78}}, 0x0) 15:41:12 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4f203, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) 15:41:12 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000cc0)=ANY=[@ANYBLOB="7800000010000507000000bc4b9ccfc900000000", @ANYRES32, @ANYBLOB="4518000000000060500012800b0001006272696467650000400002800500250000000000060006008bbc00000800"], 0x78}}, 0x0) 15:41:12 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4f203, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d90000000f0000000100000000080000000000000020000000200000200000002cc4645f2cc4645f0100ffff53ef0100010000002cc4645f000000000000000001000000000000000b0000008000000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e3338363633343038350000000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000000000000000000000000000000000000d9ca5cac99fd4329af4dde786c1a5d13010040000c000000000000002cc4645f", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) [ 1220.553649][T31762] R13: 0000000020000100 R14: 00007f2bd2e28000 R15: 0000000020013000 [ 1220.566242][T31762] EXT4-fs: failed to create workqueue [ 1220.573296][T31762] EXT4-fs (loop4): mount failed [ 1220.597549][T31767] EXT4-fs (loop3): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? 15:41:12 executing program 4 (fault-call:0 fault-nth:70): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4f203, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) [ 1220.646269][T31767] EXT4-fs (loop3): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? [ 1220.666364][T31786] FAULT_INJECTION: forcing a failure. [ 1220.666364][T31786] name failslab, interval 1, probability 0, space 0, times 0 [ 1220.679626][T31786] CPU: 0 PID: 31786 Comm: syz-executor.4 Tainted: G W 5.4.125-syzkaller-00005-gb8b657d4d5e9 #0 [ 1220.691249][T31786] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1220.701280][T31786] Call Trace: [ 1220.704550][T31786] dump_stack+0x1d8/0x24e [ 1220.708853][T31786] ? devkmsg_release+0x11c/0x11c [ 1220.713802][T31786] ? show_regs_print_info+0x12/0x12 [ 1220.718974][T31786] should_fail+0x6f6/0x860 [ 1220.723370][T31786] ? setup_fault_attr+0x3d0/0x3d0 [ 1220.728365][T31786] ? unwind_get_return_address+0x48/0x80 [ 1220.733981][T31786] ? apply_wqattrs_prepare+0x102/0x17e0 [ 1220.739500][T31786] should_failslab+0x5/0x20 [ 1220.743975][T31786] kmem_cache_alloc_trace+0x39/0x2b0 [ 1220.749236][T31786] ? apply_wqattrs_prepare+0xcb/0x17e0 [ 1220.754662][T31786] apply_wqattrs_prepare+0x102/0x17e0 [ 1220.760006][T31786] ? alloc_workqueue+0x1cb/0x11d0 [ 1220.765003][T31786] ? ext4_fill_super+0xaa33/0xeb30 [ 1220.770084][T31786] ? mount_bdev+0x22d/0x340 [ 1220.774557][T31786] ? legacy_get_tree+0xde/0x170 [ 1220.779375][T31786] ? vfs_get_tree+0x83/0x260 [ 1220.783950][T31786] ? do_mount+0x19d0/0x2670 [ 1220.788422][T31786] ? ksys_mount+0xc2/0xf0 [ 1220.792735][T31786] ? __x64_sys_mount+0xb1/0xc0 [ 1220.797482][T31786] ? do_syscall_64+0xcb/0x1e0 [ 1220.802130][T31786] ? entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1220.808167][T31786] ? format_decode+0x441/0x1ab0 [ 1220.812994][T31786] ? cwt_wakefn+0x70/0x70 [ 1220.817426][T31786] ? vsnprintf+0x1d60/0x1d60 [ 1220.821985][T31786] ? vsnprintf+0x1e4/0x1d60 [ 1220.826456][T31786] apply_workqueue_attrs_locked+0x136/0x6d0 [ 1220.832320][T31786] ? check_preemption_disabled+0x9e/0x330 [ 1220.838527][T31786] ? apply_workqueue_attrs+0x40/0x40 [ 1220.843794][T31786] ? mutex_lock+0xa6/0x110 [ 1220.848181][T31786] ? mutex_trylock+0xb0/0xb0 [ 1220.852743][T31786] ? kmem_cache_alloc_trace+0x139/0x2b0 [ 1220.858256][T31786] ? free_unref_page_commit+0x11e/0x3a0 [ 1220.863783][T31786] alloc_workqueue+0xcc4/0x11d0 [ 1220.868621][T31786] ? ext4_fill_super+0xab45/0xeb30 [ 1220.873701][T31786] ? apply_workqueue_attrs_locked+0x6d0/0x6d0 [ 1220.879738][T31786] ext4_fill_super+0xaa33/0xeb30 [ 1220.884669][T31786] ? ext4_mount+0x40/0x40 [ 1220.889004][T31786] ? idr_replace+0x1c4/0x230 [ 1220.893576][T31786] ? snprintf+0xd6/0x120 [ 1220.897790][T31786] ? vscnprintf+0x80/0x80 [ 1220.902090][T31786] ? set_blocksize+0x1a5/0x3a0 [ 1220.906827][T31786] mount_bdev+0x22d/0x340 [ 1220.911138][T31786] ? ext4_mount+0x40/0x40 [ 1220.915442][T31786] legacy_get_tree+0xde/0x170 [ 1220.920098][T31786] ? ext4_lazyinit_thread+0xd40/0xd40 [ 1220.925441][T31786] vfs_get_tree+0x83/0x260 [ 1220.929832][T31786] do_mount+0x19d0/0x2670 [ 1220.934146][T31786] ? copy_mount_string+0x30/0x30 [ 1220.939056][T31786] ? copy_mount_options+0x59/0x300 [ 1220.944137][T31786] ? kmem_cache_alloc_trace+0x139/0x2b0 [ 1220.949650][T31786] ? copy_mount_options+0x273/0x300 [ 1220.955705][T31786] ksys_mount+0xc2/0xf0 [ 1220.959844][T31786] __x64_sys_mount+0xb1/0xc0 [ 1220.964427][T31786] do_syscall_64+0xcb/0x1e0 [ 1220.968908][T31786] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1220.974780][T31786] RIP: 0033:0x7f2bd50b1c5a [ 1220.979170][T31786] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1220.998804][T31786] RSP: 002b:00007f2bd2e27fa8 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 1221.007202][T31786] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007f2bd50b1c5a [ 1221.015151][T31786] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007f2bd2e28000 [ 1221.023180][T31786] RBP: 00007f2bd2e28040 R08: 00007f2bd2e28040 R09: 0000000020000000 [ 1221.031123][T31786] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000020000000 [ 1221.039066][T31786] R13: 0000000020000100 R14: 00007f2bd2e28000 R15: 0000000020013000 [ 1221.066716][T31786] EXT4-fs: failed to create workqueue [ 1221.072270][T31786] EXT4-fs (loop4): mount failed 15:41:12 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000cc0)=ANY=[@ANYBLOB="7800000010000507000000bc4b9ccfc900000000", @ANYRES32, @ANYBLOB="451800ffffff9e00500012800b0001006272696467650000400002800500250000000000060006008bbc00000800010013000000060009000020000005002b000700000005002b00810000000c002200010000000000000008000a00"], 0x78}}, 0x0) 15:41:12 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4f203, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) 15:41:12 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4f203, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024", 0x29, 0x7e0}], 0x0, &(0x7f0000013000)) 15:41:12 executing program 4 (fault-call:0 fault-nth:71): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4f203, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) 15:41:12 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0xffffff81, &(0x7f00000004c0)={&(0x7f0000000cc0)=ANY=[@ANYBLOB="7800000010000507000000bc4b9ccfc900000000", @ANYRES32, @ANYBLOB="4518000000000000500012800b0001006272696467650000400002800500250000680000060006008bbc00000800010013000000060009000020000005002b000700000005002b00810000000c002200010000000000000008000a00"], 0x78}}, 0x0) 15:41:12 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000cc0)=ANY=[@ANYBLOB="7800000010000507000000bc4b9ccfc900000000", @ANYRES32, @ANYBLOB="4518000000000068500012800b0001006272696467650000400002800500250000000000060006008bbc00000800"], 0x78}}, 0x0) 15:41:13 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4f203, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d90000000f0000000100000000200000000000000020000000200000200000002cc4645f2cc4645f0100ffff53ef0100010000002cc4645f000000000000000001000000000000000b0000008000000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e3338363633343038350000000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000000000000000000000000000000000000d9ca5cac99fd4329af4dde786c1a5d13010040000c000000000000002cc4645f", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) [ 1221.164092][T31795] EXT4-fs (loop3): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? [ 1221.183722][T31797] FAULT_INJECTION: forcing a failure. [ 1221.183722][T31797] name failslab, interval 1, probability 0, space 0, times 0 [ 1221.197501][T31797] CPU: 1 PID: 31797 Comm: syz-executor.4 Tainted: G W 5.4.125-syzkaller-00005-gb8b657d4d5e9 #0 [ 1221.209129][T31797] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1221.219169][T31797] Call Trace: [ 1221.222447][T31797] dump_stack+0x1d8/0x24e [ 1221.226759][T31797] ? devkmsg_release+0x11c/0x11c [ 1221.231693][T31797] ? show_regs_print_info+0x12/0x12 [ 1221.236881][T31797] should_fail+0x6f6/0x860 [ 1221.241284][T31797] ? setup_fault_attr+0x3d0/0x3d0 [ 1221.246285][T31797] ? unwind_get_return_address+0x48/0x80 [ 1221.251893][T31797] ? apply_wqattrs_prepare+0x102/0x17e0 [ 1221.257415][T31797] should_failslab+0x5/0x20 [ 1221.261896][T31797] kmem_cache_alloc_trace+0x39/0x2b0 [ 1221.267154][T31797] ? apply_wqattrs_prepare+0xcb/0x17e0 [ 1221.272588][T31797] apply_wqattrs_prepare+0x102/0x17e0 [ 1221.277932][T31797] ? alloc_workqueue+0x1cb/0x11d0 [ 1221.282943][T31797] ? ext4_fill_super+0xaa33/0xeb30 [ 1221.288025][T31797] ? mount_bdev+0x22d/0x340 [ 1221.292499][T31797] ? legacy_get_tree+0xde/0x170 [ 1221.297336][T31797] ? vfs_get_tree+0x83/0x260 [ 1221.301896][T31797] ? do_mount+0x19d0/0x2670 [ 1221.306383][T31797] ? ksys_mount+0xc2/0xf0 [ 1221.310689][T31797] ? __x64_sys_mount+0xb1/0xc0 [ 1221.315424][T31797] ? do_syscall_64+0xcb/0x1e0 [ 1221.320075][T31797] ? entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1221.326116][T31797] ? format_decode+0x441/0x1ab0 [ 1221.330939][T31797] ? cwt_wakefn+0x70/0x70 [ 1221.335241][T31797] ? vsnprintf+0x1d60/0x1d60 [ 1221.339804][T31797] ? vsnprintf+0x1e4/0x1d60 [ 1221.344278][T31797] apply_workqueue_attrs_locked+0x136/0x6d0 [ 1221.350146][T31797] ? check_preemption_disabled+0x9e/0x330 [ 1221.355835][T31797] ? apply_workqueue_attrs+0x40/0x40 [ 1221.361091][T31797] ? mutex_lock+0xa6/0x110 [ 1221.365492][T31797] ? mutex_trylock+0xb0/0xb0 [ 1221.370061][T31797] ? kmem_cache_alloc_trace+0x139/0x2b0 [ 1221.375579][T31797] alloc_workqueue+0xcc4/0x11d0 [ 1221.380409][T31797] ? ext4_fill_super+0xab45/0xeb30 [ 1221.385500][T31797] ? apply_workqueue_attrs_locked+0x6d0/0x6d0 [ 1221.391558][T31797] ext4_fill_super+0xaa33/0xeb30 [ 1221.396475][T31797] ? ext4_mount+0x40/0x40 [ 1221.400776][T31797] ? idr_replace+0x1c4/0x230 [ 1221.405340][T31797] ? snprintf+0xd6/0x120 [ 1221.409728][T31797] ? vscnprintf+0x80/0x80 [ 1221.414031][T31797] ? set_blocksize+0x1a5/0x3a0 [ 1221.418784][T31797] mount_bdev+0x22d/0x340 [ 1221.423088][T31797] ? ext4_mount+0x40/0x40 [ 1221.427392][T31797] legacy_get_tree+0xde/0x170 [ 1221.432059][T31797] ? ext4_lazyinit_thread+0xd40/0xd40 [ 1221.437417][T31797] vfs_get_tree+0x83/0x260 [ 1221.441821][T31797] do_mount+0x19d0/0x2670 [ 1221.446126][T31797] ? copy_mount_string+0x30/0x30 [ 1221.451057][T31797] ? copy_mount_options+0x59/0x300 [ 1221.456139][T31797] ? kmem_cache_alloc_trace+0x139/0x2b0 [ 1221.461657][T31797] ? copy_mount_options+0x273/0x300 [ 1221.466844][T31797] ksys_mount+0xc2/0xf0 [ 1221.470975][T31797] __x64_sys_mount+0xb1/0xc0 [ 1221.475538][T31797] do_syscall_64+0xcb/0x1e0 [ 1221.480016][T31797] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1221.485904][T31797] RIP: 0033:0x7f2bd50b1c5a [ 1221.490305][T31797] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1221.509968][T31797] RSP: 002b:00007f2bd2e27fa8 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 1221.518369][T31797] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007f2bd50b1c5a [ 1221.526315][T31797] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007f2bd2e28000 [ 1221.534351][T31797] RBP: 00007f2bd2e28040 R08: 00007f2bd2e28040 R09: 0000000020000000 [ 1221.542299][T31797] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000020000000 [ 1221.550245][T31797] R13: 0000000020000100 R14: 00007f2bd2e28000 R15: 0000000020013000 [ 1221.559907][T31797] EXT4-fs: failed to create workqueue 15:41:13 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4f203, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) 15:41:13 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0xffffff81, &(0x7f00000004c0)={&(0x7f0000000cc0)=ANY=[@ANYBLOB="7800000010000507000000bc4b9ccfc900000000", @ANYRES32, @ANYBLOB="4518000000000000500012800b00010062726964676500004000028005002500006c0000060006008bbc00000800010013000000060009000020000005002b000700000005002b00810000000c002200010000000000000008000a00"], 0x78}}, 0x0) 15:41:13 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4f203, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) [ 1221.568792][T31797] EXT4-fs (loop4): mount failed 15:41:13 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4f203, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) 15:41:13 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4f203, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) [ 1221.638017][T31795] EXT4-fs (loop3): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? 15:41:13 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000cc0)=ANY=[@ANYBLOB="7800000010000507000000bc4b9ccfc900000000", @ANYRES32, @ANYBLOB="451800000002a200500012800b0001006272696467650000400002800500250000000000060006008bbc00000800010013000000060009000020000005002b000700000005002b00810000000c002200010000000000000008000a00"], 0x78}}, 0x0) 15:41:13 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4f203, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) 15:41:13 executing program 4 (fault-call:0 fault-nth:72): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4f203, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) 15:41:13 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4f203, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024", 0x29, 0x7e0}], 0x0, &(0x7f0000013000)) 15:41:13 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000cc0)=ANY=[@ANYBLOB="7800000010000507000000bc4b9ccfc900000000", @ANYRES32, @ANYBLOB="451800000000006c500012800b0001006272696467650000400002800500250000000000060006008bbc00000800"], 0x78}}, 0x0) 15:41:13 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0xffffff81, &(0x7f00000004c0)={&(0x7f0000000cc0)=ANY=[@ANYBLOB="7800000010000507000000bc4b9ccfc900000000", @ANYRES32, @ANYBLOB="4518000000000000500012800b0001006272696467650000400002800500250000740000060006008bbc00000800010013000000060009000020000005002b000700000005002b00810000000c002200010000000000000008000a00"], 0x78}}, 0x0) 15:41:13 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4f203, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d90000000f0000000100000000000400000000000020000000200000200000002cc4645f2cc4645f0100ffff53ef0100010000002cc4645f000000000000000001000000000000000b0000008000000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e3338363633343038350000000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000000000000000000000000000000000000d9ca5cac99fd4329af4dde786c1a5d13010040000c000000000000002cc4645f", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) [ 1221.746421][T31825] FAULT_INJECTION: forcing a failure. [ 1221.746421][T31825] name failslab, interval 1, probability 0, space 0, times 0 [ 1221.760204][T31825] CPU: 1 PID: 31825 Comm: syz-executor.4 Tainted: G W 5.4.125-syzkaller-00005-gb8b657d4d5e9 #0 [ 1221.760673][T31827] EXT4-fs (loop3): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? [ 1221.771829][T31825] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1221.771833][T31825] Call Trace: 15:41:13 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4f203, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) 15:41:13 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4f203, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) [ 1221.771852][T31825] dump_stack+0x1d8/0x24e [ 1221.771861][T31825] ? devkmsg_release+0x11c/0x11c [ 1221.771868][T31825] ? arch_stack_walk+0xf8/0x140 [ 1221.771877][T31825] ? show_regs_print_info+0x12/0x12 [ 1221.771887][T31825] should_fail+0x6f6/0x860 [ 1221.771902][T31825] ? setup_fault_attr+0x3d0/0x3d0 [ 1221.823981][T31825] ? stack_trace_save+0x1f0/0x1f0 [ 1221.829006][T31825] ? __kernel_text_address+0x93/0x100 [ 1221.834370][T31825] ? unwind_get_return_address+0x48/0x80 [ 1221.839995][T31825] ? apply_wqattrs_prepare+0xcb/0x17e0 15:41:13 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4f203, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) 15:41:13 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4f203, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) 15:41:13 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4f203, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) [ 1221.845447][T31825] should_failslab+0x5/0x20 [ 1221.849943][T31825] kmem_cache_alloc_trace+0x39/0x2b0 [ 1221.855228][T31825] apply_wqattrs_prepare+0xcb/0x17e0 [ 1221.860541][T31825] ? alloc_workqueue+0x1cb/0x11d0 [ 1221.865561][T31825] ? ext4_fill_super+0xaa33/0xeb30 [ 1221.870659][T31825] ? mount_bdev+0x22d/0x340 [ 1221.875172][T31825] ? legacy_get_tree+0xde/0x170 [ 1221.879991][T31825] ? vfs_get_tree+0x83/0x260 [ 1221.884562][T31825] ? do_mount+0x19d0/0x2670 [ 1221.889063][T31825] ? ksys_mount+0xc2/0xf0 [ 1221.893391][T31825] ? __x64_sys_mount+0xb1/0xc0 [ 1221.898194][T31825] ? do_syscall_64+0xcb/0x1e0 [ 1221.902863][T31825] ? entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1221.908928][T31825] ? format_decode+0x441/0x1ab0 [ 1221.913766][T31825] ? cwt_wakefn+0x70/0x70 [ 1221.918106][T31825] ? vsnprintf+0x1d60/0x1d60 [ 1221.922696][T31825] ? vsnprintf+0x1e4/0x1d60 [ 1221.927171][T31825] apply_workqueue_attrs_locked+0x136/0x6d0 [ 1221.933036][T31825] ? check_preemption_disabled+0x9e/0x330 [ 1221.938726][T31825] ? apply_workqueue_attrs+0x40/0x40 [ 1221.943984][T31825] ? mutex_lock+0xa6/0x110 [ 1221.948370][T31825] ? mutex_trylock+0xb0/0xb0 [ 1221.952931][T31825] ? kmem_cache_alloc_trace+0x139/0x2b0 [ 1221.958460][T31825] alloc_workqueue+0xcc4/0x11d0 [ 1221.963451][T31825] ? ext4_fill_super+0xab45/0xeb30 [ 1221.968550][T31825] ? apply_workqueue_attrs_locked+0x6d0/0x6d0 [ 1221.974593][T31825] ext4_fill_super+0xaa33/0xeb30 [ 1221.979524][T31825] ? ext4_mount+0x40/0x40 [ 1221.983826][T31825] ? idr_replace+0x1c4/0x230 [ 1221.988404][T31825] ? snprintf+0xd6/0x120 [ 1221.992617][T31825] ? vscnprintf+0x80/0x80 [ 1221.996927][T31825] ? set_blocksize+0x1a5/0x3a0 [ 1222.001796][T31825] mount_bdev+0x22d/0x340 [ 1222.006236][T31825] ? ext4_mount+0x40/0x40 [ 1222.010548][T31825] legacy_get_tree+0xde/0x170 [ 1222.015210][T31825] ? ext4_lazyinit_thread+0xd40/0xd40 [ 1222.020710][T31825] vfs_get_tree+0x83/0x260 [ 1222.025105][T31825] do_mount+0x19d0/0x2670 [ 1222.029474][T31825] ? copy_mount_string+0x30/0x30 [ 1222.034381][T31825] ? copy_mount_options+0x59/0x300 [ 1222.039573][T31825] ? copy_mount_options+0x59/0x300 [ 1222.044665][T31825] ? kmem_cache_alloc_trace+0x139/0x2b0 [ 1222.050181][T31825] ? copy_mount_options+0x273/0x300 [ 1222.055364][T31825] ksys_mount+0xc2/0xf0 [ 1222.059491][T31825] __x64_sys_mount+0xb1/0xc0 [ 1222.064053][T31825] do_syscall_64+0xcb/0x1e0 [ 1222.068525][T31825] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1222.074402][T31825] RIP: 0033:0x7f2bd50b1c5a [ 1222.078873][T31825] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1222.098454][T31825] RSP: 002b:00007f2bd2e27fa8 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 1222.106847][T31825] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007f2bd50b1c5a [ 1222.114796][T31825] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007f2bd2e28000 [ 1222.122743][T31825] RBP: 00007f2bd2e28040 R08: 00007f2bd2e28040 R09: 0000000020000000 [ 1222.130688][T31825] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000020000000 [ 1222.138634][T31825] R13: 0000000020000100 R14: 00007f2bd2e28000 R15: 0000000020013000 [ 1222.147619][T31825] EXT4-fs: failed to create workqueue [ 1222.159282][T31825] EXT4-fs (loop4): mount failed [ 1222.230327][T31827] EXT4-fs (loop3): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? 15:41:14 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000cc0)=ANY=[@ANYBLOB="7800000010000507000000bc4b9ccfc900000000", @ANYRES32, @ANYBLOB="451800000003bc00500012800b0001006272696467650000400002800500250000000000060006008bbc00000800010013000000060009000020000005002b000700000005002b00810000000c002200010000000000000008000a00"], 0x78}}, 0x0) 15:41:14 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4f203, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) 15:41:14 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000cc0)=ANY=[@ANYBLOB="7800000010000507000000bc4b9ccfc900000000", @ANYRES32, @ANYBLOB="4518000000000074500012800b0001006272696467650000400002800500250000000000060006008bbc00000800"], 0x78}}, 0x0) 15:41:14 executing program 4 (fault-call:0 fault-nth:73): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4f203, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) 15:41:14 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4f203, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024", 0x29, 0x7e0}], 0x0, &(0x7f0000013000)) 15:41:14 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0xffffff81, &(0x7f00000004c0)={&(0x7f0000000cc0)=ANY=[@ANYBLOB="7800000010000507000000bc4b9ccfc900000000", @ANYRES32, @ANYBLOB="4518000000000000500012800b00010062726964676500004000028005002500007a0000060006008bbc00000800010013000000060009000020000005002b000700000005002b00810000000c002200010000000000000008000a00"], 0x78}}, 0x0) [ 1222.384694][T31854] FAULT_INJECTION: forcing a failure. [ 1222.384694][T31854] name failslab, interval 1, probability 0, space 0, times 0 [ 1222.401563][T31854] CPU: 1 PID: 31854 Comm: syz-executor.4 Tainted: G W 5.4.125-syzkaller-00005-gb8b657d4d5e9 #0 [ 1222.413279][T31854] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1222.423319][T31854] Call Trace: [ 1222.426599][T31854] dump_stack+0x1d8/0x24e [ 1222.430926][T31854] ? devkmsg_release+0x11c/0x11c [ 1222.435840][T31854] ? show_regs_print_info+0x12/0x12 [ 1222.441016][T31854] should_fail+0x6f6/0x860 [ 1222.445410][T31854] ? setup_fault_attr+0x3d0/0x3d0 [ 1222.450422][T31854] ? unwind_get_return_address+0x48/0x80 [ 1222.456027][T31854] ? apply_wqattrs_prepare+0x1c0/0x17e0 [ 1222.461569][T31854] should_failslab+0x5/0x20 [ 1222.466051][T31854] kmem_cache_alloc_trace+0x39/0x2b0 [ 1222.471308][T31854] ? apply_wqattrs_prepare+0x102/0x17e0 [ 1222.476829][T31854] apply_wqattrs_prepare+0x1c0/0x17e0 [ 1222.482172][T31854] ? alloc_workqueue+0x1cb/0x11d0 [ 1222.487169][T31854] ? mount_bdev+0x22d/0x340 [ 1222.491644][T31854] ? legacy_get_tree+0xde/0x170 [ 1222.496470][T31854] ? vfs_get_tree+0x83/0x260 [ 1222.501054][T31854] ? do_mount+0x19d0/0x2670 [ 1222.505530][T31854] ? ksys_mount+0xc2/0xf0 [ 1222.509834][T31854] ? __x64_sys_mount+0xb1/0xc0 [ 1222.514570][T31854] ? do_syscall_64+0xcb/0x1e0 [ 1222.519218][T31854] ? entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1222.525259][T31854] ? format_decode+0x441/0x1ab0 [ 1222.530170][T31854] ? cwt_wakefn+0x70/0x70 [ 1222.534477][T31854] ? vsnprintf+0x1d60/0x1d60 [ 1222.539043][T31854] ? vsnprintf+0x1e4/0x1d60 [ 1222.543519][T31854] apply_workqueue_attrs_locked+0x136/0x6d0 [ 1222.549390][T31854] ? check_preemption_disabled+0x9e/0x330 [ 1222.555084][T31854] ? apply_workqueue_attrs+0x40/0x40 [ 1222.560343][T31854] ? mutex_lock+0xa6/0x110 [ 1222.564730][T31854] ? mutex_trylock+0xb0/0xb0 [ 1222.569317][T31854] ? kmem_cache_alloc_trace+0x139/0x2b0 [ 1222.574836][T31854] ? free_unref_page_commit+0x11e/0x3a0 [ 1222.580353][T31854] alloc_workqueue+0xcc4/0x11d0 [ 1222.585190][T31854] ? ext4_fill_super+0xab45/0xeb30 [ 1222.590286][T31854] ? apply_workqueue_attrs_locked+0x6d0/0x6d0 [ 1222.596430][T31854] ext4_fill_super+0xaa33/0xeb30 [ 1222.601361][T31854] ? ext4_mount+0x40/0x40 [ 1222.605667][T31854] ? idr_replace+0x1c4/0x230 [ 1222.610244][T31854] ? snprintf+0xd6/0x120 [ 1222.614459][T31854] ? vscnprintf+0x80/0x80 [ 1222.618762][T31854] ? set_blocksize+0x1a5/0x3a0 [ 1222.623500][T31854] mount_bdev+0x22d/0x340 [ 1222.627805][T31854] ? ext4_mount+0x40/0x40 [ 1222.632113][T31854] legacy_get_tree+0xde/0x170 [ 1222.636763][T31854] ? ext4_lazyinit_thread+0xd40/0xd40 [ 1222.642125][T31854] vfs_get_tree+0x83/0x260 [ 1222.646515][T31854] do_mount+0x19d0/0x2670 [ 1222.650821][T31854] ? copy_mount_string+0x30/0x30 [ 1222.655734][T31854] ? copy_mount_options+0x59/0x300 [ 1222.660826][T31854] ? copy_mount_options+0x59/0x300 [ 1222.665920][T31854] ? kmem_cache_alloc_trace+0x139/0x2b0 [ 1222.671438][T31854] ? copy_mount_options+0x273/0x300 [ 1222.676607][T31854] ksys_mount+0xc2/0xf0 [ 1222.680737][T31854] __x64_sys_mount+0xb1/0xc0 [ 1222.685302][T31854] do_syscall_64+0xcb/0x1e0 [ 1222.689782][T31854] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1222.695650][T31854] RIP: 0033:0x7f2bd50b1c5a [ 1222.700129][T31854] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1222.719725][T31854] RSP: 002b:00007f2bd2e27fa8 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 1222.728108][T31854] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007f2bd50b1c5a 15:41:14 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4f203, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d90000000f0000000100000000000a00000000000020000000200000200000002cc4645f2cc4645f0100ffff53ef0100010000002cc4645f000000000000000001000000000000000b0000008000000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e3338363633343038350000000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000000000000000000000000000000000000d9ca5cac99fd4329af4dde786c1a5d13010040000c000000000000002cc4645f", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) 15:41:14 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000cc0)=ANY=[@ANYBLOB="7800000010000507000000bc4b9ccfc900000000", @ANYRES32, @ANYBLOB="451800000000007a500012800b0001006272696467650000400002800500250000000000060006008bbc00000800"], 0x78}}, 0x0) [ 1222.736055][T31854] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007f2bd2e28000 [ 1222.744000][T31854] RBP: 00007f2bd2e28040 R08: 00007f2bd2e28040 R09: 0000000020000000 [ 1222.751950][T31854] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000020000000 [ 1222.759892][T31854] R13: 0000000020000100 R14: 00007f2bd2e28000 R15: 0000000020013000 15:41:14 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4f203, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) 15:41:14 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4f203, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) 15:41:14 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4f203, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) [ 1222.795342][T31854] EXT4-fs: failed to create workqueue [ 1222.796959][T31863] EXT4-fs (loop3): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? [ 1222.802647][T31854] EXT4-fs (loop4): mount failed 15:41:14 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4f203, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) [ 1222.867092][T31863] EXT4-fs (loop3): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? 15:41:14 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000cc0)=ANY=[@ANYBLOB="7800000010000507000000bc4b9ccfc900000000", @ANYRES32, @ANYBLOB="451800000003c800500012800b0001006272696467650000400002800500250000000000060006008bbc00000800010013000000060009000020000005002b000700000005002b00810000000c002200010000000000000008000a00"], 0x78}}, 0x0) 15:41:14 executing program 4 (fault-call:0 fault-nth:74): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4f203, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d90000000f0000000100000000000000000000000020000000200000200000002cc4645f2cc4645f0100ffff53ef0100010000002cc4645f000000000000000001000000000000000b0000008000000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e3338363633343038350000000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000000000000000000000000000000000000d9ca5cac99fd4329af4dde786c1a5d13010040000c000000000000002cc4645f", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) 15:41:14 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4f203, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) 15:41:14 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0xffffff81, &(0x7f00000004c0)={&(0x7f0000000cc0)=ANY=[@ANYBLOB="7800000010000507000000bc4b9ccfc900000000", @ANYRES32, @ANYBLOB="4518000000000000500012800b0001006272696467650000400002800500250000b50000060006008bbc00000800010013000000060009000020000005002b000700000005002b00810000000c002200010000000000000008000a00"], 0x78}}, 0x0) 15:41:14 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4f203, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024", 0x29, 0x7e0}], 0x0, &(0x7f0000013000)) 15:41:14 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000cc0)=ANY=[@ANYBLOB="7800000010000507000000bc4b9ccfc900000000", @ANYRES32, @ANYBLOB="4518000000000099500012800b0001006272696467650000400002800500250000000000060006008bbc00000800"], 0x78}}, 0x0) 15:41:14 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4f203, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) [ 1223.001890][T31886] FAULT_INJECTION: forcing a failure. [ 1223.001890][T31886] name failslab, interval 1, probability 0, space 0, times 0 [ 1223.014710][T31886] CPU: 0 PID: 31886 Comm: syz-executor.4 Tainted: G W 5.4.125-syzkaller-00005-gb8b657d4d5e9 #0 [ 1223.026323][T31886] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1223.028568][T31897] EXT4-fs (loop3): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? [ 1223.036370][T31886] Call Trace: 15:41:14 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4f203, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) 15:41:14 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4f203, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) 15:41:14 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4f203, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) [ 1223.036390][T31886] dump_stack+0x1d8/0x24e [ 1223.036401][T31886] ? devkmsg_release+0x11c/0x11c [ 1223.036409][T31886] ? show_regs_print_info+0x12/0x12 [ 1223.036426][T31886] should_fail+0x6f6/0x860 [ 1223.036435][T31886] ? setup_fault_attr+0x3d0/0x3d0 [ 1223.036443][T31886] ? apply_wqattrs_prepare+0x1c0/0x17e0 [ 1223.036457][T31886] ? apply_wqattrs_prepare+0x8a5/0x17e0 [ 1223.084679][T31886] should_failslab+0x5/0x20 [ 1223.089177][T31886] kmem_cache_alloc+0x36/0x290 [ 1223.093939][T31886] apply_wqattrs_prepare+0x8a5/0x17e0 15:41:14 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4f203, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d90000000f0000000100000000002600000000000020000000200000200000002cc4645f2cc4645f0100ffff53ef0100010000002cc4645f000000000000000001000000000000000b0000008000000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e3338363633343038350000000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000000000000000000000000000000000000d9ca5cac99fd4329af4dde786c1a5d13010040000c000000000000002cc4645f", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) 15:41:14 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4f203, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) [ 1223.099305][T31886] ? do_mount+0x19d0/0x2670 [ 1223.103803][T31886] ? format_decode+0x441/0x1ab0 [ 1223.108653][T31886] ? cwt_wakefn+0x70/0x70 [ 1223.112982][T31886] ? vsnprintf+0x1d60/0x1d60 [ 1223.117557][T31886] ? vsnprintf+0x1e4/0x1d60 [ 1223.122213][T31886] apply_workqueue_attrs_locked+0x136/0x6d0 [ 1223.128096][T31886] ? check_preemption_disabled+0x9e/0x330 [ 1223.133891][T31886] ? apply_workqueue_attrs+0x40/0x40 [ 1223.139167][T31886] ? mutex_lock+0xa6/0x110 [ 1223.143572][T31886] ? mutex_trylock+0xb0/0xb0 [ 1223.148156][T31886] ? kmem_cache_alloc_trace+0x139/0x2b0 [ 1223.153722][T31886] ? free_unref_page_commit+0x11e/0x3a0 [ 1223.159247][T31886] alloc_workqueue+0xcc4/0x11d0 [ 1223.164088][T31886] ? ext4_fill_super+0xab45/0xeb30 [ 1223.169177][T31886] ? apply_workqueue_attrs_locked+0x6d0/0x6d0 [ 1223.175219][T31886] ext4_fill_super+0xaa33/0xeb30 [ 1223.180138][T31886] ? ext4_mount+0x40/0x40 [ 1223.184441][T31886] ? idr_replace+0x1c4/0x230 [ 1223.189003][T31886] ? snprintf+0xd6/0x120 [ 1223.193241][T31886] ? vscnprintf+0x80/0x80 [ 1223.197543][T31886] ? set_blocksize+0x1a5/0x3a0 [ 1223.202279][T31886] mount_bdev+0x22d/0x340 [ 1223.206583][T31886] ? ext4_mount+0x40/0x40 [ 1223.210886][T31886] legacy_get_tree+0xde/0x170 [ 1223.215539][T31886] ? ext4_lazyinit_thread+0xd40/0xd40 [ 1223.220883][T31886] vfs_get_tree+0x83/0x260 [ 1223.225286][T31886] do_mount+0x19d0/0x2670 [ 1223.229595][T31886] ? copy_mount_string+0x30/0x30 [ 1223.234522][T31886] ? copy_mount_options+0x59/0x300 [ 1223.239606][T31886] ? kmem_cache_alloc_trace+0x139/0x2b0 [ 1223.245125][T31886] ? copy_mount_options+0x273/0x300 [ 1223.250296][T31886] ksys_mount+0xc2/0xf0 [ 1223.254427][T31886] __x64_sys_mount+0xb1/0xc0 [ 1223.258992][T31886] do_syscall_64+0xcb/0x1e0 [ 1223.263470][T31886] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1223.269334][T31886] RIP: 0033:0x7f2bd50b1c5a [ 1223.273724][T31886] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1223.293300][T31886] RSP: 002b:00007f2bd2e27fa8 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 1223.302130][T31886] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007f2bd50b1c5a [ 1223.310422][T31886] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007f2bd2e28000 [ 1223.318366][T31886] RBP: 00007f2bd2e28040 R08: 00007f2bd2e28040 R09: 0000000020000000 [ 1223.326310][T31886] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000020000000 [ 1223.334254][T31886] R13: 0000000020000100 R14: 00007f2bd2e28000 R15: 0000000020013000 [ 1223.344356][T31886] EXT4-fs: failed to create workqueue [ 1223.349913][T31886] EXT4-fs (loop4): mount failed [ 1223.409714][T31897] EXT4-fs (loop3): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? 15:41:15 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000cc0)=ANY=[@ANYBLOB="7800000010000507000000bc4b9ccfc900000000", @ANYRES32, @ANYBLOB="451800000004df00500012800b0001006272696467650000400002800500250000000000060006008bbc00000800010013000000060009000020000005002b000700000005002b00810000000c002200010000000000000008000a00"], 0x78}}, 0x0) 15:41:15 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4f203, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) 15:41:15 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0xffffff81, &(0x7f00000004c0)={&(0x7f0000000cc0)=ANY=[@ANYBLOB="7800000010000507000000bc4b9ccfc900000000", @ANYRES32, @ANYBLOB="4518000000000000500012800b0001006272696467650000400002800500250000600100060006008bbc00000800010013000000060009000020000005002b000700000005002b00810000000c002200010000000000000008000a00"], 0x78}}, 0x0) 15:41:15 executing program 4 (fault-call:0 fault-nth:75): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4f203, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) 15:41:15 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000cc0)=ANY=[@ANYBLOB="7800000010000507000000bc4b9ccfc900000000", @ANYRES32, @ANYBLOB="45180000000000d8500012800b0001006272696467650000400002800500250000000000060006008bbc00000800"], 0x78}}, 0x0) 15:41:15 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4f203, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024", 0x29, 0x7e0}], 0x0, &(0x7f0000013000)) 15:41:15 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4f203, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) 15:41:15 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4f203, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024", 0x29, 0x7e0}], 0x0, &(0x7f0000013000)) 15:41:15 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0xffffff81, &(0x7f00000004c0)={&(0x7f0000000cc0)=ANY=[@ANYBLOB="7800000010000507000000bc4b9ccfc900000000", @ANYRES32, @ANYBLOB="4518000000000000500012800b0001006272696467650000400002800500250000880100060006008bbc00000800010013000000060009000020000005002b000700000005002b00810000000c002200010000000000000008000a00"], 0x78}}, 0x0) [ 1223.501787][T31921] EXT4-fs (loop3): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? [ 1223.512211][T31920] __nla_validate_parse: 16 callbacks suppressed [ 1223.512218][T31920] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.5'. [ 1223.517394][T31922] FAULT_INJECTION: forcing a failure. [ 1223.517394][T31922] name failslab, interval 1, probability 0, space 0, times 0 [ 1223.518455][T31920] netlink: 36 bytes leftover after parsing attributes in process `syz-executor.5'. 15:41:15 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4f203, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) 15:41:15 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4f203, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) 15:41:15 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4f203, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) [ 1223.558321][T31922] CPU: 1 PID: 31922 Comm: syz-executor.4 Tainted: G W 5.4.125-syzkaller-00005-gb8b657d4d5e9 #0 [ 1223.569969][T31922] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1223.580015][T31922] Call Trace: [ 1223.583303][T31922] dump_stack+0x1d8/0x24e [ 1223.587642][T31922] ? devkmsg_release+0x11c/0x11c [ 1223.592578][T31922] ? show_regs_print_info+0x12/0x12 [ 1223.597773][T31922] ? enqueue_entity+0xa8c/0xd10 [ 1223.602622][T31922] should_fail+0x6f6/0x860 [ 1223.607028][T31922] ? setup_fault_attr+0x3d0/0x3d0 [ 1223.612213][T31922] ? iget_locked+0x7b0/0x7b0 [ 1223.616775][T31922] ? ext4_alloc_inode+0x1d/0x620 [ 1223.621730][T31922] should_failslab+0x5/0x20 [ 1223.626205][T31922] kmem_cache_alloc+0x36/0x290 [ 1223.630940][T31922] ? tracing_stop_tgid_record+0x90/0x90 [ 1223.636461][T31922] ? set_qf_name+0x310/0x310 [ 1223.641030][T31922] ext4_alloc_inode+0x1d/0x620 [ 1223.645782][T31922] iget_locked+0x13e/0x7b0 [ 1223.650194][T31922] __ext4_iget+0x321/0x4a50 [ 1223.654679][T31922] ? mutex_unlock+0x19/0x40 [ 1223.659155][T31922] ? ext4_get_projid+0x140/0x140 [ 1223.664065][T31922] ? ext4_fill_super+0xab45/0xeb30 [ 1223.669149][T31922] ext4_fill_super+0xaafa/0xeb30 [ 1223.674062][T31922] ? ext4_mount+0x40/0x40 [ 1223.678358][T31922] ? idr_replace+0x1c4/0x230 [ 1223.682919][T31922] ? snprintf+0xd6/0x120 [ 1223.687146][T31922] ? vscnprintf+0x80/0x80 [ 1223.691447][T31922] ? set_blocksize+0x1a5/0x3a0 [ 1223.696282][T31922] mount_bdev+0x22d/0x340 [ 1223.700584][T31922] ? ext4_mount+0x40/0x40 [ 1223.704909][T31922] legacy_get_tree+0xde/0x170 [ 1223.709570][T31922] ? ext4_lazyinit_thread+0xd40/0xd40 [ 1223.714911][T31922] vfs_get_tree+0x83/0x260 [ 1223.719297][T31922] do_mount+0x19d0/0x2670 [ 1223.723609][T31922] ? copy_mount_string+0x30/0x30 [ 1223.728519][T31922] ? copy_mount_options+0x59/0x300 [ 1223.733603][T31922] ? copy_mount_options+0x59/0x300 [ 1223.738684][T31922] ? kmem_cache_alloc_trace+0x139/0x2b0 [ 1223.744213][T31922] ? copy_mount_options+0x273/0x300 [ 1223.749382][T31922] ksys_mount+0xc2/0xf0 [ 1223.753692][T31922] __x64_sys_mount+0xb1/0xc0 [ 1223.758251][T31922] do_syscall_64+0xcb/0x1e0 [ 1223.762724][T31922] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1223.768585][T31922] RIP: 0033:0x7f2bd50b1c5a [ 1223.772980][T31922] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1223.792566][T31922] RSP: 002b:00007f2bd2e27fa8 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 1223.800948][T31922] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007f2bd50b1c5a [ 1223.809640][T31922] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007f2bd2e28000 [ 1223.817591][T31922] RBP: 00007f2bd2e28040 R08: 00007f2bd2e28040 R09: 0000000020000000 [ 1223.825532][T31922] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000020000000 [ 1223.833478][T31922] R13: 0000000020000100 R14: 00007f2bd2e28000 R15: 0000000020013000 [ 1223.842372][T31922] EXT4-fs (loop4): get root inode failed [ 1223.848021][T31922] EXT4-fs (loop4): mount failed [ 1223.861573][T31936] EXT4-fs (loop3): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? [ 1223.962786][T31936] EXT4-fs (loop3): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? [ 1223.990358][T31920] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.5'. [ 1223.999578][T31920] netlink: 36 bytes leftover after parsing attributes in process `syz-executor.5'. 15:41:15 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000cc0)=ANY=[@ANYBLOB="7800000010000507000000bc4b9ccfc900000000", @ANYRES32, @ANYBLOB="451800000000e200500012800b0001006272696467650000400002800500250000000000060006008bbc00000800010013000000060009000020000005002b000700000005002b00810000000c002200010000000000000008000a00"], 0x78}}, 0x0) 15:41:15 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4f203, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) 15:41:15 executing program 4 (fault-call:0 fault-nth:76): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4f203, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) 15:41:15 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4f203, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024", 0x29, 0x7e0}], 0x0, &(0x7f0000013000)) 15:41:15 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000cc0)=ANY=[@ANYBLOB="7800000010000507000000bc4b9ccfc900000000", @ANYRES32, @ANYBLOB="4518000000000000580012800b0001006272696467650000400002800500250000000000060006008bbc00000800"], 0x78}}, 0x0) 15:41:15 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0xffffff81, &(0x7f00000004c0)={&(0x7f0000000cc0)=ANY=[@ANYBLOB="7800000010000507000000bc4b9ccfc900000000", @ANYRES32, @ANYBLOB="4518000000000000500012800b0001006272696467650000400002800500250000cf0100060006008bbc00000800010013000000060009000020000005002b000700000005002b00810000000c002200010000000000000008000a00"], 0x78}}, 0x0) 15:41:15 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4f203, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) 15:41:15 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4f203, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) [ 1224.067503][T31951] EXT4-fs (loop3): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? [ 1224.083581][T31953] FAULT_INJECTION: forcing a failure. [ 1224.083581][T31953] name failslab, interval 1, probability 0, space 0, times 0 [ 1224.096832][T31953] CPU: 1 PID: 31953 Comm: syz-executor.4 Tainted: G W 5.4.125-syzkaller-00005-gb8b657d4d5e9 #0 15:41:15 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4f203, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) 15:41:15 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4f203, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) 15:41:15 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4f203, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) 15:41:16 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4f203, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d90000000f000000010000ffffffffffff0700000020000000200000200000002cc4645f2cc4645f0100ffff53ef0100010000002cc4645f000000000000000001000000000000000b0000008000000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e3338363633343038350000000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000000000000000000000000000000000000d9ca5cac99fd4329af4dde786c1a5d13010040000c000000000000002cc4645f", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) [ 1224.108455][T31953] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1224.118504][T31953] Call Trace: [ 1224.121799][T31953] dump_stack+0x1d8/0x24e [ 1224.126126][T31953] ? devkmsg_release+0x11c/0x11c [ 1224.131065][T31953] ? show_regs_print_info+0x12/0x12 [ 1224.136261][T31953] should_fail+0x6f6/0x860 [ 1224.140676][T31953] ? setup_fault_attr+0x3d0/0x3d0 [ 1224.145699][T31953] ? security_inode_alloc+0x32/0x1d0 [ 1224.150976][T31953] should_failslab+0x5/0x20 [ 1224.155477][T31953] kmem_cache_alloc+0x36/0x290 [ 1224.160240][T31953] ? from_kuid_munged+0x3b0/0x3b0 [ 1224.165256][T31953] ? ext4_alloc_inode+0x1d/0x620 [ 1224.170190][T31953] security_inode_alloc+0x32/0x1d0 [ 1224.175292][T31953] inode_init_always+0x387/0x810 [ 1224.180254][T31953] ? set_qf_name+0x310/0x310 [ 1224.184815][T31953] iget_locked+0x1d6/0x7b0 [ 1224.189248][T31953] __ext4_iget+0x321/0x4a50 [ 1224.193942][T31953] ? mutex_unlock+0x19/0x40 [ 1224.198432][T31953] ? ext4_get_projid+0x140/0x140 [ 1224.203347][T31953] ? ext4_fill_super+0xab45/0xeb30 [ 1224.208498][T31953] ext4_fill_super+0xaafa/0xeb30 [ 1224.213417][T31953] ? ext4_mount+0x40/0x40 [ 1224.217768][T31953] ? idr_replace+0x1c4/0x230 [ 1224.222332][T31953] ? snprintf+0xd6/0x120 [ 1224.226544][T31953] ? vscnprintf+0x80/0x80 [ 1224.230846][T31953] ? set_blocksize+0x1a5/0x3a0 [ 1224.235583][T31953] mount_bdev+0x22d/0x340 [ 1224.239885][T31953] ? ext4_mount+0x40/0x40 [ 1224.244183][T31953] legacy_get_tree+0xde/0x170 [ 1224.248829][T31953] ? ext4_lazyinit_thread+0xd40/0xd40 [ 1224.254170][T31953] vfs_get_tree+0x83/0x260 [ 1224.258558][T31953] do_mount+0x19d0/0x2670 [ 1224.262863][T31953] ? copy_mount_string+0x30/0x30 [ 1224.267784][T31953] ? copy_mount_options+0x1d8/0x300 [ 1224.272957][T31953] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x90 [ 1224.279166][T31953] ? copy_mount_options+0x273/0x300 [ 1224.284340][T31953] ksys_mount+0xc2/0xf0 [ 1224.288474][T31953] __x64_sys_mount+0xb1/0xc0 [ 1224.293043][T31953] do_syscall_64+0xcb/0x1e0 [ 1224.297529][T31953] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1224.303398][T31953] RIP: 0033:0x7f2bd50b1c5a [ 1224.307798][T31953] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1224.327371][T31953] RSP: 002b:00007f2bd2e27fa8 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 1224.335764][T31953] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007f2bd50b1c5a [ 1224.343719][T31953] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007f2bd2e28000 [ 1224.351661][T31953] RBP: 00007f2bd2e28040 R08: 00007f2bd2e28040 R09: 0000000020000000 [ 1224.359616][T31953] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000020000000 [ 1224.367557][T31953] R13: 0000000020000100 R14: 00007f2bd2e28000 R15: 0000000020013000 [ 1224.376608][T31953] EXT4-fs (loop4): get root inode failed [ 1224.382753][T31953] EXT4-fs (loop4): mount failed [ 1224.402977][T31951] EXT4-fs (loop3): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? [ 1224.464948][T31960] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.5'. [ 1224.474312][T31960] netlink: 36 bytes leftover after parsing attributes in process `syz-executor.5'. 15:41:16 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000cc0)=ANY=[@ANYBLOB="7800000010000507000000bc4b9ccfc900000000", @ANYRES32, @ANYBLOB="4518007c7728e500500012800b0001006272696467650000400002800500250000000000060006008bbc00000800010013000000060009000020000005002b000700000005002b00810000000c002200010000000000000008000a00"], 0x78}}, 0x0) 15:41:16 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4f203, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) 15:41:16 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0xffffff81, &(0x7f00000004c0)={&(0x7f0000000cc0)=ANY=[@ANYBLOB="7800000010000507000000bc4b9ccfc900000000", @ANYRES32, @ANYBLOB="4518000000000000500012800b00010062726964676500004000028005002500006e0200060006008bbc00000800010013000000060009000020000005002b000700000005002b00810000000c002200010000000000000008000a00"], 0x78}}, 0x0) 15:41:16 executing program 4 (fault-call:0 fault-nth:77): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4f203, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) 15:41:16 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4f203, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024", 0x29, 0x7e0}], 0x0, &(0x7f0000013000)) 15:41:16 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000cc0)=ANY=[@ANYBLOB="7800000010000507000000bc4b9ccfc900000000", @ANYRES32, @ANYBLOB="4518000000000000040012800b0001006272696467650000400002800500250000000000060006008bbc00000800"], 0x78}}, 0x0) 15:41:16 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4f203, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) 15:41:16 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4f203, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) [ 1224.608391][T31987] FAULT_INJECTION: forcing a failure. [ 1224.608391][T31987] name failslab, interval 1, probability 0, space 0, times 0 [ 1224.610344][T31986] EXT4-fs (loop3): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? [ 1224.630416][T31987] CPU: 1 PID: 31987 Comm: syz-executor.4 Tainted: G W 5.4.125-syzkaller-00005-gb8b657d4d5e9 #0 [ 1224.642873][T31987] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1224.652920][T31987] Call Trace: [ 1224.656204][T31987] dump_stack+0x1d8/0x24e [ 1224.660513][T31987] ? devkmsg_release+0x11c/0x11c [ 1224.665426][T31987] ? show_regs_print_info+0x12/0x12 [ 1224.670598][T31987] ? enqueue_entity+0xa8c/0xd10 [ 1224.675422][T31987] should_fail+0x6f6/0x860 [ 1224.679815][T31987] ? setup_fault_attr+0x3d0/0x3d0 [ 1224.684825][T31987] ? iget_locked+0x7b0/0x7b0 [ 1224.689388][T31987] ? ext4_alloc_inode+0x1d/0x620 [ 1224.694298][T31987] should_failslab+0x5/0x20 [ 1224.698799][T31987] kmem_cache_alloc+0x36/0x290 [ 1224.703538][T31987] ? tracing_stop_tgid_record+0x90/0x90 [ 1224.709055][T31987] ? set_qf_name+0x310/0x310 [ 1224.713616][T31987] ext4_alloc_inode+0x1d/0x620 [ 1224.718358][T31987] iget_locked+0x13e/0x7b0 [ 1224.722759][T31987] __ext4_iget+0x321/0x4a50 [ 1224.727237][T31987] ? mutex_unlock+0x19/0x40 [ 1224.731715][T31987] ? ext4_get_projid+0x140/0x140 [ 1224.736637][T31987] ? ext4_fill_super+0xab45/0xeb30 [ 1224.741724][T31987] ext4_fill_super+0xaafa/0xeb30 [ 1224.746641][T31987] ? ext4_mount+0x40/0x40 [ 1224.750940][T31987] ? idr_replace+0x1c4/0x230 [ 1224.755589][T31987] ? snprintf+0xd6/0x120 [ 1224.759808][T31987] ? vscnprintf+0x80/0x80 [ 1224.764113][T31987] ? set_blocksize+0x1a5/0x3a0 [ 1224.768864][T31987] mount_bdev+0x22d/0x340 [ 1224.773167][T31987] ? ext4_mount+0x40/0x40 [ 1224.777469][T31987] legacy_get_tree+0xde/0x170 [ 1224.782128][T31987] ? ext4_lazyinit_thread+0xd40/0xd40 [ 1224.787472][T31987] vfs_get_tree+0x83/0x260 [ 1224.791872][T31987] do_mount+0x19d0/0x2670 [ 1224.796188][T31987] ? copy_mount_string+0x30/0x30 [ 1224.801097][T31987] ? copy_mount_options+0x59/0x300 [ 1224.806180][T31987] ? copy_mount_options+0x59/0x300 [ 1224.811264][T31987] ? kmem_cache_alloc_trace+0x139/0x2b0 [ 1224.816780][T31987] ? copy_mount_options+0x273/0x300 [ 1224.822039][T31987] ksys_mount+0xc2/0xf0 [ 1224.826168][T31987] __x64_sys_mount+0xb1/0xc0 [ 1224.830743][T31987] do_syscall_64+0xcb/0x1e0 [ 1224.835221][T31987] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1224.841087][T31987] RIP: 0033:0x7f2bd50b1c5a [ 1224.845492][T31987] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1224.865067][T31987] RSP: 002b:00007f2bd2e27fa8 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 1224.873452][T31987] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007f2bd50b1c5a [ 1224.881396][T31987] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007f2bd2e28000 [ 1224.889340][T31987] RBP: 00007f2bd2e28040 R08: 00007f2bd2e28040 R09: 0000000020000000 [ 1224.897291][T31987] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000020000000 15:41:16 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4f203, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c060000d90000000f0000000100000000000000000000000020000000200000200000002cc4645f2cc4645f0100ffff53ef0100010000002cc4645f000000000000000001000000000000000b0000008000000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e3338363633343038350000000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000000000000000000000000000000000000d9ca5cac99fd4329af4dde786c1a5d13010040000c000000000000002cc4645f", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024", 0x29, 0x7e0}], 0x0, &(0x7f0000013000)) 15:41:16 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0xffffff81, &(0x7f00000004c0)={&(0x7f0000000cc0)=ANY=[@ANYBLOB="7800000010000507000000bc4b9ccfc900000000", @ANYRES32, @ANYBLOB="4518000000000000500012800b0001006272696467650000400002800500250000700200060006008bbc00000800010013000000060009000020000005002b000700000005002b00810000000c002200010000000000000008000a00"], 0x78}}, 0x0) [ 1224.905249][T31987] R13: 0000000020000100 R14: 00007f2bd2e28000 R15: 0000000020013000 15:41:16 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4f203, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) 15:41:16 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4f203, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d90000000f0000000100000000000000000003000020000000200000200000002cc4645f2cc4645f0100ffff53ef0100010000002cc4645f000000000000000001000000000000000b0000008000000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e3338363633343038350000000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000000000000000000000000000000000000d9ca5cac99fd4329af4dde786c1a5d13010040000c000000000000002cc4645f", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) [ 1224.934148][T31987] EXT4-fs (loop4): get root inode failed [ 1224.939914][T31987] EXT4-fs (loop4): mount failed 15:41:16 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4f203, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) 15:41:16 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000cc0)=ANY=[@ANYBLOB="7800000010000507000000bc4b9ccfc900000000", @ANYRES32, @ANYBLOB="4518000000000000080012800b0001006272696467650000400002800500250000000000060006008bbc00000800"], 0x78}}, 0x0) 15:41:16 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000cc0)=ANY=[@ANYBLOB="7800000010000507000000bc4b9ccfc900000000", @ANYRES32, @ANYBLOB="451800ffffffea00500012800b0001006272696467650000400002800500250000000000060006008bbc00000800010013000000060009000020000005002b000700000005002b00810000000c002200010000000000000008000a00"], 0x78}}, 0x0) 15:41:16 executing program 4 (fault-call:0 fault-nth:78): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4f203, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) 15:41:16 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0xffffff81, &(0x7f00000004c0)={&(0x7f0000000cc0)=ANY=[@ANYBLOB="7800000010000507000000bc4b9ccfc900000000", @ANYRES32, @ANYBLOB="4518000000000000500012800b00010062726964676500004000028005002500008a0200060006008bbc00000800010013000000060009000020000005002b000700000005002b00810000000c002200010000000000000008000a00"], 0x78}}, 0x0) 15:41:16 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4f203, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d90000000f0000000100000000000000000004000020000000200000200000002cc4645f2cc4645f0100ffff53ef0100010000002cc4645f000000000000000001000000000000000b0000008000000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e3338363633343038350000000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000000000000000000000000000000000000d9ca5cac99fd4329af4dde786c1a5d13010040000c000000000000002cc4645f", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) [ 1225.003085][T32005] EXT4-fs (loop3): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? [ 1225.037633][T32016] netlink: 80 bytes leftover after parsing attributes in process `syz-executor.5'. 15:41:16 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000cc0)=ANY=[@ANYBLOB="7800000010000507000000bc4b9ccfc900000000", @ANYRES32, @ANYBLOB="4518000000000000580012800b0001006272696467650000400002800500250000000000060006008bbc00000800"], 0x78}}, 0x0) 15:41:16 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4f203, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d90000000f0000000100000000000000000005000020000000200000200000002cc4645f2cc4645f0100ffff53ef0100010000002cc4645f000000000000000001000000000000000b0000008000000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e3338363633343038350000000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000000000000000000000000000000000000d9ca5cac99fd4329af4dde786c1a5d13010040000c000000000000002cc4645f", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) [ 1225.050447][T32016] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.5'. [ 1225.080220][T32005] EXT4-fs (loop3): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? [ 1225.106014][T32014] FAULT_INJECTION: forcing a failure. [ 1225.106014][T32014] name failslab, interval 1, probability 0, space 0, times 0 [ 1225.118863][T32014] CPU: 1 PID: 32014 Comm: syz-executor.4 Tainted: G W 5.4.125-syzkaller-00005-gb8b657d4d5e9 #0 [ 1225.130466][T32014] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1225.140502][T32014] Call Trace: [ 1225.143780][T32014] dump_stack+0x1d8/0x24e [ 1225.148103][T32014] ? devkmsg_release+0x11c/0x11c [ 1225.153015][T32014] ? show_regs_print_info+0x12/0x12 [ 1225.158188][T32014] ? update_io_ticks+0x1c5/0x1e0 [ 1225.163100][T32014] ? blk_account_io_start+0x436/0x4f0 [ 1225.168445][T32014] should_fail+0x6f6/0x860 [ 1225.172838][T32014] ? setup_fault_attr+0x3d0/0x3d0 [ 1225.177837][T32014] ? mempool_alloc_slab+0x16/0x20 [ 1225.182831][T32014] should_failslab+0x5/0x20 [ 1225.187394][T32014] kmem_cache_alloc+0x36/0x290 [ 1225.192129][T32014] ? mempool_free+0x380/0x380 [ 1225.196779][T32014] mempool_alloc_slab+0x16/0x20 [ 1225.201602][T32014] mempool_alloc+0x113/0x680 [ 1225.206166][T32014] ? blk_mq_requeue_work+0x9c0/0x9c0 [ 1225.211424][T32014] ? mempool_resize+0x900/0x900 [ 1225.216340][T32014] ? debug_smp_processor_id+0x20/0x20 [ 1225.221726][T32014] ? blk_attempt_plug_merge+0x310/0x310 [ 1225.227254][T32014] ? fscrypt_set_bio_crypt_ctx+0x179/0x4e0 [ 1225.233038][T32014] bio_alloc_bioset+0x1db/0x640 [ 1225.237868][T32014] ? bio_chain_endio+0x110/0x110 [ 1225.242782][T32014] ? write_boundary_block+0x150/0x150 [ 1225.248129][T32014] submit_bh_wbc+0x1ba/0x790 [ 1225.252700][T32014] ll_rw_block+0x1cb/0x230 [ 1225.257093][T32014] __breadahead_gfp+0xc9/0x190 [ 1225.261839][T32014] ? __getblk_gfp+0x654/0x750 [ 1225.266491][T32014] ? __breadahead+0x170/0x170 [ 1225.271232][T32014] __ext4_get_inode_loc+0xbf6/0x1030 [ 1225.276493][T32014] ? ext4_get_inode_loc+0x60/0x60 [ 1225.281490][T32014] ? memset+0x1f/0x40 [ 1225.285446][T32014] ? _raw_spin_unlock+0x49/0x60 [ 1225.290268][T32014] ? iget_locked+0x6b3/0x7b0 [ 1225.294832][T32014] __ext4_iget+0x3d1/0x4a50 [ 1225.299312][T32014] ? mutex_unlock+0x19/0x40 [ 1225.303793][T32014] ? ext4_get_projid+0x140/0x140 [ 1225.308707][T32014] ? ext4_fill_super+0xab45/0xeb30 [ 1225.313796][T32014] ext4_fill_super+0xaafa/0xeb30 [ 1225.318718][T32014] ? ext4_mount+0x40/0x40 [ 1225.323034][T32014] ? idr_replace+0x1c4/0x230 [ 1225.327598][T32014] ? snprintf+0xd6/0x120 [ 1225.331816][T32014] ? vscnprintf+0x80/0x80 [ 1225.336134][T32014] ? set_blocksize+0x1a5/0x3a0 [ 1225.340875][T32014] mount_bdev+0x22d/0x340 [ 1225.345192][T32014] ? ext4_mount+0x40/0x40 [ 1225.349496][T32014] legacy_get_tree+0xde/0x170 [ 1225.354152][T32014] ? ext4_lazyinit_thread+0xd40/0xd40 [ 1225.359500][T32014] vfs_get_tree+0x83/0x260 [ 1225.363890][T32014] do_mount+0x19d0/0x2670 [ 1225.368196][T32014] ? copy_mount_string+0x30/0x30 [ 1225.373106][T32014] ? copy_mount_options+0x59/0x300 [ 1225.378192][T32014] ? copy_mount_options+0x59/0x300 [ 1225.383279][T32014] ? kmem_cache_alloc_trace+0x139/0x2b0 [ 1225.388796][T32014] ? copy_mount_options+0x273/0x300 [ 1225.393967][T32014] ksys_mount+0xc2/0xf0 [ 1225.398098][T32014] __x64_sys_mount+0xb1/0xc0 [ 1225.402663][T32014] do_syscall_64+0xcb/0x1e0 [ 1225.407142][T32014] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1225.413008][T32014] RIP: 0033:0x7f2bd50b1c5a [ 1225.417402][T32014] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1225.436990][T32014] RSP: 002b:00007f2bd2e27fa8 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 1225.445383][T32014] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007f2bd50b1c5a [ 1225.453339][T32014] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007f2bd2e28000 [ 1225.461283][T32014] RBP: 00007f2bd2e28040 R08: 00007f2bd2e28040 R09: 0000000020000000 [ 1225.469230][T32014] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000020000000 [ 1225.477178][T32014] R13: 0000000020000100 R14: 00007f2bd2e28000 R15: 0000000020013000 [ 1225.489972][T32027] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.5'. [ 1225.490276][T32014] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue 15:41:17 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4f203, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024", 0x29, 0x7e0}], 0x0, &(0x7f0000013000)) 15:41:17 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0xffffff81, &(0x7f00000004c0)={&(0x7f0000000cc0)=ANY=[@ANYBLOB="7800000010000507000000bc4b9ccfc900000000", @ANYRES32, @ANYBLOB="4518000000000000500012800b0001006272696467650000400002800500250000a20200060006008bbc00000800010013000000060009000020000005002b000700000005002b00810000000c002200010000000000000008000a00"], 0x78}}, 0x0) 15:41:17 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4f203, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) [ 1225.505780][T32027] netlink: 36 bytes leftover after parsing attributes in process `syz-executor.5'. [ 1225.508190][T32014] ext4 filesystem being mounted at /root/syzkaller-testdir028365481/syzkaller.u34vxW/1352/file0 supports timestamps until 2038 (0x7fffffff) 15:41:17 executing program 4 (fault-call:0 fault-nth:79): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4f203, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) 15:41:17 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000cc0)=ANY=[@ANYBLOB="7800000010000507000000bc4b9ccfc900000000", @ANYRES32, @ANYBLOB="451800ffffffef00500012800b0001006272696467650000400002800500250000000000060006008bbc00000800010013000000060009000020000005002b000700000005002b00810000000c002200010000000000000008000a00"], 0x78}}, 0x0) 15:41:17 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4f203, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) 15:41:17 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000cc0)=ANY=[@ANYBLOB="7800000010000507000000bc4b9ccfc900000000", @ANYRES32, @ANYBLOB="4518000000000000500212800b0001006272696467650000400002800500250000000000060006008bbc00000800"], 0x78}}, 0x0) 15:41:17 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4f203, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) 15:41:17 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0xffffff81, &(0x7f00000004c0)={&(0x7f0000000cc0)=ANY=[@ANYBLOB="7800000010000507000000bc4b9ccfc900000000", @ANYRES32, @ANYBLOB="4518000000000000500012800b0001006272696467650000400002800500250000ae0200060006008bbc00000800010013000000060009000020000005002b000700000005002b00810000000c002200010000000000000008000a00"], 0x78}}, 0x0) [ 1225.554831][T32033] EXT4-fs (loop3): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? 15:41:17 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4f203, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) 15:41:17 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4f203, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) 15:41:17 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4f203, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c080000d90000000f0000000100000000000000000000000020000000200000200000002cc4645f2cc4645f0100ffff53ef0100010000002cc4645f000000000000000001000000000000000b0000008000000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e3338363633343038350000000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000000000000000000000000000000000000d9ca5cac99fd4329af4dde786c1a5d13010040000c000000000000002cc4645f", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024", 0x29, 0x7e0}], 0x0, &(0x7f0000013000)) 15:41:17 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000cc0)=ANY=[@ANYBLOB="7800000010000507000000bc4b9ccfc900000000", @ANYRES32, @ANYBLOB="4518000000000000500312800b0001006272696467650000400002800500250000000000060006008bbc00000800"], 0x78}}, 0x0) [ 1225.630207][T32033] EXT4-fs (loop3): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? [ 1225.647917][T32042] FAULT_INJECTION: forcing a failure. [ 1225.647917][T32042] name failslab, interval 1, probability 0, space 0, times 0 [ 1225.663695][T32042] CPU: 1 PID: 32042 Comm: syz-executor.4 Tainted: G W 5.4.125-syzkaller-00005-gb8b657d4d5e9 #0 15:41:17 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4f203, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) 15:41:17 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4f203, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) [ 1225.675322][T32042] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1225.685365][T32042] Call Trace: [ 1225.688654][T32042] dump_stack+0x1d8/0x24e [ 1225.692979][T32042] ? devkmsg_release+0x11c/0x11c [ 1225.697916][T32042] ? stack_trace_save+0x1f0/0x1f0 [ 1225.702941][T32042] ? show_regs_print_info+0x12/0x12 [ 1225.708135][T32042] ? __kernel_text_address+0x93/0x100 [ 1225.713501][T32042] ? unwind_get_return_address+0x48/0x80 [ 1225.719116][T32042] ? arch_stack_walk+0xf8/0x140 [ 1225.723937][T32042] should_fail+0x6f6/0x860 [ 1225.728322][T32042] ? setup_fault_attr+0x3d0/0x3d0 [ 1225.733316][T32042] ? stack_trace_save+0x120/0x1f0 [ 1225.738307][T32042] ? mempool_alloc_slab+0x16/0x20 [ 1225.743302][T32042] should_failslab+0x5/0x20 [ 1225.747773][T32042] kmem_cache_alloc+0x36/0x290 [ 1225.752507][T32042] ? mempool_free+0x380/0x380 [ 1225.757149][T32042] mempool_alloc_slab+0x16/0x20 [ 1225.761966][T32042] mempool_alloc+0x113/0x680 [ 1225.766526][T32042] ? mempool_resize+0x900/0x900 [ 1225.771346][T32042] ? debug_smp_processor_id+0x20/0x20 [ 1225.776684][T32042] bio_alloc_bioset+0x1db/0x640 [ 1225.781504][T32042] ? bio_chain_endio+0x110/0x110 [ 1225.786410][T32042] ? write_boundary_block+0x150/0x150 [ 1225.791758][T32042] ? check_preemption_disabled+0x9e/0x330 [ 1225.797452][T32042] submit_bh_wbc+0x1ba/0x790 [ 1225.802015][T32042] ? write_boundary_block+0x150/0x150 [ 1225.807361][T32042] ll_rw_block+0x1cb/0x230 [ 1225.811755][T32042] __breadahead_gfp+0xc9/0x190 [ 1225.816582][T32042] ? __getblk_gfp+0x654/0x750 [ 1225.821241][T32042] ? __breadahead+0x170/0x170 [ 1225.825899][T32042] __ext4_get_inode_loc+0xbf6/0x1030 [ 1225.831157][T32042] ? ext4_get_inode_loc+0x60/0x60 [ 1225.836155][T32042] ? memset+0x1f/0x40 [ 1225.840106][T32042] ? _raw_spin_unlock+0x49/0x60 [ 1225.844936][T32042] ? iget_locked+0x6b3/0x7b0 [ 1225.849495][T32042] __ext4_iget+0x3d1/0x4a50 [ 1225.854067][T32042] ? mutex_unlock+0x19/0x40 [ 1225.858540][T32042] ? ext4_get_projid+0x140/0x140 [ 1225.863445][T32042] ? ext4_fill_super+0xab45/0xeb30 [ 1225.868544][T32042] ext4_fill_super+0xaafa/0xeb30 [ 1225.873458][T32042] ? ext4_mount+0x40/0x40 [ 1225.877755][T32042] ? idr_replace+0x1c4/0x230 [ 1225.882313][T32042] ? snprintf+0xd6/0x120 [ 1225.886535][T32042] ? vscnprintf+0x80/0x80 [ 1225.890836][T32042] ? set_blocksize+0x1a5/0x3a0 [ 1225.895583][T32042] mount_bdev+0x22d/0x340 [ 1225.899914][T32042] ? ext4_mount+0x40/0x40 [ 1225.904298][T32042] legacy_get_tree+0xde/0x170 [ 1225.908942][T32042] ? ext4_lazyinit_thread+0xd40/0xd40 [ 1225.914291][T32042] vfs_get_tree+0x83/0x260 [ 1225.918673][T32042] do_mount+0x19d0/0x2670 [ 1225.922984][T32042] ? copy_mount_string+0x30/0x30 [ 1225.927895][T32042] ? copy_mount_options+0x59/0x300 [ 1225.932986][T32042] ? copy_mount_options+0x59/0x300 [ 1225.938114][T32042] ? kmem_cache_alloc_trace+0x139/0x2b0 [ 1225.943636][T32042] ? copy_mount_options+0x273/0x300 [ 1225.948811][T32042] ksys_mount+0xc2/0xf0 [ 1225.952980][T32042] __x64_sys_mount+0xb1/0xc0 [ 1225.957587][T32042] do_syscall_64+0xcb/0x1e0 [ 1225.962064][T32042] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1225.967927][T32042] RIP: 0033:0x7f2bd50b1c5a [ 1225.972311][T32042] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1225.992023][T32042] RSP: 002b:00007f2bd2e27fa8 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 1226.000466][T32042] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007f2bd50b1c5a [ 1226.008408][T32042] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007f2bd2e28000 [ 1226.016349][T32042] RBP: 00007f2bd2e28040 R08: 00007f2bd2e28040 R09: 0000000020000000 [ 1226.024288][T32042] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000020000000 [ 1226.032227][T32042] R13: 0000000020000100 R14: 00007f2bd2e28000 R15: 0000000020013000 [ 1226.044217][T32042] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue [ 1226.056032][T32042] ext4 filesystem being mounted at /root/syzkaller-testdir028365481/syzkaller.u34vxW/1353/file0 supports timestamps until 2038 (0x7fffffff) 15:41:17 executing program 4 (fault-call:0 fault-nth:80): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4f203, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d90000000f0000000100000000000000000000000020000000200000200000002cc4645f2cc4645f0100ffff53ef0100010000002cc4645f000000000000000001000000000000000b0000008000000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e3338363633343038350000000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000000000000000000000000000000000000d9ca5cac99fd4329af4dde786c1a5d13010040000c000000000000002cc4645f", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) 15:41:17 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000cc0)=ANY=[@ANYBLOB="7800000010000507000000bc4b9ccfc900000000", @ANYRES32, @ANYBLOB="451800fffffff000500012800b0001006272696467650000400002800500250000000000060006008bbc00000800010013000000060009000020000005002b000700000005002b00810000000c002200010000000000000008000a00"], 0x78}}, 0x0) 15:41:17 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4f203, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) 15:41:17 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0xffffff81, &(0x7f00000004c0)={&(0x7f0000000cc0)=ANY=[@ANYBLOB="7800000010000507000000bc4b9ccfc900000000", @ANYRES32, @ANYBLOB="4518000000000000500012800b0001006272696467650000400002800500250000000300060006008bbc00000800010013000000060009000020000005002b000700000005002b00810000000c002200010000000000000008000a00"], 0x78}}, 0x0) 15:41:17 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000cc0)=ANY=[@ANYBLOB="7800000010000507000000bc4b9ccfc900000000", @ANYRES32, @ANYBLOB="4518000000000000500412800b0001006272696467650000400002800500250000000000060006008bbc00000800"], 0x78}}, 0x0) 15:41:17 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4f203, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c090000d90000000f0000000100000000000000000000000020000000200000200000002cc4645f2cc4645f0100ffff53ef0100010000002cc4645f000000000000000001000000000000000b0000008000000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e3338363633343038350000000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000000000000000000000000000000000000d9ca5cac99fd4329af4dde786c1a5d13010040000c000000000000002cc4645f", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024", 0x29, 0x7e0}], 0x0, &(0x7f0000013000)) 15:41:17 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4f203, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) 15:41:17 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4f203, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) [ 1226.083611][T32063] EXT4-fs (loop3): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? 15:41:18 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000cc0)=ANY=[@ANYBLOB="7800000010000507000000bc4b9ccfc900000000", @ANYRES32, @ANYBLOB="4518000000000000500512800b0001006272696467650000400002800500250000000000060006008bbc00000800"], 0x78}}, 0x0) 15:41:18 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4f203, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) 15:41:18 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0xffffff81, &(0x7f00000004c0)={&(0x7f0000000cc0)=ANY=[@ANYBLOB="7800000010000507000000bc4b9ccfc900000000", @ANYRES32, @ANYBLOB="4518000000000000500012800b0001006272696467650000400002800500250000040300060006008bbc00000800010013000000060009000020000005002b000700000005002b00810000000c002200010000000000000008000a00"], 0x78}}, 0x0) 15:41:18 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4f203, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) [ 1226.174190][T32078] EXT4-fs (loop3): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? [ 1226.194636][T32079] FAULT_INJECTION: forcing a failure. [ 1226.194636][T32079] name failslab, interval 1, probability 0, space 0, times 0 [ 1226.209088][T32079] CPU: 0 PID: 32079 Comm: syz-executor.4 Tainted: G W 5.4.125-syzkaller-00005-gb8b657d4d5e9 #0 [ 1226.220751][T32079] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1226.230889][T32079] Call Trace: [ 1226.234179][T32079] dump_stack+0x1d8/0x24e [ 1226.238498][T32079] ? devkmsg_release+0x11c/0x11c [ 1226.243416][T32079] ? show_regs_print_info+0x12/0x12 [ 1226.248592][T32079] ? blk_mq_requeue_work+0x9c0/0x9c0 [ 1226.253860][T32079] should_fail+0x6f6/0x860 [ 1226.258273][T32079] ? setup_fault_attr+0x3d0/0x3d0 [ 1226.263328][T32079] ? mempool_alloc_slab+0x16/0x20 [ 1226.268326][T32079] should_failslab+0x5/0x20 [ 1226.272801][T32079] kmem_cache_alloc+0x36/0x290 [ 1226.277579][T32079] ? generic_make_request+0xcf5/0xda0 [ 1226.282924][T32079] ? mempool_free+0x380/0x380 [ 1226.287572][T32079] mempool_alloc_slab+0x16/0x20 [ 1226.292399][T32079] mempool_alloc+0x113/0x680 [ 1226.296961][T32079] ? fscrypt_set_bio_crypt_ctx+0x179/0x4e0 [ 1226.302735][T32079] ? mempool_resize+0x900/0x900 [ 1226.307556][T32079] ? submit_bio+0x146/0x5d0 [ 1226.312028][T32079] ? bio_add_page+0x2e9/0x470 [ 1226.316687][T32079] bio_alloc_bioset+0x1db/0x640 [ 1226.321508][T32079] ? bio_chain_endio+0x110/0x110 [ 1226.326418][T32079] ? ll_rw_block+0x211/0x230 [ 1226.330977][T32079] submit_bh_wbc+0x1ba/0x790 [ 1226.335548][T32079] submit_bh+0x21/0x30 [ 1226.339600][T32079] __ext4_get_inode_loc+0xc66/0x1030 [ 1226.344947][T32079] ? ext4_get_inode_loc+0x60/0x60 [ 1226.349938][T32079] ? memset+0x1f/0x40 [ 1226.353889][T32079] ? _raw_spin_unlock+0x49/0x60 [ 1226.358709][T32079] ? iget_locked+0x6b3/0x7b0 [ 1226.363270][T32079] __ext4_iget+0x3d1/0x4a50 [ 1226.367752][T32079] ? mutex_unlock+0x19/0x40 [ 1226.372228][T32079] ? ext4_get_projid+0x140/0x140 [ 1226.377141][T32079] ? ext4_fill_super+0xab45/0xeb30 [ 1226.382235][T32079] ext4_fill_super+0xaafa/0xeb30 [ 1226.387582][T32079] ? ext4_mount+0x40/0x40 [ 1226.391879][T32079] ? idr_replace+0x1c4/0x230 [ 1226.396456][T32079] ? snprintf+0xd6/0x120 [ 1226.400665][T32079] ? vscnprintf+0x80/0x80 [ 1226.404962][T32079] ? set_blocksize+0x1a5/0x3a0 [ 1226.409693][T32079] mount_bdev+0x22d/0x340 [ 1226.413995][T32079] ? ext4_mount+0x40/0x40 [ 1226.418294][T32079] legacy_get_tree+0xde/0x170 [ 1226.422940][T32079] ? ext4_lazyinit_thread+0xd40/0xd40 [ 1226.428299][T32079] vfs_get_tree+0x83/0x260 [ 1226.432773][T32079] do_mount+0x19d0/0x2670 [ 1226.437071][T32079] ? copy_mount_string+0x30/0x30 [ 1226.442007][T32079] ? copy_mount_options+0x59/0x300 [ 1226.447111][T32079] ? kmem_cache_alloc_trace+0x139/0x2b0 [ 1226.452624][T32079] ? copy_mount_options+0x273/0x300 [ 1226.457811][T32079] ksys_mount+0xc2/0xf0 [ 1226.461937][T32079] __x64_sys_mount+0xb1/0xc0 [ 1226.466498][T32079] do_syscall_64+0xcb/0x1e0 [ 1226.470972][T32079] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1226.476834][T32079] RIP: 0033:0x7f2bd50b1c5a [ 1226.481220][T32079] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1226.500808][T32079] RSP: 002b:00007f2bd2e27fa8 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 1226.509191][T32079] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007f2bd50b1c5a [ 1226.517148][T32079] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007f2bd2e28000 [ 1226.525094][T32079] RBP: 00007f2bd2e28040 R08: 00007f2bd2e28040 R09: 0000000020000000 [ 1226.533043][T32079] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000020000000 [ 1226.540995][T32079] R13: 0000000020000100 R14: 00007f2bd2e28000 R15: 0000000020013000 [ 1226.550832][T32079] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue [ 1226.559796][T32079] ext4 filesystem being mounted at /root/syzkaller-testdir028365481/syzkaller.u34vxW/1354/file0 supports timestamps until 2038 (0x7fffffff) 15:41:18 executing program 4 (fault-call:0 fault-nth:81): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4f203, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) [ 1226.580907][T32078] EXT4-fs (loop3): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? 15:41:18 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000cc0)=ANY=[@ANYBLOB="7800000010000507000000bc4b9ccfc900000000", @ANYRES32, @ANYBLOB="451800000001f800500012800b0001006272696467650000400002800500250000000000060006008bbc00000800010013000000060009000020000005002b000700000005002b00810000000c002200010000000000000008000a00"], 0x78}}, 0x0) 15:41:18 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000cc0)=ANY=[@ANYBLOB="7800000010000507000000bc4b9ccfc900000000", @ANYRES32, @ANYBLOB="4518000000000000500612800b0001006272696467650000400002800500250000000000060006008bbc00000800"], 0x78}}, 0x0) 15:41:18 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4f203, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) 15:41:18 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0xffffff81, &(0x7f00000004c0)={&(0x7f0000000cc0)=ANY=[@ANYBLOB="7800000010000507000000bc4b9ccfc900000000", @ANYRES32, @ANYBLOB="4518000000000000500012800b0001006272696467650000400002800500250000be0300060006008bbc00000800010013000000060009000020000005002b000700000005002b00810000000c002200010000000000000008000a00"], 0x78}}, 0x0) 15:41:18 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4f203, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024", 0x29, 0x7e0}], 0x0, &(0x7f0000013000)) 15:41:18 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4f203, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) 15:41:18 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000cc0)=ANY=[@ANYBLOB="7800000010000507000000bc4b9ccfc900000000", @ANYRES32, @ANYBLOB="4518000000000000500712800b0001006272696467650000400002800500250000000000060006008bbc00000800"], 0x78}}, 0x0) 15:41:18 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4f203, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) [ 1226.757056][T32094] FAULT_INJECTION: forcing a failure. [ 1226.757056][T32094] name failslab, interval 1, probability 0, space 0, times 0 [ 1226.778819][T32094] CPU: 0 PID: 32094 Comm: syz-executor.4 Tainted: G W 5.4.125-syzkaller-00005-gb8b657d4d5e9 #0 [ 1226.790458][T32094] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 15:41:18 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4f203, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) 15:41:18 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4f203, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) [ 1226.794819][T32108] EXT4-fs (loop3): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? [ 1226.800499][T32094] Call Trace: [ 1226.800517][T32094] dump_stack+0x1d8/0x24e [ 1226.800527][T32094] ? devkmsg_release+0x11c/0x11c [ 1226.800537][T32094] ? show_regs_print_info+0x12/0x12 [ 1226.800545][T32094] ? __ext4_iget+0x3086/0x4a50 [ 1226.800561][T32094] should_fail+0x6f6/0x860 [ 1226.837616][T32094] ? setup_fault_attr+0x3d0/0x3d0 [ 1226.842641][T32094] ? __d_alloc+0x2a/0x6a0 [ 1226.846964][T32094] should_failslab+0x5/0x20 [ 1226.851497][T32094] kmem_cache_alloc+0x36/0x290 15:41:18 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4f203, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) [ 1226.856255][T32094] ? ext4_fill_super+0xab45/0xeb30 [ 1226.861360][T32094] __d_alloc+0x2a/0x6a0 [ 1226.865510][T32094] d_make_root+0x46/0xd0 [ 1226.869749][T32094] ext4_fill_super+0xac1a/0xeb30 [ 1226.874675][T32094] ? ext4_mount+0x40/0x40 [ 1226.878976][T32094] ? idr_replace+0x1c4/0x230 [ 1226.883545][T32094] ? snprintf+0xd6/0x120 [ 1226.887757][T32094] ? vscnprintf+0x80/0x80 [ 1226.892067][T32094] ? set_blocksize+0x1a5/0x3a0 [ 1226.896806][T32094] mount_bdev+0x22d/0x340 [ 1226.901106][T32094] ? ext4_mount+0x40/0x40 [ 1226.905405][T32094] legacy_get_tree+0xde/0x170 [ 1226.910056][T32094] ? ext4_lazyinit_thread+0xd40/0xd40 [ 1226.915422][T32094] vfs_get_tree+0x83/0x260 [ 1226.919811][T32094] do_mount+0x19d0/0x2670 [ 1226.924128][T32094] ? copy_mount_string+0x30/0x30 [ 1226.929032][T32094] ? copy_mount_options+0x59/0x300 [ 1226.934111][T32094] ? kmem_cache_alloc_trace+0x139/0x2b0 [ 1226.939624][T32094] ? copy_mount_options+0x273/0x300 [ 1226.944797][T32094] ksys_mount+0xc2/0xf0 [ 1226.948926][T32094] __x64_sys_mount+0xb1/0xc0 [ 1226.953488][T32094] do_syscall_64+0xcb/0x1e0 [ 1226.957981][T32094] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1226.963860][T32094] RIP: 0033:0x7f2bd50b1c5a [ 1226.968244][T32094] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1226.987832][T32094] RSP: 002b:00007f2bd2e27fa8 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 1226.996222][T32094] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007f2bd50b1c5a 15:41:18 executing program 4 (fault-call:0 fault-nth:82): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4f203, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) [ 1227.004168][T32094] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007f2bd2e28000 [ 1227.012132][T32094] RBP: 00007f2bd2e28040 R08: 00007f2bd2e28040 R09: 0000000020000000 [ 1227.020088][T32094] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000020000000 [ 1227.028037][T32094] R13: 0000000020000100 R14: 00007f2bd2e28000 R15: 0000000020013000 [ 1227.037171][T32094] EXT4-fs (loop4): get root dentry failed [ 1227.043003][T32094] EXT4-fs (loop4): mount failed [ 1227.090080][T32108] EXT4-fs (loop3): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? [ 1227.102662][T32125] FAULT_INJECTION: forcing a failure. [ 1227.102662][T32125] name failslab, interval 1, probability 0, space 0, times 0 [ 1227.115376][T32125] CPU: 0 PID: 32125 Comm: syz-executor.4 Tainted: G W 5.4.125-syzkaller-00005-gb8b657d4d5e9 #0 [ 1227.126977][T32125] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1227.139281][T32125] Call Trace: [ 1227.142552][T32125] dump_stack+0x1d8/0x24e [ 1227.146850][T32125] ? devkmsg_release+0x11c/0x11c [ 1227.151757][T32125] ? show_regs_print_info+0x12/0x12 [ 1227.157010][T32125] ? check_preemption_disabled+0x9e/0x330 [ 1227.162698][T32125] ? __rcu_read_lock+0x50/0x50 [ 1227.167429][T32125] ? __unwind_start+0x72f/0x8e0 [ 1227.172247][T32125] ? debug_smp_processor_id+0x20/0x20 [ 1227.177586][T32125] should_fail+0x6f6/0x860 [ 1227.181975][T32125] ? setup_fault_attr+0x3d0/0x3d0 [ 1227.186990][T32125] ? stack_trace_save+0x1f0/0x1f0 [ 1227.191989][T32125] ? __kernel_text_address+0x93/0x100 [ 1227.197325][T32125] ? unwind_get_return_address+0x48/0x80 [ 1227.202924][T32125] ? mempool_alloc_slab+0x16/0x20 [ 1227.207922][T32125] should_failslab+0x5/0x20 [ 1227.212408][T32125] kmem_cache_alloc+0x36/0x290 [ 1227.217138][T32125] ? mempool_free+0x380/0x380 [ 1227.221789][T32125] mempool_alloc_slab+0x16/0x20 [ 1227.226606][T32125] mempool_alloc+0x113/0x680 [ 1227.231188][T32125] ? __ext4_ext_check+0x96c/0x1140 [ 1227.236288][T32125] ? mempool_resize+0x900/0x900 [ 1227.241107][T32125] ? chksum_update+0x41/0x90 [ 1227.245665][T32125] ? crypto_shash_update+0x1ed/0x2b0 [ 1227.251009][T32125] ? kmem_cache_alloc+0x115/0x290 [ 1227.256003][T32125] ? __d_alloc+0x2a/0x6a0 [ 1227.260311][T32125] ? check_preemption_disabled+0x9e/0x330 [ 1227.266004][T32125] bio_alloc_bioset+0x1db/0x640 [ 1227.270824][T32125] ? debug_smp_processor_id+0x20/0x20 [ 1227.276166][T32125] ? bio_chain_endio+0x110/0x110 [ 1227.281078][T32125] ? __xa_set_mark+0x499/0x580 [ 1227.285815][T32125] ? memset+0x1f/0x40 [ 1227.289764][T32125] submit_bh_wbc+0x1ba/0x790 [ 1227.294328][T32125] ? __wake_up_bit+0x180/0x180 [ 1227.299064][T32125] ? _raw_spin_unlock+0x49/0x60 [ 1227.303884][T32125] __sync_dirty_buffer+0x1d2/0x2d0 [ 1227.308970][T32125] ext4_commit_super+0x860/0xa40 [ 1227.313878][T32125] ext4_setup_super+0x544/0x950 [ 1227.318724][T32125] ext4_fill_super+0xac84/0xeb30 [ 1227.323639][T32125] ? ext4_mount+0x40/0x40 [ 1227.327944][T32125] ? idr_replace+0x1c4/0x230 [ 1227.332503][T32125] ? snprintf+0xd6/0x120 [ 1227.336716][T32125] ? vscnprintf+0x80/0x80 [ 1227.341023][T32125] ? set_blocksize+0x1a5/0x3a0 [ 1227.345760][T32125] mount_bdev+0x22d/0x340 [ 1227.350067][T32125] ? ext4_mount+0x40/0x40 [ 1227.354364][T32125] legacy_get_tree+0xde/0x170 [ 1227.359025][T32125] ? ext4_lazyinit_thread+0xd40/0xd40 [ 1227.364377][T32125] vfs_get_tree+0x83/0x260 [ 1227.368761][T32125] do_mount+0x19d0/0x2670 [ 1227.373063][T32125] ? copy_mount_string+0x30/0x30 [ 1227.377968][T32125] ? copy_mount_options+0x59/0x300 [ 1227.383132][T32125] ? copy_mount_options+0x59/0x300 [ 1227.388213][T32125] ? kmem_cache_alloc_trace+0x139/0x2b0 [ 1227.393733][T32125] ? copy_mount_options+0x273/0x300 [ 1227.398912][T32125] ksys_mount+0xc2/0xf0 [ 1227.403053][T32125] __x64_sys_mount+0xb1/0xc0 [ 1227.407615][T32125] do_syscall_64+0xcb/0x1e0 [ 1227.412088][T32125] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1227.417953][T32125] RIP: 0033:0x7f2bd50b1c5a [ 1227.422338][T32125] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1227.441929][T32125] RSP: 002b:00007f2bd2e27fa8 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 1227.450309][T32125] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007f2bd50b1c5a [ 1227.458254][T32125] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007f2bd2e28000 [ 1227.466209][T32125] RBP: 00007f2bd2e28040 R08: 00007f2bd2e28040 R09: 0000000020000000 [ 1227.474147][T32125] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000020000000 [ 1227.482088][T32125] R13: 0000000020000100 R14: 00007f2bd2e28000 R15: 0000000020013000 15:41:19 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000cc0)=ANY=[@ANYBLOB="7800000010000507000000bc4b9ccfc900000000", @ANYRES32, @ANYBLOB="4518000000fffe00500012800b0001006272696467650000400002800500250000000000060006008bbc00000800010013000000060009000020000005002b000700000005002b00810000000c002200010000000000000008000a00"], 0x78}}, 0x0) 15:41:19 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4f203, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d90000000f0000000100000000000000000040000020000000200000200000002cc4645f2cc4645f0100ffff53ef0100010000002cc4645f000000000000000001000000000000000b0000008000000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e3338363633343038350000000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000000000000000000000000000000000000d9ca5cac99fd4329af4dde786c1a5d13010040000c000000000000002cc4645f", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) 15:41:19 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0xffffff81, &(0x7f00000004c0)={&(0x7f0000000cc0)=ANY=[@ANYBLOB="7800000010000507000000bc4b9ccfc900000000", @ANYRES32, @ANYBLOB="4518000000000000500012800b0001006272696467650000400002800500250000ec0300060006008bbc00000800010013000000060009000020000005002b000700000005002b00810000000c002200010000000000000008000a00"], 0x78}}, 0x0) 15:41:19 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000cc0)=ANY=[@ANYBLOB="7800000010000507000000bc4b9ccfc900000000", @ANYRES32, @ANYBLOB="4518000000000000500812800b0001006272696467650000400002800500250000000000060006008bbc00000800"], 0x78}}, 0x0) 15:41:19 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4f203, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024", 0x29, 0x7e0}], 0x0, &(0x7f0000013000)) 15:41:19 executing program 4 (fault-call:0 fault-nth:83): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4f203, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d90000000f0000000100000000000000000000000020000000200000200000002cc4645f2cc4645f0100ffff53ef0100010000002cc4645f000000000000000001000000000000000b0000008000000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e3338363633343038350000000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000000000000000000000000000000000000d9ca5cac99fd4329af4dde786c1a5d13010040000c000000000000002cc4645f", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) [ 1227.494932][T32125] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue [ 1227.510312][T32125] ext4 filesystem being mounted at /root/syzkaller-testdir028365481/syzkaller.u34vxW/1356/file0 supports timestamps until 2038 (0x7fffffff) 15:41:19 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4f203, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d90000000f0000000100000000000000080040000020000000200000200000002cc4645f2cc4645f0100ffff53ef0100010000002cc4645f000000000000000001000000000000000b0000008000000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e3338363633343038350000000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000000000000000000000000000000000000d9ca5cac99fd4329af4dde786c1a5d13010040000c000000000000002cc4645f", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) 15:41:19 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0xffffff81, &(0x7f00000004c0)={&(0x7f0000000cc0)=ANY=[@ANYBLOB="7800000010000507000000bc4b9ccfc900000000", @ANYRES32, @ANYBLOB="4518000000000000500012800b0001006272696467650000400002800500250000f60300060006008bbc00000800010013000000060009000020000005002b000700000005002b00810000000c002200010000000000000008000a00"], 0x78}}, 0x0) 15:41:19 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000cc0)=ANY=[@ANYBLOB="7800000010000507000000bc4b9ccfc900000000", @ANYRES32, @ANYBLOB="4518000000000000500912800b0001006272696467650000400002800500250000000000060006008bbc00000800"], 0x78}}, 0x0) 15:41:19 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4f203, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c0c0000d90000000f0000000100000000000000000000000020000000200000200000002cc4645f2cc4645f0100ffff53ef0100010000002cc4645f000000000000000001000000000000000b0000008000000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e3338363633343038350000000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000000000000000000000000000000000000d9ca5cac99fd4329af4dde786c1a5d13010040000c000000000000002cc4645f", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024", 0x29, 0x7e0}], 0x0, &(0x7f0000013000)) [ 1227.548858][T32134] EXT4-fs (loop3): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? 15:41:19 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4f203, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) 15:41:19 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4f203, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) [ 1227.610412][T32145] FAULT_INJECTION: forcing a failure. [ 1227.610412][T32145] name failslab, interval 1, probability 0, space 0, times 0 [ 1227.624336][T32145] CPU: 1 PID: 32145 Comm: syz-executor.4 Tainted: G W 5.4.125-syzkaller-00005-gb8b657d4d5e9 #0 [ 1227.635973][T32145] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1227.646022][T32145] Call Trace: [ 1227.649372][T32145] dump_stack+0x1d8/0x24e [ 1227.653698][T32145] ? devkmsg_release+0x11c/0x11c [ 1227.658627][T32145] ? show_regs_print_info+0x12/0x12 [ 1227.663813][T32145] ? check_preemption_disabled+0x9e/0x330 [ 1227.669510][T32145] ? __rcu_read_lock+0x50/0x50 [ 1227.674252][T32145] ? __unwind_start+0x72f/0x8e0 [ 1227.679077][T32145] ? debug_smp_processor_id+0x20/0x20 [ 1227.684434][T32145] should_fail+0x6f6/0x860 [ 1227.688840][T32145] ? setup_fault_attr+0x3d0/0x3d0 [ 1227.693837][T32145] ? stack_trace_save+0x1f0/0x1f0 [ 1227.698854][T32145] ? __kernel_text_address+0x93/0x100 [ 1227.704198][T32145] ? unwind_get_return_address+0x48/0x80 [ 1227.709815][T32145] ? mempool_alloc_slab+0x16/0x20 [ 1227.714820][T32145] should_failslab+0x5/0x20 [ 1227.719309][T32145] kmem_cache_alloc+0x36/0x290 [ 1227.724048][T32145] ? mempool_free+0x380/0x380 [ 1227.728711][T32145] mempool_alloc_slab+0x16/0x20 [ 1227.733534][T32145] mempool_alloc+0x113/0x680 [ 1227.738100][T32145] ? __ext4_ext_check+0x96c/0x1140 [ 1227.743189][T32145] ? mempool_resize+0x900/0x900 [ 1227.748012][T32145] ? chksum_update+0x41/0x90 [ 1227.752577][T32145] ? crypto_shash_update+0x1ed/0x2b0 [ 1227.757839][T32145] ? kmem_cache_alloc+0x115/0x290 [ 1227.762833][T32145] ? __d_alloc+0x2a/0x6a0 [ 1227.767136][T32145] ? check_preemption_disabled+0x9e/0x330 [ 1227.772825][T32145] bio_alloc_bioset+0x1db/0x640 [ 1227.777658][T32145] ? debug_smp_processor_id+0x20/0x20 [ 1227.783016][T32145] ? bio_chain_endio+0x110/0x110 [ 1227.787925][T32145] ? __xa_set_mark+0x499/0x580 [ 1227.792662][T32145] ? memset+0x1f/0x40 [ 1227.796620][T32145] submit_bh_wbc+0x1ba/0x790 [ 1227.801184][T32145] ? __wake_up_bit+0x180/0x180 [ 1227.805921][T32145] ? _raw_spin_unlock+0x49/0x60 [ 1227.810747][T32145] __sync_dirty_buffer+0x1d2/0x2d0 [ 1227.815835][T32145] ext4_commit_super+0x860/0xa40 [ 1227.820748][T32145] ext4_setup_super+0x544/0x950 [ 1227.825575][T32145] ext4_fill_super+0xac84/0xeb30 [ 1227.830495][T32145] ? ext4_mount+0x40/0x40 [ 1227.834799][T32145] ? idr_replace+0x1c4/0x230 [ 1227.839374][T32145] ? snprintf+0xd6/0x120 [ 1227.843592][T32145] ? vscnprintf+0x80/0x80 [ 1227.847895][T32145] ? set_blocksize+0x1a5/0x3a0 [ 1227.852634][T32145] mount_bdev+0x22d/0x340 [ 1227.856939][T32145] ? ext4_mount+0x40/0x40 [ 1227.861241][T32145] legacy_get_tree+0xde/0x170 [ 1227.865894][T32145] ? ext4_lazyinit_thread+0xd40/0xd40 [ 1227.871339][T32145] vfs_get_tree+0x83/0x260 [ 1227.875730][T32145] do_mount+0x19d0/0x2670 [ 1227.880034][T32145] ? copy_mount_string+0x30/0x30 [ 1227.884943][T32145] ? copy_mount_options+0x59/0x300 [ 1227.890025][T32145] ? copy_mount_options+0x59/0x300 [ 1227.895111][T32145] ? kmem_cache_alloc_trace+0x139/0x2b0 [ 1227.900631][T32145] ? copy_mount_options+0x273/0x300 [ 1227.905907][T32145] ksys_mount+0xc2/0xf0 [ 1227.910062][T32145] __x64_sys_mount+0xb1/0xc0 [ 1227.914646][T32145] do_syscall_64+0xcb/0x1e0 [ 1227.919130][T32145] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1227.925004][T32145] RIP: 0033:0x7f2bd50b1c5a [ 1227.929398][T32145] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1227.948977][T32145] RSP: 002b:00007f2bd2e27fa8 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 1227.957361][T32145] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007f2bd50b1c5a [ 1227.965307][T32145] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007f2bd2e28000 [ 1227.973262][T32145] RBP: 00007f2bd2e28040 R08: 00007f2bd2e28040 R09: 0000000020000000 [ 1227.981216][T32145] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000020000000 [ 1227.989169][T32145] R13: 0000000020000100 R14: 00007f2bd2e28000 R15: 0000000020013000 [ 1228.014038][T32150] EXT4-fs (loop3): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? [ 1228.024834][T32145] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue [ 1228.034324][T32145] ext4 filesystem being mounted at /root/syzkaller-testdir028365481/syzkaller.u34vxW/1357/file0 supports timestamps until 2038 (0x7fffffff) 15:41:19 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000cc0)=ANY=[@ANYBLOB="7800000010000507000000bc4b9ccfc900000000", @ANYRES32, @ANYBLOB="451800fffffffe00500012800b0001006272696467650000400002800500250000000000060006008bbc00000800010013000000060009000020000005002b000700000005002b00810000000c002200010000000000000008000a00"], 0x78}}, 0x0) 15:41:19 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4f203, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) 15:41:19 executing program 4 (fault-call:0 fault-nth:84): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4f203, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d90000000f0000000100000000000000000000000020000000200000200000002cc4645f2cc4645f0100ffff53ef0100010000002cc4645f000000000000000001000000000000000b0000008000000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e3338363633343038350000000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000000000000000000000000000000000000d9ca5cac99fd4329af4dde786c1a5d13010040000c000000000000002cc4645f", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) 15:41:19 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4f203, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024", 0x29, 0x7e0}], 0x0, &(0x7f0000013000)) 15:41:19 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0xffffff81, &(0x7f00000004c0)={&(0x7f0000000cc0)=ANY=[@ANYBLOB="7800000010000507000000bc4b9ccfc900000000", @ANYRES32, @ANYBLOB="4518000000000000500012800b0001006272696467650000400002800500250000030400060006008bbc00000800010013000000060009000020000005002b000700000005002b00810000000c002200010000000000000008000a00"], 0x78}}, 0x0) 15:41:19 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000cc0)=ANY=[@ANYBLOB="7800000010000507000000bc4b9ccfc900000000", @ANYRES32, @ANYBLOB="4518000000000000500a12800b0001006272696467650000400002800500250000000000060006008bbc00000800"], 0x78}}, 0x0) 15:41:19 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4f203, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) 15:41:19 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0xffffff81, &(0x7f00000004c0)={&(0x7f0000000cc0)=ANY=[@ANYBLOB="7800000010000507000000bc4b9ccfc900000000", @ANYRES32, @ANYBLOB="4518000000000000500012800b0001006272696467650000400002800500250000000500060006008bbc00000800010013000000060009000020000005002b000700000005002b00810000000c002200010000000000000008000a00"], 0x78}}, 0x0) [ 1228.064222][T32150] EXT4-fs (loop3): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? 15:41:19 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4f203, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) 15:41:20 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4f203, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) [ 1228.158005][T32164] FAULT_INJECTION: forcing a failure. [ 1228.158005][T32164] name failslab, interval 1, probability 0, space 0, times 0 [ 1228.167343][T32176] EXT4-fs (loop3): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? [ 1228.173511][T32164] CPU: 1 PID: 32164 Comm: syz-executor.4 Tainted: G W 5.4.125-syzkaller-00005-gb8b657d4d5e9 #0 [ 1228.192387][T32164] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1228.202428][T32164] Call Trace: [ 1228.205712][T32164] dump_stack+0x1d8/0x24e [ 1228.210018][T32164] ? devkmsg_release+0x11c/0x11c [ 1228.214927][T32164] ? show_regs_print_info+0x12/0x12 [ 1228.220098][T32164] should_fail+0x6f6/0x860 [ 1228.224490][T32164] ? setup_fault_attr+0x3d0/0x3d0 [ 1228.229502][T32164] ? add_system_zone+0x128/0x4f0 [ 1228.234409][T32164] should_failslab+0x5/0x20 [ 1228.238885][T32164] kmem_cache_alloc+0x36/0x290 [ 1228.243621][T32164] add_system_zone+0x128/0x4f0 [ 1228.248359][T32164] ? ext4_bg_num_gdb+0xf1/0x200 [ 1228.253182][T32164] ext4_setup_system_zone+0x2a9/0xec0 [ 1228.258529][T32164] ? ext4_commit_super+0x8a4/0xa40 [ 1228.263612][T32164] ? ext4_exit_system_zone+0x20/0x20 [ 1228.268869][T32164] ? __cleancache_init_fs+0x66/0xb0 [ 1228.274054][T32164] ? ext4_setup_super+0x597/0x950 [ 1228.279057][T32164] ext4_fill_super+0xbd8c/0xeb30 [ 1228.283975][T32164] ? ext4_mount+0x40/0x40 [ 1228.288277][T32164] ? idr_replace+0x1c4/0x230 [ 1228.292841][T32164] ? snprintf+0xd6/0x120 [ 1228.297054][T32164] ? vscnprintf+0x80/0x80 [ 1228.301355][T32164] ? set_blocksize+0x1a5/0x3a0 [ 1228.306096][T32164] mount_bdev+0x22d/0x340 [ 1228.310398][T32164] ? ext4_mount+0x40/0x40 [ 1228.314703][T32164] legacy_get_tree+0xde/0x170 [ 1228.319356][T32164] ? ext4_lazyinit_thread+0xd40/0xd40 [ 1228.324700][T32164] vfs_get_tree+0x83/0x260 [ 1228.329101][T32164] do_mount+0x19d0/0x2670 [ 1228.333403][T32164] ? copy_mount_string+0x30/0x30 [ 1228.338402][T32164] ? copy_mount_options+0x59/0x300 [ 1228.343493][T32164] ? kmem_cache_alloc_trace+0x139/0x2b0 [ 1228.349012][T32164] ? copy_mount_options+0x273/0x300 [ 1228.354189][T32164] ksys_mount+0xc2/0xf0 [ 1228.358333][T32164] __x64_sys_mount+0xb1/0xc0 [ 1228.362989][T32164] do_syscall_64+0xcb/0x1e0 [ 1228.367471][T32164] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1228.373423][T32164] RIP: 0033:0x7f2bd50b1c5a [ 1228.377816][T32164] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1228.397406][T32164] RSP: 002b:00007f2bd2e27fa8 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 15:41:20 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4f203, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) 15:41:20 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000cc0)=ANY=[@ANYBLOB="7800000010000507000000bc4b9ccfc900000000", @ANYRES32, @ANYBLOB="4518000000000000500b12800b0001006272696467650000400002800500250000000000060006008bbc00000800"], 0x78}}, 0x0) [ 1228.405787][T32164] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007f2bd50b1c5a [ 1228.413733][T32164] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007f2bd2e28000 [ 1228.421678][T32164] RBP: 00007f2bd2e28040 R08: 00007f2bd2e28040 R09: 0000000020000000 [ 1228.429624][T32164] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000020000000 [ 1228.437570][T32164] R13: 0000000020000100 R14: 00007f2bd2e28000 R15: 0000000020013000 15:41:20 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000cc0)=ANY=[@ANYBLOB="7800000010000507000000bc4b9ccfc900000000", @ANYRES32, @ANYBLOB="45180000000fff00500012800b0001006272696467650000400002800500250000000000060006008bbc00000800010013000000060009000020000005002b000700000005002b00810000000c002200010000000000000008000a00"], 0x78}}, 0x0) 15:41:20 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0xffffff81, &(0x7f00000004c0)={&(0x7f0000000cc0)=ANY=[@ANYBLOB="7800000010000507000000bc4b9ccfc900000000", @ANYRES32, @ANYBLOB="4518000000000000500012800b0001006272696467650000400002800500250000000600060006008bbc00000800010013000000060009000020000005002b000700000005002b00810000000c002200010000000000000008000a00"], 0x78}}, 0x0) 15:41:20 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4f203, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) 15:41:20 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000cc0)=ANY=[@ANYBLOB="7800000010000507000000bc4b9ccfc900000000", @ANYRES32, @ANYBLOB="4518000000000000500c12800b0001006272696467650000400002800500250000000000060006008bbc00000800"], 0x78}}, 0x0) 15:41:20 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4f203, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024", 0x29, 0x7e0}], 0x0, &(0x7f0000013000)) 15:41:20 executing program 4 (fault-call:0 fault-nth:85): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4f203, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) 15:41:20 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4f203, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) [ 1228.471796][T32164] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue [ 1228.481414][T32164] ext4 filesystem being mounted at /root/syzkaller-testdir028365481/syzkaller.u34vxW/1358/file0 supports timestamps until 2038 (0x7fffffff) [ 1228.499676][T32176] EXT4-fs (loop3): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? 15:41:20 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0xffffff81, &(0x7f00000004c0)={&(0x7f0000000cc0)=ANY=[@ANYBLOB="7800000010000507000000bc4b9ccfc900000000", @ANYRES32, @ANYBLOB="4518000000000000500012800b0001006272696467650000400002800500250000000700060006008bbc00000800010013000000060009000020000005002b000700000005002b00810000000c002200010000000000000008000a00"], 0x78}}, 0x0) 15:41:20 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4f203, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) [ 1228.570712][T32193] __nla_validate_parse: 10 callbacks suppressed [ 1228.570719][T32193] netlink: 88 bytes leftover after parsing attributes in process `syz-executor.5'. [ 1228.606108][T32201] EXT4-fs (loop3): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? 15:41:20 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4f203, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c100000d90000000f0000000100000000000000000000000020000000200000200000002cc4645f2cc4645f0100ffff53ef0100010000002cc4645f000000000000000001000000000000000b0000008000000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e3338363633343038350000000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000000000000000000000000000000000000d9ca5cac99fd4329af4dde786c1a5d13010040000c000000000000002cc4645f", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024", 0x29, 0x7e0}], 0x0, &(0x7f0000013000)) 15:41:20 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4f203, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) 15:41:20 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000cc0)=ANY=[@ANYBLOB="7800000010000507000000bc4b9ccfc900000000", @ANYRES32, @ANYBLOB="4518000000000000500d12800b0001006272696467650000400002800500250000000000060006008bbc00000800"], 0x78}}, 0x0) [ 1228.618218][T32199] FAULT_INJECTION: forcing a failure. [ 1228.618218][T32199] name failslab, interval 1, probability 0, space 0, times 0 [ 1228.650970][T32199] CPU: 1 PID: 32199 Comm: syz-executor.4 Tainted: G W 5.4.125-syzkaller-00005-gb8b657d4d5e9 #0 [ 1228.662652][T32199] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1228.672696][T32199] Call Trace: [ 1228.675971][T32199] dump_stack+0x1d8/0x24e [ 1228.680307][T32199] ? devkmsg_release+0x11c/0x11c [ 1228.685218][T32199] ? show_regs_print_info+0x12/0x12 [ 1228.690427][T32199] should_fail+0x6f6/0x860 [ 1228.694820][T32199] ? setup_fault_attr+0x3d0/0x3d0 [ 1228.699855][T32199] ? add_system_zone+0x128/0x4f0 [ 1228.704762][T32199] should_failslab+0x5/0x20 [ 1228.709261][T32199] kmem_cache_alloc+0x36/0x290 [ 1228.714001][T32199] add_system_zone+0x128/0x4f0 [ 1228.718749][T32199] ? ext4_bg_num_gdb+0xf1/0x200 [ 1228.723570][T32199] ext4_setup_system_zone+0x2a9/0xec0 [ 1228.728913][T32199] ? ext4_commit_super+0x8a4/0xa40 [ 1228.733996][T32199] ? ext4_exit_system_zone+0x20/0x20 [ 1228.739293][T32199] ? __cleancache_init_fs+0x66/0xb0 [ 1228.744471][T32199] ? ext4_setup_super+0x597/0x950 [ 1228.749527][T32199] ext4_fill_super+0xbd8c/0xeb30 [ 1228.754555][T32199] ? ext4_mount+0x40/0x40 [ 1228.758860][T32199] ? idr_replace+0x1c4/0x230 [ 1228.763421][T32199] ? snprintf+0xd6/0x120 [ 1228.767632][T32199] ? vscnprintf+0x80/0x80 [ 1228.771935][T32199] ? set_blocksize+0x1a5/0x3a0 [ 1228.776714][T32199] mount_bdev+0x22d/0x340 [ 1228.781017][T32199] ? ext4_mount+0x40/0x40 [ 1228.785318][T32199] legacy_get_tree+0xde/0x170 [ 1228.789969][T32199] ? ext4_lazyinit_thread+0xd40/0xd40 [ 1228.795316][T32199] vfs_get_tree+0x83/0x260 [ 1228.799703][T32199] do_mount+0x19d0/0x2670 [ 1228.804024][T32199] ? copy_mount_string+0x30/0x30 [ 1228.808941][T32199] ? copy_mount_options+0x59/0x300 [ 1228.814088][T32199] ? copy_mount_options+0x59/0x300 [ 1228.819284][T32199] ? kmem_cache_alloc_trace+0x139/0x2b0 [ 1228.824808][T32199] ? copy_mount_options+0x273/0x300 [ 1228.829986][T32199] ksys_mount+0xc2/0xf0 [ 1228.834131][T32199] __x64_sys_mount+0xb1/0xc0 [ 1228.838698][T32199] do_syscall_64+0xcb/0x1e0 [ 1228.843174][T32199] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1228.849037][T32199] RIP: 0033:0x7f2bd50b1c5a [ 1228.853437][T32199] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1228.873012][T32199] RSP: 002b:00007f2bd2e27fa8 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 1228.881399][T32199] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007f2bd50b1c5a [ 1228.889344][T32199] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007f2bd2e28000 [ 1228.897295][T32199] RBP: 00007f2bd2e28040 R08: 00007f2bd2e28040 R09: 0000000020000000 [ 1228.905247][T32199] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000020000000 [ 1228.913201][T32199] R13: 0000000020000100 R14: 00007f2bd2e28000 R15: 0000000020013000 [ 1228.925090][T32199] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue [ 1228.934099][T32199] ext4 filesystem being mounted at /root/syzkaller-testdir028365481/syzkaller.u34vxW/1359/file0 supports timestamps until 2038 (0x7fffffff) [ 1228.952772][T32216] netlink: 88 bytes leftover after parsing attributes in process `syz-executor.5'. 15:41:20 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000cc0)=ANY=[@ANYBLOB="7800000010000507000000bc4b9ccfc900000000", @ANYRES32, @ANYBLOB="45180000007fff00500012800b0001006272696467650000400002800500250000000000060006008bbc00000800010013000000060009000020000005002b000700000005002b00810000000c002200010000000000000008000a00"], 0x78}}, 0x0) 15:41:20 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0xffffff81, &(0x7f00000004c0)={&(0x7f0000000cc0)=ANY=[@ANYBLOB="7800000010000507000000bc4b9ccfc900000000", @ANYRES32, @ANYBLOB="4518000000000000500012800b0001006272696467650000400002800500250000000900060006008bbc00000800010013000000060009000020000005002b000700000005002b00810000000c002200010000000000000008000a00"], 0x78}}, 0x0) 15:41:20 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4f203, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d90000000f0000000100000007000000000000000020000000200000200000002cc4645f2cc4645f0100ffff53ef0100010000002cc4645f000000000000000001000000000000000b0000008000000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e3338363633343038350000000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000000000000000000000000000000000000d9ca5cac99fd4329af4dde786c1a5d13010040000c000000000000002cc4645f", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) 15:41:20 executing program 4 (fault-call:0 fault-nth:86): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4f203, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) 15:41:20 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000cc0)=ANY=[@ANYBLOB="7800000010000507000000bc4b9ccfc900000000", @ANYRES32, @ANYBLOB="4518000000000000500e12800b0001006272696467650000400002800500250000000000060006008bbc00000800"], 0x78}}, 0x0) 15:41:20 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4f203, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) [ 1228.970141][T32214] EXT4-fs (loop3): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? 15:41:20 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4f203, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) 15:41:20 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4f203, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) 15:41:20 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4f203, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d90000000f000000010000000b000000000000000020000000200000200000002cc4645f2cc4645f0100ffff53ef0100010000002cc4645f000000000000000001000000000000000b0000008000000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e3338363633343038350000000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000000000000000000000000000000000000d9ca5cac99fd4329af4dde786c1a5d13010040000c000000000000002cc4645f", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) 15:41:20 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4f203, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024", 0x29, 0x7e0}], 0x0, &(0x7f0000013000)) 15:41:20 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0xffffff81, &(0x7f00000004c0)={&(0x7f0000000cc0)=ANY=[@ANYBLOB="7800000010000507000000bc4b9ccfc900000000", @ANYRES32, @ANYBLOB="4518000000000000500012800b0001006272696467650000400002800500250000000a00060006008bbc00000800010013000000060009000020000005002b000700000005002b00810000000c002200010000000000000008000a00"], 0x78}}, 0x0) 15:41:20 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4f203, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) [ 1229.044711][T32224] netlink: 88 bytes leftover after parsing attributes in process `syz-executor.5'. [ 1229.054038][T32214] EXT4-fs (loop3): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? [ 1229.112654][T32238] FAULT_INJECTION: forcing a failure. [ 1229.112654][T32238] name failslab, interval 1, probability 0, space 0, times 0 [ 1229.125674][T32238] CPU: 0 PID: 32238 Comm: syz-executor.4 Tainted: G W 5.4.125-syzkaller-00005-gb8b657d4d5e9 #0 [ 1229.133878][T32245] EXT4-fs (loop3): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? [ 1229.137294][T32238] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1229.137297][T32238] Call Trace: [ 1229.137315][T32238] dump_stack+0x1d8/0x24e [ 1229.137331][T32238] ? devkmsg_release+0x11c/0x11c [ 1229.170150][T32238] ? show_regs_print_info+0x12/0x12 [ 1229.175324][T32238] should_fail+0x6f6/0x860 [ 1229.179711][T32238] ? setup_fault_attr+0x3d0/0x3d0 [ 1229.184710][T32238] ? add_system_zone+0x128/0x4f0 [ 1229.189631][T32238] should_failslab+0x5/0x20 [ 1229.194107][T32238] kmem_cache_alloc+0x36/0x290 [ 1229.198840][T32238] add_system_zone+0x128/0x4f0 [ 1229.203581][T32238] ? ext4_get_group_desc+0x253/0x2a0 [ 1229.209009][T32238] ext4_setup_system_zone+0x363/0xec0 [ 1229.214351][T32238] ? ext4_commit_super+0x8a4/0xa40 [ 1229.219446][T32238] ? ext4_exit_system_zone+0x20/0x20 [ 1229.224713][T32238] ? __cleancache_init_fs+0x66/0xb0 [ 1229.229879][T32238] ? ext4_setup_super+0x597/0x950 [ 1229.234877][T32238] ext4_fill_super+0xbd8c/0xeb30 [ 1229.239805][T32238] ? ext4_mount+0x40/0x40 [ 1229.244107][T32238] ? idr_replace+0x1c4/0x230 [ 1229.248672][T32238] ? snprintf+0xd6/0x120 [ 1229.252890][T32238] ? vscnprintf+0x80/0x80 [ 1229.257189][T32238] ? set_blocksize+0x1a5/0x3a0 [ 1229.261923][T32238] mount_bdev+0x22d/0x340 [ 1229.266220][T32238] ? ext4_mount+0x40/0x40 [ 1229.270554][T32238] legacy_get_tree+0xde/0x170 [ 1229.275202][T32238] ? ext4_lazyinit_thread+0xd40/0xd40 [ 1229.280547][T32238] vfs_get_tree+0x83/0x260 [ 1229.284946][T32238] do_mount+0x19d0/0x2670 [ 1229.289242][T32238] ? copy_mount_string+0x30/0x30 [ 1229.294147][T32238] ? copy_mount_options+0x59/0x300 [ 1229.299227][T32238] ? kmem_cache_alloc_trace+0x139/0x2b0 [ 1229.304757][T32238] ? copy_mount_options+0x273/0x300 [ 1229.309939][T32238] ksys_mount+0xc2/0xf0 [ 1229.314064][T32238] __x64_sys_mount+0xb1/0xc0 [ 1229.318642][T32238] do_syscall_64+0xcb/0x1e0 [ 1229.323120][T32238] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1229.328980][T32238] RIP: 0033:0x7f2bd50b1c5a [ 1229.333378][T32238] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1229.352950][T32238] RSP: 002b:00007f2bd2e27fa8 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 1229.361353][T32238] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007f2bd50b1c5a [ 1229.369294][T32238] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007f2bd2e28000 [ 1229.377236][T32238] RBP: 00007f2bd2e28040 R08: 00007f2bd2e28040 R09: 0000000020000000 [ 1229.385177][T32238] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000020000000 [ 1229.393120][T32238] R13: 0000000020000100 R14: 00007f2bd2e28000 R15: 0000000020013000 [ 1229.401493][T32238] EXT4-fs (loop4): failed to initialize system zone (-12) [ 1229.408754][T32238] EXT4-fs (loop4): mount failed 15:41:21 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000cc0)=ANY=[@ANYBLOB="7800000010000507000000bc4b9ccfc900000000", @ANYRES32, @ANYBLOB="4518000003ffff00500012800b0001006272696467650000400002800500250000000000060006008bbc00000800010013000000060009000020000005002b000700000005002b00810000000c002200010000000000000008000a00"], 0x78}}, 0x0) 15:41:21 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000cc0)=ANY=[@ANYBLOB="7800000010000507000000bc4b9ccfc900000000", @ANYRES32, @ANYBLOB="4518000000000000501012800b0001006272696467650000400002800500250000000000060006008bbc00000800"], 0x78}}, 0x0) 15:41:21 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4f203, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d90000000f000000010000000d000000000000000020000000200000200000002cc4645f2cc4645f0100ffff53ef0100010000002cc4645f000000000000000001000000000000000b0000008000000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e3338363633343038350000000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000000000000000000000000000000000000d9ca5cac99fd4329af4dde786c1a5d13010040000c000000000000002cc4645f", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) 15:41:21 executing program 4 (fault-call:0 fault-nth:87): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4f203, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) 15:41:21 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0xffffff81, &(0x7f00000004c0)={&(0x7f0000000cc0)=ANY=[@ANYBLOB="7800000010000507000000bc4b9ccfc900000000", @ANYRES32, @ANYBLOB="4518000000000000500012800b0001006272696467650000400002800500250000000b00060006008bbc00000800010013000000060009000020000005002b000700000005002b00810000000c002200010000000000000008000a00"], 0x78}}, 0x0) 15:41:21 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4f203, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) 15:41:21 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000cc0)=ANY=[@ANYBLOB="7800000010000507000000bc4b9ccfc900000000", @ANYRES32, @ANYBLOB="4518000000000000501112800b0001006272696467650000400002800500250000000000060006008bbc00000800"], 0x78}}, 0x0) 15:41:21 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4f203, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024", 0x29, 0x7e0}], 0x0, &(0x7f0000013000)) 15:41:21 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4f203, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) [ 1229.453941][T32250] netlink: 88 bytes leftover after parsing attributes in process `syz-executor.5'. [ 1229.478852][T32245] EXT4-fs (loop3): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? 15:41:21 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4f203, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) [ 1229.539129][T32266] EXT4-fs (loop3): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? [ 1229.555495][T32269] FAULT_INJECTION: forcing a failure. [ 1229.555495][T32269] name failslab, interval 1, probability 0, space 0, times 0 [ 1229.570331][T32269] CPU: 0 PID: 32269 Comm: syz-executor.4 Tainted: G W 5.4.125-syzkaller-00005-gb8b657d4d5e9 #0 15:41:21 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4f203, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) 15:41:21 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4f203, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) [ 1229.581966][T32269] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1229.592010][T32269] Call Trace: [ 1229.595306][T32269] dump_stack+0x1d8/0x24e [ 1229.599630][T32269] ? devkmsg_release+0x11c/0x11c [ 1229.604564][T32269] ? show_regs_print_info+0x12/0x12 [ 1229.609765][T32269] should_fail+0x6f6/0x860 [ 1229.614349][T32269] ? setup_fault_attr+0x3d0/0x3d0 [ 1229.619408][T32269] ? add_system_zone+0x128/0x4f0 [ 1229.624330][T32269] should_failslab+0x5/0x20 [ 1229.628844][T32269] kmem_cache_alloc+0x36/0x290 [ 1229.633580][T32269] add_system_zone+0x128/0x4f0 [ 1229.638338][T32269] ? ext4_get_group_desc+0x253/0x2a0 [ 1229.643595][T32269] ext4_setup_system_zone+0x30c/0xec0 [ 1229.648942][T32269] ? ext4_commit_super+0x8a4/0xa40 [ 1229.654022][T32269] ? ext4_exit_system_zone+0x20/0x20 [ 1229.659275][T32269] ? __cleancache_init_fs+0x66/0xb0 [ 1229.664441][T32269] ? ext4_setup_super+0x597/0x950 [ 1229.669437][T32269] ext4_fill_super+0xbd8c/0xeb30 [ 1229.674349][T32269] ? ext4_mount+0x40/0x40 [ 1229.678673][T32269] ? idr_replace+0x1c4/0x230 [ 1229.683263][T32269] ? snprintf+0xd6/0x120 [ 1229.687479][T32269] ? vscnprintf+0x80/0x80 [ 1229.691785][T32269] ? set_blocksize+0x1a5/0x3a0 [ 1229.696545][T32269] mount_bdev+0x22d/0x340 [ 1229.700854][T32269] ? ext4_mount+0x40/0x40 [ 1229.705154][T32269] legacy_get_tree+0xde/0x170 [ 1229.709804][T32269] ? ext4_lazyinit_thread+0xd40/0xd40 [ 1229.715151][T32269] vfs_get_tree+0x83/0x260 [ 1229.719543][T32269] do_mount+0x19d0/0x2670 [ 1229.723845][T32269] ? copy_mount_string+0x30/0x30 [ 1229.728752][T32269] ? copy_mount_options+0x59/0x300 [ 1229.733838][T32269] ? copy_mount_options+0x59/0x300 [ 1229.738922][T32269] ? kmem_cache_alloc_trace+0x139/0x2b0 [ 1229.744441][T32269] ? copy_mount_options+0x273/0x300 [ 1229.749615][T32269] ksys_mount+0xc2/0xf0 [ 1229.753753][T32269] __x64_sys_mount+0xb1/0xc0 [ 1229.758427][T32269] do_syscall_64+0xcb/0x1e0 [ 1229.762913][T32269] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1229.768800][T32269] RIP: 0033:0x7f2bd50b1c5a [ 1229.773207][T32269] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1229.793316][T32269] RSP: 002b:00007f2bd2e27fa8 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 1229.801701][T32269] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007f2bd50b1c5a [ 1229.809647][T32269] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007f2bd2e28000 [ 1229.817592][T32269] RBP: 00007f2bd2e28040 R08: 00007f2bd2e28040 R09: 0000000020000000 [ 1229.825535][T32269] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000020000000 15:41:21 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000cc0)=ANY=[@ANYBLOB="7800000010000507000000bc4b9ccfc900000000", @ANYRES32, @ANYBLOB="4518007fffffff00500012800b0001006272696467650000400002800500250000000000060006008bbc00000800010013000000060009000020000005002b000700000005002b00810000000c002200010000000000000008000a00"], 0x78}}, 0x0) 15:41:21 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4f203, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) 15:41:21 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0xffffff81, &(0x7f00000004c0)={&(0x7f0000000cc0)=ANY=[@ANYBLOB="7800000010000507000000bc4b9ccfc900000000", @ANYRES32, @ANYBLOB="4518000000000000500012800b0001006272696467650000400002800500250000000c00060006008bbc00000800010013000000060009000020000005002b000700000005002b00810000000c002200010000000000000008000a00"], 0x78}}, 0x0) 15:41:21 executing program 4 (fault-call:0 fault-nth:88): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4f203, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) 15:41:21 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000cc0)=ANY=[@ANYBLOB="7800000010000507000000bc4b9ccfc900000000", @ANYRES32, @ANYBLOB="4518000000000000501212800b0001006272696467650000400002800500250000000000060006008bbc00000800"], 0x78}}, 0x0) [ 1229.833526][T32269] R13: 0000000020000100 R14: 00007f2bd2e28000 R15: 0000000020013000 [ 1229.843443][T32269] EXT4-fs (loop4): failed to initialize system zone (-12) [ 1229.850874][T32269] EXT4-fs (loop4): mount failed [ 1229.869476][T32260] netlink: 88 bytes leftover after parsing attributes in process `syz-executor.5'. 15:41:21 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4f203, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) 15:41:21 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000cc0)=ANY=[@ANYBLOB="7800000010000507000000bc4b9ccfc900000000", @ANYRES32, @ANYBLOB="4518000000000000502412800b0001006272696467650000400002800500250000000000060006008bbc00000800"], 0x78}}, 0x0) [ 1229.908532][T32266] EXT4-fs (loop3): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? [ 1229.920168][T32286] netlink: 88 bytes leftover after parsing attributes in process `syz-executor.5'. 15:41:21 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4f203, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024", 0x29, 0x7e0}], 0x0, &(0x7f0000013000)) 15:41:21 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0xffffff81, &(0x7f00000004c0)={&(0x7f0000000cc0)=ANY=[@ANYBLOB="7800000010000507000000bc4b9ccfc900000000", @ANYRES32, @ANYBLOB="4518000000000000500012800b0001006272696467650000400002800500250000000d00060006008bbc00000800010013000000060009000020000005002b000700000005002b00810000000c002200010000000000000008000a00"], 0x78}}, 0x0) 15:41:21 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4f203, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) [ 1229.980840][T32289] FAULT_INJECTION: forcing a failure. [ 1229.980840][T32289] name failslab, interval 1, probability 0, space 0, times 0 [ 1229.999576][T32289] CPU: 1 PID: 32289 Comm: syz-executor.4 Tainted: G W 5.4.125-syzkaller-00005-gb8b657d4d5e9 #0 [ 1230.011209][T32289] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1230.014346][T32299] EXT4-fs (loop3): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? [ 1230.021301][T32289] Call Trace: [ 1230.021320][T32289] dump_stack+0x1d8/0x24e [ 1230.021331][T32289] ? devkmsg_release+0x11c/0x11c [ 1230.021348][T32289] ? show_regs_print_info+0x12/0x12 [ 1230.049235][T32289] ? add_system_zone+0x128/0x4f0 [ 1230.054151][T32289] should_fail+0x6f6/0x860 [ 1230.058545][T32289] ? setup_fault_attr+0x3d0/0x3d0 [ 1230.063665][T32289] ? ext4_setup_system_zone+0x5d6/0xec0 [ 1230.069178][T32289] ? ext4_mb_init+0x80/0x1330 [ 1230.073825][T32289] should_failslab+0x5/0x20 [ 1230.078298][T32289] __kmalloc+0x5f/0x2f0 [ 1230.082439][T32289] ? ext4_commit_super+0x8a4/0xa40 [ 1230.087687][T32289] ext4_mb_init+0x80/0x1330 [ 1230.092167][T32289] ? __cleancache_init_fs+0x66/0xb0 [ 1230.097358][T32289] ext4_fill_super+0xbe97/0xeb30 [ 1230.102278][T32289] ? ext4_mount+0x40/0x40 [ 1230.106578][T32289] ? idr_replace+0x1c4/0x230 [ 1230.111187][T32289] ? snprintf+0xd6/0x120 [ 1230.115440][T32289] ? vscnprintf+0x80/0x80 [ 1230.119745][T32289] ? set_blocksize+0x1a5/0x3a0 [ 1230.124520][T32289] mount_bdev+0x22d/0x340 [ 1230.128826][T32289] ? ext4_mount+0x40/0x40 [ 1230.133141][T32289] legacy_get_tree+0xde/0x170 [ 1230.137791][T32289] ? ext4_lazyinit_thread+0xd40/0xd40 [ 1230.143133][T32289] vfs_get_tree+0x83/0x260 [ 1230.147539][T32289] do_mount+0x19d0/0x2670 [ 1230.151853][T32289] ? copy_mount_string+0x30/0x30 [ 1230.156759][T32289] ? copy_mount_options+0x59/0x300 [ 1230.161841][T32289] ? copy_mount_options+0x59/0x300 [ 1230.166940][T32289] ? kmem_cache_alloc_trace+0x139/0x2b0 [ 1230.172463][T32289] ? copy_mount_options+0x273/0x300 [ 1230.177628][T32289] ksys_mount+0xc2/0xf0 [ 1230.181759][T32289] __x64_sys_mount+0xb1/0xc0 [ 1230.186330][T32289] do_syscall_64+0xcb/0x1e0 [ 1230.190815][T32289] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1230.196675][T32289] RIP: 0033:0x7f2bd50b1c5a [ 1230.201060][T32289] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1230.220816][T32289] RSP: 002b:00007f2bd2e27fa8 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 15:41:22 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4f203, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) [ 1230.229201][T32289] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007f2bd50b1c5a [ 1230.237145][T32289] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007f2bd2e28000 [ 1230.245089][T32289] RBP: 00007f2bd2e28040 R08: 00007f2bd2e28040 R09: 0000000020000000 [ 1230.253033][T32289] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000020000000 [ 1230.260975][T32289] R13: 0000000020000100 R14: 00007f2bd2e28000 R15: 0000000020013000 15:41:22 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4f203, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) [ 1230.275885][T32289] EXT4-fs (loop4): failed to initialize mballoc (-12) [ 1230.282801][T32289] EXT4-fs (loop4): mount failed [ 1230.351424][T32299] EXT4-fs (loop3): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? 15:41:22 executing program 4 (fault-call:0 fault-nth:89): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4f203, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) 15:41:22 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4f203, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) 15:41:22 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000cc0)=ANY=[@ANYBLOB="7800000010000507000000bc4b9ccfc900000000", @ANYRES32, @ANYBLOB="4518000000000000502512800b0001006272696467650000400002800500250000000000060006008bbc00000800"], 0x78}}, 0x0) 15:41:22 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4f203, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024", 0x29, 0x7e0}], 0x0, &(0x7f0000013000)) 15:41:22 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000cc0)=ANY=[@ANYBLOB="7800000010000507000000bc4b9ccfc900000000", @ANYRES32, @ANYBLOB="45180081ffffff00500012800b0001006272696467650000400002800500250000000000060006008bbc00000800010013000000060009000020000005002b000700000005002b00810000000c002200010000000000000008000a00"], 0x78}}, 0x0) 15:41:22 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0xffffff81, &(0x7f00000004c0)={&(0x7f0000000cc0)=ANY=[@ANYBLOB="7800000010000507000000bc4b9ccfc900000000", @ANYRES32, @ANYBLOB="4518000000000000500012800b0001006272696467650000400002800500250000000e00060006008bbc00000800010013000000060009000020000005002b000700000005002b00810000000c002200010000000000000008000a00"], 0x78}}, 0x0) [ 1230.420047][T32297] netlink: 88 bytes leftover after parsing attributes in process `syz-executor.5'. [ 1230.458413][T32318] EXT4-fs (loop3): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? 15:41:22 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4f203, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d90000000f0000000100000000050000000000000020000000200000200000002cc4645f2cc4645f0100ffff53ef0100010000002cc4645f000000000000000001000000000000000b0000008000000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e3338363633343038350000000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000000000000000000000000000000000000d9ca5cac99fd4329af4dde786c1a5d13010040000c000000000000002cc4645f", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) 15:41:22 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000cc0)=ANY=[@ANYBLOB="7800000010000507000000bc4b9ccfc900000000", @ANYRES32, @ANYBLOB="4518000000000000502e12800b0001006272696467650000400002800500250000000000060006008bbc00000800"], 0x78}}, 0x0) 15:41:22 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4f203, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d90000000f000000010000002d050000000000000020000000200000200000002cc4645f2cc4645f0100ffff53ef0100010000002cc4645f000000000000000001000000000000000b0000008000000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e3338363633343038350000000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000000000000000000000000000000000000d9ca5cac99fd4329af4dde786c1a5d13010040000c000000000000002cc4645f", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) [ 1230.473935][T32319] FAULT_INJECTION: forcing a failure. [ 1230.473935][T32319] name failslab, interval 1, probability 0, space 0, times 0 [ 1230.486795][T32323] netlink: 88 bytes leftover after parsing attributes in process `syz-executor.5'. [ 1230.486836][T32319] CPU: 1 PID: 32319 Comm: syz-executor.4 Tainted: G W 5.4.125-syzkaller-00005-gb8b657d4d5e9 #0 [ 1230.507693][T32319] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1230.517740][T32319] Call Trace: 15:41:22 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4f203, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) 15:41:22 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4f203, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) 15:41:22 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4f203, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d90000000f0000000100000000070000000000000020000000200000200000002cc4645f2cc4645f0100ffff53ef0100010000002cc4645f000000000000000001000000000000000b0000008000000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e3338363633343038350000000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000000000000000000000000000000000000d9ca5cac99fd4329af4dde786c1a5d13010040000c000000000000002cc4645f", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) [ 1230.521032][T32319] dump_stack+0x1d8/0x24e [ 1230.525359][T32319] ? devkmsg_release+0x11c/0x11c [ 1230.530302][T32319] ? show_regs_print_info+0x12/0x12 [ 1230.535498][T32319] should_fail+0x6f6/0x860 [ 1230.539915][T32319] ? setup_fault_attr+0x3d0/0x3d0 [ 1230.544941][T32319] ? kvmalloc_node+0x7e/0xf0 [ 1230.549528][T32319] should_failslab+0x5/0x20 [ 1230.554028][T32319] __kmalloc+0x5f/0x2f0 [ 1230.558181][T32319] kvmalloc_node+0x7e/0xf0 [ 1230.562582][T32319] ext4_mb_alloc_groupinfo+0xf4/0x2d0 [ 1230.567943][T32319] ext4_mb_init+0xb4e/0x1330 [ 1230.572532][T32319] ext4_fill_super+0xbe97/0xeb30 [ 1230.577476][T32319] ? ext4_mount+0x40/0x40 [ 1230.581792][T32319] ? idr_replace+0x1c4/0x230 [ 1230.586356][T32319] ? snprintf+0xd6/0x120 [ 1230.590567][T32319] ? vscnprintf+0x80/0x80 [ 1230.594923][T32319] ? set_blocksize+0x1a5/0x3a0 [ 1230.599664][T32319] mount_bdev+0x22d/0x340 [ 1230.603968][T32319] ? ext4_mount+0x40/0x40 [ 1230.608272][T32319] legacy_get_tree+0xde/0x170 [ 1230.612924][T32319] ? ext4_lazyinit_thread+0xd40/0xd40 [ 1230.618351][T32319] vfs_get_tree+0x83/0x260 [ 1230.622745][T32319] do_mount+0x19d0/0x2670 [ 1230.627096][T32319] ? copy_mount_string+0x30/0x30 [ 1230.632461][T32319] ? copy_mount_options+0x59/0x300 [ 1230.637561][T32319] ? kmem_cache_alloc_trace+0x139/0x2b0 [ 1230.643084][T32319] ? copy_mount_options+0x273/0x300 [ 1230.648259][T32319] ksys_mount+0xc2/0xf0 [ 1230.652387][T32319] __x64_sys_mount+0xb1/0xc0 [ 1230.657044][T32319] do_syscall_64+0xcb/0x1e0 [ 1230.661517][T32319] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1230.667384][T32319] RIP: 0033:0x7f2bd50b1c5a [ 1230.671959][T32319] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1230.691530][T32319] RSP: 002b:00007f2bd2e27fa8 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 1230.699911][T32319] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007f2bd50b1c5a [ 1230.707853][T32319] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007f2bd2e28000 [ 1230.715793][T32319] RBP: 00007f2bd2e28040 R08: 00007f2bd2e28040 R09: 0000000020000000 [ 1230.723748][T32319] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000020000000 [ 1230.731690][T32319] R13: 0000000020000100 R14: 00007f2bd2e28000 R15: 0000000020013000 [ 1230.740399][T32319] EXT4-fs (loop4): can't allocate buddy meta group [ 1230.747047][T32319] EXT4-fs (loop4): failed to initialize mballoc (-12) [ 1230.754401][T32319] EXT4-fs (loop4): mount failed 15:41:22 executing program 4 (fault-call:0 fault-nth:90): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4f203, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) 15:41:22 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4f203, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) 15:41:22 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4f203, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) 15:41:22 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4f203, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024", 0x29, 0x7e0}], 0x0, &(0x7f0000013000)) [ 1230.785593][T32318] EXT4-fs (loop3): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? [ 1230.816031][T32338] netlink: 88 bytes leftover after parsing attributes in process `syz-executor.5'. 15:41:22 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000cc0)=ANY=[@ANYBLOB="7800000010000507000000bc4b9ccfc900000000", @ANYRES32, @ANYBLOB="4518009effffff00500012800b0001006272696467650000400002800500250000000000060006008bbc00000800010013000000060009000020000005002b000700000005002b00810000000c002200010000000000000008000a00"], 0x78}}, 0x0) 15:41:22 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0xffffff81, &(0x7f00000004c0)={&(0x7f0000000cc0)=ANY=[@ANYBLOB="7800000010000507000000bc4b9ccfc900000000", @ANYRES32, @ANYBLOB="4518000000000000500012800b0001006272696467650000400002800500250000001100060006008bbc00000800010013000000060009000020000005002b000700000005002b00810000000c002200010000000000000008000a00"], 0x78}}, 0x0) 15:41:22 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4f203, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) 15:41:22 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000cc0)=ANY=[@ANYBLOB="7800000010000507000000bc4b9ccfc900000000", @ANYRES32, @ANYBLOB="4518000000000000502f12800b0001006272696467650000400002800500250000000000060006008bbc00000800"], 0x78}}, 0x0) [ 1230.838372][T32343] FAULT_INJECTION: forcing a failure. [ 1230.838372][T32343] name failslab, interval 1, probability 0, space 0, times 0 [ 1230.856622][T32343] CPU: 1 PID: 32343 Comm: syz-executor.4 Tainted: G W 5.4.125-syzkaller-00005-gb8b657d4d5e9 #0 [ 1230.868371][T32343] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1230.878417][T32343] Call Trace: [ 1230.881703][T32343] dump_stack+0x1d8/0x24e [ 1230.886037][T32343] ? devkmsg_release+0x11c/0x11c [ 1230.890969][T32343] ? show_regs_print_info+0x12/0x12 [ 1230.896163][T32343] should_fail+0x6f6/0x860 [ 1230.900574][T32343] ? setup_fault_attr+0x3d0/0x3d0 [ 1230.901514][T32351] EXT4-fs (loop3): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? [ 1230.906203][T32343] ? ext4_mb_init+0xe1/0x1330 [ 1230.906214][T32343] should_failslab+0x5/0x20 [ 1230.906231][T32343] __kmalloc+0x5f/0x2f0 [ 1230.929635][T32343] ? ext4_mb_init+0x80/0x1330 15:41:22 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4f203, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) 15:41:22 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4f203, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) 15:41:22 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4f203, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) 15:41:22 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4f203, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) [ 1230.934300][T32343] ? ext4_commit_super+0x8a4/0xa40 [ 1230.939404][T32343] ext4_mb_init+0xe1/0x1330 [ 1230.943899][T32343] ? __cleancache_init_fs+0x66/0xb0 [ 1230.949095][T32343] ext4_fill_super+0xbe97/0xeb30 [ 1230.954039][T32343] ? ext4_mount+0x40/0x40 [ 1230.958365][T32343] ? idr_replace+0x1c4/0x230 [ 1230.962947][T32343] ? snprintf+0xd6/0x120 [ 1230.967186][T32343] ? vscnprintf+0x80/0x80 [ 1230.971508][T32343] ? set_blocksize+0x1a5/0x3a0 [ 1230.976269][T32343] mount_bdev+0x22d/0x340 [ 1230.980596][T32343] ? ext4_mount+0x40/0x40 [ 1230.984917][T32343] legacy_get_tree+0xde/0x170 [ 1230.989592][T32343] ? ext4_lazyinit_thread+0xd40/0xd40 [ 1230.994991][T32343] vfs_get_tree+0x83/0x260 [ 1230.999398][T32343] do_mount+0x19d0/0x2670 [ 1231.003724][T32343] ? copy_mount_string+0x30/0x30 [ 1231.008647][T32343] ? copy_mount_options+0x59/0x300 [ 1231.013731][T32343] ? kmem_cache_alloc_trace+0x139/0x2b0 [ 1231.019255][T32343] ? copy_mount_options+0x273/0x300 [ 1231.024426][T32343] ksys_mount+0xc2/0xf0 [ 1231.028552][T32343] __x64_sys_mount+0xb1/0xc0 [ 1231.033112][T32343] do_syscall_64+0xcb/0x1e0 [ 1231.037587][T32343] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1231.043450][T32343] RIP: 0033:0x7f2bd50b1c5a [ 1231.047958][T32343] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1231.067569][T32343] RSP: 002b:00007f2bd2e27fa8 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 1231.075981][T32343] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007f2bd50b1c5a [ 1231.083924][T32343] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007f2bd2e28000 [ 1231.091882][T32343] RBP: 00007f2bd2e28040 R08: 00007f2bd2e28040 R09: 0000000020000000 [ 1231.099831][T32343] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000020000000 [ 1231.107775][T32343] R13: 0000000020000100 R14: 00007f2bd2e28000 R15: 0000000020013000 [ 1231.116962][T32343] EXT4-fs (loop4): failed to initialize mballoc (-12) [ 1231.123860][T32343] EXT4-fs (loop4): mount failed 15:41:23 executing program 4 (fault-call:0 fault-nth:91): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4f203, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d90000000f0000000100000000000000000000000020000000200000200000002cc4645f2cc4645f0100ffff53ef0100010000002cc4645f000000000000000001000000000000000b0000008000000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e3338363633343038350000000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000000000000000000000000000000000000d9ca5cac99fd4329af4dde786c1a5d13010040000c000000000000002cc4645f", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) 15:41:23 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4f203, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) 15:41:23 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4f203, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d90000000f00000001000000001c0000000000000020000000200000200000002cc4645f2cc4645f0100ffff53ef0100010000002cc4645f000000000000000001000000000000000b0000008000000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e3338363633343038350000000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000000000000000000000000000000000000d9ca5cac99fd4329af4dde786c1a5d13010040000c000000000000002cc4645f", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) [ 1231.140304][T32360] netlink: 88 bytes leftover after parsing attributes in process `syz-executor.5'. [ 1231.168984][T32351] EXT4-fs (loop3): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? [ 1231.205253][T32373] FAULT_INJECTION: forcing a failure. [ 1231.205253][T32373] name failslab, interval 1, probability 0, space 0, times 0 [ 1231.218426][T32373] CPU: 0 PID: 32373 Comm: syz-executor.4 Tainted: G W 5.4.125-syzkaller-00005-gb8b657d4d5e9 #0 [ 1231.230061][T32373] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1231.240098][T32373] Call Trace: [ 1231.243384][T32373] dump_stack+0x1d8/0x24e [ 1231.247697][T32373] ? devkmsg_release+0x11c/0x11c [ 1231.252725][T32373] ? show_regs_print_info+0x12/0x12 [ 1231.257895][T32373] should_fail+0x6f6/0x860 [ 1231.262284][T32373] ? setup_fault_attr+0x3d0/0x3d0 [ 1231.267278][T32373] ? ext4_alloc_inode+0x1d/0x620 [ 1231.272185][T32373] should_failslab+0x5/0x20 [ 1231.276659][T32373] kmem_cache_alloc+0x36/0x290 [ 1231.281580][T32373] ? kvmalloc_node+0x7e/0xf0 [ 1231.286165][T32373] ? set_qf_name+0x310/0x310 [ 1231.290727][T32373] ext4_alloc_inode+0x1d/0x620 [ 1231.295461][T32373] ? set_qf_name+0x310/0x310 [ 1231.300115][T32373] new_inode_pseudo+0x61/0x220 [ 1231.304848][T32373] new_inode+0x25/0x1d0 [ 1231.308978][T32373] ? ext4_mb_alloc_groupinfo+0x203/0x2d0 [ 1231.314603][T32373] ext4_mb_init+0xb76/0x1330 [ 1231.319167][T32373] ext4_fill_super+0xbe97/0xeb30 [ 1231.324078][T32373] ? ext4_mount+0x40/0x40 [ 1231.328374][T32373] ? idr_replace+0x1c4/0x230 [ 1231.332934][T32373] ? snprintf+0xd6/0x120 [ 1231.337145][T32373] ? vscnprintf+0x80/0x80 [ 1231.341471][T32373] ? set_blocksize+0x1a5/0x3a0 [ 1231.346206][T32373] mount_bdev+0x22d/0x340 [ 1231.350524][T32373] ? ext4_mount+0x40/0x40 [ 1231.354826][T32373] legacy_get_tree+0xde/0x170 [ 1231.359473][T32373] ? ext4_lazyinit_thread+0xd40/0xd40 [ 1231.364961][T32373] vfs_get_tree+0x83/0x260 [ 1231.369477][T32373] do_mount+0x19d0/0x2670 [ 1231.373965][T32373] ? copy_mount_string+0x30/0x30 [ 1231.378876][T32373] ? copy_mount_options+0x59/0x300 [ 1231.383956][T32373] ? copy_mount_options+0x59/0x300 [ 1231.389046][T32373] ? kmem_cache_alloc_trace+0x139/0x2b0 [ 1231.394562][T32373] ? copy_mount_options+0x273/0x300 [ 1231.399731][T32373] ksys_mount+0xc2/0xf0 [ 1231.403880][T32373] __x64_sys_mount+0xb1/0xc0 [ 1231.408441][T32373] do_syscall_64+0xcb/0x1e0 [ 1231.412934][T32373] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1231.418883][T32373] RIP: 0033:0x7f2bd50b1c5a [ 1231.423283][T32373] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1231.442867][T32373] RSP: 002b:00007f2bd2e27fa8 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 1231.451248][T32373] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007f2bd50b1c5a [ 1231.459190][T32373] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007f2bd2e28000 [ 1231.467230][T32373] RBP: 00007f2bd2e28040 R08: 00007f2bd2e28040 R09: 0000000020000000 [ 1231.475171][T32373] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000020000000 [ 1231.483121][T32373] R13: 0000000020000100 R14: 00007f2bd2e28000 R15: 0000000020013000 [ 1231.493130][T32373] EXT4-fs (loop4): can't get new inode [ 1231.498691][T32373] EXT4-fs (loop4): failed to initialize mballoc (-12) 15:41:23 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4f203, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024", 0x29, 0x7e0}], 0x0, &(0x7f0000013000)) 15:41:23 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000cc0)=ANY=[@ANYBLOB="7800000010000507000000bc4b9ccfc900000000", @ANYRES32, @ANYBLOB="451800eaffffff00500012800b0001006272696467650000400002800500250000000000060006008bbc00000800010013000000060009000020000005002b000700000005002b00810000000c002200010000000000000008000a00"], 0x78}}, 0x0) 15:41:23 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4f203, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) 15:41:23 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000cc0)=ANY=[@ANYBLOB="7800000010000507000000bc4b9ccfc900000000", @ANYRES32, @ANYBLOB="4518000000000000503a12800b0001006272696467650000400002800500250000000000060006008bbc00000800"], 0x78}}, 0x0) 15:41:23 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0xffffff81, &(0x7f00000004c0)={&(0x7f0000000cc0)=ANY=[@ANYBLOB="7800000010000507000000bc4b9ccfc900000000", @ANYRES32, @ANYBLOB="4518000000000000500012800b0001006272696467650000400002800500250000001200060006008bbc00000800010013000000060009000020000005002b000700000005002b00810000000c002200010000000000000008000a00"], 0x78}}, 0x0) 15:41:23 executing program 4 (fault-call:0 fault-nth:92): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4f203, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) [ 1231.512475][T32373] EXT4-fs (loop4): mount failed 15:41:23 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0xffffff81, &(0x7f00000004c0)={&(0x7f0000000cc0)=ANY=[@ANYBLOB="7800000010000507000000bc4b9ccfc900000000", @ANYRES32, @ANYBLOB="4518000000000000500012800b0001006272696467650000400002800500250000001e00060006008bbc00000800010013000000060009000020000005002b000700000005002b00810000000c002200010000000000000008000a00"], 0x78}}, 0x0) 15:41:23 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4f203, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) 15:41:23 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000cc0)=ANY=[@ANYBLOB="7800000010000507000000bc4b9ccfc900000000", @ANYRES32, @ANYBLOB="4518000000000000503c12800b0001006272696467650000400002800500250000000000060006008bbc00000800"], 0x78}}, 0x0) [ 1231.564781][T32379] EXT4-fs (loop3): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? [ 1231.585666][T32387] FAULT_INJECTION: forcing a failure. [ 1231.585666][T32387] name failslab, interval 1, probability 0, space 0, times 0 15:41:23 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4f203, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024", 0x29, 0x7e0}], 0x0, &(0x7f0000013000)) [ 1231.613817][T32387] CPU: 0 PID: 32387 Comm: syz-executor.4 Tainted: G W 5.4.125-syzkaller-00005-gb8b657d4d5e9 #0 [ 1231.625452][T32387] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1231.635709][T32387] Call Trace: [ 1231.638986][T32387] dump_stack+0x1d8/0x24e [ 1231.643319][T32387] ? devkmsg_release+0x11c/0x11c [ 1231.648234][T32387] ? show_regs_print_info+0x12/0x12 [ 1231.653405][T32387] should_fail+0x6f6/0x860 [ 1231.657793][T32387] ? setup_fault_attr+0x3d0/0x3d0 [ 1231.663112][T32387] ? security_inode_alloc+0x32/0x1d0 [ 1231.668424][T32387] ? ext4_mb_add_groupinfo+0x13c/0x760 [ 1231.673869][T32387] should_failslab+0x5/0x20 [ 1231.678349][T32387] __kmalloc+0x5f/0x2f0 [ 1231.682481][T32387] ? __rcu_read_lock+0x50/0x50 [ 1231.687218][T32387] ext4_mb_add_groupinfo+0x13c/0x760 [ 1231.692493][T32387] ? ext4_get_group_desc+0x253/0x2a0 [ 1231.698531][T32387] ext4_mb_init+0xc45/0x1330 [ 1231.703096][T32387] ext4_fill_super+0xbe97/0xeb30 [ 1231.708011][T32387] ? ext4_mount+0x40/0x40 [ 1231.712314][T32387] ? idr_replace+0x1c4/0x230 [ 1231.716871][T32387] ? snprintf+0xd6/0x120 [ 1231.721094][T32387] ? vscnprintf+0x80/0x80 [ 1231.725395][T32387] ? set_blocksize+0x1a5/0x3a0 [ 1231.730142][T32387] mount_bdev+0x22d/0x340 [ 1231.734450][T32387] ? ext4_mount+0x40/0x40 [ 1231.738759][T32387] legacy_get_tree+0xde/0x170 [ 1231.743421][T32387] ? ext4_lazyinit_thread+0xd40/0xd40 [ 1231.748768][T32387] vfs_get_tree+0x83/0x260 [ 1231.753157][T32387] do_mount+0x19d0/0x2670 [ 1231.757491][T32387] ? copy_mount_string+0x30/0x30 [ 1231.762398][T32387] ? copy_mount_options+0x59/0x300 [ 1231.767477][T32387] ? copy_mount_options+0x59/0x300 [ 1231.772573][T32387] ? kmem_cache_alloc_trace+0x139/0x2b0 [ 1231.778094][T32387] ? copy_mount_options+0x273/0x300 [ 1231.783266][T32387] ksys_mount+0xc2/0xf0 [ 1231.787400][T32387] __x64_sys_mount+0xb1/0xc0 [ 1231.791961][T32387] do_syscall_64+0xcb/0x1e0 [ 1231.796439][T32387] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1231.802300][T32387] RIP: 0033:0x7f2bd50b1c5a [ 1231.806685][T32387] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1231.826260][T32387] RSP: 002b:00007f2bd2e27fa8 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 1231.834639][T32387] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007f2bd50b1c5a [ 1231.842579][T32387] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007f2bd2e28000 [ 1231.850522][T32387] RBP: 00007f2bd2e28040 R08: 00007f2bd2e28040 R09: 0000000020000000 15:41:23 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4f203, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) 15:41:23 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000cc0)=ANY=[@ANYBLOB="7800000010000507000000bc4b9ccfc900000000", @ANYRES32, @ANYBLOB="4518000000000000504812800b0001006272696467650000400002800500250000000000060006008bbc00000800"], 0x78}}, 0x0) 15:41:23 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4f203, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) [ 1231.858466][T32387] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000020000000 [ 1231.866411][T32387] R13: 0000000020000100 R14: 00007f2bd2e28000 R15: 0000000020013000 [ 1231.874485][T32387] EXT4-fs (loop4): can't allocate mem for a buddy group [ 1231.881508][T32387] EXT4-fs (loop4): failed to initialize mballoc (-12) [ 1231.888279][T32387] EXT4-fs (loop4): mount failed 15:41:23 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000cc0)=ANY=[@ANYBLOB="7800000010000507000000bc4b9ccfc900000000", @ANYRES32, @ANYBLOB="451800efffffff00500012800b0001006272696467650000400002800500250000000000060006008bbc00000800010013000000060009000020000005002b000700000005002b00810000000c002200010000000000000008000a00"], 0x78}}, 0x0) 15:41:23 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4f203, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d90000000f00000001000000003f0000000000000020000000200000200000002cc4645f2cc4645f0100ffff53ef0100010000002cc4645f000000000000000001000000000000000b0000008000000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e3338363633343038350000000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000000000000000000000000000000000000d9ca5cac99fd4329af4dde786c1a5d13010040000c000000000000002cc4645f", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) 15:41:23 executing program 4 (fault-call:0 fault-nth:93): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4f203, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) 15:41:23 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0xffffff81, &(0x7f00000004c0)={&(0x7f0000000cc0)=ANY=[@ANYBLOB="7800000010000507000000bc4b9ccfc900000000", @ANYRES32, @ANYBLOB="4518000000000000500012800b0001006272696467650000400002800500250000001f00060006008bbc00000800010013000000060009000020000005002b000700000005002b00810000000c002200010000000000000008000a00"], 0x78}}, 0x0) 15:41:23 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000cc0)=ANY=[@ANYBLOB="7800000010000507000000bc4b9ccfc900000000", @ANYRES32, @ANYBLOB="4518000000000000504c12800b0001006272696467650000400002800500250000000000060006008bbc00000800"], 0x78}}, 0x0) 15:41:23 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4f203, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) 15:41:23 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4f203, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) [ 1231.952488][T32406] EXT4-fs (loop3): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? [ 1231.991778][T32406] EXT4-fs (loop3): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? 15:41:23 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4f203, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) 15:41:23 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4f203, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c4c0000d90000000f0000000100000000000000000000000020000000200000200000002cc4645f2cc4645f0100ffff53ef0100010000002cc4645f000000000000000001000000000000000b0000008000000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e3338363633343038350000000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000000000000000000000000000000000000d9ca5cac99fd4329af4dde786c1a5d13010040000c000000000000002cc4645f", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024", 0x29, 0x7e0}], 0x0, &(0x7f0000013000)) 15:41:23 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0xffffff81, &(0x7f00000004c0)={&(0x7f0000000cc0)=ANY=[@ANYBLOB="7800000010000507000000bc4b9ccfc900000000", @ANYRES32, @ANYBLOB="4518000000000000500012800b0001006272696467650000400002800500250000002500060006008bbc00000800010013000000060009000020000005002b000700000005002b00810000000c002200010000000000000008000a00"], 0x78}}, 0x0) 15:41:23 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4f203, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) [ 1232.067286][T32414] FAULT_INJECTION: forcing a failure. [ 1232.067286][T32414] name failslab, interval 1, probability 0, space 0, times 0 [ 1232.076061][T32427] EXT4-fs (loop3): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? [ 1232.089066][T32414] CPU: 1 PID: 32414 Comm: syz-executor.4 Tainted: G W 5.4.125-syzkaller-00005-gb8b657d4d5e9 #0 [ 1232.101676][T32414] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1232.111724][T32414] Call Trace: 15:41:23 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4f203, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c600000d90000000f0000000100000000000000000000000020000000200000200000002cc4645f2cc4645f0100ffff53ef0100010000002cc4645f000000000000000001000000000000000b0000008000000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e3338363633343038350000000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000000000000000000000000000000000000d9ca5cac99fd4329af4dde786c1a5d13010040000c000000000000002cc4645f", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024", 0x29, 0x7e0}], 0x0, &(0x7f0000013000)) [ 1232.115012][T32414] dump_stack+0x1d8/0x24e [ 1232.119335][T32414] ? devkmsg_release+0x11c/0x11c [ 1232.124268][T32414] ? show_regs_print_info+0x12/0x12 [ 1232.129463][T32414] should_fail+0x6f6/0x860 [ 1232.133883][T32414] ? setup_fault_attr+0x3d0/0x3d0 [ 1232.138902][T32414] ? security_inode_alloc+0x32/0x1d0 [ 1232.144181][T32414] should_failslab+0x5/0x20 [ 1232.148679][T32414] kmem_cache_alloc+0x36/0x290 [ 1232.153436][T32414] ? from_kuid_munged+0x3b0/0x3b0 [ 1232.158445][T32414] security_inode_alloc+0x32/0x1d0 [ 1232.163536][T32414] inode_init_always+0x387/0x810 [ 1232.168449][T32414] ? set_qf_name+0x310/0x310 [ 1232.173019][T32414] new_inode_pseudo+0x90/0x220 [ 1232.177759][T32414] new_inode+0x25/0x1d0 [ 1232.181889][T32414] ? ext4_mb_alloc_groupinfo+0x203/0x2d0 [ 1232.187494][T32414] ext4_mb_init+0xb76/0x1330 [ 1232.192081][T32414] ext4_fill_super+0xbe97/0xeb30 [ 1232.197025][T32414] ? ext4_mount+0x40/0x40 [ 1232.201335][T32414] ? idr_replace+0x1c4/0x230 [ 1232.205899][T32414] ? snprintf+0xd6/0x120 [ 1232.210114][T32414] ? vscnprintf+0x80/0x80 [ 1232.214417][T32414] ? set_blocksize+0x1a5/0x3a0 [ 1232.219155][T32414] mount_bdev+0x22d/0x340 [ 1232.223458][T32414] ? ext4_mount+0x40/0x40 [ 1232.227768][T32414] legacy_get_tree+0xde/0x170 [ 1232.232417][T32414] ? ext4_lazyinit_thread+0xd40/0xd40 [ 1232.237763][T32414] vfs_get_tree+0x83/0x260 [ 1232.242157][T32414] do_mount+0x19d0/0x2670 [ 1232.246461][T32414] ? copy_mount_string+0x30/0x30 [ 1232.251374][T32414] ? copy_mount_options+0x59/0x300 [ 1232.256455][T32414] ? copy_mount_options+0x59/0x300 [ 1232.261547][T32414] ? kmem_cache_alloc_trace+0x139/0x2b0 [ 1232.267064][T32414] ? copy_mount_options+0x273/0x300 [ 1232.272236][T32414] ksys_mount+0xc2/0xf0 [ 1232.276369][T32414] __x64_sys_mount+0xb1/0xc0 [ 1232.281473][T32414] do_syscall_64+0xcb/0x1e0 [ 1232.285950][T32414] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1232.291816][T32414] RIP: 0033:0x7f2bd50b1c5a [ 1232.296207][T32414] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1232.315780][T32414] RSP: 002b:00007f2bd2e27fa8 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 1232.324163][T32414] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007f2bd50b1c5a [ 1232.332107][T32414] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007f2bd2e28000 [ 1232.340049][T32414] RBP: 00007f2bd2e28040 R08: 00007f2bd2e28040 R09: 0000000020000000 [ 1232.347990][T32414] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000020000000 [ 1232.355933][T32414] R13: 0000000020000100 R14: 00007f2bd2e28000 R15: 0000000020013000 [ 1232.365458][T32414] EXT4-fs (loop4): can't get new inode [ 1232.371385][T32414] EXT4-fs (loop4): failed to initialize mballoc (-12) [ 1232.378258][T32414] EXT4-fs (loop4): mount failed 15:41:24 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000cc0)=ANY=[@ANYBLOB="7800000010000507000000bc4b9ccfc900000000", @ANYRES32, @ANYBLOB="451800f0ffffff00500012800b0001006272696467650000400002800500250000000000060006008bbc00000800010013000000060009000020000005002b000700000005002b00810000000c002200010000000000000008000a00"], 0x78}}, 0x0) 15:41:24 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4f203, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) 15:41:24 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4f203, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024", 0x29, 0x7e0}], 0x0, &(0x7f0000013000)) 15:41:24 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000cc0)=ANY=[@ANYBLOB="7800000010000507000000bc4b9ccfc900000000", @ANYRES32, @ANYBLOB="4518000000000000506012800b0001006272696467650000400002800500250000000000060006008bbc00000800"], 0x78}}, 0x0) 15:41:24 executing program 4 (fault-call:0 fault-nth:94): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4f203, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d90000000f0000000100000000000000000000000020000000200000200000002cc4645f2cc4645f0100ffff53ef0100010000002cc4645f000000000000000001000000000000000b0000008000000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e3338363633343038350000000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000000000000000000000000000000000000d9ca5cac99fd4329af4dde786c1a5d13010040000c000000000000002cc4645f", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) 15:41:24 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0xffffff81, &(0x7f00000004c0)={&(0x7f0000000cc0)=ANY=[@ANYBLOB="7800000010000507000000bc4b9ccfc900000000", @ANYRES32, @ANYBLOB="4518000000000000500012800b0001006272696467650000400002800500250000002f00060006008bbc00000800010013000000060009000020000005002b000700000005002b00810000000c002200010000000000000008000a00"], 0x78}}, 0x0) 15:41:24 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4f203, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d90000000f0000000100000000002000000000000020000000200000200000002cc4645f2cc4645f0100ffff53ef0100010000002cc4645f000000000000000001000000000000000b0000008000000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e3338363633343038350000000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000000000000000000000000000000000000d9ca5cac99fd4329af4dde786c1a5d13010040000c000000000000002cc4645f", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) 15:41:24 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4f203, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024", 0x29, 0x7e0}], 0x0, &(0x7f0000013000)) 15:41:24 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000cc0)=ANY=[@ANYBLOB="7800000010000507000000bc4b9ccfc900000000", @ANYRES32, @ANYBLOB="4518000000000000506812800b0001006272696467650000400002800500250000000000060006008bbc00000800"], 0x78}}, 0x0) 15:41:24 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4f203, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) [ 1232.481747][T32442] EXT4-fs (loop3): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? [ 1232.512276][T32446] FAULT_INJECTION: forcing a failure. [ 1232.512276][T32446] name failslab, interval 1, probability 0, space 0, times 0 [ 1232.543752][T32446] CPU: 0 PID: 32446 Comm: syz-executor.4 Tainted: G W 5.4.125-syzkaller-00005-gb8b657d4d5e9 #0 [ 1232.555394][T32446] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1232.565013][T32460] EXT4-fs (loop3): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? [ 1232.565440][T32446] Call Trace: [ 1232.578864][T32446] dump_stack+0x1d8/0x24e [ 1232.583178][T32446] ? devkmsg_release+0x11c/0x11c [ 1232.588133][T32446] ? show_regs_print_info+0x12/0x12 [ 1232.593306][T32446] should_fail+0x6f6/0x860 [ 1232.597701][T32446] ? setup_fault_attr+0x3d0/0x3d0 [ 1232.602709][T32446] ? __rcu_read_lock+0x50/0x50 [ 1232.607455][T32446] ? ext4_mb_add_groupinfo+0x24e/0x760 [ 1232.613934][T32446] should_failslab+0x5/0x20 [ 1232.618454][T32446] kmem_cache_alloc+0x36/0x290 [ 1232.623189][T32446] ext4_mb_add_groupinfo+0x24e/0x760 [ 1232.628446][T32446] ext4_mb_init+0xc45/0x1330 [ 1232.633009][T32446] ext4_fill_super+0xbe97/0xeb30 [ 1232.637920][T32446] ? ext4_mount+0x40/0x40 [ 1232.642217][T32446] ? idr_replace+0x1c4/0x230 [ 1232.646784][T32446] ? snprintf+0xd6/0x120 [ 1232.650994][T32446] ? vscnprintf+0x80/0x80 [ 1232.655312][T32446] ? set_blocksize+0x1a5/0x3a0 [ 1232.660050][T32446] mount_bdev+0x22d/0x340 [ 1232.664354][T32446] ? ext4_mount+0x40/0x40 [ 1232.668665][T32446] legacy_get_tree+0xde/0x170 [ 1232.673324][T32446] ? ext4_lazyinit_thread+0xd40/0xd40 [ 1232.678666][T32446] vfs_get_tree+0x83/0x260 [ 1232.683088][T32446] do_mount+0x19d0/0x2670 [ 1232.687389][T32446] ? copy_mount_string+0x30/0x30 [ 1232.692293][T32446] ? copy_mount_options+0x59/0x300 [ 1232.697384][T32446] ? copy_mount_options+0x59/0x300 [ 1232.702471][T32446] ? kmem_cache_alloc_trace+0x139/0x2b0 [ 1232.707985][T32446] ? copy_mount_options+0x273/0x300 [ 1232.713153][T32446] ksys_mount+0xc2/0xf0 [ 1232.717278][T32446] __x64_sys_mount+0xb1/0xc0 [ 1232.721850][T32446] do_syscall_64+0xcb/0x1e0 [ 1232.726325][T32446] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1232.732185][T32446] RIP: 0033:0x7f2bd50b1c5a [ 1232.736572][T32446] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1232.756345][T32446] RSP: 002b:00007f2bd2e27fa8 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 1232.764726][T32446] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007f2bd50b1c5a [ 1232.772761][T32446] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007f2bd2e28000 [ 1232.780706][T32446] RBP: 00007f2bd2e28040 R08: 00007f2bd2e28040 R09: 0000000020000000 15:41:24 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4f203, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) 15:41:24 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0xffffff81, &(0x7f00000004c0)={&(0x7f0000000cc0)=ANY=[@ANYBLOB="7800000010000507000000bc4b9ccfc900000000", @ANYRES32, @ANYBLOB="4518000000000000500012800b0001006272696467650000400002800500250000003a00060006008bbc00000800010013000000060009000020000005002b000700000005002b00810000000c002200010000000000000008000a00"], 0x78}}, 0x0) [ 1232.788658][T32446] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000020000000 [ 1232.796598][T32446] R13: 0000000020000100 R14: 00007f2bd2e28000 R15: 0000000020013000 [ 1232.814345][T32446] EXT4-fs (loop4): can't allocate buddy mem [ 1232.830563][T32446] EXT4-fs (loop4): failed to initialize mballoc (-12) [ 1232.838806][T32446] EXT4-fs (loop4): mount failed [ 1232.845096][T32460] EXT4-fs (loop3): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? 15:41:24 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000cc0)=ANY=[@ANYBLOB="7800000010000507000000bc4b9ccfc900000000", @ANYRES32, @ANYBLOB="451800feffffff00500012800b0001006272696467650000400002800500250000000000060006008bbc00000800010013000000060009000020000005002b000700000005002b00810000000c002200010000000000000008000a00"], 0x78}}, 0x0) 15:41:24 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4f203, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d90000000f0000000100000000000402000000000020000000200000200000002cc4645f2cc4645f0100ffff53ef0100010000002cc4645f000000000000000001000000000000000b0000008000000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e3338363633343038350000000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000000000000000000000000000000000000d9ca5cac99fd4329af4dde786c1a5d13010040000c000000000000002cc4645f", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) 15:41:24 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000cc0)=ANY=[@ANYBLOB="7800000010000507000000bc4b9ccfc900000000", @ANYRES32, @ANYBLOB="4518000000000000506c12800b0001006272696467650000400002800500250000000000060006008bbc00000800"], 0x78}}, 0x0) 15:41:24 executing program 4 (fault-call:0 fault-nth:95): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4f203, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) 15:41:24 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4f203, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024", 0x29, 0x7e0}], 0x0, &(0x7f0000013000)) 15:41:24 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0xffffff81, &(0x7f00000004c0)={&(0x7f0000000cc0)=ANY=[@ANYBLOB="7800000010000507000000bc4b9ccfc900000000", @ANYRES32, @ANYBLOB="4518000000000000500012800b0001006272696467650000400002800500250000003c00060006008bbc00000800010013000000060009000020000005002b000700000005002b00810000000c002200010000000000000008000a00"], 0x78}}, 0x0) 15:41:24 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4f203, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024", 0x29, 0x7e0}], 0x0, &(0x7f0000013000)) 15:41:24 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4f203, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) 15:41:24 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000cc0)=ANY=[@ANYBLOB="7800000010000507000000bc4b9ccfc900000000", @ANYRES32, @ANYBLOB="4518000000000000507412800b0001006272696467650000400002800500250000000000060006008bbc00000800"], 0x78}}, 0x0) [ 1233.002490][T32476] EXT4-fs (loop3): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? [ 1233.031352][T32482] FAULT_INJECTION: forcing a failure. [ 1233.031352][T32482] name failslab, interval 1, probability 0, space 0, times 0 15:41:24 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0xffffff81, &(0x7f00000004c0)={&(0x7f0000000cc0)=ANY=[@ANYBLOB="7800000010000507000000bc4b9ccfc900000000", @ANYRES32, @ANYBLOB="4518000000000000500012800b0001006272696467650000400002800500250000004000060006008bbc00000800010013000000060009000020000005002b000700000005002b00810000000c002200010000000000000008000a00"], 0x78}}, 0x0) 15:41:24 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4f203, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) 15:41:24 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4f203, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d90000000f0000000100000000000004000000000020000000200000200000002cc4645f2cc4645f0100ffff53ef0100010000002cc4645f000000000000000001000000000000000b0000008000000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e3338363633343038350000000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000000000000000000000000000000000000d9ca5cac99fd4329af4dde786c1a5d13010040000c000000000000002cc4645f", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) [ 1233.048117][T32482] CPU: 0 PID: 32482 Comm: syz-executor.4 Tainted: G W 5.4.125-syzkaller-00005-gb8b657d4d5e9 #0 [ 1233.059756][T32482] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1233.069804][T32482] Call Trace: [ 1233.073091][T32482] dump_stack+0x1d8/0x24e [ 1233.077418][T32482] ? devkmsg_release+0x11c/0x11c [ 1233.082349][T32482] ? __kasan_kmalloc+0x1a3/0x1e0 [ 1233.087279][T32482] ? show_regs_print_info+0x12/0x12 [ 1233.092480][T32482] ? __kmalloc+0x174/0x2f0 [ 1233.096895][T32482] ? kvmalloc_node+0x7e/0xf0 [ 1233.101483][T32482] ? ext4_alloc_flex_bg_array+0x164/0x470 [ 1233.107193][T32482] ? mount_bdev+0x22d/0x340 [ 1233.111693][T32482] ? legacy_get_tree+0xde/0x170 [ 1233.116538][T32482] ? vfs_get_tree+0x83/0x260 [ 1233.121118][T32482] ? do_mount+0x19d0/0x2670 [ 1233.125615][T32482] should_fail+0x6f6/0x860 [ 1233.130039][T32482] ? setup_fault_attr+0x3d0/0x3d0 [ 1233.135234][T32482] ? kobject_set_name_vargs+0x5d/0x110 [ 1233.140688][T32482] should_failslab+0x5/0x20 [ 1233.145188][T32482] __kmalloc_track_caller+0x5d/0x2e0 [ 1233.146233][T32499] EXT4-fs (loop3): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? [ 1233.150470][T32482] kstrdup_const+0x51/0x90 [ 1233.150480][T32482] kobject_set_name_vargs+0x5d/0x110 [ 1233.150488][T32482] kobject_init_and_add+0xdb/0x190 [ 1233.150497][T32482] ? kvmalloc_node+0x7e/0xf0 [ 1233.150504][T32482] ? kobject_add+0x210/0x210 [ 1233.150512][T32482] ? mutex_lock+0xa6/0x110 [ 1233.150528][T32482] ext4_register_sysfs+0xa8/0x210 [ 1233.194536][T32482] ext4_fill_super+0xc93f/0xeb30 [ 1233.199484][T32482] ? ext4_mount+0x40/0x40 [ 1233.203802][T32482] ? idr_replace+0x1c4/0x230 [ 1233.208422][T32482] ? snprintf+0xd6/0x120 [ 1233.212647][T32482] ? vscnprintf+0x80/0x80 [ 1233.216973][T32482] ? set_blocksize+0x1a5/0x3a0 [ 1233.221762][T32482] mount_bdev+0x22d/0x340 [ 1233.226071][T32482] ? ext4_mount+0x40/0x40 [ 1233.230376][T32482] legacy_get_tree+0xde/0x170 [ 1233.235032][T32482] ? ext4_lazyinit_thread+0xd40/0xd40 [ 1233.240386][T32482] vfs_get_tree+0x83/0x260 [ 1233.244781][T32482] do_mount+0x19d0/0x2670 [ 1233.249191][T32482] ? copy_mount_string+0x30/0x30 [ 1233.254136][T32482] ? copy_mount_options+0x59/0x300 [ 1233.259231][T32482] ? copy_mount_options+0x59/0x300 [ 1233.264319][T32482] ? kmem_cache_alloc_trace+0x139/0x2b0 [ 1233.269842][T32482] ? copy_mount_options+0x273/0x300 [ 1233.275027][T32482] ksys_mount+0xc2/0xf0 [ 1233.279343][T32482] __x64_sys_mount+0xb1/0xc0 [ 1233.283909][T32482] do_syscall_64+0xcb/0x1e0 [ 1233.288408][T32482] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1233.294285][T32482] RIP: 0033:0x7f2bd50b1c5a [ 1233.298803][T32482] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1233.318385][T32482] RSP: 002b:00007f2bd2e27fa8 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 1233.326780][T32482] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007f2bd50b1c5a [ 1233.334726][T32482] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007f2bd2e28000 [ 1233.342671][T32482] RBP: 00007f2bd2e28040 R08: 00007f2bd2e28040 R09: 0000000020000000 [ 1233.350625][T32482] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000020000000 [ 1233.358570][T32482] R13: 0000000020000100 R14: 00007f2bd2e28000 R15: 0000000020013000 [ 1233.367548][T32482] kobject: can not set name properly! [ 1233.373040][T32482] EXT4-fs (loop4): mount failed 15:41:25 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000cc0)=ANY=[@ANYBLOB="7800000010000507000000bc4b9ccfc900000000", @ANYRES32, @ANYBLOB="4518000002000000500012800b0001006272696467650000400002800500250000000000060006008bbc00000800010013000000060009000020000005002b000700000005002b00810000000c002200010000000000000008000a00"], 0x78}}, 0x0) 15:41:25 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4f203, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) 15:41:25 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000cc0)=ANY=[@ANYBLOB="7800000010000507000000bc4b9ccfc900000000", @ANYRES32, @ANYBLOB="4518000000000000507a12800b0001006272696467650000400002800500250000000000060006008bbc00000800"], 0x78}}, 0x0) 15:41:25 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4f203, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000ce00000d90000000f0000000100000000000000000000000020000000200000200000002cc4645f2cc4645f0100ffff53ef0100010000002cc4645f000000000000000001000000000000000b0000008000000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e3338363633343038350000000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000000000000000000000000000000000000d9ca5cac99fd4329af4dde786c1a5d13010040000c000000000000002cc4645f", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024", 0x29, 0x7e0}], 0x0, &(0x7f0000013000)) 15:41:25 executing program 4 (fault-call:0 fault-nth:96): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4f203, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) 15:41:25 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0xffffff81, &(0x7f00000004c0)={&(0x7f0000000cc0)=ANY=[@ANYBLOB="7800000010000507000000bc4b9ccfc900000000", @ANYRES32, @ANYBLOB="4518000000000000500012800b0001006272696467650000400002800500250000004800060006008bbc00000800010013000000060009000020000005002b000700000005002b00810000000c002200010000000000000008000a00"], 0x78}}, 0x0) [ 1233.438127][T32499] EXT4-fs (loop3): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? 15:41:25 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4f203, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) 15:41:25 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4f203, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) [ 1233.509177][T32518] EXT4-fs (loop3): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? [ 1233.527214][T32510] FAULT_INJECTION: forcing a failure. [ 1233.527214][T32510] name failslab, interval 1, probability 0, space 0, times 0 [ 1233.542995][T32510] CPU: 0 PID: 32510 Comm: syz-executor.4 Tainted: G W 5.4.125-syzkaller-00005-gb8b657d4d5e9 #0 15:41:25 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4f203, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) 15:41:25 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4f203, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) 15:41:25 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4f203, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d90000000f0000000100000000000009000000000020000000200000200000002cc4645f2cc4645f0100ffff53ef0100010000002cc4645f000000000000000001000000000000000b0000008000000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e3338363633343038350000000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000000000000000000000000000000000000d9ca5cac99fd4329af4dde786c1a5d13010040000c000000000000002cc4645f", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) [ 1233.554632][T32510] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1233.564674][T32510] Call Trace: [ 1233.567964][T32510] dump_stack+0x1d8/0x24e [ 1233.572289][T32510] ? devkmsg_release+0x11c/0x11c [ 1233.577220][T32510] ? __kasan_kmalloc+0x1a3/0x1e0 [ 1233.582152][T32510] ? show_regs_print_info+0x12/0x12 [ 1233.587349][T32510] ? __kmalloc+0x174/0x2f0 [ 1233.591761][T32510] ? kvmalloc_node+0x7e/0xf0 [ 1233.596344][T32510] ? ext4_alloc_flex_bg_array+0x164/0x470 [ 1233.602057][T32510] ? mount_bdev+0x22d/0x340 15:41:25 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4f203, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) [ 1233.606553][T32510] ? legacy_get_tree+0xde/0x170 [ 1233.611393][T32510] ? vfs_get_tree+0x83/0x260 [ 1233.615975][T32510] ? do_mount+0x19d0/0x2670 [ 1233.620502][T32510] should_fail+0x6f6/0x860 [ 1233.624904][T32510] ? setup_fault_attr+0x3d0/0x3d0 [ 1233.629906][T32510] ? kobject_set_name_vargs+0x5d/0x110 [ 1233.635642][T32510] should_failslab+0x5/0x20 [ 1233.640131][T32510] __kmalloc_track_caller+0x5d/0x2e0 [ 1233.645397][T32510] kstrdup_const+0x51/0x90 [ 1233.649788][T32510] kobject_set_name_vargs+0x5d/0x110 [ 1233.655043][T32510] kobject_init_and_add+0xdb/0x190 [ 1233.660144][T32510] ? kvmalloc_node+0x7e/0xf0 [ 1233.664707][T32510] ? kobject_add+0x210/0x210 [ 1233.669276][T32510] ? mutex_lock+0xa6/0x110 [ 1233.673670][T32510] ext4_register_sysfs+0xa8/0x210 [ 1233.678675][T32510] ext4_fill_super+0xc93f/0xeb30 [ 1233.683590][T32510] ? ext4_mount+0x40/0x40 [ 1233.687943][T32510] ? idr_replace+0x1c4/0x230 [ 1233.692505][T32510] ? snprintf+0xd6/0x120 [ 1233.696715][T32510] ? vscnprintf+0x80/0x80 [ 1233.701013][T32510] ? set_blocksize+0x1a5/0x3a0 [ 1233.705748][T32510] mount_bdev+0x22d/0x340 [ 1233.710053][T32510] ? ext4_mount+0x40/0x40 [ 1233.714357][T32510] legacy_get_tree+0xde/0x170 [ 1233.719013][T32510] ? ext4_lazyinit_thread+0xd40/0xd40 [ 1233.724356][T32510] vfs_get_tree+0x83/0x260 [ 1233.728754][T32510] do_mount+0x19d0/0x2670 [ 1233.733054][T32510] ? copy_mount_string+0x30/0x30 [ 1233.737957][T32510] ? copy_mount_options+0x59/0x300 [ 1233.743040][T32510] ? copy_mount_options+0x59/0x300 [ 1233.748123][T32510] ? kmem_cache_alloc_trace+0x139/0x2b0 [ 1233.753649][T32510] ? copy_mount_options+0x273/0x300 [ 1233.758839][T32510] ksys_mount+0xc2/0xf0 [ 1233.762967][T32510] __x64_sys_mount+0xb1/0xc0 [ 1233.767528][T32510] do_syscall_64+0xcb/0x1e0 [ 1233.772088][T32510] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1233.777947][T32510] RIP: 0033:0x7f2bd50b1c5a [ 1233.782330][T32510] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1233.801908][T32510] RSP: 002b:00007f2bd2e27fa8 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 1233.810301][T32510] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007f2bd50b1c5a [ 1233.818243][T32510] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007f2bd2e28000 [ 1233.826198][T32510] RBP: 00007f2bd2e28040 R08: 00007f2bd2e28040 R09: 0000000020000000 [ 1233.834149][T32510] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000020000000 [ 1233.842099][T32510] R13: 0000000020000100 R14: 00007f2bd2e28000 R15: 0000000020013000 [ 1233.865461][T32510] kobject: can not set name properly! [ 1233.868001][T32518] EXT4-fs (loop3): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? [ 1233.870954][T32510] EXT4-fs (loop4): mount failed 15:41:25 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000cc0)=ANY=[@ANYBLOB="7800000010000507000000bc4b9ccfc900000000", @ANYRES32, @ANYBLOB="4518000003000000500012800b0001006272696467650000400002800500250000000000060006008bbc00000800010013000000060009000020000005002b000700000005002b00810000000c002200010000000000000008000a00"], 0x78}}, 0x0) 15:41:25 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4f203, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) 15:41:25 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000cc0)=ANY=[@ANYBLOB="7800000010000507000000bc4b9ccfc900000000", @ANYRES32, @ANYBLOB="4518000000000000509912800b0001006272696467650000400002800500250000000000060006008bbc00000800"], 0x78}}, 0x0) 15:41:25 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4f203, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024", 0x29, 0x7e0}], 0x0, &(0x7f0000013000)) 15:41:25 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0xffffff81, &(0x7f00000004c0)={&(0x7f0000000cc0)=ANY=[@ANYBLOB="7800000010000507000000bc4b9ccfc900000000", @ANYRES32, @ANYBLOB="4518000000000000500012800b0001006272696467650000400002800500250000004c00060006008bbc00000800010013000000060009000020000005002b000700000005002b00810000000c002200010000000000000008000a00"], 0x78}}, 0x0) 15:41:25 executing program 4 (fault-call:0 fault-nth:97): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4f203, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) 15:41:25 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4f203, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) 15:41:25 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000cc0)=ANY=[@ANYBLOB="7800000010000507000000bc4b9ccfc900000000", @ANYRES32, @ANYBLOB="451800000000000050d812800b0001006272696467650000400002800500250000000000060006008bbc00000800"], 0x78}}, 0x0) [ 1233.959879][T32537] __nla_validate_parse: 10 callbacks suppressed [ 1233.959886][T32537] netlink: 88 bytes leftover after parsing attributes in process `syz-executor.5'. 15:41:25 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4f203, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d90000000f000000010000000000000d000000000020000000200000200000002cc4645f2cc4645f0100ffff53ef0100010000002cc4645f000000000000000001000000000000000b0000008000000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e3338363633343038350000000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000000000000000000000000000000000000d9ca5cac99fd4329af4dde786c1a5d13010040000c000000000000002cc4645f", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) 15:41:25 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0xffffff81, &(0x7f00000004c0)={&(0x7f0000000cc0)=ANY=[@ANYBLOB="7800000010000507000000bc4b9ccfc900000000", @ANYRES32, @ANYBLOB="4518000000000000500012800b0001006272696467650000400002800500250000016000060006008bbc00000800010013000000060009000020000005002b000700000005002b00810000000c002200010000000000000008000a00"], 0x78}}, 0x0) 15:41:25 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4f203, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c020100d90000000f0000000100000000000000000000000020000000200000200000002cc4645f2cc4645f0100ffff53ef0100010000002cc4645f000000000000000001000000000000000b0000008000000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e3338363633343038350000000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000000000000000000000000000000000000d9ca5cac99fd4329af4dde786c1a5d13010040000c000000000000002cc4645f", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024", 0x29, 0x7e0}], 0x0, &(0x7f0000013000)) 15:41:25 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4f203, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) [ 1234.024792][T32548] EXT4-fs (loop3): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? [ 1234.060560][T32547] FAULT_INJECTION: forcing a failure. [ 1234.060560][T32547] name failslab, interval 1, probability 0, space 0, times 0 [ 1234.073233][T32547] CPU: 0 PID: 32547 Comm: syz-executor.4 Tainted: G W 5.4.125-syzkaller-00005-gb8b657d4d5e9 #0 [ 1234.084842][T32547] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1234.094889][T32547] Call Trace: [ 1234.098161][T32547] dump_stack+0x1d8/0x24e [ 1234.102571][T32547] ? devkmsg_release+0x11c/0x11c [ 1234.107531][T32547] ? unwind_get_return_address+0x48/0x80 [ 1234.113142][T32547] ? show_regs_print_info+0x12/0x12 [ 1234.118316][T32547] ? arch_stack_walk+0xf8/0x140 [ 1234.123141][T32547] should_fail+0x6f6/0x860 [ 1234.127535][T32547] ? setup_fault_attr+0x3d0/0x3d0 [ 1234.132553][T32547] ? stack_trace_snprint+0x150/0x150 [ 1234.137839][T32547] ? unwind_get_return_address+0x48/0x80 [ 1234.143442][T32547] ? arch_stack_walk+0xf8/0x140 [ 1234.148263][T32547] ? __kernfs_new_node+0x99/0x6d0 [ 1234.153270][T32547] should_failslab+0x5/0x20 [ 1234.157743][T32547] __kmalloc_track_caller+0x5d/0x2e0 [ 1234.162997][T32547] kstrdup_const+0x51/0x90 [ 1234.167386][T32547] __kernfs_new_node+0x99/0x6d0 [ 1234.172207][T32547] ? kobject_init_and_add+0xdb/0x190 [ 1234.177461][T32547] ? ext4_register_sysfs+0xa8/0x210 [ 1234.182628][T32547] ? legacy_get_tree+0xde/0x170 [ 1234.187446][T32547] ? vfs_get_tree+0x83/0x260 [ 1234.192005][T32547] ? do_mount+0x19d0/0x2670 [ 1234.196475][T32547] ? ksys_mount+0xc2/0xf0 [ 1234.200776][T32547] ? kernfs_new_node+0x160/0x160 [ 1234.205696][T32547] kernfs_create_dir_ns+0x90/0x220 [ 1234.210778][T32547] sysfs_create_dir_ns+0x181/0x390 [ 1234.215859][T32547] ? sysfs_warn_dup+0xa0/0xa0 [ 1234.220522][T32547] kobject_add_internal+0x595/0xbd0 [ 1234.225702][T32547] kobject_init_and_add+0x123/0x190 [ 1234.230881][T32547] ? kvmalloc_node+0x7e/0xf0 [ 1234.235440][T32547] ? kobject_add+0x210/0x210 [ 1234.240000][T32547] ? mutex_lock+0xa6/0x110 [ 1234.244385][T32547] ext4_register_sysfs+0xa8/0x210 [ 1234.249392][T32547] ext4_fill_super+0xc93f/0xeb30 [ 1234.254304][T32547] ? ext4_mount+0x40/0x40 [ 1234.258601][T32547] ? idr_replace+0x1c4/0x230 [ 1234.263160][T32547] ? snprintf+0xd6/0x120 [ 1234.267372][T32547] ? vscnprintf+0x80/0x80 [ 1234.271672][T32547] ? set_blocksize+0x1a5/0x3a0 [ 1234.276402][T32547] mount_bdev+0x22d/0x340 [ 1234.280706][T32547] ? ext4_mount+0x40/0x40 [ 1234.285003][T32547] legacy_get_tree+0xde/0x170 [ 1234.289668][T32547] ? ext4_lazyinit_thread+0xd40/0xd40 [ 1234.295018][T32547] vfs_get_tree+0x83/0x260 [ 1234.299407][T32547] do_mount+0x19d0/0x2670 [ 1234.303708][T32547] ? copy_mount_string+0x30/0x30 [ 1234.308630][T32547] ? copy_mount_options+0x59/0x300 [ 1234.313709][T32547] ? copy_mount_options+0x59/0x300 [ 1234.318792][T32547] ? kmem_cache_alloc_trace+0x139/0x2b0 [ 1234.324321][T32547] ? copy_mount_options+0x273/0x300 [ 1234.329486][T32547] ksys_mount+0xc2/0xf0 [ 1234.333615][T32547] __x64_sys_mount+0xb1/0xc0 [ 1234.338174][T32547] do_syscall_64+0xcb/0x1e0 [ 1234.342658][T32547] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1234.348525][T32547] RIP: 0033:0x7f2bd50b1c5a [ 1234.352910][T32547] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1234.372503][T32547] RSP: 002b:00007f2bd2e27fa8 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 1234.380894][T32547] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007f2bd50b1c5a [ 1234.388836][T32547] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007f2bd2e28000 [ 1234.396779][T32547] RBP: 00007f2bd2e28040 R08: 00007f2bd2e28040 R09: 0000000020000000 [ 1234.404722][T32547] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000020000000 [ 1234.412680][T32547] R13: 0000000020000100 R14: 00007f2bd2e28000 R15: 0000000020013000 [ 1234.422007][T32547] kobject_add_internal failed for loop4 (error: -12 parent: ext4) [ 1234.430362][T32547] EXT4-fs (loop4): mount failed [ 1234.442370][T32550] netlink: 88 bytes leftover after parsing attributes in process `syz-executor.5'. 15:41:26 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000cc0)=ANY=[@ANYBLOB="7800000010000507000000bc4b9ccfc900000000", @ANYRES32, @ANYBLOB="4518000004000000500012800b0001006272696467650000400002800500250000000000060006008bbc00000800010013000000060009000020000005002b000700000005002b00810000000c002200010000000000000008000a00"], 0x78}}, 0x0) 15:41:26 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4f203, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) 15:41:26 executing program 4 (fault-call:0 fault-nth:98): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4f203, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d90000000f0000000100000000000000000000000020000000200000200000002cc4645f2cc4645f0100ffff53ef0100010000002cc4645f000000000000000001000000000000000b0000008000000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e3338363633343038350000000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000000000000000000000000000000000000d9ca5cac99fd4329af4dde786c1a5d13010040000c000000000000002cc4645f", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) 15:41:26 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000cc0)=ANY=[@ANYBLOB="7800000010000507000000bc4b9ccfc900000000", @ANYRES32, @ANYBLOB="4518000000000000500033800b0001006272696467650000400002800500250000000000060006008bbc00000800"], 0x78}}, 0x0) 15:41:26 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4f203, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024", 0x29, 0x7e0}], 0x0, &(0x7f0000013000)) 15:41:26 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0xffffff81, &(0x7f00000004c0)={&(0x7f0000000cc0)=ANY=[@ANYBLOB="7800000010000507000000bc4b9ccfc900000000", @ANYRES32, @ANYBLOB="4518000000000000500012800b0001006272696467650000400002800500250000006800060006008bbc00000800010013000000060009000020000005002b000700000005002b00810000000c002200010000000000000008000a00"], 0x78}}, 0x0) [ 1234.486525][T32563] EXT4-fs (loop3): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? 15:41:26 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4f203, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) [ 1234.562825][T32573] netlink: 'syz-executor.5': attribute type 51 has an invalid length. [ 1234.572746][T32573] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.5'. [ 1234.583162][T32571] FAULT_INJECTION: forcing a failure. [ 1234.583162][T32571] name failslab, interval 1, probability 0, space 0, times 0 [ 1234.598591][T32571] CPU: 0 PID: 32571 Comm: syz-executor.4 Tainted: G W 5.4.125-syzkaller-00005-gb8b657d4d5e9 #0 15:41:26 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4f203, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d90000000f0000000100000000000012000000000020000000200000200000002cc4645f2cc4645f0100ffff53ef0100010000002cc4645f000000000000000001000000000000000b0000008000000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e3338363633343038350000000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000000000000000000000000000000000000d9ca5cac99fd4329af4dde786c1a5d13010040000c000000000000002cc4645f", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) [ 1234.607891][T32574] EXT4-fs (loop3): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? [ 1234.610214][T32571] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1234.610218][T32571] Call Trace: [ 1234.610234][T32571] dump_stack+0x1d8/0x24e [ 1234.610245][T32571] ? devkmsg_release+0x11c/0x11c [ 1234.610260][T32571] ? show_regs_print_info+0x12/0x12 [ 1234.648082][T32571] should_fail+0x6f6/0x860 [ 1234.652492][T32571] ? setup_fault_attr+0x3d0/0x3d0 [ 1234.657514][T32571] ? kvmalloc_node+0x7e/0xf0 15:41:26 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4f203, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) 15:41:26 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4f203, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) [ 1234.662095][T32571] should_failslab+0x5/0x20 [ 1234.666591][T32571] __kmalloc+0x5f/0x2f0 [ 1234.670757][T32571] ? kvmalloc_node+0x7e/0xf0 [ 1234.675320][T32571] ? pcpu_alloc+0xc8a/0x1180 [ 1234.679895][T32571] kvmalloc_node+0x7e/0xf0 [ 1234.684300][T32571] ext4_alloc_flex_bg_array+0x164/0x470 [ 1234.689843][T32571] ext4_fill_super+0xc9a5/0xeb30 [ 1234.694779][T32571] ? ext4_mount+0x40/0x40 [ 1234.699079][T32571] ? idr_replace+0x1c4/0x230 [ 1234.703637][T32571] ? snprintf+0xd6/0x120 [ 1234.707844][T32571] ? vscnprintf+0x80/0x80 [ 1234.712157][T32571] ? set_blocksize+0x1a5/0x3a0 [ 1234.716909][T32571] mount_bdev+0x22d/0x340 [ 1234.721225][T32571] ? ext4_mount+0x40/0x40 [ 1234.725538][T32571] legacy_get_tree+0xde/0x170 [ 1234.730187][T32571] ? ext4_lazyinit_thread+0xd40/0xd40 [ 1234.735531][T32571] vfs_get_tree+0x83/0x260 [ 1234.739929][T32571] do_mount+0x19d0/0x2670 [ 1234.744234][T32571] ? copy_mount_string+0x30/0x30 [ 1234.749142][T32571] ? copy_mount_options+0x59/0x300 [ 1234.754226][T32571] ? kmem_cache_alloc_trace+0x139/0x2b0 [ 1234.759740][T32571] ? copy_mount_options+0x273/0x300 [ 1234.764907][T32571] ksys_mount+0xc2/0xf0 [ 1234.769031][T32571] __x64_sys_mount+0xb1/0xc0 [ 1234.773590][T32571] do_syscall_64+0xcb/0x1e0 [ 1234.778063][T32571] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1234.784275][T32571] RIP: 0033:0x7f2bd50b1c5a [ 1234.788660][T32571] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 15:41:26 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4f203, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000013000)) 15:41:26 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000cc0)=ANY=[@ANYBLOB="7800000010000507000000bc4b9ccfc900000000", @ANYRES32, @ANYBLOB="4518000000000000500033800b0001006272696467650000400002800500250000000000060006008bbc00000800"], 0x78}}, 0x0) [ 1234.808241][T32571] RSP: 002b:00007f2bd2e27fa8 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 1234.816645][T32571] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007f2bd50b1c5a [ 1234.824594][T32571] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007f2bd2e28000 [ 1234.832538][T32571] RBP: 00007f2bd2e28040 R08: 00007f2bd2e28040 R09: 0000000020000000 [ 1234.840488][T32571] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000020000000 [ 1234.848448][T32571] R13: 0000000020000100 R14: 00007f2bd2e28000 R15: 0000000020013000 [ 1234.857898][T32571] EXT4-fs (loop4): not enough memory for 1 flex groups [ 1234.864983][T32571] EXT4-fs (loop4): unable to initialize flex_bg meta info! [ 1234.872431][T32571] EXT4-fs (loop4): mount failed [ 1234.877443][T32571] kasan: CONFIG_KASAN_INLINE enabled [ 1234.882781][T32571] kasan: GPF could be caused by NULL-ptr deref or user memory access [ 1234.901041][T32571] general protection fault: 0000 [#1] PREEMPT SMP KASAN [ 1234.907220][T32574] EXT4-fs (loop3): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? [ 1234.907988][T32571] CPU: 0 PID: 32571 Comm: syz-executor.4 Tainted: G W 5.4.125-syzkaller-00005-gb8b657d4d5e9 #0 [ 1234.907993][T32571] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1234.908007][T32571] RIP: 0010:legacy_get_tree+0xfe/0x170 [ 1234.908020][T32571] Code: 89 ff 89 ee 48 89 da ff 14 24 48 89 c5 48 3d 01 f0 ff ff 72 07 e8 12 87 bf ff eb 48 48 89 eb 48 83 c3 68 48 89 d8 48 c1 e8 03 <42> 80 3c 28 00 74 08 48 89 df e8 03 47 ee ff 48 83 3b 00 74 50 e8 [ 1234.964967][T32571] RSP: 0018:ffff88813399fcd0 EFLAGS: 00010202 [ 1234.971025][T32571] RAX: 000000000000000d RBX: 0000000000000068 RCX: 0000000000040000 [ 1234.978990][T32571] RDX: ffffc90002353000 RSI: 000000000003ffff RDI: 0000000000040000 [ 1234.986940][T32571] RBP: 0000000000000000 R08: ffffffff8198f288 R09: 000000000000000c [ 1234.994884][T32571] R10: ffffffff84800000 R11: 0000000000000000 R12: ffff8881e2763400 [ 1235.002828][T32571] R13: dffffc0000000000 R14: ffff8881e5a5a340 R15: ffffffff85faa1c0 [ 1235.010868][T32571] FS: 00007f2bd2e28700(0000) GS:ffff8881f6e00000(0000) knlGS:0000000000000000 [ 1235.019784][T32571] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 1235.026353][T32571] CR2: 0000001b32d21000 CR3: 00000001a10b9000 CR4: 00000000001406f0 [ 1235.034299][T32571] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 1235.042337][T32571] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 1235.050289][T32571] Call Trace: [ 1235.053555][T32571] ? ext4_lazyinit_thread+0xd40/0xd40 [ 1235.058992][T32571] vfs_get_tree+0x83/0x260 [ 1235.063387][T32571] do_mount+0x19d0/0x2670 [ 1235.067685][T32571] ? copy_mount_string+0x30/0x30 [ 1235.072588][T32571] ? copy_mount_options+0x59/0x300 [ 1235.077666][T32571] ? kmem_cache_alloc_trace+0x139/0x2b0 [ 1235.083181][T32571] ? copy_mount_options+0x273/0x300 [ 1235.088365][T32571] ksys_mount+0xc2/0xf0 [ 1235.092493][T32571] __x64_sys_mount+0xb1/0xc0 [ 1235.097065][T32571] do_syscall_64+0xcb/0x1e0 [ 1235.101540][T32571] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1235.107402][T32571] RIP: 0033:0x7f2bd50b1c5a [ 1235.111796][T32571] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1235.131369][T32571] RSP: 002b:00007f2bd2e27fa8 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 1235.139750][T32571] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007f2bd50b1c5a [ 1235.147704][T32571] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007f2bd2e28000 [ 1235.155645][T32571] RBP: 00007f2bd2e28040 R08: 00007f2bd2e28040 R09: 0000000020000000 [ 1235.163587][T32571] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000020000000 [ 1235.171538][T32571] R13: 0000000020000100 R14: 00007f2bd2e28000 R15: 0000000020013000 [ 1235.179481][T32571] Modules linked in: [ 1235.183696][T32571] ---[ end trace 8b7cb7c92d540719 ]--- [ 1235.189405][T32571] RIP: 0010:legacy_get_tree+0xfe/0x170 [ 1235.194933][T32571] Code: 89 ff 89 ee 48 89 da ff 14 24 48 89 c5 48 3d 01 f0 ff ff 72 07 e8 12 87 bf ff eb 48 48 89 eb 48 83 c3 68 48 89 d8 48 c1 e8 03 <42> 80 3c 28 00 74 08 48 89 df e8 03 47 ee ff 48 83 3b 00 74 50 e8 [ 1235.214825][T32571] RSP: 0018:ffff88813399fcd0 EFLAGS: 00010202 [ 1235.220960][T32571] RAX: 000000000000000d RBX: 0000000000000068 RCX: 0000000000040000 [ 1235.229207][T32571] RDX: ffffc90002353000 RSI: 000000000003ffff RDI: 0000000000040000 [ 1235.237239][T32571] RBP: 0000000000000000 R08: ffffffff8198f288 R09: 000000000000000c [ 1235.245305][T32571] R10: ffffffff84800000 R11: 0000000000000000 R12: ffff8881e2763400 [ 1235.248294][T32593] netlink: 'syz-executor.5': attribute type 51 has an invalid length. [ 1235.261568][T32571] R13: dffffc0000000000 R14: ffff8881e5a5a340 R15: ffffffff85faa1c0 [ 1235.261862][T32593] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.5'. [ 1235.276121][T32571] FS: 00007f2bd2e28700(0000) GS:ffff8881f6e00000(0000) knlGS:0000000000000000 [ 1235.287724][T32571] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 1235.294376][T32571] CR2: 00007f4b67bd0000 CR3: 00000001a10b9000 CR4: 00000000001406f0 [ 1235.302390][T32571] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 1235.310438][T32571] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 1235.318398][T32571] Kernel panic - not syncing: Fatal exception [ 1235.324689][T32571] Kernel Offset: disabled [ 1235.328990][T32571] Rebooting in 86400 seconds..